/openbsd/usr.sbin/amd/amd/ |
H A D | amd.c | 76 char *wire; variable 272 wire = getwire(); in main()
|
H A D | Makefile | 15 ufs_ops.c ifs_ops.c amd.c get_args.c restart.c wire.c
|
H A D | get_args.c | 174 fprintf(stderr, "Primary network is %s.\n", wire); in get_args()
|
H A D | opts.c | 83 { S("wire"), 0, &wire },
|
/openbsd/lib/libssl/ |
H A D | d1_both.c | 742 unsigned char wire[DTLS1_HM_HEADER_LENGTH]; in dtls1_get_message_fragment() local 757 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, wire, in dtls1_get_message_fragment() 766 CBS_init(&cbs, wire, i); in dtls1_get_message_fragment() 792 wire[0] == SSL3_MT_HELLO_REQUEST) { in dtls1_get_message_fragment() 799 if (wire[1] == 0 && wire[2] == 0 && wire[3] == 0) { in dtls1_get_message_fragment() 802 SSL3_RT_HANDSHAKE, wire, in dtls1_get_message_fragment()
|
/openbsd/usr.sbin/unbound/dnstap/ |
H A D | dnstap.proto | 101 // the Reponse Policy Zone in wire format. 115 // Message: a wire-format (RFC 1035 section 4) DNS message and associated 266 // The initiator's original wire-format DNS query message, verbatim. 270 // This is a wire-format DNS domain name. 283 // The responder's original wire-format DNS response message, verbatim.
|
/openbsd/usr.sbin/nsd/dnstap/ |
H A D | dnstap.proto | 66 // Message: a wire-format (RFC 1035 section 4) DNS message and associated 199 // The initiator's original wire-format DNS query message, verbatim. 203 // This is a wire-format DNS domain name. 216 // The responder's original wire-format DNS response message, verbatim.
|
/openbsd/usr.bin/ssh/ |
H A D | PROTOCOL.chacha20poly1305 | 57 uint64 under the SSH wire encoding rules and a ChaCha20 block counter of 68 encoded as a uint64 under the usual SSH wire encoding and a zero block
|
H A D | PROTOCOL.certkeys | 48 on the wire, but do appear in a SSH_MSG_KEXINIT's host-key algorithms 56 The SSH wire protocol includes several extensibility mechanisms. 70 types and encoding are as per RFC4251 section 5). The serialised wire
|
H A D | PROTOCOL.sshsig | 2 that is compatible with SSH keys and wire formats.
|
H A D | PROTOCOL.u2f | 201 signature format used on the wire in SSH2_USERAUTH_REQUEST packets will 231 The wire encoding for a webauthn-sk-ecdsa-sha2-nistp256@openssh.com
|
H A D | PROTOCOL.krl | 52 Where "ca_key" is the standard SSH wire serialisation of the CA's
|
H A D | PROTOCOL.mux | 8 a length and message type in SSH uint32 wire format:
|
H A D | PROTOCOL | 767 the encoding of public keys sent on the wire: as described in RFC4253
|
/openbsd/usr.sbin/unbound/testcode/ |
H A D | testpkts.c | 382 uint8_t *wire = (uint8_t*)malloc(MAX_PACKETLEN); in hex_buffer2wire() local 383 if(!wire) error("out of memory"); in hex_buffer2wire() 447 wirelen = hexstr2bin((char *) hexbuf, hexbufpos, wire, 0, MAX_PACKETLEN); in hex_buffer2wire() 449 sldns_buffer_new_frm_data(wire_buffer, wire, wirelen); in hex_buffer2wire() 453 free(wire); in hex_buffer2wire()
|
/openbsd/usr.sbin/nsd/ |
H A D | nsec3.c | 577 const uint8_t* wire = dname_name(dname); in parse_nsec3_name() local 580 if(wire[0] != lablen) { in parse_nsec3_name() 585 (void)b32_pton((char*)wire+1, hash, buflen); in parse_nsec3_name()
|
/openbsd/usr.sbin/amd/include/ |
H A D | am.h | 152 extern char *wire; /* Name of primary connected network */
|
/openbsd/sbin/unwind/libunbound/services/ |
H A D | authzone.c | 5749 uint8_t* wire = sldns_buffer_begin(pkt); in check_xfer_packet() local 5756 if(!LDNS_QR_WIRE(wire)) { in check_xfer_packet() 5761 if(LDNS_TC_WIRE(wire)) { in check_xfer_packet() 5772 if(LDNS_RCODE_WIRE(wire) != LDNS_RCODE_NOERROR) { in check_xfer_packet() 5800 if(LDNS_QDCOUNT(wire) > 1) { in check_xfer_packet() 5803 (int)LDNS_QDCOUNT(wire)); in check_xfer_packet() 5809 for(i=0; i<(int)LDNS_QDCOUNT(wire); i++) { in check_xfer_packet() 5859 for(i=0; i<(int)LDNS_ANCOUNT(wire); i++) { in check_xfer_packet() 5923 LDNS_ANCOUNT(wire)==1) { in check_xfer_packet() 5976 for(i=0; i<(int)LDNS_NSCOUNT(wire); i++) { in check_xfer_packet() [all …]
|
/openbsd/usr.sbin/unbound/services/ |
H A D | authzone.c | 5749 uint8_t* wire = sldns_buffer_begin(pkt); in check_xfer_packet() local 5756 if(!LDNS_QR_WIRE(wire)) { in check_xfer_packet() 5761 if(LDNS_TC_WIRE(wire)) { in check_xfer_packet() 5772 if(LDNS_RCODE_WIRE(wire) != LDNS_RCODE_NOERROR) { in check_xfer_packet() 5800 if(LDNS_QDCOUNT(wire) > 1) { in check_xfer_packet() 5803 (int)LDNS_QDCOUNT(wire)); in check_xfer_packet() 5809 for(i=0; i<(int)LDNS_QDCOUNT(wire); i++) { in check_xfer_packet() 5859 for(i=0; i<(int)LDNS_ANCOUNT(wire); i++) { in check_xfer_packet() 5923 LDNS_ANCOUNT(wire)==1) { in check_xfer_packet() 5976 for(i=0; i<(int)LDNS_NSCOUNT(wire); i++) { in check_xfer_packet() [all …]
|
/openbsd/share/dict/ |
H A D | web2a | 5155 bell wire 9893 card wire 13837 core wire 17786 drag wire 18235 drop wire 28812 hog wire 29286 hot-wire 40748 pin wire 74107 wire-cut 74128 wire gun [all …]
|
/openbsd/sys/dev/mii/ |
H A D | miidevs | 84 (ie, ordered as on the wire) */
|
/openbsd/usr.sbin/unbound/doc/ |
H A D | requirements.txt | 85 duplicates, but when presented with duplicates on the wire from the
|
/openbsd/sbin/iked/ |
H A D | ikev2.c | 832 ikev2_ike_auth_compatible(struct iked_sa *sa, uint8_t policy, uint8_t wire) in ikev2_ike_auth_compatible() argument 834 if (wire == IKEV2_AUTH_SIG_ANY) /* internal, not on wire */ in ikev2_ike_auth_compatible() 836 if (policy == wire || policy == IKEV2_AUTH_NONE) in ikev2_ike_auth_compatible() 840 switch (wire) { in ikev2_ike_auth_compatible() 854 switch (wire) { in ikev2_ike_auth_compatible()
|
/openbsd/gnu/llvm/lldb/source/Host/macosx/objcxx/ |
H A D | Host.mm | 746 - we have successfully copied the rights to be send over the XPC wire
|
/openbsd/usr.sbin/amd/doc/ |
H A D | amdref.texinfo | 1236 @item wire 1237 @cindex wire, mount selector 1238 @cindex Mount selector; wire 1239 @cindex Selector; wire
|