/netbsd-6-1-5-RELEASE/usr.bin/chpass/ |
H A D | pw_yp.c | 112 CLIENT *client; local 189 client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp"); 190 if (client == NULL) { 195 client->cl_auth = authunix_create_default(); 198 r = clnt_call(client, YPPASSWDPROC_UPDATE,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | kerberos5.c | 377 * Return 1 if the client have only older enctypes, this is for 565 * database (client supported enctypes first, then the unsupported 672 * verify the flags on `client' and `server', returning 0 685 hdb_entry *client = &client_ex->entry; local 687 /* check client */ 688 if (client->flags.locked_out) { 694 if (client->flags.invalid) { 700 if(!client->flags.client){ 702 "Principal may not act as client 903 hdb_entry_ex *client = NULL, *server = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/conf/transp/ |
H A D | transp_sockets.c | 162 * Create an rpc client attached to the mount daemon. 167 CLIENT *client; local 182 * Create a tcp client. 186 && ((client = clnttcp_create(sin, MOUNTPROG, mnt_version, sock, 0, 0)) != NULL)) 187 return client; 212 * Make a UDP client 214 if ((client = clntudp_create(sin, MOUNTPROG, mnt_version, *tv, sock)) == NULL) { 220 return client; 332 * so they fixed a library DoS issue by forcing client-side changes... 381 CLIENT *client; local [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/passwd/ |
H A D | yp_passwd.c | 226 CLIENT *client; local 307 client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp"); 308 if (client == NULL) 312 client->cl_auth = authunix_create_default(); 315 yr = clnt_call(client, YPPASSWDPROC_UPDATE, 388 CLIENT *client; local 443 client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp"); 444 if (client == NULL) { 450 client->cl_auth = authunix_create_default(); 453 yr = clnt_call(client, YPPASSWDPROC_UPDAT [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | init_creds_pw.c | 186 krb5_principal client, 198 if (client) 199 krb5_copy_principal(context, client, &cred->client); 202 &cred->client); 272 realm = krb5_principal_get_realm (context, ctx->cred.client); 350 krb5_principal client, 363 const char *realm = krb5_principal_get_realm(context, client); 390 krb5_principal_get_type(context, client) == KRB5_NT_ENTERPRISE_PRINCIPAL) 398 ret = init_cred(context, &ctx->cred, client, start_tim 184 init_cred(krb5_context context, krb5_creds *cred, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options) argument 349 get_init_creds_common(krb5_context context, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument 479 change_password(krb5_context context, krb5_principal client, const char *password, char *newpw, size_t newpw_sz, krb5_prompter_fct prompter, void *data, krb5_get_init_creds_opt *old_options) argument 755 pa_etype_info2(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument 804 pa_etype_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument 856 pa_pw_or_afs3_salt(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument 906 process_pa_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, METHOD_DATA *md) argument 981 add_enc_ts_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_s2k_proc keyproc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt, krb5_data *s2kparams) argument 1030 pa_data_to_md_ts_enc(krb5_context context, const AS_REQ *a, const krb5_principal client, krb5_get_init_creds_ctx *ctx, struct pa_info_data *ppaid, METHOD_DATA *md) argument 1068 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument 1085 pa_data_to_md_pkinit(krb5_context context, const AS_REQ *a, const krb5_principal client, int win2k, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument 1347 krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void *prompter_data, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context *rctx) argument 1961 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument 2067 krb5_get_init_creds_keyblock(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keyblock *keyblock, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument 2114 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab keytab, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument [all...] |
/netbsd-6-1-5-RELEASE/external/apache2/mDNSResponder/dist/Clients/ |
H A D | dns-sd.c | 67 // with an embedded copy of the client stub instead of linking the system library version at runtime. 187 static DNSServiceRef client = NULL; variable 451 *newref = client; 541 err = DNSServiceAddRecord(client, &record, 0, kDNSServiceType_HINFO, sizeof(myhinfoW), &myhinfoW[0], 0); 545 err = DNSServiceUpdateRecord(client, record, 0, sizeof(myhinfoX), &myhinfoX[0], 0); 549 err = DNSServiceRemoveRecord(client, record, 0); 564 err = DNSServiceUpdateRecord(client, NULL, 0, 1+updatetest[0], &updatetest[0], 0); 571 err = DNSServiceAddRecord(client, &record, 0, kDNSServiceType_NULL, sizeof(bigNULL), &bigNULL[0], 0); 763 int dns_sd_fd = client ? DNSServiceRefSockFD(client ) [all...] |
/netbsd-6-1-5-RELEASE/sys/dev/pci/cxgb/ |
H A D | cxgb_offload.c | 85 * cxgb_register_client - register an offload client 86 * @client: the client 88 * Add the client to the client list, 89 * and call backs the client for each activated offload device 92 cxgb_register_client(struct cxgb_client *client) argument 97 TAILQ_INSERT_TAIL(&client_list, client, client_entry); 99 if (client->add) { 102 client 116 cxgb_unregister_client(struct cxgb_client *client) argument 141 struct cxgb_client *client; local 160 struct cxgb_client *client; local 508 cxgb_insert_tid(struct toedev *tdev, struct cxgb_client *client, void *ctx, unsigned int tid) argument 601 cxgb_alloc_atid(struct toedev *tdev, struct cxgb_client *client, void *ctx) argument 622 cxgb_alloc_stid(struct toedev *tdev, struct cxgb_client *client, void *ctx) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/ |
H A D | server-client.c | 1 /* $Id: server-client.c,v 1.1.1.2 2011/08/17 18:40:05 jmmv Exp $ */ 31 void server_client_check_exit(struct client *); 32 void server_client_check_backoff(struct client *); 33 void server_client_check_redraw(struct client *); 34 void server_client_set_title(struct client *); 35 void server_client_reset_state(struct client *); 40 int server_client_msg_dispatch(struct client *); 41 void server_client_msg_command(struct client *, struct msg_command_data *); 43 struct client *, struct msg_identify_data *, int); 44 void server_client_msg_shell(struct client *); [all...] |
H A D | cmd-confirm-before.c | 45 struct client *c; 72 struct client *c; 108 struct client *c = cdata->c;
|
H A D | cmd-command-prompt.c | 28 * Prompt for command in client. 49 struct client *c; 92 struct client *c; 150 struct client *c = cdata->c;
|
H A D | cmd-detach-client.c | 1 /* $Id: cmd-detach-client.c,v 1.1.1.2 2011/08/17 18:40:04 jmmv Exp $ */ 24 * Detach a client. 30 "detach-client", "detach", 43 struct client *c;
|
H A D | cmd-lock-server.c | 54 "lock-client", "lockc", 68 struct client *c;
|
H A D | cmd-show-messages.c | 27 * Show client message log. 46 struct client *c;
|
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/bsd-core/ |
H A D | drm_ioctl.c | 185 struct drm_client *client = data; local 190 idx = client->idx; 194 client->auth = pt->authenticated; 195 client->pid = pt->pid; 196 client->uid = pt->uid; 197 client->magic = pt->magic; 198 client->iocs = pt->ioctl_count;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/ |
H A D | acquire.c | 88 realm = krb5_principal_get_realm(context, ccache->client); 102 ccache->client, 111 ccache->client,
|
H A D | kcm_locl.h | 96 krb5_principal client; /* primary client principal */ member in struct:kcm_ccache_data 154 #define CLIENT_IS_ROOT(client) ((client)->uid == 0)
|
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/bin/xcvs/ |
H A D | Makefile | 15 client.c commit.c create_adm.c cvsrc.c diff.c edit.c \ 20 rcscmds.c recurse.c release.c remove.c repos.c root.c rsh-client.c \ 30 SRCS+= gssapi-client.c
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | server.c | 46 char client[128], name[128], name2[128]; local 58 client, sizeof(client)); 78 krb5_warnx(context->context, "%s: %s %s", client, op, name); 101 krb5_warnx(context->context, "%s: %s %s", client, op, name); 131 krb5_warnx(context->context, "%s: %s %s", client, op, name); 162 krb5_warnx(context->context, "%s: %s %s", client, op, name); 189 client, op, name, name2); 220 krb5_warnx(context->context, "%s: %s %s", client, op, name); 307 krb5_warnx(context->context, "%s: %s %s", client, o 484 char *client; local [all...] |
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/clvmd/ |
H A D | clvmd-gulm.c | 96 static int read_from_core_sock(struct local_client *client, char *buf, int len, const char *csid, 98 static int read_from_lock_sock(struct local_client *client, char *buf, int len, const char *csid, 109 struct local_client *client; local 114 client = malloc(sizeof(struct local_client)); 115 if (!client) 121 memset(client, 0, sizeof(struct local_client)); 122 client->fd = fd; 123 client->type = CLUSTER_INTERNAL; 124 client->callback = callback; 125 add_client(client); 288 read_from_core_sock(struct local_client *client, char *buf, int len, const char *csid, struct local_client **new_client) argument 298 read_from_lock_sock(struct local_client *client, char *buf, int len, const char *csid, struct local_client **new_client) argument 680 struct local_client *client; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ms/ |
H A D | testce.bat | 124 cecopy ..\apps\client.pem CE:\OpenSSL 134 echo test sslv2 with client authentication 138 echo test sslv2 with both client and server authentication 150 echo test sslv3 with client authentication 154 echo test sslv3 with both client and server authentication 166 echo test sslv2/sslv3 with client authentication 170 echo test sslv2/sslv3 with both client and server authentication 186 echo test sslv2 with client authentication via BIO pair 190 echo test sslv2 with both client and server authentication via BIO pair 202 echo test sslv3 with client authenticatio [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/sbin/kcm/ |
H A D | Makefile | 17 client.c \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/libpaa/ |
H A D | libpaa.h | 59 /* used in client to formulate response */ 62 const char *realm; /* realm that client wants */ 72 char client[128]; /* client address */ member in struct:paa_identity_t 73 char realm[128]; /* client realm */ 74 char domain[128]; /* client domain */
|
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/examples/ |
H A D | screen-keys.conf | 86 bind ^L refresh-client 88 bind l refresh-client
|
/netbsd-6-1-5-RELEASE/lib/libtelnet/ |
H A D | forward.c | 58 if ((retval = krb5_cc_initialize(context, ccache, ticket->enc_part2->client)) != 0)
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/qmqpd/ |
H A D | qmqpd.h | 34 VSTREAM *client; /* client connection */ member in struct:__anon2465 38 char *name; /* client name */ 39 char *addr; /* client IP address */ 40 char *port; /* client TCP port */ 42 char *rfc_addr; /* RFC 2821 client IP address */ 57 * Representation of unknown upstream client or message information within
|