/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | monitor_wrap.h | 126 int mm_auth_krb5(void *authctxt, void *auth, char **client, void *reply);
|
H A D | sshconnect1.c | 7 * Code to connect to a remote host, and to perform the client side of the 595 problem = krb5_cc_get_principal(context, ccache, &creds.client); 600 strlen(creds.client->realm), creds.client->realm, 601 "krbtgt", creds.client->realm, NULL); 629 krb5_unparse_name(context, creds.client, &pname); 646 if (creds.client) 647 krb5_free_principal(context, creds.client); 844 * Note that the client code is not tied to s/key or TIS.
|
/netbsd-6-1-5-RELEASE/dist/pf/usr.sbin/ftp-proxy/ |
H A D | ipf.c | 396 ipf_server_lookup(struct sockaddr *client, struct sockaddr *proxy, argument 403 if (client->sa_family != AF_INET) { 421 natlook.nl_outip = satosin(client)->sin_addr; 423 natlook.nl_outport = satosin(client)->sin_port;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/drivers/ |
H A D | dlz_odbc_driver.c | 465 * and client strings are passed in (or NULL is passed if the 483 const char *client, unsigned int query, 609 * was a client string passed? If so, make it safe for use in 612 if (client != NULL) { 613 dbi->client = odbc_escape_string(client); 614 if (dbi->client == NULL) { 619 dbi->client = NULL; 708 /* free dbi->client string */ 709 if (dbi->client ! 482 odbc_get_resultset(const char *zone, const char *record, const char *client, unsigned int query, void *dbdata, dbinstance_t **r_dbi) argument 1003 odbc_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument [all...] |
H A D | dlz_stub_driver.c | 116 const char *client) 121 UNUSED(client); 115 stub_dlz_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/ |
H A D | sdlz.h | 99 const char *client); 114 * client. If the zone is supported by the database, but zone 115 * transfers are not allowed for the specified client this method 203 * information about the querying client (such as source IP address)
|
H A D | resolver.h | 70 * 'rdataset', 'sigrdataset', 'client' and 'id' are the values that were 84 isc_sockaddr_t * client; member in struct:dns_fetchevent 270 isc_sockaddr_t *client, isc_uint16_t id, 298 *\li 'client' and 'id' are used for duplicate query detection. '*client' 317 *\li 'client' is a valid sockaddr or NULL.
|
/netbsd-6-1-5-RELEASE/external/bsd/libarchive/dist/libarchive/ |
H A D | archive_read_private.h | 106 * The client looks a lot like a filter, so we just wrap it here. 130 * data to client buffers, filling gaps with zero bytes. 137 /* Callbacks to open/read/write/close client archive stream. */ 138 struct archive_read_client client; member in struct:archive_read
|
H A D | archive_read.c | 28 * is, stuff that will probably always be used by any client that 246 r = (self->archive->client.reader)(&self->archive->archive, 260 if (self->archive->client.skipper == NULL) 267 get = (self->archive->client.skipper)(&self->archive->archive, 282 if (self->archive->client.closer != NULL) 283 r = (self->archive->client.closer)((struct archive *)self->archive, 320 /* Save the client functions and mock up the initial source. */ 321 a->client.reader = client_reader; 322 a->client.skipper = client_skipper; 323 a->client [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/ |
H A D | cmd-pipe-pane.c | 52 struct client *c;
|
H A D | resize.c | 28 * Every session has the size of the smallest client it is attached to and 31 * So, when a client is resized or a session attached to or detached from a 32 * client, the window sizes must be recalculated. For each session, find the 33 * smallest client it is attached to, and resize it to that size. Then for 35 * size and clear and redraw every client with it as the current window. 49 struct client *c;
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/ |
H A D | wps_upnp_i.h | 56 struct sockaddr_in client; /* for M-SEARCH replies */ member in struct:advertisement_state_machine
|
/netbsd-6-1-5-RELEASE/usr.bin/nfsstat/ |
H A D | nfsstat.c | 392 int client[NSHORTPROC]; member in struct:stats 417 current.client[i] += nfsstats.rpccnt[idx]; 426 current.client[i] - last.client[i]);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/ |
H A D | glue.c | 83 &c->client); 167 ret = krb5_copy_principal(context, c->client,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | ent_setup.c | 59 flags->client = 1; /* XXX */ 120 ent->entry.flags.client = 1;
|
H A D | ipropd_slave.c | 105 krb5_principal client; local 125 KRB5_NT_SRV_HST, &client); 135 ret = krb5_get_init_creds_keytab(context, &creds, client, keytab, 147 ret = krb5_cc_initialize(context, *cache, client); 154 krb5_free_principal(context, client);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/tkey/ |
H A D | tests.sh | 31 dhkeyname=`$KEYGEN -T KEY -a DH -b 768 -n host -r $RANDFILE client` || ret=1
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/example/ |
H A D | named.conf | 34 * demonstrate the code that retreives client information from the
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/ |
H A D | hw_pal.c | 324 device *client) 327 pal->disk = client; 318 hw_pal_attach_address(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/mantools/ |
H A D | make_soho_readme | 51 Postfix SMTP client</a></li>
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtpd/ |
H A D | smtpd.h | 72 VSTREAM *client; /* SMTP client handle */ member in struct:__anon2469 73 VSTRING *buffer; /* SMTP client buffer */ 77 char *name; /* verified client hostname */ 78 char *reverse_name; /* unverified client hostname */ 79 char *addr; /* client host address string */ 84 struct sockaddr_storage sockaddr; /* binary client endpoint */ 87 int conn_count; /* connections from this client */ 88 int conn_rate; /* connection rate for this client */ 90 int error_mask; /* client error [all...] |
H A D | smtpd.c | 107 /* Lookup tables, indexed by the remote SMTP client address, with 110 /* remote SMTP client. 114 /* to a remote SMTP client. 256 /* Postfix SMTP client to a remote SMTP server. 319 /* to sign either remote SMTP client certificates or intermediate CA 323 /* trusted to sign either remote SMTP client certificates or intermediate CA 330 /* Ask a remote SMTP client for a client certificate. 336 /* The verification depth for remote SMTP client certificates. 368 /* as well as the client CommonNam [all...] |
/netbsd-6-1-5-RELEASE/usr.sbin/ypserv/ypinit/ |
H A D | ypinit.sh | 39 servertype=client 79 The \`-c' flag sets up a YP client, the \`-m' flag builds a master YP 141 A YP client needs a list of YP servers to bind to. 155 if [ "${servertype}" != "client" ]; then 195 if [ "${servertype}" != "client" ]; then 212 if [ "${servertype}" = "client" ]; then
|
/netbsd-6-1-5-RELEASE/lib/libtelnet/ |
H A D | kerberos5.c | 400 if (krb5_unparse_name(telnet_context, ticket->client, &name)) 404 ticket->client, UserNameRequested)) { 465 ticket->client); 600 krb5_kuserok(telnet_context, ticket->client, UserNameRequested)) { 695 creds.client = principal;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/export/samples/ |
H A D | nsprobe.c | 43 #include <dns/client.h> 56 static dns_client_t *client = NULL; variable 735 result = dns_client_startrequest(client, trans->qmessage, 806 dns_client_freeresanswer(client, &rev->answerlist); 836 return (dns_client_startresolve(client, pns->name, dns_rdataclass_in, 952 dns_client_freeresanswer(client, &rev->answerlist); 1003 result = dns_client_startresolve(client, trans->qname, 1085 timermgr, 0, &client); 1114 result = dns_client_setservers(client, dns_rdataclass_in, NULL, 1218 dns_client_destroy(&client); [all...] |