/illumos-gate/exception_lists/ |
H A D | packaging | 588 # libmlrpc is private (SMB client and server) 595 # libsmbfs is private (SMB client and server)
|
/illumos-gate/usr/src/boot/i386/btx/lib/ |
H A D | btxcsu.S | 43 call main # Invoke client main() 44 call exit # Invoke client exit()
|
/illumos-gate/usr/src/boot/i386/cdboot/ |
H A D | cdboot.S | 48 # BTX client can see them 530 # BTX client to start btxldr
|
/illumos-gate/usr/src/boot/i386/pxeldr/ |
H A D | pxeldr.S | 48 # BTX client can see them
|
/illumos-gate/usr/src/cmd/auditrecord/ |
H A D | audit_record_attr.txt | 2270 comment=Client: <client principal name> 2277 comment=Client: <client principal name> 2282 comment=Client: <client principal name>: 2288 comment=Client: <client principal name>: 2294 comment=Client: <client principal name>: 2300 comment=Client: <client principal name>: 2326 comment=remote client hostname: 2334 comment=remote client hostname:
|
/illumos-gate/usr/src/cmd/cmd-inet/common/ |
H A D | kcmd.c | 279 status = krb5_cc_get_principal(bsd_context, cc, &get_cred->client); in kcmd() 336 kcmd_version, ret_cred->client, ret_cred->server, in kcmd() 377 ret_cred->client, ret_cred->server, in kcmd()
|
H A D | store_forw_creds.c | 71 ticket->enc_part2->client)) != 0) { in store_forw_creds() 87 if ((retval = krb5_unparse_name(context, (*creds)->client, in store_forw_creds()
|
/illumos-gate/usr/src/cmd/cmd-inet/etc/dhcp/ |
H A D | inittab | 32 # options of a different client, see dhcptab(5) for details.
|
/illumos-gate/usr/src/cmd/cmd-inet/etc/ppp/ |
H A D | chap-secrets | 30 # client server secret [IP addresses ["--" options]] 32 # When authenticating to a peer (so-called "client mode;" as when dialing 33 # out to an ISP), the "client" will be matched using the local name and 40 # dial-up access to this system), the remote peer's name is the "client"
|
H A D | myisp.tmpl | 47 noauth # do not authenticate the ISP's identity (client)
|
H A D | pap-secrets | 30 # client server password [IP addresses ["--" options]] 32 # When authenticating to a peer (so-called "client mode;" as when dialing 33 # out to an ISP), the "client" will be matched using the local name and 39 # dial-up access to this system), the remote peer's name is the "client"
|
/illumos-gate/usr/src/cmd/cmd-inet/etc/ |
H A D | services | 60 bootpc 68/udp # BOOTP/DHCP client 91 dhcpv6-client 546/udp dhcpv6c # DHCPv6 Client (RFC 3315) 92 dhcpv6-client 546/tcp 146 xmpp-client 5222/tcp
|
/illumos-gate/usr/src/cmd/cmd-inet/lib/nwamd/ |
H A D | README | 132 which process synchronous NWAM client requests (e.g. get state of an 183 to (possibly) multiple NWAM client listeners. This is done via 185 request into the daemon (nwam_events_register()), a per-client
|
H A D | ipf.conf.dfl | 34 # Allow DHCP: in to client port, out to server port
|
H A D | ipf6.conf.dfl | 34 # Allow DHCP: in to client port, out to server port
|
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | README | 29 The Solaris DHCP agent (dhcpagent) is a DHCP client implementation 75 client/server protocol and adapt the agent to new 365 and since the DHCP client is used during system installation (and thus 382 meant to be fairly independent of the rest of the DHCP client. 401 when a system is resumed, the DHCP client makes the pessimistic 423 However, unless used in "inform" mode, the DHCP client *does* 438 DHCP client does not automatically add or remove default routes when 448 client so that the main event loop stays active to process other 465 a wrapper around poll(), the DHCP client cannot directly observe the 466 completion of the user program. Instead, the DHCP client creates a [all …]
|
H A D | README.v6 | 26 ** This document discusses aspects of the DHCPv4 client design that have 36 This project adds DHCPv6 client-side (not server) support to 50 - dhcpagent(8): Solaris DHCP client 163 client are unicast. In the case where the client and server aren't 165 back to the client's link-local address. 168 leased with a given client ID and a single state machine instance, 174 DHCPv6 uses a single client/server session to control the 177 addresses for the client to use and the T1/T2 timer values. Each 522 mechanism that allows the client to send unicast messages to the 623 client/server pair). [all …]
|
H A D | dhcpagent.dfl | 51 # for subsequent use by the same client. If DHCP is later restarted 52 # on the interface, the client will ask the server if it can continue 54 # does not answer (and the lease has not yet expired), then the client 83 # By default, the DHCP agent does not send out a client identifier 85 # client identifier.) To make the DHCP agent send a client 89 # digits (for example, the value 0xAABBCC11 would set the client 97 # client identifier unless CLIENT_ID is defined. 183 # The parameter ignore list allows you to instruct the DHCP client to discard 186 # on by the DHCP client or returned to users via the dhcpinfo(1) command.
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/ |
H A D | ftp.dfl | 27 # This is the ftp client configuration file
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | auth.c | 1552 have_chap_secret(client, server, need_ip, lacks_ipp) in have_chap_secret() argument 1553 char *client; in have_chap_secret() 1568 if (client != NULL && client[0] == '\0') 1569 client = NULL; 1598 get_secret(unit, client, server, secret, secret_len, am_server) in get_secret() argument 1600 char *client; 1631 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, 1652 error("Secret for %s on %s is too long", client, server); 1927 scan_authfile(f, client, server, secret, addrs, opts, filename) in scan_authfile() argument 1929 char *client; [all …]
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ |
H A D | rcp.c | 2155 if (krb5_cc_get_principal(bsd_context, cc, &creds.client)) in answer_auth()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 256 &creds.client)) != 0) { in kerberos5_send() 501 ticket->enc_part2->client, UserNameRequested)) { in kerberos5_status() 620 krb5_principal client = 0; in kerberos5_forward() local 634 retval = krb5_cc_get_principal(telnet_context, ccache, &client); in kerberos5_forward() 663 retval = krb5_fwd_tgt_creds(telnet_context, auth_context, 0, client, in kerberos5_forward() 684 if (client) in kerberos5_forward() 685 krb5_free_principal(telnet_context, client); in kerberos5_forward()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/inetd/ |
H A D | inetd.c | 619 if (strcasecmp(eval_hostname(req.client), paranoid) == 0) { in tcp_wrappers_ok()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | README | 206 the Authenticator (AP) and Supplicant (client station). 243 i.e., the part that runs in the client stations. It implements WPA key 562 uses both server side and client certificates whereas EAP-PEAP and 563 EAP-TTLS only require the server side certificate. When client 576 # convert client certificate and private key to PEM format 679 should be started before DHCP client. 708 when a static IP address is configured or when DHCP client is
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 374 krb5_principal *client, in recvauth() argument 526 (*ticket)->enc_part2->client, in recvauth() 527 client))) in recvauth() 534 if ((status = krb5_unparse_name(krb_context, *client, &krusername))) in recvauth() 646 krb5_principal client = NULL; in do_krb_login() local 653 &auth_sys, &client, encr_flag, keytab); in do_krb_login() 670 if (client && krb5_kuserok(krb_context, client, lusername)) in do_krb_login()
|