/netbsd-current/external/gpl3/gdb/dist/gdb/testsuite/gdb.mi/ |
H A D | var-cmd.c | 94 struct anonymous { struct 555 struct anonymous *anon; 556 struct anonymous **ptr; 570 anon = (struct anonymous *) malloc (sizeof (struct anonymous)); 581 return; /* anonymous type tests breakpoint */
|
H A D | mi2-var-child.exp | 1169 set lineno [gdb_get_line_number "anonymous type tests breakpoint"] 1187 {struct anonymous **} ptr { 1188 {struct anonymous *} {*ptr} { 1190 anonymous struct { 1195 anonymous union { 1199 anonymous struct { 1243 anonymous struct { 1246 anonymous struct { 1274 anonymous union {
|
/netbsd-current/external/bsd/openldap/dist/tests/data/ |
H A D | slapd-idassert.conf | 49 by anonymous =x 108 # authorizes anonymous
|
H A D | slapd-acl.conf | 59 by anonymous auth
|
/netbsd-current/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.mi/ |
H A D | var-cmd.c | 94 struct anonymous { struct 554 struct anonymous *anon; 555 struct anonymous **ptr; 569 anon = malloc (sizeof (struct anonymous)); 580 return; /* anonymous type tests breakpoint */
|
H A D | mi2-var-child.exp | 1169 set lineno [gdb_get_line_number "anonymous type tests breakpoint"] 1187 {struct anonymous **} ptr { 1188 {struct anonymous *} {*ptr} { 1190 anonymous struct { 1195 anonymous union { 1199 anonymous struct { 1243 anonymous struct { 1246 anonymous struct { 1274 anonymous union {
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | init_creds.c | 185 krb5_appdefault_boolean(context, appname, realm, "anonymous", FALSE, &b); 278 int anonymous) 281 opt->anonymous = anonymous; 277 krb5_get_init_creds_opt_set_anonymous(krb5_get_init_creds_opt *opt, int anonymous) argument
|
H A D | krb5_locl.h | 373 unsigned int anonymous:1; member in struct:krb5_pk_init_ctx_data
|
H A D | ticket.c | 532 * Verify KDC supported anonymous if requested 543 if (!rep->enc_part.flags.anonymous) 548 * for either a fully anonymous request, or authenticated request for an 549 * anonymous ticket. If this is a TGS request, we're done. Then if the 550 * 'requested' principal was anonymous, we'll check the 'mapped' principal 552 * Finally, if the 'requested' principal was not anonymous, well check 553 * that the 'mapped' principal has an anonymous name and type, in a 554 * non-anonymous realm. (Should we also be checking for a realm match 572 * Verify returned client principal name in anonymous/referral case 582 if (rep->enc_part.flags.anonymous) { [all...] |
H A D | krb5.h | 750 int anonymous; member in struct:_krb5_get_init_creds_opt 948 #define KRB5_GIC_OPT_PKINIT_ANONYMOUS 4 /* anonymous PKINIT */ 956 #define KRB5_ANON_MATCH_UNAUTHENTICATED 2 /* anonymous PKINIT */
|
H A D | pkinit.c | 767 if (ctx->id->certs == NULL && ctx->anonymous == 0) { 1277 /* PA-PKINIT-KX is optional unless anonymous */ 1279 return ctx->anonymous ? KRB5_KDCREP_MODIFIED : 0; 1775 ctx->anonymous = 0; 2391 opt->opt_private->pk_init_ctx->anonymous = 1; 2446 N_("No anonymous pkinit support in RSA mode", ""));
|
H A D | acache.c | 303 cred->flags.b.anonymous = 1; 427 if (incred->flags.b.anonymous)
|
/netbsd-current/external/gpl3/gdb.old/dist/gdb/ |
H A D | psympriv.h | 205 or if the psymtab is anonymous then a descriptive name for 297 bool anonymous = false; member in struct:partial_symtab
|
H A D | psymtab.c | 163 if (pst->anonymous) 933 if (psymtab->anonymous) 1083 if (p->anonymous) 1116 if (ps->anonymous) 1139 gdb_assert (!ps->anonymous); 1332 if (ps->anonymous)
|
/netbsd-current/external/gpl3/gdb/dist/gdb/ |
H A D | psympriv.h | 266 or if the psymtab is anonymous then a descriptive name for 348 bool anonymous = false; member in struct:partial_symtab
|
H A D | psymtab.c | 692 if (psymtab->anonymous) 843 if (ps->anonymous) 866 gdb_assert (!ps->anonymous); 1047 if (ps->anonymous)
|
H A D | rust-parse.c | 1564 error (_("'_' not allowed in integers in anonymous field references"));
|
/netbsd-current/external/bsd/openldap/dist/tests/data/regressions/its8427/ |
H A D | its8427-2 | 185 olcAccess: to attrs=userPassword by anonymous ssf=2 auth by users read
|
/netbsd-current/external/bsd/openldap/dist/tests/data/regressions/its8521/ |
H A D | its8521 | 207 by anonymous auth by * read
|
/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | krb5tgs.c | 379 * request-anonymous and cname-in-addl-tkt flags for constrained 380 * delegation requests. A true anonymous TGS request will only 381 * have the request-anonymous flag set. (A corollary of this is 382 * that it is not possible to support anonymous constrained 385 return tgt->flags.anonymous || 514 * RFC 8062 section 3 defines an anonymous ticket as one containing 515 * the anonymous principal and the anonymous ticket flag. 517 if (tgt->flags.anonymous && 520 "Anonymous ticket flag set without anonymous principa [all...] |
H A D | kerberos5.c | 146 * of 16 for request_anonymous, as indicated in the anonymous draft 1524 "Request for anonymous ticket denied by local policy"); 1753 kdc_log(context, config, 0, "Anonymous client w/o anonymous flag"); 1965 r->et.flags.anonymous = 1; 2000 if (r->et.flags.anonymous) 2220 if (send_pac_p(context, req) && !r->et.flags.anonymous) {
|
/netbsd-current/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | klist.c | 131 if(cred->flags.b.anonymous)
|
/netbsd-current/external/bsd/fetch/dist/libfetch/ |
H A D | ftp.c | 101 #define FTP_ANONYMOUS_USER "anonymous" 684 union anonymous { union
|
/netbsd-current/external/gpl3/gdb.old/dist/gdb/testsuite/lib/ |
H A D | mi-support.exp | 2144 # anonymous struct { 2149 # anonymous union { 2190 # of -var-list-children, or the special tag "anonymous" 2293 # varobjs and anonymous structs/unions are not used for path expressions. 2299 # then it represents an anonymous struct or union. 2315 # which has no path expression. Likewsise for anonymous structs 2318 || [string compare $type "anonymous"] == 0} { 2382 } elseif {[string compare $type "anonymous"] == 0} { 2383 # Special case: anonymous types. In this case, NAME will either be 2386 set disp_name "<anonymous [all...] |
/netbsd-current/external/gpl3/gdb/dist/gdb/testsuite/lib/ |
H A D | mi-support.exp | 2221 # anonymous struct { 2226 # anonymous union { 2267 # of -var-list-children, or the special tag "anonymous" 2370 # varobjs and anonymous structs/unions are not used for path expressions. 2376 # then it represents an anonymous struct or union. 2392 # which has no path expression. Likewsise for anonymous structs 2395 || [string compare $type "anonymous"] == 0} { 2459 } elseif {[string compare $type "anonymous"] == 0} { 2460 # Special case: anonymous types. In this case, NAME will either be 2463 set disp_name "<anonymous [all...] |