/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | rd_cred.c | 288 &creds->server,
|
H A D | init_creds_pw.c | 170 ret = krb5_parse_name (context, in_tkt_service, &cred->server); 174 free (*krb5_princ_realm(context, cred->server)); 175 krb5_princ_set_realm (context, cred->server, &server_realm); 177 ret = krb5_make_principal(context, &cred->server, 580 ret = _krb5_principal2principalname (a->req_body.sname, creds->server); 1331 /* XXX guess what the server want here add add md */
|
/freebsd-9.3-release/contrib/ntp/sntp/libevent/include/event2/ |
H A D | rpc.h | 36 * This header files provides basic support for an RPC server and client. 38 * To support RPCs in a server, every supported RPC command needs to be 46 * server needs to fill in the Reply structure. 50 * To register an RPC with an HTTP server, you need to first create an RPC 59 * when the server receives an appropriately formatted RPC, the user callback 164 * needed by the server and client implementation. The structures have to be 253 * @param rpc_req the rpc request structure provided to the server callback 259 /** completes the server response to an rpc request */ 272 * @param rpc_req the rpc request structure provided to the server callback 287 * @param server [all...] |
/freebsd-9.3-release/contrib/bind9/bin/named/ |
H A D | control.c | 41 #include <named/server.h>
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | s3_pkt.c | 1032 if ((!s->server) && 1090 * If we are a server and get a client hello when renegotiation isn't 1094 if (s->server && 1233 s->state = SSL_ST_BEFORE | (s->server) 1236 s->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT;
|
H A D | ssltest.c | 178 # define TEST_SERVER_CERT "\\OpenSSL\\server.pem" 181 # define TEST_SERVER_CERT "\\openssl\\apps\\server.pem" 184 # define TEST_SERVER_CERT "../apps/server.pem" 243 fprintf(stderr, " -server_auth - check server certificate\n"); 254 " -bytes <val> - number of bytes to swap between client/server\n"); 286 " -time - measure processor time used by client and server\n"); 802 BIO_printf(bio_err, "server authentication\n"); 854 BIO_printf(bio_stdout, "Approximate total server time: %6.2f s\n" 864 "Approximate total server time: %6.2f units\n" 904 BIO *server local [all...] |
H A D | s23_srvr.c | 171 s->server = 1;
|
H A D | ssl_lib.c | 199 s->state = SSL_ST_BEFORE | ((s->server) ? SSL_ST_ACCEPT : SSL_ST_CONNECT); 342 s->server = (ctx->method->ssl_accept == ssl_undefined_function) ? 0 : 1; 791 * we are a server, it does not. 1372 fprintf(stderr, "SCSV received by server\n"); 2223 s->server = 1; 2233 s->server = 0; 2353 ret->server = s->server;
|
H A D | d1_pkt.c | 968 if ((!s->server) && 1186 * If we are server, we may have a repeated FINISHED of the client 1204 s->state = SSL_ST_BEFORE | (s->server) 1207 s->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT;
|
/freebsd-9.3-release/crypto/heimdal/appl/login/ |
H A D | login.c | 218 ret = krb5_make_principal(context, &mcred.server, 243 krb5_free_principal(context, mcred.server);
|
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos.c | 145 kerberos4_init(Authenticator *ap, int server) argument 149 if (server) { 255 printf("Sent Kerberos V4 credentials to server\r\n");
|
/freebsd-9.3-release/usr.bin/csup/ |
H A D | config.c | 274 if (config->server != NULL) 275 stream_close(config->server);
|
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius_server.c | 2 * RADIUS authentication server 45 * struct radius_server_counters - RADIUS server statistics counters 61 * struct radius_session - Internal RADIUS server data for a session 66 struct radius_server_data *server; member in struct:radius_session 82 * struct radius_client - Internal RADIUS server data for a client 99 * struct radius_server_data - Internal RADIUS server data 132 * This is passed to the EAP-SIM/AKA server implementation as a 140 * This is passed to the EAP server implementation as a callback 174 * example, this could be the enterprise and server names in 200 * This is a soft limit on the PAC-Key. The server wil [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | mit_dump.c | 141 flags->server = !(attr & KRB5_KDB_DISALLOW_SVR);
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | get_s.c | 107 out->attributes |= ent.entry.flags.server ? 0 : KRB5_KDB_DISALLOW_SVR;
|
/freebsd-9.3-release/crypto/heimdal/tools/ |
H A D | kdc-log-analyze.pl | 223 print "\nAS_REQ client/server statistics\n\n"; 256 print "\nTGS_REQ client/server statistics\n\n"; 278 print "\t524_REQ client/server statistics\n\n"; 433 } elsif (/returning a referral to realm (.*) for server (.*) that was not found/) {
|
/freebsd-9.3-release/usr.sbin/mount_nwfs/ |
H A D | mount_nwfs.c | 112 * A little bit weird, but I should figure out which server/user to use 333 ncp_error("cannot login to server %s", error, li.server); 362 "usage: mount_nwfs [-Chv] -S server -U user [-connection options]", 366 " mount_nwfs [-options] /server:user/volume[/path] node");
|
/freebsd-9.3-release/sys/fs/nfs/ |
H A D | nfs_commonkrpc.c | 112 "Disable weak cache consistency checking when server returns an error"); 521 * server calls (callbacks or upcalls), nmp == NULL. 1075 nfs_msg(struct thread *td, const char *server, const char *msg, int error) argument 1081 tprintf(p, LOG_INFO, "newnfs server %s: %s, error %d\n", 1082 server, msg, error); 1084 tprintf(p, LOG_INFO, "newnfs server %s: %s\n", server, msg);
|
/freebsd-9.3-release/etc/ |
H A D | services | 77 # 35/tcp any private printer server 78 # 35/udp any private printer server 552 zserv 346/tcp #Zebra server 553 zserv 346/udp #Zebra server 624 is99s 380/tcp #TIA/EIA/IS-99 modem server 625 is99s 380/udp #TIA/EIA/IS-99 modem server 768 sfs-smp-net 451/tcp #Cray Network Semaphore server 769 sfs-smp-net 451/udp #Cray Network Semaphore server 770 sfs-config 452/tcp #Cray SFS config server 771 sfs-config 452/udp #Cray SFS config server [all...] |
/freebsd-9.3-release/contrib/ntp/sntp/libevent/test/ |
H A D | regress_dns.c | 727 /* Now try again, but this time have the server get treated as 742 /* We'll treat the server as failed here. */ 774 /* Error 4 (NOTIMPL) makes us reissue the request to another server 942 /** Create dns server with inactive base, to avoid replying to clients */ 976 /* Implements a DNS server for the connect_hostname test and the 1190 /* Start an evdns_base that uses the server as its resolver. */ 1482 /* Start a dummy local dns server... */ 1512 * v6 request. The server will fail the test if it does. */ 1519 * v4 request. The server will fail the test if it does. */ 1953 struct evdns_server_port *server local [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | client.c | 1577 dns_message_t *rmessage, isc_sockaddr_t *server, 1616 result = dns_client_startrequest(client, qmessage, rmessage, server, 1659 dns_message_t *rmessage, isc_sockaddr_t *server, 1735 server, options, ctx->tsigkey, 2146 * Get addresses of the primary server. We don't use the ADB 2685 isc_sockaddr_t *server, *sa = NULL; local 2757 for (server = ISC_LIST_HEAD(*servers); 2758 server != NULL; 2759 server = ISC_LIST_NEXT(server, lin 1576 dns_client_request(dns_client_t *client, dns_message_t *qmessage, dns_message_t *rmessage, isc_sockaddr_t *server, unsigned int options, unsigned int parseoptions, dns_tsec_t *tsec, unsigned int timeout, unsigned int udptimeout, unsigned int udpretries) argument 1658 dns_client_startrequest(dns_client_t *client, dns_message_t *qmessage, dns_message_t *rmessage, isc_sockaddr_t *server, unsigned int options, unsigned int parseoptions, dns_tsec_t *tsec, unsigned int timeout, unsigned int udptimeout, unsigned int udpretries, isc_task_t *task, isc_taskaction_t action, void *arg, dns_clientreqtrans_t **transp) argument [all...] |
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-rx.c | 405 struct in_addr server; /* server IP address (net order) */ member in struct:rx_cache_entry 406 int dport; /* server port (host order) */ 617 rxent->server = ip->ip_dst; 646 rxent->server.s_addr == sip && 796 printf(" server %d:%d:%d", (int) n1, (int) n2, (int) n3); \ 1270 * Handle calls to the AFS protection database server
|
/freebsd-9.3-release/sys/nlm/ |
H A D | nlm_advlock.c | 109 nlm_msg(struct thread *td, const char *server, const char *msg, int error) argument 115 tprintf(p, LOG_INFO, "nfs server %s: %s, error %d\n", server, 118 tprintf(p, LOG_INFO, "nfs server %s: %s\n", server, msg); 223 * Push any pending writes to the server and flush our cache 280 * If we are recovering after a server restart or 676 * server has granted the lock, we can be sure that it doesn't 680 * our NLM server, we use a different sysid value to record our own 684 * server i [all...] |
/freebsd-9.3-release/contrib/tcp_wrappers/ |
H A D | hosts_access.c | 236 /* server_match - match server information */ 248 && host_match(host, request->server));
|
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | test-exec.sh | 76 SFTPSERVER=/usr/libexec/openssh/sftp-server 326 # create server config 347 # server config for proxy connects
|