Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 25 of 71) sorted by relevance

123

/titanic_50/usr/src/lib/libbsm/common/
H A Daudit_settid.c44 struct sockaddr_in6 peer; in audit_settid() local
46 int peerlen = sizeof (peer); in audit_settid()
55 if (getpeername(fd, (struct sockaddr *)&peer, (socklen_t *)&peerlen) in audit_settid()
66 if (peer.sin6_family == AF_INET6) in audit_settid()
67 rv = do_ipv6_address(&peer, &sock); in audit_settid()
69 rv = do_ipv4_address((struct sockaddr_in *)&peer, in audit_settid()
76 do_ipv6_address(struct sockaddr_in6 *peer, struct sockaddr_in6 *sock) in do_ipv6_address() argument
96 ai.ai_termid.at_port = ((peer->sin6_port<<16) | (sock->sin6_port)); in do_ipv6_address()
98 bcopy(&peer->sin6_addr, ai.ai_termid.at_addr, 16); in do_ipv6_address()
108 do_ipv4_address(struct sockaddr_in *peer, struct sockaddr_in *sock) in do_ipv4_address() argument
[all …]
H A Dadt_token.c911 struct sockaddr_in6 peer; in adt_to_in_peer() local
912 int peerlen = sizeof (peer); in adt_to_in_peer()
926 if (getpeername(sock, (struct sockaddr *)&peer, (socklen_t *)&peerlen) in adt_to_in_peer()
932 if (peer.sin6_family == AF_INET6) { in adt_to_in_peer()
934 au_to_in_addr_ex(&(peer.sin6_addr))); in adt_to_in_peer()
936 au_to_iport((ushort_t)peer.sin6_port)); in adt_to_in_peer()
939 au_to_in_addr(&(((struct sockaddr_in *)&peer)->sin_addr))); in adt_to_in_peer()
942 (ushort_t)(((struct sockaddr_in *)&peer)->sin_port))); in adt_to_in_peer()
H A Dadt.c592 adt_do_ipv6_address(struct sockaddr_in6 *peer, struct sockaddr_in6 *sock, in adt_do_ipv6_address() argument
596 termid->at_port = ((peer->sin6_port<<16) | (sock->sin6_port)); in adt_do_ipv6_address()
598 (void) memcpy(termid->at_addr, &peer->sin6_addr, 4 * sizeof (uint_t)); in adt_do_ipv6_address()
602 adt_do_ipv4_address(struct sockaddr_in *peer, struct sockaddr_in *sock, in adt_do_ipv4_address() argument
606 termid->at_port = ((peer->sin_port<<16) | (sock->sin_port)); in adt_do_ipv4_address()
609 termid->at_addr[0] = (uint32_t)peer->sin_addr.s_addr; in adt_do_ipv4_address()
625 struct sockaddr_in6 peer; in adt_load_termid() local
627 int peerlen = sizeof (peer); in adt_load_termid()
632 if (getpeername(fd, (struct sockaddr *)&peer, (socklen_t *)&peerlen) in adt_load_termid()
650 if (peer.sin6_family == AF_INET6) { in adt_load_termid()
[all …]
/titanic_50/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dasppp2pppd382 local($peer,$intf);
388 $peer = $$options{"peer_system_name"};
390 unless defined($peer);
392 warn("Missing interface on path to peer \"$peer\".\n"), return
394 warn("Bad interface $intf on path to peer \"$peer\".\n"), return
397 $peer, "\".\n"), return
399 warn "Multiple definitions of path to peer \"$peer\".\n",
400 if defined($paths{$peer});
402 " encountered in path to peer \"", $peer, "\" (ignored).\n"
404 $paths{$peer} = $options;
[all …]
/titanic_50/usr/src/uts/sun4/io/efcode/
H A Dfc_subr.c616 if (dp->peer != NULL) { in fc_remove_subtree()
617 for (np = dp->peer; np->peer; np = dp->peer) { in fc_remove_subtree()
618 for (/* empty */; np->peer; np = np->peer) in fc_remove_subtree()
620 fc_remove_subtree(np->peer); in fc_remove_subtree()
621 np->peer = NULL; in fc_remove_subtree()
623 fc_remove_subtree(dp->peer) in fc_remove_subtree()
624 dp->peer = NULL; in fc_remove_subtree()
627 ASSERT((dp->child == NULL) && (dp->peer == NULL)); in fc_remove_subtree()
653 if (dp->peer) in fc_remove_device_tree()
654 fc_remove_device_tree(&dp->peer); in fc_remove_device_tree()
[all …]
/titanic_50/usr/src/lib/print/libipp-listener/common/
H A Dprint-job.c108 struct sockaddr_in peer; in ipp_print_job() local
109 socklen_t peer_len = sizeof (peer); in ipp_print_job()
112 if (getpeername(fp, (struct sockaddr *)&peer, in ipp_print_job()
121 if ((he = getipnodebyaddr((const char *)&peer.sin_addr, in ipp_print_job()
122 sizeof (peer.sin_addr), peer.sin_family, in ipp_print_job()
129 (char *)inet_ntop(peer.sin_family, in ipp_print_job()
130 &peer.sin_addr, tmp_buf, in ipp_print_job()
/titanic_50/usr/src/cmd/ldap/ns_ldap/
H A Dstandalone.c62 separatePort(char *peer, char **name, uint16_t *port) in separatePort() argument
66 chr = strchr(peer, '['); in separatePort()
71 chr = strchr(peer, ']'); in separatePort()
87 chr = strchr(peer, ']'); in separatePort()
95 chr = strchr(peer, ':'); in separatePort()
101 *name = peer; in separatePort()
H A Dstandalone.h42 int separatePort(char *peer, char **name, uint16_t *port);
/titanic_50/usr/src/cmd/cmd-inet/etc/ppp/
H A Dchap-secrets32 # When authenticating to a peer (so-called "client mode;" as when dialing
34 # "server" will use the remote peer's name. CHAP does specify an
36 # a peer name, and the "remotename <name>" option should then be used.
39 # When authenticating a peer (so-called "server mode;" as when allowing
40 # dial-up access to this system), the remote peer's name is the "client"
43 # <name>" option cannot be used. The remote peer's name comes from the
44 # CHAP messages the peer sends.
47 # valid IP addresses for the peer appears. This must be present when
49 # addresses are given in the options. If a given dial-in peer has an
52 # to the peer as a hint.
H A Dpap-secrets32 # When authenticating to a peer (so-called "client mode;" as when dialing
34 # "server" will use the remote peer's name. PAP does not specify an
38 # When authenticating a peer (so-called "server mode;" as when allowing
39 # dial-up access to this system), the remote peer's name is the "client"
42 # <name>" option cannot be used. The remote peer's name comes from the PAP
43 # messages the peer sends.
46 # as a server, a list of valid IP addresses for the peer appears. This
49 # peer has an allocated IP address ("static IP addressing"), then this
51 # be sent to the peer as a hint.
/titanic_50/usr/src/cmd/ssh/libssh/common/
H A Dkex.c175 buffer_clear(&kex->peer); in kex_finish()
232 buffer_append(&kex->peer, ptr, dlen); in kex_input_kexinit()
286 buffer_init(&kex->peer); in kex_setup()
438 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) in proposals_match()
449 if ((p = strchr(peer[*idx], ',')) != NULL) in proposals_match()
451 if (strcmp(my[*idx], peer[*idx]) != 0) { in proposals_match()
453 my[*idx], peer[*idx]); in proposals_match()
465 char **my, **peer; in kex_choose_conf() local
477 peer = kex_buf2prop(&kex->peer, &first_kex_follows); in kex_choose_conf()
480 cprop=peer; in kex_choose_conf()
[all …]
H A Dkexdhc.c119 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexdh_client()
H A Dkexdhs.c106 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexdh_server()
H A Dkexgexs.c149 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexgex_server()
H A Dkexgexc.c167 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexgex_client()
/titanic_50/usr/src/lib/libsmbfs/smb/
H A Dnb_name.c81 nb_sockaddr(struct sockaddr *peer, struct nb_name *np, in nb_sockaddr() argument
89 if (peer && (peer->sa_family != AF_INET)) in nb_sockaddr()
105 if (peer) { in nb_sockaddr()
107 sin = (struct sockaddr_in *)peer; in nb_sockaddr()
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.tftpd.c102 static int peer; variable
402 peer = socket(addrfmly, SOCK_DGRAM, 0); in main()
403 if (peer < 0) { in main()
414 (void) setsockopt(peer, SOL_SOCKET, SO_DEBUG, in main()
418 if (bind(peer, (struct sockaddr *)&client, fromplen) < 0) { in main()
440 if (getsockname(peer, (struct sockaddr *)&client, in main()
452 (void) close(peer); in main()
507 peer = socket(addrfmly, SOCK_DGRAM, 0); in delayed_responder()
508 if (peer == -1) { in delayed_responder()
518 (void) setsockopt(peer, SOL_SOCKET, SO_DEBUG, in delayed_responder()
[all …]
/titanic_50/usr/src/uts/sun4v/promif/
H A Dpromif_stree.c356 pnode_t peer; in create_peers() local
360 peer = prom_nextnode(node); in create_peers()
361 if (peer == 0) in create_peers()
363 if (prom_getproplen(peer, "name") <= 0) { in create_peers()
364 node = peer; in create_peers()
367 pnp = create_node(np->pn_parent, peer); in create_peers()
369 create_children(pnp, peer); in create_peers()
371 node = peer; in create_peers()
/titanic_50/usr/src/cmd/mdb/common/modules/logindmux/
H A Dlogindmux.c40 uintptr_t peer, lower; in logdmux_uqinfo() local
54 peer = (uintptr_t)tmx.rdq; in logdmux_uqinfo()
57 peer, lower); in logdmux_uqinfo()
/titanic_50/usr/src/lib/efcode/engine/
H A Dpackage.c210 REVERT_PHANDLE(env, TOS, d->peer); in peer_node()
217 device_t *peer; in new_device() local
227 for (peer = parent->child; peer->peer; peer = peer->peer) in new_device()
229 peer->peer = phandle; in new_device()
580 d = d->peer; in match_package_path()
770 d = d->peer; in do_ls()
805 n = n->peer; in paren_cd()
916 &phandle->peer, phandle->peer); in dump_device()
/titanic_50/usr/src/cmd/ssh/doc/
H A Dnchan2.ms52 remote peer.
53 Data sent by the peer is received on the OUTPUT-end (receive-end),
57 INPUT-end of the channel, it sends an EOF message to the peer.
59 A CLOSE message is sent to the peer if
/titanic_50/usr/src/cmd/dtrace/test/tst/common/mib/
H A Dtst.tcp.ksh112 my \$peer = sockaddr_in($port, INADDR_ANY);
117 connect(S, \$peer) or die "connect failed: \$!";
/titanic_50/usr/src/cmd/print/bsd-sysv-commands/
H A Din.lpd.c66 struct sockaddr_in6 peer; in remote_host_name() local
67 socklen_t peer_len = sizeof (peer); in remote_host_name()
74 if (getpeername(fd, (struct sockaddr *)&peer, &peer_len) < 0) { in remote_host_name()
82 if ((hp = getipnodebyaddr((const char *)&peer.sin6_addr, in remote_host_name()
85 return (strdup(inet_ntop(peer.sin6_family, in remote_host_name()
86 &peer.sin6_addr, tmp_buf, sizeof (tmp_buf)))); in remote_host_name()
/titanic_50/usr/src/head/rpcsvc/
H A Dyp.x87 peername peer; member
123 peername peer; member
/titanic_50/usr/src/lib/libresolv2/common/resolv/
H A Dres_send.c339 struct sockaddr_storage peer; in res_nsend() local
355 peerlen = sizeof(peer); in res_nsend()
357 (struct sockaddr *)&peer, &peerlen) < 0) { in res_nsend()
361 if (!sock_eq((struct sockaddr *)&peer, in res_nsend()
632 struct sockaddr_storage peer; in send_vc() local
633 ISC_SOCKLEN_T size = sizeof peer; in send_vc()
636 (struct sockaddr *)&peer, &size) < 0 || in send_vc()
637 !sock_eq((struct sockaddr *)&peer, nsap)) { in send_vc()

123