Symbol: host
bin/mt/mt.c
100
if (host)
bin/mt/mt.c
110
if (host)
bin/mt/mt.c
122
if (host)
bin/mt/mt.c
134
if (host)
bin/mt/mt.c
190
host = tape;
bin/mt/mt.c
191
tape = strchr(host, ':');
bin/mt/mt.c
193
if (rmthost(host) == 0)
bin/mt/mt.c
222
warn("%s", host ? tape : realtape);
bin/mt/mt.c
94
char *host = NULL; /* remote host (if any) */
bin/mt/mt.h
35
int rmthost(char *host);
bin/mt/mtrmt.c
76
rmthost(char *host)
bin/mt/mtrmt.c
78
if ((rmtpeer = strdup(host)) == NULL)
lib/libc/asr/getnameinfo.c
149
getnameinfo(const struct sockaddr *sa, socklen_t salen, char *host,
lib/libc/asr/getnameinfo.c
162
if (host == NULL || hostlen == 0 ||
lib/libc/asr/getnameinfo.c
163
(host && hostlen && (flags & NI_NUMERICHOST))) {
lib/libc/asr/getnameinfo.c
164
if (host) {
lib/libc/asr/getnameinfo.c
165
r = asr_print_addr(sa, host, hostlen);
lib/libc/asr/getnameinfo.c
190
as = getnameinfo_async(sa, salen, host, hostlen, serv, servlen, flags,
lib/libc/asr/getnameinfo_async.c
39
getnameinfo_async(const struct sockaddr *sa, socklen_t slen, char *host,
lib/libc/asr/getnameinfo_async.c
56
as->as.ni.hostname = host;
lib/libc/gen/getnetgrent.c
412
in_check(const char *host, const char *user, const char *domain,
lib/libc/gen/getnetgrent.c
415
if ((host != NULL) && (ng->ng_host != NULL) &&
lib/libc/gen/getnetgrent.c
416
strcmp(ng->ng_host, host) != 0)
lib/libc/gen/getnetgrent.c
435
in_find(char *ypdom, struct stringlist *sl, char *grp, const char *host,
lib/libc/gen/getnetgrent.c
472
i = in_check(host, user, domain, ng);
lib/libc/gen/getnetgrent.c
485
if (in_find(ypdom, sl, name, host, user, domain)) {
lib/libc/gen/getnetgrent.c
657
getnetgrent(const char **host, const char **user, const char **domain)
lib/libc/gen/getnetgrent.c
662
*host = _nglist->ng_host;
lib/libc/gen/getnetgrent.c
674
innetgr(const char *grp, const char *host, const char *user, const char *domain)
lib/libc/gen/getnetgrent.c
702
if (host != NULL && user == NULL) {
lib/libc/gen/getnetgrent.c
703
if (in_lookup(ypdom, grp, host, domain, _NG_KEYBYHOST))
lib/libc/gen/getnetgrent.c
705
} else if (host == NULL && user != NULL) {
lib/libc/gen/getnetgrent.c
721
found = in_find(ypdom, sl, grpdup, host, user, domain);
lib/libc/gen/getpwent.c
331
const char *user, *host, *dom;
lib/libc/gen/getpwent.c
367
s = getnetgrent(&host, &user, &dom);
lib/libc/gen/getpwent.c
430
const char *user, *host, *dom;
lib/libc/gen/getpwent.c
460
while (getnetgrent(&host, &user, &dom)) {
lib/libc/gen/getpwent.c
564
const char *host, *user, *dom;
lib/libc/gen/getpwent.c
614
s = getnetgrent(&host, &user, &dom);
lib/libc/gen/getpwent.c
668
while (getnetgrent(&host, &user, &dom)) {
lib/libc/net/inet_makeaddr.c
39
inet_makeaddr(in_addr_t net, in_addr_t host)
lib/libc/net/inet_makeaddr.c
44
addr = (net << IN_CLASSA_NSHIFT) | (host & IN_CLASSA_HOST);
lib/libc/net/inet_makeaddr.c
46
addr = (net << IN_CLASSB_NSHIFT) | (host & IN_CLASSB_HOST);
lib/libc/net/inet_makeaddr.c
48
addr = (net << IN_CLASSC_NSHIFT) | (host & IN_CLASSC_HOST);
lib/libc/net/inet_makeaddr.c
50
addr = net | host;
lib/libc/rpc/clnt_simple.c
111
strlcpy(crp->oldhost, host, HOST_NAME_MAX+1);
lib/libc/rpc/clnt_simple.c
56
callrpc(char *host, int prognum, int versnum, int procnum, xdrproc_t inproc,
lib/libc/rpc/clnt_simple.c
83
&& strcmp(crp->oldhost, host) == 0) {
lib/libc/rpc/clnt_simple.c
96
if ((hp = gethostbyname(host)) == NULL)
lib/libc/rpc/getrpcport.c
42
getrpcport(char *host, int prognum, int versnum, int proto)
lib/libc/rpc/getrpcport.c
47
if ((hp = gethostbyname(host)) == NULL)
lib/libcrypto/bio/b_sock.c
129
BIO_get_accept_socket(char *host, int bind_mode)
lib/libcrypto/bio/b_sock.c
140
if (host == NULL) {
lib/libcrypto/bio/b_sock.c
144
if ((str = strdup(host)) == NULL) {
lib/libcrypto/bio/b_sock.c
178
ERR_asprintf_error_data("host='%s'", host);
lib/libcrypto/bio/b_sock.c
190
ERR_asprintf_error_data("host='%s'", host);
lib/libcrypto/bio/b_sock.c
196
ERR_asprintf_error_data("host='%s'", host);
lib/libcrypto/ocsp/ocsp_lib.c
194
char *host, *path, *port, *tmp;
lib/libcrypto/ocsp/ocsp_lib.c
201
host = strdup(url + 8);
lib/libcrypto/ocsp/ocsp_lib.c
203
host = strdup(url + 7);
lib/libcrypto/ocsp/ocsp_lib.c
208
if (host == NULL) {
lib/libcrypto/ocsp/ocsp_lib.c
213
if ((tmp = strchr(host, '/')) != NULL) {
lib/libcrypto/ocsp/ocsp_lib.c
219
if ((tmp = strchr(host, ':')) != NULL ) {
lib/libcrypto/ocsp/ocsp_lib.c
230
free(host);
lib/libcrypto/ocsp/ocsp_lib.c
237
*phost = host;
lib/libcrypto/x509/x509_constraints.c
513
char *host = NULL;
lib/libcrypto/x509/x509_constraints.c
549
if (host != NULL)
lib/libcrypto/x509/x509_constraints.c
552
host = uri + i + 1;
lib/libcrypto/x509/x509_constraints.c
563
if (host == NULL)
lib/libcrypto/x509/x509_constraints.c
564
host = authority;
lib/libcrypto/x509/x509_constraints.c
565
CBS_init(&host_cbs, host, hostlen);
lib/libsndio/aucat.c
288
aucat_connect_tcp(struct aucat *hdl, char *host, unsigned int unit)
lib/libsndio/aucat.c
298
error = getaddrinfo(host, serv, &aihints, &ailist);
lib/libsndio/aucat.c
300
DPRINTF("%s: %s\n", host, gai_strerror(error));
lib/libsndio/aucat.c
396
char host[NI_MAXHOST], opt[AMSG_OPTMAX];
lib/libsndio/aucat.c
411
p = parsestr(++p, host, NI_MAXHOST);
lib/libsndio/aucat.c
415
*host = '\0';
lib/libsndio/aucat.c
456
host, unit, devnum, opt);
lib/libsndio/aucat.c
457
if (host[0] != '\0') {
lib/libsndio/aucat.c
458
if (!aucat_connect_tcp(hdl, host, unit))
lib/libtls/tls_client.c
54
tls_connect(struct tls *ctx, const char *host, const char *port)
lib/libtls/tls_client.c
56
return tls_connect_servername(ctx, host, port, NULL);
lib/libtls/tls_client.c
60
tls_connect_servername(struct tls *ctx, const char *host, const char *port,
lib/libtls/tls_client.c
74
if (host == NULL) {
lib/libtls/tls_client.c
81
ret = tls_host_port(host, &hs, &ps);
lib/libtls/tls_client.c
92
h = (hs != NULL) ? hs : host;
lib/libtls/tls_internal.h
259
int tls_host_port(const char *hostport, char **host, char **port);
lib/libtls/tls_util.c
106
if (asprintf(host, "%s", h) == -1) {
lib/libtls/tls_util.c
107
*host = NULL;
lib/libtls/tls_util.c
119
free(*host);
lib/libtls/tls_util.c
120
*host = NULL;
lib/libtls/tls_util.c
75
tls_host_port(const char *hostport, char **host, char **port)
lib/libtls/tls_util.c
80
*host = NULL;
lib/libutil/logwtmp.c
43
logwtmp(const char *line, const char *name, const char *host)
lib/libutil/logwtmp.c
54
(void) strncpy(ut.ut_host, host, sizeof(ut.ut_host));
libexec/ftpd/ftpd.c
676
char *cp, *shell, *style, *host;
libexec/ftpd/ftpd.c
699
host = multihome ? dhostname : hostname;
libexec/ftpd/ftpd.c
709
auth_setoption(as, "FTPD_HOST", host) < 0) {
libexec/ftpd/ftpd.c
761
auth_setoption(as, "FTPD_HOST", host) < 0)) {
libexec/ftpd/logwtmp.c
57
ftpdlogwtmp(const char *line, const char *name, const char *host)
libexec/ftpd/logwtmp.c
68
(void)strncpy(ut.ut_host, host, sizeof(ut.ut_host));
libexec/login_ldap/aldap.c
743
lu->host = p;
libexec/login_ldap/aldap.h
97
char *host;
libexec/login_ldap/util.c
324
dlog(1, "host %s, port %d", url->host, url->port);
libexec/login_ldap/util.c
329
if (strlcpy(un.sun_path, url->host,
libexec/login_ldap/util.c
331
dlog(0, "socket '%s' too long", url->host);
libexec/login_ldap/util.c
336
dlog(0, "can't create socket '%s'", url->host);
libexec/login_ldap/util.c
345
if ((code = getaddrinfo(url->host, port,
libexec/login_ldap/util.c
367
dlog(0, "aldap_open(%s:%hd) failed", url->host, url->port);
libexec/login_ldap/util.c
413
if (aldap_tls(ctx->ld, tls_config, url->host) < 0) {
libexec/login_radius/raddauth.c
523
get_ipaddr(char *host)
libexec/login_radius/raddauth.c
527
if ((hp = gethostbyname(host)) == NULL)
libexec/login_radius/raddauth.c
540
char *host, *secret, buffer[PATH_MAX];
libexec/login_radius/raddauth.c
552
while ((host = fgetln(servfd, &len)) != NULL) {
libexec/login_radius/raddauth.c
553
if (*host == '#') {
libexec/login_radius/raddauth.c
554
memset(host, 0, len);
libexec/login_radius/raddauth.c
557
if (host[len-1] == '\n')
libexec/login_radius/raddauth.c
562
memset(host, 0, len);
libexec/login_radius/raddauth.c
565
memcpy(secret, host, len);
libexec/login_radius/raddauth.c
566
memset(host, 0, len);
libexec/login_radius/raddauth.c
567
host = secret;
libexec/login_radius/raddauth.c
569
while (len > 0 && isspace((unsigned char)host[--len]))
libexec/login_radius/raddauth.c
571
host[++len] = '\0';
libexec/login_radius/raddauth.c
572
while (isspace((unsigned char)*host)) {
libexec/login_radius/raddauth.c
573
++host;
libexec/login_radius/raddauth.c
576
if (*host == '\0')
libexec/login_radius/raddauth.c
578
secret = host;
libexec/login_radius/raddauth.c
583
if (get_ipaddr(host) != auth_server) {
libexec/login_radius/raddauth.c
584
memset(host, 0, len);
libexec/login_radius/raddauth.c
592
if (host) {
libexec/login_radius/raddauth.c
594
memset(host, 0, len);
libexec/rpc.rusersd/rusers_proc.c
170
utmps[nusers].ut_host = host[nusers];
libexec/rpc.rusersd/rusers_proc.c
171
memset(host[nusers], 0, sizeof(host[nusers]));
libexec/rpc.rusersd/rusers_proc.c
172
memcpy(host[nusers], usr.ut_host, UT_HOSTSIZE);
libexec/rpc.rusersd/rusers_proc.c
173
host[nusers][UT_HOSTSIZE] = '\0';
libexec/rpc.rusersd/rusers_proc.c
234
utmp_idle[nusers].ui_utmp.ut_host = host[nusers];
libexec/rpc.rusersd/rusers_proc.c
235
memset(host[nusers], 0, sizeof(host[nusers]));
libexec/rpc.rusersd/rusers_proc.c
236
memcpy(host[nusers], usr.ut_host, UT_HOSTSIZE);
libexec/rpc.rusersd/rusers_proc.c
237
host[nusers][UT_HOSTSIZE] = '\0';
libexec/rpc.rusersd/rusers_proc.c
294
ru_utmp[nusers].ut_host = host[nusers];
libexec/rpc.rusersd/rusers_proc.c
295
memcpy(host[nusers], usr.ut_host, UT_HOSTSIZE);
libexec/rpc.rusersd/rusers_proc.c
296
host[nusers][UT_HOSTSIZE] = '\0';
libexec/rpc.rusersd/rusers_proc.c
60
ut_host_t host[MAXUSERS];
libexec/snmpd/snmpd_metrics/mib.c
3245
struct agentx_region *host;
libexec/snmpd/snmpd_metrics/mib.c
3362
if ((host = agentx_region(sac, AGENTX_OID(HOST), 0)) == NULL)
libexec/snmpd/snmpd_metrics/mib.c
3365
if ((hrSystemUptime = agentx_object(host, AGENTX_OID(HRSYSTEMUPTIME),
libexec/snmpd/snmpd_metrics/mib.c
3367
(hrSystemDate = agentx_object(host, AGENTX_OID(HRSYSTEMDATE),
libexec/snmpd/snmpd_metrics/mib.c
3369
(hrSystemProcesses = agentx_object(host,
libexec/snmpd/snmpd_metrics/mib.c
3372
(hrSystemMaxProcesses = agentx_object(host,
libexec/snmpd/snmpd_metrics/mib.c
3375
(hrMemorySize = agentx_object(host, AGENTX_OID(HRMEMORYSIZE),
libexec/snmpd/snmpd_metrics/mib.c
3379
if ((hrStorageIdx = agentx_index_integer_dynamic(host,
libexec/snmpd/snmpd_metrics/mib.c
3382
if ((hrStorageIndex = agentx_object(host, AGENTX_OID(HRSTORAGEINDEX),
libexec/snmpd/snmpd_metrics/mib.c
3384
(hrStorageType = agentx_object(host, AGENTX_OID(HRSTORAGETYPE),
libexec/snmpd/snmpd_metrics/mib.c
3386
(hrStorageDescr = agentx_object(host, AGENTX_OID(HRSTORAGEDESCR),
libexec/snmpd/snmpd_metrics/mib.c
3388
(hrStorageAllocationUnits = agentx_object(host,
libexec/snmpd/snmpd_metrics/mib.c
3391
(hrStorageSize = agentx_object(host, AGENTX_OID(HRSTORAGESIZE),
libexec/snmpd/snmpd_metrics/mib.c
3393
(hrStorageUsed = agentx_object(host, AGENTX_OID(HRSTORAGEUSED),
libexec/snmpd/snmpd_metrics/mib.c
3395
(hrStorageAllocationFailures = agentx_object(host,
libexec/snmpd/snmpd_metrics/mib.c
3400
if ((hrDeviceIdx = agentx_index_integer_dynamic(host,
libexec/snmpd/snmpd_metrics/mib.c
3403
if ((hrDeviceIndex = agentx_object(host, AGENTX_OID(HRDEVICEINDEX),
libexec/snmpd/snmpd_metrics/mib.c
3405
(hrDeviceType = agentx_object(host, AGENTX_OID(HRDEVICETYPE),
libexec/snmpd/snmpd_metrics/mib.c
3407
(hrDeviceDescr = agentx_object(host, AGENTX_OID(HRDEVICEDESCR),
libexec/snmpd/snmpd_metrics/mib.c
3409
(hrDeviceID = agentx_object(host, AGENTX_OID(HRDEVICEID),
libexec/snmpd/snmpd_metrics/mib.c
3411
(hrDeviceStatus = agentx_object(host, AGENTX_OID(HRDEVICESTATUS),
libexec/snmpd/snmpd_metrics/mib.c
3413
(hrDeviceErrors = agentx_object(host, AGENTX_OID(HRDEVICEERRORS),
libexec/snmpd/snmpd_metrics/mib.c
3416
if ((hrProcessorFrwID = agentx_object(host, AGENTX_OID(HRPROCESSORFRWID),
libexec/snmpd/snmpd_metrics/mib.c
3418
(hrProcessorLoad = agentx_object(host, AGENTX_OID(HRPROCESSORLOAD),
libexec/snmpd/snmpd_metrics/mib.c
3421
if ((hrSWRunIdx = agentx_index_integer_dynamic(host,
libexec/snmpd/snmpd_metrics/mib.c
3424
if ((hrSWRunIndex = agentx_object(host, AGENTX_OID(HRSWRUNINDEX),
libexec/snmpd/snmpd_metrics/mib.c
3426
(hrSWRunName = agentx_object(host, AGENTX_OID(HRSWRUNNAME),
libexec/snmpd/snmpd_metrics/mib.c
3428
(hrSWRunID = agentx_object(host, AGENTX_OID(HRSWRUNID),
libexec/snmpd/snmpd_metrics/mib.c
3430
(hrSWRunPath = agentx_object(host, AGENTX_OID(HRSWRUNPATH),
libexec/snmpd/snmpd_metrics/mib.c
3432
(hrSWRunParameters = agentx_object(host,
libexec/snmpd/snmpd_metrics/mib.c
3435
(hrSWRunType = agentx_object(host, AGENTX_OID(HRSWRUNTYPE),
libexec/snmpd/snmpd_metrics/mib.c
3437
(hrSWRunStatus = agentx_object(host, AGENTX_OID(HRSWRUNSTATUS),
libexec/snmpd/snmpd_metrics/mib.c
3439
(hrSWRunPerfCPU = agentx_object(host, AGENTX_OID(HRSWRUNPERFCPU),
libexec/snmpd/snmpd_metrics/mib.c
3441
(hrSWRunPerfMem = agentx_object(host, AGENTX_OID(HRSWRUNPERFMEM),
regress/lib/libc/asr/bin/getaddrinfo.c
120
host = gethostarg(argv[i]);
regress/lib/libc/asr/bin/getaddrinfo.c
127
gai_errno = getaddrinfo(host, servname, &hints, &ai);
regress/lib/libc/asr/bin/getaddrinfo.c
46
char *servname = NULL, *host;
regress/lib/libc/asr/bin/gethostnamadr.c
45
char *host;
regress/lib/libc/asr/bin/gethostnamadr.c
80
host = gethostarg(argv[i]);
regress/lib/libc/asr/bin/gethostnamadr.c
82
if (aflag && addr_from_str(addr, &family, &addrlen, host) == -1)
regress/lib/libc/asr/bin/gethostnamadr.c
91
h = gethostbyname2(host, family);
regress/lib/libc/asr/bin/getnameinfo.c
105
gai_errno = getnameinfo(sa, sa->sa_len, host, sizeof host, serv,
regress/lib/libc/asr/bin/getnameinfo.c
109
printf(" %s:%s\n", host, serv);
regress/lib/libc/asr/bin/getnameinfo.c
40
char host[1024];
regress/lib/libc/asr/bin/getnetnamadr.c
45
char *host;
regress/lib/libc/asr/bin/getnetnamadr.c
71
host = gethostarg(argv[i]);
regress/lib/libc/asr/bin/getnetnamadr.c
79
n = getnetbyname(host);
regress/lib/libc/asr/bin/getnetnamadr.c
81
n = getnetbyaddr(inet_network(host), AF_INET);
regress/lib/libc/asr/bin/getrrsetbyname.c
48
char *host;
regress/lib/libc/asr/bin/getrrsetbyname.c
76
host = gethostarg(argv[i]);
regress/lib/libc/asr/bin/getrrsetbyname.c
83
rrset_errno = getrrsetbyname(host, C_IN, type, 0, &rrset);
regress/lib/libc/asr/bin/res_mkquery.c
60
char buf[1024], *host;
regress/lib/libc/asr/bin/res_mkquery.c
88
host = gethostarg(argv[i]);
regress/lib/libc/asr/bin/res_mkquery.c
95
r = res_mkquery(QUERY, host, C_IN, type, NULL, 0, NULL, buf, sizeof(buf));
regress/lib/libc/asr/bin/res_query.c
107
host = gethostarg(argv[i]);
regress/lib/libc/asr/bin/res_query.c
118
r = res_query(host, C_IN, type, buf, sizeof(buf));
regress/lib/libc/asr/bin/res_query.c
120
r = res_search(host, C_IN, type, buf, sizeof(buf));
regress/lib/libc/asr/bin/res_query.c
70
char buf[1024], *host;
regress/lib/libc/getaddrinfo/gaitest.c
52
char host[NI_MAXHOST];
regress/lib/libc/getaddrinfo/gaitest.c
79
host, sizeof(host), serv, sizeof(serv),
regress/lib/libc/getaddrinfo/gaitest.c
81
h = host;
regress/lib/libcrypto/ocsp/ocsp_test.c
102
sd = tcp_connect(host, port);
regress/lib/libcrypto/ocsp/ocsp_test.c
115
printf("Certificate doesn't verify from host %s port %s\n", host, port);
regress/lib/libcrypto/ocsp/ocsp_test.c
125
printf("No OCSP response received for %s port %s\n", host, port);
regress/lib/libcrypto/ocsp/ocsp_test.c
156
printf("OCSP validated from %s %s\n", host, port);
regress/lib/libcrypto/ocsp/ocsp_test.c
29
tcp_connect(char *host, char *port)
regress/lib/libcrypto/ocsp/ocsp_test.c
43
error = getaddrinfo(host, port, &hints, &res);
regress/lib/libcrypto/ocsp/ocsp_test.c
75
char *host, *port;
regress/lib/libcrypto/ocsp/ocsp_test.c
98
host = argv[1];
regress/lib/libpthread/netdb/netdb.c
64
struct hostent *host;
regress/lib/libpthread/netdb/netdb.c
67
CHECKhn(host = gethostbyname("localhost"));
regress/lib/libpthread/netdb/netdb.c
68
memcpy(&addr, host->h_addr, sizeof(addr));
regress/lib/libpthread/netdb/netdb.c
75
struct hostent *host;
regress/lib/libpthread/netdb/netdb.c
77
CHECKhn(host = gethostbyname("127.0.0.1"));
regress/lib/libssl/interop/botan/client.cpp
160
char *host, *port;
regress/lib/libssl/interop/botan/client.cpp
174
host = argv[0];
regress/lib/libssl/interop/botan/client.cpp
183
error = getaddrinfo(host, port, &hints, &res);
regress/lib/libssl/interop/botan/client.cpp
45
char host[NI_MAXHOST], port[NI_MAXSERV];
regress/lib/libssl/interop/botan/client.cpp
51
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host,
regress/lib/libssl/interop/botan/client.cpp
52
sizeof(host), port, sizeof(port),
regress/lib/libssl/interop/botan/client.cpp
55
cout <<"sock: " <<host <<" " <<port <<endl <<flush;
regress/lib/libssl/interop/botan/client.cpp
61
char host[NI_MAXHOST], port[NI_MAXSERV];
regress/lib/libssl/interop/botan/client.cpp
67
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host,
regress/lib/libssl/interop/botan/client.cpp
68
sizeof(host), port, sizeof(port),
regress/lib/libssl/interop/botan/client.cpp
71
cout <<"peer: " <<host <<" " <<port <<endl <<flush;
regress/lib/libssl/interop/client.c
102
host = argv[0];
regress/lib/libssl/interop/client.c
107
if (asprintf(&host_port, strchr(host, ':') ? "[%s]:%s" : "%s:%s",
regress/lib/libssl/interop/client.c
108
host, port) == -1)
regress/lib/libssl/interop/client.c
54
char *host_port, *host = "127.0.0.1", *port = "0";
regress/lib/libssl/interop/server.c
105
host = argv[0];
regress/lib/libssl/interop/server.c
110
if (asprintf(&host_port, strchr(host, ':') ? "[%s]:%s" : "%s:%s",
regress/lib/libssl/interop/server.c
111
host, port) == -1)
regress/lib/libssl/interop/server.c
115
if (crt == NULL && asprintf(&crt, "%s.crt", host) == -1)
regress/lib/libssl/interop/server.c
117
if (key == NULL && asprintf(&key, "%s.key", host) == -1)
regress/lib/libssl/interop/server.c
55
char *host_port, *host = "127.0.0.1", *port = "0";
regress/lib/libssl/interop/util.c
100
printf("sock: %s %s\n", host, port);
regress/lib/libssl/interop/util.c
110
char host[NI_MAXHOST], port[NI_MAXSERV];
regress/lib/libssl/interop/util.c
118
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host,
regress/lib/libssl/interop/util.c
119
sizeof(host), port, sizeof(port), NI_NUMERICHOST | NI_NUMERICSERV))
regress/lib/libssl/interop/util.c
121
printf("peer: %s %s\n", host, port);
regress/lib/libssl/interop/util.c
89
char host[NI_MAXHOST], port[NI_MAXSERV];
regress/lib/libssl/interop/util.c
97
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host,
regress/lib/libssl/interop/util.c
98
sizeof(host), port, sizeof(port), NI_NUMERICHOST | NI_NUMERICSERV))
regress/sys/kern/sosplice/perf/relay.c
126
char host[NI_MAXHOST], serv[NI_MAXSERV];
regress/sys/kern/sosplice/perf/relay.c
168
host, sizeof(host), serv, sizeof(serv),
regress/sys/kern/sosplice/perf/relay.c
172
printf("listen %s %s\n", host, serv);
regress/sys/kern/sosplice/perf/relay.c
209
char host[NI_MAXHOST], serv[NI_MAXSERV];
regress/sys/kern/sosplice/perf/relay.c
219
host, sizeof(host), serv, sizeof(serv),
regress/sys/kern/sosplice/perf/relay.c
223
printf("accept %s %s\n", host, serv);
regress/sys/kern/sosplice/perf/relay.c
231
char host[NI_MAXHOST], serv[NI_MAXSERV];
regress/sys/kern/sosplice/perf/relay.c
271
host, sizeof(host), serv, sizeof(serv),
regress/sys/kern/sosplice/perf/relay.c
275
printf("connect %s %s\n", host, serv);
regress/usr.bin/nc/client-tcp.c
102
error = getaddrinfo(host, port, &hints, &res0);
regress/usr.bin/nc/client-tcp.c
49
const char *host, *port;
regress/usr.bin/nc/client-tcp.c
73
host = argv[0];
regress/usr.bin/nc/client-tcp.c
80
s = connect_socket(host, port);
regress/usr.bin/nc/client-tcp.c
91
connect_socket(const char *host, const char *port)
regress/usr.bin/nc/server-tcp.c
105
listen_socket(const char *host, const char *port)
regress/usr.bin/nc/server-tcp.c
117
error = getaddrinfo(host, port, &hints, &res0);
regress/usr.bin/nc/server-tcp.c
150
char host[NI_MAXHOST], port[NI_MAXSERV];
regress/usr.bin/nc/server-tcp.c
156
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host, sizeof(host),
regress/usr.bin/nc/server-tcp.c
159
fprintf(stderr, "peer: %s %s\n", host, port);
regress/usr.bin/nc/server-tcp.c
50
const char *host, *port;
regress/usr.bin/nc/server-tcp.c
74
host = argv[0];
regress/usr.bin/nc/server-tcp.c
81
s = listen_socket(host, port);
regress/usr.bin/nc/util.c
102
char host[NI_MAXHOST], port[NI_MAXSERV];
regress/usr.bin/nc/util.c
107
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host, sizeof(host),
regress/usr.bin/nc/util.c
110
fprintf(stderr, "peer: %s %s\n", host, port);
regress/usr.bin/nc/util.c
83
char host[NI_MAXHOST], port[NI_MAXSERV];
regress/usr.bin/nc/util.c
88
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host, sizeof(host),
regress/usr.bin/nc/util.c
94
fprintf(stderr, "sock: %s %s\n", host, port);
regress/usr.bin/ssh/unittests/misc/test_parse.c
25
char *user, *host, *path;
regress/usr.bin/ssh/unittests/misc/test_parse.c
28
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
30
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
32
ASSERT_STRING_EQ(host, "some.host");
regress/usr.bin/ssh/unittests/misc/test_parse.c
34
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
38
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
40
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
42
ASSERT_STRING_EQ(host, "1.22.33.144");
regress/usr.bin/ssh/unittests/misc/test_parse.c
44
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
48
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
50
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
52
ASSERT_STRING_EQ(host, "1.22.33.144");
regress/usr.bin/ssh/unittests/misc/test_parse.c
54
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
58
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
60
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
62
ASSERT_STRING_EQ(host, "1.22.33.144");
regress/usr.bin/ssh/unittests/misc/test_parse.c
64
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
68
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
70
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
72
ASSERT_STRING_EQ(host, "::1");
regress/usr.bin/ssh/unittests/misc/test_parse.c
74
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
78
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
80
&user, &host, &port, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
82
ASSERT_STRING_EQ(host, "some.host");
regress/usr.bin/ssh/unittests/misc/test_parse.c
85
free(user); free(host); free(path);
regress/usr.sbin/bgpd/unittests/rde_trie_test.c
132
if (!host(s, &prefix, &plen))
regress/usr.sbin/bgpd/unittests/rde_trie_test.c
202
if (!host(s, &prefix, &plen))
regress/usr.sbin/bgpd/unittests/rde_trie_test.c
243
if (!host(line, &prefix, &plen))
regress/usr.sbin/bgpd/unittests/rde_trie_test.c
269
if (!host(line, &prefix, &plen))
sbin/dump/dump.h
134
int rmthost(char *host);
sbin/dump/dump.h
78
extern char *host; /* remote host (if any) */
sbin/dump/dumprmt.c
75
int rmthost(char *host);
sbin/dump/dumprmt.c
85
rmthost(char *host)
sbin/dump/dumprmt.c
87
int len = strlen(host) + 1;
sbin/dump/dumprmt.c
91
strlcpy(rmtpeer, host, len);
sbin/dump/main.c
331
host = tape;
sbin/dump/main.c
332
tape = strchr(host, ':');
sbin/dump/main.c
335
if (rmthost(host) == 0)
sbin/dump/main.c
436
if (host)
sbin/dump/main.c
437
msgtail("to %s on host %s\n", tape, host);
sbin/dump/main.c
85
char *host = NULL; /* remote host (if any) */
sbin/dump/tape.c
398
if (host) {
sbin/dump/tape.c
662
while ((tapefd = (host ? rmtopen(tape, O_WRONLY|O_CREAT) :
sbin/dump/tape.c
854
if (host)
sbin/ifconfig/ifconfig.c
5863
setwgpeerep(const char *host, const char *service)
sbin/ifconfig/ifconfig.c
5871
if ((error = getaddrinfo(host, service, NULL, &ai)) != 0)
sbin/iked/ikev2.c
7166
uint32_t mask, host, lower, upper, start, nhost;
sbin/iked/ikev2.c
7314
for (host = start;;) {
sbin/iked/ikev2.c
7316
__func__, mask, start, lower, host, upper);
sbin/iked/ikev2.c
7320
(cfg4->sin_addr.s_addr & mask) | htonl(host);
sbin/iked/ikev2.c
7326
nhost = (nhost & mask) | htonl(host);
sbin/iked/ikev2.c
7339
host++;
sbin/iked/ikev2.c
7341
if (host >= upper || host < lower)
sbin/iked/ikev2.c
7342
host = lower;
sbin/iked/ikev2.c
7343
if (host == start) {
sbin/iked/ocsp.c
108
if (!OCSP_parse_url(url, &host, &port, &path, &use_ssl)) {
sbin/iked/ocsp.c
131
error = getaddrinfo(host, port, &hints, &res0);
sbin/iked/ocsp.c
134
SPI_SH(&sh, __func__), host, port);
sbin/iked/ocsp.c
143
SPI_SH(&sh, __func__), host, port);
sbin/iked/ocsp.c
158
log_debug("%s: connect(%s, %s)", __func__, host, port);
sbin/iked/ocsp.c
170
SPI_SH(&oc->oc_sh, __func__), host, port);
sbin/iked/ocsp.c
179
free(host);
sbin/iked/ocsp.c
86
char *host = NULL, *port = NULL, *path = NULL;
sbin/iked/parse.y
3330
return (host("0.0.0.0/0"));
sbin/iked/parse.y
3332
return (host("0.0.0.0"));
sbin/iked/parse.y
3338
return (host("::/0"));
sbin/iked/parse.y
3340
return (host("::"));
sbin/iked/parse.y
363
struct ipsec_addr_wrap *host(const char *);
sbin/iked/parse.y
421
struct ipsec_addr_wrap *host;
sbin/iked/parse.y
471
%type <v.host> host host_spec
sbin/iked/parse.y
716
hosts : FROM host port TO host port {
sbin/iked/parse.y
735
| TO host port FROM host port {
sbin/iked/parse.y
808
if (($$ = host($1)) == NULL) {
sbin/iked/parse.y
821
if (($$ = host(buf)) == NULL) {
sbin/iked/parse.y
830
host : host_spec { $$ = $1; }
sbin/ipsecctl/parse.y
177
struct ipsec_addr_wrap *host(const char *);
sbin/ipsecctl/parse.y
245
struct ipsec_addr_wrap *host;
sbin/ipsecctl/parse.y
302
%type <v.host> host host_list host_spec
sbin/ipsecctl/parse.y
483
hosts : FROM host port TO host port {
sbin/ipsecctl/parse.y
497
| TO host port FROM host port {
sbin/ipsecctl/parse.y
566
if (($$ = host($1)) == NULL) {
sbin/ipsecctl/parse.y
575
host_list : host { $$ = $1; }
sbin/ipsecctl/parse.y
576
| host_list comma host {
sbin/ipsecctl/parse.y
590
if (($$ = host($1)) == NULL) {
sbin/ipsecctl/parse.y
603
if (($$ = host(buf)) == NULL) {
sbin/ipsecctl/parse.y
612
host : host_spec { $$ = $1; }
sbin/mountd/mountd.c
2253
char *host, *dirp, *cp;
sbin/mountd/mountd.c
2264
host = strsep(&cp, " \t\n");
sbin/mountd/mountd.c
2266
if (host == NULL || dirp == NULL)
sbin/mountd/mountd.c
2271
strlcpy(mlp->ml_host, host, sizeof(mlp->ml_host));
sbin/pfctl/parse.y
1311
for (h = ti->host; h != NULL; h = nh) {
sbin/pfctl/parse.y
1389
ti->host = $3;
sbin/pfctl/parse.y
183
struct node_host *host;
sbin/pfctl/parse.y
207
struct node_host *host;
sbin/pfctl/parse.y
2493
if ((filter_opts.divert.addr = host($2, pf->opts)) == NULL) {
sbin/pfctl/parse.y
2578
if (($4->host->af && $4->host->af != $2) ||
sbin/pfctl/parse.y
2579
($7->host->af && $7->host->af != $2)) {
sbin/pfctl/parse.y
3010
$$.src.host = NULL;
sbin/pfctl/parse.y
3012
$$.dst.host = NULL;
sbin/pfctl/parse.y
3046
$$.host = NULL;
sbin/pfctl/parse.y
3055
$$.host = NULL;
sbin/pfctl/parse.y
3067
$$.host = $1;
sbin/pfctl/parse.y
3071
$$.host = $1;
sbin/pfctl/parse.y
3075
$$.host = NULL;
sbin/pfctl/parse.y
3106
xhost : not host {
sbin/pfctl/parse.y
3143
host : STRING {
sbin/pfctl/parse.y
3144
if (($$ = host($1, pf->opts)) == NULL) {
sbin/pfctl/parse.y
3156
if ((b = host($1, pf->opts)) == NULL ||
sbin/pfctl/parse.y
3157
(e = host($3, pf->opts)) == NULL) {
sbin/pfctl/parse.y
3193
if (($$ = host(buf, pf->opts)) == NULL) {
sbin/pfctl/parse.y
3207
if (($$ = host(buf, pf->opts)) == NULL) {
sbin/pfctl/parse.y
4035
redirspec : host optweight {
sbin/pfctl/parse.y
4046
redir_host_list : host optweight optnl {
sbin/pfctl/parse.y
4060
| redir_host_list comma host optweight optnl {
sbin/pfctl/parse.y
4076
$$->host = $1;
sbin/pfctl/parse.y
4083
$$->host = $1;
sbin/pfctl/parse.y
4214
redir->host = $1;
sbin/pfctl/parse.y
4502
if (ti->host)
sbin/pfctl/parse.y
4503
if (append_addr_host(&ab, ti->host, 0, 0)) {
sbin/pfctl/parse.y
474
struct node_host *host;
sbin/pfctl/parse.y
4895
if (!rs || !rs->rdr || rs->rdr->host == NULL) {
sbin/pfctl/parse.y
4903
for (h = rs->rdr->host; h != NULL; h = h->next) {
sbin/pfctl/parse.y
5085
(disallow_table(rs->rdr->host,
sbin/pfctl/parse.y
5087
disallow_alias(rs->rdr->host,
sbin/pfctl/parse.y
5379
binat.rdr->host = srch;
sbin/pfctl/parse.y
5409
FREE_LIST(struct node_host, nat->rdr->host);
sbin/pfctl/parse.y
5411
FREE_LIST(struct node_host, rdr->rdr->host);
sbin/pfctl/parse.y
570
%type <v.host> ipspec xhost host dynaddr host_list
sbin/pfctl/parse.y
571
%type <v.host> table_host_list tablespec
sbin/pfctl/parse.y
572
%type <v.host> redir_host_list redirspec
sbin/pfctl/pf_print_state.c
138
char host[NI_MAXHOST];
sbin/pfctl/pf_print_state.c
152
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host, sizeof(host),
sbin/pfctl/pf_print_state.c
156
printf("%s", host);
sbin/pfctl/pfctl_optimize.c
1232
if ((ti->host = malloc(sizeof(*ti->host))) == NULL)
sbin/pfctl/pfctl_optimize.c
1234
memcpy(ti->host, &node_host, sizeof(*ti->host));
sbin/pfctl/pfctl_parser.c
1252
for (h = ti->host; h != NULL; h = h->next) {
sbin/pfctl/pfctl_parser.c
1926
if ((n = host(r, opts)) == NULL) {
sbin/pfctl/pfctl_parser.h
196
struct node_host *host;
sbin/pfctl/pfctl_parser.h
334
struct node_host *host(const char *, int);
sbin/pfctl/pfctl_table.c
479
char host[NI_MAXHOST];
sbin/pfctl/pfctl_table.c
482
strlcpy(host, "?", sizeof(host));
sbin/pfctl/pfctl_table.c
496
if (getnameinfo((struct sockaddr *)&ss, ss.ss_len, host,
sbin/pfctl/pfctl_table.c
497
sizeof(host), NULL, 0, NI_NAMEREQD) == 0)
sbin/pfctl/pfctl_table.c
498
printf("\t(%s)", host);
sbin/restore/tape.c
148
host = source;
sbin/restore/tape.c
149
source = strchr(host, ':');
sbin/restore/tape.c
151
if (rmthost(host) == 0)
sbin/restore/tape.c
199
if (host)
sbin/restore/tape.c
362
if (host)
sbin/restore/tape.c
489
if (host)
sbin/restore/tape.c
73
static char *host = NULL;
sbin/restore/tape.c
854
if (host)
sbin/restore/tape.c
915
if (host)
sbin/restore/tape.c
958
if (host)
sbin/restore/tape.c
983
if (host)
sbin/unwind/libunbound/services/authzone.c
2313
free(list->host);
sbin/unwind/libunbound/services/authzone.c
3733
if(extstrtoaddr(master->host, &a, &alen, UNBOUND_DNS_PORT) &&
sbin/unwind/libunbound/services/authzone.c
3741
strchr(master->host, '/') != NULL &&
sbin/unwind/libunbound/services/authzone.c
3742
strchr(master->host, '/') == strrchr(master->host, '/') &&
sbin/unwind/libunbound/services/authzone.c
3743
netblockstrtoaddr(master->host, UNBOUND_DNS_PORT, &a, &alen,
sbin/unwind/libunbound/services/authzone.c
3908
find_master_by_host(struct auth_master* list, char* host)
sbin/unwind/libunbound/services/authzone.c
3912
if(strcmp(p->host, host) == 0)
sbin/unwind/libunbound/services/authzone.c
3964
if(m->host) {
sbin/unwind/libunbound/services/authzone.c
3965
m->host = strdup(m->host);
sbin/unwind/libunbound/services/authzone.c
3966
if(!m->host) {
sbin/unwind/libunbound/services/authzone.c
3975
free(m->host);
sbin/unwind/libunbound/services/authzone.c
3985
free(m->host);
sbin/unwind/libunbound/services/authzone.c
4085
xfr->task_transfer->masters, spec->host);
sbin/unwind/libunbound/services/authzone.c
4112
xfr->task_probe->masters, spec->host);
sbin/unwind/libunbound/services/authzone.c
4674
xfr->task_transfer->master->host,
sbin/unwind/libunbound/services/authzone.c
5114
"but got '%s'", xfr->task_transfer->master->host,
sbin/unwind/libunbound/services/authzone.c
5312
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5320
" data", xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5328
" data", xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5337
" (or malformed RR)", xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5358
verbose(VERB_ALGO, "xfr from %s: ZONEMD failed for %s, transfer is failed", xfr->task_transfer->master->host, zname);
sbin/unwind/libunbound/services/authzone.c
5419
if(extstrtoaddr(master->host, &addr, &addrlen, UNBOUND_DNS_PORT)) {
sbin/unwind/libunbound/services/authzone.c
5430
if(sldns_str2wire_dname_buf(master->host, dname, &qinfo.qname_len)
sbin/unwind/libunbound/services/authzone.c
5432
log_err("cannot parse host name of master %s", master->host);
sbin/unwind/libunbound/services/authzone.c
5469
log_err("out of memory lookup up master %s", master->host);
sbin/unwind/libunbound/services/authzone.c
5495
if(!authextstrtoaddr(master->host, &addr, &addrlen, &auth_name)) {
sbin/unwind/libunbound/services/authzone.c
5502
zname, master->host);
sbin/unwind/libunbound/services/authzone.c
5531
if(strchr(master->host, '@') == NULL)
sbin/unwind/libunbound/services/authzone.c
5535
&addr, addrlen, -1, master->ssl, master->host,
sbin/unwind/libunbound/services/authzone.c
5686
m->host, s);
sbin/unwind/libunbound/services/authzone.c
5731
verbose(VERB_ALGO, "auth zone %s host %s type %s transfer lookup has nodata", zname, xfr->task_transfer->lookup_target->host, (xfr->task_transfer->lookup_aaaa?"AAAA":"A"));
sbin/unwind/libunbound/services/authzone.c
5738
verbose(VERB_ALGO, "auth zone %s host %s type %s transfer lookup has no answer", zname, xfr->task_transfer->lookup_target->host, (xfr->task_transfer->lookup_aaaa?"AAAA":"A"));
sbin/unwind/libunbound/services/authzone.c
5746
verbose(VERB_ALGO, "auth zone %s host %s type %s transfer lookup failed", zname, xfr->task_transfer->lookup_target->host, (xfr->task_transfer->lookup_aaaa?"AAAA":"A"));
sbin/unwind/libunbound/services/authzone.c
5774
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5779
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5784
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5790
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5805
xfr->task_transfer->master->host,
sbin/unwind/libunbound/services/authzone.c
5813
xfr->task_transfer->master->host, rcode);
sbin/unwind/libunbound/services/authzone.c
5818
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5823
xfr->task_transfer->master->host,
sbin/unwind/libunbound/services/authzone.c
5836
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5843
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5849
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5857
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5864
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5871
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5886
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5892
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5902
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5912
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5926
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5933
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5948
xfr->task_transfer->master->host,
sbin/unwind/libunbound/services/authzone.c
5962
xfr->task_transfer->master->host,
sbin/unwind/libunbound/services/authzone.c
5971
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
5983
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6002
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6008
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6018
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6031
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6037
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6047
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6150
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6159
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6198
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6207
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6237
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6280
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6300
xfr->task_transfer->master->host);
sbin/unwind/libunbound/services/authzone.c
6382
if(!authextstrtoaddr(master->host, &addr, &addrlen, &auth_name)) {
sbin/unwind/libunbound/services/authzone.c
6389
zname, master->host);
sbin/unwind/libunbound/services/authzone.c
6612
if(extstrtoaddr(master->host, &addr, &addrlen, UNBOUND_DNS_PORT)) {
sbin/unwind/libunbound/services/authzone.c
6617
strchr(master->host, '/') != NULL &&
sbin/unwind/libunbound/services/authzone.c
6618
strchr(master->host, '/') == strrchr(master->host, '/')) {
sbin/unwind/libunbound/services/authzone.c
6625
if(sldns_str2wire_dname_buf(master->host, dname, &qinfo.qname_len)
sbin/unwind/libunbound/services/authzone.c
6627
log_err("cannot parse host name of master %s", master->host);
sbin/unwind/libunbound/services/authzone.c
6664
log_err("out of memory lookup up master %s", master->host);
sbin/unwind/libunbound/services/authzone.c
6794
verbose(VERB_ALGO, "auth zone %s host %s type %s probe lookup has nodata", zname, xfr->task_probe->lookup_target->host, (xfr->task_probe->lookup_aaaa?"AAAA":"A"));
sbin/unwind/libunbound/services/authzone.c
6801
verbose(VERB_ALGO, "auth zone %s host %s type %s probe lookup has no address", zname, xfr->task_probe->lookup_target->host, (xfr->task_probe->lookup_aaaa?"AAAA":"A"));
sbin/unwind/libunbound/services/authzone.c
6809
verbose(VERB_ALGO, "auth zone %s host %s type %s probe lookup failed", zname, xfr->task_probe->lookup_target->host, (xfr->task_probe->lookup_aaaa?"AAAA":"A"));
sbin/unwind/libunbound/services/authzone.c
6872
if(!p->allow_notify && p->host)
sbin/unwind/libunbound/services/authzone.c
7226
parse_url(char* url, char** host, char** file, int* port, int* ssl)
sbin/unwind/libunbound/services/authzone.c
7256
*host = dup_prefix(p, (size_t)(end-p));
sbin/unwind/libunbound/services/authzone.c
7257
if(!*host) return 0;
sbin/unwind/libunbound/services/authzone.c
7260
*host = dup_all(p);
sbin/unwind/libunbound/services/authzone.c
7261
if(!*host) return 0;
sbin/unwind/libunbound/services/authzone.c
7267
*host = dup_prefix(p, (size_t)(end-p));
sbin/unwind/libunbound/services/authzone.c
7268
if(!*host) return 0;
sbin/unwind/libunbound/services/authzone.c
7270
*host = dup_all(p);
sbin/unwind/libunbound/services/authzone.c
7271
if(!*host) return 0;
sbin/unwind/libunbound/services/authzone.c
7311
if(!parse_url(p->str, &m->host, &m->file, &m->port, &m->ssl))
sbin/unwind/libunbound/services/authzone.c
7318
m->host = strdup(p->str);
sbin/unwind/libunbound/services/authzone.c
7319
if(!m->host) {
sbin/unwind/libunbound/services/authzone.c
7328
m->host = strdup(p->str);
sbin/unwind/libunbound/services/authzone.c
7329
if(!m->host) {
sbin/unwind/libunbound/services/authzone.c
8665
if(n->host)
sbin/unwind/libunbound/services/authzone.c
8666
m += strlen(n->host)+1;
sbin/unwind/libunbound/services/authzone.h
450
char* host;
sbin/unwind/libunbound/services/cache/infra.c
839
struct infra_data* host;
sbin/unwind/libunbound/services/cache/infra.c
844
host = (struct infra_data*)e->data;
sbin/unwind/libunbound/services/cache/infra.c
845
*rtt = rtt_unclamped(&host->rtt);
sbin/unwind/libunbound/services/cache/infra.c
846
if(host->rtt.rto >= PROBE_MAXRTO && timenow >= host->probedelay
sbin/unwind/libunbound/services/cache/infra.c
851
} else if(host->rtt.rto >= PROBE_MAXRTO && timenow < host->probedelay
sbin/unwind/libunbound/services/cache/infra.c
852
&& rtt_notimeout(&host->rtt)*4 <= host->rtt.rto) {
sbin/unwind/libunbound/services/cache/infra.c
856
if(host->timeout_A >= TIMEOUT_COUNT_MAX)
sbin/unwind/libunbound/services/cache/infra.c
860
if(host->timeout_AAAA >= TIMEOUT_COUNT_MAX)
sbin/unwind/libunbound/services/cache/infra.c
864
if(host->timeout_other >= TIMEOUT_COUNT_MAX)
sbin/unwind/libunbound/services/cache/infra.c
870
if(timenow > host->ttl) {
sbin/unwind/libunbound/services/cache/infra.c
872
if(host->rtt.rto >= USEFUL_SERVER_TOP_TIMEOUT) {
sbin/unwind/libunbound/services/cache/infra.c
884
if(host->lame_type_A && qtype == LDNS_RR_TYPE_A) {
sbin/unwind/libunbound/services/cache/infra.c
890
} else if(host->lame_other && qtype != LDNS_RR_TYPE_A) {
sbin/unwind/libunbound/services/cache/infra.c
896
} else if(host->isdnsseclame) {
sbin/unwind/libunbound/services/cache/infra.c
902
} else if(host->rec_lame) {
sbin/unwind/libunbound/services/outside_network.c
3676
int fd, char* host)
sbin/unwind/libunbound/services/outside_network.c
3690
(void)SSL_set_tlsext_host_name(cp->ssl, host);
sbin/unwind/libunbound/services/outside_network.c
3705
if(!SSL_set1_host(cp->ssl, host)) {
sbin/unwind/libunbound/services/outside_network.c
3718
if(!X509_VERIFY_PARAM_set1_host(param, host, strlen(host))) {
sbin/unwind/libunbound/services/outside_network.c
3724
(void)host;
sbin/unwind/libunbound/services/outside_network.c
3733
sldns_buffer* query, int timeout, int ssl, char* host)
sbin/unwind/libunbound/services/outside_network.c
3757
if(!setup_comm_ssl(cp, outnet, fd, host)) {
sbin/unwind/libunbound/services/outside_network.c
3786
setup_http_request(sldns_buffer* buf, char* host, char* path,
sbin/unwind/libunbound/services/outside_network.c
3791
sldns_buffer_printf(buf, "Host: %s\r\n", host);
sbin/unwind/libunbound/services/outside_network.c
3808
int ssl, char* host, char* path, struct config_file* cfg)
sbin/unwind/libunbound/services/outside_network.c
3834
if(!setup_comm_ssl(cp, outnet, fd, host)) {
sbin/unwind/libunbound/services/outside_network.c
3845
if(!setup_http_request(cp->buffer, host, path, cfg)) {
sbin/unwind/libunbound/services/outside_network.h
787
struct sldns_buffer* query, int timeout, int ssl, char* host);
sbin/unwind/libunbound/services/outside_network.h
810
int ssl, char* host, char* path, struct config_file* cfg);
sbin/unwind/libunbound/util/netevent.c
1300
char* host, size_t hostlen, char* port, size_t portlen)
sbin/unwind/libunbound/util/netevent.c
1305
if(inet_ntop(sa->sin_family, &sa->sin_addr, host,
sbin/unwind/libunbound/util/netevent.c
1315
if(inet_ntop(sa6->sin6_family, &sa6->sin6_addr, host,
sbin/unwind/libunbound/util/netevent.c
1403
char host[256], port[32];
sbin/unwind/libunbound/util/netevent.c
1405
host, sizeof(host), port, sizeof(port))) {
sbin/unwind/libunbound/util/netevent.c
1407
"failed: %s", host, port,
sbin/unwind/libunbound/util/netevent.c
1416
char host[256], port[32];
sbin/unwind/libunbound/util/netevent.c
1417
if(doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
sbin/unwind/libunbound/util/netevent.c
1418
sizeof(host), port, sizeof(port))) {
sbin/unwind/libunbound/util/netevent.c
1421
host, port, (int)ret,
sbin/unwind/libunbound/util/netevent.c
1827
char host[256], port[32];
sbin/unwind/libunbound/util/netevent.c
1833
if(!doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
sbin/unwind/libunbound/util/netevent.c
1834
sizeof(host), port, sizeof(port))) {
sbin/unwind/libunbound/util/netevent.c
1838
verbose(VERB_ALGO, "doq: sending retry packet to %s %s", host, port);
sbin/unwind/libunbound/util/netevent.c
1897
char host[256], port[32];
sbin/unwind/libunbound/util/netevent.c
1899
if(!doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
sbin/unwind/libunbound/util/netevent.c
1900
sizeof(host), port, sizeof(port))) {
sbin/unwind/libunbound/util/netevent.c
1905
verbose(VERB_ALGO, "doq: verifying retry token from %s %s", host,
sbin/unwind/libunbound/util/netevent.c
1918
"from %s %s", host, port);
sbin/unwind/libunbound/util/netevent.c
1921
verbose(VERB_ALGO, "doq: verified retry token from %s %s", host, port);
sbin/unwind/libunbound/util/netevent.c
1930
char host[256], port[32];
sbin/unwind/libunbound/util/netevent.c
1932
if(!doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
sbin/unwind/libunbound/util/netevent.c
1933
sizeof(host), port, sizeof(port))) {
sbin/unwind/libunbound/util/netevent.c
1938
verbose(VERB_ALGO, "doq: verifying token from %s %s", host, port);
sbin/unwind/libunbound/util/netevent.c
1949
host, port);
sbin/unwind/libunbound/util/netevent.c
1952
verbose(VERB_ALGO, "doq: verified token from %s %s", host, port);
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
113
if (unset && (force || host != NULL || addr != NULL))
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
117
if (force || host != NULL || addr != NULL)
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
122
if ((host == NULL && addr == NULL) ||
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
123
(host != NULL && addr != NULL))
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
126
if (host != NULL) {
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
127
if (ether_hostton(host, &_ether_addr) == -1)
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
129
host);
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
164
ether_ntoa(ether_addr), host ? host : addr, force);
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
50
char *netboot, *outfile, *addr, *host;
sys/arch/alpha/stand/setnetbootinfo/setnetbootinfo.c
90
host = optarg;
sys/arch/octeon/dev/octpcie.c
671
int host = 0;
sys/arch/octeon/dev/octpcie.c
681
host = 1;
sys/arch/octeon/dev/octpcie.c
686
host = 1;
sys/arch/octeon/dev/octpcie.c
692
host = 1;
sys/arch/octeon/dev/octpcie.c
696
return host;
sys/dev/fdt/qcsmem.c
221
if (pte->host[0] == QCSMEM_GLOBAL_HOST &&
sys/dev/fdt/qcsmem.c
222
pte->host[1] == QCSMEM_GLOBAL_HOST)
sys/dev/fdt/qcsmem.c
224
else if (pte->host[0] == QCSMEM_LOCAL_HOST &&
sys/dev/fdt/qcsmem.c
225
pte->host[1] < QCSMEM_HOST_COUNT)
sys/dev/fdt/qcsmem.c
226
part = &sc->sc_partitions[pte->host[1]];
sys/dev/fdt/qcsmem.c
227
else if (pte->host[1] == QCSMEM_LOCAL_HOST &&
sys/dev/fdt/qcsmem.c
228
pte->host[0] < QCSMEM_HOST_COUNT)
sys/dev/fdt/qcsmem.c
229
part = &sc->sc_partitions[pte->host[0]];
sys/dev/fdt/qcsmem.c
241
if (pte->host[0] != phdr->host[0] ||
sys/dev/fdt/qcsmem.c
242
pte->host[1] != phdr->host[1]) {
sys/dev/fdt/qcsmem.c
244
pte->host[0], phdr->host[0],
sys/dev/fdt/qcsmem.c
245
pte->host[1], phdr->host[1]);
sys/dev/fdt/qcsmem.c
349
qcsmem_alloc(int host, int item, int size)
sys/dev/fdt/qcsmem.c
368
if (host < QCSMEM_HOST_COUNT &&
sys/dev/fdt/qcsmem.c
369
sc->sc_partitions[host].phdr != NULL) {
sys/dev/fdt/qcsmem.c
370
part = &sc->sc_partitions[host];
sys/dev/fdt/qcsmem.c
478
qcsmem_get(int host, int item, int *size)
sys/dev/fdt/qcsmem.c
495
if (host < QCSMEM_HOST_COUNT &&
sys/dev/fdt/qcsmem.c
496
sc->sc_partitions[host].phdr != NULL) {
sys/dev/fdt/qcsmem.c
497
part = &sc->sc_partitions[host];
sys/dev/fdt/qcsmem.c
66
uint16_t host[2];
sys/dev/fdt/qcsmem.c
86
uint16_t host[2];
sys/dev/fdt/rkusbphy.c
100
.host = {
sys/dev/fdt/rkusbphy.c
113
.host = {
sys/dev/fdt/rkusbphy.c
141
.host = {
sys/dev/fdt/rkusbphy.c
166
.host = {
sys/dev/fdt/rkusbphy.c
190
.host = {
sys/dev/fdt/rkusbphy.c
468
rkusbphy_set(sc->sc_grf, &sc->sc_regs->host.phy_enable);
sys/dev/fdt/rkusbphy.c
56
struct rkusbphy_port_regs host;
sys/dev/fdt/rkusbphy.c
76
.host = {
sys/dev/fdt/virtio_mmio.c
384
uint64_t host, neg;
sys/dev/fdt/virtio_mmio.c
413
host = bus_space_read_4(sc->sc_iot, sc->sc_ioh,
sys/dev/fdt/virtio_mmio.c
415
neg = host & vsc->sc_driver_features;
sys/dev/fdt/virtio_mmio.c
418
virtio_log_features(host, neg, guest_feature_names);
sys/dev/ic/siopreg.h
460
} __packed host[4];
sys/dev/pci/drm/drm_mipi_dsi.c
135
static struct mipi_dsi_device *mipi_dsi_device_alloc(struct mipi_dsi_host *host)
sys/dev/pci/drm/drm_mipi_dsi.c
143
dsi->host = host;
sys/dev/pci/drm/drm_mipi_dsi.c
145
dsi->dev.parent = host->dev;
sys/dev/pci/drm/drm_mipi_dsi.c
155
struct mipi_dsi_host *host = dsi->host;
sys/dev/pci/drm/drm_mipi_dsi.c
157
dev_set_name(&dsi->dev, "%s.%d", dev_name(host->dev), dsi->channel);
sys/dev/pci/drm/drm_mipi_dsi.c
164
of_mipi_dsi_device_add(struct mipi_dsi_host *host, struct device_node *node)
sys/dev/pci/drm/drm_mipi_dsi.c
171
dev_err(host->dev, "modalias failure on %pOF\n", node);
sys/dev/pci/drm/drm_mipi_dsi.c
177
dev_err(host->dev, "device node %pOF has no valid reg property: %d\n",
sys/dev/pci/drm/drm_mipi_dsi.c
185
return mipi_dsi_device_register_full(host, &info);
sys/dev/pci/drm/drm_mipi_dsi.c
189
of_mipi_dsi_device_add(struct mipi_dsi_host *host, struct device_node *node)
sys/dev/pci/drm/drm_mipi_dsi.c
208
mipi_dsi_device_register_full(struct mipi_dsi_host *host,
sys/dev/pci/drm/drm_mipi_dsi.c
215
dev_err(host->dev, "invalid mipi_dsi_device_info pointer\n");
sys/dev/pci/drm/drm_mipi_dsi.c
220
dev_err(host->dev, "invalid virtual channel: %u\n", info->channel);
sys/dev/pci/drm/drm_mipi_dsi.c
224
dsi = mipi_dsi_device_alloc(host);
sys/dev/pci/drm/drm_mipi_dsi.c
226
dev_err(host->dev, "failed to allocate DSI device %ld\n",
sys/dev/pci/drm/drm_mipi_dsi.c
237
dev_err(host->dev, "failed to add DSI device %d\n", ret);
sys/dev/pci/drm/drm_mipi_dsi.c
282
struct mipi_dsi_host *host,
sys/dev/pci/drm/drm_mipi_dsi.c
288
dsi = mipi_dsi_device_register_full(host, info);
sys/dev/pci/drm/drm_mipi_dsi.c
320
struct mipi_dsi_host *host;
sys/dev/pci/drm/drm_mipi_dsi.c
324
list_for_each_entry(host, &host_list, list) {
sys/dev/pci/drm/drm_mipi_dsi.c
325
if (host->dev->of_node == node) {
sys/dev/pci/drm/drm_mipi_dsi.c
327
return host;
sys/dev/pci/drm/drm_mipi_dsi.c
337
int mipi_dsi_host_register(struct mipi_dsi_host *host)
sys/dev/pci/drm/drm_mipi_dsi.c
341
for_each_available_child_of_node(host->dev->of_node, node) {
sys/dev/pci/drm/drm_mipi_dsi.c
345
of_mipi_dsi_device_add(host, node);
sys/dev/pci/drm/drm_mipi_dsi.c
349
list_add_tail(&host->list, &host_list);
sys/dev/pci/drm/drm_mipi_dsi.c
367
void mipi_dsi_host_unregister(struct mipi_dsi_host *host)
sys/dev/pci/drm/drm_mipi_dsi.c
369
device_for_each_child(host->dev, NULL, mipi_dsi_remove_device_fn);
sys/dev/pci/drm/drm_mipi_dsi.c
372
list_del_init(&host->list);
sys/dev/pci/drm/drm_mipi_dsi.c
385
const struct mipi_dsi_host_ops *ops = dsi->host->ops;
sys/dev/pci/drm/drm_mipi_dsi.c
391
ret = ops->attach(dsi->host, dsi);
sys/dev/pci/drm/drm_mipi_dsi.c
407
const struct mipi_dsi_host_ops *ops = dsi->host->ops;
sys/dev/pci/drm/drm_mipi_dsi.c
417
return ops->detach(dsi->host, dsi);
sys/dev/pci/drm/drm_mipi_dsi.c
463
const struct mipi_dsi_host_ops *ops = dsi->host->ops;
sys/dev/pci/drm/drm_mipi_dsi.c
471
return ops->transfer(dsi->host, msg);
sys/dev/pci/drm/i915/display/icl_dsi.c
159
static int dsi_send_pkt_payld(struct intel_dsi_host *host,
sys/dev/pci/drm/i915/display/icl_dsi.c
162
struct intel_dsi *intel_dsi = host->intel_dsi;
sys/dev/pci/drm/i915/display/icl_dsi.c
164
enum transcoder dsi_trans = dsi_port_to_transcoder(host->port);
sys/dev/pci/drm/i915/display/icl_dsi.c
1808
static int gen11_dsi_host_attach(struct mipi_dsi_host *host,
sys/dev/pci/drm/i915/display/icl_dsi.c
1814
static int gen11_dsi_host_detach(struct mipi_dsi_host *host,
sys/dev/pci/drm/i915/display/icl_dsi.c
1820
static ssize_t gen11_dsi_host_transfer(struct mipi_dsi_host *host,
sys/dev/pci/drm/i915/display/icl_dsi.c
1823
struct intel_dsi_host *intel_dsi_host = to_intel_dsi_host(host);
sys/dev/pci/drm/i915/display/icl_dsi.c
190
static int dsi_send_pkt_hdr(struct intel_dsi_host *host,
sys/dev/pci/drm/i915/display/icl_dsi.c
194
struct intel_dsi *intel_dsi = host->intel_dsi;
sys/dev/pci/drm/i915/display/icl_dsi.c
196
enum transcoder dsi_trans = dsi_port_to_transcoder(host->port);
sys/dev/pci/drm/i915/display/icl_dsi.c
2022
struct intel_dsi_host *host;
sys/dev/pci/drm/i915/display/icl_dsi.c
2024
host = intel_dsi_host_init(intel_dsi, &gen11_dsi_host_ops, port);
sys/dev/pci/drm/i915/display/icl_dsi.c
2025
if (!host)
sys/dev/pci/drm/i915/display/icl_dsi.c
2028
intel_dsi->dsi_hosts[port] = host;
sys/dev/pci/drm/i915/display/intel_dsi.c
107
kfree(host);
sys/dev/pci/drm/i915/display/intel_dsi.c
111
device->host = &host->base;
sys/dev/pci/drm/i915/display/intel_dsi.c
112
host->device = device;
sys/dev/pci/drm/i915/display/intel_dsi.c
114
return host;
sys/dev/pci/drm/i915/display/intel_dsi.c
87
struct intel_dsi_host *host;
sys/dev/pci/drm/i915/display/intel_dsi.c
90
host = kzalloc(sizeof(*host), GFP_KERNEL);
sys/dev/pci/drm/i915/display/intel_dsi.c
91
if (!host)
sys/dev/pci/drm/i915/display/intel_dsi.c
94
host->base.ops = funcs;
sys/dev/pci/drm/i915/display/intel_dsi.c
95
host->intel_dsi = intel_dsi;
sys/dev/pci/drm/i915/display/intel_dsi.c
96
host->port = port;
sys/dev/pci/drm/i915/display/vlv_dsi.c
132
static ssize_t intel_dsi_host_transfer(struct mipi_dsi_host *host,
sys/dev/pci/drm/i915/display/vlv_dsi.c
135
struct intel_dsi_host *intel_dsi_host = to_intel_dsi_host(host);
sys/dev/pci/drm/i915/display/vlv_dsi.c
1984
struct intel_dsi_host *host;
sys/dev/pci/drm/i915/display/vlv_dsi.c
1986
host = intel_dsi_host_init(intel_dsi, &intel_dsi_host_ops,
sys/dev/pci/drm/i915/display/vlv_dsi.c
1988
if (!host)
sys/dev/pci/drm/i915/display/vlv_dsi.c
1991
intel_dsi->dsi_hosts[port] = host;
sys/dev/pci/drm/i915/display/vlv_dsi.c
203
static int intel_dsi_host_attach(struct mipi_dsi_host *host,
sys/dev/pci/drm/i915/display/vlv_dsi.c
209
static int intel_dsi_host_detach(struct mipi_dsi_host *host,
sys/dev/pci/drm/i915/gt/shmem_utils.c
66
n_pages = file->f_mapping->host->i_size >> PAGE_SHIFT;
sys/dev/pci/drm/include/drm/drm_mipi_dsi.h
26
struct mipi_dsi_host *host;
sys/dev/pci/if_bnxtreg.h
26038
uint8_t host;
sys/dev/pci/virtio_pci.c
798
uint64_t host, negotiated;
sys/dev/pci/virtio_pci.c
832
host = bus_space_read_4(sc->sc_iot, sc->sc_ioh,
sys/dev/pci/virtio_pci.c
834
negotiated = host & vsc->sc_driver_features;
sys/dev/pci/virtio_pci.c
837
virtio_log_features(host, negotiated, guest_feature_names);
sys/dev/pci/virtio_pci.c
854
uint64_t host, negotiated;
sys/dev/pci/virtio_pci.c
865
host = CREAD(sc, device_feature);
sys/dev/pci/virtio_pci.c
867
host |= (uint64_t)CREAD(sc, device_feature) << 32;
sys/dev/pci/virtio_pci.c
869
negotiated = host & vsc->sc_driver_features;
sys/dev/pci/virtio_pci.c
872
virtio_log_features(host, negotiated, guest_feature_names);
sys/dev/pv/hypervic.c
442
struct timespec guest, host, diff;
sys/dev/pv/hypervic.c
472
host.tv_sec = tns / 1000000000LL;
sys/dev/pv/hypervic.c
473
host.tv_nsec = tns % 1000000000LL;
sys/dev/pv/hypervic.c
474
timespecsub(&guest, &host, &diff);
sys/dev/pv/virtio.c
101
virtio_log_features(uint64_t host, uint64_t neg,
sys/dev/pv/virtio.c
118
if ((host&bit) == 0)
sys/dev/pv/vmmci.c
201
struct timeval host, diff;
sys/dev/pv/vmmci.c
206
host.tv_sec = virtio_read_device_config_8(vsc, VMMCI_CONFIG_TIME_SEC);
sys/dev/pv/vmmci.c
207
host.tv_usec = virtio_read_device_config_8(vsc, VMMCI_CONFIG_TIME_USEC);
sys/dev/pv/vmmci.c
209
if (host.tv_usec > 0) {
sys/dev/pv/vmmci.c
210
timersub(guest, &host, &diff);
sys/dev/pv/vmt.c
690
struct timeval host, diff;
sys/dev/pv/vmt.c
701
host.tv_sec = ((uint64_t)frame.esi.word << 32) | frame.edx.word;
sys/dev/pv/vmt.c
702
host.tv_usec = frame.ebx.word;
sys/dev/pv/vmt.c
704
timersub(guest, &host, &diff);
sys/dev/sdmmc/sdhc.c
1322
int host;
sys/dev/sdmmc/sdhc.c
1326
for (host = 0; host < sc->sc_nhosts; host++) {
sys/dev/sdmmc/sdhc.c
1327
struct sdhc_host *hp = sc->sc_host[host];
sys/dev/sdmmc/sdhc.c
1398
int host;
sys/dev/sdmmc/sdhc.c
1400
for (host = 0; host < sc->sc_nhosts; host++)
sys/dev/sdmmc/sdhc.c
1401
sdmmc_needs_discover(sc->sc_host[host]->sdmmc);
sys/dev/usb/dwc2/dwc2_core.c
539
void dwc2_force_mode(struct dwc2_hsotg *hsotg, bool host)
sys/dev/usb/dwc2/dwc2_core.c
545
dev_dbg(hsotg->dev, "Forcing mode to %s\n", host ? "host" : "device");
sys/dev/usb/dwc2/dwc2_core.c
557
if (WARN_ON(host && hsotg->dr_mode == USB_DR_MODE_PERIPHERAL))
sys/dev/usb/dwc2/dwc2_core.c
560
if (WARN_ON(!host && hsotg->dr_mode == USB_DR_MODE_HOST))
sys/dev/usb/dwc2/dwc2_core.c
565
set = host ? GUSBCFG_FORCEHOSTMODE : GUSBCFG_FORCEDEVMODE;
sys/dev/usb/dwc2/dwc2_core.c
566
clear = host ? GUSBCFG_FORCEDEVMODE : GUSBCFG_FORCEHOSTMODE;
sys/dev/usb/dwc2/dwc2_core.c
572
dwc2_wait_for_mode(hsotg, host);
sys/dev/usb/dwc2/dwc2_core.h
1354
void dwc2_force_mode(struct dwc2_hsotg *hsotg, bool host);
sys/dev/usb/dwc2/dwc2_hcd.c
3249
goto host;
sys/dev/usb/dwc2/dwc2_hcd.c
3275
host:
usr.bin/cdio/cddb.c
144
connect_to(const char *host, const char *serv)
usr.bin/cdio/cddb.c
154
error = getaddrinfo(host, serv, &hints, &res0);
usr.bin/cdio/cddb.c
182
char *last, *host;
usr.bin/cdio/cddb.c
184
host = (char *)host_port;
usr.bin/cdio/cddb.c
187
if (last != 0 && !(last != host && last[-1] == ':')) {
usr.bin/cdio/cddb.c
189
host = malloc(last - host_port + 1);
usr.bin/cdio/cddb.c
190
if (!host)
usr.bin/cdio/cddb.c
192
memcpy(host, host_port, last-host_port);
usr.bin/cdio/cddb.c
193
host[last-host_port] = 0;
usr.bin/cdio/cddb.c
195
s = connect_to(host, port);
usr.bin/cdio/cddb.c
196
if (host != host_port)
usr.bin/cdio/cddb.c
197
free(host);
usr.bin/cu/cu.c
153
host = argv[0];
usr.bin/cu/cu.c
155
host = getenv("HOST");
usr.bin/cu/cu.c
156
if (host != NULL && *host != '\0') {
usr.bin/cu/cu.c
157
if (*host == '/')
usr.bin/cu/cu.c
158
line_path = host;
usr.bin/cu/cu.c
162
try_remote(host, s, NULL);
usr.bin/cu/cu.c
164
try_remote(host, NULL, s);
usr.bin/cu/cu.c
384
try_remote(const char *host, const char *path, const char *entry)
usr.bin/cu/cu.c
398
error = cgetent(&cp, (char **)paths, (char *)host);
usr.bin/cu/cu.c
402
cu_errx(1, "unknown host %s", host);
usr.bin/cu/cu.c
86
char *tmp, *s, *host, *ucomnames;
usr.bin/dig/dig.h
257
get_address(char *host, in_port_t port, struct sockaddr_storage *sockaddr);
usr.bin/dig/dig.h
260
getaddresses(dig_lookup_t *lookup, const char *host, isc_result_t *resultp);
usr.bin/dig/dighost.c
3685
get_address(char *host, in_port_t myport, struct sockaddr_storage *sockaddr) {
usr.bin/dig/dighost.c
3689
result = get_addresses(host, myport, sockaddr, 1, &count);
usr.bin/dig/dighost.c
3699
getaddresses(dig_lookup_t *lookup, const char *host, isc_result_t *resultp) {
usr.bin/dig/dighost.c
3706
result = get_addresses(host, 0, sockaddrs,
usr.bin/dig/dighost.c
3713
host, isc_result_totext(result));
usr.bin/dig/dighost.c
3725
srv = make_server(tmp, host);
usr.bin/doas/doas.c
217
char host[HOST_NAME_MAX + 1];
usr.bin/doas/doas.c
219
if (gethostname(host, sizeof(host)))
usr.bin/doas/doas.c
220
snprintf(host, sizeof(host), "?");
usr.bin/doas/doas.c
222
"\rdoas (%.32s@%.32s) password: ", myname, host);
usr.bin/finger/finger.h
74
char host[UT_HOSTSIZE+1]; /* null terminated remote host name */
usr.bin/finger/lprint.c
163
if (*w->host) {
usr.bin/finger/lprint.c
188
if (*w->host) {
usr.bin/finger/lprint.c
189
if (LINE_LEN < (cpr + 6 + strlen(w->host)))
usr.bin/finger/lprint.c
191
(void)printf(" from %s", w->host);
usr.bin/finger/net.c
53
char *host;
usr.bin/finger/net.c
59
if (!(host = strrchr(name, '@')))
usr.bin/finger/net.c
61
*host++ = '\0';
usr.bin/finger/net.c
65
error = getaddrinfo(host, "finger", &hints, &res0);
usr.bin/finger/net.c
97
(void)printf("[%s/%s]\n", host, hbuf);
usr.bin/finger/sprint.c
123
(void)printf("%.*s", MAXHOSTNAME, w->host);
usr.bin/finger/util.c
227
bcopy(ll.ll_host, w->host, UT_HOSTSIZE);
usr.bin/finger/util.c
228
w->host[UT_HOSTSIZE] = 0;
usr.bin/finger/util.c
241
bcopy(ut->ut_host, w->host, UT_HOSTSIZE);
usr.bin/finger/util.c
242
w->host[UT_HOSTSIZE] = 0;
usr.bin/ftp/fetch.c
1120
warnx("Improper response from %s", host);
usr.bin/ftp/fetch.c
1251
char *cp, *url, *host, *dir, *file, *portnum;
usr.bin/ftp/fetch.c
1288
url = username = pass = host = portnum = dir = file = NULL;
usr.bin/ftp/fetch.c
1322
host = url;
usr.bin/ftp/fetch.c
1331
host += sizeof(FTP_URL) - 1;
usr.bin/ftp/fetch.c
1332
dir = strchr(host, '/');
usr.bin/ftp/fetch.c
1337
userend = strchr(host, ':');
usr.bin/ftp/fetch.c
1338
passend = strchr(host, '@');
usr.bin/ftp/fetch.c
1341
username = host;
usr.bin/ftp/fetch.c
1343
host = passend + 1;
usr.bin/ftp/fetch.c
1345
passagain = strchr(host, '@');
usr.bin/ftp/fetch.c
1365
if (host[0] == '[') {
usr.bin/ftp/fetch.c
1366
cp = strchr(host, ']');
usr.bin/ftp/fetch.c
1369
host++;
usr.bin/ftp/fetch.c
1374
cp = host;
usr.bin/ftp/fetch.c
1376
cp = host;
usr.bin/ftp/fetch.c
1406
dir = strchr(host, ':');
usr.bin/ftp/fetch.c
1416
if (EMPTYSTRING(host)) {
usr.bin/ftp/fetch.c
1439
username, pass ? "XXXX" : NULL, host, portnum,
usr.bin/ftp/fetch.c
1449
xargv[1] = host;
usr.bin/ftp/fetch.c
1468
!ftp_login(host, username, pass)))) {
usr.bin/ftp/fetch.c
1469
warnx("Can't connect or login to host `%s'", host);
usr.bin/ftp/fetch.c
1717
proxy_connect(int socket, char *host, char *cookie)
usr.bin/ftp/fetch.c
1723
if (*host == '[' && (hosttail = strrchr(host, ']')) != NULL &&
usr.bin/ftp/fetch.c
1725
host++;
usr.bin/ftp/fetch.c
1728
hosttail = host;
usr.bin/ftp/fetch.c
1740
host, port, host, port, cookie, HTTP_USER_AGENT);
usr.bin/ftp/fetch.c
1744
host, port, host, port, HTTP_USER_AGENT);
usr.bin/ftp/fetch.c
309
char *hosttail, *cause = "unknown", *newline, *host, *port, *buf = NULL;
usr.bin/ftp/fetch.c
353
host = newline + sizeof(HTTP_URL) - 1;
usr.bin/ftp/fetch.c
358
host = newline + sizeof(FTP_URL) - 1;
usr.bin/ftp/fetch.c
365
host = newline + sizeof(HTTPS_URL) - 1;
usr.bin/ftp/fetch.c
376
path = strchr(host, '/'); /* Find path */
usr.bin/ftp/fetch.c
384
p = strchr(host, '@');
usr.bin/ftp/fetch.c
387
credentials = recode_credentials(host);
usr.bin/ftp/fetch.c
390
memmove(host, p, strlen(p) + 1);
usr.bin/ftp/fetch.c
391
path = strchr(host, '/');
usr.bin/ftp/fetch.c
397
path = strchr(host,'\0'); /* we have outfile. */
usr.bin/ftp/fetch.c
445
sslhost = strdup(host);
usr.bin/ftp/fetch.c
450
proxyhost = strdup(host);
usr.bin/ftp/fetch.c
457
host = proxyurl + sizeof(HTTP_URL) - 1;
usr.bin/ftp/fetch.c
459
host = proxyurl + sizeof(FTP_URL) - 1;
usr.bin/ftp/fetch.c
464
if (EMPTYSTRING(host)) {
usr.bin/ftp/fetch.c
470
path = strchr(host, '/'); /* remove trailing / on host */
usr.bin/ftp/fetch.c
474
path = strchr(host, '@'); /* look for credentials in proxy */
usr.bin/ftp/fetch.c
477
if (strchr(host, ':') == NULL) {
usr.bin/ftp/fetch.c
481
proxy_credentials = recode_credentials(host);
usr.bin/ftp/fetch.c
488
for (host = 1 + strchr(proxyurl + 5, ':'); *host != '@';
usr.bin/ftp/fetch.c
489
host++)
usr.bin/ftp/fetch.c
490
*host = '*';
usr.bin/ftp/fetch.c
492
host = path + 1;
usr.bin/ftp/fetch.c
498
if (*host == '[' && (hosttail = strrchr(host, ']')) != NULL &&
usr.bin/ftp/fetch.c
500
host++;
usr.bin/ftp/fetch.c
503
if (asprintf(&full_host, "[%s]", host) == -1)
usr.bin/ftp/fetch.c
507
hosttail = host;
usr.bin/ftp/fetch.c
520
if ((full_host = strdup(host)) == NULL)
usr.bin/ftp/fetch.c
524
"save as %s, auth %s.\n", host, port, path,
usr.bin/ftp/fetch.c
531
error = getaddrinfo(host, port, &hints, &res0);
usr.bin/ftp/fetch.c
538
error = getaddrinfo(host, pbuf, &hints, &res0);
usr.bin/ftp/fetch.c
542
error = getaddrinfo(host, pbuf, &hints, &res0);
usr.bin/ftp/fetch.c
546
warnx("%s: %s", host, gai_strerror(error));
usr.bin/ftp/fetch.c
642
sslhost = strdup(host);
usr.bin/ftp/fetch.c
693
cookie_get(host, path, ishttpsurl, &buf);
usr.bin/ftp/fetch.c
741
} else if (strchr(host, ':')) {
usr.bin/ftp/fetch.c
746
h = strdup(host);
usr.bin/ftp/fetch.c
754
ftp_printf(fin, "%s", host);
usr.bin/ftp/ftp.c
105
hookup(char *host, char *port)
usr.bin/ftp/ftp.c
125
error = getaddrinfo(host, port, &hints, &res0);
usr.bin/ftp/ftp.c
145
error = getaddrinfo(host, pbuf, &hints, &res0);
usr.bin/ftp/ftp.c
149
warnx("%s: bad port number `%s'", host, port);
usr.bin/ftp/ftp.c
151
warnx("%s: %s", host, gai_strerror(error));
usr.bin/ftp/ftp.c
159
strlcpy(hostnamebuf, host, sizeof(hostnamebuf));
usr.bin/ftp/ruserpass.c
119
if (strcasecmp(host, tokval) == 0)
usr.bin/ftp/ruserpass.c
129
if ((tmp = strchr(host, '.')) != NULL &&
usr.bin/ftp/ruserpass.c
131
strncasecmp(host, tokval,
usr.bin/ftp/ruserpass.c
132
(size_t)(tmp - host)) == 0 &&
usr.bin/ftp/ruserpass.c
133
tokval[tmp - host] == '\0')
usr.bin/ftp/ruserpass.c
76
ruserpass(const char *host, char **aname, char **apass, char **aacct)
usr.bin/ftp/util.c
104
char *host, *port;
usr.bin/ftp/util.c
131
host = hookup(gateserver, port);
usr.bin/ftp/util.c
133
host = hookup(argv[1], port);
usr.bin/ftp/util.c
135
if (host) {
usr.bin/ftp/util.c
216
ftp_login(const char *host, char *user, char *pass)
usr.bin/ftp/util.c
225
if (ruserpass(host, &user, &pass, &acctname) < 0) {
usr.bin/ftp/util.c
277
fprintf(ttyout, "Name (%s:%s): ", host, myname);
usr.bin/ftp/util.c
279
fprintf(ttyout, "Name (%s): ", host);
usr.bin/ldap/aldap.c
743
lu->host = p;
usr.bin/ldap/aldap.h
95
char *host;
usr.bin/ldap/ldapclient.c
700
url_decode(lu->host) == NULL) {
usr.bin/ldap/ldapclient.c
714
ldap->ldap_host = lu->host;
usr.bin/login/failedlogin.c
52
log_failedlogin(uid_t uid, char *host, char *name, char *tty)
usr.bin/login/failedlogin.c
71
if (host)
usr.bin/login/failedlogin.c
72
strncpy(failedlogin.bl_host, host, sizeof(failedlogin.bl_host));
usr.bin/nc/netcat.c
1038
local_listen(const char *host, const char *port, struct addrinfo hints)
usr.bin/nc/netcat.c
1051
if (host == NULL && hints.ai_family == AF_UNSPEC)
usr.bin/nc/netcat.c
1054
if ((error = getaddrinfo(host, port, &hints, &res0)))
usr.bin/nc/netcat.c
144
void report_tls(struct tls *tls_ctx, char * host);
usr.bin/nc/netcat.c
1539
connection_info(const char *host, const char *port, const char *proto,
usr.bin/nc/netcat.c
155
char *host, *uport;
usr.bin/nc/netcat.c
1557
fprintf(stderr, "Connection to %s", host);
usr.bin/nc/netcat.c
1563
if (!nflag && !xflag && strcmp(host, ipaddr) != 0)
usr.bin/nc/netcat.c
170
host = NULL;
usr.bin/nc/netcat.c
1734
report_tls(struct tls *tls_ctx, char *host)
usr.bin/nc/netcat.c
1740
tls_conn_version(tls_ctx), tls_conn_cipher(tls_ctx), host);
usr.bin/nc/netcat.c
1742
tls_expectname ? tls_expectname : host);
usr.bin/nc/netcat.c
1797
char host[NI_MAXHOST], port[NI_MAXSERV];
usr.bin/nc/netcat.c
1809
herr = getnameinfo(sa, salen, host, sizeof(host), port, sizeof(port),
usr.bin/nc/netcat.c
1820
fprintf(stderr, "%s on %s %s\n", msg, host, port);
usr.bin/nc/netcat.c
358
host = argv[0];
usr.bin/nc/netcat.c
362
host = argv[0];
usr.bin/nc/netcat.c
386
if (unveil(host, "rwc") == -1)
usr.bin/nc/netcat.c
387
err(1, "unveil %s", host);
usr.bin/nc/netcat.c
566
s = unix_bind(host, 0);
usr.bin/nc/netcat.c
568
s = unix_listen(host);
usr.bin/nc/netcat.c
584
s = local_listen(host, uport, hints);
usr.bin/nc/netcat.c
626
family == AF_UNIX ? host : NULL);
usr.bin/nc/netcat.c
643
family == AF_UNIX ? host : NULL);
usr.bin/nc/netcat.c
645
(tls_cctx = tls_setup_server(tls_ctx, connfd, host)))
usr.bin/nc/netcat.c
661
if ((s = unix_connect(host)) > 0) {
usr.bin/nc/netcat.c
666
warn("%s", host);
usr.bin/nc/netcat.c
694
s = socks_connect(host, portlist[i], hints,
usr.bin/nc/netcat.c
698
s = remote_connect(host, portlist[i], hints,
usr.bin/nc/netcat.c
717
connection_info(host, portlist[i],
usr.bin/nc/netcat.c
724
tls_setup_client(tls_ctx, s, host);
usr.bin/nc/netcat.c
806
tls_setup_client(struct tls *tls_ctx, int s, char *host)
usr.bin/nc/netcat.c
811
tls_expectname ? tls_expectname : host) == -1) {
usr.bin/nc/netcat.c
821
report_tls(tls_ctx, host);
usr.bin/nc/netcat.c
833
tls_setup_server(struct tls *tls_ctx, int connfd, char *host)
usr.bin/nc/netcat.c
848
report_tls(tls_cctx, host);
usr.bin/nc/netcat.c
929
remote_connect(const char *host, const char *port, struct addrinfo hints,
usr.bin/nc/netcat.c
935
if ((error = getaddrinfo(host, port, &hints, &res0)))
usr.bin/nc/netcat.c
936
errx(1, "getaddrinfo for host \"%s\" port %s: %s", host,
usr.bin/nc/netcat.c
985
(strncmp(host, ipaddr, NI_MAXHOST) == 0))
usr.bin/nc/netcat.c
986
warn("connect to %s port %s (%s) failed", host,
usr.bin/nc/netcat.c
990
host, ipaddr, port, uflag ? "udp" : "tcp");
usr.bin/nc/socks.c
177
socks_connect(const char *host, const char *port,
usr.bin/nc/socks.c
210
if (decode_addrport(host, port, (struct sockaddr *)&addr,
usr.bin/nc/socks.c
234
hlen = strlen(host);
usr.bin/nc/socks.c
242
memcpy(buf + 5, host, hlen);
usr.bin/nc/socks.c
299
decode_addrport(host, port, (struct sockaddr *)&addr,
usr.bin/nc/socks.c
318
if (strlcpy(buf + 9, host,
usr.bin/nc/socks.c
321
wlen = 9 + strlen(host) + 1;
usr.bin/nc/socks.c
338
if (strcspn(host, "\r\n\t []") != strlen(host))
usr.bin/nc/socks.c
342
if (strchr(host, ':') != NULL) {
usr.bin/nc/socks.c
345
host, ntohs(serverport));
usr.bin/nc/socks.c
349
host, ntohs(serverport));
usr.bin/openssl/apps.h
185
char *host, char *path, char *port, int use_ssl,
usr.bin/openssl/ocsp.c
101
STACK_OF(CONF_VALUE) *headers, const char *host, OCSP_REQUEST *req,
usr.bin/openssl/ocsp.c
1115
free(cfg.host);
usr.bin/openssl/ocsp.c
112
char *host;
usr.bin/openssl/ocsp.c
1462
const char *host, OCSP_REQUEST *req, int req_timeout)
usr.bin/openssl/ocsp.c
1511
if (!OCSP_REQ_CTX_add1_header(ctx, "Host", host))
usr.bin/openssl/ocsp.c
1550
process_responder(BIO *err, OCSP_REQUEST *req, char *host, char *path,
usr.bin/openssl/ocsp.c
1557
cbio = BIO_new_connect(host);
usr.bin/openssl/ocsp.c
1575
resp = query_responder(err, cbio, path, headers, host, req, req_timeout);
usr.bin/openssl/ocsp.c
260
cfg.host = arg;
usr.bin/openssl/ocsp.c
390
if (cfg.host == NULL && cfg.port == NULL &&
usr.bin/openssl/ocsp.c
392
if (!OCSP_parse_url(arg, &cfg.host, &cfg.port,
usr.bin/openssl/ocsp.c
910
(cfg.signfile || cfg.reqout || cfg.host ||
usr.bin/openssl/ocsp.c
978
} else if (cfg.host) {
usr.bin/openssl/ocsp.c
980
cfg.host,
usr.bin/openssl/s_client.c
1067
servername = cfg.host;
usr.bin/openssl/s_client.c
1092
if (init_client(&s, cfg.host, cfg.port,
usr.bin/openssl/s_client.c
1299
cfg.xmpphost : cfg.host);
usr.bin/openssl/s_client.c
204
char *host;
usr.bin/openssl/s_client.c
495
.opt.arg = &cfg.host,
usr.bin/openssl/s_client.c
896
cfg.host = SSL_HOST_NAME;
usr.bin/openssl/s_client.c
920
&cfg.host, NULL, &cfg.port))
usr.bin/openssl/s_client.c
926
&cfg.host, NULL, &cfg.port))
usr.bin/openssl/s_server.c
1425
free(cfg.tlscstatp.host);
usr.bin/openssl/s_server.c
220
char *host, *path, *port;
usr.bin/openssl/s_server.c
2268
char *host = NULL, *port = NULL, *path = NULL;
usr.bin/openssl/s_server.c
2290
&host, &port, &path, &use_ssl)) {
usr.bin/openssl/s_server.c
2298
if (!srctx->host) {
usr.bin/openssl/s_server.c
2303
host = srctx->host;
usr.bin/openssl/s_server.c
2345
resp = process_responder(err, req, host, path, port, use_ssl, NULL,
usr.bin/openssl/s_server.c
2366
free(host);
usr.bin/openssl/s_server.c
403
if (!OCSP_parse_url(arg, &cfg.tlscstatp.host,
usr.bin/openssl/s_socket.c
231
char *host = NULL;
usr.bin/openssl/s_socket.c
254
if ((host = strdup(h1->h_name)) == NULL) {
usr.bin/openssl/s_socket.c
260
h2 = gethostbyname(host);
usr.bin/openssl/s_socket.c
264
free(host);
usr.bin/openssl/s_socket.c
270
free(host);
usr.bin/openssl/s_socket.c
275
free(host);
usr.bin/openssl/s_socket.c
79
init_client(int *sock, char *host, char *port, int type, int af)
usr.bin/openssl/s_socket.c
88
if ((i = getaddrinfo(host, port, &hints, &ai_top)) != 0) {
usr.bin/openssl/s_time.c
105
char *host;
usr.bin/openssl/s_time.c
157
.opt.arg = &cfg.host,
usr.bin/openssl/s_time.c
248
cfg.host = SSL_CONNECT_NAME;
usr.bin/openssl/s_time.c
349
BIO_set_conn_hostname(conn, cfg.host);
usr.bin/quota/quota.c
645
callaurpc(char *host, int prognum, int versnum, int procnum,
usr.bin/quota/quota.c
656
if ((hp = gethostbyname(host)) == NULL)
usr.bin/rdist/client.h
124
extern char host[]; /* Host name of master copy */
usr.bin/rdist/common.c
135
gethostname(host, sizeof(host));
usr.bin/rdist/common.c
137
if ((cp = strchr(host, '.')) != NULL)
usr.bin/rdist/common.c
56
char host[HOST_NAME_MAX+1]; /* Name of this host */
usr.bin/rdist/docmd.c
171
locuser, host, rhost);
usr.bin/rdist/docmd.c
374
if (host[0]) {
usr.bin/rdist/docmd.c
375
(void) sendcmd(C_SETCONFIG, "%c%s", SC_HOSTNAME, host);
usr.bin/rpcinfo/rpcinfo.c
693
get_inet_address(struct sockaddr_in *addr, char *host)
usr.bin/rpcinfo/rpcinfo.c
701
if ((error = getaddrinfo(host, NULL, &hints, &res))) {
usr.bin/rpcinfo/rpcinfo.c
703
host, gai_strerror(error));
usr.bin/rpcinfo/rpcinfo.c
71
void get_inet_address(struct sockaddr_in *addr, char *host);
usr.bin/rsync/client.c
82
f->host == NULL ? "(local)" : f->host);
usr.bin/rsync/client.c
90
f->host == NULL ? "(local)" : f->host);
usr.bin/rsync/extern.h
95
char *host; /* hostname or NULL if local */
usr.bin/rsync/fargs.c
59
if (f->host != NULL) {
usr.bin/rsync/fargs.c
83
addargs(&args, "%s", f->host);
usr.bin/rsync/main.c
114
if ((f->host = strdup(f->sink)) == NULL)
usr.bin/rsync/main.c
119
if (f->host != NULL)
usr.bin/rsync/main.c
123
if ((f->host = strdup(f->sources[0])) == NULL)
usr.bin/rsync/main.c
127
if (f->host != NULL) {
usr.bin/rsync/main.c
128
if (strncasecmp(f->host, "rsync://", 8) == 0) {
usr.bin/rsync/main.c
131
len = strlen(f->host) - 8 + 1;
usr.bin/rsync/main.c
132
memmove(f->host, f->host + 8, len);
usr.bin/rsync/main.c
133
if ((cp = strchr(f->host, '/')) == NULL)
usr.bin/rsync/main.c
140
if ((cp = strchr(f->host, ':')) != NULL) {
usr.bin/rsync/main.c
147
cp = strchr(f->host, ':');
usr.bin/rsync/main.c
159
if ((len = strlen(f->host)) == 0)
usr.bin/rsync/main.c
207
if (f->host == NULL)
usr.bin/rsync/main.c
210
assert(f->host != NULL);
usr.bin/rsync/main.c
227
assert(f->host != NULL);
usr.bin/rsync/main.c
243
if (strncmp(cp, f->host, len) ||
usr.bin/rsync/main.c
256
if (strncmp(cp, f->host, len) ||
usr.bin/rsync/main.c
267
if (strncmp(cp, f->host, len) ||
usr.bin/rsync/socket.c
121
WARNX("connect timeout: %s, %s", src->ip, host);
usr.bin/rsync/socket.c
132
WARNX("connect refused: %s, %s", src->ip, host);
usr.bin/rsync/socket.c
149
inet_resolve(struct sess *sess, const char *host, size_t *sz, int passive)
usr.bin/rsync/socket.c
168
error = getaddrinfo(host, port, &hints, &res0);
usr.bin/rsync/socket.c
170
LOG2("resolving: %s", host);
usr.bin/rsync/socket.c
174
host, gai_strerror(error));
usr.bin/rsync/socket.c
181
ERRX("getaddrinfo: %s: %s", host, gai_strerror(error));
usr.bin/rsync/socket.c
193
ERRX("no addresses resolved: %s", host);
usr.bin/rsync/socket.c
232
LOG2("hostname resolved: %s: %s", host, src[i].ip);
usr.bin/rsync/socket.c
247
protocol_line(struct sess *sess, __attribute__((unused)) const char *host,
usr.bin/rsync/socket.c
303
assert(f->host != NULL);
usr.bin/rsync/socket.c
307
if ((src = inet_resolve(&sess, f->host, &srcsz, 0)) == NULL) {
usr.bin/rsync/socket.c
333
c = inet_connect(sd, &src[i], f->host, bsrc, bsrcsz);
usr.bin/rsync/socket.c
349
ERRX("cannot connect to host: %s", f->host);
usr.bin/rsync/socket.c
353
LOG2("connected: %s, %s", src[i].ip, f->host);
usr.bin/rsync/socket.c
388
assert(f->host != NULL);
usr.bin/rsync/socket.c
401
LOG2("requesting module: %s, %s", f->module, f->host);
usr.bin/rsync/socket.c
442
if ((c = protocol_line(&sess, f->host, buf)) < 0) {
usr.bin/rsync/socket.c
498
LOG2("client starting receiver: %s", f->host);
usr.bin/rsync/socket.c
76
inet_connect(int *sd, const struct source *src, const char *host,
usr.bin/rsync/socket.c
87
LOG2("trying: %s, %s", src->ip, host);
usr.bin/rup/rup.c
113
return strcmp(d1->host, d2->host);
usr.bin/rup/rup.c
127
remember_rup_data(char *host, struct statstime *st)
usr.bin/rup/rup.c
144
if ((rup_data[rup_data_idx].host = strdup(host)) == NULL)
usr.bin/rup/rup.c
155
char *host;
usr.bin/rup/rup.c
162
host = hp->h_name;
usr.bin/rup/rup.c
164
host = inet_ntoa(raddrp->sin_addr);
usr.bin/rup/rup.c
169
remember_rup_data(host, host_stat);
usr.bin/rup/rup.c
171
print_rup_data(host, host_stat);
usr.bin/rup/rup.c
179
print_rup_data(char *host, statstime *host_stat)
usr.bin/rup/rup.c
187
printf("%-*.*s", HOST_WIDTH-8, HOST_WIDTH-8, host);
usr.bin/rup/rup.c
189
printf("%-*.*s", HOST_WIDTH, HOST_WIDTH, host);
usr.bin/rup/rup.c
238
onehost(char *host)
usr.bin/rup/rup.c
245
rstat_clnt = clnt_create(host, RSTATPROG, RSTATVERS_TIME, "udp");
usr.bin/rup/rup.c
248
clnt_spcreateerror(host));
usr.bin/rup/rup.c
256
clnt_sperror(rstat_clnt, host));
usr.bin/rup/rup.c
262
remember_rup_data(host, &host_stat);
usr.bin/rup/rup.c
264
print_rup_data(host, &host_stat);
usr.bin/rup/rup.c
330
print_rup_data(rup_data[i].host,
usr.bin/rup/rup.c
90
char *host;
usr.bin/rusers/rusers.c
175
add_host(char *host)
usr.bin/rusers/rusers.c
181
if (strcmp(host, hostinfo[i].host) == 0)
usr.bin/rusers/rusers.c
193
if ((hostinfo[nentries].host = strdup(host)) == NULL)
usr.bin/rusers/rusers.c
241
char *host;
usr.bin/rusers/rusers.c
250
host = hp->h_name;
usr.bin/rusers/rusers.c
252
host = inet_ntoa(raddrp->sin_addr);
usr.bin/rusers/rusers.c
253
if ((entry = add_host(host)) == NULL)
usr.bin/rusers/rusers.c
296
char *host;
usr.bin/rusers/rusers.c
305
host = hp->h_name;
usr.bin/rusers/rusers.c
307
host = inet_ntoa(raddrp->sin_addr);
usr.bin/rusers/rusers.c
308
if ((entry = add_host(host)) == NULL)
usr.bin/rusers/rusers.c
345
onehost(char *host)
usr.bin/rusers/rusers.c
357
hp = gethostbyname(host);
usr.bin/rusers/rusers.c
359
errx(1, "unknown host \"%s\"", host);
usr.bin/rusers/rusers.c
362
rusers_clnt = clnt_create(host, RUSERSPROG, RUSERSVERS_3, "udp");
usr.bin/rusers/rusers.c
387
rusers_clnt = clnt_create(host, RUSERSPROG, RUSERSVERS_IDLE, "udp");
usr.bin/rusers/rusers.c
640
printf("%-*.*s ", HOST_WIDTH, HOST_WIDTH, entry->host);
usr.bin/rusers/rusers.c
658
len = HOST_WIDTH - MINIMUM(HOST_WIDTH, strlen(entry->host)) +
usr.bin/rusers/rusers.c
661
NAME_WIDTH, ut->ut_user, HOST_WIDTH, entry->host,
usr.bin/rusers/rusers.c
728
if ((rval = strcasecmp(a->host, b->host)) != 0)
usr.bin/rusers/rusers.c
760
return(strcasecmp(a->host, b->host));
usr.bin/rusers/rusers.c
779
return(strcasecmp(a->host, b->host));
usr.bin/rusers/rusers.c
84
char *host;
usr.bin/showmount/showmount.c
103
char *host;
usr.bin/showmount/showmount.c
138
host = *argv;
usr.bin/showmount/showmount.c
140
host = "localhost";
usr.bin/showmount/showmount.c
145
if ((hp = gethostbyname(host)) == NULL) {
usr.bin/showmount/showmount.c
146
fprintf(stderr, "showmount: unknown host %s\n", host);
usr.bin/showmount/showmount.c
188
printf("All mount points on %s:\n", host);
usr.bin/showmount/showmount.c
191
printf("Directories on %s:\n", host);
usr.bin/showmount/showmount.c
194
printf("Hosts on %s:\n", host);
usr.bin/showmount/showmount.c
203
printf("Exports list on %s:\n", host);
usr.bin/sndiod/listen.c
164
char *host, serv[sizeof(unsigned int) * 3 + 1];
usr.bin/sndiod/listen.c
174
host = strcmp(addr, "-") == 0 ? NULL : addr;
usr.bin/sndiod/listen.c
178
error = getaddrinfo(host, serv, &aihints, &ailist);
usr.bin/sndiod/sndiod.c
521
char *host;
usr.bin/sndiod/sndiod.c
570
ta->host = optarg;
usr.bin/sndiod/sndiod.c
726
if (!listen_new_tcp(ta->host, AUCAT_PORT + unit))
usr.bin/snmp/mib.h
948
{ MIBDECL(host) }, \
usr.bin/snmp/snmpc.c
1093
snmpc_connect(char *host, char *port)
usr.bin/snmp/snmpc.c
1098
return snmp_connect_v12(snmpc_parseagent(host, port), version,
usr.bin/snmp/snmpc.c
1101
return snmp_connect_v3(snmpc_parseagent(host, port), v3);
usr.bin/ssh/addr.c
494
addr_netmatch(const struct xaddr *host, const struct xaddr *net, u_int masklen)
usr.bin/ssh/addr.c
498
if (host->af != net->af)
usr.bin/ssh/addr.c
501
if (addr_netmask(host->af, masklen, &tmp_mask) == -1)
usr.bin/ssh/addr.c
503
if (addr_and(&tmp_result, host, &tmp_mask) == -1)
usr.bin/ssh/addr.h
50
int addr_netmatch(const struct xaddr *host, const struct xaddr *net,
usr.bin/ssh/auth-options.c
254
char *opt, *tmp, *cp, *host, **permits = *permitsp;
usr.bin/ssh/auth-options.c
285
host = hpdelim2(&cp, NULL);
usr.bin/ssh/auth-options.c
286
if (host == NULL || strlen(host) >= NI_MAXHOST) {
usr.bin/ssh/auth-rhosts.c
123
host = hostbuf;
usr.bin/ssh/auth-rhosts.c
128
if (host[0] == '-') {
usr.bin/ssh/auth-rhosts.c
130
host++;
usr.bin/ssh/auth-rhosts.c
131
} else if (host[0] == '+')
usr.bin/ssh/auth-rhosts.c
132
host++;
usr.bin/ssh/auth-rhosts.c
141
if (!host[0] || !user[0]) {
usr.bin/ssh/auth-rhosts.c
148
if (host[0] == '@') {
usr.bin/ssh/auth-rhosts.c
149
if (!innetgr(host + 1, hostname, NULL, NULL) &&
usr.bin/ssh/auth-rhosts.c
150
!innetgr(host + 1, ipaddr, NULL, NULL))
usr.bin/ssh/auth-rhosts.c
152
} else if (strcasecmp(host, hostname) &&
usr.bin/ssh/auth-rhosts.c
153
strcmp(host, ipaddr) != 0)
usr.bin/ssh/auth-rhosts.c
84
char *host, *user, *cp;
usr.bin/ssh/auth.c
369
check_key_in_hostfiles(struct passwd *pw, struct sshkey *key, const char *host,
usr.bin/ssh/auth.c
379
load_hostkeys(hostkeys, host, sysfile, 0);
usr.bin/ssh/auth.c
393
load_hostkeys(hostkeys, host, user_hostfile, 0);
usr.bin/ssh/auth.c
401
host);
usr.bin/ssh/auth.c
404
found->host, found->file, found->line);
usr.bin/ssh/auth.c
406
debug_f("key for host %s not found", host);
usr.bin/ssh/canohost.c
104
char *host, myname[NI_MAXHOST];
usr.bin/ssh/canohost.c
107
if ((host = get_socket_address(fd, 0, NI_NAMEREQD)) != NULL)
usr.bin/ssh/canohost.c
108
return host;
usr.bin/ssh/canohost.c
113
host = xstrdup("UNKNOWN");
usr.bin/ssh/canohost.c
115
host = xstrdup(myname);
usr.bin/ssh/canohost.c
118
return host;
usr.bin/ssh/channels.c
1520
char *user = NULL, *host = NULL;
usr.bin/ssh/channels.c
1546
&host, NULL)) != 0) {
usr.bin/ssh/channels.c
1553
xasprintf(&host, "%d.%d.%d.%d",
usr.bin/ssh/channels.c
1564
host, dest_port);
usr.bin/ssh/channels.c
1571
c->path = host;
usr.bin/ssh/channels.c
1572
host = NULL; /* transferred */
usr.bin/ssh/channels.c
1587
free(host);
usr.bin/ssh/channels.c
2121
c->self, c->connect_ctx.host, c->connect_ctx.port);
usr.bin/ssh/channels.c
2149
c->connect_ctx.host, c->connect_ctx.port);
usr.bin/ssh/channels.c
3842
const char *host, *addr;
usr.bin/ssh/channels.c
3849
host = fwd->connect_path;
usr.bin/ssh/channels.c
3851
host = (type == SSH_CHANNEL_RPORT_LISTENER) ?
usr.bin/ssh/channels.c
3853
if (host == NULL) {
usr.bin/ssh/channels.c
3857
if (strlen(host) >= NI_MAXHOST) {
usr.bin/ssh/channels.c
3969
c->path = xstrdup(host);
usr.bin/ssh/channels.c
4061
const char *host, u_short port)
usr.bin/ssh/channels.c
4070
if (strcmp(c->path, host) == 0 && c->listening_port == port) {
usr.bin/ssh/channels.c
4442
const char *host, u_short port)
usr.bin/ssh/channels.c
4452
if (open_listen_match_tcpip(perm, host, port, 0))
usr.bin/ssh/channels.c
4463
(r = sshpkt_put_cstring(ssh, channel_rfwd_bind_host(host))) != 0 ||
usr.bin/ssh/channels.c
4544
char *host, int port)
usr.bin/ssh/channels.c
4550
fwd_ident(who, where), host, port);
usr.bin/ssh/channels.c
4556
local ? host : NULL, local ? port : 0,
usr.bin/ssh/channels.c
4557
local ? NULL : host, NULL, local ? 0 : port, NULL);
usr.bin/ssh/channels.c
4647
cctx->host, ntop, strport);
usr.bin/ssh/channels.c
4661
cctx->host, ntop, strport, strerror(errno));
usr.bin/ssh/channels.c
4670
cctx->host, ntop, strport, sock);
usr.bin/ssh/channels.c
4680
free(cctx->host);
usr.bin/ssh/channels.c
4745
cctx->host = xstrdup(name);
usr.bin/ssh/channels.c
4760
connect_to(struct ssh *ssh, const char *host, int port,
usr.bin/ssh/channels.c
4768
sock = connect_to_helper(ssh, host, port, SOCK_STREAM, ctype, rname,
usr.bin/ssh/channels.c
4777
c->path = xstrdup(host);
usr.bin/ssh/channels.c
4839
channel_connect_to_port(struct ssh *ssh, const char *host, u_short port,
usr.bin/ssh/channels.c
4854
if (open_match(perm, host, port)) {
usr.bin/ssh/channels.c
4865
if (open_match(perm, host, port)) {
usr.bin/ssh/channels.c
4875
ssh_remote_ipaddr(ssh), ssh_remote_port(ssh), host, port);
usr.bin/ssh/channels.c
4882
sock = connect_to_helper(ssh, host, port, SOCK_STREAM, ctype, rname,
usr.bin/ssh/channels.c
4892
c->path = xstrdup(host);
usr.bin/ssh/channels.h
113
char *host;
usr.bin/ssh/clientloop.c
120
extern char *host;
usr.bin/ssh/clientloop.c
1655
quit_message("Connection to %s closed.", host);
usr.bin/ssh/clientloop.c
2526
get_hostfile_hostname_ipaddr(host,
usr.bin/ssh/clientloop.c
493
logit("Timeout, server %s not responding.", host);
usr.bin/ssh/clientloop.c
800
host);
usr.bin/ssh/clientloop.c
804
quit_message("Read from remote host %s: %s", host, ssh_err(r));
usr.bin/ssh/gss-genr.c
229
ssh_gssapi_import_name(Gssctxt *ctx, const char *host)
usr.bin/ssh/gss-genr.c
234
xasprintf(&val, "host@%s", host);
usr.bin/ssh/gss-genr.c
272
ssh_gssapi_check_mechanism(Gssctxt **ctx, gss_OID oid, const char *host)
usr.bin/ssh/gss-genr.c
285
major = ssh_gssapi_import_name(*ctx, host);
usr.bin/ssh/hostfile.c
114
host_hash(const char *host, const char *name_from_hostfile, u_int src_len)
usr.bin/ssh/hostfile.c
136
ssh_hmac_update(ctx, host, strlen(host)) < 0 ||
usr.bin/ssh/hostfile.c
223
const char *host;
usr.bin/ssh/hostfile.c
250
hostkeys->entries[hostkeys->num_entries].host = xstrdup(ctx->host);
usr.bin/ssh/hostfile.c
264
load_hostkeys_file(struct hostkeys *hostkeys, const char *host,
usr.bin/ssh/hostfile.c
270
ctx.host = host;
usr.bin/ssh/hostfile.c
274
if ((r = hostkeys_foreach_file(path, f, record_hostkey, &ctx, host,
usr.bin/ssh/hostfile.c
280
debug3_f("loaded %lu keys from %s", ctx.num_loaded, host);
usr.bin/ssh/hostfile.c
284
load_hostkeys(struct hostkeys *hostkeys, const char *host, const char *path,
usr.bin/ssh/hostfile.c
294
load_hostkeys_file(hostkeys, host, path, f, note);
usr.bin/ssh/hostfile.c
304
free(hostkeys->entries[i].host);
usr.bin/ssh/hostfile.c
435
format_host_entry(struct sshbuf *entry, const char *host, const char *ip,
usr.bin/ssh/hostfile.c
441
lhost = xstrdup(host);
usr.bin/ssh/hostfile.c
475
write_host_entry(FILE *f, const char *host, const char *ip,
usr.bin/ssh/hostfile.c
483
if ((r = format_host_entry(entry, host, ip, key, store_hash)) != 1) {
usr.bin/ssh/hostfile.c
535
add_host_to_hostfile(const char *filename, const char *host,
usr.bin/ssh/hostfile.c
556
success = write_host_entry(f, host, NULL, key, store_hash);
usr.bin/ssh/hostfile.c
564
const char *host, *ip;
usr.bin/ssh/hostfile.c
601
l->path, l->linenum, sshkey_type(l->key), ctx->host);
usr.bin/ssh/hostfile.c
616
hostfile_replace_entries(const char *filename, const char *host, const char *ip,
usr.bin/ssh/hostfile.c
631
ctx.host = host;
usr.bin/ssh/hostfile.c
665
if ((r = hostkeys_foreach(filename, host_delete, &ctx, host, ip,
usr.bin/ssh/hostfile.c
686
if (!write_host_entry(ctx.out, host, ip,
usr.bin/ssh/hostfile.c
693
if (!write_host_entry(ctx.out, host, NULL,
usr.bin/ssh/hostfile.c
708
host, ip == NULL ? "" : ",", ip == NULL ? "" : ip, filename,
usr.bin/ssh/hostfile.c
763
match_maybe_hashed(const char *host, const char *names, int *was_hashed)
usr.bin/ssh/hostfile.c
772
if ((hashed_host = host_hash(host, names, nlen)) == NULL)
usr.bin/ssh/hostfile.c
779
return match_hostname(host, names) == 1;
usr.bin/ssh/hostfile.c
784
void *ctx, const char *host, const char *ip, u_int options, u_int note)
usr.bin/ssh/hostfile.c
796
if (host == NULL && (options & HKF_WANT_MATCH) != 0)
usr.bin/ssh/hostfile.c
846
if (host != NULL) {
usr.bin/ssh/hostfile.c
847
if ((s = match_maybe_hashed(host, lineinfo.hosts,
usr.bin/ssh/hostfile.c
960
const char *host, const char *ip, u_int options, u_int note)
usr.bin/ssh/hostfile.c
969
r = hostkeys_foreach_file(path, f, callback, ctx, host, ip,
usr.bin/ssh/hostfile.h
116
const char *host, const char *ip, u_int options, u_int note);
usr.bin/ssh/hostfile.h
119
const char *host, const char *ip, u_int options, u_int note);
usr.bin/ssh/hostfile.h
26
char *host;
usr.bin/ssh/hostfile.h
56
const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
usr.bin/ssh/match.c
187
match_hostname(const char *host, const char *pattern)
usr.bin/ssh/match.c
189
char *hostcopy = xstrdup(host);
usr.bin/ssh/match.c
204
match_host_and_ip(const char *host, const char *ipaddr,
usr.bin/ssh/match.c
211
else if (host == NULL || ipaddr == NULL || mip == -1)
usr.bin/ssh/match.c
215
if ((mhost = match_hostname(host, patterns)) == -1)
usr.bin/ssh/match.c
229
match_user(const char *user, const char *host, const char *ipaddr,
usr.bin/ssh/match.c
236
if (user == NULL && host == NULL && ipaddr == NULL) {
usr.bin/ssh/match.c
254
ret = match_host_and_ip(host, ipaddr, p);
usr.bin/ssh/misc.c
1058
char *user = NULL, *host = NULL, *path = NULL;
usr.bin/ssh/misc.c
1100
host = xstrdup(cleanhostname(cp));
usr.bin/ssh/misc.c
1101
if (!valid_domain(host, 0, NULL))
usr.bin/ssh/misc.c
1126
*hostp = host;
usr.bin/ssh/misc.c
1127
host = NULL;
usr.bin/ssh/misc.c
1139
free(host);
usr.bin/ssh/misc.c
746
put_host_port(const char *host, u_short port)
usr.bin/ssh/misc.c
751
return(xstrdup(host));
usr.bin/ssh/misc.c
752
if (asprintf(&hoststr, "[%s]:%d", host, (int)port) == -1)
usr.bin/ssh/misc.c
816
cleanhostname(char *host)
usr.bin/ssh/misc.c
818
if (*host == '[' && host[strlen(host) - 1] == ']') {
usr.bin/ssh/misc.c
819
host[strlen(host) - 1] = '\0';
usr.bin/ssh/misc.c
820
return (host + 1);
usr.bin/ssh/misc.c
822
return host;
usr.bin/ssh/misc.c
860
char *user = NULL, *host = NULL, *path = NULL;
usr.bin/ssh/misc.c
887
host = xstrdup(cleanhostname(tmp));
usr.bin/ssh/misc.c
891
host = xstrdup(cleanhostname(sdup));
usr.bin/ssh/misc.c
901
*hostp = host;
usr.bin/ssh/misc.c
902
host = NULL;
usr.bin/ssh/misc.c
912
free(host);
usr.bin/ssh/misc.c
929
char *user = NULL, *host = NULL;
usr.bin/ssh/misc.c
953
host = xstrdup(cleanhostname(cp));
usr.bin/ssh/misc.c
965
*hostp = host;
usr.bin/ssh/misc.c
966
host = NULL;
usr.bin/ssh/misc.c
974
free(host);
usr.bin/ssh/monitor_wrap.c
1034
ci.host = use_dns ? ssh_remote_hostname(ssh) : ssh_remote_ipaddr(ssh);
usr.bin/ssh/monitor_wrap.c
502
const char *user, const char *host, struct sshkey *key)
usr.bin/ssh/monitor_wrap.c
504
return (mm_key_allowed(MM_HOSTKEY, user, host, key, 0, NULL));
usr.bin/ssh/monitor_wrap.c
508
mm_key_allowed(enum mm_keytype type, const char *user, const char *host,
usr.bin/ssh/monitor_wrap.c
524
(r = sshbuf_put_cstring(m, host ? host : "")) != 0 ||
usr.bin/ssh/monitor_wrap.c
965
char *host, *arg, *oarg;
usr.bin/ssh/monitor_wrap.c
983
host = hpdelim(&arg);
usr.bin/ssh/monitor_wrap.c
984
if (host == NULL)
usr.bin/ssh/monitor_wrap.c
986
host = cleanhostname(host);
usr.bin/ssh/monitor_wrap.c
991
where, host, port);
usr.bin/ssh/mux.c
1144
"connection to %s? ", host)) {
usr.bin/ssh/mux.c
2160
fprintf(stderr, "Shared connection to %s closed.\r\n", host);
usr.bin/ssh/mux.c
435
if (!ask_permission("Allow shared connection to %s? ", host)) {
usr.bin/ssh/mux.c
54
extern char *host;
usr.bin/ssh/mux.c
547
host)) {
usr.bin/ssh/mux.c
831
if (!ask_permission("Open %s on %s?", fwd_desc, host)) {
usr.bin/ssh/readconf.c
1112
process_config_line(Options *options, struct passwd *pw, const char *host,
usr.bin/ssh/readconf.c
1116
return process_config_line_depth(options, pw, host, original_host,
usr.bin/ssh/readconf.c
1122
process_config_line_depth(Options *options, struct passwd *pw, const char *host,
usr.bin/ssh/readconf.c
118
const char *host, const char *original_host, const char *remote_command,
usr.bin/ssh/readconf.c
121
const char *host, const char *original_host, const char *remote_command,
usr.bin/ssh/readconf.c
1832
if (match_pattern(host, arg)) {
usr.bin/ssh/readconf.c
1858
value = match_cfg_line(options, str, &ac, &av, pw, host,
usr.bin/ssh/readconf.c
2065
options, pw, host, original_host,
usr.bin/ssh/readconf.c
2112
pw, host, original_host, remote_command,
usr.bin/ssh/readconf.c
2595
read_config_file(const char *filename, struct passwd *pw, const char *host,
usr.bin/ssh/readconf.c
2601
return read_config_file_depth(filename, pw, host, original_host,
usr.bin/ssh/readconf.c
2608
const char *host, const char *original_host, const char *remote_command,
usr.bin/ssh/readconf.c
2648
if (process_config_line_depth(options, pw, host, original_host,
usr.bin/ssh/readconf.c
340
ssh_connection_hash(const char *thishost, const char *host, const char *portstr,
usr.bin/ssh/readconf.c
3449
char *tmp_user = NULL, *tmp_host = NULL, *host = NULL, *user = NULL;
usr.bin/ssh/readconf.c
348
ssh_digest_update(md, host, strlen(host)) < 0 ||
usr.bin/ssh/readconf.c
3490
host = tmp_host;
usr.bin/ssh/readconf.c
3504
o->jump_host = host;
usr.bin/ssh/readconf.c
3507
user = host = NULL; /* transferred */
usr.bin/ssh/readconf.c
3520
free(host);
usr.bin/ssh/readconf.c
3527
char *user = NULL, *host = NULL, *path = NULL;
usr.bin/ssh/readconf.c
3530
r = parse_uri("ssh", uri, &user, &host, &port, &path);
usr.bin/ssh/readconf.c
3539
*hostp = host;
usr.bin/ssh/readconf.c
3540
host = NULL;
usr.bin/ssh/readconf.c
3546
free(host);
usr.bin/ssh/readconf.c
3709
dump_client_config(Options *o, const char *host)
usr.bin/ssh/readconf.c
3729
dump_cfg_string(oHostname, host);
usr.bin/ssh/readconf.c
638
char *host, *ret;
usr.bin/ssh/readconf.c
644
host = xstrdup(options->hostname);
usr.bin/ssh/readconf.c
647
host = percent_expand(options->hostname,
usr.bin/ssh/readconf.c
650
host = xstrdup(host_arg);
usr.bin/ssh/readconf.c
661
conn_hash_hex = ssh_connection_hash(thishost, host,
usr.bin/ssh/readconf.c
663
keyalias = options->host_key_alias ? options->host_key_alias : host;
usr.bin/ssh/readconf.c
669
"h", host,
usr.bin/ssh/readconf.c
679
free(host);
usr.bin/ssh/readconf.c
693
char *arg, *oattrib = NULL, *attrib = NULL, *cmd, *host, *criteria;
usr.bin/ssh/readconf.c
703
host = xstrdup(options->hostname);
usr.bin/ssh/readconf.c
706
host = percent_expand(options->hostname,
usr.bin/ssh/readconf.c
709
host = xstrdup(host_arg);
usr.bin/ssh/readconf.c
713
full_line, host, original_host);
usr.bin/ssh/readconf.c
797
criteria = xstrdup(host);
usr.bin/ssh/readconf.c
798
r = match_hostname(host, arg) == 1;
usr.bin/ssh/readconf.c
909
free(host);
usr.bin/ssh/readconf.h
239
char *ssh_connection_hash(const char *thishost, const char *host,
usr.bin/ssh/readconf.h
257
void dump_client_config(Options *o, const char *host);
usr.bin/ssh/scp.c
1010
free(host);
usr.bin/ssh/scp.c
1012
r = parse_scp_uri(argv[i], &suser, &host, &sport, &src);
usr.bin/ssh/scp.c
1019
parse_user_host_path(argv[i], &suser, &host, &src);
usr.bin/ssh/scp.c
1025
if (host && throughlocal) { /* extended remote to remote */
usr.bin/ssh/scp.c
1048
conn2 = do_sftp_connect(host, suser,
usr.bin/ssh/scp.c
1071
if (do_cmd(ssh_program, host, suser, sport, 0,
usr.bin/ssh/scp.c
1085
} else if (host) { /* standard remote to remote */
usr.bin/ssh/scp.c
1120
addargs(&alist, "%s", host);
usr.bin/ssh/scp.c
1171
free(host);
usr.bin/ssh/scp.c
1180
char *bp, *host = NULL, *src = NULL, *suser = NULL;
usr.bin/ssh/scp.c
1190
free(host);
usr.bin/ssh/scp.c
1192
r = parse_scp_uri(argv[i], &suser, &host, &sport, &src);
usr.bin/ssh/scp.c
1199
parse_user_host_path(argv[i], &suser, &host, &src);
usr.bin/ssh/scp.c
1204
if (!host) { /* Local to local. */
usr.bin/ssh/scp.c
1221
conn = do_sftp_connect(host, suser, sport,
usr.bin/ssh/scp.c
1240
if (do_cmd(ssh_program, host, suser, sport, 0, bp,
usr.bin/ssh/scp.c
1253
free(host);
usr.bin/ssh/scp.c
252
do_cmd(char *program, char *host, char *remuser, int port, int subsystem,
usr.bin/ssh/scp.c
260
program, host,
usr.bin/ssh/scp.c
300
addargs(&args, "%s", host);
usr.bin/ssh/scp.c
324
do_cmd2(char *host, char *remuser, int port, char *cmd,
usr.bin/ssh/scp.c
333
ssh_program, host,
usr.bin/ssh/scp.c
358
addargs(&args, "%s", host);
usr.bin/ssh/scp.c
957
do_sftp_connect(char *host, char *user, int port, char *sftp_direct,
usr.bin/ssh/scp.c
961
if (do_cmd(ssh_program, host, user, port, 1, "sftp",
usr.bin/ssh/scp.c
968
if (do_cmd(sftp_direct, host, NULL, -1, 0, "sftp",
usr.bin/ssh/scp.c
979
char *suser = NULL, *host = NULL, *src = NULL;
usr.bin/ssh/servconf.c
1087
if (ci == NULL || (ci->test && ci->host == NULL)) {
usr.bin/ssh/servconf.c
1091
if (ci->host == NULL)
usr.bin/ssh/servconf.c
1093
if (match_hostname(ci->host, arg) != 1)
usr.bin/ssh/servconf.c
1097
"%.100s' at line %d", ci->host, arg, line);
usr.bin/ssh/servconf.c
2796
ci->host = xstrdup(val);
usr.bin/ssh/servconf.c
997
ci->host ? ci->host : "(null)",
usr.bin/ssh/servconf.h
261
const char *host; /* possibly resolved hostname */
usr.bin/ssh/session.c
255
char *tmp, *cp, *host;
usr.bin/ssh/session.c
264
if ((host = hpdelim2(&cp, NULL)) == NULL)
usr.bin/ssh/session.c
266
host = cleanhostname(host);
usr.bin/ssh/session.c
270
FORWARD_USER, FORWARD_LOCAL, host, port);
usr.bin/ssh/session.c
279
if ((host = hpdelim(&cp)) == NULL)
usr.bin/ssh/session.c
281
host = cleanhostname(host);
usr.bin/ssh/session.c
285
FORWARD_USER, FORWARD_REMOTE, host, port);
usr.bin/ssh/sftp.c
2423
char *host = NULL, *user, *cp, **cpp, *file2 = NULL;
usr.bin/ssh/sftp.c
2597
switch (parse_uri("sftp", *argv, &user, &host, &tmp, &file1)) {
usr.bin/ssh/sftp.c
2607
if (parse_user_host_path(*argv, &user, &host,
usr.bin/ssh/sftp.c
2611
if (parse_user_host_port(*argv, &user, &host, NULL)
usr.bin/ssh/sftp.c
2615
host = xstrdup(*argv);
usr.bin/ssh/sftp.c
2616
host = cleanhostname(host);
usr.bin/ssh/sftp.c
2621
if (!*host) {
usr.bin/ssh/sftp.c
2638
addargs(&args, "%s", host);
usr.bin/ssh/sftp.c
2659
fprintf(stderr, "Connected to %s.\n", host);
usr.bin/ssh/ssh-add.c
693
char *user = NULL, *host, *os, *path;
usr.bin/ssh/ssh-add.c
701
if ((host = strrchr(os, '@')) == NULL)
usr.bin/ssh/ssh-add.c
702
host = os;
usr.bin/ssh/ssh-add.c
704
*host++ = '\0';
usr.bin/ssh/ssh-add.c
707
cleanhostname(host);
usr.bin/ssh/ssh-add.c
709
if (*host == '\0') {
usr.bin/ssh/ssh-add.c
725
debug2_f("looking up host keys for \"%s\" in %s", host, path);
usr.bin/ssh/ssh-add.c
726
load_hostkeys(hostkeys, host, path, 0);
usr.bin/ssh/ssh-add.c
730
dch->hostname = xstrdup(host);
usr.bin/ssh/ssh-add.c
738
host, sshkey_type(hke->key), want_ca ? "CA " : "",
usr.bin/ssh/ssh-add.c
751
fatal("No host keys found for destination \"%s\"", host);
usr.bin/ssh/ssh-keygen.c
1104
const char *host; /* Hostname searched for in find/delete case */
usr.bin/ssh/ssh-keygen.c
1191
ctx->host, l->linenum);
usr.bin/ssh/ssh-keygen.c
1198
ctx->host,
usr.bin/ssh/ssh-keygen.c
1210
mprintf("%s %s %s%s%s\n", ctx->host,
usr.bin/ssh/ssh-keygen.c
1256
ctx.host = name;
usr.bin/ssh/ssh-keyscan.c
280
keyprint_one(const char *host, struct sshkey *key)
usr.bin/ssh/ssh-keyscan.c
289
export_dns_rr(host, key, stdout, 0, hashalg);
usr.bin/ssh/ssh-keyscan.c
293
hostport = put_host_port(host, ssh_port);
usr.bin/ssh/ssh-keyscan.c
310
char *host, *ohosts;
usr.bin/ssh/ssh-keyscan.c
319
while ((host = strsep(&hosts, ",")) != NULL)
usr.bin/ssh/ssh-keyscan.c
320
keyprint_one(host, key);
usr.bin/ssh/ssh-keyscan.c
325
tcpconnect(char *host)
usr.bin/ssh/ssh-keyscan.c
335
if ((gaierr = getaddrinfo(host, strport, &hints, &aitop)) != 0) {
usr.bin/ssh/ssh-keyscan.c
336
error("getaddrinfo %s: %s", host, ssh_gai_strerror(gaierr));
usr.bin/ssh/ssh-keyscan.c
349
error("connect (`%s'): %s", host, strerror(errno));
usr.bin/ssh/ssh-keyscan.c
569
do_one_host(char *host)
usr.bin/ssh/ssh-keyscan.c
571
char *name = strnnsep(&host, " \t\n");
usr.bin/ssh/ssh-keyscan.c
580
conalloc(name, *host ? host : name, j);
usr.bin/ssh/ssh-keyscan.c
586
do_host(char *host)
usr.bin/ssh/ssh-keyscan.c
592
if (host == NULL)
usr.bin/ssh/ssh-keyscan.c
594
if (addr_pton_cidr(host, &addr, &masklen) != 0) {
usr.bin/ssh/ssh-keyscan.c
596
do_one_host(host);
usr.bin/ssh/ssh-keyscan.c
599
debug("CIDR range %s", host);
usr.bin/ssh/ssh-keyscan.c
609
error("Invalid address %s", host);
usr.bin/ssh/ssh-keysign.c
129
debug2_f("check expect chost \"%s\" got \"%s\"", host, p);
usr.bin/ssh/ssh-keysign.c
132
else if (strlen(host) != len - 1)
usr.bin/ssh/ssh-keysign.c
136
else if (strncasecmp(host, p, len - 1) != 0)
usr.bin/ssh/ssh-keysign.c
182
char *host, *fp, *pkalg;
usr.bin/ssh/ssh-keysign.c
264
if ((host = get_local_name(fd)) == NULL)
usr.bin/ssh/ssh-keysign.c
269
if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0)
usr.bin/ssh/ssh-keysign.c
271
free(host);
usr.bin/ssh/ssh-keysign.c
60
valid_request(struct passwd *pw, char *host, struct sshkey **ret, char **pkalgp,
usr.bin/ssh/ssh.c
1035
host ? host : "", host ? host : "", "", line,
usr.bin/ssh/ssh.c
1070
if (ac > 0 && !host) {
usr.bin/ssh/ssh.c
1073
switch (parse_ssh_uri(*av, &tuser, &host, &tport)) {
usr.bin/ssh/ssh.c
1099
host = xstrdup(cp);
usr.bin/ssh/ssh.c
1102
host = p;
usr.bin/ssh/ssh.c
1113
if (!host)
usr.bin/ssh/ssh.c
1122
if (!ssh_valid_hostname(host))
usr.bin/ssh/ssh.c
1125
options.host_arg = xstrdup(host);
usr.bin/ssh/ssh.c
1191
"h", host, (char *)NULL);
usr.bin/ssh/ssh.c
1192
free(host);
usr.bin/ssh/ssh.c
1193
host = cp;
usr.bin/ssh/ssh.c
1195
options.hostname = xstrdup(host);
usr.bin/ssh/ssh.c
1199
if ((was_addr = is_addr(host)) == 0)
usr.bin/ssh/ssh.c
1200
lowercase(host);
usr.bin/ssh/ssh.c
1207
addrs = resolve_canonicalize(&host, options.port);
usr.bin/ssh/ssh.c
1226
if ((addrs = resolve_host(host, options.port,
usr.bin/ssh/ssh.c
1232
check_follow_cname(direct, &host, cname);
usr.bin/ssh/ssh.c
1248
options.hostname = xstrdup(host);
usr.bin/ssh/ssh.c
1282
if (strcmp(options.jump_host, host) == 0 && port == jumpport &&
usr.bin/ssh/ssh.c
129
char *host;
usr.bin/ssh/ssh.c
1409
cinfo->remhost = xstrdup(host);
usr.bin/ssh/ssh.c
1606
dump_client_config(&options, host);
usr.bin/ssh/ssh.c
1642
debug2("resolving \"%s\" port %d", host, options.port);
usr.bin/ssh/ssh.c
1643
if ((addrs = resolve_host(host, options.port, 1,
usr.bin/ssh/ssh.c
1668
if (ssh_connect(ssh, host, options.host_arg, addrs, &hostaddr,
usr.bin/ssh/ssh.c
1780
ssh_login(ssh, &sensitive_data, host, (struct sockaddr *)&hostaddr,
usr.bin/ssh/ssh.c
561
!read_config_file(config, pw, host, host_name, cmd,
usr.bin/ssh/ssh.c
571
(void)read_config_file(buf, pw, host, host_name, cmd,
usr.bin/ssh/ssh.c
577
host, host_name, cmd, &options,
usr.bin/ssh/ssh.c
694
host = NULL;
usr.bin/ssh/sshconnect.c
1046
host, type, want_cert ? "certificate" : "key");
usr.bin/ssh/sshconnect.c
113
host, host_arg, port);
usr.bin/ssh/sshconnect.c
1135
"have requested strict checking.", type, host);
usr.bin/ssh/sshconnect.c
1142
"'%.200s (%s)' can't be established", host, ip);
usr.bin/ssh/sshconnect.c
1167
if ((msg2 = other_hostkeys_message(host, ip, host_key,
usr.bin/ssh/sshconnect.c
1190
snprintf(hostline, sizeof(hostline), "%s,%s", host, ip);
usr.bin/ssh/sshconnect.c
1195
host, host_key, options.hash_known_hosts) &&
usr.bin/ssh/sshconnect.c
1205
r = add_host_to_hostfile(user_hostfiles[0], host,
usr.bin/ssh/sshconnect.c
1207
hostp = host;
usr.bin/ssh/sshconnect.c
1221
error("The %s host key for %s is marked as revoked.", type, host);
usr.bin/ssh/sshconnect.c
1232
"requested strict checking.", type, host);
usr.bin/ssh/sshconnect.c
1262
error("The %s host key for %s has changed,", type, host);
usr.bin/ssh/sshconnect.c
1289
"requested strict checking.", host);
usr.bin/ssh/sshconnect.c
1365
type, host, ip, ip_found->file, ip_found->line);
usr.bin/ssh/sshconnect.c
1396
free(host);
usr.bin/ssh/sshconnect.c
1419
free(host);
usr.bin/ssh/sshconnect.c
1429
verify_host_key(char *host, struct sockaddr *hostaddr, struct sshkey *host_key,
usr.bin/ssh/sshconnect.c
1506
if (verify_host_key_dns(host, hostaddr, plain, &flags) == 0) {
usr.bin/ssh/sshconnect.c
1525
r = check_host_key(host, cinfo, hostaddr, options.port, host_key,
usr.bin/ssh/sshconnect.c
1562
char *host;
usr.bin/ssh/sshconnect.c
1570
host = xstrdup(orighost);
usr.bin/ssh/sshconnect.c
1571
lowercase(host);
usr.bin/ssh/sshconnect.c
1588
debug("Authenticating to %s:%d as '%s'", host, port, server_user);
usr.bin/ssh/sshconnect.c
1589
ssh_kex2(ssh, host, hostaddr, port, cinfo);
usr.bin/ssh/sshconnect.c
1594
ssh_userauth2(ssh, local_user, server_user, host, sensitive);
usr.bin/ssh/sshconnect.c
1596
free(host);
usr.bin/ssh/sshconnect.c
1629
found->host, found->file, found->line,
usr.bin/ssh/sshconnect.c
179
ssh_proxy_connect(struct ssh *ssh, const char *host, const char *host_arg,
usr.bin/ssh/sshconnect.c
196
host, host_arg, port);
usr.bin/ssh/sshconnect.c
421
ssh_connect_direct(struct ssh *ssh, const char *host, struct addrinfo *aitop,
usr.bin/ssh/sshconnect.c
467
host, ntop, strport);
usr.bin/ssh/sshconnect.c
499
host, strport, errno == 0 ? "failure" : strerror(errno));
usr.bin/ssh/sshconnect.c
519
ssh_connect(struct ssh *ssh, const char *host, const char *host_arg,
usr.bin/ssh/sshconnect.c
526
return ssh_connect_direct(ssh, host, addrs, hostaddr, port,
usr.bin/ssh/sshconnect.c
540
return ssh_proxy_fdpass_connect(ssh, host, host_arg, port,
usr.bin/ssh/sshconnect.c
543
return ssh_proxy_connect(ssh, host, host_arg, port,
usr.bin/ssh/sshconnect.c
646
const char *host, *ip;
usr.bin/ssh/sshconnect.c
73
const char *host, const char *host_arg, int port)
usr.bin/ssh/sshconnect.c
736
ctx->host, ctx->ip, HKF_WANT_PARSE_KEY, 0)) != 0) {
usr.bin/ssh/sshconnect.c
752
hostkeys_find_by_key(const char *host, const char *ip, const struct sshkey *key,
usr.bin/ssh/sshconnect.c
766
ctx.host = host;
usr.bin/ssh/sshconnect.c
794
other_hostkeys_message(const char *host, const char *ip,
usr.bin/ssh/sshconnect.c
802
hostkeys_find_by_key(host, ip, key,
usr.bin/ssh/sshconnect.c
82
"h", host,
usr.bin/ssh/sshconnect.c
923
char *ip = NULL, *host = NULL;
usr.bin/ssh/sshconnect.c
967
clobber_port ? 0 : port, &host, &ip);
usr.bin/ssh/sshconnect.c
97
ssh_proxy_fdpass_connect(struct ssh *ssh, const char *host,
usr.bin/ssh/sshconnect.c
979
load_hostkeys(host_hostkeys, host, user_hostfiles[i], 0);
usr.bin/ssh/sshconnect.c
981
load_hostkeys(host_hostkeys, host, system_hostfiles[i], 0);
usr.bin/ssh/sshconnect.c
984
"HOSTNAME", cinfo, host_key, host);
usr.bin/ssh/sshconnect2.c
1032
const char *host = options.host_key_alias ? options.host_key_alias :
usr.bin/ssh/sshconnect2.c
1033
authctxt->host;
usr.bin/ssh/sshconnect2.c
1042
xasprintf(&prompt, "%s@%s's password: ", authctxt->server_user, host);
usr.bin/ssh/sshconnect2.c
1073
const char *host;
usr.bin/ssh/sshconnect2.c
1082
host = options.host_key_alias ? options.host_key_alias : authctxt->host;
usr.bin/ssh/sshconnect2.c
1100
authctxt->server_user, host);
usr.bin/ssh/sshconnect2.c
1110
authctxt->server_user, host);
usr.bin/ssh/sshconnect2.c
1119
authctxt->server_user, host);
usr.bin/ssh/sshconnect2.c
115
order_hostkeyalgs(char *host, struct sockaddr *hostaddr, u_short port,
usr.bin/ssh/sshconnect2.c
126
get_hostfile_hostname_ipaddr(host, hostaddr, port, &hostname, NULL);
usr.bin/ssh/sshconnect2.c
1990
options.host_key_alias : authctxt->host, prompt) == -1)
usr.bin/ssh/sshconnect2.c
213
ssh_kex2(struct ssh *ssh, char *host, struct sockaddr *hostaddr, u_short port,
usr.bin/ssh/sshconnect2.c
220
xxx_host = host;
usr.bin/ssh/sshconnect2.c
246
hkalgs = order_hostkeyalgs(host, hostaddr, port, cinfo);
usr.bin/ssh/sshconnect2.c
309
const char *host;
usr.bin/ssh/sshconnect2.c
417
const char *server_user, char *host, Sensitive *sensitive)
usr.bin/ssh/sshconnect2.c
429
authctxt.host = host;
usr.bin/ssh/sshconnect2.c
474
verbose("Authenticated to %s ([%s]:%d) using \"%s\".", host,
usr.bin/ssh/sshconnect2.c
478
verbose("Authenticated to %s (via proxy) using \"%s\".", host,
usr.bin/ssh/sshconnect2.c
536
authctxt->server_user, authctxt->host, authlist);
usr.bin/ssh/sshconnect2.c
769
mech, authctxt->host)) {
usr.bin/ssh/sshkey.c
2432
sshkey_cert_check_host(const struct sshkey *key, const char *host,
usr.bin/ssh/sshkey.c
2437
if ((r = sshkey_cert_check_authority_now(key, 1, 1, host, reason)) != 0)
usr.bin/ssh/sshlogin.c
149
const char *host, struct sockaddr *addr, socklen_t addrlen)
usr.bin/ssh/sshlogin.c
164
strncpy(u.ut_host, host, sizeof(u.ut_host));
usr.bin/ssh/sshlogin.c
180
strncpy(ll.ll_host, host, sizeof(ll.ll_host));
usr.bin/tcpbench/tcpbench.c
1116
const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
usr.bin/tcpbench/tcpbench.c
1271
mainstats.host = host = argv[0];
usr.bin/tcpbench/tcpbench.c
1274
if (unveil(host, "rwc") == -1)
usr.bin/tcpbench/tcpbench.c
1275
err(1, "unveil %s", host);
usr.bin/tcpbench/tcpbench.c
1306
if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >=
usr.bin/tcpbench/tcpbench.c
1308
errx(1, "socket name '%s' too long", host);
usr.bin/tcpbench/tcpbench.c
1327
if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
usr.bin/tcpbench/tcpbench.c
157
const char *host; /* remote server for display */
usr.bin/tcpbench/tcpbench.c
377
printf("--- %s tcpbench statistics ---\n", mainstats.host);
usr.bin/tcpbench/tcpbench.c
963
mainstats.host) == -1)
usr.bin/tftp/main.c
181
setpeer(char *host, char *port)
usr.bin/tftp/main.c
201
error = getaddrinfo(host, port, &hints, &res0);
usr.bin/tftp/main.c
237
(void)strlcpy(hostname, host, sizeof(hostname));
usr.bin/tmux/format.c
492
char host[HOST_NAME_MAX + 1];
usr.bin/tmux/format.c
494
if (gethostname(host, sizeof host) != 0)
usr.bin/tmux/format.c
496
return (xstrdup(host));
usr.bin/tmux/format.c
503
char host[HOST_NAME_MAX + 1], *cp;
usr.bin/tmux/format.c
505
if (gethostname(host, sizeof host) != 0)
usr.bin/tmux/format.c
507
if ((cp = strchr(host, '.')) != NULL)
usr.bin/tmux/format.c
509
return (xstrdup(host));
usr.bin/tmux/window.c
955
char host[HOST_NAME_MAX + 1];
usr.bin/tmux/window.c
992
if (gethostname(host, sizeof host) == 0)
usr.bin/tmux/window.c
993
screen_set_title(&wp->base, host);
usr.bin/vi/common/recover.c
328
char host[HOST_NAME_MAX+1];
usr.bin/vi/common/recover.c
377
(void)gethostname(host, sizeof(host));
usr.bin/vi/common/recover.c
397
host, ", when it was saved for recovery. ",
usr.bin/w/w.c
511
hostlookup(char *host, char *domain)
usr.bin/w/w.c
519
if (getaddrinfo(host, NULL, &hints, &res) != 0)
usr.bin/whois/whois.c
102
host = GNICHOST;
usr.bin/whois/whois.c
105
host = optarg;
usr.bin/whois/whois.c
108
host = INICHOST;
usr.bin/whois/whois.c
111
host = IANAHOST;
usr.bin/whois/whois.c
114
host = LNICHOST;
usr.bin/whois/whois.c
117
host = MNICHOST;
usr.bin/whois/whois.c
129
host = RNICHOST;
usr.bin/whois/whois.c
132
host = RUNICHOST;
usr.bin/whois/whois.c
143
if (!argc || (country != NULL && host != NULL))
usr.bin/whois/whois.c
149
if (host == NULL && country == NULL && !(flags & WHOIS_QUICK))
usr.bin/whois/whois.c
154
host ? host : choose_server(name, country, &tofree);
usr.bin/whois/whois.c
83
char *host, *name, *country;
usr.bin/whois/whois.c
85
country = host = NULL;
usr.bin/whois/whois.c
90
host = ANICHOST;
usr.bin/whois/whois.c
93
host = PNICHOST;
usr.bin/whois/whois.c
99
host = DNICHOST;
usr.bin/write/write.c
230
char path[PATH_MAX], host[HOST_NAME_MAX+1], line[512];
usr.bin/write/write.c
264
if (gethostname(host, sizeof(host)) == -1)
usr.bin/write/write.c
265
(void)strlcpy(host, "???", sizeof host);
usr.bin/write/write.c
270
login, host, mytty, nows + 11);
usr.bin/ypwhich/ypwhich.c
136
char *domain, *master, *map = NULL, *host = NULL;
usr.bin/ypwhich/ypwhich.c
155
host = optarg;
usr.bin/ypwhich/ypwhich.c
207
if (host != NULL)
usr.bin/ypwhich/ypwhich.c
208
client = yp_bind_host(host, YPPROG, YPVERS, 0, 1);
usr.bin/ypwhich/ypwhich.c
216
if (host != NULL)
usr.bin/ypwhich/ypwhich.c
238
if (host != NULL)
usr.bin/ypwhich/ypwhich.c
248
if (host != NULL) {
usr.sbin/acme-client/http.c
190
free(http->host);
usr.sbin/acme-client/http.c
198
const char *host, short port, const char *path)
usr.sbin/acme-client/http.c
267
http->host = strdup(host);
usr.sbin/acme-client/http.c
269
if (http->src.ip == NULL || http->host == NULL || http->path == NULL) {
usr.sbin/acme-client/http.c
283
if (tls_connect_socket(http->ctx, http->fd, http->host) != 0) {
usr.sbin/acme-client/http.c
285
http->host, tls_error(http->ctx));
usr.sbin/acme-client/http.c
318
http->path, http->host, port);
usr.sbin/acme-client/http.c
325
http->path, http->host, port);
usr.sbin/acme-client/http.c
334
http->path, http->host, port, psz);
usr.sbin/acme-client/http.c
61
char *host; /* name of endpoint host */
usr.sbin/acme-client/netproc.c
135
urlresolve(int fd, const char *host, struct source *v)
usr.sbin/acme-client/netproc.c
143
else if (writestr(fd, COMM_DNSQ, host) <= 0)
usr.sbin/acme-client/netproc.c
181
char *host, *path;
usr.sbin/acme-client/netproc.c
188
if ((host = url2host(addr, &port, &path)) == NULL)
usr.sbin/acme-client/netproc.c
192
if ((ssz = urlresolve(c->dfd, host, src)) < 0) {
usr.sbin/acme-client/netproc.c
193
free(host);
usr.sbin/acme-client/netproc.c
199
g = http_get(src, srcsz, host, port, path, 0, NULL, 0);
usr.sbin/acme-client/netproc.c
200
free(host);
usr.sbin/acme-client/netproc.c
225
host = url2host(st->val, &port, &path);
usr.sbin/acme-client/netproc.c
227
if (host == NULL)
usr.sbin/acme-client/netproc.c
259
char *host, *path, *nonce, *reqsn;
usr.sbin/acme-client/netproc.c
266
if ((host = url2host(c->newnonce, &port, &path)) == NULL)
usr.sbin/acme-client/netproc.c
269
if ((ssz = urlresolve(c->dfd, host, src)) < 0) {
usr.sbin/acme-client/netproc.c
270
free(host);
usr.sbin/acme-client/netproc.c
275
g = http_get(src, (size_t)ssz, host, port, path, 1, NULL, 0);
usr.sbin/acme-client/netproc.c
276
free(host);
usr.sbin/acme-client/netproc.c
321
if ((host = url2host(addr, &port, &path)) == NULL) {
usr.sbin/acme-client/netproc.c
324
} else if ((ssz = urlresolve(c->dfd, host, src)) < 0) {
usr.sbin/acme-client/netproc.c
325
free(host);
usr.sbin/acme-client/netproc.c
331
g = http_get(src, (size_t)ssz, host, port, path, 0, reqsn,
usr.sbin/acme-client/netproc.c
334
free(host);
usr.sbin/acme-client/netproc.c
81
url2host(const char *host, short *port, char **path)
usr.sbin/acme-client/netproc.c
86
if (strncmp(host, "https://", 8) == 0) {
usr.sbin/acme-client/netproc.c
88
if ((url = strdup(host + 8)) == NULL) {
usr.sbin/acme-client/netproc.c
93
warnx("%s: RFC 8555 requires https for the API server", host);
usr.sbin/amd/amd/am_ops.c
100
char *host = key;
usr.sbin/amd/amd/am_ops.c
101
char *fs = strchr(host, ':');
usr.sbin/amd/amd/am_ops.c
106
"type:=nfs;rhost:=%s;rfs:=%s;sublink:=%s;opts:=%s", host,
usr.sbin/amd/amd/host_ops.c
223
char *host = mf->mf_server->fs_host;
usr.sbin/amd/amd/host_ops.c
254
plog(XLOG_ERROR, "Failed to make rpc connection to mountd on %s", host);
usr.sbin/amd/amd/host_ops.c
268
dlog("Fetching export list from %s", host);
usr.sbin/amd/amd/host_ops.c
488
host_exec(char *op, char *host, char *fs, char *opts)
usr.sbin/amd/amd/host_ops.c
499
argv[3] = host;
usr.sbin/amd/amd/nfs_ops.c
456
char host[HOST_NAME_MAX+1 + PATH_MAX+2];
usr.sbin/amd/amd/nfs_ops.c
474
strlcpy(host, fs_name, sizeof(host));
usr.sbin/amd/amd/nfs_ops.c
504
nfs_args.hostname = host;
usr.sbin/amd/amd/nfs_ops.c
509
if (strlen(host) >= HOSTNAMESZ)
usr.sbin/amd/amd/nfs_ops.c
510
strlcpy(host + HOSTNAMESZ - 3, "..", sizeof host - HOSTNAMESZ + 3);
usr.sbin/amd/amd/nfsx_ops.c
164
char *host;
usr.sbin/amd/amd/nfsx_ops.c
169
host = strchr(info, ':');
usr.sbin/amd/amd/nfsx_ops.c
170
if (!host) {
usr.sbin/amd/amd/nfsx_ops.c
175
pref = host+1;
usr.sbin/amd/amd/nfsx_ops.c
176
host = info;
usr.sbin/amd/amd/nfsx_ops.c
213
xinfo = str3cat(xinfo, host, *path == '/' ? "" : "/", path);
usr.sbin/amd/amd/srvr_nfs.c
584
char *host = mf->mf_fo->opt_rhost;
usr.sbin/amd/amd/srvr_nfs.c
610
hp = gethostbyname(host);
usr.sbin/amd/amd/srvr_nfs.c
619
if (hp && !normalize_hosts) host = hp->h_name;
usr.sbin/amd/amd/srvr_nfs.c
622
if (STREQ(host, fs->fs_host)) {
usr.sbin/amd/amd/srvr_nfs.c
650
plog(XLOG_USER, "Unknown host: %s", host);
usr.sbin/arp/arp.c
235
parse_host(const char *host, struct in_addr *in)
usr.sbin/arp/arp.c
246
gai_error = getaddrinfo(host, NULL, &hints, &res);
usr.sbin/arp/arp.c
248
warnx("%s: %s", host, gai_strerror(gai_error));
usr.sbin/arp/arp.c
279
const char *host = argv[0], *eaddr = argv[1];
usr.sbin/arp/arp.c
290
if (parse_host(host, &sin->sin_addr))
usr.sbin/arp/arp.c
324
warn("%s", host);
usr.sbin/arp/arp.c
343
printf("set: can only proxy for %s\n", host);
usr.sbin/arp/arp.c
357
printf("cannot intuit interface index and type for %s\n", host);
usr.sbin/arp/arp.c
373
get(const char *host)
usr.sbin/arp/arp.c
379
if (parse_host(host, &sin->sin_addr))
usr.sbin/arp/arp.c
399
delete(const char *host)
usr.sbin/arp/arp.c
410
if (parse_host(host, &sin->sin_addr))
usr.sbin/arp/arp.c
414
warn("%s", host);
usr.sbin/arp/arp.c
435
warnx("delete: cannot locate %s", host);
usr.sbin/arp/arp.c
443
printf("cannot locate %s\n", host);
usr.sbin/arp/arp.c
448
printf("%s (%s) deleted\n", host, inet_ntoa(sin->sin_addr));
usr.sbin/arp/arp.c
524
char ifix_buf[IFNAMSIZ], *ifname, *host;
usr.sbin/arp/arp.c
535
host = hp->h_name;
usr.sbin/arp/arp.c
537
host = inet_ntoa(sin->sin_addr);
usr.sbin/arp/arp.c
539
addrwidth = strlen(host);
usr.sbin/arp/arp.c
552
printf("%-*.*s %-*.*s %*.*s", addrwidth, addrwidth, host,
usr.sbin/bgpd/bgpd.h
1526
int host(const char *, struct bgpd_addr *, uint8_t *);
usr.sbin/bgpd/parse.y
1525
if (!host($1, &$$, &len)) {
usr.sbin/bgpd/parse.y
1554
if (!host(s, &$$.prefix, &$$.len)) {
usr.sbin/bgpd/parse.y
1572
if (!host(s, &$$.prefix, &$$.len)) {
usr.sbin/dhcpd/bootp.c
112
host = hp;
usr.sbin/dhcpd/bootp.c
116
if (host && (!host->group->allow_booting)) {
usr.sbin/dhcpd/bootp.c
118
host->name ? host->name :
usr.sbin/dhcpd/bootp.c
124
if (host && (!host->group->allow_bootp)) {
usr.sbin/dhcpd/bootp.c
126
host->name ? host->name :
usr.sbin/dhcpd/bootp.c
136
if (!host && !(s->group->boot_unknown_clients)) {
usr.sbin/dhcpd/bootp.c
150
if (!host && !(s->group->allow_bootp)) {
usr.sbin/dhcpd/bootp.c
193
lease->host = host;
usr.sbin/dhcpd/bootp.c
213
lease->host = host;
usr.sbin/dhcpd/bootp.c
65
struct host_decl *hp, *host = NULL;
usr.sbin/dhcpd/confpars.c
538
struct host_decl *host;
usr.sbin/dhcpd/confpars.c
545
host = calloc(1, sizeof (struct host_decl));
usr.sbin/dhcpd/confpars.c
546
if (!host)
usr.sbin/dhcpd/confpars.c
549
host->name = name;
usr.sbin/dhcpd/confpars.c
550
host->group = clone_group(group, "parse_host_declaration");
usr.sbin/dhcpd/confpars.c
553
free(host->name);
usr.sbin/dhcpd/confpars.c
554
free(host->group);
usr.sbin/dhcpd/confpars.c
555
free(host);
usr.sbin/dhcpd/confpars.c
570
declaration = parse_statement(cfile, host->group,
usr.sbin/dhcpd/confpars.c
571
HOST_DECL, host, declaration);
usr.sbin/dhcpd/confpars.c
574
if (!host->group->options[DHO_HOST_NAME] &&
usr.sbin/dhcpd/confpars.c
575
host->group->use_host_decl_names) {
usr.sbin/dhcpd/confpars.c
576
host->group->options[DHO_HOST_NAME] =
usr.sbin/dhcpd/confpars.c
578
if (!host->group->options[DHO_HOST_NAME])
usr.sbin/dhcpd/confpars.c
580
host->group->options[DHO_HOST_NAME]->len =
usr.sbin/dhcpd/confpars.c
582
host->group->options[DHO_HOST_NAME]->value =
usr.sbin/dhcpd/confpars.c
584
host->group->options[DHO_HOST_NAME]->buf_size =
usr.sbin/dhcpd/confpars.c
585
host->group->options[DHO_HOST_NAME]->len;
usr.sbin/dhcpd/confpars.c
586
host->group->options[DHO_HOST_NAME]->timeout = -1;
usr.sbin/dhcpd/confpars.c
587
host->group->options[DHO_HOST_NAME]->tree =
usr.sbin/dhcpd/confpars.c
591
enter_host(host);
usr.sbin/dhcpd/dhcp.c
1015
if (lease->host) {
usr.sbin/dhcpd/dhcp.c
1017
if (lease->host->group->options[i])
usr.sbin/dhcpd/dhcp.c
1019
lease->host->group->options[i];
usr.sbin/dhcpd/dhcp.c
1209
if (lease->host) {
usr.sbin/dhcpd/dhcp.c
1210
if (lease->host->group->use_lease_addr_for_default_route)
usr.sbin/dhcpd/dhcp.c
1242
if (lease->host)
usr.sbin/dhcpd/dhcp.c
1243
echo_client_id = lease->host->group->echo_client_id;
usr.sbin/dhcpd/dhcp.c
1357
if (lease->host && lease->host->group->next_server.len)
usr.sbin/dhcpd/dhcp.c
1358
memcpy(&raw.siaddr, lease->host->group->next_server.iabuf, 4);
usr.sbin/dhcpd/dhcp.c
1472
struct host_decl *hp, *host = NULL;
usr.sbin/dhcpd/dhcp.c
1497
host = hp;
usr.sbin/dhcpd/dhcp.c
1524
host = hp; /* Save it for later. */
usr.sbin/dhcpd/dhcp.c
1632
"remove %s", (fixed_lease && fixed_lease->host ?
usr.sbin/dhcpd/dhcp.c
1633
(fixed_lease->host->name ?
usr.sbin/dhcpd/dhcp.c
1634
fixed_lease->host->name : piaddr(cip)) :
usr.sbin/dhcpd/dhcp.c
1711
lease->host = NULL;
usr.sbin/dhcpd/dhcp.c
1724
lease->host = NULL;
usr.sbin/dhcpd/dhcp.c
1735
lease->host = NULL;
usr.sbin/dhcpd/dhcp.c
1743
if (lease && host && !lease->host) {
usr.sbin/dhcpd/dhcp.c
1744
for (; host; host = host->n_ipaddr) {
usr.sbin/dhcpd/dhcp.c
1745
if (!host->fixed_addr) {
usr.sbin/dhcpd/dhcp.c
1746
lease->host = host;
usr.sbin/dhcpd/dhcp.c
1782
mock.host = hp;
usr.sbin/dhcpd/dhcp.c
181
lease->host = hp;
usr.sbin/dhcpd/dhcp.c
186
lease->host = NULL;
usr.sbin/dhcpd/dhcp.c
191
if (!lease->host &&
usr.sbin/dhcpd/dhcp.c
196
} else if (lease->host && !lease->host->group->allow_booting) {
usr.sbin/dhcpd/dhcp.c
198
lease->host->name ? lease->host->name :
usr.sbin/dhcpd/dhcp.c
334
if (lease && !lease->host &&
usr.sbin/dhcpd/dhcp.c
340
} else if (lease && lease->host && !lease->host->group->allow_booting)
usr.sbin/dhcpd/dhcp.c
343
lease->host->name ? lease->host->name :
usr.sbin/dhcpd/dhcp.c
563
lease.host = find_hosts_by_uid(
usr.sbin/dhcpd/dhcp.c
744
if (!lease->host) {
usr.sbin/dhcpd/dhcp.c
813
if (lease->host && lease->host->group->filename)
usr.sbin/dhcpd/dhcp.c
814
strlcpy(state->filename, lease->host->group->filename,
usr.sbin/dhcpd/dhcp.c
832
if (lease->host && lease->host->group->server_name)
usr.sbin/dhcpd/dhcp.c
833
state->server_name = lease->host->group->server_name;
usr.sbin/dhcpd/dhcp.c
859
if (lease->host && lease->host->group->max_lease_time)
usr.sbin/dhcpd/dhcp.c
860
max_lease_time = lease->host->group->max_lease_time;
usr.sbin/dhcpd/dhcp.c
865
if (lease->host && lease->host->group->default_lease_time)
usr.sbin/dhcpd/dhcp.c
866
default_lease_time = lease->host->group->default_lease_time;
usr.sbin/dhcpd/dhcp.c
898
if (lease->host &&
usr.sbin/dhcpd/dhcp.c
899
lease->host->group->bootp_lease_length)
usr.sbin/dhcpd/dhcp.c
901
lease->host->group->bootp_lease_length);
usr.sbin/dhcpd/dhcp.c
905
else if (lease->host &&
usr.sbin/dhcpd/dhcp.c
906
lease->host->group->bootp_lease_cutoff)
usr.sbin/dhcpd/dhcp.c
907
lt.ends = lease->host->group->bootp_lease_cutoff;
usr.sbin/dhcpd/dhcp.c
932
lt.host = lease->host;
usr.sbin/dhcpd/dhcpd.h
116
struct host_decl *host;
usr.sbin/dhcpd/memory.c
165
find_host_for_network(struct host_decl **host, struct iaddr *addr,
usr.sbin/dhcpd/memory.c
173
for (hp = *host; hp; hp = hp->n_ipaddr) {
usr.sbin/dhcpd/memory.c
182
*host = hp;
usr.sbin/dhcpd/memory.c
545
comp->host = lease->host;
usr.sbin/dhcpd/tree.h
63
struct dns_host_entry *host;
usr.sbin/httpd/parse.y
115
int host(const char *, struct addresslist *,
usr.sbin/httpd/parse.y
2433
if (host("0.0.0.0", &al, 1, port, NULL, -1) <= 0) {
usr.sbin/httpd/parse.y
2438
if (host("::", &al, 1, port, NULL, -1) <= 0) {
usr.sbin/httpd/parse.y
2443
if (host(addr, &al, HTTPD_MAX_ALIAS_IP, port, NULL,
usr.sbin/httpd/server_http.c
1295
struct kv *kv, key, *host;
usr.sbin/httpd/server_http.c
1318
if ((host = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
1319
host->kv_value == NULL)
usr.sbin/httpd/server_http.c
1320
host = NULL;
usr.sbin/httpd/server_http.c
1324
if (host == NULL)
usr.sbin/httpd/server_http.c
1348
if (host != NULL) {
usr.sbin/httpd/server_http.c
1349
if ((hostval = server_http_parsehost(host->kv_value,
usr.sbin/httpd/server_http.c
1359
ntohs(srv_conf->port), host->kv_value,
usr.sbin/httpd/server_http.c
1390
if (strlcpy(hostname, host->kv_value, sizeof(hostname)) >=
usr.sbin/httpd/server_http.c
835
server_http_parsehost(char *host, char *buf, size_t len, int *portval)
usr.sbin/httpd/server_http.c
840
if (strlcpy(buf, host, len) >= len) {
usr.sbin/ikectl/ikectl.c
121
ca_certificate(ca, res->host, res->htype, res->action);
usr.sbin/ikectl/ikectl.c
124
ca_delkey(ca, res->host);
usr.sbin/ikectl/ikectl.c
127
ca_cert_install(ca, res->host, res->path);
usr.sbin/ikectl/ikectl.c
130
ca_export(ca, res->host, res->peer, res->pass);
usr.sbin/ikectl/ikectl.c
133
ca_revoke(ca, res->host);
usr.sbin/ikectl/ikectl.c
136
ca_show_certs(ca, res->host);
usr.sbin/ikectl/ikectl.c
139
ca_key_create(ca, res->host);
usr.sbin/ikectl/ikectl.c
142
ca_key_delete(ca, res->host);
usr.sbin/ikectl/ikectl.c
145
ca_key_install(ca, res->host, res->path);
usr.sbin/ikectl/ikectl.c
148
ca_key_import(ca, res->host, res->path);
usr.sbin/ikectl/parser.c
342
res.host = strdup(word);
usr.sbin/ikectl/parser.h
70
char *host;
usr.sbin/inetd/inetd.c
1227
char *host, *hostlist0, *hostlist, *port;
usr.sbin/inetd/inetd.c
1233
while ((host = strsep(&hostlist, ",")) != NULL) {
usr.sbin/inetd/inetd.c
1234
if (*host == '\0')
usr.sbin/inetd/inetd.c
1242
error = getaddrinfo(strcmp(host, "*") ? host : NULL,
usr.sbin/inetd/inetd.c
1247
host, gai_strerror(error));
usr.sbin/inetd/inetd.c
1262
sep->se_hostaddr = newstr(host);
usr.sbin/iscsid/util.c
130
char host[NI_MAXHOST];
usr.sbin/iscsid/util.c
133
if (getnameinfo(sa, sa->sa_len, host, sizeof(host), port, sizeof(port),
usr.sbin/iscsid/util.c
137
strlcpy(buf, host, sizeof(buf));
usr.sbin/iscsid/util.c
139
snprintf(buf, sizeof(buf), "%s:%s", host, port);
usr.sbin/iscsid/util.c
141
snprintf(buf, sizeof(buf), "[%s]:%s", host, port);
usr.sbin/ldapd/conn.c
259
char host[128];
usr.sbin/ldapd/conn.c
292
print_host(&remote_addr, host, sizeof(host));
usr.sbin/ldapd/conn.c
293
log_debug("accepted connection from %s on fd %d", host, afd);
usr.sbin/ldapd/ldape.c
352
char host[128];
usr.sbin/ldapd/ldape.c
399
print_host(&l->ss, host, sizeof(host));
usr.sbin/ldapd/ldape.c
400
log_info("listening on %s:%d", host, ntohs(l->port));
usr.sbin/ldapd/parse.y
209
if (host($3, cert, &conf->listeners,
usr.sbin/ldapd/parse.y
82
int host(const char *, const char *,
usr.sbin/lpd/engine_lpr.c
200
char host[NI_MAXHOST], addr[NI_MAXHOST], serv[NI_MAXSERV];
usr.sbin/lpd/engine_lpr.c
210
host[0] = '\0';
usr.sbin/lpd/engine_lpr.c
217
lpr_allowedhost_res(connid, host, "Malformed address");
usr.sbin/lpd/engine_lpr.c
222
if ((e = getnameinfo(sa, sa->sa_len, host, sizeof(host), NULL, 0,
usr.sbin/lpd/engine_lpr.c
227
lpr_allowedhost_res(connid, host,
usr.sbin/lpd/engine_lpr.c
233
if (!matchaddr(host, sa, &e)) {
usr.sbin/lpd/engine_lpr.c
236
host, gai_strerror(e));
usr.sbin/lpd/engine_lpr.c
237
lpr_allowedhost_res(connid, host, e ?
usr.sbin/lpd/engine_lpr.c
246
lpr_allowedhost_res(connid, host,
usr.sbin/lpd/engine_lpr.c
276
ok = innetgr(lp + 2, host, NULL, dom);
usr.sbin/lpd/engine_lpr.c
296
lpr_allowedhost_res(connid, host,
usr.sbin/lpd/engine_lpr.c
310
matchaddr(const char *host, const struct sockaddr *sa, int *gaierrno)
usr.sbin/lpd/engine_lpr.c
318
if ((e = getaddrinfo(host, NULL, &hints, &res))) {
usr.sbin/lpd/engine_lpr.c
426
lpr_displayq_res(uint32_t connid, int fd, const char *host, const char *cmd)
usr.sbin/lpd/engine_lpr.c
429
m_add_string(p_frontend, host);
usr.sbin/lpd/engine_lpr.c
479
lpr_rmjob_res(uint32_t connid, int fd, const char *host, const char *cmd)
usr.sbin/lpd/engine_lpr.c
482
m_add_string(p_frontend, host);
usr.sbin/lpd/logmsg.c
117
char host[NI_MAXHOST], serv[NI_MAXSERV];
usr.sbin/lpd/logmsg.c
127
if (getnameinfo(sa, sa->sa_len, host, sizeof(host),
usr.sbin/lpd/logmsg.c
133
snprintf(buf, sizeof(buf), "[%s]:%s", host, serv);
usr.sbin/lpd/logmsg.c
135
snprintf(buf, sizeof(buf), "%s:%s", host, serv);
usr.sbin/lpd/parse.y
113
struct host *host;
usr.sbin/lpd/printer.c
1123
const char *cause = NULL, *host, *port;
usr.sbin/lpd/printer.c
1140
host = lp->lp_host;
usr.sbin/lpd/printer.c
1146
if ((e = getaddrinfo(host, port, &hints, &res0))) {
usr.sbin/lpd/printer.c
1147
log_warnx("%s:%s: %s", host, port, gai_strerror(e));
usr.sbin/lpd/printer.c
1168
log_debug("connected to %s:%s", host, port);
usr.sbin/lpd/printer.c
409
free(job.host);
usr.sbin/lpd/printer.c
410
job.host = xstrdup(line + 1);
usr.sbin/lpd/printer.c
540
free(job.host);
usr.sbin/lpd/printer.c
61
char *host;
usr.sbin/lpd/printer.c
661
argv[argc++] = job->host;
usr.sbin/lpd/printer.c
986
fprintf(fp, "To: %s@%s\n", user, job->host);
usr.sbin/lpd/resolver.c
187
(s->host = malloc(NI_MAXHOST)) &&
usr.sbin/lpd/resolver.c
189
(q = getnameinfo_async(sa, sa->sa_len, s->host, NI_MAXHOST,
usr.sbin/lpd/resolver.c
201
free(s->host);
usr.sbin/lpd/resolver.c
225
const char *cname, *host, *serv;
usr.sbin/lpd/resolver.c
285
m_get_string(proc, &host);
usr.sbin/lpd/resolver.c
290
req->cb_ni(req->arg, gai_errno, host, serv);
usr.sbin/lpd/resolver.c
342
m_add_string(s->proc, ar->ar_gai_errno ? NULL : s->host);
usr.sbin/lpd/resolver.c
346
free(s->host);
usr.sbin/lpd/resolver.c
55
char *host;
usr.sbin/lpr/common_source/common.c
416
if (from != host)
usr.sbin/lpr/common_source/common.c
417
(void)printf("%s: ", host);
usr.sbin/lpr/common_source/common_vars.c
45
char host[HOST_NAME_MAX+1 + 1]; /* host machine name */
usr.sbin/lpr/common_source/common_vars.c
46
char *from = host; /* client's machine name */
usr.sbin/lpr/common_source/displayq.c
153
printf("%s: ", host);
usr.sbin/lpr/common_source/displayq.c
167
printf("%s: ", host);
usr.sbin/lpr/common_source/displayq.c
212
printf("%s: ", host);
usr.sbin/lpr/common_source/displayq.c
278
if (from != host)
usr.sbin/lpr/common_source/displayq.c
279
printf("%s: ", host);
usr.sbin/lpr/common_source/displayq.c
326
printf("\n%s: ", host);
usr.sbin/lpr/common_source/lp.h
81
extern char host[HOST_NAME_MAX+1];
usr.sbin/lpr/common_source/rmjob.c
113
if (from == host)
usr.sbin/lpr/common_source/rmjob.c
235
if (from != host)
usr.sbin/lpr/common_source/rmjob.c
236
printf("%s: ", host);
usr.sbin/lpr/common_source/rmjob.c
259
if (all && (from == host || !strcmp(from, file+6)))
usr.sbin/lpr/common_source/rmjob.c
309
if (!strcmp(person, root) && (from == host || !strcmp(from, file+6)))
usr.sbin/lpr/common_source/rmjob.c
313
if (from != host)
usr.sbin/lpr/common_source/rmjob.c
314
printf("%s: ", host);
usr.sbin/lpr/common_source/rmjob.c
362
if (from != host)
usr.sbin/lpr/common_source/rmjob.c
363
printf("%s: ", host);
usr.sbin/lpr/filters/lpf.c
207
printf("%7.2f\t%s:%s\n", (float)npages, host, name);
usr.sbin/lpr/filters/lpf.c
59
char *host; /* user's machine name */
usr.sbin/lpr/filters/lpf.c
79
host = optarg;
usr.sbin/lpr/lpd/lpd.c
147
gethostname(host, sizeof(host));
usr.sbin/lpr/lpd/lpd.c
606
char host[NI_MAXHOST], ip[NI_MAXHOST];
usr.sbin/lpr/lpd/lpd.c
616
error = getnameinfo(f, f->sa_len, host, sizeof(host), NULL, 0,
usr.sbin/lpr/lpd/lpd.c
619
error = getnameinfo(f, f->sa_len, host, sizeof(host), NULL, 0,
usr.sbin/lpr/lpd/lpd.c
624
fatal("Host name for your address (%s) unknown", host);
usr.sbin/lpr/lpd/lpd.c
627
(void)strlcpy(fromb, host, sizeof(fromb));
usr.sbin/lpr/lpd/lpd.c
631
error = getnameinfo(f, f->sa_len, host, sizeof(host), NULL, 0,
usr.sbin/lpr/lpd/lpd.c
642
fatal("hostname for your address (%s) unknown: %s", host,
usr.sbin/lpr/lpd/lpd.c
648
if (!error && !strcmp(host, ip))
usr.sbin/lpr/lpd/lpd.c
654
fatal("address for your hostname (%s) not matched", host);
usr.sbin/lpr/lpd/printjob.c
1140
printf("Reply-To: root@%s\n\n", host);
usr.sbin/lpr/lpd/printjob.c
1155
printf("\ncould not be printed without an account on %s\n", host);
usr.sbin/lpr/lpq/lpq.c
82
if (gethostname(host, sizeof(host)) != 0)
usr.sbin/lpr/lpr/lpr.c
139
gethostname(host, sizeof (host));
usr.sbin/lpr/lpr/lpr.c
288
card('H', host);
usr.sbin/lpr/lpr/lpr.c
68
static char *class = host; /* class title on header page */
usr.sbin/lpr/lpr/lpr.c
704
if (asprintf(&s, "%s/%sA%03d%s", SD, id, num, host) == -1)
usr.sbin/lpr/lprm/lprm.c
98
gethostname(host, sizeof(host));
usr.sbin/mrinfo/mrinfo.c
286
char *host;
usr.sbin/mrinfo/mrinfo.c
343
host = argv[0];
usr.sbin/mrinfo/mrinfo.c
345
host = "127.0.0.1";
usr.sbin/mrinfo/mrinfo.c
347
if ((target_addr = inet_addr(host)) != -1) {
usr.sbin/mrinfo/mrinfo.c
357
hp = gethostbyname(host);
usr.sbin/mtree/create.c
77
char *argv[2], host[HOST_NAME_MAX+1];
usr.sbin/mtree/create.c
81
(void)gethostname(host, sizeof(host));
usr.sbin/mtree/create.c
84
getlogin(), host, fullpath, ctime(&clock));
usr.sbin/ndp/ndp.c
289
parse_host(const char *host, struct sockaddr_in6 *sin6)
usr.sbin/ndp/ndp.c
299
gai_error = getaddrinfo(host, NULL, &hints, &res);
usr.sbin/ndp/ndp.c
301
warnx("%s: %s", host, gai_strerror(gai_error));
usr.sbin/ndp/ndp.c
330
const char *host = argv[0], *eaddr = argv[1];
usr.sbin/ndp/ndp.c
338
if (parse_host(host, sin))
usr.sbin/ndp/ndp.c
357
errx(1, "RTM_GET(%s) failed", host);
usr.sbin/ndp/ndp.c
380
printf("cannot intuit interface index and type for %s\n", host);
usr.sbin/ndp/ndp.c
392
get(const char *host)
usr.sbin/ndp/ndp.c
397
if (parse_host(host, sin))
usr.sbin/ndp/ndp.c
405
printf("%s (%s) -- no entry\n", host, host_buf);
usr.sbin/ndp/ndp.c
414
delete(const char *host)
usr.sbin/ndp/ndp.c
425
if (parse_host(host, sin))
usr.sbin/ndp/ndp.c
428
warn("%s", host);
usr.sbin/ndp/ndp.c
444
warnx("delete: cannot locate %s", host);
usr.sbin/ndp/ndp.c
449
printf("cannot locate %s\n", host);
usr.sbin/ndp/ndp.c
456
printf("%s (%s) deleted\n", host, host_buf);
usr.sbin/npppd/l2tp/l2tp_ctrl.c
1140
char host[NI_MAXHOST], serv[NI_MAXSERV];
usr.sbin/npppd/l2tp/l2tp_ctrl.c
1237
host, sizeof(host), serv, sizeof(serv),
usr.sbin/npppd/l2tp/l2tp_ctrl.c
1241
strlcpy(host, "error", sizeof(host));
usr.sbin/npppd/l2tp/l2tp_ctrl.c
1246
"hostname=%s vendor=%s firm=%04X", host, serv, _this->tunnel_id,
usr.sbin/nsd/nsd.c
168
char *buf, host[NI_MAXHOST], serv[NI_MAXSERV];
usr.sbin/nsd/nsd.c
181
host, sizeof(host), serv, sizeof(serv),
usr.sbin/nsd/nsd.c
189
cnt += strlcpy(&buf[cnt], host, size - cnt);
usr.sbin/nsd/nsd.c
196
setenv("VERIFY_IPV6_ADDRESS", host, 1);
usr.sbin/nsd/nsd.c
198
setenv("VERIFY_IP_ADDRESS", host, 1);
usr.sbin/nsd/nsd.c
205
setenv("VERIFY_IPV4_ADDRESS", host, 1);
usr.sbin/nsd/nsd.c
208
setenv("VERIFY_IP_ADDRESS", host, 1);
usr.sbin/nsd/nsd.c
235
char *host;
usr.sbin/nsd/nsd.c
249
host = host_buf;
usr.sbin/nsd/nsd.c
258
host = NULL;
usr.sbin/nsd/nsd.c
262
if((ret = getaddrinfo(host, service, hints, &addr)) == 0) {
usr.sbin/nsd/nsd.c
267
host ? host : "(null)",
usr.sbin/nsd/options.c
2097
acl_addr_matches_host(struct acl_options* acl, struct acl_options* host)
usr.sbin/nsd/options.c
2102
struct sockaddr_storage* addr = (struct sockaddr_storage*)&host->addr;
usr.sbin/nsd/options.c
2103
if(!host->is_ipv6) return 0;
usr.sbin/nsd/options.c
2104
return acl_addr_matches_ipv6host(acl, addr, host->port);
usr.sbin/nsd/options.c
2111
struct sockaddr_in* addr = (struct sockaddr_in*)&host->addr;
usr.sbin/nsd/options.c
2112
if(host->is_ipv6) return 0;
usr.sbin/nsd/options.c
2113
return acl_addr_matches_ipv4host(acl, addr, host->port);
usr.sbin/nsd/options.h
595
int acl_addr_matches_host(struct acl_options* acl, struct acl_options* host);
usr.sbin/ntpd/ntpd.h
354
void host(const char *, struct ntp_addr **);
usr.sbin/ntpd/parse.y
337
host($1, &$$->a);
usr.sbin/ntpd/parse.y
381
host($1, &$$->a);
usr.sbin/ntpd/parse.y
392
host(hname, &$$->a);
usr.sbin/ocspcheck/http.c
213
free(http->host);
usr.sbin/ocspcheck/http.c
221
const char *host, short port, const char *path)
usr.sbin/ocspcheck/http.c
290
http->host = strdup(host);
usr.sbin/ocspcheck/http.c
292
if (http->src.ip == NULL || http->host == NULL || http->path == NULL) {
usr.sbin/ocspcheck/http.c
317
if (tls_connect_socket(http->ctx, http->fd, http->host) != 0) {
usr.sbin/ocspcheck/http.c
319
http->host, tls_error(http->ctx));
usr.sbin/ocspcheck/http.c
341
http->path, http->host);
usr.sbin/ocspcheck/http.c
349
http->path, http->host, psz);
usr.sbin/ocspcheck/http.c
60
char *host; /* name of endpoint host */
usr.sbin/ocspcheck/ocspcheck.c
129
url2host(const char *host, short *port, char **path)
usr.sbin/ocspcheck/ocspcheck.c
135
if (strncmp(host, "https://", 8) == 0) {
usr.sbin/ocspcheck/ocspcheck.c
137
if ((url = strdup(host + 8)) == NULL) {
usr.sbin/ocspcheck/ocspcheck.c
141
} else if (strncmp(host, "http://", 7) == 0) {
usr.sbin/ocspcheck/ocspcheck.c
143
if ((url = strdup(host + 7)) == NULL) {
usr.sbin/ocspcheck/ocspcheck.c
148
warnx("%s: unknown schema", host);
usr.sbin/ocspcheck/ocspcheck.c
405
X509_STORE *store, char *host, char *file)
usr.sbin/ocspcheck/ocspcheck.c
431
warnx("OCSP response unserializable from host %s", host);
usr.sbin/ocspcheck/ocspcheck.c
436
warnx("Failed to load OCSP response from %s", host);
usr.sbin/ocspcheck/ocspcheck.c
442
warnx("OCSP verify failed from %s", host);
usr.sbin/ocspcheck/ocspcheck.c
445
dspew("OCSP response signature validated from %s\n", host);
usr.sbin/ocspcheck/ocspcheck.c
450
status, OCSP_response_status_str(status), host);
usr.sbin/ocspcheck/ocspcheck.c
453
dspew("OCSP response status %d from host %s\n", status, host);
usr.sbin/ocspcheck/ocspcheck.c
459
warnx("No OCSP nonce, or mismatch, from host %s", host);
usr.sbin/ocspcheck/ocspcheck.c
529
vspew("OCSP response validated from %s\n", host);
usr.sbin/ocspcheck/ocspcheck.c
553
char *host = NULL, *path = NULL, *certfile = NULL, *outfile = NULL,
usr.sbin/ocspcheck/ocspcheck.c
646
if ((host = url2host(request->url, &port, &path)) == NULL)
usr.sbin/ocspcheck/ocspcheck.c
654
port == 443 ? "https" : "http", host, port, path);
usr.sbin/ocspcheck/ocspcheck.c
656
rescount = host_dns(host, addrs);
usr.sbin/ocspcheck/ocspcheck.c
666
hget = http_get(sources, rescount, host, port, path,
usr.sbin/ocspcheck/ocspcheck.c
683
dspew("Server at %s returns:\n", host);
usr.sbin/ocspcheck/ocspcheck.c
688
errx(1, "No body in reply from %s", host);
usr.sbin/ocspcheck/ocspcheck.c
691
errx(1, "http reply code %d from %s", hget->code, host);
usr.sbin/ocspcheck/ocspcheck.c
698
request, castore, host, certfile))
usr.sbin/ocspcheck/ocspcheck.c
734
request, castore, host, certfile))
usr.sbin/ospf6d/parse.y
1315
if (host(ps, addr) == 0) {
usr.sbin/ospf6d/parse.y
1325
return (host(s, addr));
usr.sbin/ospf6d/parse.y
89
int host(const char *, struct in6_addr *);
usr.sbin/ospfd/parse.y
337
else if (host($3, &r->addr, &r->mask)) {
usr.sbin/ospfd/parse.y
86
int host(const char *, struct in_addr *, struct in_addr *);
usr.sbin/rarpd/arptab.c
111
sin->sin_addr.s_addr = host;
usr.sbin/rarpd/arptab.c
99
arptab_set(u_char *eaddr, u_int32_t host)
usr.sbin/relayctl/relayctl.c
348
struct host *host;
usr.sbin/relayctl/relayctl.c
375
host = imsg->data;
usr.sbin/relayctl/relayctl.c
376
if (host->conf.parentid)
usr.sbin/relayctl/relayctl.c
378
host->conf.name, host->conf.parentid);
usr.sbin/relayctl/relayctl.c
380
strlcpy(name, host->conf.name, sizeof(name));
usr.sbin/relayctl/relayctl.c
382
host->conf.id, "host", name,
usr.sbin/relayctl/relayctl.c
383
print_availability(host->check_cnt, host->up_cnt),
usr.sbin/relayctl/relayctl.c
384
print_host_status(host->up, host->flags));
usr.sbin/relayctl/relayctl.c
385
if (type == SHOW_HOSTS && host->check_cnt) {
usr.sbin/relayctl/relayctl.c
387
"", host->up_cnt, host->check_cnt);
usr.sbin/relayctl/relayctl.c
388
if (host->retry_cnt)
usr.sbin/relayctl/relayctl.c
389
printf(", %d retries", host->retry_cnt);
usr.sbin/relayctl/relayctl.c
390
if (host->he && host->up == HOST_DOWN)
usr.sbin/relayctl/relayctl.c
391
printf(", error: %s", host_error(host->he));
usr.sbin/relayd/agentx_control.c
1086
snmp_hosttrap(struct relayd *env, struct table *table, struct host *host)
usr.sbin/relayd/agentx_control.c
1102
SNMP_ELEMENT(".1.1.0", SNMP_OCTETSTRING, host->conf.name, 0, pdu);
usr.sbin/relayd/agentx_control.c
1103
SNMP_ELEMENT(".1.2.0", SNMP_INTEGER32, NULL, host->up, pdu);
usr.sbin/relayd/agentx_control.c
1104
SNMP_ELEMENT(".1.3.0", SNMP_INTEGER32, NULL, host->last_up, pdu);
usr.sbin/relayd/agentx_control.c
1105
SNMP_ELEMENT(".1.4.0", SNMP_INTEGER32, NULL, host->up_cnt, pdu);
usr.sbin/relayd/agentx_control.c
1106
SNMP_ELEMENT(".1.5.0", SNMP_INTEGER32, NULL, host->check_cnt, pdu);
usr.sbin/relayd/agentx_control.c
1109
if (!host->conf.retry)
usr.sbin/relayd/agentx_control.c
1111
SNMP_ELEMENT(".1.8.0", SNMP_INTEGER32, NULL, host->conf.retry, pdu);
usr.sbin/relayd/agentx_control.c
1112
SNMP_ELEMENT(".1.9.0", SNMP_INTEGER32, NULL, host->retry_cnt, pdu);
usr.sbin/relayd/agentx_control.c
184
struct host *agentxctl_host_byidx(uint32_t, enum agentx_request_type);
usr.sbin/relayd/agentx_control.c
775
struct host *
usr.sbin/relayd/agentx_control.c
778
struct host *host;
usr.sbin/relayd/agentx_control.c
780
TAILQ_FOREACH(host, &(env->sc_hosts), globalentry) {
usr.sbin/relayd/agentx_control.c
781
if (host->conf.id == instanceidx) {
usr.sbin/relayd/agentx_control.c
784
return host;
usr.sbin/relayd/agentx_control.c
786
return TAILQ_NEXT(host, globalentry);
usr.sbin/relayd/agentx_control.c
787
} else if (host->conf.id > instanceidx) {
usr.sbin/relayd/agentx_control.c
790
return host;
usr.sbin/relayd/agentx_control.c
800
struct host *host;
usr.sbin/relayd/agentx_control.c
802
host = agentxctl_host_byidx(agentx_varbind_get_index_integer(sav,
usr.sbin/relayd/agentx_control.c
804
if (host == NULL || host->conf.id > INT32_MAX) {
usr.sbin/relayd/agentx_control.c
809
host->conf.id);
usr.sbin/relayd/agentx_control.c
811
agentx_varbind_integer(sav, host->conf.id);
usr.sbin/relayd/agentx_control.c
813
if (host->conf.parentid > INT32_MAX)
usr.sbin/relayd/agentx_control.c
816
agentx_varbind_integer(sav, host->conf.parentid);
usr.sbin/relayd/agentx_control.c
818
if (host->conf.tableid > INT32_MAX)
usr.sbin/relayd/agentx_control.c
821
agentx_varbind_integer(sav, host->conf.tableid);
usr.sbin/relayd/agentx_control.c
823
agentx_varbind_string(sav, host->conf.name);
usr.sbin/relayd/agentx_control.c
825
agentx_varbind_nstring(sav, sstodata(&host->conf.ss),
usr.sbin/relayd/agentx_control.c
826
sstolen(&host->conf.ss));
usr.sbin/relayd/agentx_control.c
828
if (host->conf.ss.ss_family == AF_INET)
usr.sbin/relayd/agentx_control.c
830
else if (host->conf.ss.ss_family == AF_INET6)
usr.sbin/relayd/agentx_control.c
833
if (host->flags & F_DISABLE)
usr.sbin/relayd/agentx_control.c
835
else if (host->up == HOST_UP)
usr.sbin/relayd/agentx_control.c
837
else if (host->up == HOST_DOWN)
usr.sbin/relayd/agentx_control.c
842
agentx_varbind_counter64(sav, host->check_cnt);
usr.sbin/relayd/agentx_control.c
844
agentx_varbind_counter64(sav, host->up_cnt);
usr.sbin/relayd/agentx_control.c
846
agentx_varbind_integer(sav, host->he);
usr.sbin/relayd/check_icmp.c
119
struct host *host;
usr.sbin/relayd/check_icmp.c
125
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/check_icmp.c
126
if (((struct sockaddr *)&host->conf.ss)->sa_family !=
usr.sbin/relayd/check_icmp.c
129
if (!(host->flags & F_CHECK_DONE))
usr.sbin/relayd/check_icmp.c
140
struct host *host;
usr.sbin/relayd/check_icmp.c
146
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/check_icmp.c
147
if (((struct sockaddr *)&host->conf.ss)->sa_family !=
usr.sbin/relayd/check_icmp.c
150
if (!(host->flags & (F_CHECK_DONE|F_DISABLE))) {
usr.sbin/relayd/check_icmp.c
151
host->up = HOST_DOWN;
usr.sbin/relayd/check_icmp.c
152
hce_notify_done(host, he);
usr.sbin/relayd/check_icmp.c
163
struct host *host;
usr.sbin/relayd/check_icmp.c
199
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/check_icmp.c
200
if (host->flags & (F_DISABLE | F_CHECK_SENT) ||
usr.sbin/relayd/check_icmp.c
201
host->conf.parentid)
usr.sbin/relayd/check_icmp.c
203
if (((struct sockaddr *)&host->conf.ss)->sa_family !=
usr.sbin/relayd/check_icmp.c
207
to = (struct sockaddr *)&host->conf.ss;
usr.sbin/relayd/check_icmp.c
208
id = htonl(host->conf.id);
usr.sbin/relayd/check_icmp.c
224
ttl = host->conf.ttl;
usr.sbin/relayd/check_icmp.c
270
host->flags |= F_CHECK_SENT|F_CHECK_DONE;
usr.sbin/relayd/check_icmp.c
271
host->up = HOST_DOWN;
usr.sbin/relayd/check_icmp.c
274
host->flags |= F_CHECK_SENT;
usr.sbin/relayd/check_icmp.c
295
struct host *host;
usr.sbin/relayd/check_icmp.c
328
host = host_find(cie->env, id);
usr.sbin/relayd/check_icmp.c
329
if (host == NULL) {
usr.sbin/relayd/check_icmp.c
333
if (bcmp(&ss, &host->conf.ss, slen)) {
usr.sbin/relayd/check_icmp.c
338
host->up = HOST_UP;
usr.sbin/relayd/check_icmp.c
339
host->flags |= F_CHECK_DONE;
usr.sbin/relayd/check_icmp.c
340
hce_notify_done(host, HCE_ICMP_OK);
usr.sbin/relayd/check_icmp.c
76
schedule_icmp(struct relayd *env, struct host *host)
usr.sbin/relayd/check_icmp.c
78
host->last_up = host->up;
usr.sbin/relayd/check_icmp.c
79
host->flags &= ~(F_CHECK_SENT|F_CHECK_DONE);
usr.sbin/relayd/check_icmp.c
81
if (((struct sockaddr *)&host->conf.ss)->sa_family == AF_INET)
usr.sbin/relayd/check_script.c
37
check_script(struct relayd *env, struct host *host)
usr.sbin/relayd/check_script.c
42
if ((host->flags & (F_CHECK_SENT|F_CHECK_DONE)) == F_CHECK_SENT)
usr.sbin/relayd/check_script.c
45
if ((table = table_find(env, host->conf.tableid)) == NULL)
usr.sbin/relayd/check_script.c
48
host->last_up = host->up;
usr.sbin/relayd/check_script.c
49
host->flags &= ~(F_CHECK_SENT|F_CHECK_DONE);
usr.sbin/relayd/check_script.c
51
scr.host = host->conf.id;
usr.sbin/relayd/check_script.c
52
if ((strlcpy(scr.name, host->conf.name,sizeof(scr.name)) >=
usr.sbin/relayd/check_script.c
61
host->flags |= F_CHECK_SENT;
usr.sbin/relayd/check_script.c
67
struct host *host;
usr.sbin/relayd/check_script.c
69
if ((host = host_find(env, scr->host)) == NULL)
usr.sbin/relayd/check_script.c
73
host->up = HOST_UNKNOWN;
usr.sbin/relayd/check_script.c
75
host->up = HOST_DOWN;
usr.sbin/relayd/check_script.c
77
host->up = HOST_UP;
usr.sbin/relayd/check_script.c
78
host->flags |= F_CHECK_DONE;
usr.sbin/relayd/check_script.c
80
hce_notify_done(host, host->up == HOST_UP ?
usr.sbin/relayd/check_tcp.c
101
if (connect(s, (struct sockaddr *)&cte->host->conf.ss, len) == -1) {
usr.sbin/relayd/check_tcp.c
109
cte->host->up = HOST_UP;
usr.sbin/relayd/check_tcp.c
117
hce_notify_done(cte->host, he);
usr.sbin/relayd/check_tcp.c
129
hce_notify_done(cte->host, HCE_TCP_CONNECT_TIMEOUT);
usr.sbin/relayd/check_tcp.c
138
hce_notify_done(cte->host, HCE_TCP_CONNECT_FAIL);
usr.sbin/relayd/check_tcp.c
142
cte->host->up = HOST_UP;
usr.sbin/relayd/check_tcp.c
152
cte->host->up = status;
usr.sbin/relayd/check_tcp.c
165
hce_notify_done(cte->host, HCE_TCP_CONNECT_OK);
usr.sbin/relayd/check_tcp.c
209
hce_notify_done(cte->host, HCE_TCP_WRITE_TIMEOUT);
usr.sbin/relayd/check_tcp.c
231
hce_notify_done(cte->host, HCE_TCP_WRITE_FAIL);
usr.sbin/relayd/check_tcp.c
260
cte->host->he = HCE_TCP_READ_TIMEOUT;
usr.sbin/relayd/check_tcp.c
261
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
263
tcp_close(cte, cte->host->up == HOST_UP ? 0 : HOST_DOWN);
usr.sbin/relayd/check_tcp.c
264
hce_notify_done(cte->host, cte->host->he);
usr.sbin/relayd/check_tcp.c
275
hce_notify_done(cte->host, HCE_TCP_READ_FAIL);
usr.sbin/relayd/check_tcp.c
278
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
281
hce_notify_done(cte->host, cte->host->he);
usr.sbin/relayd/check_tcp.c
290
hce_notify_done(cte->host, cte->host->he);
usr.sbin/relayd/check_tcp.c
315
cte->host->he = HCE_SEND_EXPECT_OK;
usr.sbin/relayd/check_tcp.c
316
cte->host->up = HOST_UP;
usr.sbin/relayd/check_tcp.c
331
cte->host->he = HCE_SEND_EXPECT_OK;
usr.sbin/relayd/check_tcp.c
332
cte->host->up = HOST_UP;
usr.sbin/relayd/check_tcp.c
339
cte->host->he = HCE_SEND_EXPECT_FAIL;
usr.sbin/relayd/check_tcp.c
340
cte->host->up = HOST_UNKNOWN;
usr.sbin/relayd/check_tcp.c
351
struct host *host;
usr.sbin/relayd/check_tcp.c
360
host = cte->host;
usr.sbin/relayd/check_tcp.c
361
host->he = HCE_HTTP_CODE_ERROR;
usr.sbin/relayd/check_tcp.c
362
host->code = 0;
usr.sbin/relayd/check_tcp.c
367
__func__, host->conf.name);
usr.sbin/relayd/check_tcp.c
368
host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
373
host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
380
__func__, host->conf.name);
usr.sbin/relayd/check_tcp.c
381
host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
386
__func__, host->conf.name, code);
usr.sbin/relayd/check_tcp.c
387
host->he = HCE_HTTP_CODE_FAIL;
usr.sbin/relayd/check_tcp.c
388
host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
389
host->code = code;
usr.sbin/relayd/check_tcp.c
391
host->he = HCE_HTTP_CODE_OK;
usr.sbin/relayd/check_tcp.c
392
host->up = HOST_UP;
usr.sbin/relayd/check_tcp.c
394
return (!(host->up == HOST_UP));
usr.sbin/relayd/check_tcp.c
402
struct host *host;
usr.sbin/relayd/check_tcp.c
411
host = cte->host;
usr.sbin/relayd/check_tcp.c
412
host->he = HCE_HTTP_DIGEST_ERROR;
usr.sbin/relayd/check_tcp.c
416
__func__, host->conf.name);
usr.sbin/relayd/check_tcp.c
417
host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
426
__func__, host->conf.name);
usr.sbin/relayd/check_tcp.c
427
host->he = HCE_HTTP_DIGEST_FAIL;
usr.sbin/relayd/check_tcp.c
428
host->up = HOST_DOWN;
usr.sbin/relayd/check_tcp.c
430
host->he = HCE_HTTP_DIGEST_OK;
usr.sbin/relayd/check_tcp.c
431
host->up = HOST_UP;
usr.sbin/relayd/check_tcp.c
433
return (!(host->up == HOST_UP));
usr.sbin/relayd/check_tcp.c
58
switch (cte->host->conf.ss.ss_family) {
usr.sbin/relayd/check_tcp.c
60
((struct sockaddr_in *)&cte->host->conf.ss)->sin_port =
usr.sbin/relayd/check_tcp.c
64
((struct sockaddr_in6 *)&cte->host->conf.ss)->sin6_port =
usr.sbin/relayd/check_tcp.c
69
len = ((struct sockaddr *)&cte->host->conf.ss)->sa_len;
usr.sbin/relayd/check_tcp.c
71
if ((s = socket(cte->host->conf.ss.ss_family,
usr.sbin/relayd/check_tcp.c
86
if (cte->host->conf.ttl > 0)
usr.sbin/relayd/check_tcp.c
87
switch (cte->host->conf.ss.ss_family) {
usr.sbin/relayd/check_tcp.c
90
&cte->host->conf.ttl, sizeof(int)) == -1)
usr.sbin/relayd/check_tcp.c
95
&cte->host->conf.ttl, sizeof(int)) == -1)
usr.sbin/relayd/check_tls.c
100
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tls.c
102
hce_notify_done(cte->host, HCE_TLS_WRITE_TIMEOUT);
usr.sbin/relayd/check_tls.c
132
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tls.c
133
check_tls_error(cte, cte->host->conf.name, "cannot write");
usr.sbin/relayd/check_tls.c
135
hce_notify_done(cte->host, HCE_TLS_WRITE_ERROR);
usr.sbin/relayd/check_tls.c
151
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tls.c
152
hce_notify_done(cte->host, HCE_TLS_CONNECT_TIMEOUT);
usr.sbin/relayd/check_tls.c
160
cte->host->up = HOST_UP;
usr.sbin/relayd/check_tls.c
161
hce_notify_done(cte->host, HCE_TLS_CONNECT_OK);
usr.sbin/relayd/check_tls.c
183
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tls.c
184
check_tls_error(cte, cte->host->conf.name,
usr.sbin/relayd/check_tls.c
186
hce_notify_done(cte->host, HCE_TLS_CONNECT_FAIL);
usr.sbin/relayd/check_tls.c
227
check_tls_error(cte, cte->host->conf.name,
usr.sbin/relayd/check_tls.c
231
cte->host->up = HOST_UNKNOWN;
usr.sbin/relayd/check_tls.c
232
hce_notify_done(cte->host, HCE_TLS_CONNECT_ERROR);
usr.sbin/relayd/check_tls.c
49
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tls.c
51
hce_notify_done(cte->host, HCE_TLS_READ_TIMEOUT);
usr.sbin/relayd/check_tls.c
64
hce_notify_done(cte->host, cte->host->he);
usr.sbin/relayd/check_tls.c
68
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tls.c
71
hce_notify_done(cte->host, cte->host->he);
usr.sbin/relayd/check_tls.c
78
cte->host->up = HOST_DOWN;
usr.sbin/relayd/check_tls.c
79
check_tls_error(cte, cte->host->conf.name, "cannot read");
usr.sbin/relayd/check_tls.c
81
hce_notify_done(cte->host, HCE_TLS_READ_ERROR);
usr.sbin/relayd/config.c
267
struct host *h, *ph;
usr.sbin/relayd/config.c
306
struct host *host;
usr.sbin/relayd/config.c
332
TAILQ_FOREACH(host, &tb->hosts, entry) {
usr.sbin/relayd/config.c
334
&host->conf, sizeof(host->conf));
usr.sbin/relayd/config.c
387
struct host *host;
usr.sbin/relayd/config.c
389
if ((host = calloc(1, sizeof(*host))) == NULL)
usr.sbin/relayd/config.c
392
IMSG_SIZE_CHECK(imsg, &host->conf);
usr.sbin/relayd/config.c
393
memcpy(&host->conf, imsg->data, sizeof(host->conf));
usr.sbin/relayd/config.c
395
if (host_find(env, host->conf.id) != NULL) {
usr.sbin/relayd/config.c
397
__func__, host->conf.id);
usr.sbin/relayd/config.c
398
free(host);
usr.sbin/relayd/config.c
402
if ((tb = table_find(env, host->conf.tableid)) == NULL) {
usr.sbin/relayd/config.c
405
host->conf.tableid);
usr.sbin/relayd/config.c
406
free(host);
usr.sbin/relayd/config.c
410
host->tablename = tb->conf.name;
usr.sbin/relayd/config.c
411
host->cte.s = -1;
usr.sbin/relayd/config.c
413
SLIST_INIT(&host->children);
usr.sbin/relayd/config.c
414
TAILQ_INSERT_TAIL(&tb->hosts, host, entry);
usr.sbin/relayd/config.c
415
TAILQ_INSERT_TAIL(&env->sc_hosts, host, globalentry);
usr.sbin/relayd/config.c
419
host->conf.name, tb->conf.name);
usr.sbin/relayd/hce.c
107
struct host *host;
usr.sbin/relayd/hce.c
111
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/hce.c
112
host->he = HCE_ABORT;
usr.sbin/relayd/hce.c
113
if (event_initialized(&host->cte.ev)) {
usr.sbin/relayd/hce.c
114
event_del(&host->cte.ev);
usr.sbin/relayd/hce.c
115
close(host->cte.s);
usr.sbin/relayd/hce.c
132
struct host *host;
usr.sbin/relayd/hce.c
141
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/hce.c
142
if ((host->flags & F_CHECK_DONE) == 0)
usr.sbin/relayd/hce.c
143
host->he = HCE_INTERVAL_TIMEOUT;
usr.sbin/relayd/hce.c
144
if (event_initialized(&host->cte.ev)) {
usr.sbin/relayd/hce.c
145
event_del(&host->cte.ev);
usr.sbin/relayd/hce.c
146
close(host->cte.s);
usr.sbin/relayd/hce.c
148
host->cte.s = -1;
usr.sbin/relayd/hce.c
166
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/hce.c
167
if (host->flags & F_DISABLE || host->conf.parentid)
usr.sbin/relayd/hce.c
169
bcopy(&tv, &host->cte.tv_start,
usr.sbin/relayd/hce.c
170
sizeof(host->cte.tv_start));
usr.sbin/relayd/hce.c
173
schedule_icmp(env, host);
usr.sbin/relayd/hce.c
176
check_script(env, host);
usr.sbin/relayd/hce.c
180
host->last_up = host->up;
usr.sbin/relayd/hce.c
181
host->cte.host = host;
usr.sbin/relayd/hce.c
182
host->cte.table = table;
usr.sbin/relayd/hce.c
183
check_tcp(&host->cte);
usr.sbin/relayd/hce.c
195
hce_notify_done(struct host *host, enum host_error he)
usr.sbin/relayd/hce.c
202
struct host *h, *hostnst;
usr.sbin/relayd/hce.c
207
if ((hostnst = host_find(env, host->conf.id)) == NULL)
usr.sbin/relayd/hce.c
210
if ((table = table_find(env, host->conf.tableid)) == NULL)
usr.sbin/relayd/hce.c
217
host->conf.name, table_check(table->conf.check),
usr.sbin/relayd/hce.c
220
host->flags |= (F_CHECK_SENT|F_CHECK_DONE);
usr.sbin/relayd/hce.c
224
hostup = host->up;
usr.sbin/relayd/hce.c
225
host->he = he;
usr.sbin/relayd/hce.c
227
if (host->up == HOST_DOWN && host->retry_cnt) {
usr.sbin/relayd/hce.c
229
host->conf.name, host->retry_cnt);
usr.sbin/relayd/hce.c
230
host->up = host->last_up;
usr.sbin/relayd/hce.c
231
host->retry_cnt--;
usr.sbin/relayd/hce.c
233
host->retry_cnt = host->conf.retry;
usr.sbin/relayd/hce.c
234
if (host->up != HOST_UNKNOWN) {
usr.sbin/relayd/hce.c
235
host->check_cnt++;
usr.sbin/relayd/hce.c
236
if (host->up == HOST_UP)
usr.sbin/relayd/hce.c
237
host->up_cnt++;
usr.sbin/relayd/hce.c
239
st.id = host->conf.id;
usr.sbin/relayd/hce.c
240
st.up = host->up;
usr.sbin/relayd/hce.c
241
st.check_cnt = host->check_cnt;
usr.sbin/relayd/hce.c
242
st.retry_cnt = host->retry_cnt;
usr.sbin/relayd/hce.c
244
host->flags |= (F_CHECK_SENT|F_CHECK_DONE);
usr.sbin/relayd/hce.c
247
log_debug("%s: %s (%s)", __func__, host->conf.name, msg);
usr.sbin/relayd/hce.c
250
if (host->up != host->last_up)
usr.sbin/relayd/hce.c
254
timersub(&tv_now, &host->cte.tv_start, &tv_dur);
usr.sbin/relayd/hce.c
255
if (timercmp(&host->cte.tv_start, &tv_dur, >))
usr.sbin/relayd/hce.c
261
if (host->code > 0)
usr.sbin/relayd/hce.c
262
asprintf(&codemsg, ",%d", host->code);
usr.sbin/relayd/hce.c
265
host->conf.name, table_check(table->conf.check),
usr.sbin/relayd/hce.c
268
host_status(host->last_up), host_status(host->up),
usr.sbin/relayd/hce.c
269
print_availability(host->check_cnt, host->up_cnt));
usr.sbin/relayd/hce.c
273
host->last_up = host->up;
usr.sbin/relayd/hce.c
275
if (SLIST_EMPTY(&host->children))
usr.sbin/relayd/hce.c
279
SLIST_FOREACH(h, &host->children, child) {
usr.sbin/relayd/hce.c
289
struct host *host;
usr.sbin/relayd/hce.c
295
if ((host = host_find(env, id)) == NULL)
usr.sbin/relayd/hce.c
297
host->flags |= F_DISABLE;
usr.sbin/relayd/hce.c
298
host->up = HOST_UNKNOWN;
usr.sbin/relayd/hce.c
299
host->check_cnt = 0;
usr.sbin/relayd/hce.c
300
host->up_cnt = 0;
usr.sbin/relayd/hce.c
301
host->he = HCE_NONE;
usr.sbin/relayd/hce.c
305
if ((host = host_find(env, id)) == NULL)
usr.sbin/relayd/hce.c
307
host->flags &= ~(F_DISABLE);
usr.sbin/relayd/hce.c
308
host->up = HOST_UNKNOWN;
usr.sbin/relayd/hce.c
309
host->he = HCE_NONE;
usr.sbin/relayd/hce.c
316
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/hce.c
317
host->up = HOST_UNKNOWN;
usr.sbin/relayd/hce.c
324
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/hce.c
325
host->up = HOST_UNKNOWN;
usr.sbin/relayd/parse.y
114
static struct host *hst = NULL;
usr.sbin/relayd/parse.y
134
int host(const char *, struct addresslist *,
usr.sbin/relayd/parse.y
148
struct host *host;
usr.sbin/relayd/parse.y
193
%type <v.host> host
usr.sbin/relayd/parse.y
1939
if (host($3, &al, 1, &$4, NULL, -1) <= 0) {
usr.sbin/relayd/parse.y
2021
if (host($1, &al, 1, &$2, NULL, -1) <= 0) {
usr.sbin/relayd/parse.y
2238
host : address {
usr.sbin/relayd/parse.y
2323
if (host($1, &al, 1, NULL, NULL, -1) <= 0) {
usr.sbin/relayd/parse.y
2930
struct host *h, *ph;
usr.sbin/relayd/parse.y
3322
struct host *h, *dsth;
usr.sbin/relayd/parse.y
3370
if ((h = (struct host *)
usr.sbin/relayd/parse.y
610
if (host($3, &rdr->virts,
usr.sbin/relayd/parse.y
734
tablelist : host {
usr.sbin/relayd/pfe.c
123
struct host *host;
usr.sbin/relayd/pfe.c
133
if ((host = host_find(env, st.id)) == NULL)
usr.sbin/relayd/pfe.c
135
host->he = st.he;
usr.sbin/relayd/pfe.c
136
if (host->flags & F_DISABLE)
usr.sbin/relayd/pfe.c
138
host->retry_cnt = st.retry_cnt;
usr.sbin/relayd/pfe.c
140
host->check_cnt++;
usr.sbin/relayd/pfe.c
142
host->up_cnt++;
usr.sbin/relayd/pfe.c
144
if (host->check_cnt != st.check_cnt) {
usr.sbin/relayd/pfe.c
146
host->conf.id, host->up);
usr.sbin/relayd/pfe.c
150
if (host->up == st.up)
usr.sbin/relayd/pfe.c
157
if ((table = table_find(env, host->conf.tableid))
usr.sbin/relayd/pfe.c
162
st.up, host->conf.id, host->conf.name);
usr.sbin/relayd/pfe.c
166
snmp_hosttrap(env, table, host);
usr.sbin/relayd/pfe.c
176
host->flags |= F_ADD;
usr.sbin/relayd/pfe.c
177
host->flags &= ~(F_DEL);
usr.sbin/relayd/pfe.c
178
} else if (HOST_ISUP(host->up)) {
usr.sbin/relayd/pfe.c
181
host->flags |= F_DEL;
usr.sbin/relayd/pfe.c
182
host->flags &= ~(F_ADD);
usr.sbin/relayd/pfe.c
183
host->up = st.up;
usr.sbin/relayd/pfe.c
187
host->up = st.up;
usr.sbin/relayd/pfe.c
357
struct host *host;
usr.sbin/relayd/pfe.c
377
TAILQ_FOREACH(host, &rdr->table->hosts, entry)
usr.sbin/relayd/pfe.c
379
0, 0, -1, host, sizeof(*host));
usr.sbin/relayd/pfe.c
386
TAILQ_FOREACH(host, &rdr->backup->hosts, entry)
usr.sbin/relayd/pfe.c
388
0, 0, -1, host, sizeof(*host));
usr.sbin/relayd/pfe.c
404
TAILQ_FOREACH(host,
usr.sbin/relayd/pfe.c
408
host, sizeof(*host));
usr.sbin/relayd/pfe.c
427
TAILQ_FOREACH(host, &rt->rt_gwtable->hosts, entry)
usr.sbin/relayd/pfe.c
429
0, 0, -1, host, sizeof(*host));
usr.sbin/relayd/pfe.c
518
struct host *host;
usr.sbin/relayd/pfe.c
534
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/pfe.c
535
host->up = HOST_UNKNOWN;
usr.sbin/relayd/pfe.c
552
struct host *host;
usr.sbin/relayd/pfe.c
570
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/pfe.c
571
host->up = HOST_UNKNOWN;
usr.sbin/relayd/pfe.c
585
disable_host(struct ctl_conn *c, struct ctl_id *id, struct host *host)
usr.sbin/relayd/pfe.c
587
struct host *h;
usr.sbin/relayd/pfe.c
591
if (host == NULL) {
usr.sbin/relayd/pfe.c
593
host = host_findbyname(env, id->name);
usr.sbin/relayd/pfe.c
597
host = host_find(env, id->id);
usr.sbin/relayd/pfe.c
598
if (host == NULL || host->conf.parentid)
usr.sbin/relayd/pfe.c
601
id->id = host->conf.id;
usr.sbin/relayd/pfe.c
603
if (host->flags & F_DISABLE)
usr.sbin/relayd/pfe.c
606
if (host->up == HOST_UP) {
usr.sbin/relayd/pfe.c
607
if ((table = table_find(env, host->conf.tableid)) == NULL)
usr.sbin/relayd/pfe.c
613
host->up = HOST_UNKNOWN;
usr.sbin/relayd/pfe.c
614
host->flags |= F_DISABLE;
usr.sbin/relayd/pfe.c
615
host->flags |= F_DEL;
usr.sbin/relayd/pfe.c
616
host->flags &= ~(F_ADD);
usr.sbin/relayd/pfe.c
617
host->check_cnt = 0;
usr.sbin/relayd/pfe.c
618
host->up_cnt = 0;
usr.sbin/relayd/pfe.c
621
&host->conf.id, sizeof(host->conf.id));
usr.sbin/relayd/pfe.c
625
&host->conf.id, sizeof(host->conf.id));
usr.sbin/relayd/pfe.c
626
log_debug("%s: host %d", __func__, host->conf.id);
usr.sbin/relayd/pfe.c
628
if (!host->conf.parentid) {
usr.sbin/relayd/pfe.c
630
SLIST_FOREACH(h, &host->children, child)
usr.sbin/relayd/pfe.c
638
host->conf.name) == 0 &&
usr.sbin/relayd/pfe.c
639
h->conf.id != host->conf.id &&
usr.sbin/relayd/pfe.c
648
enable_host(struct ctl_conn *c, struct ctl_id *id, struct host *host)
usr.sbin/relayd/pfe.c
650
struct host *h;
usr.sbin/relayd/pfe.c
655
if (host == NULL) {
usr.sbin/relayd/pfe.c
657
host = host_findbyname(env, id->name);
usr.sbin/relayd/pfe.c
661
host = host_find(env, id->id);
usr.sbin/relayd/pfe.c
662
if (host == NULL || host->conf.parentid)
usr.sbin/relayd/pfe.c
665
id->id = host->conf.id;
usr.sbin/relayd/pfe.c
667
if (!(host->flags & F_DISABLE))
usr.sbin/relayd/pfe.c
670
host->up = HOST_UNKNOWN;
usr.sbin/relayd/pfe.c
671
host->flags &= ~(F_DISABLE);
usr.sbin/relayd/pfe.c
672
host->flags &= ~(F_DEL);
usr.sbin/relayd/pfe.c
673
host->flags &= ~(F_ADD);
usr.sbin/relayd/pfe.c
676
&host->conf.id, sizeof (host->conf.id));
usr.sbin/relayd/pfe.c
680
&host->conf.id, sizeof(host->conf.id));
usr.sbin/relayd/pfe.c
682
log_debug("%s: host %d", __func__, host->conf.id);
usr.sbin/relayd/pfe.c
684
if (!host->conf.parentid) {
usr.sbin/relayd/pfe.c
686
SLIST_FOREACH(h, &host->children, child)
usr.sbin/relayd/pfe.c
694
host->conf.name) == 0 &&
usr.sbin/relayd/pfe.c
695
h->conf.id != host->conf.id &&
usr.sbin/relayd/pfe_filter.c
143
struct host *host;
usr.sbin/relayd/pfe_filter.c
176
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/pfe_filter.c
177
if (host->up != HOST_UP)
usr.sbin/relayd/pfe_filter.c
180
switch (host->conf.ss.ss_family) {
usr.sbin/relayd/pfe_filter.c
182
sain = (struct sockaddr_in *)&host->conf.ss;
usr.sbin/relayd/pfe_filter.c
189
sain6 = (struct sockaddr_in6 *)&host->conf.ss;
usr.sbin/relayd/pfe_filter.c
223
struct host *host;
usr.sbin/relayd/pfe_filter.c
235
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/pfe_filter.c
236
if (host->up != HOST_DOWN)
usr.sbin/relayd/pfe_filter.c
239
switch (host->conf.ss.ss_family) {
usr.sbin/relayd/pfe_filter.c
241
sain = (struct sockaddr_in *)&host->conf.ss;
usr.sbin/relayd/pfe_filter.c
247
sain6 = (struct sockaddr_in6 *)&host->conf.ss;
usr.sbin/relayd/pfe_filter.c
257
psnk.psnk_af = host->conf.ss.ss_family;
usr.sbin/relayd/pfe_route.c
141
hdr.rtm_priority = crt->host.priority;
usr.sbin/relayd/pfe_route.c
147
gw = crt->host.ss;
usr.sbin/relayd/pfe_route.c
148
gwname = crt->host.name;
usr.sbin/relayd/pfe_route.c
59
struct host *host;
usr.sbin/relayd/pfe_route.c
68
TAILQ_FOREACH(host, &rt->rt_gwtable->hosts, entry) {
usr.sbin/relayd/pfe_route.c
69
if (host->up == HOST_UNKNOWN)
usr.sbin/relayd/pfe_route.c
76
host->conf.name,
usr.sbin/relayd/pfe_route.c
77
HOST_ISUP(host->up) ? "up" : "down",
usr.sbin/relayd/pfe_route.c
78
host->conf.priority);
usr.sbin/relayd/pfe_route.c
80
crt.up = host->up;
usr.sbin/relayd/pfe_route.c
82
memcpy(&crt.host, &host->conf, sizeof(host->conf));
usr.sbin/relayd/relay.c
1294
struct host *host = NULL;
usr.sbin/relayd/relay.c
1368
host = rlt->rlt_host[idx];
usr.sbin/relayd/relay.c
1373
host->conf.name, p, idx, cnt, maxtries);
usr.sbin/relayd/relay.c
1375
if (!table->conf.check || host->up == HOST_UP)
usr.sbin/relayd/relay.c
1381
host = rlt->rlt_host[idx];
usr.sbin/relayd/relay.c
1383
__func__, con->se_id, table->conf.name, host->conf.name,
usr.sbin/relayd/relay.c
1387
while (host != NULL) {
usr.sbin/relayd/relay.c
1389
con->se_id, host->conf.name);
usr.sbin/relayd/relay.c
1390
if (!table->conf.check || host->up == HOST_UP)
usr.sbin/relayd/relay.c
1392
host = TAILQ_NEXT(host, entry);
usr.sbin/relayd/relay.c
1394
TAILQ_FOREACH(host, &table->hosts, entry) {
usr.sbin/relayd/relay.c
1396
__func__, con->se_id, host->conf.name);
usr.sbin/relayd/relay.c
1397
if (!table->conf.check || host->up == HOST_UP)
usr.sbin/relayd/relay.c
1406
rlt->rlt_index = host->idx + 1;
usr.sbin/relayd/relay.c
1407
con->se_retry = host->conf.retry;
usr.sbin/relayd/relay.c
1409
bcopy(&host->conf.ss, &con->se_out.ss, sizeof(con->se_out.ss));
usr.sbin/relayd/relay.c
1865
struct host *host;
usr.sbin/relayd/relay.c
1874
if ((host = host_find(env, id)) == NULL)
usr.sbin/relayd/relay.c
1876
if ((table = table_find(env, host->conf.tableid)) ==
usr.sbin/relayd/relay.c
1879
if (host->up == HOST_UP)
usr.sbin/relayd/relay.c
1881
host->flags |= F_DISABLE;
usr.sbin/relayd/relay.c
1882
host->up = HOST_UNKNOWN;
usr.sbin/relayd/relay.c
1886
if ((host = host_find(env, id)) == NULL)
usr.sbin/relayd/relay.c
1888
host->flags &= ~(F_DISABLE);
usr.sbin/relayd/relay.c
1889
host->up = HOST_UNKNOWN;
usr.sbin/relayd/relay.c
1897
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/relay.c
1898
host->up = HOST_UNKNOWN;
usr.sbin/relayd/relay.c
1906
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/relay.c
1907
host->up = HOST_UNKNOWN;
usr.sbin/relayd/relay.c
1912
if ((host = host_find(env, st.id)) == NULL)
usr.sbin/relayd/relay.c
1914
if (host->flags & F_DISABLE)
usr.sbin/relayd/relay.c
1916
if (host->up == st.up) {
usr.sbin/relayd/relay.c
1918
host->conf.id, host->up);
usr.sbin/relayd/relay.c
1922
if ((table = table_find(env, host->conf.tableid))
usr.sbin/relayd/relay.c
1928
host->conf.id, host->conf.name);
usr.sbin/relayd/relay.c
1930
if ((st.up == HOST_UNKNOWN && host->up == HOST_DOWN) ||
usr.sbin/relayd/relay.c
1931
(st.up == HOST_DOWN && host->up == HOST_UNKNOWN)) {
usr.sbin/relayd/relay.c
1932
host->up = st.up;
usr.sbin/relayd/relay.c
1939
host->up = st.up;
usr.sbin/relayd/relay.c
444
struct host *host;
usr.sbin/relayd/relay.c
462
TAILQ_FOREACH(host, &rlt->rlt_table->hosts, entry) {
usr.sbin/relayd/relay.c
466
host->idx = rlt->rlt_nhosts;
usr.sbin/relayd/relay.c
467
rlt->rlt_host[rlt->rlt_nhosts++] = host;
usr.sbin/relayd/relay_http.c
1180
struct kv *host, key;
usr.sbin/relayd/relay_http.c
1188
host = kv_find(&desc->http_headers, &key);
usr.sbin/relayd/relay_http.c
1189
if (host) {
usr.sbin/relayd/relay_http.c
1190
if (host->kv_value == NULL)
usr.sbin/relayd/relay_http.c
1192
snprintf(ibuf, sizeof(ibuf), "%s", host->kv_value);
usr.sbin/relayd/relay_http.c
1495
struct kv *host, key;
usr.sbin/relayd/relay_http.c
1505
host = kv_find(&desc->http_headers, &key);
usr.sbin/relayd/relay_http.c
1507
if (host == NULL || host->kv_value == NULL)
usr.sbin/relayd/relay_http.c
1513
} else if ((res = relay_lookup_url(cre, host->kv_value, kv)) != 0)
usr.sbin/relayd/relay_http.c
1605
struct kv *host = NULL;
usr.sbin/relayd/relay_http.c
1760
host = kv_find(&desc->http_headers, &key);
usr.sbin/relayd/relay_http.c
1763
if (host == NULL ||
usr.sbin/relayd/relay_http.c
1764
host->kv_value == NULL)
usr.sbin/relayd/relay_http.c
1767
host->kv_value, mp->kv_key) ==
usr.sbin/relayd/relay_http.c
191
char *urlproto, *host, *path;
usr.sbin/relayd/relay_http.c
375
&urlproto, &host, &path) == 0) {
usr.sbin/relayd/relay_http.c
376
ret = strcasecmp(host, value);
usr.sbin/relayd/relay_http.c
378
free(host);
usr.sbin/relayd/relay_http.c
817
_relay_lookup_url(struct ctl_relay_event *cre, char *host, char *path,
usr.sbin/relayd/relay_http.c
826
host, path,
usr.sbin/relayd/relay_http.c
865
relay_lookup_url(struct ctl_relay_event *cre, const char *host, struct kv *kv)
usr.sbin/relayd/relay_http.c
883
__func__, host, desc->http_path,
usr.sbin/relayd/relay_http.c
886
if (canonicalize_host(host, ph, sizeof(ph)) == NULL) {
usr.sbin/relayd/relayd.c
1058
struct host *
usr.sbin/relayd/relayd.c
1062
struct host *host;
usr.sbin/relayd/relayd.c
1065
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/relayd.c
1066
if (host->conf.id == id)
usr.sbin/relayd/relayd.c
1067
return (host);
usr.sbin/relayd/relayd.c
1150
struct host *
usr.sbin/relayd/relayd.c
1154
struct host *host;
usr.sbin/relayd/relayd.c
1157
TAILQ_FOREACH(host, &table->hosts, entry)
usr.sbin/relayd/relayd.c
1158
if (strcmp(host->conf.name, name) == 0)
usr.sbin/relayd/relayd.c
1159
return (host);
usr.sbin/relayd/relayd.c
1549
canonicalize_host(const char *host, char *name, size_t len)
usr.sbin/relayd/relayd.c
1563
if (inet_pton(AF_INET, host, &sin4) == 1)
usr.sbin/relayd/relayd.c
1565
if (inet_pton(AF_INET6, host, &sin6) == 1)
usr.sbin/relayd/relayd.c
1573
plen = strlen(host);
usr.sbin/relayd/relayd.c
1578
c = tolower((unsigned char)host[i]);
usr.sbin/relayd/relayd.c
1604
char *p, *proto = NULL, *host = NULL, *path = NULL;
usr.sbin/relayd/relayd.c
1618
if (*p == '\0' || (host = strdup(p)) == NULL)
usr.sbin/relayd/relayd.c
1623
if ((p = strchr(host, '/')) == NULL)
usr.sbin/relayd/relayd.c
1629
host[strcspn(host, "/")] = '\0';
usr.sbin/relayd/relayd.c
1632
url, proto, host, path);
usr.sbin/relayd/relayd.c
1635
*hostptr = host;
usr.sbin/relayd/relayd.c
1642
free(host);
usr.sbin/relayd/relayd.c
419
crt.host.name[sizeof(crt.host.name) - 1] = '\0';
usr.sbin/relayd/relayd.c
534
struct host *host;
usr.sbin/relayd/relayd.c
536
while ((host = TAILQ_FIRST(&table->hosts)) != NULL) {
usr.sbin/relayd/relayd.c
537
TAILQ_REMOVE(&table->hosts, host, entry);
usr.sbin/relayd/relayd.c
538
TAILQ_REMOVE(&env->sc_hosts, host, globalentry);
usr.sbin/relayd/relayd.c
539
if (event_initialized(&host->cte.ev)) {
usr.sbin/relayd/relayd.c
540
event_del(&host->cte.ev);
usr.sbin/relayd/relayd.c
541
close(host->cte.s);
usr.sbin/relayd/relayd.c
543
ibuf_free(host->cte.buf);
usr.sbin/relayd/relayd.c
544
tls_free(host->cte.tls);
usr.sbin/relayd/relayd.c
545
free(host);
usr.sbin/relayd/relayd.h
1185
int enable_host(struct ctl_conn *, struct ctl_id *, struct host *);
usr.sbin/relayd/relayd.h
1188
int disable_host(struct ctl_conn *, struct ctl_id *, struct host *);
usr.sbin/relayd/relayd.h
1207
void hce_notify_done(struct host *, enum host_error);
usr.sbin/relayd/relayd.h
1277
void schedule_icmp(struct relayd *, struct host *);
usr.sbin/relayd/relayd.h
1287
void check_script(struct relayd *, struct host *);
usr.sbin/relayd/relayd.h
1303
struct host *host_find(struct relayd *, objid_t);
usr.sbin/relayd/relayd.h
1308
struct host *host_findbyname(struct relayd *, const char *);
usr.sbin/relayd/relayd.h
1396
void snmp_hosttrap(struct relayd *, struct table *, struct host *);
usr.sbin/relayd/relayd.h
155
objid_t host;
usr.sbin/relayd/relayd.h
179
struct host *host;
usr.sbin/relayd/relayd.h
434
TAILQ_ENTRY(host) entry;
usr.sbin/relayd/relayd.h
435
TAILQ_ENTRY(host) globalentry;
usr.sbin/relayd/relayd.h
436
SLIST_ENTRY(host) child;
usr.sbin/relayd/relayd.h
437
SLIST_HEAD(,host) children;
usr.sbin/relayd/relayd.h
451
TAILQ_HEAD(hostlist, host);
usr.sbin/relayd/relayd.h
776
struct host *rlt_host[RELAY_MAXHOSTS];
usr.sbin/relayd/relayd.h
903
struct host_config host;
usr.sbin/ripd/parse.y
224
else if (host($3, &r->addr, &r->mask))
usr.sbin/ripd/parse.y
95
int host(const char *, struct in_addr *, struct in_addr *);
usr.sbin/rpc.bootparamd/bootparamd.c
147
255 & whoami->client_address.bp_address_u.ip_addr.host,
usr.sbin/rpc.bootparamd/bootparamd.c
153
255 & whoami->client_address.bp_address_u.ip_addr.host,
usr.sbin/rpc.bootparamd/bootparamd.c
183
255 & res.router_address.bp_address_u.ip_addr.host,
usr.sbin/rpc.bootparamd/bootparamd.c
190
255 & res.router_address.bp_address_u.ip_addr.host,
usr.sbin/rpc.bootparamd/bootparamd.c
252
255 & res.server_address.bp_address_u.ip_addr.host,
usr.sbin/rpc.bootparamd/bootparamd.c
260
255 & res.server_address.bp_address_u.ip_addr.host,
usr.sbin/rpc.lockd/lockd_lock.c
123
LIST_HEAD(hostlst_head, host);
usr.sbin/rpc.lockd/lockd_lock.c
128
LIST_ENTRY(host) hostlst;
usr.sbin/rpc.lockd/lockd_lock.c
761
struct host *hp;
usr.sbin/rpc.lockd/lockd_lock.c
774
hp = malloc(sizeof(struct host));
usr.sbin/rpc.lockd/procs.c
67
struct hostent *host;
usr.sbin/rpc.lockd/procs.c
71
host = gethostbyaddr((char *) &(addr->sin_addr), addr->sin_len, AF_INET);
usr.sbin/rpc.lockd/procs.c
72
if (host)
usr.sbin/rpc.lockd/procs.c
73
strlcpy(hostname_buf, host->h_name, sizeof(hostname_buf));
usr.sbin/rpki-client/http.c
1128
if (tls_connect_socket(conn->tls, conn->fd, conn->host) == -1) {
usr.sbin/rpki-client/http.c
1160
char *host;
usr.sbin/rpki-client/http.c
1167
if (strchr(conn->host, ':')) {
usr.sbin/rpki-client/http.c
1168
if (asprintf(&host, "[%s]:%s", conn->host, conn->port) == -1)
usr.sbin/rpki-client/http.c
1172
if (asprintf(&host, "%s:%s", conn->host, conn->port) == -1)
usr.sbin/rpki-client/http.c
1181
"User-Agent: " HTTP_USER_AGENT "\r\n%s\r\n", host, host,
usr.sbin/rpki-client/http.c
1186
free(host);
usr.sbin/rpki-client/http.c
119
char *host;
usr.sbin/rpki-client/http.c
1197
char *host, *epath, *modified_since;
usr.sbin/rpki-client/http.c
1212
if (strchr(conn->host, ':')) {
usr.sbin/rpki-client/http.c
1213
if (asprintf(&host, "[%s]%s%s", conn->host,
usr.sbin/rpki-client/http.c
1218
if (asprintf(&host, "%s%s%s", conn->host,
usr.sbin/rpki-client/http.c
1244
epath, host,
usr.sbin/rpki-client/http.c
1250
free(host);
usr.sbin/rpki-client/http.c
152
char *host;
usr.sbin/rpki-client/http.c
258
uri = conn->host;
usr.sbin/rpki-client/http.c
411
char *fullhost, *host, *port = NULL, *cred, *cookie = NULL;
usr.sbin/rpki-client/http.c
419
host = uri + HTTP_PROTO_LEN;
usr.sbin/rpki-client/http.c
420
if ((fullhost = strndup(host, strcspn(host, "/"))) == NULL)
usr.sbin/rpki-client/http.c
424
host = strchr(cred, '@');
usr.sbin/rpki-client/http.c
425
if (host != NULL)
usr.sbin/rpki-client/http.c
426
*host++ = '\0';
usr.sbin/rpki-client/http.c
428
host = cred;
usr.sbin/rpki-client/http.c
432
if (*host == '[') {
usr.sbin/rpki-client/http.c
435
if ((hosttail = strrchr(host, ']')) == NULL)
usr.sbin/rpki-client/http.c
439
host++;
usr.sbin/rpki-client/http.c
444
if ((port = strrchr(host, ':')) != NULL)
usr.sbin/rpki-client/http.c
463
if ((proxy.proxyhost = strdup(host)) == NULL)
usr.sbin/rpki-client/http.c
480
char *host, *port = NULL, *path;
usr.sbin/rpki-client/http.c
487
host = uri + HTTPS_PROTO_LEN;
usr.sbin/rpki-client/http.c
488
if ((path = strchr(host, '/')) == NULL) {
usr.sbin/rpki-client/http.c
497
if (memchr(host, '@', path - host) != NULL) {
usr.sbin/rpki-client/http.c
502
if (*host == '[') {
usr.sbin/rpki-client/http.c
503
if ((hosttail = memrchr(host, ']', path - host)) == NULL) {
usr.sbin/rpki-client/http.c
508
host++;
usr.sbin/rpki-client/http.c
512
if ((hosttail = memrchr(host, ':', path - host)) != NULL)
usr.sbin/rpki-client/http.c
518
if ((host = strndup(host, hosttail - host)) == NULL)
usr.sbin/rpki-client/http.c
530
*ohost = host;
usr.sbin/rpki-client/http.c
542
http_resolv(struct addrinfo **res, const char *host, const char *port)
usr.sbin/rpki-client/http.c
550
error = getaddrinfo(host, port, &hints, res);
usr.sbin/rpki-client/http.c
556
error = getaddrinfo(host, "443", &hints, res);
usr.sbin/rpki-client/http.c
558
warnx("%s: %s", host, gai_strerror(error));
usr.sbin/rpki-client/http.c
573
char *host, *port, *path;
usr.sbin/rpki-client/http.c
575
if (http_parse_uri(uri, &host, &port, &path) == -1) {
usr.sbin/rpki-client/http.c
588
req->host = host;
usr.sbin/rpki-client/http.c
607
free(req->host);
usr.sbin/rpki-client/http.c
661
if (strcmp(conn->host, req->host) != 0)
usr.sbin/rpki-client/http.c
846
if ((conn->host = strdup(req->host)) == NULL)
usr.sbin/rpki-client/http.c
862
if (http_resolv(&conn->res0, conn->host, conn->port) == -1) {
usr.sbin/rpki-client/http.c
889
free(conn->host);
usr.sbin/rpki-client/main.c
518
char *nfile, *npath, *host;
usr.sbin/rpki-client/main.c
525
host = cert->repo + RSYNC_PROTO_LEN;
usr.sbin/rpki-client/main.c
528
if (strncasecmp(host, le->fqdn, strcspn(host, "/")) == 0) {
usr.sbin/rpki-client/main.c
535
if (strncasecmp(host, le->fqdn, strcspn(host, "/")) == 0) {
usr.sbin/rpki-client/rsync.c
66
const char *host, *module, *rest;
usr.sbin/rpki-client/rsync.c
76
host = uri + RSYNC_PROTO_LEN;
usr.sbin/rpki-client/rsync.c
78
if ((module = strchr(host, '/')) == NULL) {
usr.sbin/rpki-client/rsync.c
81
} else if (module == host) {
usr.sbin/sasyncd/net.c
109
char host[NI_MAXHOST], port[NI_MAXSERV];
usr.sbin/sasyncd/net.c
141
if (getnameinfo(sa, sa->sa_len, host, sizeof host, port, sizeof port,
usr.sbin/sasyncd/net.c
146
log_msg(2, "listening on %s port %s fd %d", host, port, s);
usr.sbin/smtpd/dns.c
108
const char *domain, *mx, *host;
usr.sbin/smtpd/dns.c
121
m_get_string(&m, &host);
usr.sbin/smtpd/dns.c
123
dns_lookup_host(s, host, -1);
usr.sbin/smtpd/dns.c
202
m_add_string(s->p, lookup->host);
usr.sbin/smtpd/dns.c
207
free(lookup->host);
usr.sbin/smtpd/dns.c
341
dns_lookup_host(struct dns_session *s, const char *host, int preference)
usr.sbin/smtpd/dns.c
35
char *host;
usr.sbin/smtpd/dns.c
351
lookup->host = xstrdup(host);
usr.sbin/smtpd/dns.c
355
if (*host == '[') {
usr.sbin/smtpd/dns.c
356
if (strncasecmp("[IPv6:", host, 6) == 0)
usr.sbin/smtpd/dns.c
357
host += 6;
usr.sbin/smtpd/dns.c
359
host += 1;
usr.sbin/smtpd/dns.c
360
(void)strlcpy(hostcopy, host, sizeof hostcopy);
usr.sbin/smtpd/dns.c
364
host = hostcopy;
usr.sbin/smtpd/dns.c
371
as = getaddrinfo_async(host, NULL, &hints, NULL);
usr.sbin/smtpd/enqueue.c
247
if (getmailname(host, sizeof(host)) == -1)
usr.sbin/smtpd/enqueue.c
741
if (asprintf(&out, "%s@%s", in, host) == -1)
usr.sbin/smtpd/enqueue.c
91
static char host[HOST_NAME_MAX+1];
usr.sbin/smtpd/mta.c
1649
if (mx->host->flags & HOST_IGNORE)
usr.sbin/smtpd/mta.c
1656
c->source->sa->sa_family != mx->host->sa->sa_family) ||
usr.sbin/smtpd/mta.c
1657
(l->family && l->family != mx->host->sa->sa_family)) {
usr.sbin/smtpd/mta.c
1659
mta_host_to_text(mx->host));
usr.sbin/smtpd/mta.c
1664
if (mx->host->nconn >= l->maxconn_per_host) {
usr.sbin/smtpd/mta.c
1666
mta_host_to_text(mx->host));
usr.sbin/smtpd/mta.c
1671
if (mx->host->lastconn + l->conndelay_host > now) {
usr.sbin/smtpd/mta.c
1673
mta_host_to_text(mx->host),
usr.sbin/smtpd/mta.c
1674
(unsigned long long) mx->host->lastconn + l->conndelay_host - now);
usr.sbin/smtpd/mta.c
1675
if (tm == 0 || mx->host->lastconn + l->conndelay_host < tm)
usr.sbin/smtpd/mta.c
1676
tm = mx->host->lastconn + l->conndelay_host;
usr.sbin/smtpd/mta.c
1680
route = mta_route(c->source, mx->host);
usr.sbin/smtpd/mta.c
177
struct mta_host *host;
usr.sbin/smtpd/mta.c
2284
mta_host_unref(mx->host); /* from IMSG_DNS_HOST */
usr.sbin/smtpd/mta.c
258
mx->host = mta_host((struct sockaddr*)&ss);
usr.sbin/smtpd/mta.c
2627
mta_hoststat_update(const char *host, const char *error)
usr.sbin/smtpd/mta.c
2632
if (!lowercase(buf, host, sizeof buf))
usr.sbin/smtpd/mta.c
2652
mta_hoststat_cache(const char *host, uint64_t evpid)
usr.sbin/smtpd/mta.c
2657
if (!lowercase(buf, host, sizeof buf))
usr.sbin/smtpd/mta.c
2671
mta_hoststat_uncache(const char *host, uint64_t evpid)
usr.sbin/smtpd/mta.c
2676
if (!lowercase(buf, host, sizeof buf))
usr.sbin/smtpd/mta.c
2687
mta_hoststat_reschedule(const char *host)
usr.sbin/smtpd/mta.c
2693
if (!lowercase(buf, host, sizeof buf))
usr.sbin/smtpd/mta.c
281
sa_to_text(mx->host->sa),
usr.sbin/smtpd/mta.c
342
SPLAY_FOREACH(host, mta_host_tree, &hosts) {
usr.sbin/smtpd/mta.c
345
sockaddr_to_text(host->sa),
usr.sbin/smtpd/mta.c
346
host->ptrname,
usr.sbin/smtpd/mta.c
347
host->refcount,
usr.sbin/smtpd/mta.c
348
host->nconn,
usr.sbin/smtpd/mta.c
349
host->lastconn ? duration_to_text(t - host->lastconn) : "-");
usr.sbin/smtpd/mta_session.c
407
mta_getnameinfo_cb(void *arg, int gaierrno, const char *host, const char *serv)
usr.sbin/smtpd/mta_session.c
414
if (host)
usr.sbin/smtpd/mta_session.c
415
h->ptrname = xstrdup(host);
usr.sbin/smtpd/parse.y
162
struct host *host;
usr.sbin/smtpd/resolver.c
209
(s->host = malloc(NI_MAXHOST)) &&
usr.sbin/smtpd/resolver.c
211
(q = getnameinfo_async(sa, sa->sa_len, s->host, NI_MAXHOST,
usr.sbin/smtpd/resolver.c
223
free(s->host);
usr.sbin/smtpd/resolver.c
306
const char *cname, *host, *serv;
usr.sbin/smtpd/resolver.c
350
m_get_string(&m, &host);
usr.sbin/smtpd/resolver.c
355
req->cb_ni(req->arg, gai_errno, host, serv);
usr.sbin/smtpd/resolver.c
420
m_add_string(s->proc, ar->ar_gai_errno ? NULL : s->host);
usr.sbin/smtpd/resolver.c
424
free(s->host);
usr.sbin/smtpd/resolver.c
46
char *host;
usr.sbin/smtpd/smtp_session.c
632
smtp_getnameinfo_cb(void *arg, int gaierrno, const char *host, const char *serv)
usr.sbin/smtpd/smtp_session.c
652
(void)strlcpy(s->rdns, host, sizeof(s->rdns));
usr.sbin/smtpd/smtpc.c
275
char *scheme, *creds, *host, *port, *p, *c;
usr.sbin/smtpd/smtpc.c
279
host = NULL;
usr.sbin/smtpd/smtpc.c
292
host = c + 1;
usr.sbin/smtpd/smtpc.c
294
host = p;
usr.sbin/smtpd/smtpc.c
298
host = server;
usr.sbin/smtpd/smtpc.c
301
if (host[0] == '[') {
usr.sbin/smtpd/smtpc.c
303
p = strchr(host, ']');
usr.sbin/smtpd/smtpc.c
307
host++; /* skip '[' */
usr.sbin/smtpd/smtpc.c
314
port = strchr(host, ':');
usr.sbin/smtpd/smtpc.c
364
servname = host;
usr.sbin/smtpd/smtpc.c
371
error = getaddrinfo(host, port, &hints, &res0);
usr.sbin/smtpd/smtpc.c
373
fatalx("%s: %s", host, gai_strerror(error));
usr.sbin/smtpd/smtpc.c
413
char host[256];
usr.sbin/smtpd/smtpc.c
425
host, sizeof(host), serv, sizeof(serv),
usr.sbin/smtpd/smtpc.c
427
log_debug("trying host %s port %s...", host, serv);
usr.sbin/smtpd/smtpd.h
690
struct mta_host *host;
usr.sbin/snmpd/mib.h
903
{ MIBDECL(host) }, \
usr.sbin/snmpd/parse.y
1061
if (host($1, SNMPTRAP_PORT, AF_UNSPEC, SOCK_DGRAM,
usr.sbin/snmpd/parse.y
1072
if (host($4, "0", ss.ss_family, SOCK_DGRAM,
usr.sbin/snmpd/parse.y
1124
host : hostdef
usr.sbin/snmpd/parse.y
147
int host(const char *, const char *, int, int,
usr.sbin/snmpd/parse.y
155
struct host *host;
usr.sbin/snmpd/parse.y
1893
if (host("0.0.0.0", SNMP_PORT, AF_INET, SOCK_DGRAM,
usr.sbin/snmpd/parse.y
1898
if (host("::", SNMP_PORT, AF_INET6, SOCK_DGRAM, &ss, 1) != 1)
usr.sbin/snmpd/parse.y
347
| TRAP RECEIVER host
usr.sbin/snmpd/parse.y
440
if ((nhosts = host(address[i], port, AF_UNSPEC,
usr.sbin/snmpd/traphandler.c
331
char *value, *host;
usr.sbin/snmpd/traphandler.c
371
host = traphandler_hostname(sa, 0);
usr.sbin/snmpd/traphandler.c
372
if (dprintf(s[0], "%s\n", host) == -1)
usr.sbin/snmpd/traphandler.c
375
host = traphandler_hostname(sa, 1);
usr.sbin/snmpd/traphandler.c
376
if (dprintf(s[0], "%s\n", host) == -1)
usr.sbin/syslogd/privsep.c
745
priv_getaddrinfo(const char *proto, const char *host, const char *serv,
usr.sbin/syslogd/privsep.c
758
if (strlcpy(hostcpy, host, sizeof(hostcpy)) >= sizeof(hostcpy))
usr.sbin/syslogd/privsep.c
795
priv_getnameinfo(struct sockaddr *sa, socklen_t salen, char *host,
usr.sbin/syslogd/privsep.c
820
must_read(priv_fd, host, ret_len);
usr.sbin/syslogd/syslogd.c
2721
char *bp, *p, *q, *proto, *host, *port, *ipproto;
usr.sbin/syslogd/syslogd.c
2819
if (loghost_parse(++p, &proto, &host, &port) == -1) {
usr.sbin/syslogd/syslogd.c
2863
if (strlen(host) >= NI_MAXHOST) {
usr.sbin/syslogd/syslogd.c
2877
f->f_un.f_forw.f_host = strdup(host);
usr.sbin/syslogd/syslogd.c
3044
loghost_parse(char *str, char **proto, char **host, char **port)
usr.sbin/syslogd/syslogd.c
3048
if ((*host = strchr(str, ':')) &&
usr.sbin/syslogd/syslogd.c
3049
(*host)[1] == '/' && (*host)[2] == '/') {
usr.sbin/syslogd/syslogd.c
3051
**host = '\0';
usr.sbin/syslogd/syslogd.c
3052
str = *host + 3;
usr.sbin/syslogd/syslogd.c
3059
*host = str;
usr.sbin/syslogd/syslogd.c
3060
if (**host == '[') {
usr.sbin/syslogd/syslogd.c
3061
(*host)++;
usr.sbin/syslogd/syslogd.c
3062
str = strchr(*host, ']');
usr.sbin/syslogd/syslogd.c
906
address_alloc(const char *name, const char *address, char ***host,
usr.sbin/syslogd/syslogd.c
914
if ((*host = reallocarray(*host, *num + 1, sizeof(**host))) == NULL)
usr.sbin/syslogd/syslogd.c
918
if (loghost_parse(p, NULL, *host + *num, *port + *num) == -1)
usr.sbin/syslogd/syslogd.c
924
socket_bind(const char *proto, const char *host, const char *port,
usr.sbin/syslogd/syslogd.c
948
if ((error = getaddrinfo(host, port, &hints, &res0))) {
usr.sbin/syslogd/syslogd.c
950
proto, host ? host : "*", port, gai_strerror(error));
usr.sbin/syslogd/syslogd.c
978
host, gai_strerror(error));
usr.sbin/tcpdump/addrtoname.c
152
char host[HOST_NAME_MAX+1];
usr.sbin/tcpdump/addrtoname.c
212
AF_INET, host, sizeof(host));
usr.sbin/tcpdump/addrtoname.c
216
p->name = savestr(host);
usr.sbin/tcpdump/addrtoname.c
237
char host[HOST_NAME_MAX+1];
usr.sbin/tcpdump/addrtoname.c
270
AF_INET6, host, sizeof(host));
usr.sbin/tcpdump/addrtoname.c
274
p->name = savestr(host);
usr.sbin/tcpdump/pf_print_state.c
117
char *host;
usr.sbin/tcpdump/pf_print_state.c
121
host = getname((char *)&addr->v4);
usr.sbin/tcpdump/pf_print_state.c
124
host = getname6((char *)&addr->v6);
usr.sbin/tcpdump/pf_print_state.c
127
host = "?";
usr.sbin/tcpdump/pf_print_state.c
130
printf("%s", host);
usr.sbin/unbound/cachedb/redis.c
133
redis_connect(const char* host, int port, const char* path,
usr.sbin/unbound/cachedb/redis.c
172
ctx = redisConnectWithTimeout(host, port, connect_timeout);
usr.sbin/unbound/cachedb/redis.c
213
path&&path[0]!=0?path:host,
usr.sbin/unbound/daemon/remote.c
5367
if((m1->host && !m2->host) || (!m1->host && m2->host))
usr.sbin/unbound/daemon/remote.c
5369
if(m1->host && m2->host && strcmp(m1->host, m2->host) != 0)
usr.sbin/unbound/services/authzone.c
2313
free(list->host);
usr.sbin/unbound/services/authzone.c
3733
if(extstrtoaddr(master->host, &a, &alen, UNBOUND_DNS_PORT) &&
usr.sbin/unbound/services/authzone.c
3741
strchr(master->host, '/') != NULL &&
usr.sbin/unbound/services/authzone.c
3742
strchr(master->host, '/') == strrchr(master->host, '/') &&
usr.sbin/unbound/services/authzone.c
3743
netblockstrtoaddr(master->host, UNBOUND_DNS_PORT, &a, &alen,
usr.sbin/unbound/services/authzone.c
3908
find_master_by_host(struct auth_master* list, char* host)
usr.sbin/unbound/services/authzone.c
3912
if(strcmp(p->host, host) == 0)
usr.sbin/unbound/services/authzone.c
3964
if(m->host) {
usr.sbin/unbound/services/authzone.c
3965
m->host = strdup(m->host);
usr.sbin/unbound/services/authzone.c
3966
if(!m->host) {
usr.sbin/unbound/services/authzone.c
3975
free(m->host);
usr.sbin/unbound/services/authzone.c
3985
free(m->host);
usr.sbin/unbound/services/authzone.c
4085
xfr->task_transfer->masters, spec->host);
usr.sbin/unbound/services/authzone.c
4112
xfr->task_probe->masters, spec->host);
usr.sbin/unbound/services/authzone.c
4674
xfr->task_transfer->master->host,
usr.sbin/unbound/services/authzone.c
5114
"but got '%s'", xfr->task_transfer->master->host,
usr.sbin/unbound/services/authzone.c
5312
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5320
" data", xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5328
" data", xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5337
" (or malformed RR)", xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5358
verbose(VERB_ALGO, "xfr from %s: ZONEMD failed for %s, transfer is failed", xfr->task_transfer->master->host, zname);
usr.sbin/unbound/services/authzone.c
5419
if(extstrtoaddr(master->host, &addr, &addrlen, UNBOUND_DNS_PORT)) {
usr.sbin/unbound/services/authzone.c
5430
if(sldns_str2wire_dname_buf(master->host, dname, &qinfo.qname_len)
usr.sbin/unbound/services/authzone.c
5432
log_err("cannot parse host name of master %s", master->host);
usr.sbin/unbound/services/authzone.c
5469
log_err("out of memory lookup up master %s", master->host);
usr.sbin/unbound/services/authzone.c
5495
if(!authextstrtoaddr(master->host, &addr, &addrlen, &auth_name)) {
usr.sbin/unbound/services/authzone.c
5502
zname, master->host);
usr.sbin/unbound/services/authzone.c
5531
if(strchr(master->host, '@') == NULL)
usr.sbin/unbound/services/authzone.c
5535
&addr, addrlen, -1, master->ssl, master->host,
usr.sbin/unbound/services/authzone.c
5686
m->host, s);
usr.sbin/unbound/services/authzone.c
5731
verbose(VERB_ALGO, "auth zone %s host %s type %s transfer lookup has nodata", zname, xfr->task_transfer->lookup_target->host, (xfr->task_transfer->lookup_aaaa?"AAAA":"A"));
usr.sbin/unbound/services/authzone.c
5738
verbose(VERB_ALGO, "auth zone %s host %s type %s transfer lookup has no answer", zname, xfr->task_transfer->lookup_target->host, (xfr->task_transfer->lookup_aaaa?"AAAA":"A"));
usr.sbin/unbound/services/authzone.c
5746
verbose(VERB_ALGO, "auth zone %s host %s type %s transfer lookup failed", zname, xfr->task_transfer->lookup_target->host, (xfr->task_transfer->lookup_aaaa?"AAAA":"A"));
usr.sbin/unbound/services/authzone.c
5774
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5779
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5784
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5790
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5805
xfr->task_transfer->master->host,
usr.sbin/unbound/services/authzone.c
5813
xfr->task_transfer->master->host, rcode);
usr.sbin/unbound/services/authzone.c
5818
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5823
xfr->task_transfer->master->host,
usr.sbin/unbound/services/authzone.c
5836
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5843
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5849
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5857
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5864
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5871
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5886
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5892
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5902
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5912
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5926
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5933
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5948
xfr->task_transfer->master->host,
usr.sbin/unbound/services/authzone.c
5962
xfr->task_transfer->master->host,
usr.sbin/unbound/services/authzone.c
5971
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
5983
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6002
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6008
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6018
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6031
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6037
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6047
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6150
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6159
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6198
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6207
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6237
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6280
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6300
xfr->task_transfer->master->host);
usr.sbin/unbound/services/authzone.c
6382
if(!authextstrtoaddr(master->host, &addr, &addrlen, &auth_name)) {
usr.sbin/unbound/services/authzone.c
6389
zname, master->host);
usr.sbin/unbound/services/authzone.c
6612
if(extstrtoaddr(master->host, &addr, &addrlen, UNBOUND_DNS_PORT)) {
usr.sbin/unbound/services/authzone.c
6617
strchr(master->host, '/') != NULL &&
usr.sbin/unbound/services/authzone.c
6618
strchr(master->host, '/') == strrchr(master->host, '/')) {
usr.sbin/unbound/services/authzone.c
6625
if(sldns_str2wire_dname_buf(master->host, dname, &qinfo.qname_len)
usr.sbin/unbound/services/authzone.c
6627
log_err("cannot parse host name of master %s", master->host);
usr.sbin/unbound/services/authzone.c
6664
log_err("out of memory lookup up master %s", master->host);
usr.sbin/unbound/services/authzone.c
6794
verbose(VERB_ALGO, "auth zone %s host %s type %s probe lookup has nodata", zname, xfr->task_probe->lookup_target->host, (xfr->task_probe->lookup_aaaa?"AAAA":"A"));
usr.sbin/unbound/services/authzone.c
6801
verbose(VERB_ALGO, "auth zone %s host %s type %s probe lookup has no address", zname, xfr->task_probe->lookup_target->host, (xfr->task_probe->lookup_aaaa?"AAAA":"A"));
usr.sbin/unbound/services/authzone.c
6809
verbose(VERB_ALGO, "auth zone %s host %s type %s probe lookup failed", zname, xfr->task_probe->lookup_target->host, (xfr->task_probe->lookup_aaaa?"AAAA":"A"));
usr.sbin/unbound/services/authzone.c
6872
if(!p->allow_notify && p->host)
usr.sbin/unbound/services/authzone.c
7226
parse_url(char* url, char** host, char** file, int* port, int* ssl)
usr.sbin/unbound/services/authzone.c
7256
*host = dup_prefix(p, (size_t)(end-p));
usr.sbin/unbound/services/authzone.c
7257
if(!*host) return 0;
usr.sbin/unbound/services/authzone.c
7260
*host = dup_all(p);
usr.sbin/unbound/services/authzone.c
7261
if(!*host) return 0;
usr.sbin/unbound/services/authzone.c
7267
*host = dup_prefix(p, (size_t)(end-p));
usr.sbin/unbound/services/authzone.c
7268
if(!*host) return 0;
usr.sbin/unbound/services/authzone.c
7270
*host = dup_all(p);
usr.sbin/unbound/services/authzone.c
7271
if(!*host) return 0;
usr.sbin/unbound/services/authzone.c
7311
if(!parse_url(p->str, &m->host, &m->file, &m->port, &m->ssl))
usr.sbin/unbound/services/authzone.c
7318
m->host = strdup(p->str);
usr.sbin/unbound/services/authzone.c
7319
if(!m->host) {
usr.sbin/unbound/services/authzone.c
7328
m->host = strdup(p->str);
usr.sbin/unbound/services/authzone.c
7329
if(!m->host) {
usr.sbin/unbound/services/authzone.c
8665
if(n->host)
usr.sbin/unbound/services/authzone.c
8666
m += strlen(n->host)+1;
usr.sbin/unbound/services/authzone.h
450
char* host;
usr.sbin/unbound/services/cache/infra.c
839
struct infra_data* host;
usr.sbin/unbound/services/cache/infra.c
844
host = (struct infra_data*)e->data;
usr.sbin/unbound/services/cache/infra.c
845
*rtt = rtt_unclamped(&host->rtt);
usr.sbin/unbound/services/cache/infra.c
846
if(host->rtt.rto >= PROBE_MAXRTO && timenow >= host->probedelay
usr.sbin/unbound/services/cache/infra.c
851
} else if(host->rtt.rto >= PROBE_MAXRTO && timenow < host->probedelay
usr.sbin/unbound/services/cache/infra.c
852
&& rtt_notimeout(&host->rtt)*4 <= host->rtt.rto) {
usr.sbin/unbound/services/cache/infra.c
856
if(host->timeout_A >= TIMEOUT_COUNT_MAX)
usr.sbin/unbound/services/cache/infra.c
860
if(host->timeout_AAAA >= TIMEOUT_COUNT_MAX)
usr.sbin/unbound/services/cache/infra.c
864
if(host->timeout_other >= TIMEOUT_COUNT_MAX)
usr.sbin/unbound/services/cache/infra.c
870
if(timenow > host->ttl) {
usr.sbin/unbound/services/cache/infra.c
872
if(host->rtt.rto >= USEFUL_SERVER_TOP_TIMEOUT) {
usr.sbin/unbound/services/cache/infra.c
884
if(host->lame_type_A && qtype == LDNS_RR_TYPE_A) {
usr.sbin/unbound/services/cache/infra.c
890
} else if(host->lame_other && qtype != LDNS_RR_TYPE_A) {
usr.sbin/unbound/services/cache/infra.c
896
} else if(host->isdnsseclame) {
usr.sbin/unbound/services/cache/infra.c
902
} else if(host->rec_lame) {
usr.sbin/unbound/services/outside_network.c
3676
int fd, char* host)
usr.sbin/unbound/services/outside_network.c
3690
(void)SSL_set_tlsext_host_name(cp->ssl, host);
usr.sbin/unbound/services/outside_network.c
3705
if(!SSL_set1_host(cp->ssl, host)) {
usr.sbin/unbound/services/outside_network.c
3718
if(!X509_VERIFY_PARAM_set1_host(param, host, strlen(host))) {
usr.sbin/unbound/services/outside_network.c
3724
(void)host;
usr.sbin/unbound/services/outside_network.c
3733
sldns_buffer* query, int timeout, int ssl, char* host)
usr.sbin/unbound/services/outside_network.c
3757
if(!setup_comm_ssl(cp, outnet, fd, host)) {
usr.sbin/unbound/services/outside_network.c
3786
setup_http_request(sldns_buffer* buf, char* host, char* path,
usr.sbin/unbound/services/outside_network.c
3791
sldns_buffer_printf(buf, "Host: %s\r\n", host);
usr.sbin/unbound/services/outside_network.c
3808
int ssl, char* host, char* path, struct config_file* cfg)
usr.sbin/unbound/services/outside_network.c
3834
if(!setup_comm_ssl(cp, outnet, fd, host)) {
usr.sbin/unbound/services/outside_network.c
3845
if(!setup_http_request(cp->buffer, host, path, cfg)) {
usr.sbin/unbound/services/outside_network.h
787
struct sldns_buffer* query, int timeout, int ssl, char* host);
usr.sbin/unbound/services/outside_network.h
810
int ssl, char* host, char* path, struct config_file* cfg);
usr.sbin/unbound/smallapp/unbound-anchor.c
563
resolve_host_ip(struct ub_ctx* ctx, const char* host, int port, int tp, int cl,
usr.sbin/unbound/smallapp/unbound-anchor.c
570
r = ub_resolve(ctx, host, tp, cl, &res);
usr.sbin/unbound/smallapp/unbound-anchor.c
572
if(verb) printf("error: resolve %s %s: %s\n", host,
usr.sbin/unbound/smallapp/unbound-anchor.c
582
if(verb) printf("resolve %s %s: no result\n", host,
usr.sbin/unbound/smallapp/unbound-anchor.c
649
resolve_name(const char* host, int port, const char* res_conf,
usr.sbin/unbound/smallapp/unbound-anchor.c
656
if( (list=parse_ip_addr(host, port)) ) {
usr.sbin/unbound/smallapp/unbound-anchor.c
666
resolve_host_ip(ctx, host, port, LDNS_RR_TYPE_A,
usr.sbin/unbound/smallapp/unbound-anchor.c
672
resolve_host_ip(ctx, host, port, LDNS_RR_TYPE_AAAA,
usr.sbin/unbound/smallapp/unbound-anchor.c
678
if(verb) printf("%s has no IP addresses I can use\n", host);
usr.sbin/unbound/testcode/fake_event.c
1808
char* ATTR_UNUSED(host))
usr.sbin/unbound/testcode/fake_event.c
1880
int ssl, char* host, char* path, struct config_file* cfg)
usr.sbin/unbound/testcode/fake_event.c
1900
(void)host;
usr.sbin/unbound/testcode/petal.c
191
process_one_header(char* buf, char* file, size_t flen, char* host, size_t hlen,
usr.sbin/unbound/testcode/petal.c
208
(void)strlcpy(host, buf+6, hlen);
usr.sbin/unbound/testcode/petal.c
215
read_http_headers(SSL* ssl, char* file, size_t flen, char* host, size_t hlen,
usr.sbin/unbound/testcode/petal.c
220
host[0] = 0;
usr.sbin/unbound/testcode/petal.c
228
if(!process_one_header(buf, file, flen, host, hlen, vs))
usr.sbin/unbound/testcode/petal.c
339
adjust_host(char* host)
usr.sbin/unbound/testcode/petal.c
343
if(strrchr(host, ':'))
usr.sbin/unbound/testcode/petal.c
344
*strrchr(host, ':') = 0;
usr.sbin/unbound/testcode/petal.c
346
len = strlen(host);
usr.sbin/unbound/testcode/petal.c
348
host[i] = tolower((unsigned char)host[i]);
usr.sbin/unbound/testcode/petal.c
549
char host[1024];
usr.sbin/unbound/testcode/petal.c
552
if(!read_http_headers(ssl, file, sizeof(file), host, sizeof(host),
usr.sbin/unbound/testcode/petal.c
555
if(host[0] != 0) adjust_host(host);
usr.sbin/unbound/testcode/petal.c
557
if(host[0] == 0 || !host_name_is_safe(host))
usr.sbin/unbound/testcode/petal.c
558
(void)strlcpy(host, "default", sizeof(host));
usr.sbin/unbound/testcode/petal.c
562
snprintf(combined, sizeof(combined), "%s%s", host, file);
usr.sbin/unbound/util/netevent.c
1300
char* host, size_t hostlen, char* port, size_t portlen)
usr.sbin/unbound/util/netevent.c
1305
if(inet_ntop(sa->sin_family, &sa->sin_addr, host,
usr.sbin/unbound/util/netevent.c
1315
if(inet_ntop(sa6->sin6_family, &sa6->sin6_addr, host,
usr.sbin/unbound/util/netevent.c
1403
char host[256], port[32];
usr.sbin/unbound/util/netevent.c
1405
host, sizeof(host), port, sizeof(port))) {
usr.sbin/unbound/util/netevent.c
1407
"failed: %s", host, port,
usr.sbin/unbound/util/netevent.c
1416
char host[256], port[32];
usr.sbin/unbound/util/netevent.c
1417
if(doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
usr.sbin/unbound/util/netevent.c
1418
sizeof(host), port, sizeof(port))) {
usr.sbin/unbound/util/netevent.c
1421
host, port, (int)ret,
usr.sbin/unbound/util/netevent.c
1827
char host[256], port[32];
usr.sbin/unbound/util/netevent.c
1833
if(!doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
usr.sbin/unbound/util/netevent.c
1834
sizeof(host), port, sizeof(port))) {
usr.sbin/unbound/util/netevent.c
1838
verbose(VERB_ALGO, "doq: sending retry packet to %s %s", host, port);
usr.sbin/unbound/util/netevent.c
1897
char host[256], port[32];
usr.sbin/unbound/util/netevent.c
1899
if(!doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
usr.sbin/unbound/util/netevent.c
1900
sizeof(host), port, sizeof(port))) {
usr.sbin/unbound/util/netevent.c
1905
verbose(VERB_ALGO, "doq: verifying retry token from %s %s", host,
usr.sbin/unbound/util/netevent.c
1918
"from %s %s", host, port);
usr.sbin/unbound/util/netevent.c
1921
verbose(VERB_ALGO, "doq: verified retry token from %s %s", host, port);
usr.sbin/unbound/util/netevent.c
1930
char host[256], port[32];
usr.sbin/unbound/util/netevent.c
1932
if(!doq_print_addr_port(&paddr->addr, paddr->addrlen, host,
usr.sbin/unbound/util/netevent.c
1933
sizeof(host), port, sizeof(port))) {
usr.sbin/unbound/util/netevent.c
1938
verbose(VERB_ALGO, "doq: verifying token from %s %s", host, port);
usr.sbin/unbound/util/netevent.c
1949
host, port);
usr.sbin/unbound/util/netevent.c
1952
verbose(VERB_ALGO, "doq: verified token from %s %s", host, port);
usr.sbin/ypldap/aldap.c
779
lu->host = p;
usr.sbin/ypldap/aldap.h
98
char *host;
usr.sbin/ypserv/mkalias/mkalias.c
102
status = res_search(host, C_IN, T_MX, answer.buf, sizeof(answer.buf));
usr.sbin/ypserv/mkalias/mkalias.c
151
char user[4096], host[4096]; /* XXX: DB bsize = 4096 in ypdb.c */
usr.sbin/ypserv/mkalias/mkalias.c
260
split_address(val.dptr, val.dsize, user, host);
usr.sbin/ypserv/mkalias/mkalias.c
262
if (eflag && check_host(val.dptr, val.dsize, host, dflag, uflag, Eflag)) {
usr.sbin/ypserv/mkalias/mkalias.c
264
host, key.dsize, key.dsize, key.dptr,
usr.sbin/ypserv/mkalias/mkalias.c
46
split_address(char *address, size_t len, char *user, char *host)
usr.sbin/ypserv/mkalias/mkalias.c
56
s = host;
usr.sbin/ypserv/mkalias/mkalias.c
66
s = host;
usr.sbin/ypserv/mkalias/mkalias.c
81
check_host(char *address, size_t len, char *host, int dflag, int uflag, int Eflag)
usr.sbin/ypserv/mkalias/mkalias.c
96
status = res_search(host, C_IN, T_AAAA, answer.buf, sizeof(answer.buf));
usr.sbin/ypserv/mkalias/mkalias.c
99
status = res_search(host, C_IN, T_A, answer.buf, sizeof(answer.buf));
usr.sbin/ypserv/revnetgroup/revnetgroup.c
146
while (__getnetgrent(&host, &user, &domain) != 0) {
usr.sbin/ypserv/revnetgroup/revnetgroup.c
148
if (!(host && !strcmp(host,"-"))) {
usr.sbin/ypserv/revnetgroup/revnetgroup.c
150
host ? host : "*",
usr.sbin/ypserv/revnetgroup/revnetgroup.c
77
char *host, *user, *domain;
usr.sbin/ypserv/yppush/yppush.c
107
req_xfr(pid_t pid, u_int prog, SVCXPRT *transp, char *host, CLIENT *client)
usr.sbin/ypserv/yppush/yppush.c
126
request.map_parms.ordernum, host,
usr.sbin/ypserv/yppush/yppush.c
143
char host[HOST_NAME_MAX+1];
usr.sbin/ypserv/yppush/yppush.c
152
snprintf(host, sizeof host, "%*.*s", inlen, inlen, indata);
usr.sbin/ypserv/yppush/yppush.c
154
client = clnt_create(host, YPPROG, YPVERS, "tcp");
usr.sbin/ypserv/yppush/yppush.c
157
fprintf(stderr, "Target Host: %s\n", host);
usr.sbin/ypserv/yppush/yppush.c
194
req_xfr(pid, prog, transp, host, client);
usr.sbin/ypserv/ypserv/acl.c
140
struct hostent *host;
usr.sbin/ypserv/ypserv/acl.c
247
host = gethostbyname(k);
usr.sbin/ypserv/ypserv/acl.c
248
if (host == NULL) {
usr.sbin/ypserv/ypserv/acl.c
251
if (host->h_addrtype == AF_INET) {
usr.sbin/ypserv/ypserv/acl.c
252
while ((host_addr = (struct in_addr *) *host->h_addr_list++) != NULL)
usr.sbin/ypserv/ypserv/ypserv_db.c
364
struct hostent *host;
usr.sbin/ypserv/ypserv/ypserv_db.c
381
host = gethostbyname(keystr);
usr.sbin/ypserv/ypserv/ypserv_db.c
382
if (host == NULL || host->h_addrtype != AF_INET)
usr.sbin/ypserv/ypserv/ypserv_db.c
384
addr_name = (struct in_addr *) *host->h_addr_list;
usr.sbin/ypserv/ypserv/ypserv_db.c
386
for (; host->h_addr_list[0] != NULL; host->h_addr_list++) {
usr.sbin/ypserv/ypserv/ypserv_db.c
387
addr_name = (struct in_addr *)host->h_addr_list[0];
usr.sbin/ypserv/ypserv/ypserv_db.c
389
inet_ntoa(*addr_name), host->h_name);
usr.sbin/ypserv/ypserv/ypserv_db.c
401
host = gethostbyaddr((char *)&addr_addr, sizeof(addr_addr), AF_INET);
usr.sbin/ypserv/ypserv/ypserv_db.c
402
if (host == NULL) return(YP_NOKEY);
usr.sbin/ypserv/ypserv/ypserv_db.c
404
strncpy((char *)hostname, host->h_name, sizeof(hostname) - 1);
usr.sbin/ypserv/ypserv/ypserv_db.c
406
host = gethostbyname((char *)hostname);
usr.sbin/ypserv/ypserv/ypserv_db.c
407
if (host == NULL)
usr.sbin/ypserv/ypserv/ypserv_db.c
411
for (; host->h_addr_list[0] != NULL; host->h_addr_list++)
usr.sbin/ypserv/ypserv/ypserv_db.c
412
if (!bcmp(host->h_addr_list[0], &addr_addr, sizeof(addr_addr)))
usr.sbin/ypserv/ypserv/ypserv_db.c
423
len = snprintf(val, sizeof(val), "%s %s", keystr, host->h_name);
usr.sbin/ypserv/ypserv/ypserv_db.c
427
while ((ptr = *(host->h_aliases)) != NULL) {
usr.sbin/ypserv/ypserv/ypserv_db.c
433
host->h_aliases++;
usr.sbin/ypserv/ypxfr/ypxfr.c
346
char *domain, *host = NULL, *srcdomain = NULL;
usr.sbin/ypserv/ypxfr/ypxfr.c
371
host = optarg;
usr.sbin/ypserv/ypxfr/ypxfr.c
406
yplog(" host: %s", host);
usr.sbin/ypserv/ypxfr/ypxfr.c
424
if (host == NULL) {
usr.sbin/ypserv/ypxfr/ypxfr.c
426
status = yp_master(domain, map, &host);
usr.sbin/ypserv/ypxfr/ypxfr.c
428
status = yp_master(srcdomain, map, &host);
usr.sbin/ypserv/ypxfr/ypxfr.c
440
yplog("Check for reserved port on host: %s", host);
usr.sbin/ypserv/ypxfr/ypxfr.c
442
srvport = getrpcport(host, YPPROG, YPVERS, IPPROTO_TCP);
usr.sbin/ypserv/ypxfr/ypxfr.c
448
yplog("Connect host: %s", host);
usr.sbin/ypserv/ypxfr/ypxfr.c
450
client = yp_bind_host(host, YPPROG, YPVERS, 0, 1);