Home
last modified time | relevance | path

Searched +full:b +full:- +full:side (Results 1 – 25 of 1103) sorted by relevance

12345678910>>...45

/freebsd/contrib/llvm-project/llvm/include/llvm/IR/
H A DFixedPointBuilder.h1 //===- llvm/FixedPointBuilder.h - Builder for fixed-point ops ---*- C++ -*-===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
10 // way to lower fixed-point arithmetic operations to LLVM IR.
12 //===----------------------------------------------------------------------===//
33 IRBuilderTy &B; variable
44 Type *DstIntTy = B.getIntNTy(DstWidth); in Convert()
55 Value *Zero = Constant::getNullValue(Result->getType()); in Convert()
56 Value *IsNegative = B.CreateICmpSLT(Result, Zero); in Convert()
58 B.getContext(), APInt::getLowBitsSet(ResultWidth, SrcScale)); in Convert()
[all …]
/freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/
H A Dfsl,mu-msi.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/interrupt-controller/fsl,mu-msi.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Frank Li <Frank.Li@nxp.com>
16 for one processor (A side) to signal the other processor (B side) using
20 different clocks (from each side of the different peripheral buses).
21 Therefore, the MU must synchronize the accesses from one side to the
23 registers (Processor A-side, Processor B-side).
28 - $ref: /schemas/interrupt-controller/msi-controller.yaml#
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-digest.pod5 provider-digest - The digest library E<lt>-E<gt> provider functions
62 (see L<provider-base(7)/Provider Functions>).
65 named B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the
67 B<OSSL_FUNC_{name}>.
75 macros in L<openssl-core_dispatch.h(7)>, as follows:
103 OSSL_FUNC_digest_newctx() should create and return a pointer to a provider side
110 OSSL_FUNC_digest_freectx() is passed a pointer to the provider side digest context in
114 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the
117 OSSL_FUNC_digest_copyctx() should copy the provider side digest context in the
118 I<vinctx> parameter to the I<voutctx> parameter which is the another provider side
[all …]
H A Dprovider-kdf.pod5 provider-kdf - The KDF library E<lt>-E<gt> provider functions
53 (see L<provider-base(7)/Provider Functions>).
56 named B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the
58 B<OSSL_FUNC_{name}>.
66 macros in L<openssl-core_dispatch.h(7)>, as follows:
91 OSSL_FUNC_kdf_newctx() should create and return a pointer to a provider side
98 OSSL_FUNC_kdf_freectx() is passed a pointer to the provider side KDF context in
104 OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the
110 side KDF context in the I<kctx> parameter.
114 The I<kctx> parameter contains a pointer to the provider side context.
[all …]
H A Dprovider-asym_cipher.pod5 provider-asym_cipher - The asym_cipher library E<lt>-E<gt> provider functions
60 (see L<provider-base(7)/Provider Functions>).
63 named B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the
65 B<OSSL_FUNC_{name}>.
73 macros in L<openssl-core_dispatch.h(7)>, as follows:
104 See L<provider-keymgmt(7)> for further details.
108 OSSL_FUNC_asym_cipher_newctx() should create and return a pointer to a provider side
115 OSSL_FUNC_asym_cipher_freectx() is passed a pointer to the provider side asymmetric
119 OSSL_FUNC_asym_cipher_dupctx() should duplicate the provider side asymmetric cipher
125 given a provider side asymmetric cipher context in the I<ctx> parameter, and a
[all …]
H A Dprovider-mac.pod5 provider-mac - The mac library E<lt>-E<gt> provider functions
55 (see L<provider-base(7)/Provider Functions>).
58 named B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the
60 B<OSSL_FUNC_{name}>.
68 macros in L<openssl-core_dispatch.h(7)>, as follows:
96 OSSL_FUNC_mac_newctx() should create and return a pointer to a provider side
103 OSSL_FUNC_mac_freectx() is passed a pointer to the provider side mac context in
109 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the
115 side mac context in the I<mctx> parameter. The I<params> are set before setting
118 OSSL_FUNC_mac_init_skey() is similar but uses an opaque provider-specific object
[all …]
H A Dprovider-keyexch.pod5 provider-keyexch - The keyexch library E<lt>-E<gt> provider functions
54 (see L<provider-base(7)/Provider Functions>).
57 named B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the
59 B<OSSL_FUNC_{name}>.
67 macros in L<openssl-core_dispatch.h(7)>, as follows:
89 See L<provider-keymgmt(7)> for further details.
93 OSSL_FUNC_keyexch_newctx() should create and return a pointer to a provider side
100 OSSL_FUNC_keyexch_freectx() is passed a pointer to the provider side key exchange
104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in
109 OSSL_FUNC_keyexch_init() initialises a key exchange operation given a provider side key
[all …]
H A Dprovider-rand.pod5 provider-rand - The random number generation library E<lt>-E<gt> provider
76 OSSL_FUNC_rand_newctx() should create and return a pointer to a provider side
88 OSSL_FUNC_rand_freectx() is passed a pointer to the provider side rand context in
96 These functions correspond to those defined in NIST SP 800-90A and SP 800-90C.
161 provider side rand context I<ctx> to I<params>.
166 associated with the given provider side rand context I<ctx> and stores them
176 associated with the provider side context I<ctx> in its current state
178 with the provider side algorithm I<provctx>.
181 Parameters currently recognised by built-in rands are as follows. Not all
186 =item "state" (B<OSSL_RAND_PARAM_STATE>) <integer>
[all …]
H A Dprovider-signature.pod5 provider-signature - The signature library E<lt>-E<gt> provider functions
116 (see L<provider-base(7)/Provider Functions>).
119 named B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the
121 B<OSSL_FUNC_{name}>.
129 macros in L<openssl-core_dispatch.h(7)>, as follows:
214 When present, it should return a NULL-terminated array of strings
222 See L<provider-keymgmt(7)> for further details.
226 OSSL_FUNC_signature_newctx() should create and return a pointer to a provider side
235 OSSL_FUNC_signature_freectx() is passed a pointer to the provider side signature
239 OSSL_FUNC_signature_dupctx() should duplicate the provider side signature context in
[all …]
H A Dprovider-kem.pod5 provider-kem - The kem library E<lt>-E<gt> provider functions
62 (see L<provider-base(7)/Provider Functions>).
65 named B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the
67 B<OSSL_FUNC_{name}>.
75 macros in L<openssl-core_dispatch.h(7)>, as follows:
110 See L<provider-keymgmt(7)> for further details.
114 OSSL_FUNC_kem_newctx() should create and return a pointer to a provider side
121 OSSL_FUNC_kem_freectx() is passed a pointer to the provider side asymmetric
125 OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem
131 encapsulation given a provider side asymmetric kem context in the I<ctx>
[all …]
H A Dprovider-storemgmt.pod5 provider-storemgmt - The OSSL_STORE library E<lt>-E<gt> provider functions
41 The STORE operation is the provider side of the L<ossl_store(7)> API.
45 to the OpenSSL library in provider-native object abstraction form (see
46 L<provider-object(7)>). The OpenSSL library is then responsible for
50 include OSSL_FUNC_keymgmt_load() (L<provider-keymgmt(7)>),
58 (see L<provider-base(7)/Provider Functions>).
61 B<OSSL_FUNC_{name}_fn>, and a helper function to retrieve the function pointer
62 from a L<OSSL_DISPATCH(3)> element named B<OSSL_get_{name}>.
71 in L<openssl-core_dispatch.h(7)>, as follows:
86 OSSL_FUNC_store_open() should create a provider side context with data based
[all …]
/freebsd/share/examples/ppp/
H A Dlogin-auth1 #! /usr/local/bin/wish8.0 -f
47 text .l.prompt -width $pwidth -height 1 -relief flat;
49 pack .l.prompt -side left;
50 .l.prompt configure -state disabled;
51 text .l.value -width $vwidth -height 1;
53 pack .l.value -side right;
54 .l.value configure -state disabled;
55 pack .l -side top -padx $fxpad -pady $fypad;
58 text .p.prompt -width $pwidth -height 1 -relief flat;
60 pack .p.prompt -side left;
[all …]
H A Dchap-auth1 #! /usr/local/bin/wish8.0 -f
50 text .$n.prompt -width $pwidth -height 1 -relief flat;
52 pack .$n.prompt -side left;
53 .$n.prompt configure -state disabled;
60 text .$n.value -width $vwidth -height 1;
62 pack .$n.value -side right;
65 .$n.value configure -state normal -takefocus 0;
68 .$n.value configure -state disabled;
70 pack .$n -side top -padx $fxpad -pady $fypad;
75 puts [.n.value get 1.0 {end - 1 char}];
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set0_CA_list.pod18 - get or set CA list
48 by SSL_get0_peer_CA_list() is always B<NULL>.
50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities>
54 In most cases it is not necessary to set CA names on the client side. The list
58 and therefore setting CA names on the client side will have no impact if that
63 server side.
65 SSL_CTX_set_client_CA_list() sets the B<list> of CAs sent to the client when
66 requesting a client certificate for B<ctx>. Ownership of B<list> is transferred
67 to B<ctx> and it should not be freed by the caller.
69 SSL_set_client_CA_list() sets the B<list> of CAs sent to the client when
[all …]
H A DSSL_CTX_set_tlsext_status_cb.pod15 - OCSP Certificate Status Request functions
43 Currently the only supported type is B<TLSEXT_STATUSTYPE_ocsp>. This value
44 should be passed in the B<type> argument. Calling
45 SSL_CTX_get_tlsext_status_type() will return the type B<TLSEXT_STATUSTYPE_ocsp>
46 previously set via SSL_CTX_set_tlsext_status_type() or -1 if not set.
59 On the client side SSL_get_tlsext_status_type() can be used to determine whether
61 B<TLSEXT_STATUSTYPE_ocsp> if it has been called or -1 otherwise. On the server
62 side SSL_get_tlsext_status_type() can be used to determine whether the client
64 return B<TLSEXT_STATUSTYPE_ocsp>, or -1 otherwise.
67 SSL_get_tlsext_status_ocsp_resp(). The value B<*resp> will be updated to point
[all …]
H A DRSA_public_encrypt.pod5 RSA_public_encrypt, RSA_private_decrypt - RSA public key cryptography
12 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
28 RSA_public_encrypt() encrypts the B<flen> bytes at B<from> (usually a
29 session key) using the public key B<rsa> and stores the ciphertext in
30 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory.
32 B<padding> denotes one of the following modes:
44 EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty
55 When encrypting B<flen> must not be more than RSA_size(B<rsa>) - 11 for the
56 PKCS #1 v1.5 based padding modes, not more than RSA_size(B<rsa>) - 42 for
57 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
[all …]
H A DSRP_Calc_B.pod15 - SRP authentication primitives
22 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
25 /* server side .... */
27 const BIGNUM *b, const BIGNUM *N);
28 BIGNUM *SRP_Calc_B_ex(const BIGNUM *b, const BIGNUM *N, const BIGNUM *g,
30 BIGNUM *SRP_Calc_B(const BIGNUM *b, const BIGNUM *N, const BIGNUM *g,
33 BIGNUM *SRP_Calc_u_ex(const BIGNUM *A, const BIGNUM *B, const BIGNUM *N,
35 BIGNUM *SRP_Calc_u(const BIGNUM *A, const BIGNUM *B, const BIGNUM *N);
37 /* client side .... */
38 BIGNUM *SRP_Calc_client_key_ex(const BIGNUM *N, const BIGNUM *B, const BIGNUM *g,
[all …]
H A DSSL_CTX_set_split_send_fragment.pod11 SSL_SESSION_get_max_fragment_length - Control fragment size settings and pipelining operations
44 AES128-SHA based ciphers that have this capability. However, these are for
48 B<max_send_fragment> parameter for SSL_CTX and SSL objects respectively. This
51 functions will only accept a value in the range 512 - SSL3_RT_MAX_PLAIN_LENGTH.
56 used (i.e. normal non-parallel operation). The number of pipelines set must be
57 in the range 1 - SSL_MAX_PIPELINES (32). Setting this to a value > 1 will also
68 B<split_send_fragment>.
70 For example if B<split_send_fragment> is set to 2000 and B<max_pipelines> is 4
73 SSL_write/SSL_write_ex called with 0-2000 bytes == 1 pipeline used
75 SSL_write/SSL_write_ex called with 2001-4000 bytes == 2 pipelines used
[all …]
H A DSSL_key_update.pod10 - initiate and obtain information about updating connection keys
26 If the B<updatetype> parameter is set to B<SSL_KEY_UPDATE_NOT_REQUESTED> then
28 informed of the change. If the B<updatetype> parameter is set to
29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be
31 peer to additionally update its sending keys. It is an error if B<updatetype> is
32 set to B<SSL_KEY_UPDATE_NONE>.
50 When called from the client side, SSL_renegotiate() schedules a completely new
60 When called from the client side, SSL_renegotiate_abbreviated() works in the
64 When called from the server side, SSL_renegotiate() and
67 performed then the same checks as on the client side are performed and then, if
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSRP_Calc_B.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH SRP_CALC_B 3ossl 2025-09-30 3.5.4 OpenSSL
74 \&\- SRP authentication primitives
86 \& /* server side .... */
88 \& const BIGNUM *b, const BIGNUM *N);
89 \& BIGNUM *SRP_Calc_B_ex(const BIGNUM *b, const BIGNUM *N, const BIGNUM *g,
91 \& BIGNUM *SRP_Calc_B(const BIGNUM *b, const BIGNUM *N, const BIGNUM *g,
94 \& BIGNUM *SRP_Calc_u_ex(const BIGNUM *A, const BIGNUM *B, const BIGNUM *N,
96 \& BIGNUM *SRP_Calc_u(const BIGNUM *A, const BIGNUM *B, const BIGNUM *N);
98 \& /* client side .... */
[all …]
/freebsd/usr.bin/sdiff/
H A Dsdiff.111 .Nd side-by-side diff
22 displays two files side by side,
39 .Bl -tag -width Ds
40 .It Fl l -left-column
42 .It Fl o -output Ar outfile
58 .Bl -tag -width Ds
75 .It Cm e Cm b
81 .It Fl s -suppress-common-lines
83 .It Fl w -width Ar width
93 .Bl -tag -width Ds
[all …]
/freebsd/contrib/bmake/unit-tests/
H A Ddotwait.mk11 # Ignore "--- target ---" lines printed by parallel make.
14 @${.MAKE} -f ${THISMAKEFILE} -j4 $t 2>&1 | grep -v "^--- "
18 # Within each test, the names of the sub-targets follow these
22 # such as ".a" or ".b".
29 # of their own name, in which alphabetic components like ".a" or ".b"
34 PARALLEL_TARG= ${.TARGET:C/\.[a-z]/.*/g:Q}
43 # recursive: all children of the left hand side of the .WAIT
44 # must be made before any child of the right hand side.
46 recursive.1.99: recursive.1.1.a recursive.1.1.b _ECHOUSE
47 recursive.2.99: recursive.2.1.a recursive.2.1.b _ECHOUSE
[all …]
/freebsd/sys/contrib/device-tree/Bindings/mailbox/
H A Dfsl,mu.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Dong Aisheng <aisheng.dong@nxp.com>
19 different clocks (from each side of the different peripheral buses).
20 Therefore, the MU must synchronize the accesses from one side to the
22 registers (Processor A-facing, Processor B-facing).
27 - const: fsl,imx6sx-mu
28 - const: fsl,imx7ulp-mu
29 - const: fsl,imx8ulp-mu
[all …]
/freebsd/contrib/diff/man/
H A Dsdiff.14 sdiff \- side-by-side merge of file differences
9 Side-by-side merge of file differences.
11 \fB\-o\fR FILE \fB\-\-output\fR=\fIFILE\fR
14 \fB\-i\fR \fB\-\-ignore\-case\fR
15 Consider upper- and lower-case to be the same.
17 \fB\-E\fR \fB\-\-ignore\-tab\-expansion\fR
20 \fB\-b\fR \fB\-\-ignore\-space\-change\fR
23 \fB\-W\fR \fB\-\-ignore\-all\-space\fR
26 \fB\-B\fR \fB\-\-ignore\-blank\-lines\fR
29 \fB\-I\fR RE \fB\-\-ignore\-matching\-lines\fR=\fIRE\fR
[all …]
/freebsd/contrib/llvm-project/lldb/include/lldb/Symbol/
H A DLineEntry.h1 //===-- LineEntry.h ---------------------------------------------*- C++ -*-===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
15 #include "lldb/lldb-private.h"
41 /// If \b true, display the filename with the line entry which
49 /// Returns \b true if the address was able to be displayed
52 /// Returns \b false if the address was not able to be properly
69 /// Returns \b true if the file and line were properly dumped,
70 /// \b false otherwise.
76 /// Returns \b true if the line entry contains a valid section
[all …]

12345678910>>...45