/freebsd/tools/regression/sockets/unix_cmsg/ |
H A D | README | 9 Usually each test does following steps: creates Server, forks Client, 10 Client sends something to Server, Server verifies whether everything is 38 If Client sends something to Server, then it sends 5 messages by default. 42 If Client sends something to Server, then it sends some data (few bytes) 59 Client connects to Server and sends N messages with SCM_CREDS ancillary 60 data object. Server should receive N messages, each message should 65 Server creates a listening stream socket and sets the LOCAL_CREDS 66 socket option for it. Client connects to Server two times, each time 67 it sends N messages. Server accepts two connections and receives N 74 Client connects to Server. Server accepts connection and sets the [all …]
|
/freebsd/contrib/llvm-project/llvm/include/llvm/ExecutionEngine/Orc/TargetProcess/ |
H A D | SimpleRemoteEPCServer.h | 101 auto Server = std::make_unique<SimpleRemoteEPCServer>(); in Create() local 102 Setup S(*Server); in Create() 108 if (!Server->ReportError) in Create() 109 Server->ReportError = [](Error Err) { in Create() 115 *Server, std::forward<TransportTCtorArgTs>(TransportTCtorArgs)...); in Create() 118 Server->T = std::move(*T); in Create() 119 if (auto Err = Server->T->start()) in Create() 123 Server->Services = std::move(S.services()); in Create() 124 Server->Services.push_back( in Create() 126 for (auto &Service : Server->Services) in Create() [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 01-simple.cnf | 6 test-1 = 1-Server signature algorithms bug 34 [1-Server signature algorithms bug] 35 ssl_conf = 1-Server signature algorithms bug-ssl 37 [1-Server signature algorithms bug-ssl] 38 server = 1-Server signature algorithms bug-server 39 client = 1-Server signature algorithms bug-client 41 [1-Server signature algorithms bug-server] 47 [1-Server signature algorithms bug-client]
|
H A D | 23-srp.cnf.in | 58 # Server fails first with bad client Finished. 103 # Server fails first with bad client Finished.
|
/freebsd/contrib/llvm-project/llvm/lib/Debuginfod/ |
H A D | HTTPServer.cpp | 69 HTTPServer::HTTPServer() { Server = std::make_unique<httplib::Server>(); } in HTTPServer() 117 Server->Get(std::string(UrlPathPattern), in get() 127 if (!Server->bind_to_port(HostInterface, ListenPort)) in bind() 135 int ListenPort = Server->bind_to_any_port(HostInterface); in bind() 146 if (!Server->listen_after_bind()) in listen() 154 Server->stop(); in stop()
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Debuginfod/ |
H A D | HTTPServer.h | 27 class Server; variable 101 std::unique_ptr<httplib::Server> Server; variable
|
/freebsd/contrib/wpa/hostapd/ |
H A D | README | 109 Access Entity, and Authentication Server. Supplicant is a component in 111 Server. An access point includes an Authenticator that relays the packets 112 between a Supplicant and an Authentication Server. In addition, it has a 120 Server (and similarly, relays the messages from the Authentication 121 Server to the Supplicant). The Authentication Server can be colocated with the 124 use an external Authentication Server and encapsulate EAP frame in the 140 Authentication Server. hostapd supports RADIUS encapsulation of EAP 141 packets, so the Authentication Server should be a RADIUS server, like 144 Server. It also controls the PAE functionality in the kernel driver by 155 with the Authentication Server. After this is completed successfully, [all …]
|
/freebsd/contrib/ntp/html/scripts/ |
H A D | config.txt | 1 document.write("<p>Client and Server Configuration</p><ul>\ 3 <li class='inline'><a href='discover.html'>Automatic Server Discovery Schemes</a></li>\
|
/freebsd/contrib/llvm-project/llvm/tools/lli/ChildTarget/ |
H A D | ChildTarget.cpp | 52 auto Server = in main() 65 ExitOnErr(Server->waitForDisconnect()); in main() 53 auto Server = main() local
|
/freebsd/usr.sbin/services_mkdb/ |
H A D | services | 80 nameserver 42/tcp name #Host Name Server 81 nameserver 42/udp name #Host Name Server 102 domain 53/tcp #Domain Name Server 103 domain 53/udp #Domain Name Server 126 bootps 67/tcp dhcps #Bootstrap Protocol Server 127 bootps 67/udp dhcps #Bootstrap Protocol Server 192 hostname 101/tcp hostnames #NIC Host Name Server 193 hostname 101/udp hostnames #NIC Host Name Server 206 snagas 108/tcp #SNA Gateway Access Server 207 snagas 108/udp #SNA Gateway Access Server [all …]
|
/freebsd/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 90 static int Server = 0; variable 185 Server = server; in encrypt_init() 205 (*ep->init)(Server); in encrypt_init() 421 if (!Server && autodecrypt) in encrypt_send_support() 502 type = ep->start ? (*ep->start)(DIR_ENCRYPT, Server) : 0; in encrypt_support() 688 if (Server) in encrypt_request_start() 812 i = (*ep->start)(DIR_ENCRYPT, Server); in encrypt_start_output()
|
H A D | auth.c | 95 static int Server = 0; variable 198 Server = server; in auth_init() 378 if (Server) { in auth_send() 559 if (Server && !authenticating) in auth_wait()
|
/freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 91 static int Server = 0; variable 183 Server = server; in encrypt_init() 206 (*ep->init)(Server); in encrypt_init() 437 if (!Server && autodecrypt) in encrypt_send_support() 537 type = ep->start ? (*ep->start)(DIR_ENCRYPT, Server) : 0; in encrypt_support() 723 if (Server) in encrypt_request_start() 844 i = (*ep->start)(DIR_ENCRYPT, Server); in encrypt_start_output()
|
H A D | auth.c | 97 static int Server = 0; variable 192 Server = server; in auth_init() 372 if (Server) { in auth_send() 562 if (Server && !authenticating) in auth_wait()
|
/freebsd/secure/caroot/trusted/ |
H A D | Sectigo_Public_Server_Authentication_Root_E46.pem | 2 ## Sectigo Public Server Authentication Root E46 20 Issuer: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root E46 24 Subject: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root E46
|
H A D | Sectigo_Public_Server_Authentication_Root_R46.pem | 2 ## Sectigo Public Server Authentication Root R46 20 Issuer: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46 24 Subject: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
|
/freebsd/sys/contrib/device-tree/src/arm64/amd/ |
H A D | husky.dts | 3 * DTS file for AMD/Linaro 96Boards Enterprise Edition Server (Husky) Board 14 model = "Linaro 96Boards Enterprise Edition Server (Husky) Board";
|
/freebsd/sys/contrib/device-tree/Bindings/watchdog/ |
H A D | sbsa-gwdt.txt | 1 * SBSA (Server Base System Architecture) Generic Watchdog 5 watchdog timer can be found in the ARM document: ARM-DEN-0029 - Server
|
/freebsd/sys/contrib/device-tree/Bindings/net/ |
H A D | marvell,prestera.txt | 13 - dfx: phandle reference to the "DFX Server" node 31 DFX Server bindings
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | krb5_err.et | 13 error_code SERVICE_EXP, "Server's entry in database has expired" 16 error_code S_OLD_MAST_KVNO, "Server's key is encrypted in an old master key" 18 error_code S_PRINCIPAL_UNKNOWN, "Server not found in Kerberos database" 33 error_code SERVICE_NOTYET, "Server not yet valid - try again later" 38 error_code KDC_ERR_MUST_USE_USER2USER, "Server principal valid for user2user only" 227 error_code KRB5_SENDAUTH_REJECTED, "Server rejected authentication (during sendauth exchange)"
|
/freebsd/sys/dev/e1000/ |
H A D | README | 196 Intel(R) PRO/1000 PT Server Adapter 199 Intel(R) PRO/1000 PT Dual Port Server Adapter 201 Intel(R) PRO/1000 PT Quad Port Server Adapter 202 Intel(R) PRO/1000 PF Quad Port Server Adapter 203 Intel(R) PRO/1000 PF Server Adapter 205 Intel(R) PRO/1000 PF Dual Port Server Adapter 206 Intel(R) PRO/1000 PB Server Connection 222 - Intel(R) PRO/1000 Gigabit Server Adapter
|
/freebsd/contrib/libpcap/rpcapd/ |
H A D | rpcapd@.service | 2 Description=Rpcap Per-Connection Server
|
/freebsd/contrib/unbound/doc/ |
H A D | control_proto_spec.txt | 4 Server listens on 8953 TCP (localhost by default). Client connects, 20 Server executes command. And sends reply in ascii text over channel,
|
/freebsd/contrib/bearssl/test/x509/ |
H A D | alltests.txt | 186 ; Server name check: name does not match the SAN nor the CN. 196 ; Server name check: name matches the CN but not the SAN, and there is 207 ; Server name check: name does not match CN, but matches the first SAN 219 ; Server name check: name does not match CN, but matches the second SAN 231 ; Server name check: no SAN, but the CN matches the server name. 242 ; Server name check: no SAN, and the CN does not match the server name. 252 ; Server name check: no SAN, and the CN does not match the server name, 263 ; Server name check: no SAN, and the CN uses BMPString encoding, but we
|
/freebsd/crypto/openssl/test/ct/ |
H A D | log_list.cnf | 23 description = DigiCert Log Server
|