Searched refs:client (Results 151 - 175 of 381) sorted by relevance

1234567891011>>

/netbsd-6-1-5-RELEASE/usr.sbin/rbootd/
H A Drbootd.c224 CLIENT *client; local
237 * client to NULL (ProcessPacket() handles
243 client = NULL;
244 } else if ((client=FindClient(&rconn))==NULL) {
252 ProcessPacket(&rconn,client);
293 ** FindClient -- Find client associated with a packet.
299 ** Pointer to client info if found, NULL otherwise.
/netbsd-6-1-5-RELEASE/dist/pf/libexec/tftp-proxy/
H A Dfilter.c329 server_lookup(struct sockaddr *client, struct sockaddr *proxy, argument
332 if (client->sa_family == AF_INET)
333 return (server_lookup4(satosin(client), satosin(proxy),
336 if (client->sa_family == AF_INET6)
337 return (server_lookup6(satosin6(client), satosin6(proxy),
345 server_lookup4(struct sockaddr_in *client, struct sockaddr_in *proxy, argument
354 memcpy(&pnl.saddr.v4, &client->sin_addr.s_addr, sizeof pnl.saddr.v4);
356 pnl.sport = client->sin_port;
373 server_lookup6(struct sockaddr_in6 *client, struct sockaddr_in6 *proxy, argument
382 memcpy(&pnl.saddr.v6, &client
[all...]
/netbsd-6-1-5-RELEASE/dist/pf/usr.sbin/ftp-proxy/
H A Dfilter.c352 server_lookup(struct sockaddr *client, struct sockaddr *proxy, argument
356 if (client->sa_family == AF_INET)
357 return (server_lookup4(satosin(client), satosin(proxy),
360 if (client->sa_family == AF_INET6)
361 return (server_lookup6(satosin6(client), satosin6(proxy),
369 server_lookup4(struct sockaddr_in *client, struct sockaddr_in *proxy, argument
378 memcpy(&pnl.saddr.v4, &client->sin_addr.s_addr, sizeof pnl.saddr.v4);
380 pnl.sport = client->sin_port;
397 server_lookup6(struct sockaddr_in6 *client, struct sockaddr_in6 *proxy, argument
406 memcpy(&pnl.saddr.v6, &client
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dget_cred.c190 /* some versions of some code might require that the client be
297 ret = krb5_cc_get_principal(context, id, &tmp_cred.client);
308 krb5_free_principal(context, tmp_cred.client);
316 krb5_free_principal(context, tmp_cred.client);
533 in_creds->client,
534 &out_creds->client);
750 client_realm = krb5_principal_get_realm(context, in_creds->client);
753 ret = krb5_copy_principal(context, in_creds->client, &tmp_creds.client);
764 krb5_free_principal(context, tmp_creds.client);
1447 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_const_principal client, krb5_ccache ccache, const char *in_tkt_service) argument
[all...]
/netbsd-6-1-5-RELEASE/dist/dhcp/client/
H A Ddhclient.conf2 send dhcp-client-identifier 1:0:a0:24:ab:fb:9c;
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/irs/
H A Dcontext.c34 #include <dns/client.h>
224 dns_client_t *client = NULL; local
262 /* Create a DNS client object */
264 0, &client);
267 context->dnsclient = client;
275 result = dns_client_setservers(client, dns_rdataclass_in, NULL,
288 result = dns_client_addtrustedkey(client, dns_rdataclass_in,
307 if (client != NULL)
308 dns_client_destroy(&client);
H A Dgetnameinfo.c111 #include <dns/client.h>
284 dns_client_t *client; local
292 /* Get IRS context and the associated DNS client object */
296 client = irs_context_getdnsclient(irsctx);
308 iresult = dns_client_resolve(client, ptrname,
383 dns_client_freeresanswer(client, &answerlist);
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/
H A Dscreen-redraw.c26 int screen_redraw_cell_border(struct client *, u_int, u_int);
27 int screen_redraw_check_cell(struct client *, u_int, u_int);
28 void screen_redraw_draw_number(struct client *, struct window_pane *);
77 screen_redraw_cell_border(struct client *c, u_int px, u_int py)
96 screen_redraw_check_cell(struct client *c, u_int px, u_int py)
170 screen_redraw_screen(struct client *c, int status_only, int borders_only)
252 screen_redraw_pane(struct client *c, struct window_pane *wp)
263 screen_redraw_draw_number(struct client *c, struct window_pane *wp)
H A Dserver-window.c68 struct client *c;
126 struct client *c;
159 struct client *c;
212 struct client *c;
251 struct client *c;
H A Dstatus.c33 struct client *, time_t, int, struct grid_cell *, size_t *);
35 struct client *, time_t, int, struct grid_cell *, size_t *);
36 char *status_find_job(struct client *, char **);
40 struct client *, struct winlink *, time_t, struct grid_cell *);
41 void status_replace1(struct client *, struct session *, struct winlink *,
65 status_redraw_get_left(struct client *c,
95 status_redraw_get_right(struct client *c,
125 status_set_window_at(struct client *c, u_int x)
140 /* Draw status for client on the last lines of given context. */
142 status_redraw(struct client *
[all...]
H A Dcmd-load-buffer.c34 void cmd_load_buffer_callback(struct client *, void *);
50 struct client *c = ctx->cmdclient;
142 cmd_load_buffer_callback(struct client *c, void *data)
150 * Event callback has already checked client is not dead and reduced
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/
H A Dcorefile.c171 device *client, /*callback/default*/
181 device_error(client, "called on core_map_attach() with size zero");
202 device_error(client, "map overlap when attaching %d:0x%lx (%ld)",
209 client, buffer, free_buffer);
222 device *client) /*callback/default*/
247 client, buffer, free_buffer);
255 client, buffer, free_buffer);
263 client, buffer, free_buffer);
166 core_map_attach(core_map *access_map, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, device *client, void *buffer, void *free_buffer) argument
216 core_attach(core *memory, attach_type attach, int space, access_type access, unsigned_word addr, unsigned nr_bytes, device *client) argument
H A Ddevice_table.c182 device *client)
201 device *client)
222 device *client) /*callback/default*/
227 client); local
237 device *client) /*callback/default*/
241 client); local
178 generic_device_address_to_attach_address(device *me, const device_unit *address, int *attach_space, unsigned_word *attach_address, device *client) argument
198 generic_device_size_to_attach_size(device *me, const device_unit *size, unsigned *nr_bytes, device *client) argument
216 passthrough_device_address_attach(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
231 passthrough_device_address_detach(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/tests/
H A Dauth.c66 static void client() function
76 /* Get a client magic number and pass it to the master for auth. */
80 err(1, "Couldn't get client magic");
86 /* Signal that the client is completely done. */
107 err(1, "Failure to read client magic");
111 err(1, "Failure to authenticate client magic\n");
129 err(1, "failure to fork client");
131 client();
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/
H A Dsainfo.c80 getsainfo(loc, rmt, peer, client, remoteid)
81 const vchar_t *loc, *rmt, *peer, *client;
107 if (client == NULL)
110 dclient = ipsecdoi_id2str(client);
113 "getsainfo params: loc=\'%s\' rmt=\'%s\' peer=\'%s\' client=\'%s\' id=%u\n",
139 /* compare ids - client */
142 * This sainfo section enforces client address
143 * checking. Prevent match if the client value
147 if (client == NULL)
167 * id matches the client addres
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/kdc/
H A Dcheck-digest.in178 ${kdigest} digest-client-request \
199 --client-response="$cresponseData" \
220 --client-response="$cresponseData" \
245 echo "MS-CHAP-V2 client request"
246 ${kdigest} digest-client-request \
251 --client-nonce="$cnonce" \
264 --client-response="$cresponseData" \
265 --client-nonce="$cnonce" \
/netbsd-6-1-5-RELEASE/external/bsd/tmux/usr.bin/tmux/
H A DMakefile22 SRCS+= client.c
29 SRCS+= cmd-choose-client.c
38 SRCS+= cmd-detach-client.c
65 SRCS+= cmd-refresh-client.c
91 SRCS+= cmd-suspend-client.c
94 SRCS+= cmd-switch-client.c
122 SRCS+= server-client.c
217 COPTS.server-client.c += -Wno-format-nonliteral
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dkex.c280 choose_enc(Enc *enc, char *client, char *server) argument
282 char *name = match_list(client, server, NULL);
284 fatal("no matching cipher found: client %s server %s",
285 client, server);
297 choose_mac(Mac *mac, char *client, char *server) argument
299 char *name = match_list(client, server, NULL);
301 fatal("no matching mac found: client %s server %s",
302 client, server);
314 choose_comp(Comp *comp, char *client, char *server) argument
316 char *name = match_list(client, serve
332 choose_kex(Kex *k, char *client, char *server) argument
358 choose_hostkeyalg(Kex *k, char *client, char *server) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/drivers/
H A Dsdlz_helper.c95 * %zone%, or %record%, or %client%
111 char **record, char **client, query_list_t **querylist,
210 /* check if we encountered "$client$" token */
211 } else if (strcasecmp(tseg->sql, "client") == 0) {
213 * we don't really need, or want the "client"
218 tseg->sql = (char**) client;
233 /* if this query requires %client%, make sure we found it */
238 "Required token $client$ not found.");
283 * dynamic segments replace where the tokens %zone%, %record%, %client%
363 db->client
110 build_querylist(isc_mem_t *mctx, const char *query_str, char **zone, char **record, char **client, query_list_t **querylist, unsigned int flags) argument
[all...]
H A Ddlz_filesystem_driver.c148 * colon needs to be allowed for IPV6 client
235 create_path(const char *zone, const char *host, const char *client, argument
250 * client and host may both be NULL, but they can't both be
253 REQUIRE( (host == NULL && client == NULL) ||
254 (host != NULL && client == NULL) ||
255 (host == NULL && client != NULL) );
265 /* if client was passed, verify that it is safe */
266 if ((client != NULL) && (is_safe(client) != ISC_TRUE) )
272 else if (client !
584 fs_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Ddigest-service.c106 krb5_principal client; local
108 ret = krb5_make_principal(context, &client, domain,
113 krb5_principal_set_type(context, client, KRB5_NT_NTLM);
115 ret = _kdc_db_fetch(context, config, client,
117 krb5_free_principal(context, client);
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/export/samples/
H A Dsample-request.c43 #include <dns/client.h>
149 dns_client_t *client = NULL; local
185 result = dns_client_create(&client, 0);
237 result = dns_client_request(client, qmessage, rmessage, &sa, 0, 0,
261 dns_client_destroy(&client);
/netbsd-6-1-5-RELEASE/usr.bin/showmount/
H A Dshowmount.c218 CLIENT *client; local
222 if ((client = clnt_create(host, prognum, versnum, "tcp")) == NULL &&
223 (client = clnt_create(host, prognum, versnum, "udp")) == NULL)
228 rval = (int) clnt_call(client, procnum,
232 clnt_destroy(client);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ipc/
H A Dserver.c450 struct client { struct
484 static struct client **clients = NULL;
487 static void handle_read(struct client *);
488 static void handle_write(struct client *);
489 static int maybe_close(struct client *);
500 update_client_creds(struct client *c)
617 static struct client *
623 struct client *c;
683 maybe_close(struct client *c)
709 struct client *
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/conf/transp/
H A Dtransp_tli.c166 * Create an rpc client attached to the mount daemon.
171 CLIENT *client; local
209 if ((client = clnt_vc_create(*sock, &nb, MOUNTPROG, mnt_version, 0, 0))
219 return client;
254 if ((client = clnt_dg_create(*sock, &nb, MOUNTPROG, mnt_version, 0, 0))
260 if (clnt_control(client, CLSET_RETRY_TIMEOUT, (char *) tv) == FALSE) {
262 clnt_destroy(client);
267 return client;
705 CLIENT *client; local
713 client
[all...]

Completed in 323 milliseconds

1234567891011>>