/freebsd/crypto/openssh/ |
H A D | PROTOCOL.mux | 2 ControlMaster connection-sharing. 14 Most messages from the client to the server contain a "request id" 15 field. This field is returned in replies as "client request id" to 18 Many multiplexing (mux) client requests yield immediate responses from 27 Unix domain control socket. The passenger client then waits until it is 29 the client waits around while the mux server does all the driving. 32 example of passenger mode; the client passes the stdio file descriptors 36 this mode, the mux client/server connection socket will stop speaking 38 messages between the client and server. The client therefore must 42 supporting a proxy client may itself be forwarded or relayed to another [all …]
|
H A D | PROTOCOL | 4 Note that OpenSSH's sftp and sftp-server implement revision 3 of the SSH 7 https://www.openssh.com/txt/draft-ietf-secsh-filexfer-02.txt 12 The protocol used by OpenSSH's ssh-agent is described in the file 17 1.1. transport: Protocol 2 MAC algorithm "umac-64@openssh.com" 19 This is a new transport-layer MAC method using the UMAC algorithm 20 (rfc4418). This method is identical to the "umac-64" method documented 23 https://www.openssh.com/txt/draft-miller-secsh-umac-01.txt 27 This transport-layer compression method uses the zlib compression 34 https://www.openssh.com/txt/draft-miller-secsh-compression-delayed-00.txt 36 1.3. transport: New public key algorithms "ssh-rsa-cert-v01@openssh.com", [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | init_c.c | 2 * Copyright (c) 1997 - 2006 Kungliga Tekniska Högskolan 46 RCSID("$Id$"); 51 #define SET(C, F) (C)->funcs.F = kadm5 ## _c_ ## F in set_funcs() 80 (*ctx)->context = context; in _kadm5_c_init_context() 81 if(params->mask & KADM5_CONFIG_REALM) { in _kadm5_c_init_context() 83 (*ctx)->realm = strdup(params->realm); in _kadm5_c_init_context() 84 if ((*ctx)->realm == NULL) in _kadm5_c_init_context() 87 ret = krb5_get_default_realm((*ctx)->context, &(*ctx)->realm); in _kadm5_c_init_context() 92 if(params->mask & KADM5_CONFIG_ADMIN_SERVER) in _kadm5_c_init_context() 93 (*ctx)->admin_server = strdup(params->admin_server); in _kadm5_c_init_context() [all …]
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_server.t0 | 23 \ ---------------------------------------------------------------------- 40 * Decrypt the pre-master secret (RSA key exchange). 52 x = (*ctx->policy_vtable)->do_keyx(ctx->policy_vtable, epms, &len); 55 * Set the first two bytes to the maximum supported client 61 br_enc16be(epms, ctx->client_max_version); 65 * decryption failed. Note that we use a constant-time conditional 68 br_hmac_drbg_generate(&ctx->eng.rng, rpms, sizeof rpms); 74 br_ssl_engine_compute_master(&ctx->eng, prf_id, epms, 48); 77 * Clear the pre-master secret from RAM: it is normally a buffer 78 * in the context, hence potentially long-lived. [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Debuginfod/ |
H A D | Debuginfod.cpp | 1 //===-- llvm/Debuginfod/Debuginfod.cpp - Debuginfod client library --------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 11 /// This file contains several definitions for the debuginfod client and server. 12 /// For the client, this file defines the fetchInfo function. For the server, 16 /// debuginfo, source file) associated with a build-id from debuginfod servers. 22 //===----------------------------------------------------------------------===// 63 static std::string buildIDToString(BuildIDRef ID) { in buildIDToString() argument 64 return llvm::toHex(ID, /*LowerCase=*/true); in buildIDToString() 81 .split(DebuginfodUrls.value(), " ", -1, false); in getDefaultDebuginfodUrls() [all …]
|
/freebsd/share/doc/smm/06.nfs/ |
H A D | 1.t | 43 the client side. 46 for each client to server mount point that is maintained until an umount. 47 If the connection breaks, the client will attempt a reconnect with a new 49 The client side can operate without any daemons running, but performance 50 will be improved by running nfsiod daemons that perform read-aheads 51 and write-behinds. 68 The client side mount_nfs along with portmap and 75 from client, etc.) to various interoperability problems between different 80 require the \fB-n\fR option to enable non-root mount request servicing. 96 On the client side, there are several mount options useful for dealing [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/pinctrl/ |
H A D | pinctrl-bindings.txt | 4 such as pull-up/down, tri-state, drive-strength etc are designated as pin 9 designated client devices. Again, each client device must be represented as a 12 For a client device to operate correctly, certain pin controllers must 13 set up certain specific pin configurations. Some client devices need a 15 need to reconfigure pins at run-time, for example to tri-state pins when the 16 device is inactive. Hence, each client device can define a set of named 17 states. The number and names of those states is defined by the client device's 21 for client device device tree nodes to map those state names to the pin 24 Note that pin controllers themselves may also be client devices of themselves. 27 in a single place, rather than splitting it across multiple client device [all …]
|
/freebsd/share/doc/psd/26.rpcrfc/ |
H A D | rpc.rfc.ms | 2 .\" Must use -- tbl -- with this one 51 One program may deal with high-level applications such as file system 52 access control and locking. The other may deal with low-level file 53 IO and have procedures like "read" and "write". A client machine of 55 the two programs of the service on behalf of some user on the client 62 procedure in some well-specified location (such as a result 65 procedure are extracted from the well-specified location, and the 86 may choose to have RPC calls be asynchronous, so that the client may 105 is own retransmission and time-out policy as the RPC layer does not 113 application retransmits RPC messages after short time-outs, the only [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/mailbox/ |
H A D | qcom-ipcc.yaml | 1 # SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause 3 --- 4 $id: http://devicetree.org/schemas/mailbox/qcom-ipcc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Qualcomm Technologies, Inc. Inter-Processor Communication Controller 10 - Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org> 13 The Inter-Processor Communication Controller (IPCC) is a centralized hardware 14 to route interrupts across various subsystems. It involves a three-level 15 addressing scheme called protocol, client and signal. For example, consider an 18 a case, the client would be Modem (client-id is 2) and the signal would be [all …]
|
H A D | mtk-gce.txt | 9 mailbox.txt for generic information about mailbox device-tree bindings. 12 - compatible: can be "mediatek,mt8173-gce", "mediatek,mt8183-gce", 13 "mediatek,mt8186-gce", "mediatek,mt8192-gce", "mediatek,mt8195-gce" or 14 "mediatek,mt6779-gce". 15 - reg: Address range of the GCE unit 16 - interrupts: The interrupt signal from the GCE block 17 - clock: Clocks according to the common clock binding 18 - clock-names: Must be "gce" to stand for GCE clock 19 - #mbox-cells: Should be 2. 22 channel: Channel of mailbox. Be equal to the thread id of GCE. [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/media/ |
H A D | mediatek,mdp3-rsz.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id [all...] |
H A D | mediatek,mdp3-wrot.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id [all...] |
/freebsd/sys/contrib/device-tree/Bindings/soc/mediatek/ |
H A D | mediatek,ccorr.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/soc/mediatek/mediatek,ccorr.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Matthias Brugger <matthias.bgg@gmail.com> 11 - Moudy Ho <moudy.ho@mediatek.com> 19 - enum: 20 - mediatek,mt8183-mdp3-ccorr 25 mediatek,gce-client-reg: 26 $ref: /schemas/types.yaml#/definitions/phandle-array [all …]
|
H A D | mediatek,wdma.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/soc/mediatek/mediatek,wdma.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Matthias Brugger <matthias.bgg@gmail.com> 11 - Moudy Ho <moudy.ho@mediatek.com> 20 - enum: 21 - mediatek,mt8183-mdp3-wdma 26 mediatek,gce-client-reg: 27 $ref: /schemas/types.yaml#/definitions/phandle-array [all …]
|
/freebsd/contrib/pf/ftp-proxy/ |
H A D | ftp-proxy.c | 1 /* $OpenBSD: ftp-proxy.c,v 1.19 2008/06/13 07:25:26 claudio Exp $ */ 74 u_int32_t id; member 136 logmsg(LOG_INFO, "#%d client close", s->id); in client_error() 138 logmsg(LOG_ERR, "#%d client reset connection", s->id); in client_error() 140 logmsg(LOG_ERR, "#%d client timeout", s->id); in client_error() 142 logmsg(LOG_ERR, "#%d client write error: %d", s->id, what); in client_error() 144 logmsg(LOG_ERR, "#%d abnormal client error: %d", s->id, what); in client_error() 153 s->cmd = CMD_NONE; in client_parse() 154 s->port = 0; in client_parse() 171 if (s->cmd == CMD_PORT || s->cmd == CMD_EPRT) in client_parse() [all …]
|
/freebsd/contrib/ntp/html/ |
H A D | confopt.html | 1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> 7 <!-- Changed by: Harlan &, 31-Jan-2014 --> 16 <!-- #BeginDate format:En2m -->13-Feb-2020 10:08<!-- #EndDate --> 29 <h4 id="address">Server and Peer Addresses</h4> 32 <p>If the Basic Socket Interface Extensions for IPv6 (RFC-2553) is detected, 33 …t name is expected, a <tt>-4</tt> qualifier preceding the host name forces DNS resolution to the I… 34 <h4 id="command">Server Commands</h4> 36 <dt id="server"><tt>server <i>address</i> [options ...]</tt></dt> 45 …nt client mode association with the specified remote server or local reference clock. If the <tt>p… [all …]
|
H A D | rate.html | 1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> 6 <title>Rate Management and the Kiss-o'-Death</title> 9 <!-- 12 font-weight: bold; 14 --> 18 <h3>Rate Management and the Kiss-o'-Death Packet</h3> 22 <!-- #BeginDate format:En2m -->10-Mar-2014 05:19<!-- #EndDate --> 33 <li class="inline"><a href="#kiss">The Kiss-o'-Death Packet</a></li> 37 <h4 id="intro">Introduction</h4> [all …]
|
H A D | discover.html | 1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> 14 <!-- #BeginDate format:En2m -->10-Mar-2014 05:04<!-- #EndDate --> 28 <h4 id="modes">Introduction</h4> 29 …st/multicast and many cast schemes utilize the ubiquitous broadcast or one-to-many paradigm native… 30 <p> All three schemes work in much the same way and might be described as <i>grab-n'-prune.</i> Thr… 31 <h4 id="assoc">Association Management</h4> 32 … iterated process to discover new preemptable client associations as long as the total number of… 33 …-stratum servers and avoid servers below or above specified stratum levels. By default, servers of… 37 <h4 id="bcst">Broadcast/Multicast Scheme</h4> [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | README.ssltest.md | 4 SSL testcases are configured in the `ssl-tests` directory. 12 However, for verification, we also include checked-in configuration outputs 14 `test/ssl-tests/*.cnf` files. 16 For more details, see `ssl-tests/01-simple.cnf.in` for an example. 19 -------------------- 26 name => "test-default", 28 client => { "CipherString" => "DEFAULT" }, 36 * Method - the method to test. One of DTLS or TLS. 38 * HandshakeMode - which handshake flavour to test: 39 - Simple - plain handshake (default) [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | README-P2P | 1 wpa_supplicant and Wi-Fi P2P 4 This document describes how the Wi-Fi P2P implementation in 6 client (e.g., management GUI) is used to enable WPS enrollment and 10 Introduction to Wi-Fi P2P 11 ------------------------- 15 More information about Wi-Fi P2P is available from Wi-Fi Alliance: 16 http://www.wi-fi.org/Wi-Fi_Direct.php 20 ----------------------------- 26 ---------------------------- 28 Wi-Fi P2P is an optional component that needs to be enabled in the [all …]
|
/freebsd/sys/ofed/drivers/infiniband/core/ |
H A D | ib_sa_query.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause OR GPL-2.0 18 * - Redistributions of source code must retain the above 22 * - Redistributions in binary form must reproduce the above 43 #include <linux/dma-mapping.h> 91 struct ib_sa_client *client; member 95 int id; member 153 .struct_size_bytes = sizeof ((struct ib_sa_path_rec *) 0)->field, \ 253 .struct_size_bytes = sizeof ((struct ib_sa_mcmember_rec *) 0)->field, \ 337 .struct_size_bytes = sizeof ((struct ib_sa_service_rec *) 0)->field, \ [all …]
|
/freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/ |
H A D | krb5_ccache.3 | 1 …dential cache functions" 3 "11 Jan 2012" "Version 1.5.2" "HeimdalKerberos5library" \" -*- nroff -*- 5 Heimdal Kerberos 5 credential cache functions \- 13 …code KRB5_LIB_CALL \fBkrb5_cc_resolve\fP (krb5_context context, const char *name, krb5_ccache *id)" 16 …Bkrb5_cc_new_unique\fP (krb5_context context, const char *type, const char *hint, krb5_ccache *id)" 19 …B_FUNCTION const char *KRB5_LIB_CALL \fBkrb5_cc_get_name\fP (krb5_context context, krb5_ccache id)" 22 …B_FUNCTION const char *KRB5_LIB_CALL \fBkrb5_cc_get_type\fP (krb5_context context, krb5_ccache id)" 25 …_code KRB5_LIB_CALL \fBkrb5_cc_get_full_name\fP (krb5_context context, krb5_ccache id, char **str)" 28 …TION const krb5_cc_ops *KRB5_LIB_CALL \fBkrb5_cc_get_ops\fP (krb5_context context, krb5_ccache id)" 31 …FUNCTION krb5_error_code KRB5_LIB_CALL \fBkrb5_cc_switch\fP (krb5_context context, krb5_ccache id)" 43 …NCTION krb5_error_code KRB5_LIB_CALL \fBkrb5_cc_default\fP (krb5_context context, krb5_ccache *id)" [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | acache.c | 2 * Copyright (c) 2004 - 2007 Kungliga Tekniska Högskolan 61 #define ACACHE(X) ((krb5_acc *)(X)->data.data) 197 ret = krb5_parse_name(context, incred->client, &cred->client); in make_cred_from_ccred() 201 ret = krb5_parse_name(context, incred->server, &cred->server); in make_cred_from_ccred() 205 cred->session.keytype = incred->keyblock.type; in make_cred_from_ccred() 206 cred->session.keyvalue.length = incred->keyblock.length; in make_cred_from_ccred() 207 cred->session.keyvalue.data = malloc(incred->keyblock.length); in make_cred_from_ccred() 208 if (cred->session.keyvalue.data == NULL) in make_cred_from_ccred() 210 memcpy(cred->session.keyvalue.data, incred->keyblock.data, in make_cred_from_ccred() 211 incred->keyblock.length); in make_cred_from_ccred() [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/reserved-memory/ |
H A D | qcom,rmtfs-mem.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id [all...] |
/freebsd/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | init_sec_context.c | 2 * Copyright (c) 2006 - 2008 Kungliga Tekniska Högskolan 89 if (from_file(fn, target_name->domain, username, key) == 0) in get_user_file() 103 krb5_principal client; in get_user_ccache() local 104 krb5_ccache id = NULL; in get_user_ccache() local 111 key->length = 0; in get_user_ccache() 112 key->data = NULL; in get_user_ccache() 118 ret = krb5_cc_default(context, &id); in get_user_ccache() 122 ret = krb5_cc_get_principal(context, id, &client); in get_user_ccache() 126 ret = krb5_unparse_name_flags(context, client, in get_user_ccache() 129 krb5_free_principal(context, client); in get_user_ccache() [all …]
|