Home
last modified time | relevance | path

Searched full:sending (Results 1 – 25 of 1687) sorted by relevance

12345678910>>...68

/freebsd/tools/regression/sockets/unix_cmsg/
H A Dunix_cmsg.t26 "1 Sending, receiving cmsgcred" \
27 "4 Sending cmsgcred, receiving sockcred" \
28 "5 Sending, receiving timeval" \
29 "6 Sending, receiving bintime" \
60 "1 Sending, receiving cmsgcred" \
61 "3 Sending cmsgcred, receiving sockcred" \
62 "4 Sending, receiving timeval" \
63 "5 Sending, receiving bintime" \
H A DREADME57 1: Sending, receiving cmsgcred
80 4: Sending cmsgcred, receiving sockcred
89 5: Sending, receiving timeval
95 6: Sending, receiving bintime
117 1: Sending, receiving cmsgcred
130 3: Sending cmsgcred, receiving sockcred
139 4: Sending, receiving timeval
145 5: Sending, receiving bintime
H A Dunix_cmsg.c84 .desc = "Sending, receiving cmsgcred"
96 .desc = "Sending cmsgcred, receiving sockcred"
100 .desc = "Sending, receiving timeval"
104 .desc = "Sending, receiving bintime"
123 .desc = "Sending, receiving realtime"
129 .desc = "Sending, receiving monotonic time (uptime)"
144 .desc = "Sending, receiving cmsgcred"
152 .desc = "Sending cmsgcred, receiving sockcred"
156 .desc = "Sending, receiving timeval"
160 .desc = "Sending, receiving bintime"
[all …]
/freebsd/contrib/libpcap/
H A Dpcap_inject.3pcap44 sending packets; as
46 doesn't have a flag to indicate whether to open for capturing, sending,
47 or capturing and sending, you cannot request an open that supports
48 sending and be notified at open time whether sending will be possible.
49 Note also that some devices might not support sending packets.
57 which the packet it sent, if the platform doesn't support sending
62 nominally support sending completely raw and unchanged packets.
/freebsd/sys/contrib/openzfs/man/man8/
H A Dzfs-redact.8143 do not exist on the sending side are destroyed.
175 feature is active on the sending system, then the receiving system must have
192 sending local settings that may have nothing to do with the source dataset,
203 feature is active on the sending system, then the receiving system must have
207 feature is enabled on the sending system but the
211 then the data will be decompressed before sending so it can be split into
237 Note that if you do not use this flag for sending encrypted datasets, data will
293 Allows sending a replication stream even when there are snapshots missing in the
304 The same report can be requested by sending
359 feature is active on the sending syste
[all...]
H A Dzfs-send.8143 do not exist on the sending side are destroyed.
175 feature is active on the sending system, then the receiving system must have
192 sending local settings that may have nothing to do with the source dataset,
203 feature is active on the sending system, then the receiving system must have
207 feature is enabled on the sending system but the
211 then the data will be decompressed before sending so it can be split into
237 Note that if you do not use this flag for sending encrypted datasets, data will
293 Allows sending a replication stream even when there are snapshots missing in the
304 The same report can be requested by sending
359 feature is active on the sending system, then the receiving system must have
[all …]
/freebsd/crypto/openssl/ssl/record/
H A Dssl3_record_tls13.c23 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls13_enc() argument
43 if (sending) { in tls13_enc()
54 * If we're sending an alert and ctx != NULL then we must be forcing in tls13_enc()
100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, in tls13_enc()
114 if (!sending) { in tls13_enc()
146 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 in tls13_enc()
147 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, in tls13_enc()
182 if (sending) { in tls13_enc()
H A Dssl3_record.c864 int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int sending, in ssl3_enc() argument
879 if (sending) { in ssl3_enc()
904 if ((bs != 1) && sending && !provided) { in ssl3_enc()
922 if (!sending) { in ssl3_enc()
938 if (!sending && mac != NULL) { in ssl3_enc()
963 if (!sending) in ssl3_enc()
988 int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls1_enc() argument
999 int tlstree_enc = sending ? (s->mac_flags & SSL_MAC_FLAG_WRITE_MAC_TLSTREE) in tls1_enc()
1007 if (sending) { in tls1_enc()
1088 seq = sending ? RECORD_LAYER_get_write_sequence(&s->rlayer) in tls1_enc()
[all …]
/freebsd/share/man/man4/
H A Dunix.4170 Credentials of the sending process can be transmitted explicitly using a
180 pid_t cmcred_pid; /* PID of sending process */
181 uid_t cmcred_uid; /* real UID of sending process */
182 uid_t cmcred_euid; /* effective UID of sending process */
183 gid_t cmcred_gid; /* real GID of sending process */
200 The sending process could have exited and its process ID already been
318 pid_t sc_pid; /* PID of sending process */
363 pid_t cr_pid; /* process id of the sending process */
H A Dblackhole.449 will prevent sending an ABORT packet in response to an incoming INIT.
50 A MIB value of two will do the same, but will also prevent sending an ABORT packet
66 or an unexpected segment on a listening port is dropped without sending a
70 Enabling blackhole behaviour turns off the sending
/freebsd/crypto/openssl/test/recipes/
H A D70-test_sslsigalgs.t69 #Test 2: Sending no sig algs extension in TLSv1.3 should fail
75 #Test 3: Sending an empty sig algs extension in TLSv1.3 should fail
81 #Test 4: Sending a list with no recognised sig algs in TLSv1.3 should fail
87 #Test 5: Sending a sig algs list without pss for an RSA cert in TLSv1.3
94 #Test 6: Sending only TLSv1.3 PSS sig algs in TLSv1.3 should succeed
115 #Test 8: Sending a valid sig algs list but not including a sig type that
128 #Test 9: Sending a full list of TLSv1.3 sig algs but negotiating TLSv1.2
143 #Test 10: Sending no sig algs extension in TLSv1.2 will make it use
152 #Test 11: Sending no sig algs extension in TLSv1.2 should fail at security
162 #Test 12: Sending no sig algs extension in TLSv1.2 should fail at security
[all …]
H A D70-test_sslrecords.t148 #Test 10: Sending an unrecognised record type in TLS1.2 should fail
160 #Test 11: Sending an unrecognised record type in TLS1.1 should fail
169 #Test 12: Sending a different record version in TLS1.2 should fail
182 #Test 13: Sending a different record version in TLS1.3 should fail
188 #Test 14: Sending an unrecognised record type in TLS1.3 should fail
195 #Test 15: Sending an outer record type other than app data once encrypted
211 #Test 16: Sending a ServerHello which doesn't end on a record boundary
220 #Test 17: Sending a Finished which doesn't end on a record boundary
228 #Test 18: Sending a KeyUpdate which doesn't end on a record boundary
236 #Test 19: Sending application data in the middle of a fragmented KeyUpdate
/freebsd/sys/contrib/device-tree/Bindings/serial/
H A Drs485.yaml23 milliseconds. It corresponds to the delay before sending data.
27 It corresponds to the delay after sending data and actual release
33 description: drive RTS high when sending (this is the default).
37 description: drive RTS low when sending (default is high).
51 description: enables the receiving of data even while sending data.
/freebsd/sys/dev/hyperv/netvsc/
H A Dhn_nvs.c233 * Connect chimney sending buffer GPADL to the primary channel. in hn_nvs_conn_chim()
236 * Only primary channel has chimney sending buffer connected to it. in hn_nvs_conn_chim()
237 * Sub-channels just share this chimney sending buffer. in hn_nvs_conn_chim()
248 * Connect chimney sending buffer to NVS in hn_nvs_conn_chim()
283 * Can't use chimney sending buffer; done! in hn_nvs_conn_chim()
286 if_printf(sc->hn_ifp, "zero chimney sending buffer " in hn_nvs_conn_chim()
289 if_printf(sc->hn_ifp, "misaligned chimney sending " in hn_nvs_conn_chim()
301 if_printf(sc->hn_ifp, "chimney sending sections are " in hn_nvs_conn_chim()
305 if_printf(sc->hn_ifp, "discard %d chimney sending sections\n", in hn_nvs_conn_chim()
316 if_printf(sc->hn_ifp, "chimney sending buffer %d/%d\n", in hn_nvs_conn_chim()
[all …]
/freebsd/usr.sbin/rtsold/
H A Drtsold.8137 it refrains from sending additional solicitations on that interface, until
140 When sending a Router Solicitation on an interface,
204 sending such packets.
231 and a second argument of the sending router address,
246 and a second argument of the sending router address,
262 and a second argument of the sending router address.
/freebsd/lib/libsys/
H A Dkill.266 the real or effective user ID of the sending process.
103 and the process sending the signal.
105 which the caller has permissions to, excluding the process sending the signal.
131 The sending process does not have permission to send
H A Dsendfile.2128 sending files off the
158 has some internal heuristics to do readahead when sending data.
242 to handle sending file data to the client.
243 If the sending socket is
250 If the sending socket is non-blocking and there are not enough
410 support for sending shared memory descriptors had been introduced.
/freebsd/lib/libipsec/
H A Dpfkey.c326 * sending SADB_GETSPI message to the kernel.
452 * sending SADB_UPDATE message to the kernel.
476 * sending SADB_ADD message to the kernel.
500 * sending SADB_DELETE message to the kernel.
517 * sending SADB_DELETE without spi to the kernel. This is
600 * sending SADB_GET message to the kernel.
617 * sending SADB_REGISTER message to the kernel.
758 * sending SADB_FLUSH message to the kernel.
775 * sending SADB_DUMP message to the kernel.
792 * sending SADB_X_PROMIS
[all...]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_send/
H A Dzfs_send_skip_missing.ksh33 # Verify 'zfs send' will avoid sending replication send
39 # 2. Verify sending with replication will fail
40 # 3. Verify sending with skip-missing will print a warning but succeed
/freebsd/sbin/ipf/ipsend/
H A Dipresend.138 same network as the host from which you're sending.
41 Specify the MTU to be used when sending out packets. This option allows you
70 When sending packets out, send them out "raw" (the way they came in). The
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem.c29 * The Message flow state machine controls the reading and sending of messages
211 * |sending| is 1 if we are attempting to send data (SSL_write*()), 0 if we are
215 void ossl_statem_check_finish_init(SSL *s, int sending) in ossl_statem_check_finish_init() argument
217 if (sending == -1) { in ossl_statem_check_finish_init()
230 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END in ossl_statem_check_finish_init()
233 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { in ossl_statem_check_finish_init()
239 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) in ossl_statem_check_finish_init()
367 * failed to even initialise properly. Sending an alert is probably in state_machine()
753 * sending of the message. This could result in an NBIO event occurring in
758 * sending.
[all …]
/freebsd/lib/libc/net/
H A Dsctp_send.3108 uint16_t sinfo_stream; /* Stream sending to */
110 uint16_t sinfo_flags; /* flags to control sending */
185 copy of the data which is shared by all the associations for sending.
312 which will be gathered for sending in the same manner as
379 field specifies the shared key identifier that will be used for sending the
480 This generally indicates that the interface has stopped sending,
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_raw_large_blocks.ksh32 # Receiving a snapshot with large blocks and raw sending it succeeds.
44 log_assert "Receiving and raw sending a snapshot with large blocks succeeds"
78 log_pass "Receiving and raw sending a snapshot with large blocks succeeds"
/freebsd/share/doc/usd/07.mail/
H A Dmail9.nr112 ask binary Prompt user for Subject: field when sending
121 ignore binary Ignore \s-2RUBOUT\s0 while sending mail
125 metoo binary Include sending user in aliases
139 while sending mail.
/freebsd/libexec/tftpd/
H A Dtftp-io.c145 tftp_log(LOG_DEBUG, "Sending ERROR %d", error); in send_error()
163 tftp_log(LOG_DEBUG, "Sending ERROR %d: %s", error, tp->th_msg); in send_error()
183 tftp_log(LOG_DEBUG, "Sending WRQ: filename: '%s', mode '%s'", in send_wrq()
231 tftp_log(LOG_DEBUG, "Sending RRQ: filename: '%s', mode '%s'", in send_rrq()
280 tftp_log(LOG_DEBUG, "Sending OACK"); in send_oack()
326 tftp_log(LOG_DEBUG, "Sending ACK for block %d", block); in send_ack()
355 tftp_log(LOG_DEBUG, "Sending DATA packet %d of %d bytes", in send_data()

12345678910>>...68