/freebsd-11.0-release/crypto/openssh/ |
H A D | auth-rh-rsa.c | 45 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, argument 58 chost, _PATH_SSH_SYSTEM_HOSTFILE, 71 char *chost; local 81 chost = (char *)get_canonical_hostname(options.use_dns); 82 debug("Rhosts RSA authentication: canonical host %.900s", chost); 84 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { 94 chost); 103 pw->pw_name, cuser, chost);
|
H A D | auth2-hostbased.c | 63 char *pkalg, *cuser, *chost, *service; local 75 chost = packet_get_string(NULL); 79 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 80 cuser, chost, pkalg, slen); 129 buffer_put_cstring(&b, chost); 136 "client user \"%.100s\", client host \"%.100s\"", cuser, chost); 140 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) && 153 free(chost); 160 hostbased_key_allowed(struct passwd *pw, const char *cuser, char *chost, argument 174 debug2("%s: chost [all...] |
H A D | monitor.c | 1183 char *cuser, *chost; local 1193 chost = buffer_get_string(m, NULL); 1230 cuser, chost, key); 1233 cuser, chost); 1241 cuser, chost, key); 1264 hostbased_chost = chost; 1270 free(chost); 1350 char *chost) 1392 if (strcmp(p, chost) != 0) 1349 monitor_valid_hostbasedblob(u_char *data, u_int datalen, char *cuser, char *chost) argument
|
H A D | mux.c | 946 char *reserved, *chost; local 951 chost = reserved = NULL; 953 (chost = buffer_get_string_ret(m, NULL)) == NULL || 956 free(chost); 963 __func__, c->self, chost, cport); 972 free(chost); 996 free(chost); 1003 chost, cport)) { 1019 nc = channel_connect_stdio_fwd(chost, cport, new_fd[0], new_fd[1]);
|
H A D | sshconnect2.c | 1693 char *fp = NULL, *chost = NULL, *lname = NULL; local 1760 xasprintf(&chost, "%s.", lname); 1761 debug2("%s: chost %s", __func__, chost); 1782 (r = sshbuf_put_cstring(b, chost)) != 0 || 1808 (r = sshpkt_put_cstring(ssh, chost)) != 0 || 1825 free(chost);
|
/freebsd-11.0-release/contrib/ntp/ntpq/ |
H A D | ntpq.h | 121 typedef struct chost_tag chost; typedef in typeref:struct:chost_tag 127 extern chost chosts[];
|
H A D | ntpq.c | 387 chost chosts[MAXHOSTS];
|
/freebsd-11.0-release/contrib/bsnmp/lib/ |
H A D | snmpclient.c | 850 c->chost = NULL; 886 if (snmp_client.chost == NULL) { 887 if ((snmp_client.chost = malloc(1 + sizeof(DEFAULT_HOST))) 892 strcpy(snmp_client.chost, DEFAULT_HOST); 899 free(snmp_client.chost); 900 snmp_client.chost = ptr; 901 strcpy(snmp_client.chost, host); 927 error = getaddrinfo(snmp_client.chost, snmp_client.cport, &hints, &res0); 929 seterr(&snmp_client, "%s: %s", snmp_client.chost, 972 if (snmp_client.chost [all...] |
H A D | snmpclient.h | 77 char *chost; /* host name or IP address as string */ member in struct:snmp_client
|
/freebsd-11.0-release/usr.sbin/bsnmpd/tools/libbsnmptools/ |
H A D | bsnmptools.c | 798 if (snmp_client.trans > SNMP_TRANS_UDP && snmp_client.chost == NULL) { 799 if ((snmp_client.chost = malloc(strlen(SNMP_DEFAULT_LOCAL) + 1)) 804 strcpy(snmp_client.chost, SNMP_DEFAULT_LOCAL); 1432 if (snmp_client.chost != NULL) { 1433 free(snmp_client.chost); 1434 snmp_client.chost = NULL; 2018 fprintf(stdout, "Agent %s:%s returned error \n", snmp_client.chost,
|
/freebsd-11.0-release/sbin/atm/atmconfig/ |
H A D | atmconfig_device.c | 383 errx(1, "No response from '%s': %s", snmp_client.chost,
|