HomeSort by: relevance | last modified time | path
    Searched refs:peername (Results 1 - 25 of 40) sorted by relevancy

1 2

  /src/tests/net/if_wg/
common.sh 147 local peername=$2
164 $wgconfig $ifname add peer $peername $key $endpoint_opts \
167 $HIJACKING wgconfig $ifname show peer $peername
171 $HIJACKING wgconfig $ifname show peer $peername \
175 $HIJACKING wgconfig $ifname show peer $peername \
184 local peername=$2
186 $wgconfig $ifname delete peer $peername
187 atf_check -s exit:0 -o not-match:"peer: $peername" \
  /src/external/bsd/openldap/dist/servers/slapd/
proxyp.c 69 char peername[LDAP_IPADDRLEN]; local
70 struct berval peerbv = BER_BVC(peername);
76 peername[0] = '\0';
162 (long)sfd, peername );
173 (long)sfd, peername );
connection.c 316 const char* peername,
330 assert( peername != NULL );
430 ber_str2bv( peername, 0, 1, &c->c_peer_name );
550 id, (long) s, peername, listener->sl_name.bv_val );
1502 char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")]; local
1505 char peername[sizeof("IP=255.255.255.255:65336")];
1525 sprintf( peername, "IP=%s:%d", peeraddr_string,
1532 sprintf( peername, "IP=[%s]:%d", peeraddr_string,
1544 sprintf( peername, "IP=%s:%d",
1550 conn->c_connid, peername, conn->c_sock_name.bv_val )
    [all...]
  /src/external/mit/libuv/dist/test/
test-getsockname.c 109 struct sockaddr sockname, peername; local
137 namelen = sizeof peername;
138 r = uv_tcp_getpeername(handle, &peername, &namelen);
140 check_sockname(&peername, "127.0.0.1", connect_port, "accepted socket peer");
149 struct sockaddr sockname, peername; local
160 namelen = sizeof peername;
161 r = uv_tcp_getpeername((uv_tcp_t*) req->handle, &peername, &namelen);
163 check_sockname(&peername, "127.0.0.1", server_port, "connected socket peer");
172 struct sockaddr sockname, peername; local
204 r = uv_tcp_getpeername(&tcpServer, &peername, &namelen)
    [all...]
  /src/lib/librpcsvc/
yp.x 85 typedef string peername<YPMAXPEER>;
94 peername peer;
130 peername peer;
  /src/crypto/external/apache2/openssl/dist/crypto/x509/
x509_vpm.c 101 OPENSSL_free(param->peername);
413 return param->peername;
417 * Move peername from one param structure to another, freeing any name present
419 * the target peername.
424 char *peername = (from != NULL) ? from->peername : NULL; local
426 if (to->peername != peername) {
427 OPENSSL_free(to->peername);
428 to->peername = peername
    [all...]
v3_utl.c 826 char **peername)
839 if (rv > 0 && peername != NULL) {
840 *peername = OPENSSL_strndup((char *)a->data, a->length);
841 if (*peername == NULL)
856 if (rv > 0 && peername != NULL) {
857 *peername = OPENSSL_strndup((char *)astr, astrlen);
858 if (*peername == NULL) {
869 unsigned int flags, int check_type, char **peername)
971 chk, chklen, peername))
994 chk, chklen, peername))
    [all...]
x509_local.h 34 char *peername; /* Matching hostname in peer certificate */ member in struct:X509_VERIFY_PARAM_st
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
x509_vpm.c 104 OPENSSL_free(param->peername);
411 return param->peername;
415 * Move peername from one param structure to another, freeing any name present
417 * the target peername.
422 char *peername = (from != NULL) ? from->peername : NULL; local
424 if (to->peername != peername) {
425 OPENSSL_free(to->peername);
426 to->peername = peername
    [all...]
v3_utl.c 834 char **peername)
847 if (rv > 0 && peername != NULL) {
848 *peername = OPENSSL_strndup((char *)a->data, a->length);
849 if (*peername == NULL)
864 if (rv > 0 && peername != NULL) {
865 *peername = OPENSSL_strndup((char *)astr, astrlen);
866 if (*peername == NULL) {
877 unsigned int flags, int check_type, char **peername)
979 chk, chklen, peername)) != 0)
1001 chk, chklen, peername)) != 0
    [all...]
x509_local.h 34 char *peername; /* Matching hostname in peer certificate */ member in struct:X509_VERIFY_PARAM_st
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509/
x509_vpm.c 104 OPENSSL_free(param->peername);
403 return param->peername;
407 * Move peername from one param structure to another, freeing any name present
409 * the target peername.
414 char *peername = (from != NULL) ? from->peername : NULL; local
416 if (to->peername != peername) {
417 OPENSSL_free(to->peername);
418 to->peername = peername
    [all...]
x509_local.h 31 char *peername; /* Matching hostname in peer certificate */ member in struct:X509_VERIFY_PARAM_st
  /src/external/bsd/openldap/dist/servers/slapd/overlays/
auditlog.c 81 struct berval *b, *who = NULL, peername; local
128 peername = op->o_conn->c_peer_name;
138 peername.bv_val ? peername.bv_val: "", op->o_conn->c_connid);
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/
v3_utl.c 821 char **peername)
834 if (rv > 0 && peername != NULL) {
835 *peername = OPENSSL_strndup((char *)a->data, a->length);
836 if (*peername == NULL)
851 if (rv > 0 && peername != NULL) {
852 *peername = OPENSSL_strndup((char *)astr, astrlen);
853 if (*peername == NULL) {
864 unsigned int flags, int check_type, char **peername)
916 chk, chklen, peername)) != 0)
938 chk, chklen, peername)) != 0
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/roken/
socket_wrapper.c 231 struct sockaddr *peername; member in struct:socket_info
1060 dest_addr = (const struct sockaddr_in *)si->peername;
1072 src_addr = (const struct sockaddr_in *)si->peername;
1075 swrap_dump_packet(si, si->peername,
1089 src_addr = (const struct sockaddr_in *)si->peername;
1103 src_addr = (const struct sockaddr_in *)si->peername;
1115 src_addr = (const struct sockaddr_in *)si->peername;
1155 dest_addr = (const struct sockaddr_in *)si->peername;
1169 src_addr = (const struct sockaddr_in *)si->peername;
1183 dest_addr = (const struct sockaddr_in *)si->peername;
    [all...]
  /src/external/bsd/openldap/dist/servers/slapd/back-ldap/
monitor.c 417 char peername[MAXPATHLEN + sizeof("PATH=")]; local
419 char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")]; local
421 char peername[sizeof("IP=255.255.255.255:65336")]; local
433 sprintf( peername, "PATH=%s", sa.sa_un_addr.sun_path );
449 sprintf( peername, "IP=%s:%d", peeraddr,
456 sprintf( peername, "IP=[%s]:%d", peeraddr,
470 sprintf( peername, "IP=%s:%d", peeraddr,
475 sprintf( peername, SLAP_STRING_UNKNOWN );
478 ber_str2bv( peername, 0, 1, bv );
  /src/external/bsd/openldap/dist/servers/lloadd/
connection.c 586 lload_connection_init( ber_socket_t s, const char *peername, int flags )
590 assert( peername != NULL );
643 "connection connid=%lu allocated for socket fd=%d peername=%s\n",
644 c->c_connid, s, peername );
proto-lload.h 67 LDAP_SLAPD_F (LloadConnection *) client_init( ber_socket_t s, const char *peername, struct event_base *base, int use_tls );
99 LDAP_SLAPD_F (LloadConnection *) lload_connection_init( ber_socket_t s, const char *peername, int use_tls );
daemon.c 856 char peername[LDAP_IPADDRLEN]; local
857 struct berval peerbv = BER_BVC(peername);
864 peername[0] = '\0';
929 sprintf( peername, "PATH=%s", sl->sl_sa.sa_un_addr.sun_path );
948 c = client_init( s, peername, lload_daemon[tid].base, cflag );
953 (long)s, peername, sl->sl_name.bv_val );
  /src/external/mpl/bind/dist/lib/isc/
tls.c 1774 char peername[ISC_SOCKADDR_FORMATSIZE] = { 0 }; local
1778 isc_sockaddr_format(remote_peer, peername, sizeof(peername));
1780 isc_tlsctx_client_session_cache_keep(cache, peername, tls);
1787 char peername[ISC_SOCKADDR_FORMATSIZE] = { 0 }; local
1791 isc_sockaddr_format(remote_peer, peername, sizeof(peername));
1793 isc_tlsctx_client_session_cache_reuse(cache, peername, tls);
  /src/external/mpl/dhcp/dist/contrib/ldap/
dhcpd-conf-to-ldap 574 my ($peername, @statements);
577 parse_error() if(($peername = $1) !~ /^\"?[^\"]+\"?$/);
585 print STDERR "Warning: Failover config 'peer $peername' found!\n";
596 $failover{$peername} = [@statements];
  /src/external/mpl/dhcp/dist/server/
ldap.c 845 struct berval **tempbv, **peername; local
850 if ((peername = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
851 peername[0] == NULL)
853 if (peername != NULL)
854 ldap_value_free_len (peername);
885 peername[0]->bv_val, tempbv[0]->bv_val);
887 ldap_value_free_len (peername);
907 " attributes match our local address", peername[0]->bv_val);
909 ldap_value_free_len (peername);
922 peername[0]->bv_val, tempbv[0]->bv_val)
    [all...]
  /src/external/ibm-public/postfix/dist/src/tls/
tls_client.c 353 const char *peername = SSL_get0_peername(TLScontext->con); local
355 if (peername)
356 msg_info("%s: matched peername: %s",
357 TLScontext->namaddr, peername);
1338 * Do peername verification if requested and extract useful information
  /src/usr.sbin/syslogd/
tls.c 1356 char *peername; local
1375 DPRINTF(D_NET, "could not get peername: %s", gai_strerror(rc));
1376 peername = NULL;
1380 MALLOC(peername, len);
1381 (void)memcpy(peername, hbuf, len);
1388 logerror("access from %s denied by hosts_access", peername);
1426 "TLS connection from %s", peername);
1433 conn_info->hostname = peername;
1445 "calling SSL_accept()...\n", peername, newsock);

Completed in 34 milliseconds

1 2