/freebsd/tests/sys/net/ |
H A D | if_wg.sh | 74 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/32 80 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/32 142 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/128,${testnet} 148 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/128,${testnet} 217 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/32,${tunnel4}/32 223 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/32,${tunnel3}/32 290 allowed-ips "${tunnel1}/32" 333 allowed-ips "${tunnel1}/32" 389 endpoint 127.0.0.1:12346 allowed-ips ${tunnel2}/32 395 endpoint 127.0.0.1:12345 allowed-ips ${tunnel1}/32 [all …]
|
/freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
H A D | OpenACCKinds.h | 165 /// 'finalize' clause, allowed on 'exit data' directive. 167 /// 'if_present' clause, allowed on 'host_data' and 'update' directives. 169 /// 'seq' clause, allowed on 'loop' and 'routine' directives. 171 /// 'independent' clause, allowed on 'loop' directives. 173 /// 'auto' clause, allowed on 'loop' directives. 175 /// 'worker' clause, allowed on 'loop', Combined, and 'routine' directives. 177 /// 'vector' clause, allowed on 'loop', Combined, and 'routine' directives. 179 /// 'nohost' clause, allowed on 'routine' directives. 181 /// 'default' clause, allowed on parallel, serial, kernel (and compound) 184 /// 'if' clause, allowed on all the Compute Constructs, Data Constructs, [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/regulator/ |
H A D | mt6360-regulator.yaml | 52 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 60 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 68 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 75 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 82 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 89 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 96 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 103 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
H A D | richtek,rtq2208.yaml | 16 Bucks support "regulator-allowed-modes" and "regulator-mode". The former defines the permitted 63 regulator-allowed-modes: 108 regulator-allowed-modes = <0 1>; 118 regulator-allowed-modes = <0 1>; 128 regulator-allowed-modes = <0 1>; 138 regulator-allowed-modes = <0 1>; 148 regulator-allowed-modes = <0 1>; 158 regulator-allowed-modes = <0 1>; 168 regulator-allowed-modes = <0 1>; 178 regulator-allowed-modes = <0 1>;
|
/freebsd/lib/libsys/ |
H A D | cap_ioctls_limit.2 | 34 .Nd manage allowed ioctl commands 46 capability right, the list of allowed 64 The list of allowed ioctl commands for a given file descriptor can be obtained 75 elements, but always returns the total number of ioctl commands allowed for the 86 If all ioctl commands are allowed 102 function, if successful, returns the total number of allowed ioctl commands or 105 if all ioctls commands are allowed. 140 would expand the list of allowed
|
H A D | getrlimit.2 | 59 allowed to map. 75 The maximum number of kqueues this user id is allowed to create. 86 The maximum number of pseudo-terminals this user id is allowed to create. 89 that this user id is allowed to consume. 137 A program that exceeds the soft limit is allowed to continue execution until it 195 When most operations would allocate more virtual memory than allowed by the 202 If stack extension would allocate more virtual memory than allowed by the soft
|
/freebsd/contrib/llvm-project/clang/lib/ASTMatchers/Dynamic/ |
H A D | Marshallers.cpp | 17 getBestGuess(llvm::StringRef Search, llvm::ArrayRef<llvm::StringRef> Allowed, in getBestGuess() argument 22 for (const llvm::StringRef &Item : Allowed) { in getBestGuess() 39 for (const llvm::StringRef &Item : Allowed) { in getBestGuess() 65 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local 70 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "attr::"); in getBestGuess() 77 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local 82 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "CK_"); in getBestGuess() 89 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local 95 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "OMPC_"); in getBestGuess() 102 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local [all …]
|
/freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
H A D | sm8650-mtp.dts | 142 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 152 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 162 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 179 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 189 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 199 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 209 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 219 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 229 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 239 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
H A D | sm8550-hdk.dts | 382 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 392 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 402 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 412 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 422 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 432 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 442 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 452 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 462 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 472 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
H A D | sa8775p-ride.dtsi | 64 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 74 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 84 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 94 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 104 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 114 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 129 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 139 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 149 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 171 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
H A D | sm8650-qrd.dts | 308 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 318 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 328 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 345 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 355 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 365 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 375 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 385 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 395 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 405 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
/freebsd/lib/libutil/ |
H A D | login.conf.5 | 125 With a numeric type, only one numeric value is allowed. 299 allowed before the backoff delay is inserted after each subsequent 305 allowed before the login fails. 320 logins are allowed. 360 are allowed. 362 any of the items in that list are allowed to log in. 371 in a class are allowed to be logged in. 376 If both of these time lists are empty, users in the class are allowed access at 380 is specified, then logins are only allowed during the periods given. 390 enforces only that the actual login falls within periods allowed b [all...] |
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_dsa.txt | 271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode 279 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 287 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 294 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 301 # Test sign with a 2048 bit SHA3 is allowed in fips mode 308 # Test verify with a 1024 bit key is allowed in fips mode 314 # Test verify with SHA1 is allowed in fips mode 320 # Test verify with a 2048/160 bit key is allowed in fips mode 329 # Test sign with a 1024 bit key is not allowed in fips mode 337 # Test sign with SHA1 is not allowed in fips mode [all …]
|
H A D | evppkey_ecdsa.txt | 164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying 170 # Test that a nist curve with SHA3 is allowed in fips mode 177 # Test that a explicit curve that is a named curve is allowed in fips mode 185 # Test that a explicit curve is not allowed in fips mode 192 # Test that a curve with < 112 bits is not allowed in fips mode for signing 200 # Test that a non nist curve is not allowed in fips mode 208 # Test that SHA1 is not allowed in fips mode for signing 216 # Test that SHA1 is not allowed in fips mode for signing 244 # Test that SHA1 is not allowed in fips mode for signing 254 # Test that SHA1 is not allowed in fips mode for signing
|
H A D | evppkey_dsa_sigalg.txt | 272 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode 280 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 288 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 295 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 302 # Test sign with a 2048 bit SHA3 is allowed in fips mode 309 # Test verify with a 1024 bit key is allowed in fips mode 315 # Test verify with SHA1 is allowed in fips mode 321 # Test verify with a 2048/160 bit key is allowed in fips mode 329 # Test sign with a 1024 bit key is not allowed in fips mode 337 # Test sign with SHA1 is not allowed in fips mode [all …]
|
H A D | evppkey_ecdsa_sigalg.txt | 163 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying 169 # Test that a nist curve with SHA3 is allowed in fips mode 176 # Test that a explicit curve that is a named curve is allowed in fips mode 184 # Test that a explicit curve is not allowed in fips mode 191 # Test that a curve with < 112 bits is not allowed in fips mode for signing 199 # Test that a non nist curve is not allowed in fips mode 207 # Test that SHA1 is not allowed in fips mode for signing 215 # Test that SHA1 is not allowed in fips mode for signing 243 # Test that SHA1 is not allowed in fips mode for signing 253 # Test that SHA1 is not allowed in fips mode for signing
|
/freebsd/crypto/openssh/regress/ |
H A D | allow-deny-users.sh | 37 test_auth "$other $me" "" false "user in DenyUsers allowed" 38 test_auth "$me $other" "" false "user in DenyUsers allowed" 39 test_auth "" "$other" false "user not in AllowUsers allowed" 42 …st_auth "$me $other" "$me $other" false "user in both DenyUsers and AllowUsers allowed" 43 …st_auth "$other $me" "$other $me" false "user in both DenyUsers and AllowUsers allowed"
|
/freebsd/crypto/openssl/doc/designs/ |
H A D | fips_indicator.md | 27 …ded a table in their security policy called ‘Non-Approved Algorithms not allowed in the approved m… 274 - DES_EDE3_ECB. Disallowed for encryption, allowed for legacy decryption 275 - DSA. Keygen and Signing are no longer approved, verify is still allowed. 280 - RSA encryption(for key agreement/key transport) using PKCSV15 is no longer allowed. (Note that th… 282 - RSA signing using PKCS1 is still allowed (i.e. signature uses shaXXXWithRSAEncryption) 283 …allowed. (Still allowed for verification). Check if PSS saltlen needs a indicator (Note FIPS 186-4… 284 …t according to the (IG section C.F) that fips 186-2 verification is also allowed (So this may need… 286 - ECDSA Verify using prehashed message is not allowed. 293 - TLS_1_3_KDF (Only SHA256 and SHA384 Are allowed due to RFC 8446 Appendix B.4) 294 - TLS1_PRF (Only SHA256,SHA384,SHA512 are allowed) [all …]
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Frontend/Directive/ |
H A D | DirectiveBase.td | 47 // EnumSet class name used for clauses to generated the allowed clauses map. 89 // Name of enum when there is a list of allowed clause values. 92 // List of allowed clause values 154 // Other combinations are not allowed. 180 // Clauses cannot appear twice in the three allowed lists below. Also, since 181 // required implies allowed, the same clause cannot appear in both the 184 // List of allowed clauses for the directive. 187 // List of clauses that are allowed to appear only once. 190 // List of clauses that are allowed but mutually exclusive.
|
/freebsd/sys/contrib/device-tree/Bindings/mfd/ |
H A D | mediatek,mt6360.yaml | 150 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 158 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 166 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 173 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 180 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 187 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 194 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 201 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
H A D | richtek,rt5120.yaml | 74 regulator-allowed-modes: 76 Used to specify the allowed buck converter operating mode 137 regulator-allowed-modes = <0 1>; 144 regulator-allowed-modes = <0 1>; 151 regulator-allowed-modes = <0 1>; 158 regulator-allowed-modes = <0 1>;
|
/freebsd/lib/libcasper/services/cap_net/ |
H A D | cap_net.3 | 129 CAPNET_ADDR2NAME reverse DNS lookups are allowed with 131 CAPNET_NAME2ADDR name resolution is allowed with 133 CAPNET_DEPRECATED_ADDR2NAME reverse DNS lookups are allowed with 135 CAPNET_DEPRECATED_NAME2ADDR name resolution is allowed with 137 CAPNET_BIND bind syscall is allowed 138 CAPNET_CONNECT connect syscall is allowed 139 CAPNET_CONNECTDNS connect syscall is allowed to the values
|
/freebsd/contrib/wireguard-tools/man/ |
H A D | wg.8 | 39 …\fIfwmark\fP | \fIpeers\fP | \fIpreshared-keys\fP | \fIendpoints\fP | \fIallowed-ips\fP | \fIlates… 51 by tab: public-key, preshared-key, endpoint, allowed-ips, latest-handshake, 58 …ip>:<port>\fP] [\fIpersistent-keepalive\fP \fI<interval seconds>\fP] [\fIallowed-ips\fP \fI[+|-]<i… 74 If \fIallowed-ips\fP is specified, but the value is the empty string, all 75 allowed ips are removed from the peer. By default, \fIallowed-ips\fP replaces 76 a peer's allowed ips. If + or - is prepended to any of the ips then 78 allowed ips if not present while ips prefixed with '-' are removed if present. 159 CIDR masks from which incoming traffic for this peer is allowed and to
|
/freebsd/share/man/man4/ |
H A D | wg.4 | 85 .It Allowed IP addresses 91 These functions reference a set of allowed IP address ranges configured 95 with the most specific matching allowed IP address range, or drop it 99 configured with the most specific matching allowed IP address range 160 Connect to a specific endpoint using its public-key and set the allowed IP address 162 # wg set wg0 peer '7lWtsDdqaGB3EY9WNxRN3hVaHMtu1zXw71+bOjNOVUw=' endpoint 10.0.1.100:54321 allowed-… 199 is not assigned to the allowed IPs of Peer X.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_max_cert_list.pod | 5 …max_cert_list, SSL_set_max_cert_list, SSL_get_max_cert_list - manipulate allowed size for the peer… 19 SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's 26 SSL_set_max_cert_list() sets the maximum size allowed for the peer's 48 chain size allowed to be sent by the peer, see e.g. the work on 57 If the maximum certificate chain size allowed is exceeded, the handshake will
|