/freebsd/crypto/openssh/regress/ |
H A D | hostkey-rotate.sh | 34 # The "primary" key type is ed25519 since it's supported even when built 36 primary="ssh-ed25519" 37 secondary="$primary" 84 dossh -oHostKeyAlgorithms=$primary -oStrictHostKeyChecking=no 87 check_key_present $primary || fail "unstrict didn't learn key" 110 # Change one hostkey (non primary) and relearn 111 if [ "$primary" != "$secondary" ]; then 112 verbose "learn changed non-primary hostkey type=${secondary}" 125 # Add new hostkey (primary type) to sshd and connect 126 verbose "learn new primary hostkey" [all …]
|
/freebsd/crypto/krb5/doc/admin/ |
H A D | install_kdc.rst | 5 have multiple replica KDCs alongside with a primary KDC to ensure the 7 a copy of the Kerberos database. The primary KDC contains the 10 password changes) are made on the primary KDC. Replica KDCs provide 12 when the primary KDC is unavailable. MIT recommends that you install 13 all of your KDCs to be able to function as either the primary or one 14 of the replicas. This will enable you to easily switch your primary 22 information. Ensure that the primary and all replica KDCs have 33 Install and configure the primary KDC 44 kerberos.mit.edu - primary KDC 152 You will use the :ref:`kdb5_util(8)` command on the primary KDC to [all …]
|
H A D | realm_config.rst | 13 * The hostnames of your primary and replica KDCs. 14 * How frequently you will propagate the database from the primary KDC 101 services in the event of inaccessibility of the primary KDC. The 112 * Have at least one replica KDC as a backup, for when the primary KDC 119 from the primary, in case of power outages, fires, or other 129 (DNS hostname aliases), such as ``kerberos`` for the primary KDC and 154 client will retry with the primary KDC before failing with an 161 This should list port 749 on your primary KDC. Support for it is 167 primary KDC listens on a TCP port. 169 This entry should list port 464 on your primary KDC. It is used [all …]
|
H A D | database.rst | 177 The :ref:`kdb5_util(8)` command is the primary tool for administrating 251 #. On the primary KDC, run ``kdb5_util list_mkeys`` to view the 259 #. On the primary KDC, run ``kdb5_util use_mkey 1`` to ensure that a 264 #. On the primary KDC, run ``kdb5_util add_mkey -s`` to create a new 278 #. On the primary KDC, run ``kdb5_util use_mkey 2`` to begin using the 285 #. On the primary KDC, run ``kdb5_util update_princ_encryption``. 288 primary KDC will become unavailable while this command runs, but 299 #. On the primary KDC, run ``kdb5_util purge_mkeys`` to clean up the 308 The :ref:`kdb5_ldap_util(8)` command is the primary tool for 495 primary KDC to the replica KDCs. The incremental propagation support [all …]
|
/freebsd/crypto/krb5/doc/html/_sources/admin/ |
H A D | install_kdc.rst.txt | 5 have multiple replica KDCs alongside with a primary KDC to ensure the 7 a copy of the Kerberos database. The primary KDC contains the 10 password changes) are made on the primary KDC. Replica KDCs provide 12 when the primary KDC is unavailable. MIT recommends that you install 13 all of your KDCs to be able to function as either the primary or one 14 of the replicas. This will enable you to easily switch your primary 22 information. Ensure that the primary and all replica KDCs have 33 Install and configure the primary KDC 44 kerberos.mit.edu - primary KDC 152 You will use the :ref:`kdb5_util(8)` command on the primary KDC to [all …]
|
H A D | realm_config.rst.txt | 13 * The hostnames of your primary and replica KDCs. 14 * How frequently you will propagate the database from the primary KDC 101 services in the event of inaccessibility of the primary KDC. The 112 * Have at least one replica KDC as a backup, for when the primary KDC 119 from the primary, in case of power outages, fires, or other 129 (DNS hostname aliases), such as ``kerberos`` for the primary KDC and 154 client will retry with the primary KDC before failing with an 161 This should list port 749 on your primary KDC. Support for it is 167 primary KDC listens on a TCP port. 169 This entry should list port 464 on your primary KDC. It is used [all …]
|
H A D | database.rst.txt | 177 The :ref:`kdb5_util(8)` command is the primary tool for administrating 251 #. On the primary KDC, run ``kdb5_util list_mkeys`` to view the 259 #. On the primary KDC, run ``kdb5_util use_mkey 1`` to ensure that a 264 #. On the primary KDC, run ``kdb5_util add_mkey -s`` to create a new 278 #. On the primary KDC, run ``kdb5_util use_mkey 2`` to begin using the 285 #. On the primary KDC, run ``kdb5_util update_princ_encryption``. 288 primary KDC will become unavailable while this command runs, but 299 #. On the primary KDC, run ``kdb5_util purge_mkeys`` to clean up the 308 The :ref:`kdb5_ldap_util(8)` command is the primary tool for 495 primary KDC to the replica KDCs. The incremental propagation support [all …]
|
/freebsd/contrib/llvm-project/clang/include/clang/Frontend/ |
H A D | ChainedDiagnosticConsumer.h | 20 /// should be the "primary" client, and will be used for computing whether the 25 DiagnosticConsumer *Primary; variable 29 ChainedDiagnosticConsumer(std::unique_ptr<DiagnosticConsumer> Primary, in ChainedDiagnosticConsumer() argument 31 : OwningPrimary(std::move(Primary)), Primary(OwningPrimary.get()), in ChainedDiagnosticConsumer() 34 /// Construct without taking ownership of \c Primary. 35 ChainedDiagnosticConsumer(DiagnosticConsumer *Primary, in ChainedDiagnosticConsumer() argument 37 : Primary(Primary), Secondary(std::move(Secondary)) {} in ChainedDiagnosticConsumer() 41 Primary->BeginSourceFile(LO, PP); in BeginSourceFile() 47 Primary->EndSourceFile(); in EndSourceFile() 52 Primary->finish(); in finish() [all …]
|
/freebsd/contrib/llvm-project/lldb/include/lldb/Host/ |
H A D | PseudoTerminal.h | 32 /// Constructs this object with invalid primary and secondary file 38 /// The destructor will close the primary and secondary file descriptors if 44 /// Close the primary file descriptor if it is valid. 53 /// returned. If the pid is valid, the primary file descriptor can be used 57 /// the secondary pseudo terminal and the primary file descriptor will be 60 /// This class will close the file descriptors for the primary/secondary when 71 /// The primary file descriptor accessor. 73 /// This object retains ownership of the primary file descriptor when this 79 /// The primary file descriptor, or PseudoTerminal::invalid_fd 80 /// if the primary file descriptor is not currently valid. [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | drbgtest.c | 140 EVP_RAND_CTX *primary = RAND_get0_primary(NULL); in using_fips_rng() local 144 if (!TEST_ptr(primary)) in using_fips_rng() 147 prov = EVP_RAND_get0_provider(EVP_RAND_CTX_get0_rand(primary)); in using_fips_rng() 171 * |primary|, |public|, |private|: pointers to the three shared DRBGs 181 EVP_RAND_CTX *primary, in test_drbg_reseed() argument 208 if (!TEST_int_ne(primary_reseed = reseed_counter(primary), 0) in test_drbg_reseed() 235 if (!TEST_int_eq(state(primary), expected_state) in test_drbg_reseed() 241 /* Test whether primary DRBG was reseeded as expected */ in test_drbg_reseed() 242 if (!TEST_int_ge(reseed_counter(primary), primary_reseed)) in test_drbg_reseed() 250 reseed_counter(primary))) in test_drbg_reseed() [all …]
|
/freebsd/usr.bin/find/ |
H A D | find.1 | 95 primary. 120 primary in conjunction with 130 primary specified by 187 primary. 213 If no units are specified, this primary evaluates to 221 If units are specified, this primary evaluates to 230 primary description for information on supported time units. 254 If no units are specified, this primary evaluates to 261 If units are specified, this primary evaluates to 309 If no units are specified, this primary evaluates to [all …]
|
/freebsd/crypto/krb5/src/lib/krb5/ccache/ |
H A D | cc_dir.c | 29 * switchable primary cache. An alternate form of the type represents a 33 * cache set. Resolving a name of this form results in dirname's primary 40 * primary cache to be set to the named cache. 42 * Within the directory, cache names begin with 'tkt'. The file "primary" 43 * contains a single line naming the primary cache. The directory must already 44 * exist when the DIR ccache is resolved, but the primary file will be created 79 /* Compose the pathname of the primary file within a cache directory. */ 83 return k5_path_join(dirname, "primary", path_out); in primary_pathname() 143 /* Read the primary file and compose the residual string for the primary 178 /* Create or update the primary file with a line containing contents. */ [all …]
|
H A D | t_cccol.c | 233 * Before initializing the primary ccache, generate and initialize two in main() 237 * important). The primary cache for the collection should remain as the in main() 264 * Initialize the initial primary cache. Make sure it didn't change names, in main() 278 * Switch the primary cache to each cache we have open. One each switch, in main() 279 * check the primary name, check that the collection resolves to the in main() 280 * expected cache, and check that the new primary name appears first in the in main() 306 * Destroy the primary cache. Make sure this causes both the initial in main() 307 * primary name and the collection name to resolve to an uninitialized in main() 308 * cache. Make sure the primary name doesn't change and doesn't appear in in main() 321 * Switch to the first unique cache after destroying the primary cache. in main() [all …]
|
/freebsd/crypto/krb5/src/windows/lib/ |
H A D | cacheapi.h | 159 apiCB** cc_ctx, // < DLL's primary control structure. 168 apiCB** cc_ctx // <> DLL's primary control structure. NULL after call. 173 apiCB* cc_ctx, // > DLL's primary control structure 187 apiCB* cc_ctx, // > DLL's primary control structure 197 apiCB* cc_ctx, // > DLL's primary control structure 206 apiCB* cc_ctx, // > DLL's primary control structure 212 apiCB* cc_ctx, // > DLL's primary control structure 241 apiCB* cc_ctx, // > DLL's primary control structure 250 apiCB* cc_ctx, // > DLL's primary control structure 268 apiCB* cc_ctx, // > DLL's primary control structure [all …]
|
/freebsd/contrib/llvm-project/lldb/source/Host/common/ |
H A D | PseudoTerminal.cpp | 41 // The destructor will close the primary and secondary file descriptors if they 50 // Close the primary file descriptor if it is valid. 68 // Open the primary side of a pseudo terminal in OpenFirstAvailablePrimary() 160 // Primary FD should have O_CLOEXEC set, but let's close it just in in Fork() 182 // The primary file descriptor accessor. This object retains ownership of the 183 // primary file descriptor when this accessor is used. Use 185 // of the primary file descriptor. 187 // Returns the primary file descriptor, or -1 if the primary file descriptor is 199 // Release ownership of the primary pseud [all...] |
/freebsd/sbin/hastd/ |
H A D | hast.conf.5 | 201 the data is stored on primary node and sent to the secondary. 202 Secondary node then acknowledges data receipt and primary reports 206 Before secondary node returns, primary node dies entirely. 207 When the secondary node comes back to life it becomes the new primary. 270 Executed on both primary and secondary nodes when resource role is changed. 273 Executed on both primary and secondary nodes when connection for the given 277 Executed on both primary and secondary nodes when connection for the given 281 Executed on primary node when synchronization process of secondary node is 285 Executed on primary node when synchronization process of secondary node is 289 Executed on primary node when synchronization process of secondary node is [all …]
|
H A D | secondary.c | 95 * Thread that sends requests back to primary takes requests from this list. 247 * When we work as primary and secondary is missing we will increase in init_remote() 252 * and are both configured as primary nodes. In turn, they can both in init_remote() 256 * When we connect we can see that primary's localcnt is greater than in init_remote() 257 * our remotecnt (primary was modified while we weren't watching) and in init_remote() 258 * our localcnt is greater than primary's remotecnt (we were modified in init_remote() 259 * while primary wasn't watching). in init_remote() 262 * is to compare them. We compare secondary's local with primary's in init_remote() 263 * remote and secondary's remote with primary's local. in init_remote() 264 * Note that every case where primary's localcnt is smaller than in init_remote() [all …]
|
/freebsd/share/man/man4/ |
H A D | ctl.4 | 150 Active/Standby -- primary node has backend access and processes requests, 154 while secondary node synchronizes processing with primary one; 156 Active/Active -- primary node has backend access and processes requests, 157 while secondary node forwards all requests and data to primary one; 180 primary; 185 so that for one LUN one node is primary, while for another -- another. 186 Role change from primary to secondary for HA modes 0 and 2 closes backends, 188 If there is no primary node (both nodes are secondary, or secondary node has 189 no connection to primary one), secondary node(s) report Transitioning state. 190 State with two primary nodes is illegal (split brain condition).
|
/freebsd/crypto/krb5/doc/ |
H A D | iprop-notes.txt | 6 The "full resync" part of the protocol involves the primary side 9 waiting for the kprop. If the connection from the primary never comes 15 relevant to the primary KDC, and is usually fairly static (aside from 17 maintained via iprop can't simply be promoted to a primary in disaster 32 The "iprop role" is assumed to be either primary or replica. The 33 primary writes a log, and the replica fetches it. But what about a 70 primary, listing the replica. Since the full-resync part uses normal 71 kprop, the replica also has to have an ACL entry for the primary. If 73 minutes, the primary side will (at the prompting of the replica) dump 100 kpropd on the primary? Preferably in a way that'd support cascading
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_RAND.pod | 78 the <primary>, <public>, and <private> DRBG. 79 While the <primary> DRBG is a single global instance, the <public> and <private> 85 =head2 The <primary> DRBG instance 87 The <primary> DRBG is not used directly by the application, only for reseeding 103 The <primary> DRBG is intended to be accessed concurrently for reseeding 105 It is I<not> thread-safe to access the <primary> DRBG directly via the 121 thread. Using the <primary> DRBG as entropy source for multiple DRBG 123 will lock the <primary> DRBG automatically for obtaining random input. 135 RAND_add() ==> <primary> <-| shared DRBG (with locking) | 207 (or L<RAND_seed(3)>), then this will immediately reseed the <primary> DRBG. [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | EVP_RAND.7 | 198 the <primary>, <public>, and <private> \s-1DRBG.\s0 199 While the <primary> \s-1DRBG\s0 is a single global instance, the <public> and <private> 204 .SS "The <primary> \s-1DRBG\s0 instance" 205 .IX Subsection "The <primary> DRBG instance" 206 The <primary> \s-1DRBG\s0 is not used directly by the application, only for reseeding 218 The <primary> \s-1DRBG\s0 is intended to be accessed concurrently for reseeding 220 It is \fInot\fR thread-safe to access the <primary> \s-1DRBG\s0 directly via the 236 thread. Using the <primary> \s-1DRBG\s0 as entropy source for multiple \s-1DRBG\s0 238 will lock the <primary> \s-1DRBG\s0 automatically for obtaining random input. 250 \& RAND_add() ==> <primary> <\-| shared DRBG (with locking) | [all …]
|
/freebsd/sys/contrib/dev/iwlwifi/mvm/ |
H A D | coex.c | 213 struct ieee80211_chanctx_conf *primary; 246 /* if the primary is low latency, it will stay primary */ in iwl_mvm_bt_coex_tcm_based_ci() 253 swap(data->primary, data->secondary); in iwl_mvm_bt_coex_tcm_based_ci() 264 bool primary) in iwl_mvm_bt_notif_per_link() 275 if (primary) in iwl_mvm_bt_notif_per_link() 322 /* In case we decided to exit eSR - stay with the primary */ in iwl_mvm_bt_notif_per_link() 402 /* low latency is always primary */ in iwl_mvm_bt_notif_per_link() 406 data->secondary = data->primary; in iwl_mvm_bt_notif_per_link() 407 data->primary in iwl_mvm_bt_notif_per_link() 215 struct ieee80211_chanctx_conf *primary; global() member [all...] |
/freebsd/crypto/openssl/crypto/rand/ |
H A D | rand_lib.c | 387 * There are three shared DRBG instances: <primary>, <public>, and 397 * The <primary> DRBG 403 * The <primary> DRBG is a global instance which is accessed concurrently by 407 EVP_RAND_CTX *primary; member 489 EVP_RAND_CTX_free(dgbl->primary); in ossl_rand_ctx_free() 615 * Get the primary random generator. 630 ret = dgbl->primary; in RAND_get0_primary() 639 ret = dgbl->primary; in RAND_get0_primary() 653 ret = dgbl->primary = rand_new_drbg(ctx, dgbl->seed, in RAND_get0_primary() 657 * The primary DRBG may be shared between multiple threads so we must in RAND_get0_primary() [all …]
|
/freebsd/crypto/openssh/ |
H A D | auth-options.c | 530 * Merges "additional" options to "primary" and returns the result. 531 * NB. Some options from primary have primacy. 534 sshauthopt_merge(const struct sshauthopt *primary, in sshauthopt_merge() argument 549 /* Prefer access lists from primary. */ in sshauthopt_merge() 551 tmp = primary->required_from_host_cert; in sshauthopt_merge() 556 tmp = primary->required_from_host_keys; in sshauthopt_merge() 564 * prefer the primary. in sshauthopt_merge() 566 ret->force_tun_device = primary->force_tun_device; in sshauthopt_merge() 569 if (primary->nenv > 0) { in sshauthopt_merge() 571 primary->env, primary->nenv) != 0) in sshauthopt_merge() [all …]
|
/freebsd/contrib/llvm-project/clang/include/clang/AST/ |
H A D | DeclLookups.h | 76 DeclContext *Primary = const_cast<DeclContext*>(this)->getPrimaryContext(); in lookups() local 77 if (Primary->hasExternalVisibleStorage()) in lookups() 78 getParentASTContext().getExternalSource()->completeVisibleDeclsMap(Primary); in lookups() 79 if (StoredDeclsMap *Map = Primary->buildLookup()) in lookups() 90 DeclContext *Primary = const_cast<DeclContext*>(this)->getPrimaryContext(); in noload_lookups() local 92 Primary->loadLazyLocalLexicalLookups(); in noload_lookups() 93 if (StoredDeclsMap *Map = Primary->getLookupPtr()) in noload_lookups()
|