/freebsd/contrib/llvm-project/llvm/include/llvm/ADT/ |
H A D | fallible_iterator.h | 22 /// The fallible_iterator template wraps an underlying iterator-like class 35 /// underlying iterator and (for non-end iterators) a reference to an Error 36 /// instance. If the underlying increment/decrement operations fail, the Error 68 template <typename Underlying> class fallible_iterator { 80 /// decremented and compared, providing the underlying type supports it. 84 static fallible_iterator itr(Underlying I, Error &Err) { in itr() 91 /// A value created by this method can be dereferenced (if the underlying 94 static fallible_iterator end(Underlying I) { in end() 98 /// Forward dereference to the underlying iterator. 101 /// Forward const dereference to the underlying iterator. [all …]
|
H A D | BitmaskEnum.h | 34 /// instance of the underlying type (e.g. int). But using this macro, bitwise 127 /// Check that Val is in range for E, and return Val cast to E's underlying 129 template <typename E> constexpr std::underlying_type_t<E> Underlying(E Val) { 147 return static_cast<E>(~Underlying(Val) & Mask<E>()); 152 return static_cast<E>(Underlying(LHS) | Underlying(RHS)); 157 return static_cast<E>(Underlying(LHS) & Underlying(RHS)); 162 return static_cast<E>(Underlying(LHS) ^ Underlying(RH [all...] |
H A D | EnumeratedArray.h | 43 Underlying[IX] = V; in EnumeratedArray() 49 Underlying[IX] = *(Init.begin() + IX); in EnumeratedArray() 56 return Underlying[IX]; 66 iterator begin() { return Underlying; } in begin() 67 const_iterator begin() const { return Underlying; } in begin() 82 ValueType Underlying[Size];
|
/freebsd/contrib/ntp/sntp/libevent/ |
H A D | bufferevent_filter.c | 84 struct bufferevent *underlying; member 89 /** True iff we have received an EOF callback from the underlying 131 /** Return 1 iff bevf's underlying bufferevent's output buffer is at or 138 struct bufferevent *u = bevf->underlying; in be_underlying_writebuf_full() 170 bufferevent_filter_new(struct bufferevent *underlying, in bufferevent_filter_new() argument 180 if (!underlying) in bufferevent_filter_new() 192 if (bufferevent_init_common_(&bufev_f->bev, underlying->ev_base, in bufferevent_filter_new() 201 bufev_f->underlying = underlying; in bufferevent_filter_new() 208 bufferevent_setcb(bufev_f->underlying, in bufferevent_filter_new() 220 bufferevent_incref_(underlying); in bufferevent_filter_new() [all …]
|
H A D | bufferevent_openssl.c | 272 to an underlying bufferevent using a BIO_bufferevent, and one that has the 288 If we were set up with an underlying bufferevent, we use the 293 /* An underlying bufferevent that we're directing our output to. 295 struct bufferevent *underlying; member 379 /* Have the base communications channel (either the underlying bufferevent or 385 if (bev_ssl->underlying) { in start_reading() 386 bufferevent_unsuspend_read_(bev_ssl->underlying, in start_reading() 400 /* Have the base communications channel (either the underlying bufferevent or 407 if (bev_ssl->underlying) { in start_writing() 409 bufferevent_unsuspend_read_(bev_ssl->underlying, in start_writing() [all …]
|
/freebsd/contrib/libevent/ |
H A D | bufferevent_filter.c | 84 struct bufferevent *underlying; member 89 /** True iff we have received an EOF callback from the underlying 131 /** Return 1 iff bevf's underlying bufferevent's output buffer is at or 138 struct bufferevent *u = bevf->underlying; in be_underlying_writebuf_full() 170 bufferevent_filter_new(struct bufferevent *underlying, in bufferevent_filter_new() argument 180 if (!underlying) in bufferevent_filter_new() 192 if (bufferevent_init_common_(&bufev_f->bev, underlying->ev_base, in bufferevent_filter_new() 201 bufev_f->underlying = underlying; in bufferevent_filter_new() 208 bufferevent_setcb(bufev_f->underlying, in bufferevent_filter_new() 220 bufferevent_incref_(underlying); in bufferevent_filter_new() [all …]
|
H A D | bufferevent_openssl.c | 272 to an underlying bufferevent using a BIO_bufferevent, and one that has the 288 If we were set up with an underlying bufferevent, we use the 293 /* An underlying bufferevent that we're directing our output to. 295 struct bufferevent *underlying; member 379 /* Have the base communications channel (either the underlying bufferevent or 385 if (bev_ssl->underlying) { in start_reading() 386 bufferevent_unsuspend_read_(bev_ssl->underlying, in start_reading() 400 /* Have the base communications channel (either the underlying bufferevent or 407 if (bev_ssl->underlying) { in start_writing() 409 bufferevent_unsuspend_read_(bev_ssl->underlying, in start_writing() [all …]
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Support/ |
H A D | BinaryStreamReader.h | 43 /// Read as much as possible from the underlying string at the current offset 51 /// Read \p Size bytes from the underlying stream at the current offset and 53 /// depends on the implementation of the underlying stream. Updates the 61 /// stream's offset. The data is always copied from the stream's underlying 103 /// on the implementation of the underlying stream. Updates the stream's 118 /// on the implementation of the underlying stream. Updates the stream's 125 /// Read the entire remainder of the underlying stream into \p Ref. This is 133 /// Read \p Length bytes from the underlying stream into \p Ref. This is 142 /// Read \p Length bytes from the underlying stream into \p Ref. This is 151 /// Get a pointer to an object of type T from the underlying strea [all...] |
H A D | BinaryStreamWriter.h | 44 /// Write the bytes specified in \p Buffer to the underlying stream. 52 /// Write the integer \p Value to the underlying stream in the 75 /// Write the unsigned integer Value to the underlying stream using ULEB128 82 /// Write the unsigned integer Value to the underlying stream using ULEB128 89 /// Write the string \p Str to the underlying stream followed by a null 98 /// Write the string \p Str to the underlying stream without a null 122 /// Writes the object \p Obj to the underlying stream, as if by using memcpy. 137 /// Writes an array of objects of type T to the underlying stream, as if by 156 /// Writes all data from the array \p Array to the underlying stream. 165 /// Writes all elements from the array \p Array to the underlying strea in writeArray() [all...] |
/freebsd/share/man/man9/ |
H A D | buf.9 | 47 (struct buf) is that the underlying pages are mapped directly from the buffer 51 The second most important thing to remember is that due to the underlying page 82 A VM buffer is capable of mapping the underlying VM cache pages into KVM in 96 such as file system devices to remap underlying pages in order to deal with, 102 to clear the dirty bit on the underlying pages the moment it queues the I/O 117 the underlying pages being marked clean, the B_DELWRI|B_RELBUF combination must 121 where B_DELWRI is not set, the underlying dirty pages are still properly 131 instantiated VM Buffers (struct buf's) prevent their underlying pages in the
|
H A D | device_get_property.9 | 46 The underlying property type is specified with the 52 The underlying property is a string of bytes. 56 Following a reference the underlying property is a handle of the 59 The underlying property is an array of unsigned 32 bit integers. 64 The underlying property is an array of unsigned 64 bit integers.
|
/freebsd/contrib/elftoolchain/libelf/ |
H A D | gelf.3 | 91 of the underlying (class-dependent) ELF data structure. 106 underlying ELF data structure using the 115 When updating an underlying 32 bit ELF data structure, the GElf 117 for the underlying ELF data type. 150 Retrieve an ELF Compression Header from the underlying ELF descriptor. 156 Retrieve an ELF Executable Header from the underlying ELF descriptor. 158 Retrieve an ELF Program Header Table entry from the underlying ELF descriptor. 164 Retrieve an ELF Section Header Table entry from the underlying ELF descriptor.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_accept.pod | 17 B<ssl> by setting an underlying B<BIO>. 21 The behaviour of SSL_accept() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_accept() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_accept() will also return 27 when the underlying BIO could not satisfy the needs of SSL_accept() 33 The action depends on the underlying BIO. When using a nonblocking socket,
|
H A D | BIO_s_datagram.pod | 64 the underlying socket is configured and how it is to be used; see below. 98 Despite its name, this function does not cause the underlying socket to become 103 This informs the BIO_s_datagram() whether the underlying socket has been 108 underlying socket has been connected and will attempt to use the socket using OS 113 If the I<peer> argument is NULL, BIO_s_datagram() assumes that the underlying 153 to try and autodetect the peer address to which the underlying socket is 186 If I<num> is nonzero, configures the underlying network socket to enable Don't 193 the underlying network socket, and returns that Path MTU in bytes. This control 201 This control requests that Path MTU discovery be enabled on the underlying 208 supported by the applicable underlying network layer. Use of datagrams of this [all …]
|
H A D | SSL_connect.pod | 17 underlying B<BIO>. B<ssl> B<MUST NOT> be NULL. 21 The behaviour of SSL_connect() depends on the underlying BIO. 23 If the underlying BIO is B<blocking>, SSL_connect() will only return once the 26 If the underlying BIO is B<nonblocking>, SSL_connect() will also return 27 when the underlying BIO could not satisfy the needs of SSL_connect() 33 The action depends on the underlying BIO. When using a nonblocking socket,
|
H A D | EVP_MAC.pod | 71 different types and with different underlying algorithms if there are 77 the MAC algorithm itself and one for the underlying computation 82 "underlying context", or "computation context", which is to denote the 83 context for the underlying computation algorithm if there is one. 91 rely on an underlying computation algorithm. 118 underlying context if there is one, as well as the context itself. 142 EVP_MAC_init() sets up the underlying context I<ctx> with information given 177 Note that a parameter that is unknown in the underlying context is 181 context I<ctx> and its underlying context. 184 Note that a parameter that is unknown in the underlying context is [all …]
|
H A D | SSL_read.pod | 25 respectively except no bytes are actually removed from the underlying BIO during 38 underlying BIO. 56 of the underlying transport (e.g. TCP), it may be necessary to read several 68 If the underlying BIO is B<blocking>, a read function will only return once the 75 If the underlying BIO is B<nonblocking>, a read function will also return when 76 the underlying BIO could not satisfy the needs of the function to continue the 85 The action depends on the underlying BIO. 94 receiving new data from the underlying socket.
|
H A D | SSL_do_handshake.pod | 23 The behaviour of SSL_do_handshake() depends on the underlying BIO. 25 If the underlying BIO is B<blocking>, SSL_do_handshake() will only return 28 If the underlying BIO is B<nonblocking>, SSL_do_handshake() will also return 29 when the underlying BIO could not satisfy the needs of SSL_do_handshake() 34 The action depends on the underlying BIO. When using a nonblocking socket,
|
/freebsd/crypto/openssl/doc/designs/quic-design/ |
H A D | quic-io-arch.md | 5 internal to the libssl QUIC implementation, discusses the underlying design 45 Note that implementation of QUIC will require that the underlying network BIO 61 underlying BIO provided to the QUIC implementation to provide it access to the 65 Blocking vs. Non-Blocking Modes in Underlying Network BIOs 69 used for the calls to the underlying network BIOs. To illustrate this point, we 75 the following events for the underlying network read and write BIOs immediately: 77 - The underlying network write BIO becomes writeable; 78 - The underlying network read BIO becomes readable; 132 an underlying network BIO, 134 underlying network BIO, [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | BIO_s_datagram.3 | 117 the underlying socket is configured and how it is to be used; see below. 142 Despite its name, this function does not cause the underlying socket to become 146 This informs the \fBBIO_s_datagram()\fR whether the underlying socket has been 151 underlying socket has been connected and will attempt to use the socket using OS 156 If the \fIpeer\fR argument is NULL, \fBBIO_s_datagram()\fR assumes that the underlying 189 to try and autodetect the peer address to which the underlying socket is 218 If \fInum\fR is nonzero, configures the underlying network socket to enable Don't 224 the underlying network socket, and returns that Path MTU in bytes. This control 231 This control requests that Path MTU discovery be enabled on the underlying 237 supported by the applicable underlying network layer. Use of datagrams of this [all …]
|
H A D | EVP_MAC.3 | 130 different types and with different underlying algorithms if there are 136 the MAC algorithm itself and one for the underlying computation 142 context for the underlying computation algorithm if there is one. 149 rely on an underlying computation algorithm. 174 underlying context if there is one, as well as the context itself. 197 \&\fBEVP_MAC_init()\fR sets up the underlying context \fIctx\fR with information given 232 Note that a parameter that is unknown in the underlying context is 236 context \fIctx\fR and its underlying context. 239 Note that a parameter that is unknown in the underlying context is 242 \&\fBEVP_MAC_CTX_set_params()\fR passes chosen parameters to the underlying [all …]
|
H A D | SSL_accept.3 | 76 \&\fBssl\fR by setting an underlying \fBBIO\fR. 79 The behaviour of \fBSSL_accept()\fR depends on the underlying BIO. 81 If the underlying BIO is \fBblocking\fR, \fBSSL_accept()\fR will only return once the 84 If the underlying BIO is \fBnonblocking\fR, \fBSSL_accept()\fR will also return 85 when the underlying BIO could not satisfy the needs of \fBSSL_accept()\fR 91 The action depends on the underlying BIO. When using a nonblocking socket,
|
H A D | SSL_read.3 | 84 respectively except no bytes are actually removed from the underlying BIO during 96 underlying BIO. 114 of the underlying transport (e.g. TCP), it may be necessary to read several 126 If the underlying BIO is \fBblocking\fR, a read function will only return once the 133 If the underlying BIO is \fBnonblocking\fR, a read function will also return when 134 the underlying BIO could not satisfy the needs of the function to continue the 143 The action depends on the underlying BIO. 152 receiving new data from the underlying socket.
|
H A D | SSL_connect.3 | 76 underlying \fBBIO\fR. \fBssl\fR \fBMUST NOT\fR be NULL. 79 The behaviour of \fBSSL_connect()\fR depends on the underlying BIO. 81 If the underlying BIO is \fBblocking\fR, \fBSSL_connect()\fR will only return once the 84 If the underlying BIO is \fBnonblocking\fR, \fBSSL_connect()\fR will also return 85 when the underlying BIO could not satisfy the needs of \fBSSL_connect()\fR 91 The action depends on the underlying BIO. When using a nonblocking socket,
|
/freebsd/contrib/llvm-project/llvm/include/llvm/IR/ |
H A D | AbstractCallSite.h | 53 /// The encoding of a callback with regards to the underlying instruction. 73 /// The underlying call site: 78 /// The encoding of a callback with regards to the underlying instruction. 111 /// Return the underlying instruction. 161 /// Return the operand index of the underlying instruction associated with @p 167 /// Return the operand index of the underlying instruction associated with 176 /// Return the operand of the underlying instruction associated with @p Arg. 181 /// Return the operand of the underlying instruction associated with the 192 /// Return the operand index of the underlying instruction associated with the 200 /// Return the use of the callee value in the underlying instruction. Only
|