/freebsd-11-stable/stand/pc98/cdboot/ |
H A D | cdboot.S | 49 # BTX client can see them 501 # Copy the BTX client to MEM_BTX_CLIENT 508 mov $btx_client,%si # the simple btx client 509 mov $(btx_client_end-btx_client),%cx # length of btx client 511 movsb # simple BTX client 513 # Copy the boot[12] args to where the BTX client can see them 523 # Save the entry point so the client can get to it later on 729 # BTX client to start btxldr
|
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | init_sec_context.c | 232 this_cred.client = ctx->source; 328 kret = krb5_cc_get_principal(context, ccache, &creds.client); 334 creds.client->realm, 336 creds.client->realm, 365 if (creds.client) 366 krb5_free_principal(context, creds.client); 439 /* canon name if needed for client + target realm */ 836 * So DCE_STYLE is strange. The client echos the seq number 999 "invalid state %d for client",
|
H A D | creds.c | 204 ret = krb5_cc_initialize(context, id, creds.client);
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | store.c | 1308 ret = krb5_store_principal(sp, creds->client); 1363 ret = krb5_ret_principal (sp, &creds->client); 1433 if (creds->client) 1452 if (creds->client) { 1453 ret = krb5_store_principal(sp, creds->client); 1533 ret = krb5_ret_principal (sp, &creds->client);
|
/freebsd-11-stable/crypto/heimdal/appl/rsh/ |
H A D | rshd.c | 160 krb5_principal client) 181 krb5_cc_initialize(context,ccache,client); 361 kerberos_status = save_krb5_creds (s, auth_context, ticket->client); 364 ticket->client, 380 if (krb5_unparse_name (context, ticket->client, &name) == 0) { 708 syslog_and_die("mising client/server/cmd"); 158 save_krb5_creds(int s, krb5_auth_context auth_context, krb5_principal client) argument
|
/freebsd-11-stable/contrib/llvm-project/clang/lib/Basic/ |
H A D | Diagnostic.cpp | 76 IntrusiveRefCntPtr<DiagnosticOptions> DiagOpts, DiagnosticConsumer *client, 79 setClient(client, ShouldOwnClient); 86 // If we own the diagnostic client, destroy it first so that it can access the 99 void DiagnosticsEngine::setClient(DiagnosticConsumer *client, argument 101 Owner.reset(ShouldOwnClient ? client : nullptr); 102 Client = client; 74 DiagnosticsEngine( IntrusiveRefCntPtr<DiagnosticIDs> diags, IntrusiveRefCntPtr<DiagnosticOptions> DiagOpts, DiagnosticConsumer *client, bool ShouldOwnClient) argument
|
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tcp.c | 475 tcp_wrap(int fd, bool client, void **ctxp) argument 488 tctx->tc_wait_called = (client ? false : true); 489 tctx->tc_side = (client ? TCP_SIDE_CLIENT : TCP_SIDE_SERVER_WORK);
|
H A D | proto_tls.c | 348 pjdlog_prefix_set("[TLS sandbox] (client) "); 350 setproctitle("[TLS sandbox] (client) "); 386 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) 387 pjdlog_exitx(EX_CONFIG, "Unable to sandbox TLS client."); 482 proto_get("user"), "client", startfdstr, 531 pjdlog_prefix_set("[TLS sandbox] (client) "); 533 setproctitle("[TLS sandbox] (client) "); 843 tls_wrap(int fd, bool client, void **ctxp) argument 853 if (proto_wrap("socketpair", client, fd, &sock) == -1) { 861 tlsctx->tls_wait_called = (client [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | cms.c | 260 CMSIdentifier *client, 276 switch (client->element) { 278 q.serial = &client->u.issuerAndSerialNumber.serialNumber; 279 q.issuer_name = &client->u.issuerAndSerialNumber.issuer; 283 q.subject_id = &client->u.subjectKeyIdentifier; 304 ret = unparse_CMSIdentifier(context, client, &str); 1133 * @param anchors trust anchors that the client will use, used to 259 find_CMSIdentifier(hx509_context context, CMSIdentifier *client, hx509_certs certs, time_t time_now, hx509_cert *signer_cert, int match) argument
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | bio_ssl.c | 320 if (num) /* client mode */ 546 BIO *BIO_new_ssl(SSL_CTX *ctx, int client) argument 557 if (client)
|
H A D | ssltest.c | 211 # define TEST_CLIENT_CERT "\\OpenSSL\\client.pem" 214 # define TEST_CLIENT_CERT "\\openssl\\apps\\client.pem" 217 # define TEST_CLIENT_CERT "../apps/client.pem" 264 /* SRP client */ 342 static int verify_servername(SSL *client, SSL *server) argument 470 static int verify_alpn(SSL *client, SSL *server) argument 474 SSL_get0_alpn_selected(client, &client_proto, &client_proto_len); 505 BIO_printf(bio_stdout, "ALPN results: client: '"); 510 BIO_printf(bio_stdout, "ALPN configured: client: '%s', server: ", 819 fprintf(stderr, " -client_auth - do client authenticatio 1958 BIO *server = NULL, *server_io = NULL, *client = NULL, *client_io = NULL; local [all...] |
/freebsd-11-stable/contrib/ofed/librdmacm/examples/ |
H A D | udpong.c | 79 struct client { struct 83 static struct client clients[256]; 232 printf("client login from %s\n", 236 printf("client login from %s\n",
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new.h | 210 int client, int persistent, 442 int client, int persistent, 441 wpas_dbus_signal_p2p_group_started(struct wpa_supplicant *wpa_s, int client, int persistent, const u8 *ip) argument
|
/freebsd-11-stable/contrib/tcp_wrappers/ |
H A D | hosts_access.c | 120 * If the (daemon, client) pair is matched by an entry in the file 122 * client) pair is matched by an entry in the file /etc/hosts.deny, 146 /* table_match - match table entries with (daemon, client) pair */ 257 /* client_match - match client information */ 266 return (host_match(tok, request->client)); 268 return (host_match(host, request->client)
|
/freebsd-11-stable/contrib/subversion/doc/ |
H A D | doxygen.conf | 560 subversion/bindings/cxx/include/svnxx/client \
|
/freebsd-11-stable/stand/i386/cdboot/ |
H A D | cdboot.S | 47 # BTX client can see them 256 # Copy the BTX client to MEM_BTX_CLIENT 262 mov $btx_client,%si # the simple btx client 263 mov $(btx_client_end-btx_client),%cx # length of btx client 265 movsb # simple BTX client 267 # Copy the boot[12] args to where the BTX client can see them 275 # Save the entry point so the client can get to it later on 520 # BTX client to start btxldr
|
/freebsd-11-stable/crypto/heimdal/appl/kf/ |
H A D | kf.c | 220 creds.client = principal;
|
/freebsd-11-stable/crypto/heimdal/kcm/ |
H A D | config.c | 246 ret = krb5_parse_name(kcm_context, system_principal, &ccache->client);
|
/freebsd-11-stable/crypto/heimdal/kuser/ |
H A D | kgetcred.c | 63 NP_("client to impersonate", ""), "principal"}, 218 ret = krb5_cc_initialize(context, id, out->client);
|
/freebsd-11-stable/contrib/libpcap/msdos/ |
H A D | pkt_rx1.s | 74 ; BX has client handle (stored in RX_ELEMENT.handle).
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | notify.h | 123 int client, const u8 *ip);
|
/freebsd-11-stable/contrib/serf/ |
H A D | serf_private.h | 74 serf_incoming_t *client; member in union:serf_io_baton_t::__anon83 166 /* List of authn types supported by the client.*/
|
H A D | context.c | 256 serf_incoming_t *c = io->u.client;
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls_gnutls.c | 548 "GnuTLS: Try to parse client cert '%s' and key '%s' in DER format", 562 "GnuTLS: Failed to read client cert/key in DER format (%s) - try in PEM format", 575 wpa_printf(MSG_DEBUG, "Failed to read client " 581 "GnuTLS: Successfully read client cert/key in PEM format"); 584 "GnuTLS: Successfully read client cert/key in DER format"); 591 "GnuTLS: Try to parse client cert/key '%s'in PKCS#12 DER format", 627 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 639 wpa_printf(MSG_DEBUG, "Failed to read client " 673 "GnuTLS: Failed to enable OCSP client"); 799 wpa_printf(MSG_DEBUG, "Failed to read client cer 881 gnutls_datum_t client, server; local [all...] |
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-nfs.c | 183 { SUNRPC_AUTH_REJECTEDCRED, "Rejected Credentials (client should begin new session)" }, 838 * Maintain a small cache of recent client.XID.server/proc pairs, to allow 846 struct in6_addr client; /* client IP address (net order) */ member in struct:xid_map_entry 894 UNALIGNED_MEMCPY(&xmep->client, &ip->ip_src, sizeof(ip->ip_src)); 899 UNALIGNED_MEMCPY(&xmep->client, &ip6->ip6_src, sizeof(ip6->ip6_src)); 934 UNALIGNED_MEMCMP(&ip->ip_dst, &xmep->client, 942 UNALIGNED_MEMCMP(&ip6->ip6_dst, &xmep->client,
|