| /netbsd-src/external/gpl3/gcc/dist/libcody/ |
| H A D | client.cc | 34 Client::Client () in Client() function in Cody::Client 39 Client::Client (Client &&src) in Client() function in Cody::Client 55 Client::~Client () in ~Client() 59 Client &Client::operator= (Client &&src) in operator =() 77 int Client::CommunicateWithServer () in CommunicateWithServer() 103 return Packet (Client::PC_ERROR, std::move (e)); in CommunicationError() 106 Packet Client::ProcessResponse (std::vector<std::string> &words, in ProcessResponse() 116 return Packet (Client::PC_ERROR, std::move (msg)); in ProcessResponse() 119 return Packet (Client::PC_ERROR, u8"missing response"); in ProcessResponse() 124 return Packet (Client::PC_ERROR, in ProcessResponse() [all …]
|
| H A D | cody.hh | 361 class Client class 388 Client (); 392 Client (Server *s) in Client() function in Cody::Client 393 : Client () in Client() 401 Client (int from, int to = -1) in Client() function in Cody::Client 402 : Client () in Client() 407 ~Client (); 409 Client (Client &&); 410 Client &operator= (Client &&);
|
| H A D | README.md | 16 * Client and Server objects 387 * `Client`: The compiler-end of a connection. Requests may be made 401 Logically the Client and the Server communicate via a sequential 425 Cody::Client *MakeClient (char const *maybe_ident) 429 auto *c = new Cody::Client (s); 432 if (t.GetCode () == Cody::Client::TC_CONNECT) 434 else if (t.GetCode () == Cody::Client::TC_ERROR) 444 Cody::Client *MakeClient () 451 auto *c = new Cody::Client (fd); 454 if (t.GetCode () == Cody::Client::TC_CONNECT) [all …]
|
| /netbsd-src/external/apache2/llvm/dist/llvm/include/llvm/ExecutionEngine/Orc/ |
| H A D | OrcRemoteTargetClient.h | 65 Client.destroyRemoteAllocator(Id); in ~RemoteRTDyldMemoryManager() 119 Client.reserveMem(Id, CodeSize, CodeAlign); in reserveAllocationSpace() 130 Client.reserveMem(Id, RODataSize, RODataAlign); in reserveAllocationSpace() 141 Client.reserveMem(Id, RWDataSize, RWDataAlign); in reserveAllocationSpace() 161 Client.deregisterEHFrames(Frame.Addr, Frame.Size); in deregisterEHFrames() 199 if (auto Err = Client.registerEHFrames(EHFrame.Addr, EHFrame.Size)) { 263 RemoteRTDyldMemoryManager(OrcRemoteTargetClient &Client, in RemoteRTDyldMemoryManager() argument 265 : Client(Client), Id(Id) { in RemoteRTDyldMemoryManager() 302 if (Client.writeMem(Alloc.getRemoteAddress(), Alloc.getLocalAddress(), in copyAndProtect() 314 if (Client.setProtections(Id, RemoteSegmentAddr, Permissions)) in copyAndProtect() [all …]
|
| /netbsd-src/external/ibm-public/postfix/dist/src/smtpd/ |
| H A D | smtpd_check_dsn.ref | 16 ./smtpd_check: mapping DSN status 4.1.1 into Client host status 4.0.0 17 …reject: CONNECT from 4.1.1_dsn[1.2.3.4]: 554 5.0.0 <4.1.1_dsn[1.2.3.4]>: Client host rejected: rej… 18 554 5.0.0 <4.1.1_dsn[1.2.3.4]>: Client host rejected: reject 20 ./smtpd_check: mapping DSN status 4.1.2 into Client host status 4.0.0 21 …reject: CONNECT from 4.1.2_dsn[1.2.3.4]: 554 5.0.0 <4.1.2_dsn[1.2.3.4]>: Client host rejected: rej… 22 554 5.0.0 <4.1.2_dsn[1.2.3.4]>: Client host rejected: reject 24 ./smtpd_check: mapping DSN status 4.1.3 into Client host status 4.0.0 25 …reject: CONNECT from 4.1.3_dsn[1.2.3.4]: 554 5.0.0 <4.1.3_dsn[1.2.3.4]>: Client host rejected: rej… 26 554 5.0.0 <4.1.3_dsn[1.2.3.4]>: Client host rejected: reject 28 ./smtpd_check: mapping DSN status 4.1.4 into Client host status 4.0.0 [all …]
|
| H A D | smtpd_check.ref2 | 20 ./smtpd_check: <queue id>: reject: CONNECT from unknown[131.155.210.17]: 450 4.7.1 Client host reje… 21 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17] 25 …domain[123.123.123.123]: 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: mat… 26 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: match bad.domain 30 …om bad.domain[123.123.123.123]: 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: mat… 31 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: match bad.domain 35 …a.win.tue.nl[131.155.210.18]: 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: mat… 36 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: match 131.155.210 47 ./smtpd_check: <queue id>: reject: HELO from unknown[131.155.210.17]: 450 4.7.1 Client host rejecte… 48 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17] [all …]
|
| H A D | smtpd_exp.ref | 33 ./smtpd_check: <queue id>: reject: RCPT from foo[127.0.0.2]: 554 5.7.1 Service unavailable; Client … 34 554 5.7.1 Service unavailable; Client host [127.0.0.2] blocked using dnsbltest.porcupine.org; DNS b… 45 ./smtpd_check: <queue id>: reject: RCPT from foo[127.0.0.2]: 554 5.7.1 Service unavailable; Client … 46 554 5.7.1 Service unavailable; Client host [127.0.0.2] blocked using dnsbltest.porcupine.org; DNS b… 52 ./smtpd_check: <queue id>: reject: RCPT from foo[127.0.0.2]: 554 5.7.1 Service unavailable; Client … 53 554 5.7.1 Service unavailable; Client host [127.0.0.2] blocked using dnsbltest.porcupine.org; DNS b… 84 …in=rhsbl.porcupine.org rbl_txt=RHSBL test rbl_what=example.tld rbl_class=Client host; from=<sname@… 85 …de=554 rbl_domain=rhsbl.porcupine.org rbl_txt=RHSBL test rbl_what=example.tld rbl_class=Client host
|
| H A D | smtpd_acl.ref | 34 …oo.dunno.com[131.155.210.17]: 554 5.7.1 <foo.dunno.com[131.155.210.17]>: Client host rejected: Acc… 35 554 5.7.1 <foo.dunno.com[131.155.210.17]>: Client host rejected: Access denied 50 … bar.duno.com[131.155.210.19]: 554 5.7.1 <bar.duno.com[131.155.210.19]>: Client host rejected: Acc… 51 554 5.7.1 <bar.duno.com[131.155.210.19]>: Client host rejected: Access denied 54 …T from bar.duno.com[44.33.22.11]: 554 5.7.1 <bar.duno.com[44.33.22.11]>: Client host rejected: Acc… 55 554 5.7.1 <bar.duno.com[44.33.22.11]>: Client host rejected: Access denied 61 …T from bar.duno.com[44.33.44.33]: 554 5.7.1 <bar.duno.com[44.33.44.33]>: Client host rejected: Acc… 62 554 5.7.1 <bar.duno.com[44.33.44.33]>: Client host rejected: Access denied
|
| H A D | smtpd_dnswl.ref | 30 …orcupine.org[168.100.3.2]: 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Acc… 31 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Access denied 55 …orcupine.org[168.100.3.2]: 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Acc… 56 554 5.7.1 <spike.porcupine.org[168.100.3.2]>: Client host rejected: Access denied
|
| H A D | smtpd_check.ref | 20 ./smtpd_check: <queue id>: reject: CONNECT from unknown[131.155.210.17]: 450 4.7.1 Client host reje… 21 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17] 25 …domain[123.123.123.123]: 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: mat… 26 554 5.7.1 <random.bad.domain[123.123.123.123]>: Client host rejected: match bad.domain 30 …om bad.domain[123.123.123.123]: 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: mat… 31 554 5.7.1 <bad.domain[123.123.123.123]>: Client host rejected: match bad.domain 35 …a.win.tue.nl[131.155.210.18]: 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: mat… 36 554 5.7.1 <aa.win.tue.nl[131.155.210.18]>: Client host rejected: match 131.155.210 47 ./smtpd_check: <queue id>: reject: HELO from unknown[131.155.210.17]: 450 4.7.1 Client host rejecte… 48 450 4.7.1 Client host rejected: cannot find your hostname, [131.155.210.17] [all …]
|
| H A D | smtpd_server.ref | 94 … spike.porcupine.org[1.2.3.4]: 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Acc… 95 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Access denied 101 … spike.porcupine.org[1.2.3.4]: 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Acc… 102 554 5.7.1 <spike.porcupine.org[1.2.3.4]>: Client host rejected: Access denied
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| H A D | 20-cert-select.conf | 37 test-32 = 32-TLS 1.2 Ed25519 Client Auth 38 test-33 = 33-TLS 1.2 Ed448 Client Auth 52 test-47 = 47-TLS 1.3 RSA Client Auth Signature Algorithm Selection 53 test-48 = 48-TLS 1.3 RSA Client Auth Signature Algorithm Selection non-empty CA Names 54 test-49 = 49-TLS 1.3 ECDSA Client Auth Signature Algorithm Selection 55 test-50 = 50-TLS 1.3 Ed25519 Client Auth 56 test-51 = 51-TLS 1.3 Ed448 Client Auth 59 test-54 = 54-TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms 1049 [32-TLS 1.2 Ed25519 Client Auth] 1050 ssl_conf = 32-TLS 1.2 Ed25519 Client Auth-ssl [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/ |
| H A D | 20-cert-select.cnf | 22 test-17 = 17-TLS 1.2 Ed25519 Client Auth 23 test-18 = 18-TLS 1.2 Ed448 Client Auth 48 test-43 = 43-TLS 1.3 RSA Client Auth Signature Algorithm Selection 49 test-44 = 44-TLS 1.3 RSA Client Auth Signature Algorithm Selection non-empty CA Names 50 test-45 = 45-TLS 1.3 ECDSA Client Auth Signature Algorithm Selection 55 test-50 = 50-TLS 1.3 Ed25519 Client Auth 56 test-51 = 51-TLS 1.3 Ed448 Client Auth 60 test-55 = 55-TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms 605 [17-TLS 1.2 Ed25519 Client Auth] 606 ssl_conf = 17-TLS 1.2 Ed25519 Client Auth-ssl [all …]
|
| H A D | 20-cert-select.cnf.in | 332 name => "TLS 1.2 Ed25519 Client Auth", 350 name => "TLS 1.2 Ed448 Client Auth", 753 name => "TLS 1.3 RSA Client Auth Signature Algorithm Selection", 769 name => "TLS 1.3 RSA Client Auth Signature Algorithm Selection non-empty CA Names", 786 name => "TLS 1.3 ECDSA Client Auth Signature Algorithm Selection", 861 name => "TLS 1.3 Ed25519 Client Auth", 879 name => "TLS 1.3 Ed448 Client Auth", 958 name => "TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms",
|
| /netbsd-src/external/apache2/llvm/dist/clang/lib/Frontend/Rewrite/ |
| H A D | FixItRewriter.cpp | 43 Client = Diags.getClient(); in FixItRewriter() 48 Diags.setClient(Client, Owner.release() != nullptr); in ~FixItRewriter() 125 return Client ? Client->IncludeInDiagnosticCounts() : true; in IncludeInDiagnosticCounts() 137 Client->HandleDiagnostic(DiagLevel, Info); in HandleDiagnostic() 203 Diags.setClient(Client, false); in Diag()
|
| /netbsd-src/external/bsd/unbound/dist/testdata/proxy_protocol.tdir/ |
| H A D | proxy_protocol.test.scenario | 108 # Client localhost 120 # Client $CLIENT_ADDR_ALLOW should be allowed 132 # Client $CLIENT_ADDR_ALLOW6 should be allowed 144 # Client $CLIENT_ADDR_REFUSE should be refused 156 # Client $CLIENT_ADDR_REFUSE6 should be refused 168 # Client $CLIENT_ADDR_ALLOW should be allowed; proxy source address should be allowed 180 # Client $CLIENT_ADDR_ALLOW should be allowed; proxy source address should be refused
|
| /netbsd-src/external/gpl3/gcc/dist/gcc/cp/ |
| H A D | mapper-client.h | 32 class module_client : public Cody::Client 40 : Client (s) in module_client() 46 : Client (fd_from, fd_to) in module_client()
|
| H A D | mapper-client.cc | 45 : Client (fd_from, fd_to), pex (p) in module_client() 318 if (connect.GetCode () == Cody::Client::PC_CONNECT) in open_module_client() 320 else if (connect.GetCode () == Cody::Client::PC_ERROR) in open_module_client() 324 if (repo.GetCode () == Cody::Client::PC_PATHNAME) in open_module_client()
|
| /netbsd-src/crypto/dist/ipsec-tools/src/racoon/rfc/ |
| H A D | draft-ietf-ipsec-isakmp-hybrid-auth-05.txt | 103 Added clarification on the content of ID payloads sent by the Client 125 Client and is based on a Transaction Exchange [IKECFG] with the 194 described in [XAUTH] is used to authenticate the Client. Even though 256 Client - Denotes both the User and the User's Device. Used whenever a 292 initiator of the Phase 1 Exchange can be either the Client or the 326 If the Client's side is not to be authenticated during the Phase 1 330 The signature payload sent by the Client SIG_I (or SIG_R) is replaced 344 the Client when computing HASH_I (HASH_R). 347 Client MUST respond with an empty certificate payload, i.e. with a 350 The ID payload sent by the Client SHOULD be left empty (i.e. with an [all …]
|
| /netbsd-src/sys/arch/evbarm/conf/ |
| H A D | OPENRD | 3 # This is a working config file for OpenRD(.org) Client. Note that the 27 # Tested on OpenRD-Client
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| H A D | krb5_err.et | 12 error_code NAME_EXP, "Client's entry in database has expired" 15 error_code C_OLD_MAST_KVNO, "Client's key is encrypted in an old master key" 17 error_code C_PRINCIPAL_UNKNOWN, "Client not found in Kerberos database" 20 error_code NULL_KEY, "Client or server has a null key" 32 error_code CLIENT_NOTYET, "Client not yet valid - try again later" 76 error_code CLIENT_NOT_TRUSTED, "Client not trusted" 96 error_code CLIENT_NAME_MISMATCH, "Client name mismatch in certificate" 153 error_code KRB5_IN_TKT_REALM_MISMATCH, "Client/server realm mismatch in initial ticket request"
|
| /netbsd-src/sys/external/gpl2/dts/dist/arch/arm/boot/dts/ |
| H A D | kirkwood-openrd-client.dts | 3 * Marvell OpenRD Client Board Description 16 model = "OpenRD Client";
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
| H A D | ntlm_err.et | 15 error_code TIME_SKEW, "Client time skewed to server" 16 error_code OEM, "Client set OEM string"
|
| /netbsd-src/external/bsd/openldap/dist/doc/rfc/ |
| H A D | rfc3928.txt | 19 Client Update Protocol (LCUP) 36 (LDAP) Client Update Protocol (LCUP). The protocol is intended to 60 RFC 3928 LDAP Client Update Protocol October 2004 104 4.4.2. Client Initiated Termination. . . . . . . . . . . 19 109 5. Client Side Considerations . . . . . . . . . . . . . . . . . . 20 116 RFC 3928 LDAP Client Update Protocol October 2004 172 RFC 3928 LDAP Client Update Protocol October 2004 228 RFC 3928 LDAP Client Update Protocol October 2004 284 RFC 3928 LDAP Client Update Protocol October 2004 340 RFC 3928 LDAP Client Update Protocol October 2004 [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/po/heim_com_err-1765328384/ |
| H A D | heim_com_err-1765328384.pot | 25 msgid "Client's entry in database has expired" 40 msgid "Client's key is encrypted in an old master key" 50 msgid "Client not found in Kerberos database" 65 msgid "Client or server has a null key" 125 msgid "Client not yet valid - try again later" 299 msgid "Client not trusted" 356 msgid "Client name mismatch in certificate" 538 msgid "Client/server realm mismatch in initial ticket request"
|