| /openbsd-src/regress/usr.bin/nc/ |
| H A D | Makefile | 17 PROGS = client-tcp server-tcp 19 SRCS_server-tcp = server-tcp.c util.c 24 CLEANFILES = ${NC:T} {client,server}.{out,err,port,sock} ktrace.out 40 SERVER_NC = rm -f server.err; echo greeting | ${NC} 42 SERVER_BG = 2>&1 >server.out | tee server.err & 44 SERVER_LOG = >server.out 2>server.err 48 sed -E -n 's/(Listening|Bound) on .* //p' server.err >server.port 49 PORT = `cat server.port` 53 until grep -q 'Listening on ' server.err; \ 58 until grep -q 'Bound on ' server.err; \ [all …]
|
| /openbsd-src/regress/lib/libssl/unit/ |
| H A D | ssl_methods.c | 25 int server; member 33 .server = 1, 39 .server = 1, 45 .server = 0, 52 .server = 1, 58 .server = 1, 64 .server = 0, 71 .server = 1, 77 .server = 1, 83 .server = 0, [all …]
|
| /openbsd-src/usr.sbin/radiusd/ |
| H A D | radiusd_radius.c | 59 struct radius_server server[4]; member 72 struct radius_server *server; member 162 if (strcmp(paramname, "server") == 0) { in module_radius_config_set() 164 "`server' must have just one argument"); in module_radius_config_set() 165 SYNTAX_ASSERT(module->nserver < (int)nitems(module->server), in module_radius_config_set() 166 "number of server reached limit"); in module_radius_config_set() 170 memcpy(&module->server[module->nserver].addr, res->ai_addr, in module_radius_config_set() 173 if (ntohs(module->server[module->nserver].addr.sin4.sin_port) in module_radius_config_set() 175 module->server[module->nserver].addr.sin4.sin_port in module_radius_config_set() 178 module->server[modul in module_radius_config_set() 339 radius_server_start(struct radius_server * server) radius_server_start() argument 390 radius_server_stop(struct radius_server * server) radius_server_stop() argument 404 struct radius_server *server = ctx; radius_server_on_event() local 472 radius_server_on_fail(struct radius_server * server,const char * failmsg) radius_server_on_fail() argument [all...] |
| /openbsd-src/regress/lib/libssl/interop/netcat/ |
| H A D | Makefile | 11 # run netcat server and connect with test client 15 REGRESS_TARGETS += run-netcat-client-${clib}-server-nc 18 run-netcat-client-${clib}-server-nc: ../${clib}/client 127.0.0.1.crt 20 nc >${@:S/^run/server/}.out \ 31 # client must have read server greeting 33 # netstat server must have read client hello 34 grep -q '^hello$$' ${@:S/^run/server/}.out 38 # run test server and connect with netcat client 42 REGRESS_TARGETS += run-netcat-client-nc-server-${slib} 44 run-netcat-client-nc-server [all...] |
| /openbsd-src/regress/lib/libssl/interop/cipher/ |
| H A D | Makefile | 3 # Connect a client to a server. Both can be current libressl, or 5 # and pin client and server to one of the ciphers. Use server 6 # certificate with compatible type. Check that client and server 27 server-${slib}.ciphers: 127.0.0.1.crt dsa.crt ec.crt rsa.crt 29 ../${slib}/server -l ALL -L >$@.tmp 36 ciphers.mk: client-${clib}-server-${slib}.ciphers 37 client-${clib}-server-${slib}.ciphers: \ 38 client-${clib}.ciphers server-${slib}.ciphers client-libressl.ciphers 39 # get ciphers shared between client and server [all...] |
| /openbsd-src/regress/lib/libtls/tls/ |
| H A D | tlstest.c | 107 return circular_write("server", server_buffer, sizeof(server_buffer), in client_write() 114 return circular_read("server", server_buffer, sizeof(server_buffer), in server_read() 164 server_done = do_tls_handshake("server", server_cctx); in do_client_server_handshake() 185 server_done = do_tls_close("server", server_cctx); in do_client_server_close() 215 test_tls_cbs(struct tls *client, struct tls *server) in test_tls_cbs() argument 222 if (tls_accept_cbs(server, &server_cctx, server_read, server_write, in test_tls_cbs() 224 errx(1, "failed to accept: %s", tls_error(server)); in test_tls_cbs() 238 test_tls_fds(struct tls *client, struct tls *server) in test_tls_fds() argument 249 if (tls_accept_fds(server, &server_cctx, sfds[0], cfds[1]) == -1) in test_tls_fds() 250 errx(1, "failed to accept: %s", tls_error(server)); in test_tls_fds() 268 test_tls_socket(struct tls * client,struct tls * server) test_tls_socket() argument 298 struct tls *client, *server; test_tls() local 351 struct tls *client, *server; do_tls_tests() local 413 struct tls *client = NULL, *server = NULL, *server_cctx = NULL; do_tls_ordering_tests() local 494 char *server; global() member [all...] |
| /openbsd-src/regress/lib/libssl/interop/version/ |
| H A D | Makefile | 3 # Connect a client to a server. Both can be current libressl, or 4 # openssl 1.1 or openssl 3.0. Pin client or server to a fixed TLS 6 # and server have used correct version by grepping in their session 39 REGRESS_TARGETS += run-version-client-${clib}-${cver}-server-${slib}-${sver} 42 SLOW_TARGETS += run-version-client-${clib}-${cver}-server-${slib}-${sver} 45 run-version-client-${clib}-${cver}-server-${slib}-${sver} \ 46 client-version-client-${clib}-${cver}-server-${slib}-${sver}.out \ 47 server-version-client-${clib}-${cver}-server-${slib}-${sver}.out: \ 48 127.0.0.1.crt ../${clib}/client ../${slib}/server [all...] |
| /openbsd-src/regress/lib/libssl/interop/session/ |
| H A D | Makefile | 11 run-session-client-libressl-server-libressl: 18 REGRESS_TARGETS += run-session-client-${clib}-server-${slib} 20 run-session-client-${clib}-server-${slib}: \ 21 127.0.0.1.crt ../${clib}/client ../${slib}/server 23 ../${slib}/server >${@:S/^run/server/}.out \ 29 `sed -n 's/listen sock: //p' ${@:S/^run/server/}.out` 30 grep '^success$$' ${@:S/^run/server/}.out || \ 31 { sleep 1; grep '^success$$' ${@:S/^run/server/}.out; } 33 grep '^session 2: new$$' ${@:S/^run/server/} [all...] |
| /openbsd-src/gnu/llvm/lldb/docs/man/ |
| H A D | lldb-server.rst | 3 lldb-server -- Server for LLDB Debugging Sessions 6 .. program:: lldb-server 11 | :program:`lldb-server` v[ersion] 12 | :program:`lldb-server` g[dbserver] [*options*] 13 | :program:`lldb-server` p[latform] [*options*] 18 :program:`lldb-server` provides the server counterpart of the LLVM debugger. 19 The server runs and monitors the debugged program, while the user interfaces 28 The first argument to lldb-server specifies a command to run. 32 Prints lldb-server version and exits. 36 Runs the server using the gdb-remote protocol. LLDB can afterwards [all …]
|
| /openbsd-src/regress/lib/libssl/interop/botan/ |
| H A D | Makefile | 39 REGRESS_TARGETS += run-client-botan-server-${lib} 41 run-client-botan-server-${lib}: client server.crt 43 ../${lib}/server >server-${lib}.out \ 44 -c server.crt -k server.key \ 49 `sed -n 's/listen sock: 127.0.0.1 //p' server-${lib}.out` 50 # check that the server child run successfully to the end 51 grep -q '^success$$' server [all...] |
| /openbsd-src/regress/usr.bin/ssh/unittests/kex/ |
| H A D | test_kex.c | 53 run_kex(struct ssh *client, struct ssh *server) in run_kex() argument 57 while (!server->kex->done || !client->kex->done) { in run_kex() 60 if ((r = do_send_and_receive(server, client))) in run_kex() 64 if ((r = do_send_and_receive(client, server))) in run_kex() 70 ASSERT_INT_EQ(server->kex->done, 1); in run_kex() 77 struct ssh *client = NULL, *server = NULL, *server2 = NULL; in do_kex_with_key() local 100 ASSERT_INT_EQ(ssh_init(&server, 1, &kex_params), 0); in do_kex_with_key() 102 ASSERT_PTR_NE(server, NULL); in do_kex_with_key() 106 ASSERT_INT_EQ(ssh_add_hostkey(server, private), 0); in do_kex_with_key() 111 run_kex(client, server); in do_kex_with_key() [all...] |
| /openbsd-src/regress/lib/libssl/shutdown/ |
| H A D | shutdowntest.c | 208 do_client_server_loop(SSL *client, ssl_func client_func, SSL *server, in do_client_server_loop() argument 224 if (!server_func(server, "server", &server_done)) in do_client_server_loop() 236 do_shutdown_loop(SSL *client, SSL *server) in do_shutdown_loop() argument 253 if (!do_shutdown(server, "server", &server_done)) in do_shutdown_loop() 256 BIO_set_mem_eof_return(SSL_get_wbio(server), 0); in do_shutdown_loop() 367 SSL *client = NULL, *server = NULL; in shutdown_test() local 392 if ((server = tls_server(client_wbio, server_wbio)) == NULL) in shutdown_test() 394 if (!SSL_set_min_proto_version(server, ssl_version)) in shutdown_test() 396 if (!SSL_set_max_proto_version(server, ssl_version)) in shutdown_test() 399 if (!do_client_server_loop(client, do_connect, server, do_accept)) { in shutdown_test() [all …]
|
| /openbsd-src/usr.sbin/npppd/npppd/ |
| H A D | npppd_auth.c | 519 struct radserver *server; in npppd_auth_radius_reload() local 551 for (i = 0; i < countof(rad->server); i++) in npppd_auth_radius_reload() 552 memset(&rad->server[i], 0, sizeof(rad->server[0])); in npppd_auth_radius_reload() 554 TAILQ_FOREACH(server, &auth->data.radius.auth.servers, entry) { in npppd_auth_radius_reload() 555 if (i >= countof(rad->server)) in npppd_auth_radius_reload() 557 memcpy(&rad->server[i].peer, &server->address, in npppd_auth_radius_reload() 558 server->address.ss_len); in npppd_auth_radius_reload() 559 if (((struct sockaddr_in *)&rad->server[i].peer)->sin_port in npppd_auth_radius_reload() 561 ((struct sockaddr_in *)&rad->server[i].peer)->sin_port in npppd_auth_radius_reload() 563 strlcpy(rad->server[i].secret, server->secret, in npppd_auth_radius_reload() [all …]
|
| /openbsd-src/regress/lib/libssl/interop/ |
| H A D | Makefile.inc | 6 SRCS_server ?= server.c util.c 16 client-self.out server-self.out: run-self-client-server 18 run-self-client-server: client server 127.0.0.1.crt 21 ./server >server-self.out \ 25 `sed -n 's/listen sock: //p' server-self.out` 27 -sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null 33 grep -q '^success$$' server-self.out 35 grep -q '^<<< hello$$' server-self.out 41 {client,server}.{req,crt,key} \ 47 -subj /L=OpenBSD/O=tls-regress/OU=server/CN=${@:R}/ \ [all …]
|
| /openbsd-src/regress/lib/libssl/interop/cert/ |
| H A D | Makefile | 3 # Connect a client to a server. Both can be current libressl, or 4 # openssl 3.x. Create client and server certificates 6 # combinations with, without, and with wrong CA for client and server 40 REGRESS_TARGETS += run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv} 43 SLOW_TARGETS += run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv} 46 run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv}: \ 47 127.0.0.1.crt ca.crt fake-ca.crt client.crt server.crt \ 48 ../${clib}/client ../${slib}/server 50 ../${slib}/server >${@:S/^run/server/} [all...] |
| /openbsd-src/usr.bin/whois/ |
| H A D | whois.c | 157 const char *server = in main() local 159 rval += whois(name, server, port_whois, flags); in main() 166 whois(const char *query, const char *server, const char *port, int flags) in whois() argument 179 error = getaddrinfo(server, port, &hints, &res); in whois() 184 warnx("%s: %s", server, gai_strerror(error)); in whois() 208 warn("%s: %s", server, reason); in whois() 215 (strcmp(server, "whois.denic.de") == 0 || in whois() 216 strcmp(server, "de" QNICHOST_TAIL) == 0)) in whois() 219 (strcmp(server, "whois.dk-hostmaster.dk") == 0 || in whois() 220 strcmp(server, "dk" QNICHOST_TAIL) == 0)) in whois() [all …]
|
| /openbsd-src/regress/lib/libcrypto/CA/ |
| H A D | Makefile | 55 server.key.pem: stamp-clean 57 openssl genrsa -out server.key.pem 2048 59 server.csr.pem: intermediate.cnf server.key.pem 63 -key server.key.pem -out server.csr.pem 66 server.cert.pem: intermediate.cnf intermediate.cert.pem server.csr.pem 70 -in server.csr.pem -out server.cert.pem 90 REGRESS_TARGETS += run-verify-server 92 run-verify-server: chain.pem server.cert.pem 94 openssl verify -purpose sslserver -CAfile chain.pem server.cert.pem
|
| /openbsd-src/sbin/iked/ |
| H A D | radius.c | 150 struct iked_radserver *server = ctx; in iked_radius_on_event() local 164 env = server->rs_env; in iked_radius_on_event() 165 pkt = radius_recv(server->rs_sock, 0); in iked_radius_on_event() 173 TAILQ_FOREACH(req, &server->rs_reqs, rr_entry) { in iked_radius_on_event() 185 if (radius_check_response_authenticator(pkt, server->rs_secret) != 0) { in iked_radius_on_event() 207 if (radius_check_message_authenticator(pkt, server->rs_secret) != 0) { in iked_radius_on_event() 246 server->rs_secret) == 0) { in iked_radius_on_event() 298 TAILQ_REMOVE(&server->rs_reqs, req, rr_entry); in iked_radius_on_event() 304 TAILQ_REMOVE(&server->rs_reqs, req, rr_entry); in iked_radius_on_event() 342 TAILQ_REMOVE(&server in iked_radius_request_send() 334 struct iked_radserver *server = req->rr_server; iked_radius_request_send() local [all...] |
| /openbsd-src/regress/sys/nfs/ |
| H A D | Makefile | 15 echo /mnt/regress-nfs-server -maproot=0:0 127.0.0.1 >>/etc/exports 22 mkdir -p /mnt/regress-nfs-server 23 mount /dev/vnd0c /mnt/regress-nfs-server 31 mount -t nfs 127.0.0.1:/mnt/regress-nfs-server /mnt/regress-nfs-client 51 -rmdir /mnt/regress-nfs-server 2>/dev/null || true 57 echo -n $@ >/mnt/regress-nfs-server/read 94 ktrace -f /mnt/regress-nfs-client/netcat-server.ktrace \ 95 nc -n -v -l 127.0.0.1 0 2>server.log & 98 if fgrep -q Listening server.log; then break; fi; sleep .1; done 99 fgrep Listening server.log [all …]
|
| /openbsd-src/lib/libssl/test/ |
| H A D | testssl | 4 key=../apps/server.pem 9 cert=../apps/server.pem 38 echo test sslv2 with server authentication 45 echo test sslv2 with both client and server authentication 52 echo test sslv3 with server authentication 58 echo test sslv3 with both client and server authentication 64 echo test sslv2/sslv3 with server authentication 70 echo test sslv2/sslv3 with both client and server authentication 76 echo test sslv2 with server authentication via BIO pair 83 echo test sslv2 with both client and server authentication via BIO pair [all …]
|
| /openbsd-src/usr.sbin/unbound/dnstap/ |
| H A D | dnstap.proto | 25 // DNS server identity. 26 // If enabled, this is the identity string of the DNS server which generated 31 // DNS server version. 32 // If enabled, this is the version string of the DNS server which generated 70 // Policy: information about any name server operator policy 80 NS_NAME = 4; // Authoritative name server, by name 81 NS_IP = 5; // Authoritative name server, by IP address 147 // "forwarding" case where an upstream DNS server is responsible for 158 // authoritative name server, from the perspective of the authoritative 159 // name server. [all …]
|
| /openbsd-src/gnu/llvm/clang/tools/scan-view/share/ |
| H A D | ScanView.py | 3 from http.server import HTTPServer, SimpleHTTPRequestHandler 103 def __init__(self, report, reporter, parameters, server): argument 106 self.server = server 115 if self.server.options.debug: 120 if self.server.options.debug: 254 if self.server.options.debug: 262 path = os.path.join(self.server.root, 'report-%s.html'%report) 271 path = posixpath.join(self.server.root, 'index.html') 322 reporter = self.server.reporters[reporterIndex] 334 self.server.config.set('ScanView', 'reporter', reporterIndex) [all …]
|
| /openbsd-src/regress/lib/libssl/verify/ |
| H A D | verify.c | 33 int server; member 51 .server = 0, 57 .server = 1, 69 .server = 0, 75 .server = 1, 86 .server = 0, 92 .server = 1, 104 .server = 0, 110 .server = 1, 121 .server = 0, [all …]
|
| /openbsd-src/regress/usr.sbin/httpd/tests/ |
| H A D | Makefile | 73 server.req: 74 …-new -subj /L=OpenBSD/O=httpd-regress/OU=server/CN=localhost/ -nodes -newkey rsa -keyout server.ke… 79 server.crt: ca.crt server.req 80 openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in server.req -out server.crt 85 ${REGRESS_TARGETS:M*tls*} ${REGRESS_TARGETS:M*https*}: server.crt client.crt
|
| /openbsd-src/usr.sbin/nsd/dnstap/ |
| H A D | dnstap.proto | 25 // DNS server identity. 26 // If enabled, this is the identity string of the DNS server which generated 31 // DNS server version. 32 // If enabled, this is the version string of the DNS server which generated 98 // "forwarding" case where an upstream DNS server is responsible for 109 // authoritative name server, from the perspective of the authoritative 110 // name server. 114 // name server to a resolver, from the perspective of the authoritative 115 // name server. 119 // authoritative name server, from the perspective of the resolver. [all …]
|