Searched refs:client (Results 251 - 275 of 381) sorted by relevance

<<111213141516

/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dmonitor_wrap.h126 int mm_auth_krb5(void *authctxt, void *auth, char **client, void *reply);
H A Dsshconnect1.c7 * Code to connect to a remote host, and to perform the client side of the
595 problem = krb5_cc_get_principal(context, ccache, &creds.client);
600 strlen(creds.client->realm), creds.client->realm,
601 "krbtgt", creds.client->realm, NULL);
629 krb5_unparse_name(context, creds.client, &pname);
646 if (creds.client)
647 krb5_free_principal(context, creds.client);
844 * Note that the client code is not tied to s/key or TIS.
/netbsd-6-1-5-RELEASE/dist/pf/usr.sbin/ftp-proxy/
H A Dipf.c396 ipf_server_lookup(struct sockaddr *client, struct sockaddr *proxy, argument
403 if (client->sa_family != AF_INET) {
421 natlook.nl_outip = satosin(client)->sin_addr;
423 natlook.nl_outport = satosin(client)->sin_port;
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/drivers/
H A Ddlz_odbc_driver.c465 * and client strings are passed in (or NULL is passed if the
483 const char *client, unsigned int query,
609 * was a client string passed? If so, make it safe for use in
612 if (client != NULL) {
613 dbi->client = odbc_escape_string(client);
614 if (dbi->client == NULL) {
619 dbi->client = NULL;
708 /* free dbi->client string */
709 if (dbi->client !
482 odbc_get_resultset(const char *zone, const char *record, const char *client, unsigned int query, void *dbdata, dbinstance_t **r_dbi) argument
1003 odbc_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
[all...]
H A Ddlz_stub_driver.c116 const char *client)
121 UNUSED(client);
115 stub_dlz_allowzonexfr(void *driverarg, void *dbdata, const char *name, const char *client) argument
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/
H A Dsdlz.h99 const char *client);
114 * client. If the zone is supported by the database, but zone
115 * transfers are not allowed for the specified client this method
203 * information about the querying client (such as source IP address)
H A Dresolver.h70 * 'rdataset', 'sigrdataset', 'client' and 'id' are the values that were
84 isc_sockaddr_t * client; member in struct:dns_fetchevent
270 isc_sockaddr_t *client, isc_uint16_t id,
298 *\li 'client' and 'id' are used for duplicate query detection. '*client'
317 *\li 'client' is a valid sockaddr or NULL.
/netbsd-6-1-5-RELEASE/external/bsd/libarchive/dist/libarchive/
H A Darchive_read_private.h106 * The client looks a lot like a filter, so we just wrap it here.
130 * data to client buffers, filling gaps with zero bytes.
137 /* Callbacks to open/read/write/close client archive stream. */
138 struct archive_read_client client; member in struct:archive_read
H A Darchive_read.c28 * is, stuff that will probably always be used by any client that
246 r = (self->archive->client.reader)(&self->archive->archive,
260 if (self->archive->client.skipper == NULL)
267 get = (self->archive->client.skipper)(&self->archive->archive,
282 if (self->archive->client.closer != NULL)
283 r = (self->archive->client.closer)((struct archive *)self->archive,
320 /* Save the client functions and mock up the initial source. */
321 a->client.reader = client_reader;
322 a->client.skipper = client_skipper;
323 a->client
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/
H A Dcmd-pipe-pane.c52 struct client *c;
H A Dresize.c28 * Every session has the size of the smallest client it is attached to and
31 * So, when a client is resized or a session attached to or detached from a
32 * client, the window sizes must be recalculated. For each session, find the
33 * smallest client it is attached to, and resize it to that size. Then for
35 * size and clear and redraw every client with it as the current window.
49 struct client *c;
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/
H A Dwps_upnp_i.h56 struct sockaddr_in client; /* for M-SEARCH replies */ member in struct:advertisement_state_machine
/netbsd-6-1-5-RELEASE/usr.bin/nfsstat/
H A Dnfsstat.c392 int client[NSHORTPROC]; member in struct:stats
417 current.client[i] += nfsstats.rpccnt[idx];
426 current.client[i] - last.client[i]);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/
H A Dglue.c83 &c->client);
167 ret = krb5_copy_principal(context, c->client,
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kadm5/
H A Dent_setup.c59 flags->client = 1; /* XXX */
120 ent->entry.flags.client = 1;
H A Dipropd_slave.c105 krb5_principal client; local
125 KRB5_NT_SRV_HST, &client);
135 ret = krb5_get_init_creds_keytab(context, &creds, client, keytab,
147 ret = krb5_cc_initialize(context, *cache, client);
154 krb5_free_principal(context, client);
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/tkey/
H A Dtests.sh31 dhkeyname=`$KEYGEN -T KEY -a DH -b 768 -n host -r $RANDFILE client` || ret=1
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/example/
H A Dnamed.conf34 * demonstrate the code that retreives client information from the
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/
H A Dhw_pal.c324 device *client)
327 pal->disk = client;
318 hw_pal_attach_address(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/mantools/
H A Dmake_soho_readme51 Postfix SMTP client</a></li>
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtpd/
H A Dsmtpd.h72 VSTREAM *client; /* SMTP client handle */ member in struct:__anon2469
73 VSTRING *buffer; /* SMTP client buffer */
77 char *name; /* verified client hostname */
78 char *reverse_name; /* unverified client hostname */
79 char *addr; /* client host address string */
84 struct sockaddr_storage sockaddr; /* binary client endpoint */
87 int conn_count; /* connections from this client */
88 int conn_rate; /* connection rate for this client */
90 int error_mask; /* client error
[all...]
H A Dsmtpd.c107 /* Lookup tables, indexed by the remote SMTP client address, with
110 /* remote SMTP client.
114 /* to a remote SMTP client.
256 /* Postfix SMTP client to a remote SMTP server.
319 /* to sign either remote SMTP client certificates or intermediate CA
323 /* trusted to sign either remote SMTP client certificates or intermediate CA
330 /* Ask a remote SMTP client for a client certificate.
336 /* The verification depth for remote SMTP client certificates.
368 /* as well as the client CommonNam
[all...]
/netbsd-6-1-5-RELEASE/usr.sbin/ypserv/ypinit/
H A Dypinit.sh39 servertype=client
79 The \`-c' flag sets up a YP client, the \`-m' flag builds a master YP
141 A YP client needs a list of YP servers to bind to.
155 if [ "${servertype}" != "client" ]; then
195 if [ "${servertype}" != "client" ]; then
212 if [ "${servertype}" = "client" ]; then
/netbsd-6-1-5-RELEASE/lib/libtelnet/
H A Dkerberos5.c400 if (krb5_unparse_name(telnet_context, ticket->client, &name))
404 ticket->client, UserNameRequested)) {
465 ticket->client);
600 krb5_kuserok(telnet_context, ticket->client, UserNameRequested)) {
695 creds.client = principal;
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/export/samples/
H A Dnsprobe.c43 #include <dns/client.h>
56 static dns_client_t *client = NULL; variable
735 result = dns_client_startrequest(client, trans->qmessage,
806 dns_client_freeresanswer(client, &rev->answerlist);
836 return (dns_client_startresolve(client, pns->name, dns_rdataclass_in,
952 dns_client_freeresanswer(client, &rev->answerlist);
1003 result = dns_client_startresolve(client, trans->qname,
1085 timermgr, 0, &client);
1114 result = dns_client_setservers(client, dns_rdataclass_in, NULL,
1218 dns_client_destroy(&client);
[all...]

Completed in 637 milliseconds

<<111213141516