Searched refs:client (Results 126 - 150 of 381) sorted by relevance

1234567891011>>

/netbsd-6-1-5-RELEASE/usr.bin/chpass/
H A Dpw_yp.c112 CLIENT *client; local
189 client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp");
190 if (client == NULL) {
195 client->cl_auth = authunix_create_default();
198 r = clnt_call(client, YPPASSWDPROC_UPDATE,
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Dkerberos5.c377 * Return 1 if the client have only older enctypes, this is for
565 * database (client supported enctypes first, then the unsupported
672 * verify the flags on `client' and `server', returning 0
685 hdb_entry *client = &client_ex->entry; local
687 /* check client */
688 if (client->flags.locked_out) {
694 if (client->flags.invalid) {
700 if(!client->flags.client){
702 "Principal may not act as client
903 hdb_entry_ex *client = NULL, *server = NULL; local
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/conf/transp/
H A Dtransp_sockets.c162 * Create an rpc client attached to the mount daemon.
167 CLIENT *client; local
182 * Create a tcp client.
186 && ((client = clnttcp_create(sin, MOUNTPROG, mnt_version, sock, 0, 0)) != NULL))
187 return client;
212 * Make a UDP client
214 if ((client = clntudp_create(sin, MOUNTPROG, mnt_version, *tv, sock)) == NULL) {
220 return client;
332 * so they fixed a library DoS issue by forcing client-side changes...
381 CLIENT *client; local
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/passwd/
H A Dyp_passwd.c226 CLIENT *client; local
307 client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp");
308 if (client == NULL)
312 client->cl_auth = authunix_create_default();
315 yr = clnt_call(client, YPPASSWDPROC_UPDATE,
388 CLIENT *client; local
443 client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp");
444 if (client == NULL) {
450 client->cl_auth = authunix_create_default();
453 yr = clnt_call(client, YPPASSWDPROC_UPDAT
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dinit_creds_pw.c186 krb5_principal client,
198 if (client)
199 krb5_copy_principal(context, client, &cred->client);
202 &cred->client);
272 realm = krb5_principal_get_realm (context, ctx->cred.client);
350 krb5_principal client,
363 const char *realm = krb5_principal_get_realm(context, client);
390 krb5_principal_get_type(context, client) == KRB5_NT_ENTERPRISE_PRINCIPAL)
398 ret = init_cred(context, &ctx->cred, client, start_tim
184 init_cred(krb5_context context, krb5_creds *cred, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options) argument
349 get_init_creds_common(krb5_context context, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument
479 change_password(krb5_context context, krb5_principal client, const char *password, char *newpw, size_t newpw_sz, krb5_prompter_fct prompter, void *data, krb5_get_init_creds_opt *old_options) argument
755 pa_etype_info2(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
804 pa_etype_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
856 pa_pw_or_afs3_salt(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
906 process_pa_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, METHOD_DATA *md) argument
981 add_enc_ts_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_s2k_proc keyproc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt, krb5_data *s2kparams) argument
1030 pa_data_to_md_ts_enc(krb5_context context, const AS_REQ *a, const krb5_principal client, krb5_get_init_creds_ctx *ctx, struct pa_info_data *ppaid, METHOD_DATA *md) argument
1068 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument
1085 pa_data_to_md_pkinit(krb5_context context, const AS_REQ *a, const krb5_principal client, int win2k, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument
1347 krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void *prompter_data, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context *rctx) argument
1961 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
2067 krb5_get_init_creds_keyblock(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keyblock *keyblock, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
2114 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab keytab, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
[all...]
/netbsd-6-1-5-RELEASE/external/apache2/mDNSResponder/dist/Clients/
H A Ddns-sd.c67 // with an embedded copy of the client stub instead of linking the system library version at runtime.
187 static DNSServiceRef client = NULL; variable
451 *newref = client;
541 err = DNSServiceAddRecord(client, &record, 0, kDNSServiceType_HINFO, sizeof(myhinfoW), &myhinfoW[0], 0);
545 err = DNSServiceUpdateRecord(client, record, 0, sizeof(myhinfoX), &myhinfoX[0], 0);
549 err = DNSServiceRemoveRecord(client, record, 0);
564 err = DNSServiceUpdateRecord(client, NULL, 0, 1+updatetest[0], &updatetest[0], 0);
571 err = DNSServiceAddRecord(client, &record, 0, kDNSServiceType_NULL, sizeof(bigNULL), &bigNULL[0], 0);
763 int dns_sd_fd = client ? DNSServiceRefSockFD(client )
[all...]
/netbsd-6-1-5-RELEASE/sys/dev/pci/cxgb/
H A Dcxgb_offload.c85 * cxgb_register_client - register an offload client
86 * @client: the client
88 * Add the client to the client list,
89 * and call backs the client for each activated offload device
92 cxgb_register_client(struct cxgb_client *client) argument
97 TAILQ_INSERT_TAIL(&client_list, client, client_entry);
99 if (client->add) {
102 client
116 cxgb_unregister_client(struct cxgb_client *client) argument
141 struct cxgb_client *client; local
160 struct cxgb_client *client; local
508 cxgb_insert_tid(struct toedev *tdev, struct cxgb_client *client, void *ctx, unsigned int tid) argument
601 cxgb_alloc_atid(struct toedev *tdev, struct cxgb_client *client, void *ctx) argument
622 cxgb_alloc_stid(struct toedev *tdev, struct cxgb_client *client, void *ctx) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/
H A Dserver-client.c1 /* $Id: server-client.c,v 1.1.1.2 2011/08/17 18:40:05 jmmv Exp $ */
31 void server_client_check_exit(struct client *);
32 void server_client_check_backoff(struct client *);
33 void server_client_check_redraw(struct client *);
34 void server_client_set_title(struct client *);
35 void server_client_reset_state(struct client *);
40 int server_client_msg_dispatch(struct client *);
41 void server_client_msg_command(struct client *, struct msg_command_data *);
43 struct client *, struct msg_identify_data *, int);
44 void server_client_msg_shell(struct client *);
[all...]
H A Dcmd-confirm-before.c45 struct client *c;
72 struct client *c;
108 struct client *c = cdata->c;
H A Dcmd-command-prompt.c28 * Prompt for command in client.
49 struct client *c;
92 struct client *c;
150 struct client *c = cdata->c;
H A Dcmd-detach-client.c1 /* $Id: cmd-detach-client.c,v 1.1.1.2 2011/08/17 18:40:04 jmmv Exp $ */
24 * Detach a client.
30 "detach-client", "detach",
43 struct client *c;
H A Dcmd-lock-server.c54 "lock-client", "lockc",
68 struct client *c;
H A Dcmd-show-messages.c27 * Show client message log.
46 struct client *c;
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/bsd-core/
H A Ddrm_ioctl.c185 struct drm_client *client = data; local
190 idx = client->idx;
194 client->auth = pt->authenticated;
195 client->pid = pt->pid;
196 client->uid = pt->uid;
197 client->magic = pt->magic;
198 client->iocs = pt->ioctl_count;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/
H A Dacquire.c88 realm = krb5_principal_get_realm(context, ccache->client);
102 ccache->client,
111 ccache->client,
H A Dkcm_locl.h96 krb5_principal client; /* primary client principal */ member in struct:kcm_ccache_data
154 #define CLIENT_IS_ROOT(client) ((client)->uid == 0)
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/bin/xcvs/
H A DMakefile15 client.c commit.c create_adm.c cvsrc.c diff.c edit.c \
20 rcscmds.c recurse.c release.c remove.c repos.c root.c rsh-client.c \
30 SRCS+= gssapi-client.c
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/
H A Dserver.c46 char client[128], name[128], name2[128]; local
58 client, sizeof(client));
78 krb5_warnx(context->context, "%s: %s %s", client, op, name);
101 krb5_warnx(context->context, "%s: %s %s", client, op, name);
131 krb5_warnx(context->context, "%s: %s %s", client, op, name);
162 krb5_warnx(context->context, "%s: %s %s", client, op, name);
189 client, op, name, name2);
220 krb5_warnx(context->context, "%s: %s %s", client, op, name);
307 krb5_warnx(context->context, "%s: %s %s", client, o
484 char *client; local
[all...]
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/clvmd/
H A Dclvmd-gulm.c96 static int read_from_core_sock(struct local_client *client, char *buf, int len, const char *csid,
98 static int read_from_lock_sock(struct local_client *client, char *buf, int len, const char *csid,
109 struct local_client *client; local
114 client = malloc(sizeof(struct local_client));
115 if (!client)
121 memset(client, 0, sizeof(struct local_client));
122 client->fd = fd;
123 client->type = CLUSTER_INTERNAL;
124 client->callback = callback;
125 add_client(client);
288 read_from_core_sock(struct local_client *client, char *buf, int len, const char *csid, struct local_client **new_client) argument
298 read_from_lock_sock(struct local_client *client, char *buf, int len, const char *csid, struct local_client **new_client) argument
680 struct local_client *client; local
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ms/
H A Dtestce.bat124 cecopy ..\apps\client.pem CE:\OpenSSL
134 echo test sslv2 with client authentication
138 echo test sslv2 with both client and server authentication
150 echo test sslv3 with client authentication
154 echo test sslv3 with both client and server authentication
166 echo test sslv2/sslv3 with client authentication
170 echo test sslv2/sslv3 with both client and server authentication
186 echo test sslv2 with client authentication via BIO pair
190 echo test sslv2 with both client and server authentication via BIO pair
202 echo test sslv3 with client authenticatio
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/sbin/kcm/
H A DMakefile17 client.c \
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/libpaa/
H A Dlibpaa.h59 /* used in client to formulate response */
62 const char *realm; /* realm that client wants */
72 char client[128]; /* client address */ member in struct:paa_identity_t
73 char realm[128]; /* client realm */
74 char domain[128]; /* client domain */
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/examples/
H A Dscreen-keys.conf86 bind ^L refresh-client
88 bind l refresh-client
/netbsd-6-1-5-RELEASE/lib/libtelnet/
H A Dforward.c58 if ((retval = krb5_cc_initialize(context, ccache, ticket->enc_part2->client)) != 0)
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/qmqpd/
H A Dqmqpd.h34 VSTREAM *client; /* client connection */ member in struct:__anon2465
38 char *name; /* client name */
39 char *addr; /* client IP address */
40 char *port; /* client TCP port */
42 char *rfc_addr; /* RFC 2821 client IP address */
57 * Representation of unknown upstream client or message information within

Completed in 383 milliseconds

1234567891011>>