/dports/sysutils/freeipmi/freeipmi-1.6.8/ipmidetectd/ |
H A D | ipmidetectd.c | 593 struct sockaddr_in6 rhost; in _send_ping_data() local 601 if ((rhost_fd = accept (server_fd, (struct sockaddr *)&rhost, &rhost_len)) < 0) in _send_ping_data()
|
/dports/sysutils/sanoid-devel/sanoid-45d0898/ |
H A D | syncoid | 224 $rhost = "$sshcmd $rhost"; 1091 if ($rhost ne '') { $rhost = "$sshcmd $rhost"; } 1117 $rhost = "$sshcmd $rhost"; 1137 $rhost = "$sshcmd $rhost"; 1292 if ($rhost ne '') { $rhost = "$sshcmd $rhost"; } 1365 $rhost = "$sshcmd $rhost"; 1389 $rhost = "$sshcmd $rhost"; 1431 $rhost = "-S $socket $rhost"; 1453 $rhost = "$sshcmd $rhost"; 1520 $rhost = "$sshcmd $rhost"; [all …]
|
/dports/sysutils/webmin/webmin-1.981/stunnel/ |
H A D | edit_stunnel.cgi | 56 $rhost = $1; 75 $rhost = $2; 105 …"<b>$text{'edit_rhost'}</b>", &ui_textbox("rhost", ( !$rport ? "" : ( $rhost ? $rhost : "localhost…
|
/dports/sysutils/webmin/webmin-1.981/lpadmin/ |
H A D | save_printer.cgi | 105 local ($rhost, $rport); 107 $rhost = $1; 111 $rhost = $in{'rhost'}; 114 &to_ipaddress($rhost) || &to_ip6address($rhost) || 115 &error(&text('save_erhost', $rhost)); 129 &open_socket($rhost, 515, TEST);
|
/dports/sysutils/sanoid/sanoid-2.0.3/ |
H A D | syncoid | 224 $rhost = "$sshcmd $rhost"; 1091 if ($rhost ne '') { $rhost = "$sshcmd $rhost"; } 1117 $rhost = "$sshcmd $rhost"; 1137 $rhost = "$sshcmd $rhost"; 1292 if ($rhost ne '') { $rhost = "$sshcmd $rhost"; } 1365 $rhost = "$sshcmd $rhost"; 1389 $rhost = "$sshcmd $rhost"; 1431 $rhost = "-S $socket $rhost"; 1453 $rhost = "$sshcmd $rhost"; 1520 $rhost = "$sshcmd $rhost"; [all …]
|
/dports/security/pam_radius/pam_radius-4.0/ |
H A D | pam_radius.c | 82 const char *rhost, const void *state, size_t state_len) in build_access_request() argument 128 if (rhost != NULL && in build_access_request() 129 rad_put_string(radh, RAD_CALLING_STATION_ID, rhost) == -1) { in build_access_request() 217 const char *nas_id, const char *nas_ipaddr, const char *rhost) in do_challenge() argument 285 nas_ipaddr, rhost, state, statelen) == -1) in do_challenge() 301 const void *rhost, *tmpuser; in pam_sm_authenticate() local 310 pam_get_item(pamh, PAM_RHOST, &rhost); in pam_sm_authenticate() 340 if (build_access_request(radh, user, pass, nas_id, nas_ipaddr, rhost, in pam_sm_authenticate() 387 nas_ipaddr, rhost); in pam_sm_authenticate()
|
/dports/security/logcheck/logcheck/rulefiles/linux/ignore.d.server/ |
H A D | ssh | 41 …:]]+ more) authentication failures?; logname= uid=0 euid=0 tty=ssh ruser= rhost=[^[:space:]]+([[:s…
|
/dports/security/py-fail2ban/fail2ban-0.11.2/config/filter.d/ |
H A D | bsd-sshd.conf | 33 …e)sauthentication failure; logname=\S* uid=\S* euid=\S* tty=\S* ruser=\S* rhost=<HOST>(?:\s+user=.…
|
/dports/news/trn/trn-3.6/ |
H A D | nntpinit.c | 37 unsigned long rhost _((char **)); 217 if ((sin.sin_addr.s_addr = rhost(&server)) == -1) {
|
/dports/news/inn/inn-2.6.4/backends/ |
H A D | actsync.c | 736 char *rhost; in get_active() local 783 rhost = xstrdup(host); in get_active() 786 rhost = xstrdup(host); in get_active() 792 if (NNTPconnect(rhost, rport, &FromServer, &ToServer, buff, in get_active() 797 if (A_flag && NNTPsendpassword(rhost, FromServer, ToServer) < 0) in get_active() 800 free(rhost); in get_active()
|
/dports/news/inn-current/inn-2.7-20211226/backends/ |
H A D | actsync.c | 736 char *rhost; in get_active() local 783 rhost = xstrdup(host); in get_active() 786 rhost = xstrdup(host); in get_active() 792 if (NNTPconnect(rhost, rport, &FromServer, &ToServer, buff, in get_active() 798 if (A_flag && NNTPsendpassword(rhost, FromServer, ToServer) < 0) in get_active() 801 free(rhost); in get_active()
|
/dports/news/nntp/nntp-1.5.12.2_10/xmit/ |
H A D | get_tcp_conn.c | 196 extern u_long rhost(); 199 if ((haddr = rhost(&host)) == FAIL)
|
/dports/news/nn/nn-6.7.3/ |
H A D | nntp.c | 408 if ((sin.sin_addr.s_addr = rhost(&machine)) == -1) { in get_socket()
|
/dports/net-mgmt/argus3-clients/argus-clients-3.0.8.3/examples/ramysql/ |
H A D | rasql.c | 467 char *rhost = NULL, *ruser = NULL, *rpass = NULL; in RaMySQLInit() local 470 rhost = dbptr; in RaMySQLInit() 475 if ((ptr = strchr (rhost, '@')) != NULL) { in RaMySQLInit() 476 ruser = rhost; in RaMySQLInit() 478 rhost = ptr; in RaMySQLInit() 487 if ((ptr = strchr (rhost, ':')) != NULL) { in RaMySQLInit() 506 if (rhost != NULL) { in RaMySQLInit() 508 RaHost = strdup(rhost); in RaMySQLInit()
|
/dports/net/nepenthes/nepenthes-0.2.2/modules/module-honeytrap/ |
H A D | PCAPSocket.cpp | 180 string rhost = inet_ntoa(*(in_addr *)&m_RemoteHost); in Init() local 188 rhost.c_str(),getRemotePort(), in Init() 191 rhost.c_str(),getRemotePort()); in Init() 233 rhost.c_str(),getRemotePort(), in Init()
|
H A D | module-honeytrap.cpp | 353 string rhost = inet_ntoa(*(in_addr *)&c.m_RemoteHost); in handleEvent() local 356 logInfo("Connection %s:%i %s:%i unknown, dropping\n", rhost.c_str(),c.m_RemotePort, in handleEvent()
|
/dports/net/44bsd-rdist/44bsd-rdist-20001111_2/ |
H A D | docmd.c | 126 char *rhost; 150 if (!makeconn(rhost)) 205 char *rhost; in remotecmd() 256 makeconn(rhost) in makeconn() argument 257 char *rhost; in makeconn() 277 cur_host = rhost; 285 rhost = cp + 1; 562 char *file, *rhost; in notify() 574 if (rhost) 622 if (rhost != NULL) [all …]
|
/dports/net/netscript/netscript-1.7.1/ |
H A D | netscript.c | 739 C *rhost; variable 2341 IF((rns.sin_addr.s_addr=IA(rhost))){ in parsesocket() 2343 IF(!(he=GH(rhost))){ in parsesocket() 3484 FR(rhost); in iface() 3486 IF(!(rhost=(C *)SDU(parsedline))) in iface() 3490 nsprint("routehost: %s\n",(setroute?rhost:IFACE_UNSET)); in iface() 4877 IF(!(rhost=(C *)SDU(parsedline))) in main()
|
/dports/net/rdist6/rdist-6.1.5/src/ |
H A D | docmd.c | 101 char *rhost; in notify() 120 (rhost) ? "@" : "", 121 (rhost) ? rhost : "", getnlstr(to)); 174 if (rhost != NULL) 260 char *rhost; in remotecmd() 324 char *rhost; in makeconn() 349 cur_host = rhost; 358 rhost = cp + 1; 453 char *rhost; local 468 rhost = cmd->c_name; [all …]
|
/dports/multimedia/smplayer/smplayer-21.10.0/webserver/ |
H A D | mongoose.c | 5133 struct mg_str rscheme = {0, 0}, ruser_info = {0, 0}, rhost = {0, 0}, in mg_parse_uri() local 5170 rhost.p = uri.p; in mg_parse_uri() 5171 rhost.len = p - uri.p; in mg_parse_uri() 5181 rhost.p = uri.p; in mg_parse_uri() 5182 rhost.len = p - uri.p; in mg_parse_uri() 5202 rhost.p = p; in mg_parse_uri() 5214 rhost.len = p - rhost.p; in mg_parse_uri() 5249 if (host != 0) *host = rhost; in mg_parse_uri()
|
/dports/mail/mdpop3d/mdpop3d-0.97/ |
H A D | mdpop3d.c | 411 rhost, pam_strerror(pamh,r)); in checkpass() 498 rhost, user, pam_strerror(pamh, r)); in auth() 611 rhost, user); in putmsg() 661 case 'r': rhost = optarg; break; in main() 725 if (rhost) in main() 728 if ((rhost = getenv(rhostvar)) == NULL || !*rhost) { in main() 735 rhost = a; in main() 740 rhost = strdup(inet_ntoa(sin.sin_addr)); in main() 742 rhost = "local"; in main() 861 rhost, user); in main() [all …]
|
/dports/devel/libvirt/libvirt-7.10.0/src/qemu/ |
H A D | qemu_monitor_json.c | 854 const char *rhost, *rport, *rfamily; in qemuMonitorJSONHandleGraphicsSPICE() local 889 if (!(rhost = virJSONValueObjectGetString(client, "host"))) { in qemuMonitorJSONHandleGraphicsSPICE() 908 rhost, rport, auth, NULL, NULL); in qemuMonitorJSONHandleGraphicsSPICE()
|
/dports/databases/percona56-server/percona-server-5.6.51-91.0/scripts/ |
H A D | mysqlaccess.sh | 106 -H, --rhost=# remote MySQL-server to connect to 517 ,"rhost|H=s" => \$Param{'rhost'} 2495 …<td valign=top><INPUT name=rhost type=text size=15 maxlength=15 value="$MySQLaccess::Param{'rhost'…
|
/dports/databases/mysql56-client/mysql-5.6.51/scripts/ |
H A D | mysqlaccess.sh | 106 -H, --rhost=# remote MySQL-server to connect to 517 ,"rhost|H=s" => \$Param{'rhost'} 2495 …<td valign=top><INPUT name=rhost type=text size=15 maxlength=15 value="$MySQLaccess::Param{'rhost'…
|
/dports/databases/mariadb103-client/mariadb-10.3.34/scripts/ |
H A D | mysqlaccess.sh | 100 -H, --rhost=# remote MariaDB-server to connect to 511 ,"rhost|H=s" => \$Param{'rhost'} 2487 …<td valign=top><INPUT name=rhost type=text size=15 maxlength=15 value="$MySQLaccess::Param{'rhost'…
|