Home
last modified time | relevance | path

Searched refs:wire (Results 1 – 25 of 38) sorted by relevance

12

/openbsd/usr.sbin/amd/amd/
H A Damd.c76 char *wire; variable
272 wire = getwire(); in main()
H A DMakefile15 ufs_ops.c ifs_ops.c amd.c get_args.c restart.c wire.c
H A Dget_args.c174 fprintf(stderr, "Primary network is %s.\n", wire); in get_args()
H A Dopts.c83 { S("wire"), 0, &wire },
/openbsd/lib/libssl/
H A Dd1_both.c742 unsigned char wire[DTLS1_HM_HEADER_LENGTH]; in dtls1_get_message_fragment() local
757 i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, wire, in dtls1_get_message_fragment()
766 CBS_init(&cbs, wire, i); in dtls1_get_message_fragment()
792 wire[0] == SSL3_MT_HELLO_REQUEST) { in dtls1_get_message_fragment()
799 if (wire[1] == 0 && wire[2] == 0 && wire[3] == 0) { in dtls1_get_message_fragment()
802 SSL3_RT_HANDSHAKE, wire, in dtls1_get_message_fragment()
/openbsd/usr.sbin/unbound/dnstap/
H A Ddnstap.proto101 // the Reponse Policy Zone in wire format.
115 // Message: a wire-format (RFC 1035 section 4) DNS message and associated
266 // The initiator's original wire-format DNS query message, verbatim.
270 // This is a wire-format DNS domain name.
283 // The responder's original wire-format DNS response message, verbatim.
/openbsd/usr.sbin/nsd/dnstap/
H A Ddnstap.proto66 // Message: a wire-format (RFC 1035 section 4) DNS message and associated
199 // The initiator's original wire-format DNS query message, verbatim.
203 // This is a wire-format DNS domain name.
216 // The responder's original wire-format DNS response message, verbatim.
/openbsd/usr.bin/ssh/
H A DPROTOCOL.chacha20poly130557 uint64 under the SSH wire encoding rules and a ChaCha20 block counter of
68 encoded as a uint64 under the usual SSH wire encoding and a zero block
H A DPROTOCOL.certkeys48 on the wire, but do appear in a SSH_MSG_KEXINIT's host-key algorithms
56 The SSH wire protocol includes several extensibility mechanisms.
70 types and encoding are as per RFC4251 section 5). The serialised wire
H A DPROTOCOL.sshsig2 that is compatible with SSH keys and wire formats.
H A DPROTOCOL.u2f201 signature format used on the wire in SSH2_USERAUTH_REQUEST packets will
231 The wire encoding for a webauthn-sk-ecdsa-sha2-nistp256@openssh.com
H A DPROTOCOL.krl52 Where "ca_key" is the standard SSH wire serialisation of the CA's
H A DPROTOCOL.mux8 a length and message type in SSH uint32 wire format:
H A DPROTOCOL767 the encoding of public keys sent on the wire: as described in RFC4253
/openbsd/usr.sbin/unbound/testcode/
H A Dtestpkts.c382 uint8_t *wire = (uint8_t*)malloc(MAX_PACKETLEN); in hex_buffer2wire() local
383 if(!wire) error("out of memory"); in hex_buffer2wire()
447 wirelen = hexstr2bin((char *) hexbuf, hexbufpos, wire, 0, MAX_PACKETLEN); in hex_buffer2wire()
449 sldns_buffer_new_frm_data(wire_buffer, wire, wirelen); in hex_buffer2wire()
453 free(wire); in hex_buffer2wire()
/openbsd/usr.sbin/nsd/
H A Dnsec3.c577 const uint8_t* wire = dname_name(dname); in parse_nsec3_name() local
580 if(wire[0] != lablen) { in parse_nsec3_name()
585 (void)b32_pton((char*)wire+1, hash, buflen); in parse_nsec3_name()
/openbsd/usr.sbin/amd/include/
H A Dam.h152 extern char *wire; /* Name of primary connected network */
/openbsd/sbin/unwind/libunbound/services/
H A Dauthzone.c5749 uint8_t* wire = sldns_buffer_begin(pkt); in check_xfer_packet() local
5756 if(!LDNS_QR_WIRE(wire)) { in check_xfer_packet()
5761 if(LDNS_TC_WIRE(wire)) { in check_xfer_packet()
5772 if(LDNS_RCODE_WIRE(wire) != LDNS_RCODE_NOERROR) { in check_xfer_packet()
5800 if(LDNS_QDCOUNT(wire) > 1) { in check_xfer_packet()
5803 (int)LDNS_QDCOUNT(wire)); in check_xfer_packet()
5809 for(i=0; i<(int)LDNS_QDCOUNT(wire); i++) { in check_xfer_packet()
5859 for(i=0; i<(int)LDNS_ANCOUNT(wire); i++) { in check_xfer_packet()
5923 LDNS_ANCOUNT(wire)==1) { in check_xfer_packet()
5976 for(i=0; i<(int)LDNS_NSCOUNT(wire); i++) { in check_xfer_packet()
[all …]
/openbsd/usr.sbin/unbound/services/
H A Dauthzone.c5749 uint8_t* wire = sldns_buffer_begin(pkt); in check_xfer_packet() local
5756 if(!LDNS_QR_WIRE(wire)) { in check_xfer_packet()
5761 if(LDNS_TC_WIRE(wire)) { in check_xfer_packet()
5772 if(LDNS_RCODE_WIRE(wire) != LDNS_RCODE_NOERROR) { in check_xfer_packet()
5800 if(LDNS_QDCOUNT(wire) > 1) { in check_xfer_packet()
5803 (int)LDNS_QDCOUNT(wire)); in check_xfer_packet()
5809 for(i=0; i<(int)LDNS_QDCOUNT(wire); i++) { in check_xfer_packet()
5859 for(i=0; i<(int)LDNS_ANCOUNT(wire); i++) { in check_xfer_packet()
5923 LDNS_ANCOUNT(wire)==1) { in check_xfer_packet()
5976 for(i=0; i<(int)LDNS_NSCOUNT(wire); i++) { in check_xfer_packet()
[all …]
/openbsd/share/dict/
H A Dweb2a5155 bell wire
9893 card wire
13837 core wire
17786 drag wire
18235 drop wire
28812 hog wire
29286 hot-wire
40748 pin wire
74107 wire-cut
74128 wire gun
[all …]
/openbsd/sys/dev/mii/
H A Dmiidevs84 (ie, ordered as on the wire) */
/openbsd/usr.sbin/unbound/doc/
H A Drequirements.txt85 duplicates, but when presented with duplicates on the wire from the
/openbsd/sbin/iked/
H A Dikev2.c832 ikev2_ike_auth_compatible(struct iked_sa *sa, uint8_t policy, uint8_t wire) in ikev2_ike_auth_compatible() argument
834 if (wire == IKEV2_AUTH_SIG_ANY) /* internal, not on wire */ in ikev2_ike_auth_compatible()
836 if (policy == wire || policy == IKEV2_AUTH_NONE) in ikev2_ike_auth_compatible()
840 switch (wire) { in ikev2_ike_auth_compatible()
854 switch (wire) { in ikev2_ike_auth_compatible()
/openbsd/gnu/llvm/lldb/source/Host/macosx/objcxx/
H A DHost.mm746 - we have successfully copied the rights to be send over the XPC wire
/openbsd/usr.sbin/amd/doc/
H A Damdref.texinfo1236 @item wire
1237 @cindex wire, mount selector
1238 @cindex Mount selector; wire
1239 @cindex Selector; wire

12