Searched refs:client (Results 201 - 225 of 381) sorted by relevance

1234567891011>>

/netbsd-6-1-5-RELEASE/lib/libc/rpc/
H A Dclnt_raw.c50 * Interface to create an rpc client and server in the same process.
100 * Create a client handle for memory based rpc.
110 CLIENT *client = &clp->client_object; local
140 * Set xdrmem for client/server shared buffer
145 * create client handle
147 client->cl_ops = clnt_raw_ops();
148 client->cl_auth = authnone_create();
150 return (client);
/netbsd-6-1-5-RELEASE/lib/libquota/
H A Dquota_nfs.c104 CLIENT *client = NULL; local
115 if ((client = clntudp_create(&server_addr, prognum,
119 client->cl_auth = authunix_create_default();
122 clnt_stat = clnt_call(client, procnum, inproc, in,
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/qmqpd/
H A Dqmqpd_state.c66 state->client = stream;
79 state->where = "initializing client connection";
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dget_for_creds.c87 * Forward credentials for client to host hostname , making them
94 * @param client the client to delegate from.
109 krb5_principal client,
137 client_realm = krb5_principal_get_realm(context, client);
140 creds.client = client;
179 * @param in_creds the in client and server ticket names. The client
224 in_creds->client),
106 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char *hostname, krb5_principal client, krb5_principal server, krb5_ccache ccache, int forwardable, krb5_data *out_data) argument
[all...]
H A Dget_in_tkt.c97 krb5_principal client,
112 ret = krb5_get_pw_salt (context, client, &salt2);
181 ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
187 ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
278 ret = add_padata(context, a->padata, creds->client,
302 add_padata(context, a->padata, creds->client,
309 add_padata(context, a->padata, creds->client,
429 ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp);
492 ret = krb5_get_pw_salt (context, creds->client, &salt);
95 add_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_key_proc key_proc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt) argument
H A Dacache.c199 ret = krb5_parse_name(context, incred->client, &cred->client);
331 if (cred->client)
332 free(cred->client);
346 ret = krb5_unparse_name(context, incred->client, &cred->client);
813 char *client, *server; local
821 if (cred->client) {
822 ret = krb5_unparse_name(context, cred->client, &client);
[all...]
H A Dbuild_auth.c123 copy_Realm(&cred->client->realm, &auth.crealm);
124 copy_PrincipalName(&cred->client->name, &auth.cname);
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/export/samples/
H A Dsample-async.c45 #include <dns/client.h>
56 static dns_client_t *client = NULL; variable
181 dns_client_freeresanswer(client, &rev->answerlist);
234 result = dns_client_startresolve(client, trans->qname,
343 timermgr, 0, &client);
360 result = dns_client_setservers(client, dns_rdataclass_in, NULL,
398 dns_client_destroy(&client);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/
H A Dcache.c124 kcm_ccache_get_uuids(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *sp) argument
136 ret = kcm_access(context, client, opcode, p);
169 if (p->client != NULL)
170 krb5_unparse_name(context, p->client, &cpn);
175 "uid %d gid %d client %s server %s ncreds %d",
318 slot->client = NULL;
381 if (cache->client != NULL) {
382 krb5_free_principal(context, cache->client);
383 cache->client = NULL;
662 kcm_ccache_first_name(kcm_client *client) argument
[all...]
H A Devents.c182 if (ccache->client == NULL)
185 if (newcred->client == NULL ||
186 !krb5_principal_compare(context, ccache->client, newcred->client))
371 if (krb5_unparse_name(context, event->ccache->client,
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/bio/
H A Db_sock.c631 } server,client; local
772 client = server;
776 if (client.sa.sa_family == AF_INET6)
778 memset(&client.sa_in6.sin6_addr,0,sizeof(client.sa_in6.sin6_addr));
779 client.sa_in6.sin6_addr.s6_addr[15]=1;
783 if (client.sa.sa_family == AF_INET)
785 client.sa_in.sin_addr.s_addr=htonl(0x7F000001);
789 cs=socket(client.sa.sa_family,SOCK_STREAM,SOCKET_PROTOCOL);
793 ii=connect(cs,&client
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/drivers/
H A Ddlz_mysql_driver.c126 * and client strings are passed in (or NULL is passed if the
136 const char *client, unsigned int query,
261 * was a client string passed? If so, make it safe for use in
264 if (client != NULL) {
265 dbi->client = mysqldrv_escape_string((MYSQL *) dbi->dbconn,
266 client);
267 if (dbi->client == NULL) {
272 dbi->client = NULL;
360 /* free dbi->client string */
361 if (dbi->client !
135 mysql_get_resultset(const char *zone, const char *record, const char *client, unsigned int query, void *dbdata, MYSQL_RES **rs) argument
545 mysql_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
[all...]
H A Ddlz_postgres_driver.c272 * and client strings are passed in (or NULL is passed if the
288 const char *client, unsigned int query,
451 * was a client string passed? If so, make it safe for use in
454 if (client != NULL) {
455 dbi->client = postgres_escape_string(client);
456 if (dbi->client == NULL) {
461 dbi->client = NULL;
468 "%d did client", dlz_thread_num);
606 /* free dbi->client strin
287 postgres_get_resultset(const char *zone, const char *record, const char *client, unsigned int query, void *dbdata, PGresult **rs) argument
810 postgres_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
[all...]
H A Ddlz_bdb_driver.c102 DB *client; /*%< client database handle */ member in struct:bdb_instance
223 const char *client)
246 data.data = strdup(client);
254 if (db->client->cursor(db->client, NULL, &client_cursor, 0) != 0) {
380 if (db->client != NULL)
381 db->client->close(db->client, 0);
695 result = bdb_opendb(db->dbenv, DB_UNKNOWN, &db->client,
222 bdb_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
[all...]
H A Ddlz_bdbhpt_driver.c101 DB *client; /*%< client database handle */ member in struct:bdbhpt_instance
250 const char *client)
272 data.data = strdup(client);
279 switch(db->client->get(db->client, NULL, &key, &data, DB_GET_BOTH)) {
470 if (db->client != NULL)
471 db->client->close(db->client, 0);
782 result = bdbhpt_opendb(db->dbenv, DB_UNKNOWN, &db->client,
249 bdbhpt_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/
H A Dhw_ide.c690 device *client) /*callback/default*/
699 device_path(client));
703 drive->device = client;
704 if (device_find_property(client, "ide-byte-count") != NULL)
705 drive->geometry.byte = device_find_integer_property(client, "ide-byte-count");
708 if (device_find_property(client, "ide-sector-count") != NULL)
709 drive->geometry.sector = device_find_integer_property(client, "ide-sector-count");
710 if (device_find_property(client, "ide-head-count") != NULL)
711 drive->geometry.head = device_find_integer_property(client, "ide-head-count");
716 device_path(client),
684 hw_ide_attach_address(device *me, attach_type type, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
[all...]
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/
H A Dauth.c273 static int have_srp_secret __P((char *client, char *server, int need_ip,
1857 * secret that we could possibly use for authenticating `client'
1862 have_chap_secret(client, server, need_ip, lacks_ipp)
1863 char *client;
1885 if (client != NULL && client[0] == 0)
1886 client = NULL;
1890 ret = scan_authfile(f, client, server, NULL, &addrs, NULL, filename, 0);
1906 * secret that we could possibly use for authenticating `client'
1911 have_srp_secret(client, serve
[all...]
H A Dchap-new.c91 } client; variable in typeref:struct:chap_client_state
151 memset(&client, 0, sizeof(client));
176 struct chap_client_state *cs = &client;
188 struct chap_client_state *cs = &client;
235 struct chap_client_state *cs = &client;
521 struct chap_client_state *cs = &client;
552 struct chap_client_state *cs = &client;
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/clvmd/
H A Dclvmd-openais.c221 struct local_client *client; local
225 client = malloc(sizeof(struct local_client));
226 if (!client)
232 memset(client, 0, sizeof(struct local_client));
233 client->fd = fd;
234 client->type = CLUSTER_INTERNAL;
235 client->callback = callback;
236 add_client(client);
326 static int lck_dispatch(struct local_client *client, char *buf, int len, argument
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/bin/dlzbdb/
H A Ddlzbdb.c167 DB *client; /* client database handle */ member in struct:bdb_instance
236 char *c_zone = NULL; /*%< client zone to use in list operations */
237 char *c_ip = NULL; /*%< client IP to use in list operations */
444 if (db.client != NULL) {
445 db.client->close(db.client, 0);
446 db.client = NULL;
509 /* if client data, setup key for insertion */
524 bdbres = db.client
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Dkrb5tgs.c109 krb5_principal client,
129 spd.client = client;
215 spd.client = cp;
284 hdb_entry_ex *client,
340 client, server, krbtgt, &pac, &signed_pac);
501 * Determine if constrained delegation is allowed from this client to this server
508 hdb_entry_ex *client,
515 /* if client delegates to itself, that ok */
516 if (krb5_principal_compare(context, client
105 _kdc_add_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_enctype enctype, krb5_principal client, krb5_const_principal server, krb5_principals principals, EncTicketPart *tkt) argument
281 check_PAC(krb5_context context, krb5_kdc_configuration *config, const krb5_principal client_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, const EncryptionKey *server_key, const EncryptionKey *krbtgt_check_key, const EncryptionKey *krbtgt_sign_key, EncTicketPart *tkt, krb5_data *rspac, int *signedpath) argument
505 check_constrained_delegation(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, krb5_const_principal server) argument
551 check_s4u2self(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, krb5_const_principal server) argument
709 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument
1473 hdb_entry_ex *server = NULL, *client = NULL, *s4u2self_impersonated_client = NULL; local
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dmatch.c236 * Returns first item from client-list that is also supported by server-list,
242 match_list(const char *client, const char *server, u_int *next) argument
248 c = cp = xstrdup(client);
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/dmeventd/
H A Dlibdevmapper-event.c308 FD_SET(fifos->client, &fds);
309 ret = select(fifos->client + 1, NULL, &fds, NULL, NULL);
316 ret = write(fifos->client, ((char *) buf) + bytes,
413 fifos->client = open(fifos->client_path, O_WRONLY | O_NONBLOCK);
414 if (fifos->client >= 0) {
417 close(fifos->client);
422 log_error("%s: Can't open client fifo %s: %s",
457 /* Initialize client. */
488 /* if ((fifos->client = open(fifos->client_path, O_WRONLY | O_NONBLOCK)) < 0) {*/
489 if ((fifos->client
[all...]
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/postscreen/
H A Dpostscreen_tests.c26 /* char *psc_print_grey_key(buffer, client, helo, sender, rcpt)
28 /* const char *client;
103 * Postscreen will log the client with "pass new" when it passes the final
122 * We know this client is brand new.
184 * enabled tests, but the remote SMTP client has not yet passed all those
318 * Don't record a client as "passed" while subject to penalty. Be sure to
322 * that were passed in previous sessions, otherwise a client may never
337 * Give disabled tests a dummy time stamp so that we don't log a client
364 char *psc_print_grey_key(VSTRING *buf, const char *client, argument
369 client, hel
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/common/
H A Dsim-core.h120 client device.
149 struct hw *client,
151 device *client,

Completed in 242 milliseconds

1234567891011>>