| /src/tests/net/if_wg/ |
| common.sh | 147 local peername=$2 164 $wgconfig $ifname add peer $peername $key $endpoint_opts \ 167 $HIJACKING wgconfig $ifname show peer $peername 171 $HIJACKING wgconfig $ifname show peer $peername \ 175 $HIJACKING wgconfig $ifname show peer $peername \ 184 local peername=$2 186 $wgconfig $ifname delete peer $peername 187 atf_check -s exit:0 -o not-match:"peer: $peername" \
|
| /src/external/bsd/openldap/dist/servers/slapd/ |
| proxyp.c | 69 char peername[LDAP_IPADDRLEN]; local 70 struct berval peerbv = BER_BVC(peername); 76 peername[0] = '\0'; 162 (long)sfd, peername ); 173 (long)sfd, peername );
|
| connection.c | 316 const char* peername, 330 assert( peername != NULL ); 430 ber_str2bv( peername, 0, 1, &c->c_peer_name ); 550 id, (long) s, peername, listener->sl_name.bv_val ); 1502 char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")]; local 1505 char peername[sizeof("IP=255.255.255.255:65336")]; 1525 sprintf( peername, "IP=%s:%d", peeraddr_string, 1532 sprintf( peername, "IP=[%s]:%d", peeraddr_string, 1544 sprintf( peername, "IP=%s:%d", 1550 conn->c_connid, peername, conn->c_sock_name.bv_val ) [all...] |
| /src/external/mit/libuv/dist/test/ |
| test-getsockname.c | 109 struct sockaddr sockname, peername; local 137 namelen = sizeof peername; 138 r = uv_tcp_getpeername(handle, &peername, &namelen); 140 check_sockname(&peername, "127.0.0.1", connect_port, "accepted socket peer"); 149 struct sockaddr sockname, peername; local 160 namelen = sizeof peername; 161 r = uv_tcp_getpeername((uv_tcp_t*) req->handle, &peername, &namelen); 163 check_sockname(&peername, "127.0.0.1", server_port, "connected socket peer"); 172 struct sockaddr sockname, peername; local 204 r = uv_tcp_getpeername(&tcpServer, &peername, &namelen) [all...] |
| /src/lib/librpcsvc/ |
| yp.x | 85 typedef string peername<YPMAXPEER>; 94 peername peer; 130 peername peer;
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| x509_vpm.c | 101 OPENSSL_free(param->peername); 413 return param->peername; 417 * Move peername from one param structure to another, freeing any name present 419 * the target peername. 424 char *peername = (from != NULL) ? from->peername : NULL; local 426 if (to->peername != peername) { 427 OPENSSL_free(to->peername); 428 to->peername = peername [all...] |
| v3_utl.c | 826 char **peername) 839 if (rv > 0 && peername != NULL) { 840 *peername = OPENSSL_strndup((char *)a->data, a->length); 841 if (*peername == NULL) 856 if (rv > 0 && peername != NULL) { 857 *peername = OPENSSL_strndup((char *)astr, astrlen); 858 if (*peername == NULL) { 869 unsigned int flags, int check_type, char **peername) 971 chk, chklen, peername)) 994 chk, chklen, peername)) [all...] |
| x509_local.h | 34 char *peername; /* Matching hostname in peer certificate */ member in struct:X509_VERIFY_PARAM_st
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| x509_vpm.c | 104 OPENSSL_free(param->peername); 411 return param->peername; 415 * Move peername from one param structure to another, freeing any name present 417 * the target peername. 422 char *peername = (from != NULL) ? from->peername : NULL; local 424 if (to->peername != peername) { 425 OPENSSL_free(to->peername); 426 to->peername = peername [all...] |
| v3_utl.c | 834 char **peername) 847 if (rv > 0 && peername != NULL) { 848 *peername = OPENSSL_strndup((char *)a->data, a->length); 849 if (*peername == NULL) 864 if (rv > 0 && peername != NULL) { 865 *peername = OPENSSL_strndup((char *)astr, astrlen); 866 if (*peername == NULL) { 877 unsigned int flags, int check_type, char **peername) 979 chk, chklen, peername)) != 0) 1001 chk, chklen, peername)) != 0 [all...] |
| x509_local.h | 34 char *peername; /* Matching hostname in peer certificate */ member in struct:X509_VERIFY_PARAM_st
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| x509_vpm.c | 104 OPENSSL_free(param->peername); 403 return param->peername; 407 * Move peername from one param structure to another, freeing any name present 409 * the target peername. 414 char *peername = (from != NULL) ? from->peername : NULL; local 416 if (to->peername != peername) { 417 OPENSSL_free(to->peername); 418 to->peername = peername [all...] |
| x509_local.h | 31 char *peername; /* Matching hostname in peer certificate */ member in struct:X509_VERIFY_PARAM_st
|
| /src/external/bsd/openldap/dist/servers/slapd/overlays/ |
| auditlog.c | 81 struct berval *b, *who = NULL, peername; local 128 peername = op->o_conn->c_peer_name; 138 peername.bv_val ? peername.bv_val: "", op->o_conn->c_connid);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| v3_utl.c | 821 char **peername) 834 if (rv > 0 && peername != NULL) { 835 *peername = OPENSSL_strndup((char *)a->data, a->length); 836 if (*peername == NULL) 851 if (rv > 0 && peername != NULL) { 852 *peername = OPENSSL_strndup((char *)astr, astrlen); 853 if (*peername == NULL) { 864 unsigned int flags, int check_type, char **peername) 916 chk, chklen, peername)) != 0) 938 chk, chklen, peername)) != 0 [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| socket_wrapper.c | 231 struct sockaddr *peername; member in struct:socket_info 1060 dest_addr = (const struct sockaddr_in *)si->peername; 1072 src_addr = (const struct sockaddr_in *)si->peername; 1075 swrap_dump_packet(si, si->peername, 1089 src_addr = (const struct sockaddr_in *)si->peername; 1103 src_addr = (const struct sockaddr_in *)si->peername; 1115 src_addr = (const struct sockaddr_in *)si->peername; 1155 dest_addr = (const struct sockaddr_in *)si->peername; 1169 src_addr = (const struct sockaddr_in *)si->peername; 1183 dest_addr = (const struct sockaddr_in *)si->peername; [all...] |
| /src/external/bsd/openldap/dist/servers/slapd/back-ldap/ |
| monitor.c | 417 char peername[MAXPATHLEN + sizeof("PATH=")]; local 419 char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")]; local 421 char peername[sizeof("IP=255.255.255.255:65336")]; local 433 sprintf( peername, "PATH=%s", sa.sa_un_addr.sun_path ); 449 sprintf( peername, "IP=%s:%d", peeraddr, 456 sprintf( peername, "IP=[%s]:%d", peeraddr, 470 sprintf( peername, "IP=%s:%d", peeraddr, 475 sprintf( peername, SLAP_STRING_UNKNOWN ); 478 ber_str2bv( peername, 0, 1, bv );
|
| /src/external/bsd/openldap/dist/servers/lloadd/ |
| connection.c | 586 lload_connection_init( ber_socket_t s, const char *peername, int flags ) 590 assert( peername != NULL ); 643 "connection connid=%lu allocated for socket fd=%d peername=%s\n", 644 c->c_connid, s, peername );
|
| proto-lload.h | 67 LDAP_SLAPD_F (LloadConnection *) client_init( ber_socket_t s, const char *peername, struct event_base *base, int use_tls ); 99 LDAP_SLAPD_F (LloadConnection *) lload_connection_init( ber_socket_t s, const char *peername, int use_tls );
|
| daemon.c | 856 char peername[LDAP_IPADDRLEN]; local 857 struct berval peerbv = BER_BVC(peername); 864 peername[0] = '\0'; 929 sprintf( peername, "PATH=%s", sl->sl_sa.sa_un_addr.sun_path ); 948 c = client_init( s, peername, lload_daemon[tid].base, cflag ); 953 (long)s, peername, sl->sl_name.bv_val );
|
| /src/external/mpl/bind/dist/lib/isc/ |
| tls.c | 1774 char peername[ISC_SOCKADDR_FORMATSIZE] = { 0 }; local 1778 isc_sockaddr_format(remote_peer, peername, sizeof(peername)); 1780 isc_tlsctx_client_session_cache_keep(cache, peername, tls); 1787 char peername[ISC_SOCKADDR_FORMATSIZE] = { 0 }; local 1791 isc_sockaddr_format(remote_peer, peername, sizeof(peername)); 1793 isc_tlsctx_client_session_cache_reuse(cache, peername, tls);
|
| /src/external/mpl/dhcp/dist/contrib/ldap/ |
| dhcpd-conf-to-ldap | 574 my ($peername, @statements); 577 parse_error() if(($peername = $1) !~ /^\"?[^\"]+\"?$/); 585 print STDERR "Warning: Failover config 'peer $peername' found!\n"; 596 $failover{$peername} = [@statements];
|
| /src/external/mpl/dhcp/dist/server/ |
| ldap.c | 845 struct berval **tempbv, **peername; local 850 if ((peername = ldap_get_values_len (ld, item->ldent, "cn")) == NULL || 851 peername[0] == NULL) 853 if (peername != NULL) 854 ldap_value_free_len (peername); 885 peername[0]->bv_val, tempbv[0]->bv_val); 887 ldap_value_free_len (peername); 907 " attributes match our local address", peername[0]->bv_val); 909 ldap_value_free_len (peername); 922 peername[0]->bv_val, tempbv[0]->bv_val) [all...] |
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_client.c | 353 const char *peername = SSL_get0_peername(TLScontext->con); local 355 if (peername) 356 msg_info("%s: matched peername: %s", 357 TLScontext->namaddr, peername); 1338 * Do peername verification if requested and extract useful information
|
| /src/usr.sbin/syslogd/ |
| tls.c | 1356 char *peername; local 1375 DPRINTF(D_NET, "could not get peername: %s", gai_strerror(rc)); 1376 peername = NULL; 1380 MALLOC(peername, len); 1381 (void)memcpy(peername, hbuf, len); 1388 logerror("access from %s denied by hosts_access", peername); 1426 "TLS connection from %s", peername); 1433 conn_info->hostname = peername; 1445 "calling SSL_accept()...\n", peername, newsock);
|