/freebsd-10.0-release/crypto/openssh/ |
H A D | auth-rh-rsa.c | 42 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, argument 55 chost, _PATH_SSH_SYSTEM_HOSTFILE, 68 char *chost; local 78 chost = (char *)get_canonical_hostname(options.use_dns); 79 debug("Rhosts RSA authentication: canonical host %.900s", chost); 81 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { 91 chost); 100 pw->pw_name, cuser, chost);
|
H A D | auth2-hostbased.c | 61 char *pkalg, *cuser, *chost, *service; local 73 chost = packet_get_string(NULL); 77 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 78 cuser, chost, pkalg, slen); 114 buffer_put_cstring(&b, chost); 121 "client user \"%.100s\", client host \"%.100s\"", cuser, chost); 125 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) && 138 free(chost); 145 hostbased_key_allowed(struct passwd *pw, const char *cuser, char *chost, argument 159 debug2("userauth_hostbased: chost [all...] |
H A D | mux.c | 883 char *reserved, *chost; local 887 chost = reserved = NULL; 889 (chost = buffer_get_string_ret(m, NULL)) == NULL || 892 free(chost); 899 __func__, c->self, chost, cport); 908 free(chost); 932 free(chost); 939 chost, cport)) { 955 nc = channel_connect_stdio_fwd(chost, cport, new_fd[0], new_fd[1]);
|
H A D | sshconnect2.c | 1718 char *chost, *pkalg, *p; local 1749 xasprintf(&chost, "%s.", p); 1750 debug2("userauth_hostbased: chost %s", chost); 1765 buffer_put_cstring(&b, chost); 1780 free(chost); 1791 packet_put_cstring(chost); 1796 free(chost);
|
H A D | monitor.c | 1151 char *cuser, *chost; local 1161 chost = buffer_get_string(m, NULL); 1185 cuser, chost, key); 1188 cuser, chost); 1195 cuser, chost, key); 1217 hostbased_chost = chost; 1223 free(chost); 1303 char *chost) 1345 if (strcmp(p, chost) != 0) 1302 monitor_valid_hostbasedblob(u_char *data, u_int datalen, char *cuser, char *chost) argument
|
/freebsd-10.0-release/contrib/bsnmp/lib/ |
H A D | snmpclient.c | 850 c->chost = NULL; 886 if (snmp_client.chost == NULL) { 887 if ((snmp_client.chost = malloc(1 + sizeof(DEFAULT_HOST))) 892 strcpy(snmp_client.chost, DEFAULT_HOST); 899 free(snmp_client.chost); 900 snmp_client.chost = ptr; 901 strcpy(snmp_client.chost, host); 927 error = getaddrinfo(snmp_client.chost, snmp_client.cport, &hints, &res0); 929 seterr(&snmp_client, "%s: %s", snmp_client.chost, 972 if (snmp_client.chost [all...] |
H A D | snmpclient.h | 77 char *chost; /* host name or IP address as string */ member in struct:snmp_client
|
/freebsd-10.0-release/sys/netipx/ |
H A D | ipx.c | 412 char cport[10], chost[15], cnet[15]; local 444 snprintf(chost, sizeof(chost), "%x%x%x%x%x%x", 446 for (p = chost; *p == '0' && p < chost + 12; p++)
|
/freebsd-10.0-release/usr.bin/netstat/ |
H A D | route.c | 1053 char cport[10], chost[15], cnet[15]; local 1089 sprintf(chost, "%02x%02x%02x%02x%02x%02x", 1091 for (p = chost; *p == '0' && p < chost + 12; p++)
|
/freebsd-10.0-release/usr.sbin/bsnmpd/tools/libbsnmptools/ |
H A D | bsnmptools.c | 800 if (snmp_client.trans > SNMP_TRANS_UDP && snmp_client.chost == NULL) { 801 if ((snmp_client.chost = malloc(strlen(SNMP_DEFAULT_LOCAL + 1))) 806 strcpy(snmp_client.chost, SNMP_DEFAULT_LOCAL); 1437 if (snmp_client.chost != NULL) { 1438 free(snmp_client.chost); 1439 snmp_client.chost = NULL; 2023 fprintf(stdout, "Agent %s:%s returned error \n", snmp_client.chost,
|
/freebsd-10.0-release/sbin/atm/atmconfig/ |
H A D | atmconfig_device.c | 383 errx(1, "No response from '%s': %s", snmp_client.chost,
|