/freebsd/libexec/bootpd/ |
H A D | bootptab.mcs | 10 # cs -- cookie servers 13 # ds -- domain name servers 20 # im -- impress servers 22 # lg -- log servers 23 # lp -- LPR servers 24 # ns -- IEN-116 name servers 26 # rl -- resource location protocol servers 34 # ts -- time servers 73 # Individual entries (could also have different servers for some/all of these
|
H A D | bootptab.cmu | 10 # cs -- cookie servers 13 # ds -- domain name servers 20 # im -- impress servers 22 # lg -- log servers 23 # lp -- LPR servers 24 # ns -- IEN-116 name servers 26 # rl -- resource location protocol servers 34 # ts -- time servers 67 # Individual entries (could also have different servers for some/all of these
|
/freebsd/lib/libradius/ |
H A D | radlib.c | 104 srvp = &h->servers[srv]; in insert_scrambled_password() 135 srvp = &h->servers[h->srv]; in insert_request_authenticator() 157 srvp = &h->servers[h->srv]; in insert_message_authenticator() 197 srvp = &h->servers[srv]; in is_valid_response() 295 srvp = &h->servers[h->srv]; in is_valid_request() 432 srvp = &h->servers[h->num_servers]; in rad_add_server_ex() 484 memset(h->servers[srv].secret, 0, in rad_close() 485 strlen(h->servers[srv].secret)); in rad_close() 486 free(h->servers[srv].secret); in rad_close() 716 if (h->servers[h->srv].num_tries >= h->servers[h->srv].max_tries) { in rad_continue_send_request() [all …]
|
/freebsd/contrib/ntp/ntpd/ |
H A D | ntpsim.c | 77 printf("%s\n", stoa(simulation.servers[i].addr)); in create_server_associations() 78 if (peer_config(simulation.servers[i].addr, in create_server_associations() 92 stoa(simulation.servers[i].addr)); in create_server_associations() 280 if (memcmp(simulation.servers[i].addr, serv_addr, in simulate_server() 282 server = &simulation.servers[i]; in simulate_server() 411 simulation.servers[i].curr_script->freq_offset += in sim_update_clocks() 412 gauss(0, time_gap * simulation.servers[i].curr_script->wander); in sim_update_clocks() 414 simulation.servers[i].server_time += time_gap * in sim_update_clocks() 415 (1 + simulation.servers[i].curr_script->freq_offset); in sim_update_clocks()
|
/freebsd/contrib/netbsd-tests/lib/librumphijack/ |
H A D | netstat.expout | 1 Active Internet connections (including servers) 4 Active Internet6 connections (including servers)
|
/freebsd/sys/dev/ofw/ |
H A D | ofw_cpu.c | 288 cell_t *servers; in ofw_cpu_attach() local 292 "ibm,ppc-interrupt-server#s", (void **)&servers)) < 0) in ofw_cpu_attach() 298 if (cpuref.cr_hwref == servers[i]) { in ofw_cpu_attach() 302 OF_prop_free(servers); in ofw_cpu_attach() 311 OF_prop_free(servers); in ofw_cpu_attach()
|
/freebsd/contrib/ntp/ |
H A D | README.leapsmear | 26 NTP servers also pass a leap second warning flag down to their clients via 96 - During the smear interval the time provided by smearing NTP servers 98 non-smearing NTP servers. The difference can be up to 1 second, depending 157 have to take care that your NTP servers support leap smearing and configure 158 those few servers accordingly. If the smear interval is long enough so that 180 exchanged with other NTP servers are based on the real UTC system time and 189 - Leap Second Smearing MUST NOT be used for public servers, e.g. servers 190 provided by metrology institutes, or servers participating in the NTP pool 192 mixture of smearing and non-smearing NTP servers which could result in 194 configured on time servers providing dedicated clients with time, if all [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | ad.c | 268 } *s, *servers = NULL; in _kadm5_ad_connect() local 295 s = realloc(servers, sizeof(*servers) * (num_servers + 1)); in _kadm5_ad_connect() 301 servers = s; in _kadm5_ad_connect() 303 servers[num_servers - 1].port = rr->u.srv->port; in _kadm5_ad_connect() 304 servers[num_servers - 1].server = strdup(rr->u.srv->target); in _kadm5_ad_connect() 318 lp = ldap_init(servers[i].server, servers[i].port); in _kadm5_ad_connect() 333 lret = ldap_tsasl_bind_s(lp, NULL, NULL, NULL, servers[i].server); in _kadm5_ad_connect() 392 free(servers[i].server); in _kadm5_ad_connect() 393 free(servers); in _kadm5_ad_connect() 399 free(servers[i].server); in _kadm5_ad_connect() [all …]
|
/freebsd/contrib/ntp/scripts/ntptrace/ |
H A D | ntptrace-opts.def | 47 the chain of NTP servers from a given host back to the primary time source. For 48 ntptrace to work properly, each of these servers must implement the NTP Control 63 synchronization distance, and (only for stratum-1 servers) the reference clock
|
/freebsd/lib/libtacplus/ |
H A D | taclib.c | 239 struct tac_server *srvp = &h->servers[h->cur_server]; in conn_server() 321 secret = h->servers[h->cur_server].secret; in crypt_msg() 392 h->single_connect = (h->servers[h->cur_server].flags & in establish_connection() 549 deadline.tv_sec += h->servers[h->cur_server].timeout; in recv_msg() 639 deadline.tv_sec += h->servers[h->cur_server].timeout; in send_msg() 698 srvp = &h->servers[h->num_servers]; in tac_add_server_av() 768 memset(h->servers[srv].secret, 0, in tac_close() 769 strlen(h->servers[srv].secret)); in tac_close() 770 free(h->servers[srv].secret); in tac_close() 1096 srvp = &h->servers[h->cur_server]; in tac_send_author() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_options.pod | 116 servers. See the B<SECURE RENEGOTIATION> section for more details. 203 Allow legacy insecure renegotiation between OpenSSL and unpatched servers 224 Normally clients and servers will transparently attempt to negotiate the 228 propose, and servers will not accept the extension. 232 Normally clients and servers will transparently attempt to negotiate the 236 not propose, and servers will not accept the extension. 396 and renegotiation between patched OpenSSL clients and unpatched servers 398 servers will fail. 401 clients that are willing to connect to servers that do not implement 406 servers should always B<set> B<SSL_OP_LEGACY_SERVER_CONNECT> [all …]
|
H A D | SSL_CONF_cmd.pod | 29 both clients and servers and the B<value> parameter is not used. The default 59 Equivalent to B<SSL_OP_CIPHER_SERVER_PREFERENCE>. Only used by servers. 63 Allows servers to accept client-initiated renegotiation. Equivalent to 65 Only used by servers. 79 Sets B<SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION>. Only used by servers. 91 Only used by servers. Requires B<-serverpref>. 107 algorithms extension. For servers it is used to determine which signature 129 authentication for TLSv1.2 and TLSv1.3. For servers the B<algs> is used 141 the supported groups extension. For servers, it is used to determine which 163 by servers. [all …]
|
/freebsd/usr.sbin/nfsuserd/ |
H A D | nfsuserd.c | 99 pid_t servers[MAXNFSUSERD]; variable 292 servers[i] = (pid_t)-1; in main() 478 servers[i] = fork(); in main() 479 if (servers[i] == 0) { in main() 492 } else if (servers[i] < 0) { in main() 820 if (servers[i] != (pid_t)-1) { in cleanup_term() 822 kill(servers[i], SIGUSR1); in cleanup_term()
|
/freebsd/contrib/unbound/doc/ |
H A D | requirements.txt | 31 hierarchical DNS servers that own the data and the Cache that stores 86 authoritative servers, does not perform duplicate removal. 150 servers lame. dnssec-lameness is a config error and deserves the trouble. 154 That would be most responses from servers. 204 Unbound preserves the casing received from authority servers as best 212 authority servers do not respond, then the requestlist for unbound 225 support (if the servers replies) or non-support (on a NOTIMPL or FORMERR). 244 servers several times. Unbound goes on get the full list of nameserver 281 those misconfigured domains where the servers reported by the parent 282 are the only ones working, and servers reported by the child do not.
|
H A D | README.DNS64 | 35 servers over IPv6 through the configured NAT64 prefix. This allows running 37 that only has IPv4 servers. Whether that Unbound instance also does DNS64 is
|
/freebsd/sbin/dhclient/tests/ |
H A D | pcp.sh | 83 option domain-name-servers 192.0.2.2; 164 option domain-name-servers 192.0.2.2;
|
/freebsd/contrib/netbsd-tests/ipf/regress/ |
H A D | p10.pool | 1 pool nat/dstlist (name servers; policy hash;)
|
H A D | p11.pool | 1 pool nat/dstlist (name servers; policy dst-hash;)
|
H A D | p12.pool | 1 pool nat/dstlist (name servers; policy src-hash;)
|
H A D | p7.pool | 1 pool nat/dstlist (name servers; policy weighted connection;)
|
H A D | p9.pool | 1 pool nat/dstlist (name servers; policy round-robin;)
|
H A D | p11.nat | 1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;
|
H A D | p12.nat | 1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;
|
H A D | p7.nat | 1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;
|
H A D | p9.nat | 1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;
|