/freebsd/sys/contrib/device-tree/include/dt-bindings/memory/ |
H A D | tegra194-mc.h | 4 /* special clients */ 8 /* host1x clients */ 25 /* GPU clients */ 28 /* other SoC clients */ 45 /* GPC DMA clients */ 55 /* APE DMA clients */ 65 /* APE DMA clients */ 147 /* MSS internal memqual MIU7 read clients */ 149 /* MSS internal memqual MIU7 write clients */ 151 /* High-definition audio (HDA) read clients */ [all …]
|
H A D | tegra234-mc.h | 7 /* special clients */ 180 /* MSS internal memqual MIU7 read clients */ 182 /* MSS internal memqual MIU7 write clients */ 184 /* MSS internal memqual MIU8 read clients */ 186 /* MSS internal memqual MIU8 write clients */ 188 /* MSS internal memqual MIU9 read clients */ 190 /* MSS internal memqual MIU9 write clients */ 192 /* MSS internal memqual MIU10 read clients */ 194 /* MSS internal memqual MIU10 write clients */ 196 /* MSS internal memqual MIU11 read clients */ [all …]
|
H A D | tegra186-mc.h | 4 /* special clients */ 8 /* host1x clients */ 25 /* GPU clients */ 28 /* other SoC clients */ 45 /* GPC DMA clients */ 55 /* APE DMA clients */ 65 /* APE DMA clients */
|
/freebsd/contrib/ntp/ |
H A D | README.leapsmear | 26 NTP servers also pass a leap second warning flag down to their clients via 27 the normal NTP packet exchange, so clients also become aware of an 60 Thus it is not required to use a smearing NTP server for Windows clients, 69 sent to its clients, so that after some predefined interval the leap second 71 e.g. several hours, so that NTP clients can easily follow the clock drift 79 With this approach the time an NTP server sends to its clients still matches 86 Of course, clients which receive the "smeared" time from an NTP server don't 88 just transparent to the clients, and the clients don't even notice there's a 159 NTP clients can follow the smeared time it doesn't matter at all which 163 Since all clients follow the same smeared time the time difference between [all …]
|
/freebsd/tools/tools/mctest/ |
H A D | mctest.cc | 64 …cout << "mctest [-r] -M clients -m client number -i interface -g multicast group -s packet size -n… in usage() 89 // @param clients ///< total number of clients (N) 95 int clients, int client, short base_port) { in sink() argument 179 * Bandwidth limiting. If there are N clients then we want in sink() 180 * 1/N packets from each, otherwise the clients will overwhelm in sink() 183 if (n % clients == client) { in sink() 293 // @param clients ///< number of clients we intend to run 298 int number, int gap, int clients, short base_port) { in source() argument 362 struct timeval received[clients][number]; in source() 363 server_args args[clients]; in source() [all …]
|
/freebsd/crypto/krb5/src/ |
H A D | Makefile.in | 33 kdc kadmin kprop clients appl tests \ 35 WINSUBDIRS=include util lib ccapi windows clients appl plugins\preauth\spake 124 clients\Makefile clients\kdestroy\Makefile \ 125 clients\kinit\Makefile clients\klist\Makefile \ 126 clients\kpasswd\Makefile clients\kvno\Makefile \ 127 clients\kcpytkt\Makefile clients\kdeltkt\Makefile \ 128 clients\kswitch\Makefile \ 175 ##DOS##clients\Makefile: clients\Makefile.in $(MKFDEP) 177 ##DOS##clients\kdestroy\Makefile: clients\kdestroy\Makefile.in $(MKFDEP) 179 ##DOS##clients\kinit\Makefile: clients\kinit\Makefile.in $(MKFDEP) [all …]
|
/freebsd/crypto/krb5/src/po/ |
H A D | mit-krb5.pot | 21 #: ../../src/clients/kdestroy/kdestroy.c:52 26 #: ../../src/clients/kdestroy/kdestroy.c:54 31 #: ../../src/clients/kdestroy/kdestroy.c:55 36 #: ../../src/clients/kdestroy/kdestroy.c:56 37 #: ../../src/clients/kswitch/kswitch.c:42 42 #: ../../src/clients/kdestroy/kdestroy.c:57 47 #: ../../src/clients/kdestroy/kdestroy.c:71 48 #: ../../src/clients/kdestroy/kdestroy.c:165 52 #: ../../src/clients/kdestroy/kdestroy.c:78 57 #: ../../src/clients/kdestroy/kdestroy.c:110 [all …]
|
H A D | ka.po | 21 #: ../../src/clients/kdestroy/kdestroy.c:52 26 #: ../../src/clients/kdestroy/kdestroy.c:54 31 #: ../../src/clients/kdestroy/kdestroy.c:55 36 #: ../../src/clients/kdestroy/kdestroy.c:56 37 #: ../../src/clients/kswitch/kswitch.c:42 42 #: ../../src/clients/kdestroy/kdestroy.c:57 47 #: ../../src/clients/kdestroy/kdestroy.c:71 48 #: ../../src/clients/kdestroy/kdestroy.c:165 52 #: ../../src/clients/kdestroy/kdestroy.c:78 58 #: ../../src/clients/kdestroy/kdestroy.c:110 [all …]
|
H A D | de.po | 20 #: ../../src/clients/kdestroy/kdestroy.c:62 25 #: ../../src/clients/kdestroy/kdestroy.c:63 30 #: ../../src/clients/kdestroy/kdestroy.c:64 35 #: ../../src/clients/kdestroy/kdestroy.c:65 36 #: ../../src/clients/kswitch/kswitch.c:45 41 #: ../../src/clients/kdestroy/kdestroy.c:98 42 #: ../../src/clients/kinit/kinit.c:383 ../../src/clients/ksu/main.c:284 47 #: ../../src/clients/kdestroy/kdestroy.c:105 48 #: ../../src/clients/kinit/kinit.c:412 ../../src/clients/klist/klist.c:182 53 #: ../../src/clients/kdestroy/kdestroy.c:126 [all …]
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | libarchive_internals.3 | 56 The I/O layer is completely exposed to clients who can replace 59 In order to provide as much consistency as possible for clients, 61 Eventually, it should be possible for clients to open 65 From the outside, clients use the 77 This layer can be overridden by clients, but most clients use 89 (for example, it prevents clients from reading data before reading a header) 101 The read API goes to some lengths to be nice to clients. 114 In particular, clients are allowed to return zero for any 118 Keep in mind that not all clients ar [all...] |
/freebsd/sys/dev/qlnx/qlnxe/ |
H A D | ecore_cxt.c | 206 struct ecore_ilt_client_cfg clients[ILT_CLI_MAX]; member 454 struct ecore_ilt_client_cfg *p_cli = &p_mngr->clients[ilt_client]; in ecore_cxt_get_ilt_page_size() 497 u32 page_sz = p_mgr->clients[ILT_CLI_CDUC].p_size.val; in ecore_cxt_set_proto_cid_count() 605 p_cli = &p_hwfn->p_cxt_mngr->clients[ILT_CLI_CDUC]; in ecore_ilt_get_dynamic_line_cnt() 657 p_cli = ecore_cxt_set_cli(&p_mngr->clients[ILT_CLI_CDUC]); in ecore_cxt_cfg_ilt_compute() 664 /* get the counters for the CDUC,CDUC and QM clients */ in ecore_cxt_cfg_ilt_compute() 695 p_cli = ecore_cxt_set_cli(&p_mngr->clients[ILT_CLI_CDUT]); in ecore_cxt_cfg_ilt_compute() 806 p_cli = ecore_cxt_set_cli(&p_mngr->clients[ILT_CLI_QM]); in ecore_cxt_cfg_ilt_compute() 827 p_cli = ecore_cxt_set_cli(&p_mngr->clients[ILT_CLI_SRC]); in ecore_cxt_cfg_ilt_compute() 852 p_cli = ecore_cxt_set_cli(&p_mngr->clients[ILT_CLI_TM]); in ecore_cxt_cfg_ilt_compute() [all …]
|
/freebsd/contrib/ofed/libibverbs/man/ |
H A D | ibv_xsrq_pingpong.1 | 9 [\-p port] [\-d device] [\-i ib port] [\-s size] [\-m mtu] [\-c clients] 13 [\-p port] [\-d device] [\-i ib port] [\-s size] [\-m mtu] [\-c clients] 40 \fB\-c\fR, \fB\-\-clients\fR=\fICLIENTS\fR 41 number of clients \fICLIENTS\fR (on server only, default 1)
|
/freebsd/crypto/krb5/src/util/ |
H A D | testrealm.py | 38 os.path.join('clients', 'kdestroy'), 39 os.path.join('clients', 'kinit'), 40 os.path.join('clients', 'klist'), 41 os.path.join('clients', 'kpasswd'), 42 os.path.join('clients', 'ksu'), 43 os.path.join('clients', 'kvno'), 44 os.path.join('clients', 'kswitch'),
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_options.pod | 115 Allow legacy insecure renegotiation between OpenSSL and unpatched clients or 121 preferences. When not set, the SSL server will always follow the clients 215 clients. 224 Normally clients and servers will transparently attempt to negotiate the 227 If this option is set, Encrypt-then-MAC is disabled. Clients will not 232 Normally clients and servers will transparently attempt to negotiate the 235 If this option is set, Extended Master Secret is disabled. Clients will 251 handshake). This option is not needed for clients. 304 those clients (e.g. mobile) use ChaCha20-Poly1305 if that cipher is anywhere 305 in the server cipher list; but still allows other clients to use AES and other [all …]
|
/freebsd/libexec/bootpd/ |
H A D | Problems | 24 those clients using numeric form. 35 My huge bootptab file causes startup time to be so long that clients 46 My bootp clients are given responses with a boot file name that is 53 My PC clients running Sun's PC-NFS Pro v1.1 fail to receive 56 These clients send a request with the DHCP "message length" 62 for any clients that need their reply broadcasted.
|
/freebsd/sys/contrib/device-tree/Bindings/arm/msm/ |
H A D | qcom,llcc.yaml | 15 that can be shared by multiple clients. Clients here are different cores in the 16 SoC, the idea is to minimize the local caches at the clients and migrate to 18 which are assigned to clients. Clients can query the slice details, activate
|
/freebsd/contrib/ntp/conf/ |
H A D | rackety.conf | 7 # the usual suspects. It blocks previous versions and limits clients 35 restrict default limited version kod # default limit clients per net 37 restrict 128.4.0.0 mask 255.255.0.0 # allow DCnet clients 38 restrict 128.175.0.0 mask 255.255.0.0 # allow UDELnet clients 39 restrict 140.173.0.0 mask 255.255.0.0 # allow DARTnet/CAIRN clients
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_CTX_set_options.3 | 235 Allow legacy insecure renegotiation between OpenSSL and unpatched clients or 240 preferences. When not set, the \s-1SSL\s0 server will always follow the clients 325 clients. 332 Normally clients and servers will transparently attempt to negotiate the 335 If this option is set, Encrypt-then-MAC is disabled. Clients will not 339 Normally clients and servers will transparently attempt to negotiate the 342 If this option is set, Extended Master Secret is disabled. Clients will 355 handshake). This option is not needed for clients. 404 those clients (e.g. mobile) use ChaCha20\-Poly1305 if that cipher is anywhere 405 in the server cipher list; but still allows other clients to use \s-1AES\s0 and other [all …]
|
/freebsd/share/doc/smm/06.nfs/ |
H A D | 2.t | 34 consistency between clients in a crash tolerant manner. 36 and NQNFS clients while maintaining full consistency between the server and 37 NQNFS clients. 85 among the NQNFS clients by disabling client caching whenever a server file 92 At this time, the server sends an \fBeviction notice\fR to all clients holding 95 received from all the clients that have signed the lease or when the lease 108 server and NQNFS clients is maintained when NFS clients are modifying the 111 \** The NFS clients will continue to be \fIapproximately\fR consistent with 152 The server must maintain the state of all the current leases held by clients. 164 state of and the clients have had at least write_slack seconds to push dirty [all …]
|
/freebsd/usr.sbin/nfsd/ |
H A D | pnfsserver.4 | 88 It must also be exported to all pNFS aware clients, but these clients do 92 options as used by the MDS to export file system(s) to the clients. 114 NFS clients. 116 file system(s) exported to clients. 163 four DSs and File layouts will be issued to pNFS enabled clients. 191 to clients, the following variant of 235 The clients mounting the MDS must be running the 245 on these clients. 246 Non-pNFS aware clients or NFSv3 mounts will do all I/O RPCs on the MDS,
|
/freebsd/crypto/krb5/doc/admin/ |
H A D | https.rst | 12 Communicating with a KDC through an HTTPS proxy allows clients to 15 clients and the KDC, preventing observers from conducting password 17 being authenticated, at additional computational cost to both clients 25 Configuring the clients
|
H A D | spake.rst | 19 clients, but the KDC does not offer SPAKE by default. To turn it on, 32 Clients which do not implement SPAKE preauthentication will fall back 37 dictionary attacks. To prevent this fallback on clients which do 44 trip to the KDC during initial authentication. If most of the clients
|
/freebsd/crypto/krb5/doc/html/_sources/admin/ |
H A D | https.rst.txt | 12 Communicating with a KDC through an HTTPS proxy allows clients to 15 clients and the KDC, preventing observers from conducting password 17 being authenticated, at additional computational cost to both clients 25 Configuring the clients
|
H A D | spake.rst.txt | 19 clients, but the KDC does not offer SPAKE by default. To turn it on, 32 Clients which do not implement SPAKE preauthentication will fall back 37 dictionary attacks. To prevent this fallback on clients which do 44 trip to the KDC during initial authentication. If most of the clients
|
/freebsd/sys/contrib/device-tree/Bindings/display/tegra/ |
H A D | nvidia,tegra20-host1x.txt | 57 - interconnects: Must contain entry for the MPE memory clients. 60 available memory clients, see MEMORY CONTROLLER section. 142 - interconnects: Must contain entry for the VI memory clients. 145 available memory clients, see MEMORY CONTROLLER section. 163 - interconnects: Must contain entry for the EPP memory clients. 166 available memory clients, see MEMORY CONTROLLER section. 184 - interconnects: Must contain entry for the ISP memory clients. 187 available memory clients, see MEMORY CONTROLLER section. 205 - interconnects: Must contain entry for the GR2D memory clients. 208 available memory clients, see MEMORY CONTROLLER section. [all …]
|