Home
last modified time | relevance | path

Searched refs:servers (Results 1 – 25 of 224) sorted by relevance

123456789

/freebsd/libexec/bootpd/
H A Dbootptab.mcs10 # cs -- cookie servers
13 # ds -- domain name servers
20 # im -- impress servers
22 # lg -- log servers
23 # lp -- LPR servers
24 # ns -- IEN-116 name servers
26 # rl -- resource location protocol servers
34 # ts -- time servers
73 # Individual entries (could also have different servers for some/all of these
H A Dbootptab.cmu10 # cs -- cookie servers
13 # ds -- domain name servers
20 # im -- impress servers
22 # lg -- log servers
23 # lp -- LPR servers
24 # ns -- IEN-116 name servers
26 # rl -- resource location protocol servers
34 # ts -- time servers
67 # Individual entries (could also have different servers for some/all of these
/freebsd/lib/libradius/
H A Dradlib.c104 srvp = &h->servers[srv]; in insert_scrambled_password()
135 srvp = &h->servers[h->srv]; in insert_request_authenticator()
157 srvp = &h->servers[h->srv]; in insert_message_authenticator()
197 srvp = &h->servers[srv]; in is_valid_response()
295 srvp = &h->servers[h->srv]; in is_valid_request()
432 srvp = &h->servers[h->num_servers]; in rad_add_server_ex()
484 memset(h->servers[srv].secret, 0, in rad_close()
485 strlen(h->servers[srv].secret)); in rad_close()
486 free(h->servers[srv].secret); in rad_close()
716 if (h->servers[h->srv].num_tries >= h->servers[h->srv].max_tries) { in rad_continue_send_request()
[all …]
/freebsd/crypto/krb5/src/lib/krb5/os/
H A Dt_std_conf.c77 struct serverlist servers; in test_locate_kdc() local
85 retval = k5_locate_kdc(ctx, &rlm, &servers, get_primaries, FALSE); in test_locate_kdc()
91 for (i = 0; i < servers.nservers; i++) { in test_locate_kdc()
92 struct server_entry *entry = &servers.servers[i]; in test_locate_kdc()
122 k5_free_serverlist(&servers); in test_locate_kdc()
H A Dlocate_kdc.c127 free(list->servers[i].hostname); in k5_free_serverlist()
128 free(list->servers[i].uri_path); in k5_free_serverlist()
130 free(list->servers); in k5_free_serverlist()
131 list->servers = NULL; in k5_free_serverlist()
155 newservers = realloc(list->servers, newspace); in new_server_entry()
158 list->servers = newservers; in new_server_entry()
240 for (ent = list->servers; ent < list->servers + list->nservers; ent++) { in server_list_contains()
H A Dsendto_kdc.c452 struct serverlist servers; in k5_sendto_kdc() local
498 retval = k5_locate_kdc(context, realm, &servers, use_primary, no_udp); in k5_sendto_kdc()
520 retval = k5_sendto(context, message, realm, &servers, strategy, NULL, in k5_sendto_kdc()
558 retval = k5_kdclist_add(kdcs, realm, &servers.servers[server_used]); in k5_sendto_kdc()
563 k5_free_serverlist(&servers); in k5_sendto_kdc()
806 const struct serverlist *servers, size_t ind, in resolve_server() argument
811 struct server_entry *entry = &servers->servers[ind]; in resolve_server()
1500 const krb5_data *realm, const struct serverlist *servers, in k5_sendto() argument
1539 for (s = 0; s < servers->nservers && !done; s++) { in k5_sendto()
1542 retval = resolve_server(context, realm, servers, s, strategy, message, in k5_sendto()
/freebsd/contrib/ntp/ntpd/
H A Dntpsim.c77 printf("%s\n", stoa(simulation.servers[i].addr)); in create_server_associations()
78 if (peer_config(simulation.servers[i].addr, in create_server_associations()
92 stoa(simulation.servers[i].addr)); in create_server_associations()
280 if (memcmp(simulation.servers[i].addr, serv_addr, in simulate_server()
282 server = &simulation.servers[i]; in simulate_server()
411 simulation.servers[i].curr_script->freq_offset += in sim_update_clocks()
412 gauss(0, time_gap * simulation.servers[i].curr_script->wander); in sim_update_clocks()
414 simulation.servers[i].server_time += time_gap * in sim_update_clocks()
415 (1 + simulation.servers[i].curr_script->freq_offset); in sim_update_clocks()
/freebsd/crypto/krb5/src/lib/krad/
H A Dclient.c73 struct server_head servers; member
85 K5_LIST_FOREACH(srv, &rc->servers, list) { in get_server()
102 K5_LIST_INSERT_HEAD(&rc->servers, srv, list); in get_server()
230 K5_LIST_FOREACH(srv, &rc->servers, list) in krad_client_free()
233 while (!K5_LIST_EMPTY(&rc->servers)) { in krad_client_free()
234 srv = K5_LIST_FIRST(&rc->servers); in krad_client_free()
/freebsd/contrib/netbsd-tests/lib/librumphijack/
H A Dnetstat.expout1 Active Internet connections (including servers)
4 Active Internet6 connections (including servers)
/freebsd/contrib/ntp/
H A DREADME.leapsmear26 NTP servers also pass a leap second warning flag down to their clients via
96 - During the smear interval the time provided by smearing NTP servers
98 non-smearing NTP servers. The difference can be up to 1 second, depending
157 have to take care that your NTP servers support leap smearing and configure
158 those few servers accordingly. If the smear interval is long enough so that
180 exchanged with other NTP servers are based on the real UTC system time and
189 - Leap Second Smearing MUST NOT be used for public servers, e.g. servers
190 provided by metrology institutes, or servers participating in the NTP pool
192 mixture of smearing and non-smearing NTP servers which could result in
194 configured on time servers providing dedicated clients with time, if all
[all …]
/freebsd/sys/dev/ofw/
H A Dofw_cpu.c313 cell_t *servers; in ofw_cpu_attach() local
317 "ibm,ppc-interrupt-server#s", (void **)&servers)) < 0) in ofw_cpu_attach()
323 if (cpuref.cr_hwref == servers[i]) { in ofw_cpu_attach()
327 OF_prop_free(servers); in ofw_cpu_attach()
336 OF_prop_free(servers); in ofw_cpu_attach()
/freebsd/contrib/ntp/scripts/ntptrace/
H A Dntptrace-opts.def47 the chain of NTP servers from a given host back to the primary time source. For
48 ntptrace to work properly, each of these servers must implement the NTP Control
63 synchronization distance, and (only for stratum-1 servers) the reference clock
/freebsd/packages/ntp/
H A Dntp.ucl24 NTP servers are typically organised in a hierarchy in which the highest-level
25 servers receive time from a reliable external timekeeping device (such as an
31 networks. Many NTP servers are accessible over the public Internet, most of
/freebsd/crypto/heimdal/lib/kadm5/
H A Dad.c268 } *s, *servers = NULL; in _kadm5_ad_connect() local
295 s = realloc(servers, sizeof(*servers) * (num_servers + 1)); in _kadm5_ad_connect()
301 servers = s; in _kadm5_ad_connect()
303 servers[num_servers - 1].port = rr->u.srv->port; in _kadm5_ad_connect()
304 servers[num_servers - 1].server = strdup(rr->u.srv->target); in _kadm5_ad_connect()
318 lp = ldap_init(servers[i].server, servers[i].port); in _kadm5_ad_connect()
333 lret = ldap_tsasl_bind_s(lp, NULL, NULL, NULL, servers[i].server); in _kadm5_ad_connect()
392 free(servers[i].server); in _kadm5_ad_connect()
393 free(servers); in _kadm5_ad_connect()
399 free(servers[i].server); in _kadm5_ad_connect()
[all …]
/freebsd/lib/libtacplus/
H A Dtaclib.c239 struct tac_server *srvp = &h->servers[h->cur_server]; in conn_server()
321 secret = h->servers[h->cur_server].secret; in crypt_msg()
392 h->single_connect = (h->servers[h->cur_server].flags & in establish_connection()
549 deadline.tv_sec += h->servers[h->cur_server].timeout; in recv_msg()
639 deadline.tv_sec += h->servers[h->cur_server].timeout; in send_msg()
698 srvp = &h->servers[h->num_servers]; in tac_add_server_av()
768 memset(h->servers[srv].secret, 0, in tac_close()
769 strlen(h->servers[srv].secret)); in tac_close()
770 free(h->servers[srv].secret); in tac_close()
1096 srvp = &h->servers[h->cur_server]; in tac_send_author()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_options.pod123 servers. See the B<SECURE RENEGOTIATION> section for more details.
228 Allow legacy insecure renegotiation between OpenSSL and unpatched servers
244 Normally clients and servers will transparently attempt to negotiate the
252 Normally clients and servers will transparently attempt to negotiate the
269 Normally clients and servers will transparently attempt to negotiate the
273 propose, and servers will not accept the extension.
277 Normally clients and servers will transparently attempt to negotiate the
281 not propose, and servers will not accept the extension.
441 and renegotiation between patched OpenSSL clients and unpatched servers
443 servers will fail.
[all …]
H A DSSL_CONF_cmd.pod29 both clients and servers and the B<value> parameter is not used. The default
62 Equivalent to B<SSL_OP_CIPHER_SERVER_PREFERENCE>. Only used by servers.
66 Allows servers to accept client-initiated renegotiation. Equivalent to
68 Only used by servers.
82 Sets B<SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION>. Only used by servers.
94 Only used by servers. Requires B<-serverpref>.
105 Equivalent to B<SSL_OP_PREFER_NO_DHE_KEX>. Only used by servers.
116 algorithms extension. For servers it is used to determine which signature
143 authentication for TLSv1.2 and TLSv1.3. For servers the B<algs> is used
155 the supported groups extension. For servers, it is used to determine which
[all …]
/freebsd/usr.sbin/nfsuserd/
H A Dnfsuserd.c100 pid_t servers[MAXNFSUSERD]; variable
293 servers[i] = (pid_t)-1; in main()
483 servers[i] = fork(); in main()
484 if (servers[i] == 0) { in main()
497 } else if (servers[i] < 0) { in main()
829 if (servers[i] != (pid_t)-1) { in cleanup_term()
831 kill(servers[i], SIGUSR1); in cleanup_term()
/freebsd/sbin/dhclient/tests/
H A Dpcp.sh83 option domain-name-servers 192.0.2.2;
164 option domain-name-servers 192.0.2.2;
/freebsd/contrib/netbsd-tests/ipf/regress/
H A Dp10.pool1 pool nat/dstlist (name servers; policy hash;)
H A Dp11.pool1 pool nat/dstlist (name servers; policy dst-hash;)
H A Dp12.pool1 pool nat/dstlist (name servers; policy src-hash;)
H A Dp7.pool1 pool nat/dstlist (name servers; policy weighted connection;)
H A Dp9.pool1 pool nat/dstlist (name servers; policy round-robin;)
/freebsd/contrib/unbound/doc/
H A Drequirements.txt31 hierarchical DNS servers that own the data and the Cache that stores
86 authoritative servers, does not perform duplicate removal.
150 servers lame. dnssec-lameness is a config error and deserves the trouble.
154 That would be most responses from servers.
204 Unbound preserves the casing received from authority servers as best
212 authority servers do not respond, then the requestlist for unbound
225 support (if the servers replies) or non-support (on a NOTIMPL or FORMERR).
244 servers several times. Unbound goes on get the full list of nameserver
281 those misconfigured domains where the servers reported by the parent
282 are the only ones working, and servers reported by the child do not.

123456789