/freebsd/contrib/llvm-project/llvm/tools/llvm-xray/ |
H A D | xray-color-helper.h | 25 /// There are two types of color schemes in this class: 26 /// - Sequential schemes, which are used to represent information from some 28 /// - Diverging schemes, which are used to represent information representing 50 /// Enum of the availible Sequential Color Schemes 52 // Schemes based on the ColorBrewer Color schemes of the same name from 61 /// Enum of the availible Diverging Color Schemes 63 // Schemes based on the ColorBrewer Color schemes of the same name from
|
/freebsd/sys/contrib/device-tree/Bindings/mtd/ |
H A D | gpmc-nand.txt | 113 support ecc-schemes with hardware error-correction (BCHx_HW). However 114 such SoC can use ecc-schemes with software library for error-correction 121 Higher ECC schemes require more OOB/Spare area to store ECC syndrome, 131 '3' for HAM1_xx ecc schemes 132 '7' for BCH4_xx ecc schemes 133 '14' for BCH8_xx ecc schemes 134 '26' for BCH16_xx ecc schemes 141 probably use lower ecc-schemes like BCH8.
|
/freebsd/crypto/libecc/include/libecc/ |
H A D | lib_ecc_config.h | 22 * algorithms and signature/verification schemes). 28 * hash algorithms and signature schemes in the compilation 111 /* Supported sig/verif schemes */ 127 /* Supported ECDH schemes */
|
/freebsd/contrib/ntp/html/ |
H A D | autokey.html | 28 <li class="inline"><a href="#cfg">Configuration - Authentication Schemes</a></li> 29 <li class="inline"><a href="#scfg">Configuration - Identity Schemes</a></li> 30 <li class="inline"><a href="#ident">Identity Schemes and Cryptotypes</a></li> 37 …, such as MD5 or SHA, and verifies the source using digital signature schemes, such as RSA or D… 38 …schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.html">Autokey Identity Sc… 39 …r and client. For this reason operation with network address translation schemes is not possible. … 61 … one or another identity schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.… 69 ….eecis.udel.edu/~mills/ident.html">Autokey Identity Schemes</a> page, there are five identity sche… 81 <h4 id="cfg">Configuration - Authentication Schemes</h4> 93 <h4 id="scfg">Configuration - Identity Schemes</h4> [all …]
|
H A D | discover.html | 10 <h3>Automatic Server Discovery Schemes</h3> 29 …schemes provided in NTPv4. There are three automatic server discovery schemes: broadcast/multicast… 30 <p> All three schemes work in much the same way and might be described as <i>grab-n'-prune.</i> Thr… 32 <p>All schemes use an iterated process to discover new preemptable client associations as long as… 33 <p>All schemes use a stratum filter to select just those servers with stratum considered useful. Th…
|
H A D | assoc.html | 32 …, as described on the <a href="discover.html">Automatic Server Discovery Schemes</a> page. Ephemer… 34 … discovery schemes in NTP: broadcast/multicast, manycast and pool described on the <a href="discov… 58 …onal information is on the <a href="discover.html">Automatic Server Discovery Schemes</a> page.</p>
|
/freebsd/usr.bin/mkimg/ |
H A D | mkimg.1 | 48 .Fl -formats | Fl -schemes | Fl -version 80 Some partitioning schemes need a disk geometry and for those the 189 option is given and the list of supported partitioning schemes is printed 191 .Fl -schemes 196 For a more descriptive list of supported partitioning schemes or supported 304 and a label for partitioning schemes that feature partition labels 391 For partitioning schemes that feature partition labels, the
|
H A D | mkimg.c | 55 { "schemes", no_argument, NULL, LONGOPT_SCHEMES }, 108 fprintf(stderr, " schemes:\n"); in print_schemes() 148 fprintf(stderr, "\t--schemes\t- list partition schemes\n"); in usage() 611 usage("multiple schemes given"); in main()
|
/freebsd/lib/geom/part/ |
H A D | gpart.8 | 184 This option is only valid when used on partitioning schemes that support 229 Not all partitioning schemes have embedded bootstrap code, so the 294 Some schemes have a maximum equal to the minimum and some schemes have 351 Not all partitioning schemes support labels and it is invalid to 452 Restore partition labels for partitioning schemes that support them. 492 For partitioning schemes that support partition labels, print them 541 .Sh PARTITIONING SCHEMES 542 Several partitioning schemes are supported by the 633 Usually it is used by the GRUB 2 loader for GPT partitioning schemes. 651 or GPT schemes. [all …]
|
/freebsd/sys/contrib/ncsw/Peripherals/FM/Pcd/ |
H A D | fm_kg.c | 745 p_Scheme = &p_FmPcdKg->schemes[relativeSchemeId]; in IncSchemeOwners() 770 p_Scheme = &p_FmPcdKg->schemes[relativeSchemeId]; in DecSchemeOwners() 2058 p_Scheme = &p_FmPcd->p_FmPcdKg->schemes[relativeSchemeId]; in FmPcdKgBuildBindPortToSchemes() 2082 … /* if this port does not use clsPlan, it may not be bound to schemes with units that contain in FmPcdKgBuildBindPortToSchemes() 2083 cls plan options. Schemes that are used only directly, should not be checked. in FmPcdKgBuildBindPortToSchemes() 2084 … it also may not be bound to schemes that go to CC with units that are options - so we OR in FmPcdKgBuildBindPortToSchemes() 2164 if (p_FmPcd->p_FmPcdKg->schemes[schemeId].matchVector == SCHEME_ALWAYS_DIRECT) in KgIsSchemeAlwaysDirect() 2202 RETURN_ERROR(MAJOR, E_NOT_AVAILABLE, ("No schemes found")); in FmPcdKgAllocSchemes() 2606 ASSERT_COND(p_FmPcd->p_FmPcdKg->schemes[schemeId].valid); in FmPcdKgGetRequiredAction() 2608 return p_FmPcd->p_FmPcdKg->schemes[schemeId].requiredAction; in FmPcdKgGetRequiredAction() [all …]
|
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.mdoc.in | 23 authentication and identification schemes. 333 Additional information on trusted groups and identity schemes is on the 447 .Ss Identity Schemes 452 However, there are more secure identity schemes available, 457 schemes described below. 458 These schemes are based on a TA, one or more trusted hosts 467 In some schemes there are separate keys for servers and clients. 487 they replace the files which would be generated in other schemes. 639 schemes must be used with an 643 schemes mus [all...] |
H A D | ntp-keygen.1ntp-keygenmdoc | 23 authentication and identification schemes. 333 Additional information on trusted groups and identity schemes is on the 447 .Ss Identity Schemes 452 However, there are more secure identity schemes available, 457 schemes described below. 458 These schemes are based on a TA, one or more trusted hosts 467 In some schemes there are separate keys for servers and clients. 487 they replace the files which would be generated in other schemes. 639 schemes must be used with an 643 schemes mus [all...] |
H A D | ntp-keygen.1ntp-keygenman | 38 authentication and identification schemes. 388 Additional information on trusted groups and identity schemes is on the 510 .SS Identity Schemes 515 However, there are more secure identity schemes available, 520 schemes described below. 521 These schemes are based on a TA, one or more trusted hosts 532 In some schemes there are separate keys for servers and clients. 554 they replace the files which would be generated in other schemes. 715 schemes must be used with an 719 schemes mus [all...] |
H A D | ntp-keygen.man.in | 38 authentication and identification schemes. 388 Additional information on trusted groups and identity schemes is on the 510 .SS Identity Schemes 515 However, there are more secure identity schemes available, 520 schemes described below. 521 These schemes are based on a TA, one or more trusted hosts 532 In some schemes there are separate keys for servers and clients. 554 they replace the files which would be generated in other schemes. 715 schemes must be used with an 719 schemes mus [all...] |
H A D | ntp-keygen-opts.def | 42 Note that RSA schemes must be used with a RSA sign key and DSA 43 schemes must be used with a DSA sign key. The default without 283 authentication and identification schemes. 594 Additional information on trusted groups and identity schemes is on the 710 .Ss Identity Schemes 715 However, there are more secure identity schemes available, 720 schemes described below. 721 These schemes are based on a TA, one or more trusted hosts 730 In some schemes there are separate keys for servers and clients. 750 they replace the files which would be generated in other schemes. [all …]
|
H A D | ntp-keygen.texi | 42 authentication and identity schemes. 61 authentication and identity schemes. It can generate message digest 172 Additional information on trusted groups and identity schemes is on the 181 All cryptographically sound key generation schemes must have means to
|
H A D | invoke-ntp-keygen.texi | 17 authentication and identification schemes. 328 Additional information on trusted groups and identity schemes is on the 444 @subsubsection Identity Schemes 449 However, there are more secure identity schemes available, 454 schemes described below. 455 These schemes are based on a TA, one or more trusted hosts 464 In some schemes there are separate keys for servers and clients. 484 they replace the files which would be generated in other schemes. 637 schemes must be used with an 641 schemes mus [all...] |
/freebsd/lib/libpmc/pmu-events/arch/x86/amdzen2/ |
H A D | floating-point.json | 71 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 77 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 83 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 89 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
|
/freebsd/libexec/flua/libhash/ |
H A D | hash.3lua | 19 .Ss Supported Hashing Schemes 20 The following hashing schemes are supported by the hash module.
|
/freebsd/lib/libpmc/pmu-events/arch/x86/amdzen3/ |
H A D | floating-point.json | 70 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 76 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 82 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 88 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
|
/freebsd/lib/libpmc/pmu-events/arch/x86/amdzen1/ |
H A D | floating-point.json | 172 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of Scalar… 179 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of Ops th… 186 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of SSE Mo… 193 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of SSE Mo…
|
/freebsd/sys/contrib/zlib/doc/ |
H A D | txtvsbin.txt | 72 detection schemes observe the presence of non-ASCII codes from the range 93 be regarded as binary by general-purpose text detection schemes, because
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | ossl_store.7 | 158 .SS "\s-1URI\s0 schemes and loaders" 159 .IX Subsection "URI schemes and loaders"
|
/freebsd/sys/arm64/conf/ |
H A D | DEFAULTS | 10 # Default partitioning schemes
|
/freebsd/sys/riscv/conf/ |
H A D | DEFAULTS | 10 # Default partitioning schemes
|