Home
last modified time | relevance | path

Searched full:primary (Results 1 – 25 of 1626) sorted by relevance

12345678910>>...66

/freebsd/crypto/openssh/regress/
H A Dhostkey-rotate.sh34 # The "primary" key type is ed25519 since it's supported even when built
36 primary="ssh-ed25519"
37 secondary="$primary"
84 dossh -oHostKeyAlgorithms=$primary -oStrictHostKeyChecking=no
87 check_key_present $primary || fail "unstrict didn't learn key"
110 # Change one hostkey (non primary) and relearn
111 if [ "$primary" != "$secondary" ]; then
112 verbose "learn changed non-primary hostkey type=${secondary}"
125 # Add new hostkey (primary type) to sshd and connect
126 verbose "learn new primary hostkey"
[all …]
/freebsd/crypto/krb5/doc/admin/
H A Dinstall_kdc.rst5 have multiple replica KDCs alongside with a primary KDC to ensure the
7 a copy of the Kerberos database. The primary KDC contains the
10 password changes) are made on the primary KDC. Replica KDCs provide
12 when the primary KDC is unavailable. MIT recommends that you install
13 all of your KDCs to be able to function as either the primary or one
14 of the replicas. This will enable you to easily switch your primary
22 information. Ensure that the primary and all replica KDCs have
33 Install and configure the primary KDC
44 kerberos.mit.edu - primary KDC
152 You will use the :ref:`kdb5_util(8)` command on the primary KDC to
[all …]
H A Drealm_config.rst13 * The hostnames of your primary and replica KDCs.
14 * How frequently you will propagate the database from the primary KDC
101 services in the event of inaccessibility of the primary KDC. The
112 * Have at least one replica KDC as a backup, for when the primary KDC
119 from the primary, in case of power outages, fires, or other
129 (DNS hostname aliases), such as ``kerberos`` for the primary KDC and
154 client will retry with the primary KDC before failing with an
161 This should list port 749 on your primary KDC. Support for it is
167 primary KDC listens on a TCP port.
169 This entry should list port 464 on your primary KDC. It is used
[all …]
H A Ddatabase.rst177 The :ref:`kdb5_util(8)` command is the primary tool for administrating
251 #. On the primary KDC, run ``kdb5_util list_mkeys`` to view the
259 #. On the primary KDC, run ``kdb5_util use_mkey 1`` to ensure that a
264 #. On the primary KDC, run ``kdb5_util add_mkey -s`` to create a new
278 #. On the primary KDC, run ``kdb5_util use_mkey 2`` to begin using the
285 #. On the primary KDC, run ``kdb5_util update_princ_encryption``.
288 primary KDC will become unavailable while this command runs, but
299 #. On the primary KDC, run ``kdb5_util purge_mkeys`` to clean up the
308 The :ref:`kdb5_ldap_util(8)` command is the primary tool for
495 primary KDC to the replica KDCs. The incremental propagation support
[all …]
/freebsd/crypto/krb5/doc/html/_sources/admin/
H A Dinstall_kdc.rst.txt5 have multiple replica KDCs alongside with a primary KDC to ensure the
7 a copy of the Kerberos database. The primary KDC contains the
10 password changes) are made on the primary KDC. Replica KDCs provide
12 when the primary KDC is unavailable. MIT recommends that you install
13 all of your KDCs to be able to function as either the primary or one
14 of the replicas. This will enable you to easily switch your primary
22 information. Ensure that the primary and all replica KDCs have
33 Install and configure the primary KDC
44 kerberos.mit.edu - primary KDC
152 You will use the :ref:`kdb5_util(8)` command on the primary KDC to
[all …]
H A Drealm_config.rst.txt13 * The hostnames of your primary and replica KDCs.
14 * How frequently you will propagate the database from the primary KDC
101 services in the event of inaccessibility of the primary KDC. The
112 * Have at least one replica KDC as a backup, for when the primary KDC
119 from the primary, in case of power outages, fires, or other
129 (DNS hostname aliases), such as ``kerberos`` for the primary KDC and
154 client will retry with the primary KDC before failing with an
161 This should list port 749 on your primary KDC. Support for it is
167 primary KDC listens on a TCP port.
169 This entry should list port 464 on your primary KDC. It is used
[all …]
H A Ddatabase.rst.txt177 The :ref:`kdb5_util(8)` command is the primary tool for administrating
251 #. On the primary KDC, run ``kdb5_util list_mkeys`` to view the
259 #. On the primary KDC, run ``kdb5_util use_mkey 1`` to ensure that a
264 #. On the primary KDC, run ``kdb5_util add_mkey -s`` to create a new
278 #. On the primary KDC, run ``kdb5_util use_mkey 2`` to begin using the
285 #. On the primary KDC, run ``kdb5_util update_princ_encryption``.
288 primary KDC will become unavailable while this command runs, but
299 #. On the primary KDC, run ``kdb5_util purge_mkeys`` to clean up the
308 The :ref:`kdb5_ldap_util(8)` command is the primary tool for
495 primary KDC to the replica KDCs. The incremental propagation support
[all …]
/freebsd/contrib/llvm-project/clang/include/clang/Frontend/
H A DChainedDiagnosticConsumer.h20 /// should be the "primary" client, and will be used for computing whether the
25 DiagnosticConsumer *Primary; variable
29 ChainedDiagnosticConsumer(std::unique_ptr<DiagnosticConsumer> Primary, in ChainedDiagnosticConsumer() argument
31 : OwningPrimary(std::move(Primary)), Primary(OwningPrimary.get()), in ChainedDiagnosticConsumer()
34 /// Construct without taking ownership of \c Primary.
35 ChainedDiagnosticConsumer(DiagnosticConsumer *Primary, in ChainedDiagnosticConsumer() argument
37 : Primary(Primary), Secondary(std::move(Secondary)) {} in ChainedDiagnosticConsumer()
41 Primary->BeginSourceFile(LO, PP); in BeginSourceFile()
47 Primary->EndSourceFile(); in EndSourceFile()
52 Primary->finish(); in finish()
[all …]
/freebsd/contrib/llvm-project/lldb/include/lldb/Host/
H A DPseudoTerminal.h32 /// Constructs this object with invalid primary and secondary file
38 /// The destructor will close the primary and secondary file descriptors if
44 /// Close the primary file descriptor if it is valid.
53 /// returned. If the pid is valid, the primary file descriptor can be used
57 /// the secondary pseudo terminal and the primary file descriptor will be
60 /// This class will close the file descriptors for the primary/secondary when
71 /// The primary file descriptor accessor.
73 /// This object retains ownership of the primary file descriptor when this
79 /// The primary file descriptor, or PseudoTerminal::invalid_fd
80 /// if the primary file descriptor is not currently valid.
[all …]
/freebsd/crypto/openssl/test/
H A Ddrbgtest.c140 EVP_RAND_CTX *primary = RAND_get0_primary(NULL); in using_fips_rng() local
144 if (!TEST_ptr(primary)) in using_fips_rng()
147 prov = EVP_RAND_get0_provider(EVP_RAND_CTX_get0_rand(primary)); in using_fips_rng()
171 * |primary|, |public|, |private|: pointers to the three shared DRBGs
181 EVP_RAND_CTX *primary, in test_drbg_reseed() argument
208 if (!TEST_int_ne(primary_reseed = reseed_counter(primary), 0) in test_drbg_reseed()
235 if (!TEST_int_eq(state(primary), expected_state) in test_drbg_reseed()
241 /* Test whether primary DRBG was reseeded as expected */ in test_drbg_reseed()
242 if (!TEST_int_ge(reseed_counter(primary), primary_reseed)) in test_drbg_reseed()
250 reseed_counter(primary))) in test_drbg_reseed()
[all …]
/freebsd/usr.bin/find/
H A Dfind.195 primary.
120 primary in conjunction with
130 primary specified by
187 primary.
213 If no units are specified, this primary evaluates to
221 If units are specified, this primary evaluates to
230 primary description for information on supported time units.
254 If no units are specified, this primary evaluates to
261 If units are specified, this primary evaluates to
309 If no units are specified, this primary evaluates to
[all …]
/freebsd/crypto/krb5/src/lib/krb5/ccache/
H A Dcc_dir.c29 * switchable primary cache. An alternate form of the type represents a
33 * cache set. Resolving a name of this form results in dirname's primary
40 * primary cache to be set to the named cache.
42 * Within the directory, cache names begin with 'tkt'. The file "primary"
43 * contains a single line naming the primary cache. The directory must already
44 * exist when the DIR ccache is resolved, but the primary file will be created
79 /* Compose the pathname of the primary file within a cache directory. */
83 return k5_path_join(dirname, "primary", path_out); in primary_pathname()
143 /* Read the primary file and compose the residual string for the primary
178 /* Create or update the primary file with a line containing contents. */
[all …]
H A Dt_cccol.c233 * Before initializing the primary ccache, generate and initialize two in main()
237 * important). The primary cache for the collection should remain as the in main()
264 * Initialize the initial primary cache. Make sure it didn't change names, in main()
278 * Switch the primary cache to each cache we have open. One each switch, in main()
279 * check the primary name, check that the collection resolves to the in main()
280 * expected cache, and check that the new primary name appears first in the in main()
306 * Destroy the primary cache. Make sure this causes both the initial in main()
307 * primary name and the collection name to resolve to an uninitialized in main()
308 * cache. Make sure the primary name doesn't change and doesn't appear in in main()
321 * Switch to the first unique cache after destroying the primary cache. in main()
[all …]
/freebsd/crypto/krb5/src/windows/lib/
H A Dcacheapi.h159 apiCB** cc_ctx, // < DLL's primary control structure.
168 apiCB** cc_ctx // <> DLL's primary control structure. NULL after call.
173 apiCB* cc_ctx, // > DLL's primary control structure
187 apiCB* cc_ctx, // > DLL's primary control structure
197 apiCB* cc_ctx, // > DLL's primary control structure
206 apiCB* cc_ctx, // > DLL's primary control structure
212 apiCB* cc_ctx, // > DLL's primary control structure
241 apiCB* cc_ctx, // > DLL's primary control structure
250 apiCB* cc_ctx, // > DLL's primary control structure
268 apiCB* cc_ctx, // > DLL's primary control structure
[all …]
/freebsd/contrib/llvm-project/lldb/source/Host/common/
H A DPseudoTerminal.cpp41 // The destructor will close the primary and secondary file descriptors if they
50 // Close the primary file descriptor if it is valid.
68 // Open the primary side of a pseudo terminal in OpenFirstAvailablePrimary()
160 // Primary FD should have O_CLOEXEC set, but let's close it just in in Fork()
182 // The primary file descriptor accessor. This object retains ownership of the
183 // primary file descriptor when this accessor is used. Use
185 // of the primary file descriptor.
187 // Returns the primary file descriptor, or -1 if the primary file descriptor is
199 // Release ownership of the primary pseud
[all...]
/freebsd/sbin/hastd/
H A Dhast.conf.5201 the data is stored on primary node and sent to the secondary.
202 Secondary node then acknowledges data receipt and primary reports
206 Before secondary node returns, primary node dies entirely.
207 When the secondary node comes back to life it becomes the new primary.
270 Executed on both primary and secondary nodes when resource role is changed.
273 Executed on both primary and secondary nodes when connection for the given
277 Executed on both primary and secondary nodes when connection for the given
281 Executed on primary node when synchronization process of secondary node is
285 Executed on primary node when synchronization process of secondary node is
289 Executed on primary node when synchronization process of secondary node is
[all …]
H A Dsecondary.c95 * Thread that sends requests back to primary takes requests from this list.
247 * When we work as primary and secondary is missing we will increase in init_remote()
252 * and are both configured as primary nodes. In turn, they can both in init_remote()
256 * When we connect we can see that primary's localcnt is greater than in init_remote()
257 * our remotecnt (primary was modified while we weren't watching) and in init_remote()
258 * our localcnt is greater than primary's remotecnt (we were modified in init_remote()
259 * while primary wasn't watching). in init_remote()
262 * is to compare them. We compare secondary's local with primary's in init_remote()
263 * remote and secondary's remote with primary's local. in init_remote()
264 * Note that every case where primary's localcnt is smaller than in init_remote()
[all …]
/freebsd/share/man/man4/
H A Dctl.4150 Active/Standby -- primary node has backend access and processes requests,
154 while secondary node synchronizes processing with primary one;
156 Active/Active -- primary node has backend access and processes requests,
157 while secondary node forwards all requests and data to primary one;
180 primary;
185 so that for one LUN one node is primary, while for another -- another.
186 Role change from primary to secondary for HA modes 0 and 2 closes backends,
188 If there is no primary node (both nodes are secondary, or secondary node has
189 no connection to primary one), secondary node(s) report Transitioning state.
190 State with two primary nodes is illegal (split brain condition).
/freebsd/crypto/krb5/doc/
H A Diprop-notes.txt6 The "full resync" part of the protocol involves the primary side
9 waiting for the kprop. If the connection from the primary never comes
15 relevant to the primary KDC, and is usually fairly static (aside from
17 maintained via iprop can't simply be promoted to a primary in disaster
32 The "iprop role" is assumed to be either primary or replica. The
33 primary writes a log, and the replica fetches it. But what about a
70 primary, listing the replica. Since the full-resync part uses normal
71 kprop, the replica also has to have an ACL entry for the primary. If
73 minutes, the primary side will (at the prompting of the replica) dump
100 kpropd on the primary? Preferably in a way that'd support cascading
/freebsd/crypto/openssl/doc/man7/
H A DEVP_RAND.pod78 the <primary>, <public>, and <private> DRBG.
79 While the <primary> DRBG is a single global instance, the <public> and <private>
85 =head2 The <primary> DRBG instance
87 The <primary> DRBG is not used directly by the application, only for reseeding
103 The <primary> DRBG is intended to be accessed concurrently for reseeding
105 It is I<not> thread-safe to access the <primary> DRBG directly via the
121 thread. Using the <primary> DRBG as entropy source for multiple DRBG
123 will lock the <primary> DRBG automatically for obtaining random input.
135 RAND_add() ==> <primary> <-| shared DRBG (with locking) |
207 (or L<RAND_seed(3)>), then this will immediately reseed the <primary> DRBG.
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A DEVP_RAND.7198 the <primary>, <public>, and <private> \s-1DRBG.\s0
199 While the <primary> \s-1DRBG\s0 is a single global instance, the <public> and <private>
204 .SS "The <primary> \s-1DRBG\s0 instance"
205 .IX Subsection "The <primary> DRBG instance"
206 The <primary> \s-1DRBG\s0 is not used directly by the application, only for reseeding
218 The <primary> \s-1DRBG\s0 is intended to be accessed concurrently for reseeding
220 It is \fInot\fR thread-safe to access the <primary> \s-1DRBG\s0 directly via the
236 thread. Using the <primary> \s-1DRBG\s0 as entropy source for multiple \s-1DRBG\s0
238 will lock the <primary> \s-1DRBG\s0 automatically for obtaining random input.
250 \& RAND_add() ==> <primary> <\-| shared DRBG (with locking) |
[all …]
/freebsd/sys/contrib/dev/iwlwifi/mvm/
H A Dcoex.c213 struct ieee80211_chanctx_conf *primary;
246 /* if the primary is low latency, it will stay primary */ in iwl_mvm_bt_coex_tcm_based_ci()
253 swap(data->primary, data->secondary); in iwl_mvm_bt_coex_tcm_based_ci()
264 bool primary) in iwl_mvm_bt_notif_per_link()
275 if (primary) in iwl_mvm_bt_notif_per_link()
322 /* In case we decided to exit eSR - stay with the primary */ in iwl_mvm_bt_notif_per_link()
402 /* low latency is always primary */ in iwl_mvm_bt_notif_per_link()
406 data->secondary = data->primary; in iwl_mvm_bt_notif_per_link()
407 data->primary in iwl_mvm_bt_notif_per_link()
215 struct ieee80211_chanctx_conf *primary; global() member
[all...]
/freebsd/crypto/openssl/crypto/rand/
H A Drand_lib.c387 * There are three shared DRBG instances: <primary>, <public>, and
397 * The <primary> DRBG
403 * The <primary> DRBG is a global instance which is accessed concurrently by
407 EVP_RAND_CTX *primary; member
489 EVP_RAND_CTX_free(dgbl->primary); in ossl_rand_ctx_free()
615 * Get the primary random generator.
630 ret = dgbl->primary; in RAND_get0_primary()
639 ret = dgbl->primary; in RAND_get0_primary()
653 ret = dgbl->primary = rand_new_drbg(ctx, dgbl->seed, in RAND_get0_primary()
657 * The primary DRBG may be shared between multiple threads so we must in RAND_get0_primary()
[all …]
/freebsd/crypto/openssh/
H A Dauth-options.c530 * Merges "additional" options to "primary" and returns the result.
531 * NB. Some options from primary have primacy.
534 sshauthopt_merge(const struct sshauthopt *primary, in sshauthopt_merge() argument
549 /* Prefer access lists from primary. */ in sshauthopt_merge()
551 tmp = primary->required_from_host_cert; in sshauthopt_merge()
556 tmp = primary->required_from_host_keys; in sshauthopt_merge()
564 * prefer the primary. in sshauthopt_merge()
566 ret->force_tun_device = primary->force_tun_device; in sshauthopt_merge()
569 if (primary->nenv > 0) { in sshauthopt_merge()
571 primary->env, primary->nenv) != 0) in sshauthopt_merge()
[all …]
/freebsd/contrib/llvm-project/clang/include/clang/AST/
H A DDeclLookups.h76 DeclContext *Primary = const_cast<DeclContext*>(this)->getPrimaryContext(); in lookups() local
77 if (Primary->hasExternalVisibleStorage()) in lookups()
78 getParentASTContext().getExternalSource()->completeVisibleDeclsMap(Primary); in lookups()
79 if (StoredDeclsMap *Map = Primary->buildLookup()) in lookups()
90 DeclContext *Primary = const_cast<DeclContext*>(this)->getPrimaryContext(); in noload_lookups() local
92 Primary->loadLazyLocalLexicalLookups(); in noload_lookups()
93 if (StoredDeclsMap *Map = Primary->getLookupPtr()) in noload_lookups()

12345678910>>...66