Home
last modified time | relevance | path

Searched refs:server (Results 1 – 25 of 775) sorted by relevance

12345678910>>...31

/openbsd/regress/usr.bin/nc/
H A DMakefile42 SERVER_BG = 2>&1 >server.out | tee server.err &
44 SERVER_LOG = >server.out 2>server.err
48 sed -E -n 's/(Listening|Bound) on .* //p' server.err >server.port
250 :> server.err
253 :> server.out
375 run-tls-hash: server.crt ca.crt server.hash
635 :> server.err
638 :> server.out
741 :> server.err
744 :> server.out
[all …]
/openbsd/regress/lib/libssl/unit/
H A Dssl_methods.c25 int server; member
33 .server = 1,
39 .server = 1,
45 .server = 0,
52 .server = 1,
58 .server = 1,
64 .server = 0,
71 .server = 1,
77 .server = 1,
83 .server = 0,
[all …]
/openbsd/usr.sbin/radiusd/
H A Dradiusd_radius.c351 if (connect(server->sock, (struct sockaddr *)&server->addr, in radius_server_start()
360 if (getsockname(server->sock, (struct sockaddr *)&server->local, in radius_server_start()
373 event_set(&server->ev, server->sock, EV_READ | EV_PERSIST, in radius_server_start()
384 close(server->sock); in radius_server_start()
385 server->sock = -1; in radius_server_start()
394 close(server->sock); in radius_server_stop()
395 server->sock = -1; in radius_server_stop()
427 if (req->server == server && req->req_id == res_id) in radius_server_on_event()
487 server->module->curr_server %= server->module->nserver; in radius_server_on_fail()
489 &server->module->server[server->module->curr_server].addr; in radius_server_on_fail()
[all …]
/openbsd/regress/lib/libssl/interop/netcat/
H A DMakefile18 REGRESS_TARGETS += run-netcat-client-${clib}-server-nc
23 nc >${@:S/^run/server/}.out \
37 grep -q '^hello$$' ${@:S/^run/server/}.out
45 REGRESS_TARGETS += run-netcat-client-nc-server-${slib}
47 run-netcat-client-nc-server-${slib}: ../${slib}/server 127.0.0.1.crt
49 ../${slib}/server >${@:S/^run/server/}.out \
56 grep -q '^success$$' ${@:S/^run/server/}.out || \
59 grep -q '^<<< hello$$' ${@:S/^run/server/}.out
79 REGRESS_TARGETS += run-protocol-server-${slib}
81 run-protocol-server-${slib}: server-netcat-client-nc-server-${slib}.out
[all …]
/openbsd/regress/lib/libssl/interop/cipher/
H A DMakefile30 server-${slib}.ciphers: 127.0.0.1.crt dsa.crt ec.crt rsa.crt
32 ../${slib}/server -l ALL -L >$@.tmp
39 ciphers.mk: client-${clib}-server-${slib}.ciphers
40 client-${clib}-server-${slib}.ciphers: \
63 `cat client-${clib}-server-${slib}.ciphers`
102 run-cipher-${cipher}-client-${clib}-server-${slib} \
104 server-cipher-${cipher}-client-${clib}-server-${slib}.out: dh.param \
107 ../${slib}/server >${@:S/^run/server/}.out \
115 grep -q '^success$$' ${@:S/^run/server/}.out || \
125 check-cipher-${cipher}-client-${clib}-server-${slib}: \
[all …]
/openbsd/regress/lib/libtls/tls/
H A Dtlstest.c298 struct tls *client, *server; in test_tls() local
316 if ((server = tls_server()) == NULL) in test_tls()
332 tls_reset(server); in test_tls()
342 tls_free(server); in test_tls()
351 struct tls *client, *server; in do_tls_tests() local
375 tls_reset(server); in do_tls_tests()
384 tls_reset(server); in do_tls_tests()
393 tls_reset(server); in do_tls_tests()
403 tls_free(server); in do_tls_tests()
484 tls_free(server); in do_tls_ordering_tests()
[all …]
/openbsd/regress/lib/libssl/interop/version/
H A DMakefile48 run-version-client-${clib}-${cver}-server-${slib}-${sver} \
50 server-version-client-${clib}-${cver}-server-${slib}-${sver}.out: \
51 127.0.0.1.crt ../${clib}/client ../${slib}/server
53 ../${slib}/server >${@:S/^run/server/}.out \
61 `sed -n 's/listen sock: //p' ${@:S/^run/server/}.out`
63 grep -q '^success$$' ${@:S/^run/server/}.out || \
79 server-version-client-${clib}-${cver}-server-${slib}-${sver}.out
81 @grep ' Protocol *: ' ${@:S/^check/server/}.out
85 grep -q ' Protocol *: TLSv1.3$$' ${@:S/^check/server/}.out
90 ${@:S/^check/server/}.out
[all …]
/openbsd/regress/lib/libssl/interop/session/
H A DMakefile14 run-session-client-libressl-server-libressl \
15 run-session-client-libressl-server-openssl11 \
16 run-session-client-openssl11-server-libressl \
17 run-session-client-openssl11-server-openssl11:
26 run-session-client-${clib}-server-${slib}: \
27 127.0.0.1.crt ../${clib}/client ../${slib}/server
29 ../${slib}/server >${@:S/^run/server/}.out \
36 grep '^success$$' ${@:S/^run/server/}.out || \
39 grep '^session 2: new$$' ${@:S/^run/server/}.out
41 grep '^session 1: reuse$$' ${@:S/^run/server/}.out
[all …]
/openbsd/gnu/llvm/lldb/docs/man/
H A Dlldb-server.rst6 .. program:: lldb-server
11 | :program:`lldb-server` v[ersion]
18 :program:`lldb-server` provides the server counterpart of the LLVM debugger.
32 Prints lldb-server version and exits.
41 Runs the platform server. LLDB can afterwards connect to the server using
94 Run lldb-server in a new session.
114 | :program:`lldb-server` p[latform] [*options*] --server --listen [[*host*]:*port*]
119 .. option:: --server
186 the server. Note that terminating the server will usually cause the process
200 lldb-server g :1234
[all …]
/openbsd/regress/lib/libssl/interop/botan/
H A DMakefile42 REGRESS_TARGETS += run-client-botan-server-${lib}
44 run-client-botan-server-${lib}: client server.crt
46 ../${lib}/server >server-${lib}.out \
47 -c server.crt -k server.key \
54 grep -q '^success$$' server-${lib}.out || \
55 { sleep 1; grep -q '^success$$' server-${lib}.out; }
57 grep -q '^<<< hello$$' server-${lib}.out
63 grep -q ' Protocol *: TLSv1.2$$' server-${lib}.out
67 server.key ca.key:
76 server.req: ${@:R}.key
[all …]
/openbsd/regress/usr.bin/ssh/unittests/kex/
H A Dtest_kex.c53 run_kex(struct ssh *client, struct ssh *server) in run_kex() argument
60 if ((r = do_send_and_receive(server, client))) in run_kex()
64 if ((r = do_send_and_receive(client, server))) in run_kex()
70 ASSERT_INT_EQ(server->kex->done, 1); in run_kex()
102 ASSERT_PTR_NE(server, NULL); in do_kex_with_key()
111 run_kex(client, server); in do_kex_with_key()
116 run_kex(client, server); in do_kex_with_key()
120 ASSERT_INT_EQ(kex_send_kexinit(server), 0); in do_kex_with_key()
121 run_kex(client, server); in do_kex_with_key()
150 server2->kex->sign = server->kex->sign; in do_kex_with_key()
[all …]
/openbsd/regress/lib/libssl/shutdown/
H A Dshutdowntest.c224 if (!server_func(server, "server", &server_done)) in do_client_server_loop()
236 do_shutdown_loop(SSL *client, SSL *server) in do_shutdown_loop() argument
367 SSL *client = NULL, *server = NULL; in shutdown_test() local
417 SSL_set_msg_callback(server, ssl_msg_callback); in shutdown_test()
426 if (!do_shutdown_loop(client, server)) { in shutdown_test()
477 SSL_free(server); in shutdown_test()
486 SSL *client = NULL, *server = NULL; in shutdown_sequence_test() local
562 if ((ret = SSL_shutdown(server)) != 0) { in shutdown_sequence_test()
585 if ((ret = SSL_shutdown(server)) != 1) { in shutdown_sequence_test()
590 if ((shutdown = SSL_get_shutdown(server)) != in shutdown_sequence_test()
[all …]
/openbsd/usr.sbin/npppd/npppd/
H A Dnpppd_auth.c519 struct radserver *server; in npppd_auth_radius_reload() local
552 memset(&rad->server[i], 0, sizeof(rad->server[0])); in npppd_auth_radius_reload()
557 memcpy(&rad->server[i].peer, &server->address, in npppd_auth_radius_reload()
558 server->address.ss_len); in npppd_auth_radius_reload()
563 strlcpy(rad->server[i].secret, server->secret, in npppd_auth_radius_reload()
565 rad->server[i].enabled = 1; in npppd_auth_radius_reload()
573 memset(&rad->server[i], 0, sizeof(rad->server[0])); in npppd_auth_radius_reload()
578 memcpy(&rad->server[i].peer, &server->address, in npppd_auth_radius_reload()
579 server->address.ss_len); in npppd_auth_radius_reload()
584 strlcpy(rad->server[i].secret, server->secret, in npppd_auth_radius_reload()
[all …]
/openbsd/regress/lib/libssl/interop/
H A DMakefile.inc6 SRCS_server ?= server.c util.c
16 client-self.out server-self.out: run-self-client-server
18 run-self-client-server: client server 127.0.0.1.crt
21 ./server >server-self.out \
25 `sed -n 's/listen sock: //p' server-self.out`
33 grep -q '^success$$' server-self.out
35 grep -q '^<<< hello$$' server-self.out
41 {client,server}.{req,crt,key} \
47 -subj /L=OpenBSD/O=tls-regress/OU=server/CN=${@:R}/ \
55 client.req server.req:
[all …]
/openbsd/regress/lib/libssl/interop/cert/
H A DMakefile49 run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv}: \
50 127.0.0.1.crt ca.crt fake-ca.crt client.crt server.crt \
51 ../${clib}/client ../${slib}/server
53 ../${slib}/server >${@:S/^run/server/}.out \
55 ${scert:S/^nocert//:S/^cert/-c server.crt -k server.key/} \
62 ${ccert:S/^nocert//:S/^cert/-c server.crt -k server.key/} \
64 `sed -n 's/listen sock: //p' ${@:S/^run/server/}.out`
66 grep '^success$$' ${@:S/^run/server/}.out || \
67 { sleep 1; grep '^success$$' ${@:S/^run/server/}.out; }
71 grep '^verify: fail' ${@:S/^run/client/}.out ${@:S/^run/server/}.out
[all …]
/openbsd/usr.bin/whois/
H A Dwhois.c157 const char *server = in main() local
184 warnx("%s: %s", server, gai_strerror(error)); in whois()
208 warn("%s: %s", server, reason); in whois()
215 (strcmp(server, "whois.denic.de") == 0 || in whois()
216 strcmp(server, "de" QNICHOST_TAIL) == 0)) in whois()
220 strcmp(server, "dk" QNICHOST_TAIL) == 0)) in whois()
251 } else if (strcmp(server, ANICHOST) == 0) { in whois()
294 char *server; in choose_server() local
339 free(server); in choose_server()
346 *tofree = server; in choose_server()
[all …]
/openbsd/regress/lib/libcrypto/CA/
H A DMakefile55 server.key.pem: stamp-clean
57 openssl genrsa -out server.key.pem 2048
59 server.csr.pem: intermediate.cnf server.key.pem
63 -key server.key.pem -out server.csr.pem
66 server.cert.pem: intermediate.cnf intermediate.cert.pem server.csr.pem
70 -in server.csr.pem -out server.cert.pem
90 REGRESS_TARGETS += run-verify-server
92 run-verify-server: chain.pem server.cert.pem
94 openssl verify -purpose sslserver -CAfile chain.pem server.cert.pem
/openbsd/regress/sys/nfs/
H A DMakefile15 echo /mnt/regress-nfs-server -maproot=0:0 127.0.0.1 >>/etc/exports
22 mkdir -p /mnt/regress-nfs-server
23 mount /dev/vnd0c /mnt/regress-nfs-server
31 mount -t nfs 127.0.0.1:/mnt/regress-nfs-server /mnt/regress-nfs-client
51 -rmdir /mnt/regress-nfs-server 2>/dev/null || true
57 echo -n $@ >/mnt/regress-nfs-server/read
94 ktrace -f /mnt/regress-nfs-client/netcat-server.ktrace \
95 nc -n -v -l 127.0.0.1 0 2>server.log &
99 fgrep Listening server.log
103 `sed -n 's/Listening on 127.0.0.1 //p' server.log` 2>client.log
[all …]
/openbsd/lib/libssl/test/
H A Dtestssl4 key=../apps/server.pem
9 cert=../apps/server.pem
38 echo test sslv2 with server authentication
45 echo test sslv2 with both client and server authentication
52 echo test sslv3 with server authentication
58 echo test sslv3 with both client and server authentication
64 echo test sslv2/sslv3 with server authentication
70 echo test sslv2/sslv3 with both client and server authentication
76 echo test sslv2 with server authentication via BIO pair
90 echo test sslv3 with server authentication via BIO pair
[all …]
/openbsd/usr.sbin/unbound/dnstap/
H A Ddnstap.proto25 // DNS server identity.
31 // DNS server version.
159 // name server.
164 // name server.
182 // (recursion desired) bit when querying the DNS server. The DNS server
188 // a client, from the perspective of the DNS server. The DNS server
193 // server to an upstream DNS server which is expected to perform
195 // server.
199 // DNS server performing recursion to a downstream DNS server, from the
221 // authoritative name server.
[all …]
/openbsd/gnu/llvm/clang/tools/scan-view/share/
H A DScanView.py3 from http.server import HTTPServer, SimpleHTTPRequestHandler
106 self.server = server
115 if self.server.options.debug:
120 if self.server.options.debug:
254 if self.server.options.debug:
322 reporter = self.server.reporters[reporterIndex]
429 if self.server.options.debug:
543 for i,r in enumerate(self.server.reporters):
659 if (self.server.options.onlyServeLocal and
684 self.server.halt()
[all …]
/openbsd/regress/lib/libssl/verify/
H A Dverify.c33 int server; member
51 .server = 0,
57 .server = 1,
69 .server = 0,
75 .server = 1,
86 .server = 0,
92 .server = 1,
104 .server = 0,
110 .server = 1,
121 .server = 0,
[all …]
/openbsd/regress/usr.sbin/httpd/tests/
H A DMakefile73 server.req:
74 …-new -subj /L=OpenBSD/O=httpd-regress/OU=server/CN=localhost/ -nodes -newkey rsa -keyout server.ke…
79 server.crt: ca.crt server.req
80 openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in server.req -out server.crt
85 ${REGRESS_TARGETS:M*tls*} ${REGRESS_TARGETS:M*https*}: server.crt client.crt
/openbsd/usr.sbin/nsd/dnstap/
H A Ddnstap.proto25 // DNS server identity.
31 // DNS server version.
110 // name server.
115 // name server.
133 // (recursion desired) bit when querying the DNS server. The DNS server
139 // a client, from the perspective of the DNS server. The DNS server
144 // server to an upstream DNS server which is expected to perform
146 // server.
150 // DNS server performing recursion to a downstream DNS server, from the
151 // perspective of the downstream DNS server.
[all …]
/openbsd/gnu/llvm/lldb/packages/Python/lldbsuite/test/
H A Dlldbgdbclient.py17 server = None variable in GDBRemoteTestBase
22 self.server = MockGDBServer(self.server_socket_class())
23 self.server.start()
31 self.server.stop()
56 self.server.get_connect_url(), "gdb-remote", error)
73 log = self.server.responder.packetLog
97 self.runCmd("platform connect " + self.server.get_connect_url())

12345678910>>...31