/freebsd-9.3-release/contrib/bind9/lib/export/samples/ |
H A D | sample-update.c | 44 #include <dns/client.h> 90 dns_client_t *client = NULL; local 171 result = dns_client_create(&client, 0); 219 result = dns_client_setservers(client, dns_rdataclass_in, 262 result = dns_client_update(client, 305 dns_client_destroy(&client);
|
/freebsd-9.3-release/contrib/bind9/lib/irs/ |
H A D | getaddrinfo.c | 142 #include <dns/client.h> 905 dns_client_t *client; local 920 client = irs_context_getdnsclient(irsctx); 929 head.dnsclient = client; 938 result = dns_client_startresolve(client, 953 result = dns_client_startresolve(client,
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | cms.c | 261 CMSIdentifier *client, 276 switch (client->element) { 278 q.serial = &client->u.issuerAndSerialNumber.serialNumber; 279 q.issuer_name = &client->u.issuerAndSerialNumber.issuer; 283 q.subject_id = &client->u.subjectKeyIdentifier; 301 ret = unparse_CMSIdentifier(context, client, &str); 1070 * @param anchors trust anchors that the client will use, used to 260 find_CMSIdentifier(hx509_context context, CMSIdentifier *client, hx509_certs certs, hx509_cert *signer_cert, int match) argument
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | store.c | 783 ret = krb5_store_principal(sp, creds->client); 827 ret = krb5_ret_principal (sp, &creds->client); 890 if (creds->client) 907 if (creds->client) { 908 ret = krb5_store_principal(sp, creds->client); 977 ret = krb5_ret_principal (sp, &creds->client);
|
H A D | cache.c | 993 krb5_principal client, 1014 match = krb5_principal_compare(context, principal, client); 1029 krb5_unparse_name(context, client, &str); 992 krb5_cc_cache_match(krb5_context context, krb5_principal client, const char *type, krb5_ccache *id) argument
|
H A D | krb5.h | 138 client key (section 5.4.1) */ 145 session key), encrypted with the client key (section 5.4.2) */ 385 krb5_principal client; member in struct:krb5_creds 444 krb5_principal client; member in struct:krb5_ticket
|
H A D | rd_cred.c | 273 &creds->client,
|
/freebsd-9.3-release/sys/ofed/drivers/infiniband/core/ |
H A D | local_sa.c | 186 struct ib_sa_client *client; member in struct:sa_path_request 984 ib_sa_client_put(req->client); 990 * @client:SA client 1013 int ib_sa_path_rec_get(struct ib_sa_client *client, argument 1056 req->client = client; 1060 ib_sa_client_get(client); 1070 return ib_sa_path_rec_query(client, device, port_num, rec, comp_mask,
|
/freebsd-9.3-release/crypto/heimdal/appl/rsh/ |
H A D | rshd.c | 230 krb5_principal client) 251 krb5_cc_initialize(context,ccache,client); 431 kerberos_status = save_krb5_creds (s, auth_context, ticket->client); 434 ticket->client, 450 if (krb5_unparse_name (context, ticket->client, &name) == 0) { 785 syslog_and_die("mising client/server/cmd"); 228 save_krb5_creds(int s, krb5_auth_context auth_context, krb5_principal client) argument
|
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tcp.c | 477 tcp_wrap(int fd, bool client, void **ctxp) argument 490 tctx->tc_wait_called = (client ? false : true); 491 tctx->tc_side = (client ? TCP_SIDE_CLIENT : TCP_SIDE_SERVER_WORK);
|
H A D | proto_tls.c | 350 pjdlog_prefix_set("[TLS sandbox] (client) "); 352 setproctitle("[TLS sandbox] (client) "); 388 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) 389 pjdlog_exitx(EX_CONFIG, "Unable to sandbox TLS client."); 484 proto_get("user"), "client", startfdstr, 533 pjdlog_prefix_set("[TLS sandbox] (client) "); 535 setproctitle("[TLS sandbox] (client) "); 845 tls_wrap(int fd, bool client, void **ctxp) argument 855 if (proto_wrap("socketpair", client, fd, &sock) == -1) { 863 tlsctx->tls_wait_called = (client [all...] |
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-nfs.c | 352 (void)printf("Rejected Credentials (client should begin new session)"); 903 * Maintain a small cache of recent client.XID.server/proc pairs, to allow 912 struct in6_addr client; /* client IP address (net order) */ member in struct:xid_map_entry 915 struct in_addr client; /* client IP address (net order) */ member in struct:xid_map_entry 967 memcpy(&xmep->client, &ip->ip_src, sizeof(ip->ip_src)); 973 memcpy(&xmep->client, &ip6->ip6_src, sizeof(ip6->ip6_src)); 1010 memcmp(&ip->ip_dst, &xmep->client, 1019 memcmp(&ip6->ip6_dst, &xmep->client, [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | pkinit.c | 442 "MEMORY:client-anchors", 446 krb5_set_error_string(context, "Can't allocate client anchors: %d", ret); 697 * If the message client is a win2k-type but it send pa data 968 const hdb_entry_ex *client, 994 "No valid enctype available from client"); 1374 const hdb_entry_ex *client, 1402 client->entry.principal); 1411 client->entry.principal); 1419 ret = hdb_entry_get_pkinit_acl(&client->entry, &acl); 1445 client 965 _kdc_pk_mk_pa_reply(krb5_context context, krb5_kdc_configuration *config, pk_client_params *client_params, const hdb_entry_ex *client, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock **reply_key, METHOD_DATA *md) argument 1372 _kdc_pk_check_client(krb5_context context, krb5_kdc_configuration *config, const hdb_entry_ex *client, pk_client_params *client_params, char **subject_name) argument [all...] |
/freebsd-9.3-release/contrib/bind9/bin/named/unix/ |
H A D | dlz_dlopen_driver.c | 126 const char *client) 139 result = cd->dlz_allowzonexfr(cd->dbdata, name, client); 125 dlopen_dlz_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
|
/freebsd-9.3-release/contrib/cvs/contrib/ |
H A D | cvs_acls.in | 47 -u passes the client-side userId to the cvs_acls script 182 can do restrictions based on the client-side userId rather than the 271 b) The second option is to use the client-side userId as the basis for 276 file will use the individual, client-side userIds in its 2nd column. 299 "-u $USER" passes the client-side userId to cvs_acls 305 If you are using client-side userIds to restrict access to your 534 $entries = "CVS/Entries"; # client-side file??? 741 # case, the userId is the client-side userId that has been passed to this 766 # Passing in a client-side userId? 770 print("$$ client [all...] |
/freebsd-9.3-release/contrib/tcp_wrappers/ |
H A D | hosts_access.c | 113 * If the (daemon, client) pair is matched by an entry in the file 115 * client) pair is matched by an entry in the file /etc/hosts.deny, 139 /* table_match - match table entries with (daemon, client) pair */ 252 /* client_match - match client information */ 261 return (host_match(tok, request->client)); 263 return (host_match(host, request->client)
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | cipher.c | 184 cipher_mask_ssh1(int client) argument 189 if (client) {
|
/freebsd-9.3-release/sys/boot/i386/cdboot/ |
H A D | cdboot.S | 48 # BTX client can see them 257 # Copy the BTX client to MEM_BTX_CLIENT 263 mov $btx_client,%si # the simple btx client 264 mov $(btx_client_end-btx_client),%cx # length of btx client 266 movsb # simple BTX client 268 # Copy the boot[12] args to where the BTX client can see them 276 # Save the entry point so the client can get to it later on 521 # BTX client to start btxldr
|
/freebsd-9.3-release/tools/regression/sockets/unix_seqpacket_exercise/ |
H A D | unix_seqpacket_exercise.c | 332 client(struct sockaddr_un *sun) function 352 printf("client done\n"); 424 client(&sun); 429 * When the client is done, kill the server and clean up.
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | bio_ssl.c | 320 if (num) /* client mode */ 538 BIO *BIO_new_ssl(SSL_CTX *ctx, int client) argument 549 if (client)
|
H A D | ssltest.c | 179 # define TEST_CLIENT_CERT "\\OpenSSL\\client.pem" 182 # define TEST_CLIENT_CERT "\\openssl\\apps\\client.pem" 185 # define TEST_CLIENT_CERT "../apps/client.pem" 244 fprintf(stderr, " -client_auth - do client authentication\n"); 254 " -bytes <val> - number of bytes to swap between client/server\n"); 286 " -time - measure processor time used by client and server\n"); 794 BIO_printf(bio_err, "client authentication\n"); 855 "Approximate total client time: %6.2f s\n", 865 "Approximate total client time: %6.2f units\n", 904 BIO *server = NULL, *server_io = NULL, *client local [all...] |
/freebsd-9.3-release/contrib/llvm/tools/clang/lib/Basic/ |
H A D | Diagnostic.cpp | 42 DiagnosticConsumer *client, bool ShouldOwnClient) 43 : Diags(diags), DiagOpts(DiagOpts), Client(client), 73 void DiagnosticsEngine::setClient(DiagnosticConsumer *client, argument 78 Client = client; 39 DiagnosticsEngine( const IntrusiveRefCntPtr<DiagnosticIDs> &diags, DiagnosticOptions *DiagOpts, DiagnosticConsumer *client, bool ShouldOwnClient) argument
|
/freebsd-9.3-release/crypto/heimdal/appl/kf/ |
H A D | kf.c | 213 creds.client = principal;
|
/freebsd-9.3-release/crypto/heimdal/kcm/ |
H A D | config.c | 237 ret = krb5_parse_name(kcm_context, system_principal, &ccache->client);
|
/freebsd-9.3-release/contrib/llvm/tools/clang/lib/ARCMigrate/ |
H A D | ARCMT.cpp | 101 DiagnosticConsumer &client, 103 : Diags(diags), DiagClient(client), CapturedDiags(capturedDiags), 100 CaptureDiagnosticConsumer(DiagnosticsEngine &diags, DiagnosticConsumer &client, CapturedDiagList &capturedDiags) argument
|