| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| rd_error.c | 83 char clientname[256], servername[256]; local 89 servername, sizeof(servername)); 104 creds ? servername : "", 118 creds ? servername : "",
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| handshake_helper.h | 34 ssl_servername_t servername; member in struct:handshake_result
|
| ssl_test_ctx.h | 100 ssl_servername_t servername; member in struct:__anon2277 183 * terminated with an alert, the servername will match with 185 * Note: in the event that the servername was accepted, the client should
|
| handshake_helper.c | 62 ssl_servername_t servername; member in struct:handshake_ex_data_st 116 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 120 if (servername == NULL) { 121 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 125 if (strcmp(servername, "server2") == 0) { 136 ex_data->servername = SSL_TEST_SERVERNAME_SERVER2; 138 } else if (strcmp(servername, "server1") == 0) { 139 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 142 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 152 const char *servername; local [all...] |
| ssltest_old.c | 221 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 223 BIO_printf(bio_stdout, "Servername 2 is NULL\n"); 227 if (servername) { 229 !strcasecmp(servername, sn_server2)) { 246 BIO_printf(bio_stdout, "Servername: expected context %d\n", sn_expect); 248 BIO_printf(bio_stdout, "Servername: context is 2\n"); 250 BIO_printf(bio_stdout, "Servername: context is 1\n"); 252 BIO_printf(bio_stdout, "Servername: context is unknown\n"); 723 fprintf(stderr, " -sn_client <string> - have client request this servername\n"); 724 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n") [all...] |
| /src/usr.sbin/bootp/bootpgw/ |
| bootpgw.c | 125 char *servername; 321 servername = argv[0]; 322 if (!servername) { 329 if (inet_aton(servername, &serv_addr.sin_addr) == 0) { 330 hep = gethostbyname(servername); 332 fprintf(stderr, "bootpgw: can't get addr for %s\n", servername); 124 char *servername; variable
|
| /src/usr.sbin/bootp/bootptest/ |
| bootptest.c | 138 char *servername = NULL; local 212 servername = *argv; 222 if (!servername) { 249 if (servername) { 250 if (inet_aton(servername, &sin_server.sin_addr) == 0) { 251 hep = gethostbyname(servername); 253 fprintf(stderr, "%s: unknown host\n", servername); 314 printf("No interface for %s\n", servername); 430 fprintf(stderr, "no response from %s\n", servername);
|
| /src/crypto/external/apache2/openssl/dist/test/helpers/ |
| handshake.h | 44 ssl_servername_t servername; member in struct:handshake_result
|
| handshake.c | 61 ssl_servername_t servername; member in struct:handshake_ex_data_st 104 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 107 if (servername == NULL) { 108 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 112 if (strcmp(servername, "server2") == 0) { 123 ex_data->servername = SSL_TEST_SERVERNAME_SERVER2; 125 } else if (strcmp(servername, "server1") == 0) { 126 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 129 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 139 const char *servername; local [all...] |
| ssl_test_ctx.h | 102 ssl_servername_t servername; member in struct:__anon705 187 * terminated with an alert, the servername will match with 189 * Note: in the event that the servername was accepted, the client should
|
| /src/crypto/external/bsd/openssl/dist/test/helpers/ |
| handshake.h | 44 ssl_servername_t servername; member in struct:handshake_result
|
| ssl_test_ctx.h | 101 ssl_servername_t servername; member in struct:__anon1737 186 * terminated with an alert, the servername will match with 188 * Note: in the event that the servername was accepted, the client should
|
| handshake.c | 60 ssl_servername_t servername; member in struct:handshake_ex_data_st 104 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 108 if (servername == NULL) { 109 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 113 if (strcmp(servername, "server2") == 0) { 124 ex_data->servername = SSL_TEST_SERVERNAME_SERVER2; 126 } else if (strcmp(servername, "server1") == 0) { 127 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 130 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; 140 const char *servername; local [all...] |
| /src/usr.sbin/isibootd/ |
| isibootd.c | 127 const char *bootwd, *servername, *filename; local 216 /* check if specified servername is mine */ 218 servername = (char *)fp->data; 219 if (strcmp(servername, station.name) != 0) { 220 TRACE(3, ("'%s' not for me\n", servername));
|
| /src/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
| heimntlm.h | 105 char *servername; /**< */ member in struct:ntlm_targetinfo
|
| /src/sys/fs/nfs/nlm/ |
| nlm_advlock.c | 207 char servername[MNAMELEN]; local 232 strcpy(servername, nmp->nm_hostname); 257 host = nlm_find_host_by_name(servername, sa, vers);
|
| /src/usr.bin/rump_dhcpclient/ |
| dhcp.h | 151 uint8_t servername[SERVERNAME_LEN]; /* server host name */ member in struct:dhcp_message
|
| /src/external/mpl/bind/dist/bin/rndc/ |
| rndc.c | 67 static const char *servername = NULL; variable 518 notify("using server %s (%s)", servername, socktext); 602 if (key_only && servername == NULL) { 603 servername = "127.0.0.1"; 604 } else if (servername == NULL && options != NULL) { 608 servername = cfg_obj_asstring(defserverobj); 612 if (servername == NULL) { 626 if (strcasecmp(name, servername) == 0) { 915 servername = isc_commandline_argument; 1013 if (nserveraddrs == 0 && servername != NULL) [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| ssl_old_test.c | 210 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 212 BIO_printf(bio_stdout, "Servername 2 is NULL\n"); 216 if (servername) { 217 if (s_ctx2 != NULL && sn_server2 != NULL && !OPENSSL_strcasecmp(servername, sn_server2)) { 234 BIO_printf(bio_stdout, "Servername: expected context %d\n", sn_expect); 236 BIO_printf(bio_stdout, "Servername: context is 2\n"); 238 BIO_printf(bio_stdout, "Servername: context is 1\n"); 240 BIO_printf(bio_stdout, "Servername: context is unknown\n"); 722 fprintf(stderr, " -sn_client <string> - have client request this servername\n"); 723 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n") [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| ssl_old_test.c | 211 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 213 BIO_printf(bio_stdout, "Servername 2 is NULL\n"); 217 if (servername) { 219 !OPENSSL_strcasecmp(servername, sn_server2)) { 236 BIO_printf(bio_stdout, "Servername: expected context %d\n", sn_expect); 238 BIO_printf(bio_stdout, "Servername: context is 2\n"); 240 BIO_printf(bio_stdout, "Servername: context is 1\n"); 242 BIO_printf(bio_stdout, "Servername: context is unknown\n"); 716 fprintf(stderr, " -sn_client <string> - have client request this servername\n"); 717 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n") [all...] |
| /src/external/mpl/bind/dist/bin/dig/ |
| dighost.h | 235 char servername[MXNAME]; member in struct:dig_server
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| s_server.c | 420 char *servername; member in struct:tlsextctx_st 428 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 430 if (servername != NULL && p->biodebug != NULL) { 431 const char *cp = servername; 441 if (p->servername == NULL) 444 if (servername != NULL) { 445 if (OPENSSL_strcasecmp(servername, p->servername)) 897 "Certificate file to use for servername; default " TEST_CERT2 }, 908 "-Private Key file to use for servername if not in -cert2" } [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| s_client.c | 597 {"servername", OPT_SERVERNAME, 's', 598 "Set TLS extension servername (SNI) in ClientHello (default)"}, 844 const char *servername = NULL; local 1402 servername = opt_arg(); 1490 if (servername != NULL) { 1492 "%s: Can't use -servername and -noservername together\n", 1537 if (servername == NULL && !noservername) { 1538 servername = sname_alloc = OPENSSL_strdup(host); 1979 if (!noservername && (servername != NULL || dane_tlsa_domain == NULL)) { 1980 if (servername == NULL) [all...] |
| s_server.c | 411 char *servername; member in struct:tlsextctx_st 419 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 421 if (servername != NULL && p->biodebug != NULL) { 422 const char *cp = servername; 432 if (p->servername == NULL) 435 if (servername != NULL) { 436 if (OPENSSL_strcasecmp(servername, p->servername)) 770 "Certificate file to use for servername; default " TEST_CERT2}, 781 "-Private Key file to use for servername if not in -cert2"} [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| s_client.c | 701 {"servername", OPT_SERVERNAME, 's', 702 "Set TLS extension servername (SNI) in ClientHello (default)"}, 940 const char *servername = NULL; local 1469 servername = opt_arg(); 1538 if (servername != NULL) { 1540 "%s: Can't use -servername and -noservername together\n", 1592 if (servername == NULL && !noservername) { 1599 servername = sname_alloc; 2024 if (!noservername && (servername != NULL || dane_tlsa_domain == NULL)) { 2025 if (servername == NULL) [all...] |