/dragonfly/crypto/openssh/ |
H A D | auth2-pubkeyfile.c | 57 int allow_cert_authority, const char *remote_ip, const char *remote_host, in auth_authorise_keyopts() argument 91 switch (match_host_and_ip(remote_host, remote_ip, in auth_authorise_keyopts() 105 loc, pw->pw_name, remote_host, remote_ip, in auth_authorise_keyopts() 109 loc, remote_host); in auth_authorise_keyopts() 266 char *cp, const char *remote_ip, const char *remote_host, const char *loc, in auth_check_authkey_line() argument 328 sshkey_is_cert(key), remote_ip, remote_host, loc) != 0) { in auth_check_authkey_line() 351 remote_ip, remote_host, loc) != 0) { in auth_check_authkey_line() 409 const char *remote_host, struct sshauthopt **authoptsp) in auth_check_authkeys_file() argument 434 remote_ip, remote_host, loc, authoptsp) == 0) in auth_check_authkeys_file()
|
H A D | auth2-pubkey.c | 485 const char *remote_ip, const char *remote_host, in user_cert_trusted_ca() argument 544 remote_ip, remote_host, "cert") != 0) { in user_cert_trusted_ca() 553 remote_ip, remote_host, "principals") != 0) { in user_cert_trusted_ca() 592 char *file, const char *remote_ip, const char *remote_host, in user_key_allowed2() argument 607 key, remote_ip, remote_host, authoptsp); in user_key_allowed2() 621 const char *remote_ip, const char *remote_host, in user_key_command_allowed2() argument 724 remote_host, authoptsp); in user_key_command_allowed2() 761 const char *remote_host = auth_get_canonical_hostname(ssh, in user_key_allowed() local 779 remote_ip, remote_host, &opts); in user_key_allowed() 789 if ((success = user_cert_trusted_ca(pw, key, remote_ip, remote_host, in user_key_allowed() [all …]
|
/dragonfly/bin/cpdup/scripts/ |
H A D | do_remote_host | 42 set hlbase = `ssh $remote_host -n "readlink ${remote_path}/mirrors/$host"` 44 echo "Missing softlink at ${remote_host}:${remote_path}/mirrors/${host}" 59 set target = ${remote_host}:${remote_path}/mirrors/${source} 102 …ssh $remote_host -n "rm -f ${remote_path}/mirrors/$host; ln -s $basename ${remote_path}/mirrors/$h…
|
H A D | params | 10 set remote_host = "OFF.SITE.HOST"
|
/dragonfly/usr.sbin/lpr/common_source/ |
H A D | net.c | 192 if (pp->remote_host == NULL) in checkremote() 215 if ((error = getaddrinfo(pp->remote_host, NULL, in checkremote() 219 pp->remote_host, gai_strerror(error)); in checkremote()
|
H A D | rmjob.c | 354 rem = getport(pp, pp->remote_host, 0); in rmremote() 359 printf("connection to %s is down\n", pp->remote_host); in rmremote()
|
H A D | printcap.c | 242 CHK(capdb_getaltstr(bp, "rm", "remote.host", 0, &pp->remote_host)); in getprintcap_int() 342 cfree(pp->remote_host); in free_printer()
|
H A D | displayq.c | 235 fd = getport(pp, pp->remote_host, 0); in displayq() 241 printf("connection to %s is down\n", pp->remote_host); in displayq()
|
H A D | lp.h | 74 char *remote_host; /* RM: remote machine name */ member
|
/dragonfly/usr.sbin/lpr/lpd/ |
H A D | printjob.c | 1126 pp->printer, pp->remote_host); in sendfile() 1130 pstatus(pp, "sending to %s", pp->remote_host); in sendfile() 1162 pp->remote_host, origin_host); in sendfile() 1787 pfd = getport(pp, pp->remote_host, 0); in openrem() 1800 pp->remote_host); in openrem() 1804 pp->remote_host); in openrem() 1810 pstatus(pp, "sending to %s", pp->remote_host); in openrem()
|