Searched refs:client (Results 201 - 225 of 291) sorted by relevance

1234567891011>>

/freebsd-11-stable/stand/pc98/cdboot/
H A Dcdboot.S49 # BTX client can see them
501 # Copy the BTX client to MEM_BTX_CLIENT
508 mov $btx_client,%si # the simple btx client
509 mov $(btx_client_end-btx_client),%cx # length of btx client
511 movsb # simple BTX client
513 # Copy the boot[12] args to where the BTX client can see them
523 # Save the entry point so the client can get to it later on
729 # BTX client to start btxldr
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dinit_sec_context.c232 this_cred.client = ctx->source;
328 kret = krb5_cc_get_principal(context, ccache, &creds.client);
334 creds.client->realm,
336 creds.client->realm,
365 if (creds.client)
366 krb5_free_principal(context, creds.client);
439 /* canon name if needed for client + target realm */
836 * So DCE_STYLE is strange. The client echos the seq number
999 "invalid state %d for client",
H A Dcreds.c204 ret = krb5_cc_initialize(context, id, creds.client);
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dstore.c1308 ret = krb5_store_principal(sp, creds->client);
1363 ret = krb5_ret_principal (sp, &creds->client);
1433 if (creds->client)
1452 if (creds->client) {
1453 ret = krb5_store_principal(sp, creds->client);
1533 ret = krb5_ret_principal (sp, &creds->client);
/freebsd-11-stable/crypto/heimdal/appl/rsh/
H A Drshd.c160 krb5_principal client)
181 krb5_cc_initialize(context,ccache,client);
361 kerberos_status = save_krb5_creds (s, auth_context, ticket->client);
364 ticket->client,
380 if (krb5_unparse_name (context, ticket->client, &name) == 0) {
708 syslog_and_die("mising client/server/cmd");
158 save_krb5_creds(int s, krb5_auth_context auth_context, krb5_principal client) argument
/freebsd-11-stable/contrib/llvm-project/clang/lib/Basic/
H A DDiagnostic.cpp76 IntrusiveRefCntPtr<DiagnosticOptions> DiagOpts, DiagnosticConsumer *client,
79 setClient(client, ShouldOwnClient);
86 // If we own the diagnostic client, destroy it first so that it can access the
99 void DiagnosticsEngine::setClient(DiagnosticConsumer *client, argument
101 Owner.reset(ShouldOwnClient ? client : nullptr);
102 Client = client;
74 DiagnosticsEngine( IntrusiveRefCntPtr<DiagnosticIDs> diags, IntrusiveRefCntPtr<DiagnosticOptions> DiagOpts, DiagnosticConsumer *client, bool ShouldOwnClient) argument
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/
H A Dproto_tcp.c475 tcp_wrap(int fd, bool client, void **ctxp) argument
488 tctx->tc_wait_called = (client ? false : true);
489 tctx->tc_side = (client ? TCP_SIDE_CLIENT : TCP_SIDE_SERVER_WORK);
H A Dproto_tls.c348 pjdlog_prefix_set("[TLS sandbox] (client) ");
350 setproctitle("[TLS sandbox] (client) ");
386 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0)
387 pjdlog_exitx(EX_CONFIG, "Unable to sandbox TLS client.");
482 proto_get("user"), "client", startfdstr,
531 pjdlog_prefix_set("[TLS sandbox] (client) ");
533 setproctitle("[TLS sandbox] (client) ");
843 tls_wrap(int fd, bool client, void **ctxp) argument
853 if (proto_wrap("socketpair", client, fd, &sock) == -1) {
861 tlsctx->tls_wait_called = (client
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dcms.c260 CMSIdentifier *client,
276 switch (client->element) {
278 q.serial = &client->u.issuerAndSerialNumber.serialNumber;
279 q.issuer_name = &client->u.issuerAndSerialNumber.issuer;
283 q.subject_id = &client->u.subjectKeyIdentifier;
304 ret = unparse_CMSIdentifier(context, client, &str);
1133 * @param anchors trust anchors that the client will use, used to
259 find_CMSIdentifier(hx509_context context, CMSIdentifier *client, hx509_certs certs, time_t time_now, hx509_cert *signer_cert, int match) argument
/freebsd-11-stable/crypto/openssl/ssl/
H A Dbio_ssl.c320 if (num) /* client mode */
546 BIO *BIO_new_ssl(SSL_CTX *ctx, int client) argument
557 if (client)
H A Dssltest.c211 # define TEST_CLIENT_CERT "\\OpenSSL\\client.pem"
214 # define TEST_CLIENT_CERT "\\openssl\\apps\\client.pem"
217 # define TEST_CLIENT_CERT "../apps/client.pem"
264 /* SRP client */
342 static int verify_servername(SSL *client, SSL *server) argument
470 static int verify_alpn(SSL *client, SSL *server) argument
474 SSL_get0_alpn_selected(client, &client_proto, &client_proto_len);
505 BIO_printf(bio_stdout, "ALPN results: client: '");
510 BIO_printf(bio_stdout, "ALPN configured: client: '%s', server: ",
819 fprintf(stderr, " -client_auth - do client authenticatio
1958 BIO *server = NULL, *server_io = NULL, *client = NULL, *client_io = NULL; local
[all...]
/freebsd-11-stable/contrib/ofed/librdmacm/examples/
H A Dudpong.c79 struct client { struct
83 static struct client clients[256];
232 printf("client login from %s\n",
236 printf("client login from %s\n",
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new.h210 int client, int persistent,
442 int client, int persistent,
441 wpas_dbus_signal_p2p_group_started(struct wpa_supplicant *wpa_s, int client, int persistent, const u8 *ip) argument
/freebsd-11-stable/contrib/tcp_wrappers/
H A Dhosts_access.c120 * If the (daemon, client) pair is matched by an entry in the file
122 * client) pair is matched by an entry in the file /etc/hosts.deny,
146 /* table_match - match table entries with (daemon, client) pair */
257 /* client_match - match client information */
266 return (host_match(tok, request->client));
268 return (host_match(host, request->client)
/freebsd-11-stable/contrib/subversion/doc/
H A Ddoxygen.conf560 subversion/bindings/cxx/include/svnxx/client \
/freebsd-11-stable/stand/i386/cdboot/
H A Dcdboot.S47 # BTX client can see them
256 # Copy the BTX client to MEM_BTX_CLIENT
262 mov $btx_client,%si # the simple btx client
263 mov $(btx_client_end-btx_client),%cx # length of btx client
265 movsb # simple BTX client
267 # Copy the boot[12] args to where the BTX client can see them
275 # Save the entry point so the client can get to it later on
520 # BTX client to start btxldr
/freebsd-11-stable/crypto/heimdal/appl/kf/
H A Dkf.c220 creds.client = principal;
/freebsd-11-stable/crypto/heimdal/kcm/
H A Dconfig.c246 ret = krb5_parse_name(kcm_context, system_principal, &ccache->client);
/freebsd-11-stable/crypto/heimdal/kuser/
H A Dkgetcred.c63 NP_("client to impersonate", ""), "principal"},
218 ret = krb5_cc_initialize(context, id, out->client);
/freebsd-11-stable/contrib/libpcap/msdos/
H A Dpkt_rx1.s74 ; BX has client handle (stored in RX_ELEMENT.handle).
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dnotify.h123 int client, const u8 *ip);
/freebsd-11-stable/contrib/serf/
H A Dserf_private.h74 serf_incoming_t *client; member in union:serf_io_baton_t::__anon83
166 /* List of authn types supported by the client.*/
H A Dcontext.c256 serf_incoming_t *c = io->u.client;
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls_gnutls.c548 "GnuTLS: Try to parse client cert '%s' and key '%s' in DER format",
562 "GnuTLS: Failed to read client cert/key in DER format (%s) - try in PEM format",
575 wpa_printf(MSG_DEBUG, "Failed to read client "
581 "GnuTLS: Successfully read client cert/key in PEM format");
584 "GnuTLS: Successfully read client cert/key in DER format");
591 "GnuTLS: Try to parse client cert/key '%s'in PKCS#12 DER format",
627 wpa_printf(MSG_DEBUG, "Failed to read client cert/key "
639 wpa_printf(MSG_DEBUG, "Failed to read client "
673 "GnuTLS: Failed to enable OCSP client");
799 wpa_printf(MSG_DEBUG, "Failed to read client cer
881 gnutls_datum_t client, server; local
[all...]
/freebsd-11-stable/contrib/tcpdump/
H A Dprint-nfs.c183 { SUNRPC_AUTH_REJECTEDCRED, "Rejected Credentials (client should begin new session)" },
838 * Maintain a small cache of recent client.XID.server/proc pairs, to allow
846 struct in6_addr client; /* client IP address (net order) */ member in struct:xid_map_entry
894 UNALIGNED_MEMCPY(&xmep->client, &ip->ip_src, sizeof(ip->ip_src));
899 UNALIGNED_MEMCPY(&xmep->client, &ip6->ip6_src, sizeof(ip6->ip6_src));
934 UNALIGNED_MEMCMP(&ip->ip_dst, &xmep->client,
942 UNALIGNED_MEMCMP(&ip6->ip6_dst, &xmep->client,

Completed in 411 milliseconds

1234567891011>>