Home
last modified time | relevance | path

Searched full:sufficient (Results 1 – 25 of 1006) sorted by relevance

12345678910>>...41

/freebsd/tools/regression/zfs/zpool/offline/
H A Doption-t.t17 echo " Sufficient replicas exist for the pool to continue functioning in a"
37 echo " Sufficient replicas exist for the pool to continue functioning in a"
61 echo " Sufficient replicas exist for the pool to continue functioning in a"
99 echo " Sufficient replicas exist for the pool to continue functioning in a"
121 echo " Sufficient replicas exist for the pool to continue functioning in a"
149 echo " Sufficient replicas exist for the pool to continue functioning in a"
191 echo " Sufficient replicas exist for the pool to continue functioning in a"
213 echo " Sufficient replicas exist for the pool to continue functioning in a"
238 echo " Sufficient replicas exist for the pool to continue functioning in a"
261 echo " Sufficient replicas exist for the pool to continue functioning in a"
[all …]
H A Draidz1.t17 echo " Sufficient replicas exist for the pool to continue functioning in a"
40 echo " Sufficient replicas exist for the pool to continue functioning in a"
64 echo " Sufficient replicas exist for the pool to continue functioning in a"
87 echo " Sufficient replicas exist for the pool to continue functioning in a"
110 echo " Sufficient replicas exist for the pool to continue functioning in a"
136 echo " Sufficient replicas exist for the pool to continue functioning in a"
163 echo " Sufficient replicas exist for the pool to continue functioning in a"
H A Dmirror.t17 echo " Sufficient replicas exist for the pool to continue functioning in a"
40 echo " Sufficient replicas exist for the pool to continue functioning in a"
64 echo " Sufficient replicas exist for the pool to continue functioning in a"
90 echo " Sufficient replicas exist for the pool to continue functioning in a"
116 echo " Sufficient replicas exist for the pool to continue functioning in a"
144 echo " Sufficient replicas exist for the pool to continue functioning in a"
172 echo " Sufficient replicas exist for the pool to continue functioning in a"
202 echo " Sufficient replicas exist for the pool to continue functioning in a"
H A Draidz2.t17 echo " Sufficient replicas exist for the pool to continue functioning in a"
41 echo " Sufficient replicas exist for the pool to continue functioning in a"
65 echo " Sufficient replicas exist for the pool to continue functioning in a"
92 echo " Sufficient replicas exist for the pool to continue functioning in a"
118 echo " Sufficient replicas exist for the pool to continue functioning in a"
145 echo " Sufficient replicas exist for the pool to continue functioning in a"
175 echo " Sufficient replicas exist for the pool to continue functioning in a"
H A Dlog.t17 echo " Sufficient replicas exist for the pool to continue functioning in a"
43 echo " Sufficient replicas exist for the pool to continue functioning in a"
70 echo " Sufficient replicas exist for the pool to continue functioning in a"
100 echo " Sufficient replicas exist for the pool to continue functioning in a"
132 echo " Sufficient replicas exist for the pool to continue functioning in a"
163 echo " Sufficient replicas exist for the pool to continue functioning in a"
193 echo " Sufficient replicas exist for the pool to continue functioning in a"
227 echo " Sufficient replicas exist for the pool to continue functioning in a"
/freebsd/lib/libpam/pam.d/
H A DREADME37 sufficient: success is sufficient, and if no previous required
39 binding: success is sufficient; on failure all remaining
57 Note that having a "sufficient" module as the last entry for a
H A Dsshd7 #auth sufficient pam_krb5.so no_warn try_first_pass
8 #auth sufficient pam_ssh.so no_warn try_first_pass
22 #password sufficient pam_krb5.so no_warn try_first_pass
H A Dsystem7 #auth sufficient pam_krb5.so no_warn try_first_pass
8 #auth sufficient pam_ssh.so no_warn try_first_pass
22 #password sufficient pam_krb5.so no_warn try_first_pass
H A Dimap7 #auth sufficient pam_krb5.so no_warn try_first_pass
8 #auth sufficient pam_ssh.so no_warn try_first_pass
H A Dpop37 #auth sufficient pam_krb5.so no_warn try_first_pass
8 #auth sufficient pam_ssh.so no_warn try_first_pass
H A Dsu7 auth sufficient pam_rootok.so no_warn
8 auth sufficient pam_self.so no_warn
H A Dftpd7 #auth sufficient pam_krb5.so no_warn
8 #auth sufficient pam_ssh.so no_warn try_first_pass
H A Dother7 #auth sufficient pam_krb5.so no_warn try_first_pass
8 #auth sufficient pam_ssh.so no_warn try_first_pass
H A Dxdm7 #auth sufficient pam_krb5.so no_warn try_first_pass
8 #auth sufficient pam_ssh.so no_warn try_first_pass
/freebsd/sys/contrib/xen/
H A Dargo.h115 /* Sufficient space to queue space_required bytes might exist */
212 * and Xen will notify the caller when sufficient space becomes available.
236 * If sufficient space is available, it will set XEN_ARGO_RING_SUFFICIENT
244 * XEN_ARGO_RING_SUFFICIENT sufficient space for space_required is there
/freebsd/sbin/veriexec/
H A Dveriexec.8122 When setting or querying the state, it is sufficient to provide
130 are sufficient, but
236 state, if sufficient manifests have been loaded
/freebsd/contrib/llvm-project/clang/lib/Sema/
H A DCheckExprLifetime.h28 /// sufficient for initializing the entity, and perform lifetime extension
34 /// sufficient for assigning to the entity.
/freebsd/tools/regression/zfs/zpool/replace/
H A Draidz2.t23 echo " invalid. Sufficient replicas exist for the pool to continue"
162 echo " invalid. Sufficient replicas exist for the pool to continue"
278 echo " Sufficient replicas exist for the pool to continue functioning in a"
328 echo " invalid. Sufficient replicas exist for the pool to continue"
381 echo " invalid. Sufficient replicas exist for the pool to continue"
469 echo " Sufficient replicas exist for the pool to continue functioning in a"
519 echo " invalid. Sufficient replicas exist for the pool to continue"
568 echo " Sufficient replicas exist for the pool to continue functioning in a"
/freebsd/contrib/openbsm/libbsm/
H A Dau_mask.395 sufficient size.
150 As a result, the caller must always provide a buffer of sufficient length for
/freebsd/crypto/openssl/doc/man3/
H A DSSL_get_all_async_fds.pod40 responsibility to ensure sufficient memory is allocated at I<*fds> so typically
49 sufficient memory allocated, although they may be NULL. The number of added fds
H A DASYNC_WAIT_CTX_new.pod68 sufficient memory has been allocated in I<*fd> to receive all the file
72 the number of fds, and then again when sufficient memory has been allocated. If
84 NULL then the caller is responsible for ensuring sufficient memory is allocated.
/freebsd/share/man/man9/
H A Defirt.9168 is not sufficient to hold the variable data.
215 is not sufficient to hold the variable data.
/freebsd/share/doc/psd/01.cacm/
H A Dp271 necessary nor sufficient, in our environment,
86 sufficient internal interlocks to maintain
146 would cause reading beyond the end, only sufficient
/freebsd/contrib/openpam/doc/man/
H A Dpam.conf.5111 .It Cm sufficient
129 .Cm sufficient
/freebsd/crypto/openssl/crypto/buffer/
H A Dbuffer.c88 /* This limit is sufficient to ensure (len+3)/3*4 < 2**31 */ in BUF_MEM_grow()
126 /* This limit is sufficient to ensure (len+3)/3*4 < 2**31 */ in BUF_MEM_grow_clean()

12345678910>>...41