/freebsd/tools/regression/zfs/zpool/offline/ |
H A D | option-t.t | 17 echo " Sufficient replicas exist for the pool to continue functioning in a" 37 echo " Sufficient replicas exist for the pool to continue functioning in a" 61 echo " Sufficient replicas exist for the pool to continue functioning in a" 99 echo " Sufficient replicas exist for the pool to continue functioning in a" 121 echo " Sufficient replicas exist for the pool to continue functioning in a" 149 echo " Sufficient replicas exist for the pool to continue functioning in a" 191 echo " Sufficient replicas exist for the pool to continue functioning in a" 213 echo " Sufficient replicas exist for the pool to continue functioning in a" 238 echo " Sufficient replicas exist for the pool to continue functioning in a" 261 echo " Sufficient replicas exist for the pool to continue functioning in a" [all …]
|
H A D | raidz1.t | 17 echo " Sufficient replicas exist for the pool to continue functioning in a" 40 echo " Sufficient replicas exist for the pool to continue functioning in a" 64 echo " Sufficient replicas exist for the pool to continue functioning in a" 87 echo " Sufficient replicas exist for the pool to continue functioning in a" 110 echo " Sufficient replicas exist for the pool to continue functioning in a" 136 echo " Sufficient replicas exist for the pool to continue functioning in a" 163 echo " Sufficient replicas exist for the pool to continue functioning in a"
|
H A D | mirror.t | 17 echo " Sufficient replicas exist for the pool to continue functioning in a" 40 echo " Sufficient replicas exist for the pool to continue functioning in a" 64 echo " Sufficient replicas exist for the pool to continue functioning in a" 90 echo " Sufficient replicas exist for the pool to continue functioning in a" 116 echo " Sufficient replicas exist for the pool to continue functioning in a" 144 echo " Sufficient replicas exist for the pool to continue functioning in a" 172 echo " Sufficient replicas exist for the pool to continue functioning in a" 202 echo " Sufficient replicas exist for the pool to continue functioning in a"
|
H A D | raidz2.t | 17 echo " Sufficient replicas exist for the pool to continue functioning in a" 41 echo " Sufficient replicas exist for the pool to continue functioning in a" 65 echo " Sufficient replicas exist for the pool to continue functioning in a" 92 echo " Sufficient replicas exist for the pool to continue functioning in a" 118 echo " Sufficient replicas exist for the pool to continue functioning in a" 145 echo " Sufficient replicas exist for the pool to continue functioning in a" 175 echo " Sufficient replicas exist for the pool to continue functioning in a"
|
H A D | log.t | 17 echo " Sufficient replicas exist for the pool to continue functioning in a" 43 echo " Sufficient replicas exist for the pool to continue functioning in a" 70 echo " Sufficient replicas exist for the pool to continue functioning in a" 100 echo " Sufficient replicas exist for the pool to continue functioning in a" 132 echo " Sufficient replicas exist for the pool to continue functioning in a" 163 echo " Sufficient replicas exist for the pool to continue functioning in a" 193 echo " Sufficient replicas exist for the pool to continue functioning in a" 227 echo " Sufficient replicas exist for the pool to continue functioning in a"
|
/freebsd/lib/libpam/pam.d/ |
H A D | README | 37 sufficient: success is sufficient, and if no previous required 39 binding: success is sufficient; on failure all remaining 57 Note that having a "sufficient" module as the last entry for a
|
H A D | sshd | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 22 #password sufficient pam_krb5.so no_warn try_first_pass
|
H A D | system | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 22 #password sufficient pam_krb5.so no_warn try_first_pass
|
H A D | imap | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass
|
H A D | pop3 | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass
|
H A D | su | 7 auth sufficient pam_rootok.so no_warn 8 auth sufficient pam_self.so no_warn
|
H A D | ftpd | 7 #auth sufficient pam_krb5.so no_warn 8 #auth sufficient pam_ssh.so no_warn try_first_pass
|
H A D | other | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass
|
H A D | xdm | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass
|
/freebsd/sys/contrib/xen/ |
H A D | argo.h | 115 /* Sufficient space to queue space_required bytes might exist */ 212 * and Xen will notify the caller when sufficient space becomes available. 236 * If sufficient space is available, it will set XEN_ARGO_RING_SUFFICIENT 244 * XEN_ARGO_RING_SUFFICIENT sufficient space for space_required is there
|
/freebsd/sbin/veriexec/ |
H A D | veriexec.8 | 122 When setting or querying the state, it is sufficient to provide 130 are sufficient, but 236 state, if sufficient manifests have been loaded
|
/freebsd/contrib/llvm-project/clang/lib/Sema/ |
H A D | CheckExprLifetime.h | 28 /// sufficient for initializing the entity, and perform lifetime extension 34 /// sufficient for assigning to the entity.
|
/freebsd/tools/regression/zfs/zpool/replace/ |
H A D | raidz2.t | 23 echo " invalid. Sufficient replicas exist for the pool to continue" 162 echo " invalid. Sufficient replicas exist for the pool to continue" 278 echo " Sufficient replicas exist for the pool to continue functioning in a" 328 echo " invalid. Sufficient replicas exist for the pool to continue" 381 echo " invalid. Sufficient replicas exist for the pool to continue" 469 echo " Sufficient replicas exist for the pool to continue functioning in a" 519 echo " invalid. Sufficient replicas exist for the pool to continue" 568 echo " Sufficient replicas exist for the pool to continue functioning in a"
|
/freebsd/contrib/openbsm/libbsm/ |
H A D | au_mask.3 | 95 sufficient size. 150 As a result, the caller must always provide a buffer of sufficient length for
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_all_async_fds.pod | 40 responsibility to ensure sufficient memory is allocated at I<*fds> so typically 49 sufficient memory allocated, although they may be NULL. The number of added fds
|
H A D | ASYNC_WAIT_CTX_new.pod | 68 sufficient memory has been allocated in I<*fd> to receive all the file 72 the number of fds, and then again when sufficient memory has been allocated. If 84 NULL then the caller is responsible for ensuring sufficient memory is allocated.
|
/freebsd/share/man/man9/ |
H A D | efirt.9 | 168 is not sufficient to hold the variable data. 215 is not sufficient to hold the variable data.
|
/freebsd/share/doc/psd/01.cacm/ |
H A D | p2 | 71 necessary nor sufficient, in our environment, 86 sufficient internal interlocks to maintain 146 would cause reading beyond the end, only sufficient
|
/freebsd/contrib/openpam/doc/man/ |
H A D | pam.conf.5 | 111 .It Cm sufficient 129 .Cm sufficient
|
/freebsd/crypto/openssl/crypto/buffer/ |
H A D | buffer.c | 88 /* This limit is sufficient to ensure (len+3)/3*4 < 2**31 */ in BUF_MEM_grow() 126 /* This limit is sufficient to ensure (len+3)/3*4 < 2**31 */ in BUF_MEM_grow_clean()
|