Home
last modified time | relevance | path

Searched full:allowed (Results 1 – 25 of 3362) sorted by relevance

12345678910>>...135

/freebsd/tests/sys/net/
H A Dif_wg.sh74 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/32
80 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/32
142 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/128,${testnet}
148 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/128,${testnet}
217 endpoint ${endpoint2}:12345 allowed-ips ${tunnel2}/32,${tunnel4}/32
223 endpoint ${endpoint1}:12345 allowed-ips ${tunnel1}/32,${tunnel3}/32
290 allowed-ips "${tunnel1}/32"
333 allowed-ips "${tunnel1}/32"
389 endpoint 127.0.0.1:12346 allowed-ips ${tunnel2}/32
395 endpoint 127.0.0.1:12345 allowed-ips ${tunnel1}/32
[all …]
/freebsd/contrib/llvm-project/clang/include/clang/Basic/
H A DOpenACCKinds.h165 /// 'finalize' clause, allowed on 'exit data' directive.
167 /// 'if_present' clause, allowed on 'host_data' and 'update' directives.
169 /// 'seq' clause, allowed on 'loop' and 'routine' directives.
171 /// 'independent' clause, allowed on 'loop' directives.
173 /// 'auto' clause, allowed on 'loop' directives.
175 /// 'worker' clause, allowed on 'loop', Combined, and 'routine' directives.
177 /// 'vector' clause, allowed on 'loop', Combined, and 'routine' directives.
179 /// 'nohost' clause, allowed on 'routine' directives.
181 /// 'default' clause, allowed on parallel, serial, kernel (and compound)
184 /// 'if' clause, allowed on all the Compute Constructs, Data Constructs,
[all …]
/freebsd/sys/contrib/device-tree/Bindings/regulator/
H A Dmt6360-regulator.yaml52 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
60 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
68 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
75 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
82 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
89 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
96 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
103 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
H A Drichtek,rtq2208.yaml16 Bucks support "regulator-allowed-modes" and "regulator-mode". The former defines the permitted
63 regulator-allowed-modes:
108 regulator-allowed-modes = <0 1>;
118 regulator-allowed-modes = <0 1>;
128 regulator-allowed-modes = <0 1>;
138 regulator-allowed-modes = <0 1>;
148 regulator-allowed-modes = <0 1>;
158 regulator-allowed-modes = <0 1>;
168 regulator-allowed-modes = <0 1>;
178 regulator-allowed-modes = <0 1>;
/freebsd/lib/libsys/
H A Dcap_ioctls_limit.234 .Nd manage allowed ioctl commands
46 capability right, the list of allowed
64 The list of allowed ioctl commands for a given file descriptor can be obtained
75 elements, but always returns the total number of ioctl commands allowed for the
86 If all ioctl commands are allowed
102 function, if successful, returns the total number of allowed ioctl commands or
105 if all ioctls commands are allowed.
140 would expand the list of allowed
H A Dgetrlimit.259 allowed to map.
75 The maximum number of kqueues this user id is allowed to create.
86 The maximum number of pseudo-terminals this user id is allowed to create.
89 that this user id is allowed to consume.
137 A program that exceeds the soft limit is allowed to continue execution until it
195 When most operations would allocate more virtual memory than allowed by the
202 If stack extension would allocate more virtual memory than allowed by the soft
/freebsd/contrib/llvm-project/clang/lib/ASTMatchers/Dynamic/
H A DMarshallers.cpp17 getBestGuess(llvm::StringRef Search, llvm::ArrayRef<llvm::StringRef> Allowed, in getBestGuess() argument
22 for (const llvm::StringRef &Item : Allowed) { in getBestGuess()
39 for (const llvm::StringRef &Item : Allowed) { in getBestGuess()
65 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local
70 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "attr::"); in getBestGuess()
77 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local
82 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "CK_"); in getBestGuess()
89 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local
95 return ::getBestGuess(Value.getString(), llvm::ArrayRef(Allowed), "OMPC_"); in getBestGuess()
102 static constexpr llvm::StringRef Allowed[] = { in getBestGuess() local
[all …]
/freebsd/sys/contrib/device-tree/src/arm64/qcom/
H A Dsm8650-mtp.dts142 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
152 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
162 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
179 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
189 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
199 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
209 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
219 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
229 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
239 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
[all …]
H A Dsm8550-hdk.dts382 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
392 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
402 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
412 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
422 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
432 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
442 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
452 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
462 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
472 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
[all …]
H A Dsa8775p-ride.dtsi64 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
74 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
84 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
94 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
104 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
114 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
129 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
139 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
149 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
171 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
[all …]
H A Dsm8650-qrd.dts308 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
318 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
328 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
345 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
355 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
365 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
375 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
385 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
395 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
405 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM
[all …]
/freebsd/lib/libutil/
H A Dlogin.conf.5125 With a numeric type, only one numeric value is allowed.
299 allowed before the backoff delay is inserted after each subsequent
305 allowed before the login fails.
320 logins are allowed.
360 are allowed.
362 any of the items in that list are allowed to log in.
371 in a class are allowed to be logged in.
376 If both of these time lists are empty, users in the class are allowed access at
380 is specified, then logins are only allowed during the periods given.
390 enforces only that the actual login falls within periods allowed b
[all...]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_dsa.txt271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
279 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
287 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
294 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
301 # Test sign with a 2048 bit SHA3 is allowed in fips mode
308 # Test verify with a 1024 bit key is allowed in fips mode
314 # Test verify with SHA1 is allowed in fips mode
320 # Test verify with a 2048/160 bit key is allowed in fips mode
329 # Test sign with a 1024 bit key is not allowed in fips mode
337 # Test sign with SHA1 is not allowed in fips mode
[all …]
H A Devppkey_ecdsa.txt164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
170 # Test that a nist curve with SHA3 is allowed in fips mode
177 # Test that a explicit curve that is a named curve is allowed in fips mode
185 # Test that a explicit curve is not allowed in fips mode
192 # Test that a curve with < 112 bits is not allowed in fips mode for signing
200 # Test that a non nist curve is not allowed in fips mode
208 # Test that SHA1 is not allowed in fips mode for signing
216 # Test that SHA1 is not allowed in fips mode for signing
244 # Test that SHA1 is not allowed in fips mode for signing
254 # Test that SHA1 is not allowed in fips mode for signing
H A Devppkey_dsa_sigalg.txt272 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
280 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
288 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
295 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
302 # Test sign with a 2048 bit SHA3 is allowed in fips mode
309 # Test verify with a 1024 bit key is allowed in fips mode
315 # Test verify with SHA1 is allowed in fips mode
321 # Test verify with a 2048/160 bit key is allowed in fips mode
329 # Test sign with a 1024 bit key is not allowed in fips mode
337 # Test sign with SHA1 is not allowed in fips mode
[all …]
H A Devppkey_ecdsa_sigalg.txt163 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
169 # Test that a nist curve with SHA3 is allowed in fips mode
176 # Test that a explicit curve that is a named curve is allowed in fips mode
184 # Test that a explicit curve is not allowed in fips mode
191 # Test that a curve with < 112 bits is not allowed in fips mode for signing
199 # Test that a non nist curve is not allowed in fips mode
207 # Test that SHA1 is not allowed in fips mode for signing
215 # Test that SHA1 is not allowed in fips mode for signing
243 # Test that SHA1 is not allowed in fips mode for signing
253 # Test that SHA1 is not allowed in fips mode for signing
/freebsd/crypto/openssh/regress/
H A Dallow-deny-users.sh37 test_auth "$other $me" "" false "user in DenyUsers allowed"
38 test_auth "$me $other" "" false "user in DenyUsers allowed"
39 test_auth "" "$other" false "user not in AllowUsers allowed"
42 …st_auth "$me $other" "$me $other" false "user in both DenyUsers and AllowUsers allowed"
43 …st_auth "$other $me" "$other $me" false "user in both DenyUsers and AllowUsers allowed"
/freebsd/crypto/openssl/doc/designs/
H A Dfips_indicator.md27 …ded a table in their security policy called ‘Non-Approved Algorithms not allowed in the approved m…
274 - DES_EDE3_ECB. Disallowed for encryption, allowed for legacy decryption
275 - DSA. Keygen and Signing are no longer approved, verify is still allowed.
280 - RSA encryption(for key agreement/key transport) using PKCSV15 is no longer allowed. (Note that th…
282 - RSA signing using PKCS1 is still allowed (i.e. signature uses shaXXXWithRSAEncryption)
283allowed. (Still allowed for verification). Check if PSS saltlen needs a indicator (Note FIPS 186-4…
284 …t according to the (IG section C.F) that fips 186-2 verification is also allowed (So this may need…
286 - ECDSA Verify using prehashed message is not allowed.
293 - TLS_1_3_KDF (Only SHA256 and SHA384 Are allowed due to RFC 8446 Appendix B.4)
294 - TLS1_PRF (Only SHA256,SHA384,SHA512 are allowed)
[all …]
/freebsd/contrib/llvm-project/llvm/include/llvm/Frontend/Directive/
H A DDirectiveBase.td47 // EnumSet class name used for clauses to generated the allowed clauses map.
89 // Name of enum when there is a list of allowed clause values.
92 // List of allowed clause values
154 // Other combinations are not allowed.
180 // Clauses cannot appear twice in the three allowed lists below. Also, since
181 // required implies allowed, the same clause cannot appear in both the
184 // List of allowed clauses for the directive.
187 // List of clauses that are allowed to appear only once.
190 // List of clauses that are allowed but mutually exclusive.
/freebsd/sys/contrib/device-tree/Bindings/mfd/
H A Dmediatek,mt6360.yaml150 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
158 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
166 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
173 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
180 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
187 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
194 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
201 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
H A Drichtek,rt5120.yaml74 regulator-allowed-modes:
76 Used to specify the allowed buck converter operating mode
137 regulator-allowed-modes = <0 1>;
144 regulator-allowed-modes = <0 1>;
151 regulator-allowed-modes = <0 1>;
158 regulator-allowed-modes = <0 1>;
/freebsd/lib/libcasper/services/cap_net/
H A Dcap_net.3129 CAPNET_ADDR2NAME reverse DNS lookups are allowed with
131 CAPNET_NAME2ADDR name resolution is allowed with
133 CAPNET_DEPRECATED_ADDR2NAME reverse DNS lookups are allowed with
135 CAPNET_DEPRECATED_NAME2ADDR name resolution is allowed with
137 CAPNET_BIND bind syscall is allowed
138 CAPNET_CONNECT connect syscall is allowed
139 CAPNET_CONNECTDNS connect syscall is allowed to the values
/freebsd/contrib/wireguard-tools/man/
H A Dwg.839 …\fIfwmark\fP | \fIpeers\fP | \fIpreshared-keys\fP | \fIendpoints\fP | \fIallowed-ips\fP | \fIlates…
51 by tab: public-key, preshared-key, endpoint, allowed-ips, latest-handshake,
58 …ip>:<port>\fP] [\fIpersistent-keepalive\fP \fI<interval seconds>\fP] [\fIallowed-ips\fP \fI[+|-]<i…
74 If \fIallowed-ips\fP is specified, but the value is the empty string, all
75 allowed ips are removed from the peer. By default, \fIallowed-ips\fP replaces
76 a peer's allowed ips. If + or - is prepended to any of the ips then
78 allowed ips if not present while ips prefixed with '-' are removed if present.
159 CIDR masks from which incoming traffic for this peer is allowed and to
/freebsd/share/man/man4/
H A Dwg.485 .It Allowed IP addresses
91 These functions reference a set of allowed IP address ranges configured
95 with the most specific matching allowed IP address range, or drop it
99 configured with the most specific matching allowed IP address range
160 Connect to a specific endpoint using its public-key and set the allowed IP address
162 # wg set wg0 peer '7lWtsDdqaGB3EY9WNxRN3hVaHMtu1zXw71+bOjNOVUw=' endpoint 10.0.1.100:54321 allowed-…
199 is not assigned to the allowed IPs of Peer X.
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_max_cert_list.pod5 …max_cert_list, SSL_set_max_cert_list, SSL_get_max_cert_list - manipulate allowed size for the peer…
19 SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's
26 SSL_set_max_cert_list() sets the maximum size allowed for the peer's
48 chain size allowed to be sent by the peer, see e.g. the work on
57 If the maximum certificate chain size allowed is exceeded, the handshake will

12345678910>>...135