Home
last modified time | relevance | path

Searched refs:servers (Results 1 – 25 of 182) sorted by relevance

12345678

/freebsd/libexec/bootpd/
H A Dbootptab.mcs10 # cs -- cookie servers
13 # ds -- domain name servers
20 # im -- impress servers
22 # lg -- log servers
23 # lp -- LPR servers
24 # ns -- IEN-116 name servers
26 # rl -- resource location protocol servers
34 # ts -- time servers
73 # Individual entries (could also have different servers for some/all of these
H A Dbootptab.cmu10 # cs -- cookie servers
13 # ds -- domain name servers
20 # im -- impress servers
22 # lg -- log servers
23 # lp -- LPR servers
24 # ns -- IEN-116 name servers
26 # rl -- resource location protocol servers
34 # ts -- time servers
67 # Individual entries (could also have different servers for some/all of these
/freebsd/lib/libradius/
H A Dradlib.c104 srvp = &h->servers[srv]; in insert_scrambled_password()
135 srvp = &h->servers[h->srv]; in insert_request_authenticator()
157 srvp = &h->servers[h->srv]; in insert_message_authenticator()
197 srvp = &h->servers[srv]; in is_valid_response()
295 srvp = &h->servers[h->srv]; in is_valid_request()
432 srvp = &h->servers[h->num_servers]; in rad_add_server_ex()
484 memset(h->servers[srv].secret, 0, in rad_close()
485 strlen(h->servers[srv].secret)); in rad_close()
486 free(h->servers[srv].secret); in rad_close()
716 if (h->servers[h->srv].num_tries >= h->servers[h->srv].max_tries) { in rad_continue_send_request()
[all …]
/freebsd/contrib/ntp/ntpd/
H A Dntpsim.c77 printf("%s\n", stoa(simulation.servers[i].addr)); in create_server_associations()
78 if (peer_config(simulation.servers[i].addr, in create_server_associations()
92 stoa(simulation.servers[i].addr)); in create_server_associations()
280 if (memcmp(simulation.servers[i].addr, serv_addr, in simulate_server()
282 server = &simulation.servers[i]; in simulate_server()
411 simulation.servers[i].curr_script->freq_offset += in sim_update_clocks()
412 gauss(0, time_gap * simulation.servers[i].curr_script->wander); in sim_update_clocks()
414 simulation.servers[i].server_time += time_gap * in sim_update_clocks()
415 (1 + simulation.servers[i].curr_script->freq_offset); in sim_update_clocks()
/freebsd/contrib/netbsd-tests/lib/librumphijack/
H A Dnetstat.expout1 Active Internet connections (including servers)
4 Active Internet6 connections (including servers)
/freebsd/sys/dev/ofw/
H A Dofw_cpu.c288 cell_t *servers; in ofw_cpu_attach() local
292 "ibm,ppc-interrupt-server#s", (void **)&servers)) < 0) in ofw_cpu_attach()
298 if (cpuref.cr_hwref == servers[i]) { in ofw_cpu_attach()
302 OF_prop_free(servers); in ofw_cpu_attach()
311 OF_prop_free(servers); in ofw_cpu_attach()
/freebsd/contrib/ntp/
H A DREADME.leapsmear26 NTP servers also pass a leap second warning flag down to their clients via
96 - During the smear interval the time provided by smearing NTP servers
98 non-smearing NTP servers. The difference can be up to 1 second, depending
157 have to take care that your NTP servers support leap smearing and configure
158 those few servers accordingly. If the smear interval is long enough so that
180 exchanged with other NTP servers are based on the real UTC system time and
189 - Leap Second Smearing MUST NOT be used for public servers, e.g. servers
190 provided by metrology institutes, or servers participating in the NTP pool
192 mixture of smearing and non-smearing NTP servers which could result in
194 configured on time servers providing dedicated clients with time, if all
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dad.c268 } *s, *servers = NULL; in _kadm5_ad_connect() local
295 s = realloc(servers, sizeof(*servers) * (num_servers + 1)); in _kadm5_ad_connect()
301 servers = s; in _kadm5_ad_connect()
303 servers[num_servers - 1].port = rr->u.srv->port; in _kadm5_ad_connect()
304 servers[num_servers - 1].server = strdup(rr->u.srv->target); in _kadm5_ad_connect()
318 lp = ldap_init(servers[i].server, servers[i].port); in _kadm5_ad_connect()
333 lret = ldap_tsasl_bind_s(lp, NULL, NULL, NULL, servers[i].server); in _kadm5_ad_connect()
392 free(servers[i].server); in _kadm5_ad_connect()
393 free(servers); in _kadm5_ad_connect()
399 free(servers[i].server); in _kadm5_ad_connect()
[all …]
/freebsd/contrib/ntp/scripts/ntptrace/
H A Dntptrace-opts.def47 the chain of NTP servers from a given host back to the primary time source. For
48 ntptrace to work properly, each of these servers must implement the NTP Control
63 synchronization distance, and (only for stratum-1 servers) the reference clock
/freebsd/lib/libtacplus/
H A Dtaclib.c239 struct tac_server *srvp = &h->servers[h->cur_server]; in conn_server()
321 secret = h->servers[h->cur_server].secret; in crypt_msg()
392 h->single_connect = (h->servers[h->cur_server].flags & in establish_connection()
549 deadline.tv_sec += h->servers[h->cur_server].timeout; in recv_msg()
639 deadline.tv_sec += h->servers[h->cur_server].timeout; in send_msg()
698 srvp = &h->servers[h->num_servers]; in tac_add_server_av()
768 memset(h->servers[srv].secret, 0, in tac_close()
769 strlen(h->servers[srv].secret)); in tac_close()
770 free(h->servers[srv].secret); in tac_close()
1096 srvp = &h->servers[h->cur_server]; in tac_send_author()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_options.pod116 servers. See the B<SECURE RENEGOTIATION> section for more details.
203 Allow legacy insecure renegotiation between OpenSSL and unpatched servers
224 Normally clients and servers will transparently attempt to negotiate the
228 propose, and servers will not accept the extension.
232 Normally clients and servers will transparently attempt to negotiate the
236 not propose, and servers will not accept the extension.
396 and renegotiation between patched OpenSSL clients and unpatched servers
398 servers will fail.
401 clients that are willing to connect to servers that do not implement
406 servers should always B<set> B<SSL_OP_LEGACY_SERVER_CONNECT>
[all …]
H A DSSL_CONF_cmd.pod29 both clients and servers and the B<value> parameter is not used. The default
59 Equivalent to B<SSL_OP_CIPHER_SERVER_PREFERENCE>. Only used by servers.
63 Allows servers to accept client-initiated renegotiation. Equivalent to
65 Only used by servers.
79 Sets B<SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION>. Only used by servers.
91 Only used by servers. Requires B<-serverpref>.
107 algorithms extension. For servers it is used to determine which signature
129 authentication for TLSv1.2 and TLSv1.3. For servers the B<algs> is used
141 the supported groups extension. For servers, it is used to determine which
163 by servers.
[all …]
/freebsd/usr.sbin/nfsuserd/
H A Dnfsuserd.c99 pid_t servers[MAXNFSUSERD]; variable
292 servers[i] = (pid_t)-1; in main()
478 servers[i] = fork(); in main()
479 if (servers[i] == 0) { in main()
492 } else if (servers[i] < 0) { in main()
820 if (servers[i] != (pid_t)-1) { in cleanup_term()
822 kill(servers[i], SIGUSR1); in cleanup_term()
/freebsd/contrib/unbound/doc/
H A Drequirements.txt31 hierarchical DNS servers that own the data and the Cache that stores
86 authoritative servers, does not perform duplicate removal.
150 servers lame. dnssec-lameness is a config error and deserves the trouble.
154 That would be most responses from servers.
204 Unbound preserves the casing received from authority servers as best
212 authority servers do not respond, then the requestlist for unbound
225 support (if the servers replies) or non-support (on a NOTIMPL or FORMERR).
244 servers several times. Unbound goes on get the full list of nameserver
281 those misconfigured domains where the servers reported by the parent
282 are the only ones working, and servers reported by the child do not.
H A DREADME.DNS6435 servers over IPv6 through the configured NAT64 prefix. This allows running
37 that only has IPv4 servers. Whether that Unbound instance also does DNS64 is
/freebsd/sbin/dhclient/tests/
H A Dpcp.sh83 option domain-name-servers 192.0.2.2;
164 option domain-name-servers 192.0.2.2;
/freebsd/contrib/netbsd-tests/ipf/regress/
H A Dp10.pool1 pool nat/dstlist (name servers; policy hash;)
H A Dp11.pool1 pool nat/dstlist (name servers; policy dst-hash;)
H A Dp12.pool1 pool nat/dstlist (name servers; policy src-hash;)
H A Dp7.pool1 pool nat/dstlist (name servers; policy weighted connection;)
H A Dp9.pool1 pool nat/dstlist (name servers; policy round-robin;)
H A Dp11.nat1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;
H A Dp12.nat1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;
H A Dp7.nat1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;
H A Dp9.nat1 rewrite in on bge0 proto tcp from any to any port = 80 -> src 0/0 dst dstlist/servers;

12345678