Sponsored Content
Top Forums Programming TCP/IP, how to verify delivery? Post 302416688 by Corona688 on Tuesday 27th of April 2010 12:56:12 PM
Old 04-27-2010
Like I said, a similar effect could be achieved by making your transmit buffer really small, though I don't know how this could be done per-connection.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Mail delivery confirmation

If I am sending mail with this command: mail .......@whatever.com < filename, is it possible to get delivery confirmation? Thanks (3 Replies)
Discussion started by: CSGUY
3 Replies

2. UNIX for Advanced & Expert Users

Delivery Failure notice when aliase has added

Hi Team, Mails are coming proper on my server. But when i added a sendmail(/etc/mail/aliases) alias to redirect mails to a script, Its started giving delivery failure for the same id. Can you tell me what can be the possible reason for this?and how can we sort it out. Its very urgent for me... (3 Replies)
Discussion started by: mindtee_abhi
3 Replies

3. AIX

Issues on email delivery

Hello, there is a problem when using sendmail to certain destinations, basically the recipient will reject the incoming message because the user@local.domain.com is used as the sender (Return-Path), they would verify local.domain.com is not a valid DNS record which is true because it is a local... (11 Replies)
Discussion started by: neil_is_ere
11 Replies

4. UNIX for Dummies Questions & Answers

sendmail weird Local Delivery Problem

Hi Guys, Just joined the forum though I have been lurking here for many years now. Wondering if anyone can help me out with a problem that I'm currently having. :wall: I have a few servers that are relaying all email off of the box to an exchange server. There is a SmartHost configured in... (7 Replies)
Discussion started by: PACETREE
7 Replies

5. Solaris

Too much TCP retransmitted and TCP duplicate on server Oracle Solaris 10

I have problem with oracle solaris 10 running on oracle sparc T4-2 server. Os information: 5.10 Generic_150400-03 sun4v sparc sun4v Output from tcpstat.d script TCP bytes: out outRetrans in inDup inUnorder 6833763 7300 98884 0... (2 Replies)
Discussion started by: insatiable1610
2 Replies

6. Shell Programming and Scripting

Smtp dual delivery script

Hello Peoples, I have a problem wrapping my head around a script that I modified, essentially it uses the postfix smtp line in master.cf to send out a message to two or more email servers, It is a nice way to test different email servers and platforms. Problem with the original script is that it... (0 Replies)
Discussion started by: SeSe
0 Replies

7. IP Networking

DNS config preventing mail delivery

Hi Please can you help on this: the Net Admins decided to use DNS to resolve names, so this is preventing mail being delivered when using commands like date | mailx -s "test" abc.xyz@asdf.xx.yy. What we were asked was to edit /etc/resolv.confand add 3 entries, in all servers (10 Replies)
Discussion started by: fretagi
10 Replies

8. UNIX and Linux Applications

Qmail mail delivery problem

Dear Concern, As per below article, we have configured qmail in our system. THE LINUX STUFF: qmail Installation Steps on Linux But when we try to send any mail in own domain, got below error message. Please advise. Apr 17 17:01:20 BLAUDITSCPTEST sendmail: alias database /etc/aliases... (0 Replies)
Discussion started by: makauser
0 Replies
KEYCTL_GET_SECURITY(3)					    Linux Key Management Calls					    KEYCTL_GET_SECURITY(3)

NAME
keyctl_get_security - Retrieve a key's security context SYNOPSIS
#include <keyutils.h> long keyctl_get_security(key_serial_t key, char *buffer, size_t buflen); long keyctl_get_security_alloc(key_serial_t key, char **_buffer); DESCRIPTION
keyctl_get_security() retrieves the security context of a key as a NUL-terminated string. This will be rendered in a form appropriate to the LSM in force - for instance, with SELinux, it may look like unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 The caller must have view permission on a key to be able to get its security context. buffer and buflen specify the buffer into which the string will be placed. If the buffer is too small, the full size of the string will be returned, and no copy will take place. keyctl_get_security_alloc() is similar to keyctl_get_security() except that it allocates a buffer big enough to hold the string and copies the string into it. If successful, A pointer to the buffer is placed in *_buffer. The caller must free the buffer. RETURN VALUE
On success keyctl_get_security() returns the amount of data placed into the buffer. If the buffer was too small, then the size of buffer required will be returned, but no data will be transferred. On error, the value -1 will be returned and errno will have been set to an appropriate error. On success keyctl_get_security_alloc() returns the amount of data in the buffer, less the NUL terminator. On error, the value -1 will be returned and errno will have been set to an appropriate error. ERRORS
ENOKEY The key specified is invalid. EKEYEXPIRED The key specified has expired. EKEYREVOKED The key specified had been revoked. EACCES The key exists, but is not viewable by the calling process. LINKING
This is a library function that can be found in libkeyutils. When linking, -lkeyutils should be specified to the linker. SEE ALSO
keyctl(1), add_key(2), keyctl(2), request_key(2), keyctl(3), request-key(8) Linux 26 Feb 2010 KEYCTL_GET_SECURITY(3)
All times are GMT -4. The time now is 11:08 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy