| /freebsd/crypto/openssh/ |
| H A D | auth2-hostbased.c | 65 char *pkalg, *cuser, *chost; in userauth_hostbased() local 73 (r = sshpkt_get_cstring(ssh, &chost, NULL)) != 0 || in userauth_hostbased() 79 cuser, chost, pkalg, slen); in userauth_hostbased() 138 (r = sshbuf_put_cstring(b, chost)) != 0 || in userauth_hostbased() 146 "client user \"%.100s\", client host \"%.100s\"", cuser, chost); in userauth_hostbased() 151 chost, key) && in userauth_hostbased() 164 free(chost); in userauth_hostbased() 172 const char *cuser, char *chost, struct sshkey *key) in hostbased_key_allowed() argument 186 chost, resolvedname, ipaddr); in hostbased_key_allowed() 188 if (((len = strlen(chost)) > 0) && chost[len - 1] == '.') { in hostbased_key_allowed() [all …]
|
| H A D | mux.c | 999 char *chost = NULL; in mux_master_process_stdio_fwd() local 1005 (r = sshbuf_get_cstring(m, &chost, NULL)) != 0 || in mux_master_process_stdio_fwd() 1007 free(chost); in mux_master_process_stdio_fwd() 1016 free(chost); in mux_master_process_stdio_fwd() 1021 debug2_f("channel %d: stdio fwd to %s:%d", c->self, chost, cport); in mux_master_process_stdio_fwd() 1029 free(chost); in mux_master_process_stdio_fwd() 1048 free(chost); in mux_master_process_stdio_fwd() 1055 ok = ask_permission("Allow forward to path %s", chost); in mux_master_process_stdio_fwd() 1058 chost, cport); in mux_master_process_stdio_fwd() 1068 nc = channel_connect_stdio_fwd(ssh, chost, cport, new_fd[0], new_fd[1], in mux_master_process_stdio_fwd() [all …]
|
| H A D | monitor.c | 1311 char *cuser, *chost; in mm_answer_keyallowed() local 1320 (r = sshbuf_get_cstring(m, &chost, NULL)) != 0 || in mm_answer_keyallowed() 1349 cuser, chost, key); in mm_answer_keyallowed() 1352 cuser, chost); in mm_answer_keyallowed() 1377 hostbased_chost = chost; in mm_answer_keyallowed() 1382 free(chost); in mm_answer_keyallowed() 1482 const char *cuser, const char *chost) in monitor_valid_hostbasedblob() argument 1532 if (strcmp(cp, chost) != 0) in monitor_valid_hostbasedblob()
|
| H A D | sshconnect2.c | 2147 char *fp = NULL, *chost = NULL, *lname = NULL; in userauth_hostbased() local 2213 xasprintf(&chost, "%s.", lname); in userauth_hostbased() 2214 debug2_f("chost %s", chost); in userauth_hostbased() 2232 (r = sshbuf_put_cstring(b, chost)) != 0 || in userauth_hostbased() 2253 (r = sshpkt_put_cstring(ssh, chost)) != 0 || in userauth_hostbased() 2268 free(chost); in userauth_hostbased()
|
| /freebsd/contrib/bsnmp/tests/ |
| H A D | snmp_parse_server.cc | 30 REQUIRE(sc.chost == ""s); 44 REQUIRE(sc.chost == str); 53 REQUIRE(sc.chost == str); 62 REQUIRE(sc.chost == str); 71 REQUIRE(sc.chost == str); 80 REQUIRE(sc.chost == str); 96 REQUIRE(sc.chost == host); 106 REQUIRE(sc.chost == host); 116 REQUIRE(sc.chost == host); 157 REQUIRE(sc.chost == host); [all …]
|
| /freebsd/contrib/bsnmp/lib/ |
| H A D | snmpclient.c | 859 c->chost = NULL; in snmp_client_init() 895 if (snmp_client.chost == NULL) { in open_client_udp() 896 if ((snmp_client.chost = malloc(1 + sizeof(DEFAULT_HOST))) in open_client_udp() 901 strcpy(snmp_client.chost, DEFAULT_HOST); in open_client_udp() 908 free(snmp_client.chost); in open_client_udp() 909 snmp_client.chost = ptr; in open_client_udp() 910 strcpy(snmp_client.chost, host); in open_client_udp() 937 error = getaddrinfo(snmp_client.chost, snmp_client.cport, &hints, &res0); in open_client_udp() 939 seterr(&snmp_client, "%s: %s", snmp_client.chost, in open_client_udp() 987 if (snmp_client.chost == NULL && path == NULL) in open_client_local() [all …]
|
| H A D | snmpclient.h | 78 char *chost; /* host name or IP address as string */ member
|
| /freebsd/contrib/ntp/ntpq/ |
| H A D | ntpq.h | 121 typedef struct chost_tag chost; 127 extern chost chosts[]; 122 typedef struct chost_tag chost; global() typedef
|
| H A D | ntpq.c | 411 chost chosts[MAXHOSTS];
|
| /freebsd/usr.sbin/bsnmpd/tools/libbsnmptools/ |
| H A D | bsnmptools.c | 1415 if (snmp_client.chost != NULL) { in snmp_tool_freeall() 1416 free(snmp_client.chost); in snmp_tool_freeall() 1417 snmp_client.chost = NULL; in snmp_tool_freeall() 2006 fprintf(stdout, "Agent %s:%s returned error \n", snmp_client.chost, in snmp_output_err_resp()
|