Searched refs:client (Results 276 - 300 of 381) sorted by relevance

<<111213141516

/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Ddigest.c86 hdb_entry_ex *client)
91 client->entry.principal));
106 hdb_entry_ex *client,
118 p = client->entry.principal;
223 hdb_entry_ex *client = NULL; local
304 /* check the client is allowed to do digest auth */
319 HDB_F_GET_CLIENT, NULL, NULL, &client);
324 if (client->entry.flags.allow_digest == 0) {
1030 kdc_log(context, config, 0, "NTLM client have no unicode");
1037 kdc_log(context, config, 0, "NTLM client does
85 get_ntlm_targetname(krb5_context context, hdb_entry_ex *client) argument
104 fill_targetinfo(krb5_context context, char *targetname, hdb_entry_ex *client, krb5_data *data) argument
[all...]
H A Dpkinit.c494 hdb_entry_ex *client,
538 /* Add any registered certificates for this client as trust anchors */
539 ret = hdb_entry_get_pkinit_cert(&client->entry, &pc);
624 "MEMORY:client-anchors",
629 "Can't allocate client anchors: %d",
635 * If the client sent more then 10 EDI, don't bother
865 /* assume old client */
935 * If the message client is a win2k-type but it send pa data
1238 const hdb_entry_ex *client,
1266 "No valid enctype available from client");
490 _kdc_pk_rd_padata(krb5_context context, krb5_kdc_configuration *config, const KDC_REQ *req, const PA_DATA *pa, hdb_entry_ex *client, pk_client_params **ret_params) argument
1235 _kdc_pk_mk_pa_reply(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const hdb_entry_ex *client, krb5_enctype sessionetype, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock **reply_key, krb5_keyblock *sessionkey, METHOD_DATA *md) argument
1632 match_ms_upn_san(krb5_context context, krb5_kdc_configuration *config, hx509_context hx509ctx, hx509_cert client_cert, HDB *clientdb, hdb_entry_ex *client) argument
1703 _kdc_pk_check_client(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, pk_client_params *cp, char **subject_name) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/libpaa/
H A Dlibpaa.c118 (void) snprintf(id->client, sizeof(id->client), "%.*s",
223 /* called from client to respond to the challenge */
352 id->client,
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/
H A Dd1_lib.c71 int dtls1_listen(SSL *s, struct sockaddr *client);
474 int dtls1_listen(SSL *s, struct sockaddr *client) argument
484 (void) BIO_dgram_get_peer(SSL_get_rbio(s), client); local
H A Dkssl.c1119 &krb5creds.client)) != 0)
1206 if (krb5creds.client) krb5_free_principal(krb5context,
1207 krb5creds.client);
1303 ** Return Kerberos session key and client principle
1514 !krb5ticket->enc_part2->client ||
1515 !krb5ticket->enc_part2->client->data ||
1522 &krb5ticket->enc_part2->client->realm,
1523 krb5ticket->enc_part2->client->data,
1524 krb5ticket->enc_part2->client->length))
1860 &krb5creds.client)) !
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/bfin/
H A Ddv-bfin_ebiu_amc.c331 struct hw *client)
335 HW_TRACE ((me, "attach - level=%d, space=%d, addr=0x%lx, nr_bytes=%lu, client=%s",
336 level, space, (unsigned long) addr, (unsigned long) nr_bytes, hw_path (client)));
342 amc->slaves[addr + nr_bytes] = client;
326 bfin_ebiu_amc_attach_address_callback(struct hw *me, int level, int space, address_word addr, address_word nr_bytes, struct hw *client) argument
H A Ddv-bfin_emac.c506 struct hw *client)
508 const hw_unit *unit = hw_unit_address (client);
509 HW_TRACE ((me, "attach - level=%d, space=%d, addr=0x%lx, nr_bytes=%lu, client=%s",
510 level, space, (unsigned long) addr, (unsigned long) nr_bytes, hw_path (client)));
521 client, local
501 bfin_emac_attach_address_callback(struct hw *me, int level, int space, address_word addr, address_word nr_bytes, struct hw *client) argument
/netbsd-6-1-5-RELEASE/usr.sbin/isibootd/
H A Disibootd.c200 /* check if the client has a valid hostname */
278 search(uint8_t *client) argument
283 if (memcmp(client, cp->addr, ETHER_ADDR_LEN) == 0)
295 memcpy(cp->addr, client, ETHER_ADDR_LEN);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kuser/
H A Dkcpytkt.c104 krb5_err(context, 1, ret, "Can't query client principal name");
115 in_creds.client = me;
H A Dkdeltkt.c103 krb5_err(context, 1, ret, "Can't get client principal");
110 in_creds.client = me;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dchangepw.c94 krb5_principal_compare(context, creds->client, targprinc) != TRUE)
373 str2data (result_string, "client: wrong len in reply");
379 "client: wrong version number (%d)", pkt_ver);
388 str2data (result_string, "client: wrong AP len in reply");
423 "client: bad length in result");
530 realm = creds->client->realm;
808 ret = krb5_cc_get_principal(context, ccache, &creds.client);
816 krb5_free_principal(context, creds.client);
H A Dkrb5_ccapi.h110 char *client; member in struct:cc_credentials_v5_t
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/hkpclient/
H A Dhkpclient.lua32 -- a short HKP client
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dauth.h59 char *user; /* username sent by the client */
84 * the client.
146 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
H A Dcipher.c131 cipher_mask_ssh1(int client) argument
136 if (client) {
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/named/include/named/
H A Dlwdclient.h102 * XXXMLG We can keep all of this in a client since we only service
114 * _IDLE The client is not doing anything at all.
116 * _RECV The client is waiting for data after issuing a socket recv().
121 * immediately. An event will wake the client up.
128 * IDLE -> RECV when client has a recv() queued.
182 /*% lightweight daemon client manager */
192 ISC_LIST(ns_lwdclient_t) idle; /*%< idle client slots */
221 ns_lwdclient_sendreply(ns_lwdclient_t *client, isc_region_t *r);
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/
H A Dsntp-opts.def91 This option causes the client to write log messages to the specified
194 can be used as a SNTP client to query a NTP or SNTP server and either display
224 can be used as a SNTP client to query a NTP or SNTP server and either display
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/ppc/
H A Dhw_sem.c172 device *client) /*callback/default*/
166 hw_sem_attach_address_callback(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
H A Dhw_shm.c156 device *client) /*callback/default*/
150 hw_shm_attach_address_callback(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
H A Dhw_vm.c112 device *client) /*callback/default*/
106 hw_vm_attach_address(device *me, attach_type attach, int space, unsigned_word addr, unsigned nr_bytes, access_type access, device *client) argument
/netbsd-6-1-5-RELEASE/lib/libwrap/
H A Dtcpd.h30 struct host_info client[1]; /* client endpoint info */ member in struct:request_info
84 extern void rfc931 /* client name from RFC 931 daemon */
119 #define RQ_USER 3 /* client user name */
120 #define RQ_CLIENT_NAME 4 /* client host name */
121 #define RQ_CLIENT_ADDR 5 /* client host address */
122 #define RQ_CLIENT_SIN 6 /* client endpoint (internal) */
131 * name, address, and client user lookup methods. The request_info and
135 extern char *eval_user /* client user */
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtpd/
H A Dsmtpd_sasl_glue.c85 /* An optional initial client response.
204 stream = state->client,
263 * SASL authentication protocol start-up. Process any initial client
278 * Receive the client response. "*" means that the client gives up.
H A Dsmtpd_state.c85 state->client = stream;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kafs/
H A Dafskrb5.c162 ret = krb5_cc_get_principal(d->context, d->id, &in_creds.client);
181 krb5_free_principal(d->context, in_creds.client);
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/clvmd/
H A Dclvmd-cman.c176 static int _cluster_do_node_callback(struct local_client *client, argument
188 callback(client, (char *)&nodes[i].cn_nodeid, up);
241 /* We never return a new client */

Completed in 391 milliseconds

<<111213141516