Searched refs:hostname (Results 151 - 175 of 429) sorted by relevance

1234567891011>>

/freebsd-9.3-release/tools/regression/kgssapi/
H A Dgsstest.c105 char hostname[512]; local
130 gethostname(hostname, sizeof(hostname));
132 "nfs@%s", hostname);
/freebsd-9.3-release/tools/regression/netinet/udpconnectjail/
H A Dudpconnectjail.c105 thejail.hostname = "jail";
/freebsd-9.3-release/usr.bin/systat/
H A Dmain.c73 char hostname[MAXHOSTNAMELEN]; variable
156 gethostname(hostname, sizeof (hostname));
189 mvprintw(21, 25, "CPU usage on %s", hostname);
/freebsd-9.3-release/usr.bin/uname/
H A Duname.c86 char *ident, *platform, *hostname, *arch, *release, *sysname, *version, *kernvers, *uservers; variable
162 CHECK_ENV("n", hostname);
187 PRINT_FLAG(flags, NFLAG, hostname);
236 NATIVE_SYSCTL2_GET(hostname, CTL_KERN, KERN_HOSTNAME) {
/freebsd-9.3-release/usr.bin/wall/
H A Dwall.c197 char hostname[MAXHOSTNAMELEN], tmpname[64]; local
215 (void)gethostname(hostname, sizeof(hostname));
229 whom, hostname);
/freebsd-9.3-release/usr.sbin/timed/timed/
H A Dacksend.c55 (void)strcpy(msg.tsp_name, hostname);
H A Dtimed.c202 if (gethostname(hostname, sizeof(hostname) - 1) < 0)
212 add_good_host(hostname,1);
477 (void)strcpy(msg.tsp_name, hostname);
495 (void)strcpy(resp.tsp_name, hostname);
568 (void)strcpy(conflict.tsp_name, hostname);
799 if (!innetgr(goodgroup, &hostname[0], 0,0)) {
802 &hostname[0], goodgroup);
807 &hostname[0], goodgroup);
844 if (!strcasecmp(name,hostname)) /* trus
[all...]
H A Dslave.c147 (void)strcpy(to.tsp_name, hostname);
407 (void)strcpy(to.tsp_name, hostname);
418 (void)strcpy(to.tsp_name, hostname);
437 (void)strcpy(to.tsp_name, hostname);
471 (void)strcpy(to.tsp_name, hostname);
511 if (!strcmp(msg->tsp_name, hostname)) {
531 (void)strcpy(to.tsp_name, hostname);
584 (void)strcpy(to.tsp_name, hostname);
668 (void)strcpy(to.tsp_name, hostname);
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dget_for_creds.c87 * Forward credentials for client to host hostname , making them
89 * in out_data. If hostname == NULL, pick it from server.
93 * @param hostname the host to forward the tickets too.
108 const char *hostname,
125 if (hostname == NULL &&
134 hostname = host;
156 hostname,
163 * Gets tickets forwarded to hostname. If the tickets that are
167 * If the ticket have any address, hostname will be used for figure
179 * @param hostname th
106 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char *hostname, krb5_principal client, krb5_principal server, krb5_ccache ccache, int forwardable, krb5_data *out_data) argument
190 krb5_get_forwarded_creds(krb5_context context, krb5_auth_context auth_context, krb5_ccache ccache, krb5_flags flags, const char *hostname, krb5_creds *in_creds, krb5_data *out_data) argument
[all...]
H A Ddigest.c131 const char *hostname)
133 if (digest->init.hostname) {
134 krb5_set_error_string(context, "server hostname already set");
137 digest->init.hostname = malloc(sizeof(*digest->init.hostname));
138 if (digest->init.hostname == NULL) {
142 *digest->init.hostname = strdup(hostname);
143 if (*digest->init.hostname == NULL) {
145 free(digest->init.hostname);
129 krb5_digest_set_hostname(krb5_context context, krb5_digest digest, const char *hostname) argument
848 krb5_ntlm_init_request(krb5_context context, krb5_ntlm ntlm, krb5_realm realm, krb5_ccache ccache, uint32_t flags, const char *hostname, const char *domainname) argument
[all...]
H A Dverify_krb5_conf.c142 char hostname[128]; local
186 if(strsep_copy(&p, ":", hostname, sizeof(hostname)) < 0) {
189 hostname[strcspn(hostname, "/")] = '\0';
201 ret = getaddrinfo(hostname, service, &hints, &ai);
204 ret = getaddrinfo(hostname, service, &hints, &ai);
207 krb5_warnx(context, "%s: %s (%s)", path, gai_strerror(ret), hostname);
/freebsd-9.3-release/libexec/rlogind/
H A Drlogind.c202 char hostname[2 * MAXHOSTNAMELEN + 1]; local
214 realhostname_sa(hostname, sizeof(hostname) - 1,
218 hostname[sizeof(hostname) - 1] = '\0';
294 "-h", hostname, "-f", lusername, (char *)NULL);
297 "-h", hostname, lusername, (char *)NULL);
/freebsd-9.3-release/usr.sbin/rpc.lockd/
H A Dkern.c72 static char hostname[MAXHOSTNAMELEN + 1]; /* Hostname. */ variable
162 (void)gethostname(hostname, sizeof(hostname) - 1);
245 cl->cl_auth = authunix_create(hostname,
276 arg4.alock.caller_name = hostname;
300 arg.alock.caller_name = hostname;
346 arg4.alock.caller_name = hostname;
371 arg.alock.caller_name = hostname;
416 arg4.alock.caller_name = hostname;
437 arg.alock.caller_name = hostname;
[all...]
H A Dlockd_lock.c159 void monitor_lock_host(const char *hostname);
160 void unmonitor_lock_host(char *hostname);
206 void clear_blockingfilelock(const char *hostname);
210 void clear_partialfilelock(const char *hostname);
217 void do_clear(const char *hostname);
1269 clear_blockingfilelock(const char *hostname) argument
1285 if (strncmp(hostname, ifl->client_name, SM_MAXSTRLEN) == 0) {
1634 clear_partialfilelock(const char *hostname) argument
1639 clear_blockingfilelock(hostname);
1656 if (strncmp(hostname, if
1876 do_clear(const char *hostname) argument
2029 monitor_lock_host(const char *hostname) argument
2105 unmonitor_lock_host(char *hostname) argument
2177 notify(const char *hostname, const int state) argument
[all...]
/freebsd-9.3-release/release/picobsd/tinyware/login/
H A Dpico-login.c50 * login -h hostname (for telnetd, etc.)
141 char *term, *envinit[1], *hostname, *tty, *username; variable
214 "hostname size", optarg);
241 optarg = "invalid hostname";
245 hostname = optarg;
466 if (hostname) {
509 if (login_access(pwd->pw_name, hostname ? full_hostname : tty) == 0)
514 ulog_login(tty, username, hostname);
520 if (hostname)
521 (void)strncpy(utmp.ut_host, hostname, sizeo
[all...]
/freebsd-9.3-release/crypto/openssh/
H A Dauth.c102 const char *hostname = NULL, *ipaddr = NULL, *passwd = NULL; local
186 hostname = get_canonical_hostname(options.use_dns);
193 if (match_user(pw->pw_name, hostname, ipaddr,
197 pw->pw_name, hostname);
204 if (match_user(pw->pw_name, hostname, ipaddr,
210 "not listed in AllowUsers", pw->pw_name, hostname);
218 "not in any group", pw->pw_name, hostname);
229 pw->pw_name, hostname);
242 "in AllowGroups", pw->pw_name, hostname);
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dtest_ca.in145 --hostname="www.test.h5l.se" \
146 --hostname="ftp.test.h5l.se" \
150 echo "verify certificate hostname (ok)"
152 --hostname=www.test.h5l.se \
156 echo "verify certificate hostname (fail)"
158 --hostname=www2.test.h5l.se \
162 echo "verify certificate hostname (fail)"
164 --hostname=2www.test.h5l.se \
168 echo "issue certificate (hostname in CN)"
176 echo "verify certificate hostname (o
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/ntlm/
H A Dntlm.c388 if (data->hostname)
389 free(data->hostname);
399 struct sec_buffer domain, hostname; local
419 CHECK(ret_sec_buffer(in, &hostname), 0);
429 CHECK(ret_string(in, 0, &hostname, &data->hostname), 0);
456 struct sec_buffer domain, hostname; local
467 if (type1->hostname) {
479 if (type1->hostname) {
480 hostname
[all...]
/freebsd-9.3-release/lib/libc/net/
H A Dgetaddrinfo.c44 * when globbing NULL hostname (to loopback, or wildcard). Is it the right
48 * (1) what should we do against numeric hostname (2) what should we do
49 * against NULL hostname (3) what is AI_ADDRCONFIG itself. AF not ready?
371 getaddrinfo(const char *hostname, const char *servname, argument
406 if (hostname == NULL && servname == NULL)
481 * NULL hostname, or numeric hostname.
495 if (hostname == NULL) {
506 error = explore_numeric_scope(pai, hostname, servname,
511 * families that do not match that of hostname
1174 explore_numeric(const struct addrinfo *pai, const char *hostname, const char *servname, struct addrinfo **res, const char *canonname) argument
1239 explore_numeric_scope(const struct addrinfo *pai, const char *hostname, const char *servname, struct addrinfo **res) argument
1673 char *hostname; local
1846 explore_fqdn(const struct addrinfo *pai, const char *hostname, const char *servname, struct addrinfo **res) argument
2191 const char *hostname; local
[all...]
/freebsd-9.3-release/contrib/traceroute/
H A Dtraceroute.c334 char *hostname; variable
684 hostname = argv[optind];
685 hi = gethostinfo(hostname);
690 prog, hostname, inet_ntoa(to->sin_addr));
691 hostname = hi->name;
944 prog, hostname, inet_ntoa(to->sin_addr));
1229 prog, hostname, packlen, cc);
1612 gethostinfo(register char *hostname) argument
1620 if (strlen(hostname) >= MAXHOSTNAMELEN) {
1621 Fprintf(stderr, "%s: hostname \"
1679 getaddr(register u_int32_t *ap, register char *hostname) argument
[all...]
/freebsd-9.3-release/contrib/sendmail/contrib/
H A Dbounce-resender.pl33 chomp($hostname = `hostname`);
75 print STDERR "$0: running on $hostname ($uname)\n";
209 print MSGHDR "HMessage-ID: <$messageid@$hostname>\n"
240 print MSGHDR "HMessage-ID: <$messageid@$hostname>\n"
/freebsd-9.3-release/contrib/tcpdump/
H A Dprint-pptp.c108 u_char hostname[64]; member in struct:pptp_msg_sccrq
120 u_char hostname[64]; member in struct:pptp_msg_sccrp
252 2 u_char hostname[64];
412 pptp_hostname_print(const u_char *hostname) argument
414 printf(" HOSTNAME(%.64s)", hostname);
604 TCHECK(ptr->hostname);
605 pptp_hostname_print(&ptr->hostname[0]);
634 TCHECK(ptr->hostname);
635 pptp_hostname_print(&ptr->hostname[0]);
/freebsd-9.3-release/crypto/openssh/openbsd-compat/
H A Dbsd-cray.c177 record_failed_login(const char *user, const char *hostname, const char *ttyname) argument
206 char hostname[MAXHOSTNAMELEN]; local
225 hostname[0] = '\0';
226 strlcpy(hostname,
269 usent.host = hostname;
391 fsent.host = hostname;
427 fsent.host = hostname;
471 ssent.host = hostname;
/freebsd-9.3-release/etc/mail/
H A DMakefile68 SENDMAIL_MC!= hostname
76 SENDMAIL_SUBMIT_MC!= hostname
/freebsd-9.3-release/libexec/talkd/
H A Dannounce.c63 extern char hostname[];
121 hostname, localclock->tm_hour , localclock->tm_min,

Completed in 231 milliseconds

1234567891011>>