Home
last modified time | relevance | path

Searched refs:Server (Results 1 – 25 of 146) sorted by relevance

123456

/freebsd/tools/regression/sockets/unix_cmsg/
H A DREADME9 Usually each test does following steps: creates Server, forks Client,
10 Client sends something to Server, Server verifies whether everything is
38 If Client sends something to Server, then it sends 5 messages by default.
42 If Client sends something to Server, then it sends some data (few bytes)
59 Client connects to Server and sends N messages with SCM_CREDS ancillary
60 data object. Server should receive N messages, each message should
65 Server creates a listening stream socket and sets the LOCAL_CREDS
66 socket option for it. Client connects to Server two times, each time
67 it sends N messages. Server accepts two connections and receives N
74 Client connects to Server. Server accepts connection and sets the
[all …]
/freebsd/contrib/llvm-project/llvm/include/llvm/ExecutionEngine/Orc/TargetProcess/
H A DSimpleRemoteEPCServer.h101 auto Server = std::make_unique<SimpleRemoteEPCServer>(); in Create() local
102 Setup S(*Server); in Create()
108 if (!Server->ReportError) in Create()
109 Server->ReportError = [](Error Err) { in Create()
115 *Server, std::forward<TransportTCtorArgTs>(TransportTCtorArgs)...); in Create()
118 Server->T = std::move(*T); in Create()
119 if (auto Err = Server->T->start()) in Create()
123 Server->Services = std::move(S.services()); in Create()
124 Server->Services.push_back( in Create()
126 for (auto &Service : Server->Services) in Create()
[all …]
/freebsd/crypto/openssl/test/ssl-tests/
H A D01-simple.cnf6 test-1 = 1-Server signature algorithms bug
34 [1-Server signature algorithms bug]
35 ssl_conf = 1-Server signature algorithms bug-ssl
37 [1-Server signature algorithms bug-ssl]
38 server = 1-Server signature algorithms bug-server
39 client = 1-Server signature algorithms bug-client
41 [1-Server signature algorithms bug-server]
47 [1-Server signature algorithms bug-client]
H A D23-srp.cnf.in58 # Server fails first with bad client Finished.
103 # Server fails first with bad client Finished.
/freebsd/contrib/llvm-project/llvm/lib/Debuginfod/
H A DHTTPServer.cpp69 HTTPServer::HTTPServer() { Server = std::make_unique<httplib::Server>(); } in HTTPServer()
117 Server->Get(std::string(UrlPathPattern), in get()
127 if (!Server->bind_to_port(HostInterface, ListenPort)) in bind()
135 int ListenPort = Server->bind_to_any_port(HostInterface); in bind()
146 if (!Server->listen_after_bind()) in listen()
154 Server->stop(); in stop()
/freebsd/contrib/llvm-project/llvm/include/llvm/Debuginfod/
H A DHTTPServer.h27 class Server; variable
101 std::unique_ptr<httplib::Server> Server; variable
/freebsd/contrib/wpa/hostapd/
H A DREADME109 Access Entity, and Authentication Server. Supplicant is a component in
111 Server. An access point includes an Authenticator that relays the packets
112 between a Supplicant and an Authentication Server. In addition, it has a
120 Server (and similarly, relays the messages from the Authentication
121 Server to the Supplicant). The Authentication Server can be colocated with the
124 use an external Authentication Server and encapsulate EAP frame in the
140 Authentication Server. hostapd supports RADIUS encapsulation of EAP
141 packets, so the Authentication Server should be a RADIUS server, like
144 Server. It also controls the PAE functionality in the kernel driver by
155 with the Authentication Server. After this is completed successfully,
[all …]
/freebsd/contrib/ntp/html/scripts/
H A Dconfig.txt1 document.write("<p>Client and Server Configuration</p><ul>\
3 <li class='inline'><a href='discover.html'>Automatic Server Discovery Schemes</a></li>\
/freebsd/contrib/llvm-project/llvm/tools/lli/ChildTarget/
H A DChildTarget.cpp52 auto Server = in main()
65 ExitOnErr(Server->waitForDisconnect()); in main()
53 auto Server = main() local
/freebsd/usr.sbin/services_mkdb/
H A Dservices80 nameserver 42/tcp name #Host Name Server
81 nameserver 42/udp name #Host Name Server
102 domain 53/tcp #Domain Name Server
103 domain 53/udp #Domain Name Server
126 bootps 67/tcp dhcps #Bootstrap Protocol Server
127 bootps 67/udp dhcps #Bootstrap Protocol Server
192 hostname 101/tcp hostnames #NIC Host Name Server
193 hostname 101/udp hostnames #NIC Host Name Server
206 snagas 108/tcp #SNA Gateway Access Server
207 snagas 108/udp #SNA Gateway Access Server
[all …]
/freebsd/contrib/telnet/libtelnet/
H A Dencrypt.c90 static int Server = 0; variable
185 Server = server; in encrypt_init()
205 (*ep->init)(Server); in encrypt_init()
421 if (!Server && autodecrypt) in encrypt_send_support()
502 type = ep->start ? (*ep->start)(DIR_ENCRYPT, Server) : 0; in encrypt_support()
688 if (Server) in encrypt_request_start()
812 i = (*ep->start)(DIR_ENCRYPT, Server); in encrypt_start_output()
H A Dauth.c95 static int Server = 0; variable
198 Server = server; in auth_init()
378 if (Server) { in auth_send()
559 if (Server && !authenticating) in auth_wait()
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Dencrypt.c91 static int Server = 0; variable
183 Server = server; in encrypt_init()
206 (*ep->init)(Server); in encrypt_init()
437 if (!Server && autodecrypt) in encrypt_send_support()
537 type = ep->start ? (*ep->start)(DIR_ENCRYPT, Server) : 0; in encrypt_support()
723 if (Server) in encrypt_request_start()
844 i = (*ep->start)(DIR_ENCRYPT, Server); in encrypt_start_output()
H A Dauth.c97 static int Server = 0; variable
192 Server = server; in auth_init()
372 if (Server) { in auth_send()
562 if (Server && !authenticating) in auth_wait()
/freebsd/secure/caroot/trusted/
H A DSectigo_Public_Server_Authentication_Root_E46.pem2 ## Sectigo Public Server Authentication Root E46
20 Issuer: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root E46
24 Subject: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root E46
H A DSectigo_Public_Server_Authentication_Root_R46.pem2 ## Sectigo Public Server Authentication Root R46
20 Issuer: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
24 Subject: C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
/freebsd/sys/contrib/device-tree/src/arm64/amd/
H A Dhusky.dts3 * DTS file for AMD/Linaro 96Boards Enterprise Edition Server (Husky) Board
14 model = "Linaro 96Boards Enterprise Edition Server (Husky) Board";
/freebsd/sys/contrib/device-tree/Bindings/watchdog/
H A Dsbsa-gwdt.txt1 * SBSA (Server Base System Architecture) Generic Watchdog
5 watchdog timer can be found in the ARM document: ARM-DEN-0029 - Server
/freebsd/sys/contrib/device-tree/Bindings/net/
H A Dmarvell,prestera.txt13 - dfx: phandle reference to the "DFX Server" node
31 DFX Server bindings
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5_err.et13 error_code SERVICE_EXP, "Server's entry in database has expired"
16 error_code S_OLD_MAST_KVNO, "Server's key is encrypted in an old master key"
18 error_code S_PRINCIPAL_UNKNOWN, "Server not found in Kerberos database"
33 error_code SERVICE_NOTYET, "Server not yet valid - try again later"
38 error_code KDC_ERR_MUST_USE_USER2USER, "Server principal valid for user2user only"
227 error_code KRB5_SENDAUTH_REJECTED, "Server rejected authentication (during sendauth exchange)"
/freebsd/sys/dev/e1000/
H A DREADME196 Intel(R) PRO/1000 PT Server Adapter
199 Intel(R) PRO/1000 PT Dual Port Server Adapter
201 Intel(R) PRO/1000 PT Quad Port Server Adapter
202 Intel(R) PRO/1000 PF Quad Port Server Adapter
203 Intel(R) PRO/1000 PF Server Adapter
205 Intel(R) PRO/1000 PF Dual Port Server Adapter
206 Intel(R) PRO/1000 PB Server Connection
222 - Intel(R) PRO/1000 Gigabit Server Adapter
/freebsd/contrib/libpcap/rpcapd/
H A Drpcapd@.service2 Description=Rpcap Per-Connection Server
/freebsd/contrib/unbound/doc/
H A Dcontrol_proto_spec.txt4 Server listens on 8953 TCP (localhost by default). Client connects,
20 Server executes command. And sends reply in ascii text over channel,
/freebsd/contrib/bearssl/test/x509/
H A Dalltests.txt186 ; Server name check: name does not match the SAN nor the CN.
196 ; Server name check: name matches the CN but not the SAN, and there is
207 ; Server name check: name does not match CN, but matches the first SAN
219 ; Server name check: name does not match CN, but matches the second SAN
231 ; Server name check: no SAN, but the CN matches the server name.
242 ; Server name check: no SAN, and the CN does not match the server name.
252 ; Server name check: no SAN, and the CN does not match the server name,
263 ; Server name check: no SAN, and the CN uses BMPString encoding, but we
/freebsd/crypto/openssl/test/ct/
H A Dlog_list.cnf23 description = DigiCert Log Server

123456