Home
last modified time | relevance | path

Searched full:schemes (Results 1 – 25 of 192) sorted by relevance

12345678

/freebsd/contrib/llvm-project/llvm/tools/llvm-xray/
H A Dxray-color-helper.h25 /// There are two types of color schemes in this class:
26 /// - Sequential schemes, which are used to represent information from some
28 /// - Diverging schemes, which are used to represent information representing
50 /// Enum of the availible Sequential Color Schemes
52 // Schemes based on the ColorBrewer Color schemes of the same name from
61 /// Enum of the availible Diverging Color Schemes
63 // Schemes based on the ColorBrewer Color schemes of the same name from
/freebsd/sys/contrib/device-tree/Bindings/mtd/
H A Dgpmc-nand.txt113 support ecc-schemes with hardware error-correction (BCHx_HW). However
114 such SoC can use ecc-schemes with software library for error-correction
121 Higher ECC schemes require more OOB/Spare area to store ECC syndrome,
131 '3' for HAM1_xx ecc schemes
132 '7' for BCH4_xx ecc schemes
133 '14' for BCH8_xx ecc schemes
134 '26' for BCH16_xx ecc schemes
141 probably use lower ecc-schemes like BCH8.
/freebsd/crypto/libecc/include/libecc/
H A Dlib_ecc_config.h22 * algorithms and signature/verification schemes).
28 * hash algorithms and signature schemes in the compilation
111 /* Supported sig/verif schemes */
127 /* Supported ECDH schemes */
/freebsd/contrib/ntp/html/
H A Dautokey.html28 <li class="inline"><a href="#cfg">Configuration - Authentication Schemes</a></li>
29 <li class="inline"><a href="#scfg">Configuration - Identity Schemes</a></li>
30 <li class="inline"><a href="#ident">Identity Schemes and Cryptotypes</a></li>
37 …, such as MD5 or SHA, and verifies the source using digital signature schemes, such as RSA or D…
38schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.html">Autokey Identity Sc…
39 …r and client. For this reason operation with network address translation schemes is not possible. …
61 … one or another identity schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.…
69 ….eecis.udel.edu/~mills/ident.html">Autokey Identity Schemes</a> page, there are five identity sche…
81 <h4 id="cfg">Configuration - Authentication Schemes</h4>
93 <h4 id="scfg">Configuration - Identity Schemes</h4>
[all …]
H A Ddiscover.html10 <h3>Automatic Server Discovery Schemes</h3>
29schemes provided in NTPv4. There are three automatic server discovery schemes: broadcast/multicast…
30 <p> All three schemes work in much the same way and might be described as <i>grab-n'-prune.</i> Thr…
32 <p>All schemes use an iterated process to discover new preemptable client associations as long as…
33 <p>All schemes use a stratum filter to select just those servers with stratum considered useful. Th…
H A Dassoc.html32 …, as described on the <a href="discover.html">Automatic Server Discovery Schemes</a> page. Ephemer…
34 … discovery schemes in NTP: broadcast/multicast, manycast and pool described on the <a href="discov…
58 …onal information is on the <a href="discover.html">Automatic Server Discovery Schemes</a> page.</p>
/freebsd/usr.bin/mkimg/
H A Dmkimg.148 .Fl -formats | Fl -schemes | Fl -version
80 Some partitioning schemes need a disk geometry and for those the
189 option is given and the list of supported partitioning schemes is printed
191 .Fl -schemes
196 For a more descriptive list of supported partitioning schemes or supported
304 and a label for partitioning schemes that feature partition labels
391 For partitioning schemes that feature partition labels, the
H A Dmkimg.c55 { "schemes", no_argument, NULL, LONGOPT_SCHEMES },
108 fprintf(stderr, " schemes:\n"); in print_schemes()
148 fprintf(stderr, "\t--schemes\t- list partition schemes\n"); in usage()
611 usage("multiple schemes given"); in main()
/freebsd/lib/geom/part/
H A Dgpart.8184 This option is only valid when used on partitioning schemes that support
229 Not all partitioning schemes have embedded bootstrap code, so the
294 Some schemes have a maximum equal to the minimum and some schemes have
351 Not all partitioning schemes support labels and it is invalid to
452 Restore partition labels for partitioning schemes that support them.
492 For partitioning schemes that support partition labels, print them
541 .Sh PARTITIONING SCHEMES
542 Several partitioning schemes are supported by the
633 Usually it is used by the GRUB 2 loader for GPT partitioning schemes.
651 or GPT schemes.
[all …]
/freebsd/sys/contrib/ncsw/Peripherals/FM/Pcd/
H A Dfm_kg.c745 p_Scheme = &p_FmPcdKg->schemes[relativeSchemeId]; in IncSchemeOwners()
770 p_Scheme = &p_FmPcdKg->schemes[relativeSchemeId]; in DecSchemeOwners()
2058 p_Scheme = &p_FmPcd->p_FmPcdKg->schemes[relativeSchemeId]; in FmPcdKgBuildBindPortToSchemes()
2082 … /* if this port does not use clsPlan, it may not be bound to schemes with units that contain in FmPcdKgBuildBindPortToSchemes()
2083 cls plan options. Schemes that are used only directly, should not be checked. in FmPcdKgBuildBindPortToSchemes()
2084 … it also may not be bound to schemes that go to CC with units that are options - so we OR in FmPcdKgBuildBindPortToSchemes()
2164 if (p_FmPcd->p_FmPcdKg->schemes[schemeId].matchVector == SCHEME_ALWAYS_DIRECT) in KgIsSchemeAlwaysDirect()
2202 RETURN_ERROR(MAJOR, E_NOT_AVAILABLE, ("No schemes found")); in FmPcdKgAllocSchemes()
2606 ASSERT_COND(p_FmPcd->p_FmPcdKg->schemes[schemeId].valid); in FmPcdKgGetRequiredAction()
2608 return p_FmPcd->p_FmPcdKg->schemes[schemeId].requiredAction; in FmPcdKgGetRequiredAction()
[all …]
/freebsd/contrib/ntp/util/
H A Dntp-keygen.mdoc.in23 authentication and identification schemes.
333 Additional information on trusted groups and identity schemes is on the
447 .Ss Identity Schemes
452 However, there are more secure identity schemes available,
457 schemes described below.
458 These schemes are based on a TA, one or more trusted hosts
467 In some schemes there are separate keys for servers and clients.
487 they replace the files which would be generated in other schemes.
639 schemes must be used with an
643 schemes mus
[all...]
H A Dntp-keygen.1ntp-keygenmdoc23 authentication and identification schemes.
333 Additional information on trusted groups and identity schemes is on the
447 .Ss Identity Schemes
452 However, there are more secure identity schemes available,
457 schemes described below.
458 These schemes are based on a TA, one or more trusted hosts
467 In some schemes there are separate keys for servers and clients.
487 they replace the files which would be generated in other schemes.
639 schemes must be used with an
643 schemes mus
[all...]
H A Dntp-keygen.1ntp-keygenman38 authentication and identification schemes.
388 Additional information on trusted groups and identity schemes is on the
510 .SS Identity Schemes
515 However, there are more secure identity schemes available,
520 schemes described below.
521 These schemes are based on a TA, one or more trusted hosts
532 In some schemes there are separate keys for servers and clients.
554 they replace the files which would be generated in other schemes.
715 schemes must be used with an
719 schemes mus
[all...]
H A Dntp-keygen.man.in38 authentication and identification schemes.
388 Additional information on trusted groups and identity schemes is on the
510 .SS Identity Schemes
515 However, there are more secure identity schemes available,
520 schemes described below.
521 These schemes are based on a TA, one or more trusted hosts
532 In some schemes there are separate keys for servers and clients.
554 they replace the files which would be generated in other schemes.
715 schemes must be used with an
719 schemes mus
[all...]
H A Dntp-keygen-opts.def42 Note that RSA schemes must be used with a RSA sign key and DSA
43 schemes must be used with a DSA sign key. The default without
283 authentication and identification schemes.
594 Additional information on trusted groups and identity schemes is on the
710 .Ss Identity Schemes
715 However, there are more secure identity schemes available,
720 schemes described below.
721 These schemes are based on a TA, one or more trusted hosts
730 In some schemes there are separate keys for servers and clients.
750 they replace the files which would be generated in other schemes.
[all …]
H A Dntp-keygen.texi42 authentication and identity schemes.
61 authentication and identity schemes. It can generate message digest
172 Additional information on trusted groups and identity schemes is on the
181 All cryptographically sound key generation schemes must have means to
H A Dinvoke-ntp-keygen.texi17 authentication and identification schemes.
328 Additional information on trusted groups and identity schemes is on the
444 @subsubsection Identity Schemes
449 However, there are more secure identity schemes available,
454 schemes described below.
455 These schemes are based on a TA, one or more trusted hosts
464 In some schemes there are separate keys for servers and clients.
484 they replace the files which would be generated in other schemes.
637 schemes must be used with an
641 schemes mus
[all...]
/freebsd/lib/libpmc/pmu-events/arch/x86/amdzen2/
H A Dfloating-point.json71 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
77 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
83 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
89 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
/freebsd/libexec/flua/libhash/
H A Dhash.3lua19 .Ss Supported Hashing Schemes
20 The following hashing schemes are supported by the hash module.
/freebsd/lib/libpmc/pmu-events/arch/x86/amdzen3/
H A Dfloating-point.json70 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
76 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
82 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
88 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
/freebsd/lib/libpmc/pmu-events/arch/x86/amdzen1/
H A Dfloating-point.json172 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of Scalar…
179 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of Ops th…
186 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of SSE Mo…
193 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of SSE Mo…
/freebsd/sys/contrib/zlib/doc/
H A Dtxtvsbin.txt72 detection schemes observe the presence of non-ASCII codes from the range
93 be regarded as binary by general-purpose text detection schemes, because
/freebsd/secure/lib/libcrypto/man/man7/
H A Dossl_store.7158 .SS "\s-1URI\s0 schemes and loaders"
159 .IX Subsection "URI schemes and loaders"
/freebsd/sys/arm64/conf/
H A DDEFAULTS10 # Default partitioning schemes
/freebsd/sys/riscv/conf/
H A DDEFAULTS10 # Default partitioning schemes

12345678