/freebsd/crypto/openssh/ |
H A D | PROTOCOL.mux | 2 ControlMaster connection-sharing. 14 Most messages from the client to the server contain a "request id" 15 field. This field is returned in replies as "client request id" to 18 Many multiplexing (mux) client requests yield immediate responses from 27 Unix domain control socket. The passenger client then waits until it is 29 the client waits around while the mux server does all the driving. 32 example of passenger mode; the client passes the stdio file descriptors 36 this mode, the mux client/server connection socket will stop speaking 38 messages between the client and server. The client therefore must 42 supporting a proxy client may itself be forwarded or relayed to another [all …]
|
H A D | PROTOCOL | 4 Note that OpenSSH's sftp and sftp-server implement revision 3 of the SSH 7 https://www.openssh.com/txt/draft-ietf-secsh-filexfer-02.txt 12 The protocol used by OpenSSH's ssh-agent is described in the file 17 1.1. transport: Protocol 2 MAC algorithm "umac-64@openssh.com" 19 This is a new transport-layer MAC method using the UMAC algorithm 20 (rfc4418). This method is identical to the "umac-64" method documented 23 https://www.openssh.com/txt/draft-miller-secsh-umac-01.txt 27 This transport-layer compression method uses the zlib compression 34 https://www.openssh.com/txt/draft-miller-secsh-compression-delayed-00.txt 36 1.3. transport: New public key algorithms "ssh-rsa-cert-v01@openssh.com", [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | init_c.c | 2 * Copyright (c) 1997 - 2006 Kungliga Tekniska Högskolan 46 RCSID("$Id$"); 51 #define SET(C, F) (C)->funcs.F = kadm5 ## _c_ ## F in set_funcs() 80 (*ctx)->context = context; in _kadm5_c_init_context() 81 if(params->mask & KADM5_CONFIG_REALM) { in _kadm5_c_init_context() 83 (*ctx)->realm = strdup(params->realm); in _kadm5_c_init_context() 84 if ((*ctx)->realm == NULL) in _kadm5_c_init_context() 87 ret = krb5_get_default_realm((*ctx)->context, &(*ctx)->realm); in _kadm5_c_init_context() 92 if(params->mask & KADM5_CONFIG_ADMIN_SERVER) in _kadm5_c_init_context() 93 (*ctx)->admin_server = strdup(params->admin_server); in _kadm5_c_init_context() [all …]
|
/freebsd/crypto/krb5/src/lib/krb5/ccache/ |
H A D | t_cc.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 27 #include "k5-int.h" 28 #include "cc-int.h" 61 test_creds.client = NULL; in init_structs() 90 kret = krb5_build_principal(context, &test_creds.client, sizeof(REALM), REALM, in init_test_cred() 91 "client-comp1", "client-comp2", NULL); in init_test_cred() 96 "server-comp1", "server-comp2", NULL); in init_test_cred() 98 krb5_free_principal(context, test_creds.client); in init_test_cred() 99 test_creds.client = 0; in init_test_cred() 117 a->magic = KV5M_AUTHDATA; in init_test_cred() [all …]
|
H A D | ccfns.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* lib/krb5/ccache/ccfns.c - Dispatch methods for credentials cache code.*/ 27 #include "k5-int.h" 28 #include "cc-int.h" 29 #include "../krb/int-proto.h" 34 return cache->ops->get_name(context, cache); in krb5_cc_get_name() 44 if (asprintf(&name, "%s:%s", cache->ops->prefix, in krb5_cc_get_full_name() 45 cache->ops->get_name(context, cache)) < 0) in krb5_cc_get_full_name() 55 return (*cache)->ops->gen_new(context, cache); in krb5_cc_gen_new() 63 return cache->ops->init(context, cache, principal); in krb5_cc_initialize() [all …]
|
H A D | t_memory.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 30 #define DATA "client1-comp1" 37 #define DATA "client1-comp2" 44 #define DATA "server1-comp1" 51 #define DATA "server1-comp2" 90 test_creds.client = (krb5_principal) malloc(sizeof(krb5_data *)*3); in init_test_cred() 91 test_creds.client[0] = &client1; in init_test_cred() 92 test_creds.client[1] = &client2; in init_test_cred() 93 test_creds.client[2] = NULL; in init_test_cred() 109 krb5_ccache id; in mcc_test() local [all …]
|
H A D | t_stdio.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 31 #define DATA "client1-comp1" 39 #define DATA "client1-comp2" 47 #define DATA "server1-comp1" 55 #define DATA "server1-comp2" 107 test_creds.client = (krb5_principal) malloc(sizeof(krb5_data *)*3); in init_test_cred() 108 test_creds.client[0] = &client1; in init_test_cred() 109 test_creds.client[1] = &client2; in init_test_cred() 110 test_creds.client[2] = NULL; in init_test_cred() 127 krb5_ccache id; in scc_test() local [all …]
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_server.t0 | 23 \ ---------------------------------------------------------------------- 40 * Decrypt the pre-master secret (RSA key exchange). 52 x = (*ctx->policy_vtable)->do_keyx(ctx->policy_vtable, epms, &len); 55 * Set the first two bytes to the maximum supported client 61 br_enc16be(epms, ctx->client_max_version); 65 * decryption failed. Note that we use a constant-time conditional 68 br_hmac_drbg_generate(&ctx->eng.rng, rpms, sizeof rpms); 74 br_ssl_engine_compute_master(&ctx->eng, prf_id, epms, 48); 77 * Clear the pre-master secret from RAM: it is normally a buffer 78 * in the context, hence potentially long-lived. [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Debuginfod/ |
H A D | Debuginfod.cpp | 1 //===-- llvm/Debuginfod/Debuginfod.cpp - Debuginfod client library --------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 11 /// This file contains several definitions for the debuginfod client and server. 12 /// For the client, this file defines the fetchInfo function. For the server, 16 /// debuginfo, source file) associated with a build-id from debuginfod servers. 22 //===----------------------------------------------------------------------===// 63 static std::string buildIDToString(BuildIDRef ID) { in buildIDToString() argument 64 return llvm::toHex(ID, /*LowerCase=*/true); in buildIDToString() 81 .split(DebuginfodUrls.value(), " ", -1, false); in getDefaultDebuginfodUrls() [all …]
|
/freebsd/crypto/krb5/src/include/krb5/ |
H A D | audit_plugin.h | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* include/krb5/audit_plugin.h - Audit plugin interface */ 50 * - Check that the supplied maj_ver number is supported by the module, or 53 * - Cast the vtable pointer as appropriate for the interface and maj_ver: 56 * - Initialize the methods of the vtable, stopping as appropriate for the 67 #define AUTHN_REQ_CL 1 /**< Authenticate request and client */ 77 #define REQID_LEN 32 /* Size of the alphanumeric request ID */ 83 krb5_address *cl_addr; /**< client address */ 84 krb5_ui_4 cl_port; /**< client port */ 87 char *tkt_in_id; /**< primary (TGT) ticket ID */ [all …]
|
/freebsd/share/doc/smm/06.nfs/ |
H A D | 1.t | 43 the client side. 46 for each client to server mount point that is maintained until an umount. 47 If the connection breaks, the client will attempt a reconnect with a new 49 The client side can operate without any daemons running, but performance 50 will be improved by running nfsiod daemons that perform read-aheads 51 and write-behinds. 68 The client side mount_nfs along with portmap and 75 from client, etc.) to various interoperability problems between different 80 require the \fB-n\fR option to enable non-root mount request servicing. 96 On the client side, there are several mount options useful for dealing [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/pinctrl/ |
H A D | pinctrl-bindings.txt | 4 such as pull-up/down, tri-state, drive-strength etc are designated as pin 9 designated client devices. Again, each client device must be represented as a 12 For a client device to operate correctly, certain pin controllers must 13 set up certain specific pin configurations. Some client devices need a 15 need to reconfigure pins at run-time, for example to tri-state pins when the 16 device is inactive. Hence, each client device can define a set of named 17 states. The number and names of those states is defined by the client device's 21 for client device device tree nodes to map those state names to the pin 24 Note that pin controllers themselves may also be client devices of themselves. 27 in a single place, rather than splitting it across multiple client device [all …]
|
/freebsd/crypto/krb5/src/tests/asn.1/ |
H A D | pkinit.asn1 | 1 KerberosV5-PK-INIT-SPEC { 2 iso(1) identified-organization(3) dod(6) internet(1) 10 identified-organization (3) dod (6) internet (1) 11 security (5) mechanisms (5) pkix (7) id-mod (0) 12 id-pkix1-explicit (18) } 13 -- As defined in RFC 3280. 16 FROM KerberosV5Spec2 { iso(1) identified-organization(3) 19 -- as defined in RFC 4120. 21 id-pkinit OBJECT IDENTIFIER ::= 22 { iso(1) identified-organization(3) dod(6) internet(1) [all …]
|
/freebsd/share/doc/psd/26.rpcrfc/ |
H A D | rpc.rfc.ms | 2 .\" Must use -- tbl -- with this one 51 One program may deal with high-level applications such as file system 52 access control and locking. The other may deal with low-level file 53 IO and have procedures like "read" and "write". A client machine of 55 the two programs of the service on behalf of some user on the client 62 procedure in some well-specified location (such as a result 65 procedure are extracted from the well-specified location, and the 86 may choose to have RPC calls be asynchronous, so that the client may 105 is own retransmission and time-out policy as the RPC layer does not 113 application retransmits RPC messages after short time-outs, the only [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/mailbox/ |
H A D | qcom-ipcc.yaml | 1 # SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause 3 --- 4 $id: http://devicetree.org/schemas/mailbox/qcom-ipcc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Qualcomm Technologies, Inc. Inter-Processor Communication Controller 10 - Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org> 13 The Inter-Processor Communication Controller (IPCC) is a centralized hardware 14 to route interrupts across various subsystems. It involves a three-level 15 addressing scheme called protocol, client and signal. For example, consider an 18 a case, the client would be Modem (client-id is 2) and the signal would be [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/media/ |
H A D | mediatek,mdp3-rsz.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id [all...] |
H A D | mediatek,mdp3-wrot.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id [all...] |
/freebsd/crypto/krb5/src/windows/installer/wix/ |
H A D | files.wxi | 1 <?xml version="1.0" encoding="utf-8"?> 2 <!-- 26 --> 28 <Property Id="DISABLEADVTSHORTCUTS" Value="1" /> 29 <Property Id="SYSTEMKRB5INI"> 30 <DirectorySearch Id="WindowsFolder" Path="[WindowsFolder]"> 35 <Directory Id="TARGETDIR" Name="SourceDir"> 36 <Directory Id="DesktopFolder" Name="Desktop"/> 37 <Directory Id="$(var.PISystemFolder)" SourceName="System"> 38 <Component Id="cmf_kfwlogon_DLL" Guid="$(var.cmf_kfwlogon_DLL_guid)"> [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/soc/mediatek/ |
H A D | mediatek,ccorr.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/soc/mediatek/mediatek,ccorr.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Matthias Brugger <matthias.bgg@gmail.com> 11 - Moudy Ho <moudy.ho@mediatek.com> 19 - enum: 20 - mediatek,mt8183-mdp3-ccorr 25 mediatek,gce-client-reg: 26 $ref: /schemas/types.yaml#/definitions/phandle-array [all …]
|
H A D | mediatek,wdma.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/soc/mediatek/mediatek,wdma.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Matthias Brugger <matthias.bgg@gmail.com> 11 - Moudy Ho <moudy.ho@mediatek.com> 20 - enum: 21 - mediatek,mt8183-mdp3-wdma 26 mediatek,gce-client-reg: 27 $ref: /schemas/types.yaml#/definitions/phandle-array [all …]
|
/freebsd/contrib/pf/ftp-proxy/ |
H A D | ftp-proxy.c | 1 /* $OpenBSD: ftp-proxy.c,v 1.19 2008/06/13 07:25:26 claudio Exp $ */ 74 u_int32_t id; member 136 logmsg(LOG_INFO, "#%d client close", s->id); in client_error() 138 logmsg(LOG_ERR, "#%d client reset connection", s->id); in client_error() 140 logmsg(LOG_ERR, "#%d client timeout", s->id); in client_error() 142 logmsg(LOG_ERR, "#%d client write error: %d", s->id, what); in client_error() 144 logmsg(LOG_ERR, "#%d abnormal client error: %d", s->id, what); in client_error() 153 s->cmd = CMD_NONE; in client_parse() 154 s->port = 0; in client_parse() 171 if (s->cmd == CMD_PORT || s->cmd == CMD_EPRT) in client_parse() [all …]
|
/freebsd/contrib/ntp/html/ |
H A D | confopt.html | 1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> 7 <!-- Changed by: Harlan &, 31-Jan-2014 --> 16 <!-- #BeginDate format:En2m -->13-Feb-2020 10:08<!-- #EndDate --> 29 <h4 id="address">Server and Peer Addresses</h4> 32 <p>If the Basic Socket Interface Extensions for IPv6 (RFC-2553) is detected, 33 …t name is expected, a <tt>-4</tt> qualifier preceding the host name forces DNS resolution to the I… 34 <h4 id="command">Server Commands</h4> 36 <dt id="server"><tt>server <i>address</i> [options ...]</tt></dt> 45 …nt client mode association with the specified remote server or local reference clock. If the <tt>p… [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | README-P2P | 1 wpa_supplicant and Wi-Fi P2P 4 This document describes how the Wi-Fi P2P implementation in 6 client (e.g., management GUI) is used to enable WPS enrollment and 10 Introduction to Wi-Fi P2P 11 ------------------------- 15 More information about Wi-Fi P2P is available from Wi-Fi Alliance: 16 http://www.wi-fi.org/Wi-Fi_Direct.php 20 ----------------------------- 26 ---------------------------- 28 Wi-Fi P2P is an optional component that needs to be enabled in the [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | README.ssltest.md | 4 SSL testcases are configured in the `ssl-tests` directory. 12 However, for verification, we also include checked-in configuration outputs 14 `test/ssl-tests/*.cnf` files. 16 For more details, see `ssl-tests/01-simple.cnf.in` for an example. 19 -------------------- 26 name => "test-default", 28 client => { "CipherString" => "DEFAULT" }, 36 * Method - the method to test. One of DTLS or TLS. 38 * HandshakeMode - which handshake flavour to test: 39 - Simple - plain handshake (default) [all …]
|
/freebsd/sys/ofed/drivers/infiniband/core/ |
H A D | ib_sa_query.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause OR GPL-2.0 18 * - Redistributions of source code must retain the above 22 * - Redistributions in binary form must reproduce the above 43 #include <linux/dma-mapping.h> 91 struct ib_sa_client *client; member 95 int id; member 153 .struct_size_bytes = sizeof ((struct ib_sa_path_rec *) 0)->field, \ 253 .struct_size_bytes = sizeof ((struct ib_sa_mcmember_rec *) 0)->field, \ 337 .struct_size_bytes = sizeof ((struct ib_sa_service_rec *) 0)->field, \ [all …]
|