/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | digest.c | 86 hdb_entry_ex *client) 91 client->entry.principal)); 106 hdb_entry_ex *client, 118 p = client->entry.principal; 223 hdb_entry_ex *client = NULL; local 304 /* check the client is allowed to do digest auth */ 319 HDB_F_GET_CLIENT, NULL, NULL, &client); 324 if (client->entry.flags.allow_digest == 0) { 1030 kdc_log(context, config, 0, "NTLM client have no unicode"); 1037 kdc_log(context, config, 0, "NTLM client does 85 get_ntlm_targetname(krb5_context context, hdb_entry_ex *client) argument 104 fill_targetinfo(krb5_context context, char *targetname, hdb_entry_ex *client, krb5_data *data) argument [all...] |
H A D | pkinit.c | 494 hdb_entry_ex *client, 538 /* Add any registered certificates for this client as trust anchors */ 539 ret = hdb_entry_get_pkinit_cert(&client->entry, &pc); 624 "MEMORY:client-anchors", 629 "Can't allocate client anchors: %d", 635 * If the client sent more then 10 EDI, don't bother 865 /* assume old client */ 935 * If the message client is a win2k-type but it send pa data 1238 const hdb_entry_ex *client, 1266 "No valid enctype available from client"); 490 _kdc_pk_rd_padata(krb5_context context, krb5_kdc_configuration *config, const KDC_REQ *req, const PA_DATA *pa, hdb_entry_ex *client, pk_client_params **ret_params) argument 1235 _kdc_pk_mk_pa_reply(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const hdb_entry_ex *client, krb5_enctype sessionetype, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock **reply_key, krb5_keyblock *sessionkey, METHOD_DATA *md) argument 1632 match_ms_upn_san(krb5_context context, krb5_kdc_configuration *config, hx509_context hx509ctx, hx509_cert client_cert, HDB *clientdb, hdb_entry_ex *client) argument 1703 _kdc_pk_check_client(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, pk_client_params *cp, char **subject_name) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/libpaa/ |
H A D | libpaa.c | 118 (void) snprintf(id->client, sizeof(id->client), "%.*s", 223 /* called from client to respond to the challenge */ 352 id->client,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | d1_lib.c | 71 int dtls1_listen(SSL *s, struct sockaddr *client); 474 int dtls1_listen(SSL *s, struct sockaddr *client) argument 484 (void) BIO_dgram_get_peer(SSL_get_rbio(s), client); local
|
H A D | kssl.c | 1119 &krb5creds.client)) != 0) 1206 if (krb5creds.client) krb5_free_principal(krb5context, 1207 krb5creds.client); 1303 ** Return Kerberos session key and client principle 1514 !krb5ticket->enc_part2->client || 1515 !krb5ticket->enc_part2->client->data || 1522 &krb5ticket->enc_part2->client->realm, 1523 krb5ticket->enc_part2->client->data, 1524 krb5ticket->enc_part2->client->length)) 1860 &krb5creds.client)) ! [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/bfin/ |
H A D | dv-bfin_ebiu_amc.c | 331 struct hw *client) 335 HW_TRACE ((me, "attach - level=%d, space=%d, addr=0x%lx, nr_bytes=%lu, client=%s", 336 level, space, (unsigned long) addr, (unsigned long) nr_bytes, hw_path (client))); 342 amc->slaves[addr + nr_bytes] = client; 326 bfin_ebiu_amc_attach_address_callback(struct hw *me, int level, int space, address_word addr, address_word nr_bytes, struct hw *client) argument
|
H A D | dv-bfin_emac.c | 506 struct hw *client) 508 const hw_unit *unit = hw_unit_address (client); 509 HW_TRACE ((me, "attach - level=%d, space=%d, addr=0x%lx, nr_bytes=%lu, client=%s", 510 level, space, (unsigned long) addr, (unsigned long) nr_bytes, hw_path (client))); 521 client, local 501 bfin_emac_attach_address_callback(struct hw *me, int level, int space, address_word addr, address_word nr_bytes, struct hw *client) argument
|
/netbsd-6-1-5-RELEASE/usr.sbin/isibootd/ |
H A D | isibootd.c | 200 /* check if the client has a valid hostname */ 278 search(uint8_t *client) argument 283 if (memcmp(client, cp->addr, ETHER_ADDR_LEN) == 0) 295 memcpy(cp->addr, client, ETHER_ADDR_LEN);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kcpytkt.c | 104 krb5_err(context, 1, ret, "Can't query client principal name"); 115 in_creds.client = me;
|
H A D | kdeltkt.c | 103 krb5_err(context, 1, ret, "Can't get client principal"); 110 in_creds.client = me;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | changepw.c | 94 krb5_principal_compare(context, creds->client, targprinc) != TRUE) 373 str2data (result_string, "client: wrong len in reply"); 379 "client: wrong version number (%d)", pkt_ver); 388 str2data (result_string, "client: wrong AP len in reply"); 423 "client: bad length in result"); 530 realm = creds->client->realm; 808 ret = krb5_cc_get_principal(context, ccache, &creds.client); 816 krb5_free_principal(context, creds.client);
|
H A D | krb5_ccapi.h | 110 char *client; member in struct:cc_credentials_v5_t
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/hkpclient/ |
H A D | hkpclient.lua | 32 -- a short HKP client
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | auth.h | 59 char *user; /* username sent by the client */ 84 * the client. 146 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
|
H A D | cipher.c | 131 cipher_mask_ssh1(int client) argument 136 if (client) {
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/named/include/named/ |
H A D | lwdclient.h | 102 * XXXMLG We can keep all of this in a client since we only service 114 * _IDLE The client is not doing anything at all. 116 * _RECV The client is waiting for data after issuing a socket recv(). 121 * immediately. An event will wake the client up. 128 * IDLE -> RECV when client has a recv() queued. 182 /*% lightweight daemon client manager */ 192 ISC_LIST(ns_lwdclient_t) idle; /*%< idle client slots */ 221 ns_lwdclient_sendreply(ns_lwdclient_t *client, isc_region_t *r);
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/ |
H A D | sntp-opts.def | 91 This option causes the client to write log messages to the specified 194 can be used as a SNTP client to query a NTP or SNTP server and either display 224 can be used as a SNTP client to query a NTP or SNTP server and either display
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/ |
H A D | hw_sem.c | 172 device *client) /*callback/default*/ 166 hw_sem_attach_address_callback(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
|
H A D | hw_shm.c | 156 device *client) /*callback/default*/ 150 hw_shm_attach_address_callback(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
|
H A D | hw_vm.c | 112 device *client) /*callback/default*/ 106 hw_vm_attach_address(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
|
/netbsd-6-1-5-RELEASE/lib/libwrap/ |
H A D | tcpd.h | 30 struct host_info client[1]; /* client endpoint info */ member in struct:request_info 84 extern void rfc931 /* client name from RFC 931 daemon */ 119 #define RQ_USER 3 /* client user name */ 120 #define RQ_CLIENT_NAME 4 /* client host name */ 121 #define RQ_CLIENT_ADDR 5 /* client host address */ 122 #define RQ_CLIENT_SIN 6 /* client endpoint (internal) */ 131 * name, address, and client user lookup methods. The request_info and 135 extern char *eval_user /* client user */
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtpd/ |
H A D | smtpd_sasl_glue.c | 85 /* An optional initial client response. 204 stream = state->client, 263 * SASL authentication protocol start-up. Process any initial client 278 * Receive the client response. "*" means that the client gives up.
|
H A D | smtpd_state.c | 85 state->client = stream;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kafs/ |
H A D | afskrb5.c | 162 ret = krb5_cc_get_principal(d->context, d->id, &in_creds.client); 181 krb5_free_principal(d->context, in_creds.client);
|
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/clvmd/ |
H A D | clvmd-cman.c | 176 static int _cluster_do_node_callback(struct local_client *client, argument 188 callback(client, (char *)&nodes[i].cn_nodeid, up); 241 /* We never return a new client */
|