HomeSort by: relevance | last modified time | path
    Searched defs:servername (Results 1 - 25 of 27) sorted by relevancy

1 2

  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
rd_error.c 83 char clientname[256], servername[256]; local
89 servername, sizeof(servername));
104 creds ? servername : "",
118 creds ? servername : "",
  /src/crypto/external/bsd/openssl.old/dist/test/
handshake_helper.h 34 ssl_servername_t servername; member in struct:handshake_result
ssl_test_ctx.h 100 ssl_servername_t servername; member in struct:__anon2277
183 * terminated with an alert, the servername will match with
185 * Note: in the event that the servername was accepted, the client should
handshake_helper.c 62 ssl_servername_t servername; member in struct:handshake_ex_data_st
116 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
120 if (servername == NULL) {
121 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
125 if (strcmp(servername, "server2") == 0) {
136 ex_data->servername = SSL_TEST_SERVERNAME_SERVER2;
138 } else if (strcmp(servername, "server1") == 0) {
139 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
142 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
152 const char *servername; local
    [all...]
ssltest_old.c 221 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
223 BIO_printf(bio_stdout, "Servername 2 is NULL\n");
227 if (servername) {
229 !strcasecmp(servername, sn_server2)) {
246 BIO_printf(bio_stdout, "Servername: expected context %d\n", sn_expect);
248 BIO_printf(bio_stdout, "Servername: context is 2\n");
250 BIO_printf(bio_stdout, "Servername: context is 1\n");
252 BIO_printf(bio_stdout, "Servername: context is unknown\n");
723 fprintf(stderr, " -sn_client <string> - have client request this servername\n");
724 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n")
    [all...]
  /src/usr.sbin/bootp/bootpgw/
bootpgw.c 125 char *servername;
321 servername = argv[0];
322 if (!servername) {
329 if (inet_aton(servername, &serv_addr.sin_addr) == 0) {
330 hep = gethostbyname(servername);
332 fprintf(stderr, "bootpgw: can't get addr for %s\n", servername);
124 char *servername; variable
  /src/usr.sbin/bootp/bootptest/
bootptest.c 138 char *servername = NULL; local
212 servername = *argv;
222 if (!servername) {
249 if (servername) {
250 if (inet_aton(servername, &sin_server.sin_addr) == 0) {
251 hep = gethostbyname(servername);
253 fprintf(stderr, "%s: unknown host\n", servername);
314 printf("No interface for %s\n", servername);
430 fprintf(stderr, "no response from %s\n", servername);
  /src/crypto/external/apache2/openssl/dist/test/helpers/
handshake.h 44 ssl_servername_t servername; member in struct:handshake_result
handshake.c 61 ssl_servername_t servername; member in struct:handshake_ex_data_st
104 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
107 if (servername == NULL) {
108 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
112 if (strcmp(servername, "server2") == 0) {
123 ex_data->servername = SSL_TEST_SERVERNAME_SERVER2;
125 } else if (strcmp(servername, "server1") == 0) {
126 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
129 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
139 const char *servername; local
    [all...]
ssl_test_ctx.h 102 ssl_servername_t servername; member in struct:__anon705
187 * terminated with an alert, the servername will match with
189 * Note: in the event that the servername was accepted, the client should
  /src/crypto/external/bsd/openssl/dist/test/helpers/
handshake.h 44 ssl_servername_t servername; member in struct:handshake_result
ssl_test_ctx.h 101 ssl_servername_t servername; member in struct:__anon1737
186 * terminated with an alert, the servername will match with
188 * Note: in the event that the servername was accepted, the client should
handshake.c 60 ssl_servername_t servername; member in struct:handshake_ex_data_st
104 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
108 if (servername == NULL) {
109 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
113 if (strcmp(servername, "server2") == 0) {
124 ex_data->servername = SSL_TEST_SERVERNAME_SERVER2;
126 } else if (strcmp(servername, "server1") == 0) {
127 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
130 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1;
140 const char *servername; local
    [all...]
  /src/usr.sbin/isibootd/
isibootd.c 127 const char *bootwd, *servername, *filename; local
216 /* check if specified servername is mine */
218 servername = (char *)fp->data;
219 if (strcmp(servername, station.name) != 0) {
220 TRACE(3, ("'%s' not for me\n", servername));
  /src/crypto/external/bsd/heimdal/dist/lib/ntlm/
heimntlm.h 105 char *servername; /**< */ member in struct:ntlm_targetinfo
  /src/sys/fs/nfs/nlm/
nlm_advlock.c 207 char servername[MNAMELEN]; local
232 strcpy(servername, nmp->nm_hostname);
257 host = nlm_find_host_by_name(servername, sa, vers);
  /src/usr.bin/rump_dhcpclient/
dhcp.h 151 uint8_t servername[SERVERNAME_LEN]; /* server host name */ member in struct:dhcp_message
  /src/external/mpl/bind/dist/bin/rndc/
rndc.c 67 static const char *servername = NULL; variable
518 notify("using server %s (%s)", servername, socktext);
602 if (key_only && servername == NULL) {
603 servername = "127.0.0.1";
604 } else if (servername == NULL && options != NULL) {
608 servername = cfg_obj_asstring(defserverobj);
612 if (servername == NULL) {
626 if (strcasecmp(name, servername) == 0) {
915 servername = isc_commandline_argument;
1013 if (nserveraddrs == 0 && servername != NULL)
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
ssl_old_test.c 210 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
212 BIO_printf(bio_stdout, "Servername 2 is NULL\n");
216 if (servername) {
217 if (s_ctx2 != NULL && sn_server2 != NULL && !OPENSSL_strcasecmp(servername, sn_server2)) {
234 BIO_printf(bio_stdout, "Servername: expected context %d\n", sn_expect);
236 BIO_printf(bio_stdout, "Servername: context is 2\n");
238 BIO_printf(bio_stdout, "Servername: context is 1\n");
240 BIO_printf(bio_stdout, "Servername: context is unknown\n");
722 fprintf(stderr, " -sn_client <string> - have client request this servername\n");
723 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n")
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
ssl_old_test.c 211 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
213 BIO_printf(bio_stdout, "Servername 2 is NULL\n");
217 if (servername) {
219 !OPENSSL_strcasecmp(servername, sn_server2)) {
236 BIO_printf(bio_stdout, "Servername: expected context %d\n", sn_expect);
238 BIO_printf(bio_stdout, "Servername: context is 2\n");
240 BIO_printf(bio_stdout, "Servername: context is 1\n");
242 BIO_printf(bio_stdout, "Servername: context is unknown\n");
716 fprintf(stderr, " -sn_client <string> - have client request this servername\n");
717 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n")
    [all...]
  /src/external/mpl/bind/dist/bin/dig/
dighost.h 235 char servername[MXNAME]; member in struct:dig_server
  /src/crypto/external/apache2/openssl/dist/apps/
s_server.c 420 char *servername; member in struct:tlsextctx_st
428 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
430 if (servername != NULL && p->biodebug != NULL) {
431 const char *cp = servername;
441 if (p->servername == NULL)
444 if (servername != NULL) {
445 if (OPENSSL_strcasecmp(servername, p->servername))
897 "Certificate file to use for servername; default " TEST_CERT2 },
908 "-Private Key file to use for servername if not in -cert2" }
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
s_client.c 597 {"servername", OPT_SERVERNAME, 's',
598 "Set TLS extension servername (SNI) in ClientHello (default)"},
844 const char *servername = NULL; local
1402 servername = opt_arg();
1490 if (servername != NULL) {
1492 "%s: Can't use -servername and -noservername together\n",
1537 if (servername == NULL && !noservername) {
1538 servername = sname_alloc = OPENSSL_strdup(host);
1979 if (!noservername && (servername != NULL || dane_tlsa_domain == NULL)) {
1980 if (servername == NULL)
    [all...]
s_server.c 411 char *servername; member in struct:tlsextctx_st
419 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local
421 if (servername != NULL && p->biodebug != NULL) {
422 const char *cp = servername;
432 if (p->servername == NULL)
435 if (servername != NULL) {
436 if (OPENSSL_strcasecmp(servername, p->servername))
770 "Certificate file to use for servername; default " TEST_CERT2},
781 "-Private Key file to use for servername if not in -cert2"}
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
s_client.c 701 {"servername", OPT_SERVERNAME, 's',
702 "Set TLS extension servername (SNI) in ClientHello (default)"},
940 const char *servername = NULL; local
1469 servername = opt_arg();
1538 if (servername != NULL) {
1540 "%s: Can't use -servername and -noservername together\n",
1592 if (servername == NULL && !noservername) {
1599 servername = sname_alloc;
2024 if (!noservername && (servername != NULL || dane_tlsa_domain == NULL)) {
2025 if (servername == NULL)
    [all...]

Completed in 43 milliseconds

1 2