| /freebsd/tests/sys/net/ |
| H A D | if_wg.sh | 74 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/32 80 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/32 142 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/128,${testnet} 148 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/128,${testnet} 217 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/32,${tunnel4}/32 223 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/32,${tunnel3}/32 290 allowed-ips "${tunnel1}/32" 333 allowed-ips "${tunnel1}/32" 389 endpoint 127.0.0.1:12346 allowed-ips ${tunnel2}/32 395 endpoint 127.0.0.1:12345 allowed-ips ${tunnel1}/32 [all …]
|
| /freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
| H A D | OpenACCKinds.h | 165 /// 'finalize' clause, allowed on 'exit data' directive. 167 /// 'if_present' clause, allowed on 'host_data' and 'update' directives. 169 /// 'seq' clause, allowed on 'loop' and 'routine' directives. 171 /// 'independent' clause, allowed on 'loop' directives. 173 /// 'auto' clause, allowed on 'loop' directives. 175 /// 'worker' clause, allowed on 'loop', Combined, and 'routine' directives. 177 /// 'vector' clause, allowed on 'loop', Combined, and 'routine' directives. 179 /// 'nohost' clause, allowed on 'routine' directives. 181 /// 'default' clause, allowed on parallel, serial, kernel (and compound) 184 /// 'if' clause, allowed on all the Compute Constructs, Data Constructs, [all …]
|
| /freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
| H A D | sm8750-qrd.dts | 247 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 257 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 267 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 277 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 287 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 297 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 307 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 317 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 327 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 337 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
| H A D | sm8750-mtp.dts | 245 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 255 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 265 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 275 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 285 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 295 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 306 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 316 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 326 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 336 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
| H A D | qcs8300-ride.dts | 62 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 72 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 82 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 92 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 102 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 112 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 122 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 144 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 154 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 164 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
| H A D | sm8650-mtp.dts | 142 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 152 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 162 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 179 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 189 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 199 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 209 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 219 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 229 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 239 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
| H A D | qcs615-ride.dts | 91 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 101 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 111 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 121 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 131 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 141 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 151 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 161 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 171 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 181 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
| H A D | sm8550-hdk.dts | 382 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 392 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 402 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 412 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 422 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 432 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 442 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 452 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 462 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 472 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
| H A D | sm8650-qrd.dts | 308 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 318 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 328 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 345 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 355 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 365 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 375 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 385 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 395 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 405 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/regulator/ |
| H A D | mt6360-regulator.yaml | 52 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 60 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 68 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 75 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 82 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 89 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 96 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 103 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
| H A D | richtek,rtq2208.yaml | 16 Bucks support "regulator-allowed-modes" and "regulator-mode". The former defines the permitted 63 regulator-allowed-modes: 109 regulator-allowed-modes = <0 1>; 119 regulator-allowed-modes = <0 1>; 129 regulator-allowed-modes = <0 1>; 139 regulator-allowed-modes = <0 1>; 149 regulator-allowed-modes = <0 1>; 159 regulator-allowed-modes = <0 1>; 169 regulator-allowed-modes = <0 1>; 179 regulator-allowed-modes = <0 1>;
|
| /freebsd/lib/libsys/ |
| H A D | cap_ioctls_limit.2 | 34 .Nd manage allowed ioctl commands 46 capability right, the list of allowed 64 The list of allowed ioctl commands for a given file descriptor can be obtained 75 elements, but always returns the total number of ioctl commands allowed for the 86 If all ioctl commands are allowed 102 function, if successful, returns the total number of allowed ioctl commands or 105 if all ioctls commands are allowed. 140 would expand the list of allowed
|
| /freebsd/contrib/llvm-project/clang/lib/ASTMatchers/Dynamic/ |
| H A D | Marshallers.cpp | 17 getBestGuess(llvm::StringRef Search, llvm::ArrayRef<llvm::StringRef> Allowed, in getBestGuess() argument 22 for (const llvm::StringRef &Item : Allowed) { in getBestGuess() 39 for (const llvm::StringRef &Item : Allowed) { in getBestGuess() 65 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local 70 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "attr::"); in getBestGuess() 77 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local 82 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "CK_"); in getBestGuess() 89 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local 95 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "OMPC_"); in getBestGuess() 102 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local [all …]
|
| /freebsd/lib/libutil/ |
| H A D | login.conf.5 | 125 With a numeric type, only one numeric value is allowed. 299 allowed before the backoff delay is inserted after each subsequent 305 allowed before the login fails. 320 logins are allowed. 360 are allowed. 362 any of the items in that list are allowed to log in. 371 in a class are allowed to be logged in. 376 If both of these time lists are empty, users in the class are allowed access at 380 is specified, then logins are only allowed during the periods given. 390 enforces only that the actual login falls within periods allowed b [all...] |
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_dsa.txt | 271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode 279 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 287 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 294 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 301 # Test sign with a 2048 bit SHA3 is allowed in fips mode 308 # Test verify with a 1024 bit key is allowed in fips mode 314 # Test verify with SHA1 is allowed in fips mode 320 # Test verify with a 2048/160 bit key is allowed in fips mode 329 # Test sign with a 1024 bit key is not allowed in fips mode 337 # Test sign with SHA1 is not allowed in fips mode [all …]
|
| H A D | evppkey_ecdsa.txt | 164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying 170 # Test that a nist curve with SHA3 is allowed in fips mode 177 # Test that a explicit curve that is a named curve is allowed in fips mode 185 # Test that a explicit curve is not allowed in fips mode 192 # Test that a curve with < 112 bits is not allowed in fips mode for signing 200 # Test that a non nist curve is not allowed in fips mode 208 # Test that SHA1 is not allowed in fips mode for signing 216 # Test that SHA1 is not allowed in fips mode for signing 244 # Test that SHA1 is not allowed in fips mode for signing 254 # Test that SHA1 is not allowed in fips mode for signing
|
| H A D | evppkey_dsa_sigalg.txt | 272 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode 280 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 288 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 295 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 302 # Test sign with a 2048 bit SHA3 is allowed in fips mode 309 # Test verify with a 1024 bit key is allowed in fips mode 315 # Test verify with SHA1 is allowed in fips mode 321 # Test verify with a 2048/160 bit key is allowed in fips mode 329 # Test sign with a 1024 bit key is not allowed in fips mode 337 # Test sign with SHA1 is not allowed in fips mode [all …]
|
| H A D | evppkey_ecdsa_sigalg.txt | 163 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying 169 # Test that a nist curve with SHA3 is allowed in fips mode 176 # Test that a explicit curve that is a named curve is allowed in fips mode 184 # Test that a explicit curve is not allowed in fips mode 191 # Test that a curve with < 112 bits is not allowed in fips mode for signing 199 # Test that a non nist curve is not allowed in fips mode 207 # Test that SHA1 is not allowed in fips mode for signing 215 # Test that SHA1 is not allowed in fips mode for signing 243 # Test that SHA1 is not allowed in fips mode for signing 253 # Test that SHA1 is not allowed in fips mode for signing
|
| /freebsd/crypto/openssh/regress/ |
| H A D | allow-deny-users.sh | 37 test_auth "$other $me" "" false "user in DenyUsers allowed" 38 test_auth "$me $other" "" false "user in DenyUsers allowed" 39 test_auth "" "$other" false "user not in AllowUsers allowed" 42 …st_auth "$me $other" "$me $other" false "user in both DenyUsers and AllowUsers allowed" 43 …st_auth "$other $me" "$other $me" false "user in both DenyUsers and AllowUsers allowed"
|
| /freebsd/crypto/openssl/doc/designs/ |
| H A D | fips_indicator.md | 27 …ded a table in their security policy called ‘Non-Approved Algorithms not allowed in the approved m… 274 - DES_EDE3_ECB. Disallowed for encryption, allowed for legacy decryption 275 - DSA. Keygen and Signing are no longer approved, verify is still allowed. 280 - RSA encryption(for key agreement/key transport) using PKCSV15 is no longer allowed. (Note that th… 282 - RSA signing using PKCS1 is still allowed (i.e. signature uses shaXXXWithRSAEncryption) 283 …allowed. (Still allowed for verification). Check if PSS saltlen needs a indicator (Note FIPS 186-4… 284 …t according to the (IG section C.F) that fips 186-2 verification is also allowed (So this may need… 286 - ECDSA Verify using prehashed message is not allowed. 293 - TLS_1_3_KDF (Only SHA256 and SHA384 Are allowed due to RFC 8446 Appendix B.4) 294 - TLS1_PRF (Only SHA256,SHA384,SHA512 are allowed) [all …]
|
| /freebsd/contrib/llvm-project/llvm/include/llvm/Frontend/Directive/ |
| H A D | DirectiveBase.td | 47 // EnumSet class name used for clauses to generated the allowed clauses map. 89 // Name of enum when there is a list of allowed clause values. 92 // List of allowed clause values 154 // Other combinations are not allowed. 180 // Clauses cannot appear twice in the three allowed lists below. Also, since 181 // required implies allowed, the same clause cannot appear in both the 184 // List of allowed clauses for the directive. 187 // List of clauses that are allowed to appear only once. 190 // List of clauses that are allowed but mutually exclusive.
|
| /freebsd/sys/contrib/device-tree/Bindings/mfd/ |
| H A D | mediatek,mt6360.yaml | 150 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 158 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 166 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 173 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 180 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 187 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 194 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 201 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
| H A D | richtek,rt5120.yaml | 74 regulator-allowed-modes: 76 Used to specify the allowed buck converter operating mode 137 regulator-allowed-modes = <0 1>; 144 regulator-allowed-modes = <0 1>; 151 regulator-allowed-modes = <0 1>; 158 regulator-allowed-modes = <0 1>;
|
| /freebsd/lib/libcasper/services/cap_net/ |
| H A D | cap_net.3 | 129 CAPNET_ADDR2NAME reverse DNS lookups are allowed with 131 CAPNET_NAME2ADDR name resolution is allowed with 133 CAPNET_DEPRECATED_ADDR2NAME reverse DNS lookups are allowed with 135 CAPNET_DEPRECATED_NAME2ADDR name resolution is allowed with 137 CAPNET_BIND bind syscall is allowed 138 CAPNET_CONNECT connect syscall is allowed 139 CAPNET_CONNECTDNS connect syscall is allowed to the values
|
| /freebsd/contrib/wireguard-tools/man/ |
| H A D | wg.8 | 39 …\fIfwmark\fP | \fIpeers\fP | \fIpreshared-keys\fP | \fIendpoints\fP | \fIallowed-ips\fP | \fIlates… 51 by tab: public-key, preshared-key, endpoint, allowed-ips, latest-handshake, 58 …ip>:<port>\fP] [\fIpersistent-keepalive\fP \fI<interval seconds>\fP] [\fIallowed-ips\fP \fI[+|-]<i… 74 If \fIallowed-ips\fP is specified, but the value is the empty string, all 75 allowed ips are removed from the peer. By default, \fIallowed-ips\fP replaces 76 a peer's allowed ips. If + or - is prepended to any of the ips then 78 allowed ips if not present while ips prefixed with '-' are removed if present. 159 CIDR masks from which incoming traffic for this peer is allowed and to
|