Home
last modified time | relevance | path

Searched refs:server (Results 1 – 25 of 763) sorted by relevance

12345678910>>...31

/openbsd-src/regress/usr.bin/nc/
H A DMakefile17 PROGS = client-tcp server-tcp
19 SRCS_server-tcp = server-tcp.c util.c
24 CLEANFILES = ${NC:T} {client,server}.{out,err,port,sock} ktrace.out
40 SERVER_NC = rm -f server.err; echo greeting | ${NC}
42 SERVER_BG = 2>&1 >server.out | tee server.err &
44 SERVER_LOG = >server.out 2>server.err
48 sed -E -n 's/(Listening|Bound) on .* //p' server.err >server.port
49 PORT = `cat server.port`
53 until grep -q 'Listening on ' server.err; \
58 until grep -q 'Bound on ' server.err; \
[all …]
/openbsd-src/regress/lib/libssl/unit/
H A Dssl_methods.c25 int server; member
33 .server = 1,
39 .server = 1,
45 .server = 0,
52 .server = 1,
58 .server = 1,
64 .server = 0,
71 .server = 1,
77 .server = 1,
83 .server = 0,
[all …]
/openbsd-src/usr.sbin/radiusd/
H A Dradiusd_radius.c59 struct radius_server server[4]; member
72 struct radius_server *server; member
162 if (strcmp(paramname, "server") == 0) { in module_radius_config_set()
164 "`server' must have just one argument"); in module_radius_config_set()
165 SYNTAX_ASSERT(module->nserver < (int)nitems(module->server), in module_radius_config_set()
166 "number of server reached limit"); in module_radius_config_set()
170 memcpy(&module->server[module->nserver].addr, res->ai_addr, in module_radius_config_set()
173 if (ntohs(module->server[module->nserver].addr.sin4.sin_port) in module_radius_config_set()
175 module->server[module->nserver].addr.sin4.sin_port in module_radius_config_set()
178 module->server[modul in module_radius_config_set()
339 radius_server_start(struct radius_server * server) radius_server_start() argument
390 radius_server_stop(struct radius_server * server) radius_server_stop() argument
404 struct radius_server *server = ctx; radius_server_on_event() local
472 radius_server_on_fail(struct radius_server * server,const char * failmsg) radius_server_on_fail() argument
[all...]
/openbsd-src/regress/lib/libssl/interop/netcat/
H A DMakefile11 # run netcat server and connect with test client
15 REGRESS_TARGETS += run-netcat-client-${clib}-server-nc
18 run-netcat-client-${clib}-server-nc: ../${clib}/client 127.0.0.1.crt
20 nc >${@:S/^run/server/}.out \
31 # client must have read server greeting
33 # netstat server must have read client hello
34 grep -q '^hello$$' ${@:S/^run/server/}.out
38 # run test server and connect with netcat client
42 REGRESS_TARGETS += run-netcat-client-nc-server-${slib}
44 run-netcat-client-nc-server
[all...]
/openbsd-src/regress/lib/libssl/interop/cipher/
H A DMakefile3 # Connect a client to a server. Both can be current libressl, or
5 # and pin client and server to one of the ciphers. Use server
6 # certificate with compatible type. Check that client and server
27 server-${slib}.ciphers: 127.0.0.1.crt dsa.crt ec.crt rsa.crt
29 ../${slib}/server -l ALL -L >$@.tmp
36 ciphers.mk: client-${clib}-server-${slib}.ciphers
37 client-${clib}-server-${slib}.ciphers: \
38 client-${clib}.ciphers server-${slib}.ciphers client-libressl.ciphers
39 # get ciphers shared between client and server
[all...]
/openbsd-src/regress/lib/libtls/tls/
H A Dtlstest.c107 return circular_write("server", server_buffer, sizeof(server_buffer), in client_write()
114 return circular_read("server", server_buffer, sizeof(server_buffer), in server_read()
164 server_done = do_tls_handshake("server", server_cctx); in do_client_server_handshake()
185 server_done = do_tls_close("server", server_cctx); in do_client_server_close()
215 test_tls_cbs(struct tls *client, struct tls *server) in test_tls_cbs() argument
222 if (tls_accept_cbs(server, &server_cctx, server_read, server_write, in test_tls_cbs()
224 errx(1, "failed to accept: %s", tls_error(server)); in test_tls_cbs()
238 test_tls_fds(struct tls *client, struct tls *server) in test_tls_fds() argument
249 if (tls_accept_fds(server, &server_cctx, sfds[0], cfds[1]) == -1) in test_tls_fds()
250 errx(1, "failed to accept: %s", tls_error(server)); in test_tls_fds()
268 test_tls_socket(struct tls * client,struct tls * server) test_tls_socket() argument
298 struct tls *client, *server; test_tls() local
351 struct tls *client, *server; do_tls_tests() local
413 struct tls *client = NULL, *server = NULL, *server_cctx = NULL; do_tls_ordering_tests() local
494 char *server; global() member
[all...]
/openbsd-src/regress/lib/libssl/interop/version/
H A DMakefile3 # Connect a client to a server. Both can be current libressl, or
4 # openssl 1.1 or openssl 3.0. Pin client or server to a fixed TLS
6 # and server have used correct version by grepping in their session
39 REGRESS_TARGETS += run-version-client-${clib}-${cver}-server-${slib}-${sver}
42 SLOW_TARGETS += run-version-client-${clib}-${cver}-server-${slib}-${sver}
45 run-version-client-${clib}-${cver}-server-${slib}-${sver} \
46 client-version-client-${clib}-${cver}-server-${slib}-${sver}.out \
47 server-version-client-${clib}-${cver}-server-${slib}-${sver}.out: \
48 127.0.0.1.crt ../${clib}/client ../${slib}/server
[all...]
/openbsd-src/regress/lib/libssl/interop/session/
H A DMakefile11 run-session-client-libressl-server-libressl:
18 REGRESS_TARGETS += run-session-client-${clib}-server-${slib}
20 run-session-client-${clib}-server-${slib}: \
21 127.0.0.1.crt ../${clib}/client ../${slib}/server
23 ../${slib}/server >${@:S/^run/server/}.out \
29 `sed -n 's/listen sock: //p' ${@:S/^run/server/}.out`
30 grep '^success$$' ${@:S/^run/server/}.out || \
31 { sleep 1; grep '^success$$' ${@:S/^run/server/}.out; }
33 grep '^session 2: new$$' ${@:S/^run/server/}
[all...]
/openbsd-src/gnu/llvm/lldb/docs/man/
H A Dlldb-server.rst3 lldb-server -- Server for LLDB Debugging Sessions
6 .. program:: lldb-server
11 | :program:`lldb-server` v[ersion]
12 | :program:`lldb-server` g[dbserver] [*options*]
13 | :program:`lldb-server` p[latform] [*options*]
18 :program:`lldb-server` provides the server counterpart of the LLVM debugger.
19 The server runs and monitors the debugged program, while the user interfaces
28 The first argument to lldb-server specifies a command to run.
32 Prints lldb-server version and exits.
36 Runs the server using the gdb-remote protocol. LLDB can afterwards
[all …]
/openbsd-src/regress/lib/libssl/interop/botan/
H A DMakefile39 REGRESS_TARGETS += run-client-botan-server-${lib}
41 run-client-botan-server-${lib}: client server.crt
43 ../${lib}/server >server-${lib}.out \
44 -c server.crt -k server.key \
49 `sed -n 's/listen sock: 127.0.0.1 //p' server-${lib}.out`
50 # check that the server child run successfully to the end
51 grep -q '^success$$' server
[all...]
/openbsd-src/regress/usr.bin/ssh/unittests/kex/
H A Dtest_kex.c53 run_kex(struct ssh *client, struct ssh *server) in run_kex() argument
57 while (!server->kex->done || !client->kex->done) { in run_kex()
60 if ((r = do_send_and_receive(server, client))) in run_kex()
64 if ((r = do_send_and_receive(client, server))) in run_kex()
70 ASSERT_INT_EQ(server->kex->done, 1); in run_kex()
77 struct ssh *client = NULL, *server = NULL, *server2 = NULL; in do_kex_with_key() local
100 ASSERT_INT_EQ(ssh_init(&server, 1, &kex_params), 0); in do_kex_with_key()
102 ASSERT_PTR_NE(server, NULL); in do_kex_with_key()
106 ASSERT_INT_EQ(ssh_add_hostkey(server, private), 0); in do_kex_with_key()
111 run_kex(client, server); in do_kex_with_key()
[all...]
/openbsd-src/regress/lib/libssl/shutdown/
H A Dshutdowntest.c208 do_client_server_loop(SSL *client, ssl_func client_func, SSL *server, in do_client_server_loop() argument
224 if (!server_func(server, "server", &server_done)) in do_client_server_loop()
236 do_shutdown_loop(SSL *client, SSL *server) in do_shutdown_loop() argument
253 if (!do_shutdown(server, "server", &server_done)) in do_shutdown_loop()
256 BIO_set_mem_eof_return(SSL_get_wbio(server), 0); in do_shutdown_loop()
367 SSL *client = NULL, *server = NULL; in shutdown_test() local
392 if ((server = tls_server(client_wbio, server_wbio)) == NULL) in shutdown_test()
394 if (!SSL_set_min_proto_version(server, ssl_version)) in shutdown_test()
396 if (!SSL_set_max_proto_version(server, ssl_version)) in shutdown_test()
399 if (!do_client_server_loop(client, do_connect, server, do_accept)) { in shutdown_test()
[all …]
/openbsd-src/usr.sbin/npppd/npppd/
H A Dnpppd_auth.c519 struct radserver *server; in npppd_auth_radius_reload() local
551 for (i = 0; i < countof(rad->server); i++) in npppd_auth_radius_reload()
552 memset(&rad->server[i], 0, sizeof(rad->server[0])); in npppd_auth_radius_reload()
554 TAILQ_FOREACH(server, &auth->data.radius.auth.servers, entry) { in npppd_auth_radius_reload()
555 if (i >= countof(rad->server)) in npppd_auth_radius_reload()
557 memcpy(&rad->server[i].peer, &server->address, in npppd_auth_radius_reload()
558 server->address.ss_len); in npppd_auth_radius_reload()
559 if (((struct sockaddr_in *)&rad->server[i].peer)->sin_port in npppd_auth_radius_reload()
561 ((struct sockaddr_in *)&rad->server[i].peer)->sin_port in npppd_auth_radius_reload()
563 strlcpy(rad->server[i].secret, server->secret, in npppd_auth_radius_reload()
[all …]
/openbsd-src/regress/lib/libssl/interop/
H A DMakefile.inc6 SRCS_server ?= server.c util.c
16 client-self.out server-self.out: run-self-client-server
18 run-self-client-server: client server 127.0.0.1.crt
21 ./server >server-self.out \
25 `sed -n 's/listen sock: //p' server-self.out`
27 -sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
33 grep -q '^success$$' server-self.out
35 grep -q '^<<< hello$$' server-self.out
41 {client,server}.{req,crt,key} \
47 -subj /L=OpenBSD/O=tls-regress/OU=server/CN=${@:R}/ \
[all …]
/openbsd-src/regress/lib/libssl/interop/cert/
H A DMakefile3 # Connect a client to a server. Both can be current libressl, or
4 # openssl 3.x. Create client and server certificates
6 # combinations with, without, and with wrong CA for client and server
40 REGRESS_TARGETS += run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv}
43 SLOW_TARGETS += run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv}
46 run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv}: \
47 127.0.0.1.crt ca.crt fake-ca.crt client.crt server.crt \
48 ../${clib}/client ../${slib}/server
50 ../${slib}/server >${@:S/^run/server/}
[all...]
/openbsd-src/usr.bin/whois/
H A Dwhois.c157 const char *server = in main() local
159 rval += whois(name, server, port_whois, flags); in main()
166 whois(const char *query, const char *server, const char *port, int flags) in whois() argument
179 error = getaddrinfo(server, port, &hints, &res); in whois()
184 warnx("%s: %s", server, gai_strerror(error)); in whois()
208 warn("%s: %s", server, reason); in whois()
215 (strcmp(server, "whois.denic.de") == 0 || in whois()
216 strcmp(server, "de" QNICHOST_TAIL) == 0)) in whois()
219 (strcmp(server, "whois.dk-hostmaster.dk") == 0 || in whois()
220 strcmp(server, "dk" QNICHOST_TAIL) == 0)) in whois()
[all …]
/openbsd-src/regress/lib/libcrypto/CA/
H A DMakefile55 server.key.pem: stamp-clean
57 openssl genrsa -out server.key.pem 2048
59 server.csr.pem: intermediate.cnf server.key.pem
63 -key server.key.pem -out server.csr.pem
66 server.cert.pem: intermediate.cnf intermediate.cert.pem server.csr.pem
70 -in server.csr.pem -out server.cert.pem
90 REGRESS_TARGETS += run-verify-server
92 run-verify-server: chain.pem server.cert.pem
94 openssl verify -purpose sslserver -CAfile chain.pem server.cert.pem
/openbsd-src/sbin/iked/
H A Dradius.c150 struct iked_radserver *server = ctx; in iked_radius_on_event() local
164 env = server->rs_env; in iked_radius_on_event()
165 pkt = radius_recv(server->rs_sock, 0); in iked_radius_on_event()
173 TAILQ_FOREACH(req, &server->rs_reqs, rr_entry) { in iked_radius_on_event()
185 if (radius_check_response_authenticator(pkt, server->rs_secret) != 0) { in iked_radius_on_event()
207 if (radius_check_message_authenticator(pkt, server->rs_secret) != 0) { in iked_radius_on_event()
246 server->rs_secret) == 0) { in iked_radius_on_event()
298 TAILQ_REMOVE(&server->rs_reqs, req, rr_entry); in iked_radius_on_event()
304 TAILQ_REMOVE(&server->rs_reqs, req, rr_entry); in iked_radius_on_event()
342 TAILQ_REMOVE(&server in iked_radius_request_send()
334 struct iked_radserver *server = req->rr_server; iked_radius_request_send() local
[all...]
/openbsd-src/regress/sys/nfs/
H A DMakefile15 echo /mnt/regress-nfs-server -maproot=0:0 127.0.0.1 >>/etc/exports
22 mkdir -p /mnt/regress-nfs-server
23 mount /dev/vnd0c /mnt/regress-nfs-server
31 mount -t nfs 127.0.0.1:/mnt/regress-nfs-server /mnt/regress-nfs-client
51 -rmdir /mnt/regress-nfs-server 2>/dev/null || true
57 echo -n $@ >/mnt/regress-nfs-server/read
94 ktrace -f /mnt/regress-nfs-client/netcat-server.ktrace \
95 nc -n -v -l 127.0.0.1 0 2>server.log &
98 if fgrep -q Listening server.log; then break; fi; sleep .1; done
99 fgrep Listening server.log
[all …]
/openbsd-src/lib/libssl/test/
H A Dtestssl4 key=../apps/server.pem
9 cert=../apps/server.pem
38 echo test sslv2 with server authentication
45 echo test sslv2 with both client and server authentication
52 echo test sslv3 with server authentication
58 echo test sslv3 with both client and server authentication
64 echo test sslv2/sslv3 with server authentication
70 echo test sslv2/sslv3 with both client and server authentication
76 echo test sslv2 with server authentication via BIO pair
83 echo test sslv2 with both client and server authentication via BIO pair
[all …]
/openbsd-src/usr.sbin/unbound/dnstap/
H A Ddnstap.proto25 // DNS server identity.
26 // If enabled, this is the identity string of the DNS server which generated
31 // DNS server version.
32 // If enabled, this is the version string of the DNS server which generated
70 // Policy: information about any name server operator policy
80 NS_NAME = 4; // Authoritative name server, by name
81 NS_IP = 5; // Authoritative name server, by IP address
147 // "forwarding" case where an upstream DNS server is responsible for
158 // authoritative name server, from the perspective of the authoritative
159 // name server.
[all …]
/openbsd-src/gnu/llvm/clang/tools/scan-view/share/
H A DScanView.py3 from http.server import HTTPServer, SimpleHTTPRequestHandler
103 def __init__(self, report, reporter, parameters, server): argument
106 self.server = server
115 if self.server.options.debug:
120 if self.server.options.debug:
254 if self.server.options.debug:
262 path = os.path.join(self.server.root, 'report-%s.html'%report)
271 path = posixpath.join(self.server.root, 'index.html')
322 reporter = self.server.reporters[reporterIndex]
334 self.server.config.set('ScanView', 'reporter', reporterIndex)
[all …]
/openbsd-src/regress/lib/libssl/verify/
H A Dverify.c33 int server; member
51 .server = 0,
57 .server = 1,
69 .server = 0,
75 .server = 1,
86 .server = 0,
92 .server = 1,
104 .server = 0,
110 .server = 1,
121 .server = 0,
[all …]
/openbsd-src/regress/usr.sbin/httpd/tests/
H A DMakefile73 server.req:
74 …-new -subj /L=OpenBSD/O=httpd-regress/OU=server/CN=localhost/ -nodes -newkey rsa -keyout server.ke…
79 server.crt: ca.crt server.req
80 openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in server.req -out server.crt
85 ${REGRESS_TARGETS:M*tls*} ${REGRESS_TARGETS:M*https*}: server.crt client.crt
/openbsd-src/usr.sbin/nsd/dnstap/
H A Ddnstap.proto25 // DNS server identity.
26 // If enabled, this is the identity string of the DNS server which generated
31 // DNS server version.
32 // If enabled, this is the version string of the DNS server which generated
98 // "forwarding" case where an upstream DNS server is responsible for
109 // authoritative name server, from the perspective of the authoritative
110 // name server.
114 // name server to a resolver, from the perspective of the authoritative
115 // name server.
119 // authoritative name server, from the perspective of the resolver.
[all …]

12345678910>>...31