| /freebsd/tests/sys/kern/tty/ |
| H A D | test_sti.c | 166 static const char sending[] = "Text"; in ATF_TC_BODY() local 170 injected = inject(STDIN_FILENO, sending); in ATF_TC_BODY() 171 if (injected != sizeof(sending) - 1) in ATF_TC_BODY() 178 if (memcmp(readbuf, sending, readsz) != 0) in ATF_TC_BODY() 196 static const char sending[] = "Text\r"; in ATF_TC_BODY() local 211 if (readsz < 0 || readsz != sizeof(sending) - 1) in ATF_TC_BODY() 218 if (memcmp(readbuf, sending, readsz - 1) != 0) in ATF_TC_BODY() 224 injected = inject(term, sending); in ATF_TC_BODY() 225 ATF_REQUIRE_EQ_MSG(sizeof(sending) - 1, injected, in ATF_TC_BODY() 227 sizeof(sending) - 1); in ATF_TC_BODY() [all …]
|
| /freebsd/tools/regression/sockets/unix_cmsg/ |
| H A D | unix_cmsg.t | 26 "1 Sending, receiving cmsgcred" \ 27 "4 Sending cmsgcred, receiving sockcred" \ 28 "5 Sending, receiving timeval" \ 29 "6 Sending, receiving bintime" \ 60 "1 Sending, receiving cmsgcred" \ 61 "3 Sending cmsgcred, receiving sockcred" \ 62 "4 Sending, receiving timeval" \ 63 "5 Sending, receiving bintime" \
|
| H A D | README | 57 1: Sending, receiving cmsgcred 80 4: Sending cmsgcred, receiving sockcred 89 5: Sending, receiving timeval 95 6: Sending, receiving bintime 117 1: Sending, receiving cmsgcred 130 3: Sending cmsgcred, receiving sockcred 139 4: Sending, receiving timeval 145 5: Sending, receiving bintime
|
| H A D | unix_cmsg.c | 84 .desc = "Sending, receiving cmsgcred" 96 .desc = "Sending cmsgcred, receiving sockcred" 100 .desc = "Sending, receiving timeval" 104 .desc = "Sending, receiving bintime" 123 .desc = "Sending, receiving realtime" 129 .desc = "Sending, receiving monotonic time (uptime)" 144 .desc = "Sending, receiving cmsgcred" 152 .desc = "Sending cmsgcred, receiving sockcred" 156 .desc = "Sending, receiving timeval" 160 .desc = "Sending, receiving bintime" [all …]
|
| /freebsd/contrib/libpcap/ |
| H A D | pcap_inject.3pcap | 44 sending packets; as 46 doesn't have a flag to indicate whether to open for capturing, sending, 47 or capturing and sending, you cannot request an open that supports 48 sending and be notified at open time whether sending will be possible. 49 Note also that some devices might not support sending packets. 57 which the packet it sent, if the platform doesn't support sending 62 nominally support sending completely raw and unchanged packets.
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 70-test_comp.t | 94 # Test 1: Check that sending multiple compression methods in a TLSv1.2 98 # Test 2: Check that sending a non-null compression method in a TLSv1.2 102 # Test 3: Check that sending multiple compression methods without null in 106 # Test 4: Check that sending no compression methods in a TLSv1.2 110 # Test 5: Check that sending only null compression in a TLSv1.2 119 # Test 6: Check that sending multiple compression methods in a TLSv1.3 123 # Test 7: Check that sending a non-null compression method in a TLSv1.3 127 # Test 8: Check that sending multiple compression methods without null in 131 # Test 9: Check that sending no compression methods in a TLSv1.3 135 # Test 10: Check that sending only null compression in a TLSv1.3
|
| H A D | 70-test_sslsigalgs.t | 80 #Test 2: Sending no sig algs extension in TLSv1.3 should fail 86 #Test 3: Sending an empty sig algs extension in TLSv1.3 should fail 92 #Test 4: Sending a list with no recognised sig algs in TLSv1.3 should fail 98 #Test 5: Sending a sig algs list without pss for an RSA cert in TLSv1.3 105 #Test 6: Sending only TLSv1.3 PSS sig algs in TLSv1.3 should succeed 126 #Test 8: Sending a valid sig algs list but not including a sig type that 139 #Test 9: Sending a full list of TLSv1.3 sig algs but negotiating TLSv1.2 154 #Test 10: Sending no sig algs extension in TLSv1.2 will make it use 163 #Test 11: Sending no sig algs extension in TLSv1.2 should fail at security 173 #Test 12: Sending no sig algs extension in TLSv1.2 should fail at security [all …]
|
| /freebsd/sys/contrib/openzfs/man/man8/ |
| H A D | zfs-redact.8 | 144 do not exist on the sending side are destroyed. 178 features are active on the sending system, then the receiving system must have 195 sending local settings that may have nothing to do with the source dataset, 208 features are active on the sending system, then the receiving system must have 212 feature is enabled on the sending system but the 216 then the data will be decompressed before sending so it can be split into 242 Note that if you do not use this flag for sending encrypted datasets, data will 298 Allows sending a replication stream even when there are snapshots missing in the 309 The same report can be requested by sending 366 features are active on the sending syste [all...] |
| H A D | zfs-send.8 | 144 do not exist on the sending side are destroyed. 178 features are active on the sending system, then the receiving system must have 195 sending local settings that may have nothing to do with the source dataset, 208 features are active on the sending system, then the receiving system must have 212 feature is enabled on the sending system but the 216 then the data will be decompressed before sending so it can be split into 242 Note that if you do not use this flag for sending encrypted datasets, data will 298 Allows sending a replication stream even when there are snapshots missing in the 309 The same report can be requested by sending 366 features are active on the sending system, then the receiving system must have [all …]
|
| /freebsd/share/man/man4/ |
| H A D | unix.4 | 170 Credentials of the sending process can be transmitted explicitly using a 180 pid_t cmcred_pid; /* PID of sending process */ 181 uid_t cmcred_uid; /* real UID of sending process */ 182 uid_t cmcred_euid; /* effective UID of sending process */ 183 gid_t cmcred_gid; /* real GID of sending process */ 200 The sending process could have exited and its process ID already been 318 pid_t sc_pid; /* PID of sending process */ 363 pid_t cr_pid; /* process id of the sending process */
|
| H A D | blackhole.4 | 46 will prevent sending an ABORT packet in response to an incoming INIT. 47 A MIB value of two will do the same, but will also prevent sending an ABORT packet 63 or an unexpected segment on a listening port is dropped without sending a 67 Enabling blackhole behaviour turns off the sending
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_get_stream_read_state.pod | 33 overall state of the receiving and sending parts of a QUIC stream, respectively. 77 For SSL_get_stream_write_state(), this means that the sending part of the stream 79 or because a QUIC stream SSL object with an un-concluded sending part was freed 96 B<STOP_SENDING> frame for the sending part of the stream; the peer has indicated 97 that it does not wish to receive further data on the sending part of the stream. 117 the receiving or sending parts of a stream, respectively. On success, the
|
| H A D | SSL_free.pod | 37 When used to free a QUIC stream SSL object, the respective sending and receiving 45 If the stream has a sending part (in other words, if it is bidirectional or a 48 stream SSL object, a call to SSL_free() automatically resets the sending part of 61 stream in turn (which is its sending part).
|
| /freebsd/sys/dev/hyperv/netvsc/ |
| H A D | hn_nvs.c | 233 * Connect chimney sending buffer GPADL to the primary channel. in hn_nvs_conn_chim() 236 * Only primary channel has chimney sending buffer connected to it. in hn_nvs_conn_chim() 237 * Sub-channels just share this chimney sending buffer. in hn_nvs_conn_chim() 248 * Connect chimney sending buffer to NVS in hn_nvs_conn_chim() 283 * Can't use chimney sending buffer; done! in hn_nvs_conn_chim() 286 if_printf(sc->hn_ifp, "zero chimney sending buffer " in hn_nvs_conn_chim() 289 if_printf(sc->hn_ifp, "misaligned chimney sending " in hn_nvs_conn_chim() 301 if_printf(sc->hn_ifp, "chimney sending sections are " in hn_nvs_conn_chim() 305 if_printf(sc->hn_ifp, "discard %d chimney sending sections\n", in hn_nvs_conn_chim() 316 if_printf(sc->hn_ifp, "chimney sending buffer %d/%d\n", in hn_nvs_conn_chim() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_get_stream_read_state.3 | 92 overall state of the receiving and sending parts of a QUIC stream, respectively. 129 For \fBSSL_get_stream_write_state()\fR, this means that the sending part of the stream 131 or because a QUIC stream SSL object with an un-concluded sending part was freed 147 \&\fBSTOP_SENDING\fR frame for the sending part of the stream; the peer has indicated 148 that it does not wish to receive further data on the sending part of the stream. 165 the receiving or sending parts of a stream, respectively. On success, the
|
| H A D | SSL_free.3 | 95 When used to free a QUIC stream SSL object, the respective sending and receiving 99 If the stream has a sending part (in other words, if it is bidirectional or a 102 stream SSL object, a call to \fBSSL_free()\fR automatically resets the sending part of 113 stream in turn (which is its sending part).
|
| /freebsd/sys/contrib/device-tree/Bindings/serial/ |
| H A D | rs485.yaml | 23 milliseconds. It corresponds to the delay before sending data. 27 It corresponds to the delay after sending data and actual release 33 description: drive RTS high when sending (this is the default). 37 description: drive RTS low when sending (default is high). 51 description: enables the receiving of data even while sending data.
|
| /freebsd/usr.sbin/rtsold/ |
| H A D | rtsold.8 | 137 it refrains from sending additional solicitations on that interface, until 140 When sending a Router Solicitation on an interface, 204 sending such packets. 231 and a second argument of the sending router address, 246 and a second argument of the sending router address, 262 and a second argument of the sending router address.
|
| /freebsd/lib/libsys/ |
| H A D | sendfile.2 | 128 sending files off the 152 has some internal heuristics to do readahead when sending data. 236 to handle sending file data to the client. 237 If the sending socket is 244 If the sending socket is non-blocking and there are not enough 404 support for sending shared memory descriptors had been introduced.
|
| H A D | kill.2 | 66 the real or effective user ID of the sending process. 103 and the process sending the signal. 105 which the caller has permissions to, excluding the process sending the signal. 131 The sending process does not have permission to send
|
| /freebsd/crypto/openssl/ssl/record/methods/ |
| H A D | ssl3_meth.c | 96 size_t n_recs, int sending, SSL_MAC_BUF *mac, in ssl3_cipher() argument 127 if ((bs != 1) && sending && !provided) { in ssl3_cipher() 145 if (!sending) { in ssl3_cipher() 161 if (!sending && mac != NULL) { in ssl3_cipher() 186 if (!sending) in ssl3_cipher() 219 int sending) in ssl3_mac() argument 237 if (!sending in ssl3_mac()
|
| H A D | tls1_meth.c | 168 size_t n_recs, int sending, SSL_MAC_BUF *macs, in tls1_cipher() argument 201 if (sending) { in tls1_cipher() 283 if (sending) { in tls1_cipher() 287 } else if ((bs != 1) && sending && !provided) { in tls1_cipher() 308 if (!sending) { in tls1_cipher() 342 * When sending, seq is incremented after MAC calculation. in tls1_cipher() 346 if (sending && !rl->use_etm) in tls1_cipher() 376 if (!sending) { in tls1_cipher() 422 if (!sending) { in tls1_cipher() 465 int sending) in tls1_mac() argument [all …]
|
| /freebsd/lib/libipsec/ |
| H A D | pfkey.c | 326 * sending SADB_GETSPI message to the kernel. 452 * sending SADB_UPDATE message to the kernel. 476 * sending SADB_ADD message to the kernel. 500 * sending SADB_DELETE message to the kernel. 517 * sending SADB_DELETE without spi to the kernel. This is 600 * sending SADB_GET message to the kernel. 617 * sending SADB_REGISTER message to the kernel. 758 * sending SADB_FLUSH message to the kernel. 775 * sending SADB_DUMP message to the kernel. 792 * sending SADB_X_PROMIS [all...] |
| /freebsd/crypto/openssl/doc/designs/quic-design/ |
| H A D | demuxer.md | 24 - optionally trigger sending stateless reset packets if a received packet 34 - trigger sending version negotiation packets if the server receives a packet 47 - optionally trigger sending stateless reset packets as above for client
|
| /freebsd/crypto/krb5/src/include/ |
| H A D | k5-trace.h | 168 TRACE(c, "Sending DNS SRV query for {str}", domain) 174 TRACE(c, "Sending DNS URI query for {str}", domain) 244 TRACE(c, "Sending unauthenticated request") 303 TRACE(c, "NegoEx sending [{int}]{str}: {str}", (int)seqnum, typestr, info) 386 TRACE(c, "Sending request ({int} bytes) to {data}{str}{str}", len, \ 399 TRACE(c, "HTTPS error sending to {raddr}", raddr) 401 TRACE(c, "Sending HTTPS request to {raddr}", raddr) 415 TRACE(c, "TCP error sending to {raddr}: {errno}", raddr, err) 417 TRACE(c, "Sending TCP request to {raddr}", raddr) 421 TRACE(c, "UDP error sending to {raddr}: {errno}", raddr, err) [all …]
|