/freebsd/crypto/openssh/ |
H A D | auth2-hostbased.c | 65 char *pkalg, *cuser, *chost; in userauth_hostbased() local 73 (r = sshpkt_get_cstring(ssh, &chost, NULL)) != 0 || in userauth_hostbased() 79 cuser, chost, pkalg, slen); in userauth_hostbased() 137 (r = sshbuf_put_cstring(b, chost)) != 0 || in userauth_hostbased() 145 "client user \"%.100s\", client host \"%.100s\"", cuser, chost); in userauth_hostbased() 150 chost, key) && in userauth_hostbased() 163 free(chost); in userauth_hostbased() 171 const char *cuser, char *chost, struct sshkey *key) in hostbased_key_allowed() argument 185 chost, resolvedname, ipaddr); in hostbased_key_allowed() 187 if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') { in hostbased_key_allowed() [all …]
|
H A D | mux.c | 964 char *chost = NULL; in mux_master_process_stdio_fwd() local 970 (r = sshbuf_get_cstring(m, &chost, NULL)) != 0 || in mux_master_process_stdio_fwd() 972 free(chost); in mux_master_process_stdio_fwd() 981 free(chost); in mux_master_process_stdio_fwd() 986 debug2_f("channel %d: stdio fwd to %s:%d", c->self, chost, cport); in mux_master_process_stdio_fwd() 994 free(chost); in mux_master_process_stdio_fwd() 1013 free(chost); in mux_master_process_stdio_fwd() 1020 ok = ask_permission("Allow forward to path %s", chost); in mux_master_process_stdio_fwd() 1023 chost, cport); in mux_master_process_stdio_fwd() 1033 nc = channel_connect_stdio_fwd(ssh, chost, cport, new_fd[0], new_fd[1], in mux_master_process_stdio_fwd() [all …]
|
H A D | monitor.c | 1180 char *cuser, *chost; in mm_answer_keyallowed() local 1189 (r = sshbuf_get_cstring(m, &chost, NULL)) != 0 || in mm_answer_keyallowed() 1218 cuser, chost, key); in mm_answer_keyallowed() 1221 cuser, chost); in mm_answer_keyallowed() 1246 hostbased_chost = chost; in mm_answer_keyallowed() 1251 free(chost); in mm_answer_keyallowed() 1351 const char *cuser, const char *chost) in monitor_valid_hostbasedblob() argument 1401 if (strcmp(cp, chost) != 0) in monitor_valid_hostbasedblob()
|
H A D | sshconnect2.c | 2136 char *fp = NULL, *chost = NULL, *lname = NULL; in userauth_hostbased() local 2202 xasprintf(&chost, "%s.", lname); in userauth_hostbased() 2203 debug2_f("chost %s", chost); in userauth_hostbased() 2221 (r = sshbuf_put_cstring(b, chost)) != 0 || in userauth_hostbased() 2242 (r = sshpkt_put_cstring(ssh, chost)) != 0 || in userauth_hostbased() 2257 free(chost); in userauth_hostbased()
|
/freebsd/contrib/bsnmp/tests/ |
H A D | snmp_parse_server.cc | 30 REQUIRE(sc.chost == ""s); 44 REQUIRE(sc.chost == str); 53 REQUIRE(sc.chost == str); 62 REQUIRE(sc.chost == str); 71 REQUIRE(sc.chost == str); 80 REQUIRE(sc.chost == str); 96 REQUIRE(sc.chost == host); 106 REQUIRE(sc.chost == host); 116 REQUIRE(sc.chost == host); 157 REQUIRE(sc.chost == host); [all …]
|
/freebsd/contrib/bsnmp/lib/ |
H A D | snmpclient.c | 859 c->chost = NULL; in snmp_client_init() 895 if (snmp_client.chost == NULL) { in open_client_udp() 896 if ((snmp_client.chost = malloc(1 + sizeof(DEFAULT_HOST))) in open_client_udp() 901 strcpy(snmp_client.chost, DEFAULT_HOST); in open_client_udp() 908 free(snmp_client.chost); in open_client_udp() 909 snmp_client.chost = ptr; in open_client_udp() 910 strcpy(snmp_client.chost, host); in open_client_udp() 937 error = getaddrinfo(snmp_client.chost, snmp_client.cport, &hints, &res0); in open_client_udp() 939 seterr(&snmp_client, "%s: %s", snmp_client.chost, in open_client_udp() 984 if (snmp_client.chost == NULL) { in open_client_local() [all …]
|
H A D | snmpclient.h | 78 char *chost; /* host name or IP address as string */ member
|
/freebsd/contrib/ntp/ntpq/ |
H A D | ntpq.h | 121 typedef struct chost_tag chost; 127 extern chost chosts[]; 122 typedef struct chost_tag chost; global() typedef
|
H A D | ntpq.c | 411 chost chosts[MAXHOSTS];
|
/freebsd/usr.sbin/bsnmpd/tools/libbsnmptools/ |
H A D | bsnmptools.c | 793 if (snmp_client.trans > SNMP_TRANS_UDP && snmp_client.chost == NULL) { in parse_server() 794 if ((snmp_client.chost = malloc(strlen(SNMP_DEFAULT_LOCAL) + 1)) in parse_server() 799 strcpy(snmp_client.chost, SNMP_DEFAULT_LOCAL); in parse_server() 1425 if (snmp_client.chost != NULL) { in snmp_tool_freeall() 1426 free(snmp_client.chost); in snmp_tool_freeall() 1427 snmp_client.chost = NULL; in snmp_tool_freeall() 2016 fprintf(stdout, "Agent %s:%s returned error \n", snmp_client.chost, in snmp_output_err_resp()
|