/netbsd-6-1-5-RELEASE/usr.sbin/rbootd/ |
H A D | rbootd.c | 224 CLIENT *client; local 237 * client to NULL (ProcessPacket() handles 243 client = NULL; 244 } else if ((client=FindClient(&rconn))==NULL) { 252 ProcessPacket(&rconn,client); 293 ** FindClient -- Find client associated with a packet. 299 ** Pointer to client info if found, NULL otherwise.
|
/netbsd-6-1-5-RELEASE/dist/pf/libexec/tftp-proxy/ |
H A D | filter.c | 329 server_lookup(struct sockaddr *client, struct sockaddr *proxy, argument 332 if (client->sa_family == AF_INET) 333 return (server_lookup4(satosin(client), satosin(proxy), 336 if (client->sa_family == AF_INET6) 337 return (server_lookup6(satosin6(client), satosin6(proxy), 345 server_lookup4(struct sockaddr_in *client, struct sockaddr_in *proxy, argument 354 memcpy(&pnl.saddr.v4, &client->sin_addr.s_addr, sizeof pnl.saddr.v4); 356 pnl.sport = client->sin_port; 373 server_lookup6(struct sockaddr_in6 *client, struct sockaddr_in6 *proxy, argument 382 memcpy(&pnl.saddr.v6, &client [all...] |
/netbsd-6-1-5-RELEASE/dist/pf/usr.sbin/ftp-proxy/ |
H A D | filter.c | 352 server_lookup(struct sockaddr *client, struct sockaddr *proxy, argument 356 if (client->sa_family == AF_INET) 357 return (server_lookup4(satosin(client), satosin(proxy), 360 if (client->sa_family == AF_INET6) 361 return (server_lookup6(satosin6(client), satosin6(proxy), 369 server_lookup4(struct sockaddr_in *client, struct sockaddr_in *proxy, argument 378 memcpy(&pnl.saddr.v4, &client->sin_addr.s_addr, sizeof pnl.saddr.v4); 380 pnl.sport = client->sin_port; 397 server_lookup6(struct sockaddr_in6 *client, struct sockaddr_in6 *proxy, argument 406 memcpy(&pnl.saddr.v6, &client [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | get_cred.c | 190 /* some versions of some code might require that the client be 297 ret = krb5_cc_get_principal(context, id, &tmp_cred.client); 308 krb5_free_principal(context, tmp_cred.client); 316 krb5_free_principal(context, tmp_cred.client); 533 in_creds->client, 534 &out_creds->client); 750 client_realm = krb5_principal_get_realm(context, in_creds->client); 753 ret = krb5_copy_principal(context, in_creds->client, &tmp_creds.client); 764 krb5_free_principal(context, tmp_creds.client); 1447 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_const_principal client, krb5_ccache ccache, const char *in_tkt_service) argument [all...] |
/netbsd-6-1-5-RELEASE/dist/dhcp/client/ |
H A D | dhclient.conf | 2 send dhcp-client-identifier 1:0:a0:24:ab:fb:9c;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/irs/ |
H A D | context.c | 34 #include <dns/client.h> 224 dns_client_t *client = NULL; local 262 /* Create a DNS client object */ 264 0, &client); 267 context->dnsclient = client; 275 result = dns_client_setservers(client, dns_rdataclass_in, NULL, 288 result = dns_client_addtrustedkey(client, dns_rdataclass_in, 307 if (client != NULL) 308 dns_client_destroy(&client);
|
H A D | getnameinfo.c | 111 #include <dns/client.h> 284 dns_client_t *client; local 292 /* Get IRS context and the associated DNS client object */ 296 client = irs_context_getdnsclient(irsctx); 308 iresult = dns_client_resolve(client, ptrname, 383 dns_client_freeresanswer(client, &answerlist);
|
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/ |
H A D | screen-redraw.c | 26 int screen_redraw_cell_border(struct client *, u_int, u_int); 27 int screen_redraw_check_cell(struct client *, u_int, u_int); 28 void screen_redraw_draw_number(struct client *, struct window_pane *); 77 screen_redraw_cell_border(struct client *c, u_int px, u_int py) 96 screen_redraw_check_cell(struct client *c, u_int px, u_int py) 170 screen_redraw_screen(struct client *c, int status_only, int borders_only) 252 screen_redraw_pane(struct client *c, struct window_pane *wp) 263 screen_redraw_draw_number(struct client *c, struct window_pane *wp)
|
H A D | server-window.c | 68 struct client *c; 126 struct client *c; 159 struct client *c; 212 struct client *c; 251 struct client *c;
|
H A D | status.c | 33 struct client *, time_t, int, struct grid_cell *, size_t *); 35 struct client *, time_t, int, struct grid_cell *, size_t *); 36 char *status_find_job(struct client *, char **); 40 struct client *, struct winlink *, time_t, struct grid_cell *); 41 void status_replace1(struct client *, struct session *, struct winlink *, 65 status_redraw_get_left(struct client *c, 95 status_redraw_get_right(struct client *c, 125 status_set_window_at(struct client *c, u_int x) 140 /* Draw status for client on the last lines of given context. */ 142 status_redraw(struct client * [all...] |
H A D | cmd-load-buffer.c | 34 void cmd_load_buffer_callback(struct client *, void *); 50 struct client *c = ctx->cmdclient; 142 cmd_load_buffer_callback(struct client *c, void *data) 150 * Event callback has already checked client is not dead and reduced
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/ |
H A D | corefile.c | 171 device *client, /*callback/default*/ 181 device_error(client, "called on core_map_attach() with size zero"); 202 device_error(client, "map overlap when attaching %d:0x%lx (%ld)", 209 client, buffer, free_buffer); 222 device *client) /*callback/default*/ 247 client, buffer, free_buffer); 255 client, buffer, free_buffer); 263 client, buffer, free_buffer); 166 core_map_attach(core_map *access_map, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, device *client, void *buffer, void *free_buffer) argument 216 core_attach(core *memory, attach_type attach, int space, access_type access, unsigned_word addr, unsigned nr_bytes, device *client) argument
|
H A D | device_table.c | 182 device *client) 201 device *client) 222 device *client) /*callback/default*/ 227 client); local 237 device *client) /*callback/default*/ 241 client); local 178 generic_device_address_to_attach_address(device *me, const device_unit *address, int *attach_space, unsigned_word *attach_address, device *client) argument 198 generic_device_size_to_attach_size(device *me, const device_unit *size, unsigned *nr_bytes, device *client) argument 216 passthrough_device_address_attach(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument 231 passthrough_device_address_detach(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
|
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/tests/ |
H A D | auth.c | 66 static void client() function 76 /* Get a client magic number and pass it to the master for auth. */ 80 err(1, "Couldn't get client magic"); 86 /* Signal that the client is completely done. */ 107 err(1, "Failure to read client magic"); 111 err(1, "Failure to authenticate client magic\n"); 129 err(1, "failure to fork client"); 131 client();
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/ |
H A D | sainfo.c | 80 getsainfo(loc, rmt, peer, client, remoteid) 81 const vchar_t *loc, *rmt, *peer, *client; 107 if (client == NULL) 110 dclient = ipsecdoi_id2str(client); 113 "getsainfo params: loc=\'%s\' rmt=\'%s\' peer=\'%s\' client=\'%s\' id=%u\n", 139 /* compare ids - client */ 142 * This sainfo section enforces client address 143 * checking. Prevent match if the client value 147 if (client == NULL) 167 * id matches the client addres [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/kdc/ |
H A D | check-digest.in | 178 ${kdigest} digest-client-request \ 199 --client-response="$cresponseData" \ 220 --client-response="$cresponseData" \ 245 echo "MS-CHAP-V2 client request" 246 ${kdigest} digest-client-request \ 251 --client-nonce="$cnonce" \ 264 --client-response="$cresponseData" \ 265 --client-nonce="$cnonce" \
|
/netbsd-6-1-5-RELEASE/external/bsd/tmux/usr.bin/tmux/ |
H A D | Makefile | 22 SRCS+= client.c 29 SRCS+= cmd-choose-client.c 38 SRCS+= cmd-detach-client.c 65 SRCS+= cmd-refresh-client.c 91 SRCS+= cmd-suspend-client.c 94 SRCS+= cmd-switch-client.c 122 SRCS+= server-client.c 217 COPTS.server-client.c += -Wno-format-nonliteral
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | kex.c | 280 choose_enc(Enc *enc, char *client, char *server) argument 282 char *name = match_list(client, server, NULL); 284 fatal("no matching cipher found: client %s server %s", 285 client, server); 297 choose_mac(Mac *mac, char *client, char *server) argument 299 char *name = match_list(client, server, NULL); 301 fatal("no matching mac found: client %s server %s", 302 client, server); 314 choose_comp(Comp *comp, char *client, char *server) argument 316 char *name = match_list(client, serve 332 choose_kex(Kex *k, char *client, char *server) argument 358 choose_hostkeyalg(Kex *k, char *client, char *server) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/drivers/ |
H A D | sdlz_helper.c | 95 * %zone%, or %record%, or %client% 111 char **record, char **client, query_list_t **querylist, 210 /* check if we encountered "$client$" token */ 211 } else if (strcasecmp(tseg->sql, "client") == 0) { 213 * we don't really need, or want the "client" 218 tseg->sql = (char**) client; 233 /* if this query requires %client%, make sure we found it */ 238 "Required token $client$ not found."); 283 * dynamic segments replace where the tokens %zone%, %record%, %client% 363 db->client 110 build_querylist(isc_mem_t *mctx, const char *query_str, char **zone, char **record, char **client, query_list_t **querylist, unsigned int flags) argument [all...] |
H A D | dlz_filesystem_driver.c | 148 * colon needs to be allowed for IPV6 client 235 create_path(const char *zone, const char *host, const char *client, argument 250 * client and host may both be NULL, but they can't both be 253 REQUIRE( (host == NULL && client == NULL) || 254 (host != NULL && client == NULL) || 255 (host == NULL && client != NULL) ); 265 /* if client was passed, verify that it is safe */ 266 if ((client != NULL) && (is_safe(client) != ISC_TRUE) ) 272 else if (client ! 584 fs_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | digest-service.c | 106 krb5_principal client; local 108 ret = krb5_make_principal(context, &client, domain, 113 krb5_principal_set_type(context, client, KRB5_NT_NTLM); 115 ret = _kdc_db_fetch(context, config, client, 117 krb5_free_principal(context, client);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/export/samples/ |
H A D | sample-request.c | 43 #include <dns/client.h> 149 dns_client_t *client = NULL; local 185 result = dns_client_create(&client, 0); 237 result = dns_client_request(client, qmessage, rmessage, &sa, 0, 0, 261 dns_client_destroy(&client);
|
/netbsd-6-1-5-RELEASE/usr.bin/showmount/ |
H A D | showmount.c | 218 CLIENT *client; local 222 if ((client = clnt_create(host, prognum, versnum, "tcp")) == NULL && 223 (client = clnt_create(host, prognum, versnum, "udp")) == NULL) 228 rval = (int) clnt_call(client, procnum, 232 clnt_destroy(client);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ipc/ |
H A D | server.c | 450 struct client { struct 484 static struct client **clients = NULL; 487 static void handle_read(struct client *); 488 static void handle_write(struct client *); 489 static int maybe_close(struct client *); 500 update_client_creds(struct client *c) 617 static struct client * 623 struct client *c; 683 maybe_close(struct client *c) 709 struct client * [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/conf/transp/ |
H A D | transp_tli.c | 166 * Create an rpc client attached to the mount daemon. 171 CLIENT *client; local 209 if ((client = clnt_vc_create(*sock, &nb, MOUNTPROG, mnt_version, 0, 0)) 219 return client; 254 if ((client = clnt_dg_create(*sock, &nb, MOUNTPROG, mnt_version, 0, 0)) 260 if (clnt_control(client, CLSET_RETRY_TIMEOUT, (char *) tv) == FALSE) { 262 clnt_destroy(client); 267 return client; 705 CLIENT *client; local 713 client [all...] |