/netbsd-6-1-5-RELEASE/lib/libc/rpc/ |
H A D | clnt_raw.c | 50 * Interface to create an rpc client and server in the same process. 100 * Create a client handle for memory based rpc. 110 CLIENT *client = &clp->client_object; local 140 * Set xdrmem for client/server shared buffer 145 * create client handle 147 client->cl_ops = clnt_raw_ops(); 148 client->cl_auth = authnone_create(); 150 return (client);
|
/netbsd-6-1-5-RELEASE/lib/libquota/ |
H A D | quota_nfs.c | 104 CLIENT *client = NULL; local 115 if ((client = clntudp_create(&server_addr, prognum, 119 client->cl_auth = authunix_create_default(); 122 clnt_stat = clnt_call(client, procnum, inproc, in,
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/qmqpd/ |
H A D | qmqpd_state.c | 66 state->client = stream; 79 state->where = "initializing client connection";
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | get_for_creds.c | 87 * Forward credentials for client to host hostname , making them 94 * @param client the client to delegate from. 109 krb5_principal client, 137 client_realm = krb5_principal_get_realm(context, client); 140 creds.client = client; 179 * @param in_creds the in client and server ticket names. The client 224 in_creds->client), 106 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char *hostname, krb5_principal client, krb5_principal server, krb5_ccache ccache, int forwardable, krb5_data *out_data) argument [all...] |
H A D | get_in_tkt.c | 97 krb5_principal client, 112 ret = krb5_get_pw_salt (context, client, &salt2); 181 ret = _krb5_principal2principalname (a->req_body.cname, creds->client); 187 ret = copy_Realm(&creds->client->realm, &a->req_body.realm); 278 ret = add_padata(context, a->padata, creds->client, 302 add_padata(context, a->padata, creds->client, 309 add_padata(context, a->padata, creds->client, 429 ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp); 492 ret = krb5_get_pw_salt (context, creds->client, &salt); 95 add_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_key_proc key_proc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt) argument
|
H A D | acache.c | 199 ret = krb5_parse_name(context, incred->client, &cred->client); 331 if (cred->client) 332 free(cred->client); 346 ret = krb5_unparse_name(context, incred->client, &cred->client); 813 char *client, *server; local 821 if (cred->client) { 822 ret = krb5_unparse_name(context, cred->client, &client); [all...] |
H A D | build_auth.c | 123 copy_Realm(&cred->client->realm, &auth.crealm); 124 copy_PrincipalName(&cred->client->name, &auth.cname);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/export/samples/ |
H A D | sample-async.c | 45 #include <dns/client.h> 56 static dns_client_t *client = NULL; variable 181 dns_client_freeresanswer(client, &rev->answerlist); 234 result = dns_client_startresolve(client, trans->qname, 343 timermgr, 0, &client); 360 result = dns_client_setservers(client, dns_rdataclass_in, NULL, 398 dns_client_destroy(&client);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/ |
H A D | cache.c | 124 kcm_ccache_get_uuids(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *sp) argument 136 ret = kcm_access(context, client, opcode, p); 169 if (p->client != NULL) 170 krb5_unparse_name(context, p->client, &cpn); 175 "uid %d gid %d client %s server %s ncreds %d", 318 slot->client = NULL; 381 if (cache->client != NULL) { 382 krb5_free_principal(context, cache->client); 383 cache->client = NULL; 662 kcm_ccache_first_name(kcm_client *client) argument [all...] |
H A D | events.c | 182 if (ccache->client == NULL) 185 if (newcred->client == NULL || 186 !krb5_principal_compare(context, ccache->client, newcred->client)) 371 if (krb5_unparse_name(context, event->ccache->client,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/bio/ |
H A D | b_sock.c | 631 } server,client; local 772 client = server; 776 if (client.sa.sa_family == AF_INET6) 778 memset(&client.sa_in6.sin6_addr,0,sizeof(client.sa_in6.sin6_addr)); 779 client.sa_in6.sin6_addr.s6_addr[15]=1; 783 if (client.sa.sa_family == AF_INET) 785 client.sa_in.sin_addr.s_addr=htonl(0x7F000001); 789 cs=socket(client.sa.sa_family,SOCK_STREAM,SOCKET_PROTOCOL); 793 ii=connect(cs,&client [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/drivers/ |
H A D | dlz_mysql_driver.c | 126 * and client strings are passed in (or NULL is passed if the 136 const char *client, unsigned int query, 261 * was a client string passed? If so, make it safe for use in 264 if (client != NULL) { 265 dbi->client = mysqldrv_escape_string((MYSQL *) dbi->dbconn, 266 client); 267 if (dbi->client == NULL) { 272 dbi->client = NULL; 360 /* free dbi->client string */ 361 if (dbi->client ! 135 mysql_get_resultset(const char *zone, const char *record, const char *client, unsigned int query, void *dbdata, MYSQL_RES **rs) argument 545 mysql_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument [all...] |
H A D | dlz_postgres_driver.c | 272 * and client strings are passed in (or NULL is passed if the 288 const char *client, unsigned int query, 451 * was a client string passed? If so, make it safe for use in 454 if (client != NULL) { 455 dbi->client = postgres_escape_string(client); 456 if (dbi->client == NULL) { 461 dbi->client = NULL; 468 "%d did client", dlz_thread_num); 606 /* free dbi->client strin 287 postgres_get_resultset(const char *zone, const char *record, const char *client, unsigned int query, void *dbdata, PGresult **rs) argument 810 postgres_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument [all...] |
H A D | dlz_bdb_driver.c | 102 DB *client; /*%< client database handle */ member in struct:bdb_instance 223 const char *client) 246 data.data = strdup(client); 254 if (db->client->cursor(db->client, NULL, &client_cursor, 0) != 0) { 380 if (db->client != NULL) 381 db->client->close(db->client, 0); 695 result = bdb_opendb(db->dbenv, DB_UNKNOWN, &db->client, 222 bdb_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument [all...] |
H A D | dlz_bdbhpt_driver.c | 101 DB *client; /*%< client database handle */ member in struct:bdbhpt_instance 250 const char *client) 272 data.data = strdup(client); 279 switch(db->client->get(db->client, NULL, &key, &data, DB_GET_BOTH)) { 470 if (db->client != NULL) 471 db->client->close(db->client, 0); 782 result = bdbhpt_opendb(db->dbenv, DB_UNKNOWN, &db->client, 249 bdbhpt_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/ |
H A D | hw_ide.c | 690 device *client) /*callback/default*/ 699 device_path(client)); 703 drive->device = client; 704 if (device_find_property(client, "ide-byte-count") != NULL) 705 drive->geometry.byte = device_find_integer_property(client, "ide-byte-count"); 708 if (device_find_property(client, "ide-sector-count") != NULL) 709 drive->geometry.sector = device_find_integer_property(client, "ide-sector-count"); 710 if (device_find_property(client, "ide-head-count") != NULL) 711 drive->geometry.head = device_find_integer_property(client, "ide-head-count"); 716 device_path(client), 684 hw_ide_attach_address(device *me, attach_type type, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument [all...] |
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/ |
H A D | auth.c | 273 static int have_srp_secret __P((char *client, char *server, int need_ip, 1857 * secret that we could possibly use for authenticating `client' 1862 have_chap_secret(client, server, need_ip, lacks_ipp) 1863 char *client; 1885 if (client != NULL && client[0] == 0) 1886 client = NULL; 1890 ret = scan_authfile(f, client, server, NULL, &addrs, NULL, filename, 0); 1906 * secret that we could possibly use for authenticating `client' 1911 have_srp_secret(client, serve [all...] |
H A D | chap-new.c | 91 } client; variable in typeref:struct:chap_client_state 151 memset(&client, 0, sizeof(client)); 176 struct chap_client_state *cs = &client; 188 struct chap_client_state *cs = &client; 235 struct chap_client_state *cs = &client; 521 struct chap_client_state *cs = &client; 552 struct chap_client_state *cs = &client;
|
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/clvmd/ |
H A D | clvmd-openais.c | 221 struct local_client *client; local 225 client = malloc(sizeof(struct local_client)); 226 if (!client) 232 memset(client, 0, sizeof(struct local_client)); 233 client->fd = fd; 234 client->type = CLUSTER_INTERNAL; 235 client->callback = callback; 236 add_client(client); 326 static int lck_dispatch(struct local_client *client, char *buf, int len, argument
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/bin/dlzbdb/ |
H A D | dlzbdb.c | 167 DB *client; /* client database handle */ member in struct:bdb_instance 236 char *c_zone = NULL; /*%< client zone to use in list operations */ 237 char *c_ip = NULL; /*%< client IP to use in list operations */ 444 if (db.client != NULL) { 445 db.client->close(db.client, 0); 446 db.client = NULL; 509 /* if client data, setup key for insertion */ 524 bdbres = db.client [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | krb5tgs.c | 109 krb5_principal client, 129 spd.client = client; 215 spd.client = cp; 284 hdb_entry_ex *client, 340 client, server, krbtgt, &pac, &signed_pac); 501 * Determine if constrained delegation is allowed from this client to this server 508 hdb_entry_ex *client, 515 /* if client delegates to itself, that ok */ 516 if (krb5_principal_compare(context, client 105 _kdc_add_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_enctype enctype, krb5_principal client, krb5_const_principal server, krb5_principals principals, EncTicketPart *tkt) argument 281 check_PAC(krb5_context context, krb5_kdc_configuration *config, const krb5_principal client_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, const EncryptionKey *server_key, const EncryptionKey *krbtgt_check_key, const EncryptionKey *krbtgt_sign_key, EncTicketPart *tkt, krb5_data *rspac, int *signedpath) argument 505 check_constrained_delegation(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, krb5_const_principal server) argument 551 check_s4u2self(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, krb5_const_principal server) argument 709 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument 1473 hdb_entry_ex *server = NULL, *client = NULL, *s4u2self_impersonated_client = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | match.c | 236 * Returns first item from client-list that is also supported by server-list, 242 match_list(const char *client, const char *server, u_int *next) argument 248 c = cp = xstrdup(client);
|
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/dmeventd/ |
H A D | libdevmapper-event.c | 308 FD_SET(fifos->client, &fds); 309 ret = select(fifos->client + 1, NULL, &fds, NULL, NULL); 316 ret = write(fifos->client, ((char *) buf) + bytes, 413 fifos->client = open(fifos->client_path, O_WRONLY | O_NONBLOCK); 414 if (fifos->client >= 0) { 417 close(fifos->client); 422 log_error("%s: Can't open client fifo %s: %s", 457 /* Initialize client. */ 488 /* if ((fifos->client = open(fifos->client_path, O_WRONLY | O_NONBLOCK)) < 0) {*/ 489 if ((fifos->client [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/postscreen/ |
H A D | postscreen_tests.c | 26 /* char *psc_print_grey_key(buffer, client, helo, sender, rcpt) 28 /* const char *client; 103 * Postscreen will log the client with "pass new" when it passes the final 122 * We know this client is brand new. 184 * enabled tests, but the remote SMTP client has not yet passed all those 318 * Don't record a client as "passed" while subject to penalty. Be sure to 322 * that were passed in previous sessions, otherwise a client may never 337 * Give disabled tests a dummy time stamp so that we don't log a client 364 char *psc_print_grey_key(VSTRING *buf, const char *client, argument 369 client, hel [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/common/ |
H A D | sim-core.h | 120 client device. 149 struct hw *client, 151 device *client,
|