Searched refs:server (Results 251 - 275 of 325) sorted by relevance

<<111213

/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Drd_cred.c288 &creds->server,
H A Dinit_creds_pw.c170 ret = krb5_parse_name (context, in_tkt_service, &cred->server);
174 free (*krb5_princ_realm(context, cred->server));
175 krb5_princ_set_realm (context, cred->server, &server_realm);
177 ret = krb5_make_principal(context, &cred->server,
580 ret = _krb5_principal2principalname (a->req_body.sname, creds->server);
1331 /* XXX guess what the server want here add add md */
/freebsd-9.3-release/contrib/ntp/sntp/libevent/include/event2/
H A Drpc.h36 * This header files provides basic support for an RPC server and client.
38 * To support RPCs in a server, every supported RPC command needs to be
46 * server needs to fill in the Reply structure.
50 * To register an RPC with an HTTP server, you need to first create an RPC
59 * when the server receives an appropriately formatted RPC, the user callback
164 * needed by the server and client implementation. The structures have to be
253 * @param rpc_req the rpc request structure provided to the server callback
259 /** completes the server response to an rpc request */
272 * @param rpc_req the rpc request structure provided to the server callback
287 * @param server
[all...]
/freebsd-9.3-release/contrib/bind9/bin/named/
H A Dcontrol.c41 #include <named/server.h>
/freebsd-9.3-release/crypto/openssl/ssl/
H A Ds3_pkt.c1032 if ((!s->server) &&
1090 * If we are a server and get a client hello when renegotiation isn't
1094 if (s->server &&
1233 s->state = SSL_ST_BEFORE | (s->server)
1236 s->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT;
H A Dssltest.c178 # define TEST_SERVER_CERT "\\OpenSSL\\server.pem"
181 # define TEST_SERVER_CERT "\\openssl\\apps\\server.pem"
184 # define TEST_SERVER_CERT "../apps/server.pem"
243 fprintf(stderr, " -server_auth - check server certificate\n");
254 " -bytes <val> - number of bytes to swap between client/server\n");
286 " -time - measure processor time used by client and server\n");
802 BIO_printf(bio_err, "server authentication\n");
854 BIO_printf(bio_stdout, "Approximate total server time: %6.2f s\n"
864 "Approximate total server time: %6.2f units\n"
904 BIO *server local
[all...]
H A Ds23_srvr.c171 s->server = 1;
H A Dssl_lib.c199 s->state = SSL_ST_BEFORE | ((s->server) ? SSL_ST_ACCEPT : SSL_ST_CONNECT);
342 s->server = (ctx->method->ssl_accept == ssl_undefined_function) ? 0 : 1;
791 * we are a server, it does not.
1372 fprintf(stderr, "SCSV received by server\n");
2223 s->server = 1;
2233 s->server = 0;
2353 ret->server = s->server;
H A Dd1_pkt.c968 if ((!s->server) &&
1186 * If we are server, we may have a repeated FINISHED of the client
1204 s->state = SSL_ST_BEFORE | (s->server)
1207 s->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT;
/freebsd-9.3-release/crypto/heimdal/appl/login/
H A Dlogin.c218 ret = krb5_make_principal(context, &mcred.server,
243 krb5_free_principal(context, mcred.server);
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dkerberos.c145 kerberos4_init(Authenticator *ap, int server) argument
149 if (server) {
255 printf("Sent Kerberos V4 credentials to server\r\n");
/freebsd-9.3-release/usr.bin/csup/
H A Dconfig.c274 if (config->server != NULL)
275 stream_close(config->server);
/freebsd-9.3-release/contrib/wpa/src/radius/
H A Dradius_server.c2 * RADIUS authentication server
45 * struct radius_server_counters - RADIUS server statistics counters
61 * struct radius_session - Internal RADIUS server data for a session
66 struct radius_server_data *server; member in struct:radius_session
82 * struct radius_client - Internal RADIUS server data for a client
99 * struct radius_server_data - Internal RADIUS server data
132 * This is passed to the EAP-SIM/AKA server implementation as a
140 * This is passed to the EAP server implementation as a callback
174 * example, this could be the enterprise and server names in
200 * This is a soft limit on the PAC-Key. The server wil
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dmit_dump.c141 flags->server = !(attr & KRB5_KDB_DISALLOW_SVR);
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dget_s.c107 out->attributes |= ent.entry.flags.server ? 0 : KRB5_KDB_DISALLOW_SVR;
/freebsd-9.3-release/crypto/heimdal/tools/
H A Dkdc-log-analyze.pl223 print "\nAS_REQ client/server statistics\n\n";
256 print "\nTGS_REQ client/server statistics\n\n";
278 print "\t524_REQ client/server statistics\n\n";
433 } elsif (/returning a referral to realm (.*) for server (.*) that was not found/) {
/freebsd-9.3-release/usr.sbin/mount_nwfs/
H A Dmount_nwfs.c112 * A little bit weird, but I should figure out which server/user to use
333 ncp_error("cannot login to server %s", error, li.server);
362 "usage: mount_nwfs [-Chv] -S server -U user [-connection options]",
366 " mount_nwfs [-options] /server:user/volume[/path] node");
/freebsd-9.3-release/sys/fs/nfs/
H A Dnfs_commonkrpc.c112 "Disable weak cache consistency checking when server returns an error");
521 * server calls (callbacks or upcalls), nmp == NULL.
1075 nfs_msg(struct thread *td, const char *server, const char *msg, int error) argument
1081 tprintf(p, LOG_INFO, "newnfs server %s: %s, error %d\n",
1082 server, msg, error);
1084 tprintf(p, LOG_INFO, "newnfs server %s: %s\n", server, msg);
/freebsd-9.3-release/etc/
H A Dservices77 # 35/tcp any private printer server
78 # 35/udp any private printer server
552 zserv 346/tcp #Zebra server
553 zserv 346/udp #Zebra server
624 is99s 380/tcp #TIA/EIA/IS-99 modem server
625 is99s 380/udp #TIA/EIA/IS-99 modem server
768 sfs-smp-net 451/tcp #Cray Network Semaphore server
769 sfs-smp-net 451/udp #Cray Network Semaphore server
770 sfs-config 452/tcp #Cray SFS config server
771 sfs-config 452/udp #Cray SFS config server
[all...]
/freebsd-9.3-release/contrib/ntp/sntp/libevent/test/
H A Dregress_dns.c727 /* Now try again, but this time have the server get treated as
742 /* We'll treat the server as failed here. */
774 /* Error 4 (NOTIMPL) makes us reissue the request to another server
942 /** Create dns server with inactive base, to avoid replying to clients */
976 /* Implements a DNS server for the connect_hostname test and the
1190 /* Start an evdns_base that uses the server as its resolver. */
1482 /* Start a dummy local dns server... */
1512 * v6 request. The server will fail the test if it does. */
1519 * v4 request. The server will fail the test if it does. */
1953 struct evdns_server_port *server local
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Dclient.c1577 dns_message_t *rmessage, isc_sockaddr_t *server,
1616 result = dns_client_startrequest(client, qmessage, rmessage, server,
1659 dns_message_t *rmessage, isc_sockaddr_t *server,
1735 server, options, ctx->tsigkey,
2146 * Get addresses of the primary server. We don't use the ADB
2685 isc_sockaddr_t *server, *sa = NULL; local
2757 for (server = ISC_LIST_HEAD(*servers);
2758 server != NULL;
2759 server = ISC_LIST_NEXT(server, lin
1576 dns_client_request(dns_client_t *client, dns_message_t *qmessage, dns_message_t *rmessage, isc_sockaddr_t *server, unsigned int options, unsigned int parseoptions, dns_tsec_t *tsec, unsigned int timeout, unsigned int udptimeout, unsigned int udpretries) argument
1658 dns_client_startrequest(dns_client_t *client, dns_message_t *qmessage, dns_message_t *rmessage, isc_sockaddr_t *server, unsigned int options, unsigned int parseoptions, dns_tsec_t *tsec, unsigned int timeout, unsigned int udptimeout, unsigned int udpretries, isc_task_t *task, isc_taskaction_t action, void *arg, dns_clientreqtrans_t **transp) argument
[all...]
/freebsd-9.3-release/contrib/tcpdump/
H A Dprint-rx.c405 struct in_addr server; /* server IP address (net order) */ member in struct:rx_cache_entry
406 int dport; /* server port (host order) */
617 rxent->server = ip->ip_dst;
646 rxent->server.s_addr == sip &&
796 printf(" server %d:%d:%d", (int) n1, (int) n2, (int) n3); \
1270 * Handle calls to the AFS protection database server
/freebsd-9.3-release/sys/nlm/
H A Dnlm_advlock.c109 nlm_msg(struct thread *td, const char *server, const char *msg, int error) argument
115 tprintf(p, LOG_INFO, "nfs server %s: %s, error %d\n", server,
118 tprintf(p, LOG_INFO, "nfs server %s: %s\n", server, msg);
223 * Push any pending writes to the server and flush our cache
280 * If we are recovering after a server restart or
676 * server has granted the lock, we can be sure that it doesn't
680 * our NLM server, we use a different sysid value to record our own
684 * server i
[all...]
/freebsd-9.3-release/contrib/tcp_wrappers/
H A Dhosts_access.c236 /* server_match - match server information */
248 && host_match(host, request->server));
/freebsd-9.3-release/crypto/openssh/regress/
H A Dtest-exec.sh76 SFTPSERVER=/usr/libexec/openssh/sftp-server
326 # create server config
347 # server config for proxy connects

Completed in 442 milliseconds

<<111213