/freebsd-11.0-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | p2p-nfc.py | 188 client = nfc.handover.HandoverClient(llc) 191 client.connect() 195 client.close() 199 client.close() 204 if not client.send(message): 206 client.close() 210 message = client._recv() 213 client.close() 217 client.close() 244 client [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/bio/ |
H A D | b_sock.c | 614 } server, client; local 754 client = server; 757 if (client.sa.sa_family == AF_INET6) { 758 memset(&client.sa_in6.sin6_addr, 0, 759 sizeof(client.sa_in6.sin6_addr)); 760 client.sa_in6.sin6_addr.s6_addr[15] = 1; 763 if (client.sa.sa_family == AF_INET) { 764 client.sa_in.sin_addr.s_addr = htonl(0x7F000001); 768 cs = socket(client.sa.sa_family, SOCK_STREAM, SOCKET_PROTOCOL); 771 ii = connect(cs, &client [all...] |
/freebsd-11.0-release/crypto/heimdal/kcm/ |
H A D | events.c | 180 if (ccache->client == NULL) 183 if (newcred->client == NULL || 184 !krb5_principal_compare(context, ccache->client, newcred->client)) 369 if (krb5_unparse_name(context, event->ccache->client,
|
H A D | Makefile.am | 13 client.c \
|
/freebsd-11.0-release/libexec/rbootd/ |
H A D | rmpproto.c | 72 ** client - list of files available to this host 86 ProcessPacket(RMPCONN *rconn, CLIENT *client) argument 118 client? client->files: 123 client? client->files: BootFiles)) 330 * stripped file name and spoof the client into thinking that it
|
/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | get_in_tkt.c | 93 krb5_principal client, 108 ret = krb5_get_pw_salt (context, client, &salt2); 177 ret = _krb5_principal2principalname (a->req_body.cname, creds->client); 183 ret = copy_Realm(&creds->client->realm, &a->req_body.realm); 275 ret = add_padata(context, a->padata, creds->client, 299 add_padata(context, a->padata, creds->client, 306 add_padata(context, a->padata, creds->client, 426 ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp); 489 ret = krb5_get_pw_salt (context, creds->client, &salt); 91 add_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_key_proc key_proc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt) argument
|
H A D | acache.c | 197 ret = krb5_parse_name(context, incred->client, &cred->client); 329 if (cred->client) 330 free(cred->client); 344 ret = krb5_unparse_name(context, incred->client, &cred->client); 811 char *client, *server; local 819 if (cred->client) { 820 ret = krb5_unparse_name(context, cred->client, &client); [all...] |
H A D | build_auth.c | 123 copy_Realm(&cred->client->realm, &auth.crealm); 124 copy_PrincipalName(&cred->client->name, &auth.cname);
|
H A D | mk_req.c | 50 ret = krb5_cc_get_principal(context, ccache, &this_cred.client);
|
H A D | rd_error.c | 84 krb5_unparse_name_fixed(context, creds->client,
|
/freebsd-11.0-release/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 107 krb5_principal client, 127 spd.client = client; 213 spd.client = cp; 283 hdb_entry_ex *client, 341 client, server, krbtgt, &pac, &signed_pac); 502 * Determine if constrained delegation is allowed from this client to this server 509 hdb_entry_ex *client, 521 * provided by the client. 523 if(!krb5_realm_compare(context, client 103 _kdc_add_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_enctype enctype, krb5_principal client, krb5_const_principal server, krb5_principals principals, EncTicketPart *tkt) argument 279 check_PAC(krb5_context context, krb5_kdc_configuration *config, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, const EncryptionKey *server_check_key, const EncryptionKey *krbtgt_check_key, const EncryptionKey *server_sign_key, const EncryptionKey *krbtgt_sign_key, EncTicketPart *tkt, krb5_data *rspac, int *signedpath) argument 506 check_constrained_delegation(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, hdb_entry_ex *server, krb5_const_principal target) argument 566 check_s4u2self(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, krb5_const_principal server) argument 724 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument 1488 hdb_entry_ex *server = NULL, *client = NULL, *s4u2self_impersonated_client = NULL; local [all...] |
H A D | hprop.c | 158 krb5_principal client; local 170 ret = krb5_make_principal(context, &client, NULL, 178 ret = krb5_get_init_creds_keytab(context, &creds, client, keytab, 0, NULL, init_opts); 189 ret = krb5_cc_initialize(context, *cache, client); 192 krb5_free_principal(context, client);
|
/freebsd-11.0-release/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/nfs/ |
H A D | tst.call3.c | 346 CLIENT *client, *mountclient; local 389 client = clnt_create("localhost", NFS3_PROGRAM, NFS_V3, "tcp"); 390 if (client == NULL) { 394 client->cl_auth = auth; 405 status = clnt_call(client, test->proc, 410 clnt_perror(client, "call");
|
/freebsd-11.0-release/crypto/heimdal/appl/gssmask/ |
H A D | gssmask.c | 50 struct client { struct 70 logmessage(struct client *c, const char *file, unsigned int lineno, 104 add_handle(struct client *c, enum handle_type type, void *data) 200 acquire_cred(struct client *c, 237 ret = krb5_cc_initialize (context, id, cred.client); 270 handle##h(enum gssMaggotOp op, struct client *c) 1037 int (*func)(enum gssMaggotOp, struct client *); 1085 static struct client * 1088 struct client *c; 1119 free_client(struct client * [all...] |
/freebsd-11.0-release/usr.sbin/rpc.lockd/ |
H A D | lock_proc.c | 62 #define CLIENT_CACHE_SIZE 64 /* No. of client sockets cached */ 131 * port number. Since a given client is quite likely 190 CLIENT *client; local 202 * Search for the given client in the cache, zapping any expired 206 client = clnt_cache_ptr[i]; 207 if (client && ((clnt_cache_time[i] + CLIENT_CACHE_LIFETIME) 213 clnt_destroy(client); 215 client = NULL; 217 if (client && !addrcmp((struct sockaddr *)&clnt_cache_addr[i], 222 return (client); [all...] |
/freebsd-11.0-release/crypto/openssh/ |
H A D | match.c | 234 * Returns first item from client-list that is also supported by server-list, 240 match_list(const char *client, const char *server, u_int *next) argument 246 c = cp = xstrdup(client);
|
H A D | ssh-gss.h | 95 gss_OID oid; /* client */ 97 gss_name_t client; /* server */ member in struct:__anon6153
|
H A D | auth-krb5.c | 82 char *client, *platform_client; local 85 /* get platform-specific kerberos client principal name (if it exists) */ 87 client = platform_client ? platform_client : authctxt->pw->pw_name; 95 problem = krb5_parse_name(authctxt->krb5_ctx, client,
|
H A D | gss-genr.c | 140 * of the data which both the client and server need to persist across 152 (*ctx)->client = GSS_C_NO_NAME; 175 if ((*ctx)->client != GSS_C_NO_NAME) 176 gss_release_name(&ms, &(*ctx)->client);
|
/freebsd-11.0-release/contrib/netbsd-tests/net/net/ |
H A D | t_pktinfo.c | 88 client(struct sockaddr_in *sin) { function 161 c = client(&sin);
|
/freebsd-11.0-release/usr.sbin/acpi/acpidump/ |
H A D | acpidump.h | 68 } client; member in union:TCPAbody::__anon13876
|
/freebsd-11.0-release/crypto/heimdal/appl/afsutil/ |
H A D | afslog.c | 245 krb5_principal client; local 247 ret = krb5_parse_name(context, client_string, &client); 249 ret = krb5_cc_cache_match(context, client, &id);
|
/freebsd-11.0-release/crypto/heimdal/appl/kf/ |
H A D | kfd.c | 173 ticket->client, 184 sleep(2); /* XXX give client time to finish */ 185 krb5_errx(context, 1, "old client; exiting"); 219 ticket->client, 246 status = krb5_cc_initialize (context, ccache, ticket->client);
|
/freebsd-11.0-release/sys/ofed/include/rdma/ |
H A D | ib_addr.h | 55 * rdma_addr_register_client - Register an address client. 57 void rdma_addr_register_client(struct rdma_addr_client *client); 60 * rdma_addr_unregister_client - Deregister an address client. 61 * @client: Client object to deregister. 63 void rdma_addr_unregister_client(struct rdma_addr_client *client); 84 * @client: Address client associated with request. 97 int rdma_resolve_ip(struct rdma_addr_client *client,
|
/freebsd-11.0-release/contrib/openbsm/bin/auditdistd/ |
H A D | proto.c | 298 proto_wrap(const char *protoname, bool client, int fd, argument 315 client ? PROTO_SIDE_CLIENT : PROTO_SIDE_SERVER_WORK); 319 error = newconn->pc_proto->prt_wrap(fd, client, &newconn->pc_ctx); 332 proto_connection_recv(const struct proto_conn *conn, bool client, argument 355 return (proto_wrap(protoname, client, fd, newconnp));
|