Home
last modified time | relevance | path

Searched refs:Client (Results 1 – 25 of 198) sorted by relevance

12345678

/netbsd-src/external/gpl3/gcc/dist/libcody/
H A Dclient.cc34 Client::Client () in Client() function in Cody::Client
39 Client::Client (Client &&src) in Client() function in Cody::Client
55 Client::~Client () in ~Client()
59 Client &Client::operator= (Client &&src) in operator =()
77 int Client::CommunicateWithServer () in CommunicateWithServer()
103 return Packet (Client::PC_ERROR, std::move (e)); in CommunicationError()
106 Packet Client::ProcessResponse (std::vector<std::string> &words, in ProcessResponse()
116 return Packet (Client::PC_ERROR, std::move (msg)); in ProcessResponse()
119 return Packet (Client::PC_ERROR, u8"missing response"); in ProcessResponse()
124 return Packet (Client::PC_ERROR, in ProcessResponse()
[all …]
H A Dcody.hh361 class Client class
388 Client ();
392 Client (Server *s) in Client() function in Cody::Client
393 : Client () in Client()
401 Client (int from, int to = -1) in Client() function in Cody::Client
402 : Client () in Client()
407 ~Client ();
409 Client (Client &&);
410 Client &operator= (Client &&);
H A DREADME.md16 * Client and Server objects
387 * `Client`: The compiler-end of a connection. Requests may be made
401 Logically the Client and the Server communicate via a sequential
425 Cody::Client *MakeClient (char const *maybe_ident)
429 auto *c = new Cody::Client (s);
432 if (t.GetCode () == Cody::Client::TC_CONNECT)
434 else if (t.GetCode () == Cody::Client::TC_ERROR)
444 Cody::Client *MakeClient ()
451 auto *c = new Cody::Client (fd);
454 if (t.GetCode () == Cody::Client::TC_CONNECT)
[all …]
/netbsd-src/external/apache2/llvm/dist/llvm/include/llvm/ExecutionEngine/Orc/
H A DOrcRemoteTargetClient.h65 Client.destroyRemoteAllocator(Id); in ~RemoteRTDyldMemoryManager()
119 Client.reserveMem(Id, CodeSize, CodeAlign); in reserveAllocationSpace()
130 Client.reserveMem(Id, RODataSize, RODataAlign); in reserveAllocationSpace()
141 Client.reserveMem(Id, RWDataSize, RWDataAlign); in reserveAllocationSpace()
161 Client.deregisterEHFrames(Frame.Addr, Frame.Size); in deregisterEHFrames()
199 if (auto Err = Client.registerEHFrames(EHFrame.Addr, EHFrame.Size)) {
263 RemoteRTDyldMemoryManager(OrcRemoteTargetClient &Client, in RemoteRTDyldMemoryManager() argument
265 : Client(Client), Id(Id) { in RemoteRTDyldMemoryManager()
302 if (Client.writeMem(Alloc.getRemoteAddress(), Alloc.getLocalAddress(), in copyAndProtect()
314 if (Client.setProtections(Id, RemoteSegmentAddr, Permissions)) in copyAndProtect()
[all …]
/netbsd-src/external/ibm-public/postfix/dist/src/smtpd/
H A Dsmtpd_check_dsn.ref16 ./smtpd_check: mapping DSN status 4.1.1 into Client host status 4.0.0
17 …reject: CONNECT from 4.1.1_dsn[1.2.3.4]: 554 5.0.0 <4.1.1_dsn[1.2.3.4]>: Client host rejected: rej…
18 554 5.0.0 <4.1.1_dsn[1.2.3.4]>: Client host rejected: reject
20 ./smtpd_check: mapping DSN status 4.1.2 into Client host status 4.0.0
21 …reject: CONNECT from 4.1.2_dsn[1.2.3.4]: 554 5.0.0 <4.1.2_dsn[1.2.3.4]>: Client host rejected: rej…
22 554 5.0.0 <4.1.2_dsn[1.2.3.4]>: Client host rejected: reject
24 ./smtpd_check: mapping DSN status 4.1.3 into Client host status 4.0.0
25 …reject: CONNECT from 4.1.3_dsn[1.2.3.4]: 554 5.0.0 <4.1.3_dsn[1.2.3.4]>: Client host rejected: rej…
26 554 5.0.0 <4.1.3_dsn[1.2.3.4]>: Client host rejected: reject
28 ./smtpd_check: mapping DSN status 4.1.4 into Client host status 4.0.0
[all …]
H A Dsmtpd_check.ref220 ./smtpd_check: <queue id>: reject: CONNECT from unknown[131.155.210.17]: 450 4.7.1 Client host reje…
21 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17]
25 …domain[123.123.123.123]: 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: mat…
26 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: match bad.domain
30 …om bad.domain[123.123.123.123]: 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: mat…
31 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: match bad.domain
35 …a.win.tue.nl[131.155.210.18]: 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: mat…
36 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: match 131.155.210
47 ./smtpd_check: <queue id>: reject: HELO from unknown[131.155.210.17]: 450 4.7.1 Client host rejecte…
48 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17]
[all …]
H A Dsmtpd_exp.ref33 ./smtpd_check: <queue id>: reject: RCPT from foo[127.0.0.2]: 554 5.7.1 Service unavailable; Client
34 554 5.7.1 Service unavailable; Client host [127.0.0.2] blocked using dnsbltest.porcupine.org; DNS b…
45 ./smtpd_check: <queue id>: reject: RCPT from foo[127.0.0.2]: 554 5.7.1 Service unavailable; Client
46 554 5.7.1 Service unavailable; Client host [127.0.0.2] blocked using dnsbltest.porcupine.org; DNS b…
52 ./smtpd_check: <queue id>: reject: RCPT from foo[127.0.0.2]: 554 5.7.1 Service unavailable; Client
53 554 5.7.1 Service unavailable; Client host [127.0.0.2] blocked using dnsbltest.porcupine.org; DNS b…
84 …in=rhsbl.porcupine.org rbl_txt=RHSBL test rbl_what=example.tld rbl_class=Client host; from=<sname@…
85 …de=554 rbl_domain=rhsbl.porcupine.org rbl_txt=RHSBL test rbl_what=example.tld rbl_class=Client host
H A Dsmtpd_acl.ref34 …oo.dunno.com[131.155.210.17]: 554 5.7.1 <foo.dunno.com[131.155.210.17]>: Client host rejected: Acc…
35 554 5.7.1 <foo.dunno.com[131.155.210.17]>: Client host rejected: Access denied
50 … bar.duno.com[131.155.210.19]: 554 5.7.1 <bar.duno.com[131.155.210.19]>: Client host rejected: Acc…
51 554 5.7.1 <bar.duno.com[131.155.210.19]>: Client host rejected: Access denied
54 …T from bar.duno.com[44.33.22.11]: 554 5.7.1 <bar.duno.com[44.33.22.11]>: Client host rejected: Acc…
55 554 5.7.1 <bar.duno.com[44.33.22.11]>: Client host rejected: Access denied
61 …T from bar.duno.com[44.33.44.33]: 554 5.7.1 <bar.duno.com[44.33.44.33]>: Client host rejected: Acc…
62 554 5.7.1 <bar.duno.com[44.33.44.33]>: Client host rejected: Access denied
H A Dsmtpd_dnswl.ref30 …orcupine.org[168.100.3.2]: 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Acc…
31 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Access denied
55 …orcupine.org[168.100.3.2]: 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Acc…
56 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Access denied
H A Dsmtpd_check.ref20 ./smtpd_check: <queue id>: reject: CONNECT from unknown[131.155.210.17]: 450 4.7.1 Client host reje…
21 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17]
25 …domain[123.123.123.123]: 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: mat…
26 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: match bad.domain
30 …om bad.domain[123.123.123.123]: 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: mat…
31 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: match bad.domain
35 …a.win.tue.nl[131.155.210.18]: 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: mat…
36 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: match 131.155.210
47 ./smtpd_check: <queue id>: reject: HELO from unknown[131.155.210.17]: 450 4.7.1 Client host rejecte…
48 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17]
[all …]
H A Dsmtpd_server.ref94 … spike.porcupine.org[1.2.3.4]: 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Acc…
95 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Access denied
101 … spike.porcupine.org[1.2.3.4]: 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Acc…
102 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Access denied
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
H A D20-cert-select.conf37 test-32 = 32-TLS 1.2 Ed25519 Client Auth
38 test-33 = 33-TLS 1.2 Ed448 Client Auth
52 test-47 = 47-TLS 1.3 RSA Client Auth Signature Algorithm Selection
53 test-48 = 48-TLS 1.3 RSA Client Auth Signature Algorithm Selection non-empty CA Names
54 test-49 = 49-TLS 1.3 ECDSA Client Auth Signature Algorithm Selection
55 test-50 = 50-TLS 1.3 Ed25519 Client Auth
56 test-51 = 51-TLS 1.3 Ed448 Client Auth
59 test-54 = 54-TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms
1049 [32-TLS 1.2 Ed25519 Client Auth]
1050 ssl_conf = 32-TLS 1.2 Ed25519 Client Auth-ssl
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/
H A D20-cert-select.cnf22 test-17 = 17-TLS 1.2 Ed25519 Client Auth
23 test-18 = 18-TLS 1.2 Ed448 Client Auth
48 test-43 = 43-TLS 1.3 RSA Client Auth Signature Algorithm Selection
49 test-44 = 44-TLS 1.3 RSA Client Auth Signature Algorithm Selection non-empty CA Names
50 test-45 = 45-TLS 1.3 ECDSA Client Auth Signature Algorithm Selection
55 test-50 = 50-TLS 1.3 Ed25519 Client Auth
56 test-51 = 51-TLS 1.3 Ed448 Client Auth
60 test-55 = 55-TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms
605 [17-TLS 1.2 Ed25519 Client Auth]
606 ssl_conf = 17-TLS 1.2 Ed25519 Client Auth-ssl
[all …]
H A D20-cert-select.cnf.in332 name => "TLS 1.2 Ed25519 Client Auth",
350 name => "TLS 1.2 Ed448 Client Auth",
753 name => "TLS 1.3 RSA Client Auth Signature Algorithm Selection",
769 name => "TLS 1.3 RSA Client Auth Signature Algorithm Selection non-empty CA Names",
786 name => "TLS 1.3 ECDSA Client Auth Signature Algorithm Selection",
861 name => "TLS 1.3 Ed25519 Client Auth",
879 name => "TLS 1.3 Ed448 Client Auth",
958 name => "TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms",
/netbsd-src/external/apache2/llvm/dist/clang/lib/Frontend/Rewrite/
H A DFixItRewriter.cpp43 Client = Diags.getClient(); in FixItRewriter()
48 Diags.setClient(Client, Owner.release() != nullptr); in ~FixItRewriter()
125 return Client ? Client->IncludeInDiagnosticCounts() : true; in IncludeInDiagnosticCounts()
137 Client->HandleDiagnostic(DiagLevel, Info); in HandleDiagnostic()
203 Diags.setClient(Client, false); in Diag()
/netbsd-src/external/bsd/unbound/dist/testdata/proxy_protocol.tdir/
H A Dproxy_protocol.test.scenario108 # Client localhost
120 # Client $CLIENT_ADDR_ALLOW should be allowed
132 # Client $CLIENT_ADDR_ALLOW6 should be allowed
144 # Client $CLIENT_ADDR_REFUSE should be refused
156 # Client $CLIENT_ADDR_REFUSE6 should be refused
168 # Client $CLIENT_ADDR_ALLOW should be allowed; proxy source address should be allowed
180 # Client $CLIENT_ADDR_ALLOW should be allowed; proxy source address should be refused
/netbsd-src/external/gpl3/gcc/dist/gcc/cp/
H A Dmapper-client.h32 class module_client : public Cody::Client
40 : Client (s) in module_client()
46 : Client (fd_from, fd_to) in module_client()
H A Dmapper-client.cc45 : Client (fd_from, fd_to), pex (p) in module_client()
318 if (connect.GetCode () == Cody::Client::PC_CONNECT) in open_module_client()
320 else if (connect.GetCode () == Cody::Client::PC_ERROR) in open_module_client()
324 if (repo.GetCode () == Cody::Client::PC_PATHNAME) in open_module_client()
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/rfc/
H A Ddraft-ietf-ipsec-isakmp-hybrid-auth-05.txt103 Added clarification on the content of ID payloads sent by the Client
125 Client and is based on a Transaction Exchange [IKECFG] with the
194 described in [XAUTH] is used to authenticate the Client. Even though
256 Client - Denotes both the User and the User's Device. Used whenever a
292 initiator of the Phase 1 Exchange can be either the Client or the
326 If the Client's side is not to be authenticated during the Phase 1
330 The signature payload sent by the Client SIG_I (or SIG_R) is replaced
344 the Client when computing HASH_I (HASH_R).
347 Client MUST respond with an empty certificate payload, i.e. with a
350 The ID payload sent by the Client SHOULD be left empty (i.e. with an
[all …]
/netbsd-src/sys/arch/evbarm/conf/
H A DOPENRD3 # This is a working config file for OpenRD(.org) Client. Note that the
27 # Tested on OpenRD-Client
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dkrb5_err.et12 error_code NAME_EXP, "Client's entry in database has expired"
15 error_code C_OLD_MAST_KVNO, "Client's key is encrypted in an old master key"
17 error_code C_PRINCIPAL_UNKNOWN, "Client not found in Kerberos database"
20 error_code NULL_KEY, "Client or server has a null key"
32 error_code CLIENT_NOTYET, "Client not yet valid - try again later"
76 error_code CLIENT_NOT_TRUSTED, "Client not trusted"
96 error_code CLIENT_NAME_MISMATCH, "Client name mismatch in certificate"
153 error_code KRB5_IN_TKT_REALM_MISMATCH, "Client/server realm mismatch in initial ticket request"
/netbsd-src/sys/external/gpl2/dts/dist/arch/arm/boot/dts/
H A Dkirkwood-openrd-client.dts3 * Marvell OpenRD Client Board Description
16 model = "OpenRD Client";
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/ntlm/
H A Dntlm_err.et15 error_code TIME_SKEW, "Client time skewed to server"
16 error_code OEM, "Client set OEM string"
/netbsd-src/external/bsd/openldap/dist/doc/rfc/
H A Drfc3928.txt19 Client Update Protocol (LCUP)
36 (LDAP) Client Update Protocol (LCUP). The protocol is intended to
60 RFC 3928 LDAP Client Update Protocol October 2004
104 4.4.2. Client Initiated Termination. . . . . . . . . . . 19
109 5. Client Side Considerations . . . . . . . . . . . . . . . . . . 20
116 RFC 3928 LDAP Client Update Protocol October 2004
172 RFC 3928 LDAP Client Update Protocol October 2004
228 RFC 3928 LDAP Client Update Protocol October 2004
284 RFC 3928 LDAP Client Update Protocol October 2004
340 RFC 3928 LDAP Client Update Protocol October 2004
[all …]
/netbsd-src/crypto/external/bsd/heimdal/dist/po/heim_com_err-1765328384/
H A Dheim_com_err-1765328384.pot25 msgid "Client's entry in database has expired"
40 msgid "Client's key is encrypted in an old master key"
50 msgid "Client not found in Kerberos database"
65 msgid "Client or server has a null key"
125 msgid "Client not yet valid - try again later"
299 msgid "Client not trusted"
356 msgid "Client name mismatch in certificate"
538 msgid "Client/server realm mismatch in initial ticket request"

12345678