| /freebsd/contrib/llvm-project/lldb/source/Breakpoint/ |
| H A D | BreakpointOptions.cpp | 160 void BreakpointOptions::CopyOverSetOptions(const BreakpointOptions &incoming) in CopyOverSetOptions() argument 162 if (incoming.m_set_flags.Test(eEnabled)) in CopyOverSetOptions() 164 m_enabled = incoming.m_enabled; in CopyOverSetOptions() 167 if (incoming.m_set_flags.Test(eOneShot)) in CopyOverSetOptions() 169 m_one_shot = incoming.m_one_shot; in CopyOverSetOptions() 172 if (incoming.m_set_flags.Test(eCallback)) in CopyOverSetOptions() 174 m_callback = incoming.m_callback; in CopyOverSetOptions() 175 m_callback_baton_sp = incoming.m_callback_baton_sp; in CopyOverSetOptions() 176 m_callback_is_synchronous = incoming.m_callback_is_synchronous; in CopyOverSetOptions() 177 m_baton_is_command_baton = incoming.m_baton_is_command_baton; in CopyOverSetOptions() [all …]
|
| /freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/ |
| H A D | BreakpointName.h | 81 void MergeInto(const Permissions &incoming) in MergeInto() argument 83 MergePermission(incoming, listPerm); in MergeInto() 84 MergePermission(incoming, disablePerm); in MergeInto() 85 MergePermission(incoming, deletePerm); in MergeInto() 130 void MergePermission(const Permissions &incoming, in MergePermission() argument 132 if (incoming.IsSet(permission)) in MergePermission() 135 incoming.m_permissions[permission])); in MergePermission()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_set_incoming_stream_policy.pod | 7 SSL_INCOMING_STREAM_POLICY_REJECT - manage the QUIC incoming stream 23 SSL_set_incoming_stream_policy() policy changes the incoming stream policy for a 25 automatically reject incoming streams initiated by the peer. This is intended to 49 B<SSL_DEFAULT_STREAM_MODE_AUTO_UNI>, the incoming stream is rejected. 54 the application is assumed to be stream aware, and the incoming stream is 61 Always accept incoming streams, allowing them to be dequeued using 66 Always reject incoming streams. 70 Where an incoming stream is rejected, it is rejected immediately and it is not
|
| H A D | SSL_accept_stream.pod | 6 accept an incoming QUIC stream from a QUIC peer 20 The SSL_accept_stream() function attempts to dequeue an incoming stream from the 24 If the queue of incoming streams is empty, this function returns NULL (in 25 nonblocking mode) or waits for an incoming stream (in blocking mode). This 40 SSL_get_accept_stream_queue_len() returns the number of incoming streams 46 necessary to explicitly configure the incoming stream policy before streams can 54 no new incoming streams are available, or if the connection has been terminated, 58 SSL_get_accept_stream_queue_len() returns the number of incoming streams
|
| H A D | BIO_s_accept.pod | 51 waits for an incoming connection. 61 incoming connection. 97 will be duplicated and prepended to the chain when an incoming 123 and subsequent calls to BIO_do_accept() will await an incoming 129 incoming connection before processing I/O calls. When an accept 136 an initial accept socket will await an incoming connection then 145 incoming connections. This can be done by waiting for a connection and 152 again which can be used to await further incoming connections. 158 however because the accept BIO will still accept additional incoming 163 called to await an incoming connection it is possible for [all …]
|
| H A D | DTLSv1_listen.pod | 7 - Statelessly listen for incoming connections 18 SSL_stateless() statelessly listens for new incoming TLSv1.3 connections. 19 DTLSv1_listen() statelessly listens for new incoming DTLS connections. If a 90 Since DTLSv1_listen() operates entirely statelessly whilst processing incoming
|
| H A D | SSL_new_listener.pod | 115 The SSL_listen() function begins monitoring the listener I<ssl> for incoming 128 accepts a new incoming connection. A new SSL object representing the accepted 129 connection is created and returned on success. If no incoming connection is 183 incoming and outgoing connections.
|
| /freebsd/sys/netgraph/ |
| H A D | ng_bridge.c | 708 link_p foundFirst, incoming; member 765 if (destLink == ctx->incoming) { in ng_bridge_send_ctx() 789 counter_u64_add(ctx->incoming->stats.memoryFailures, 1); in ng_bridge_send_ctx() 812 ctx.incoming = NG_HOOK_PRIVATE(hook); in ng_bridge_rcvdata() 815 counter_u64_add(ctx.incoming->stats.recvRunts, 1); in ng_bridge_rcvdata() 821 counter_u64_add(ctx.incoming->stats.memoryFailures, 1); in ng_bridge_rcvdata() 827 counter_u64_add(ctx.incoming->stats.recvInvalid, 1); in ng_bridge_rcvdata() 834 if (ctx.incoming->loopCount != 0) { in ng_bridge_rcvdata() 835 counter_u64_add(ctx.incoming->stats.loopDrops, 1); in ng_bridge_rcvdata() 842 counter_u64_add(ctx.incoming->stats.recvPackets, 1); in ng_bridge_rcvdata() [all …]
|
| /freebsd/share/examples/ipfilter/ |
| H A D | ipf.conf.restrictive | 17 # 100 incoming ed1 19 # 200 incoming fxp0 28 # incoming ed1 traffic - group 100 42 # allow incoming ftp-data 62 # incoming traffic on fxp0 - group 200
|
| H A D | firewall.2 | 33 # Block all incoming UDP traffic except talk and DNS traffic. NFS 43 # Block all incoming TCP traffic connections to known services, 50 # Allow incoming TCP connections to ports between 1024 and 5000, as 59 # Now allow various incoming TCP connections to particular hosts, TCP
|
| /freebsd/sys/netinet/libalias/ |
| H A D | HISTORY | 5 - Host accepts incoming connections for ports 0 to 1023. 11 - Generalized mechanism for handling incoming 21 - Corrected error in handling incoming UDP packets 96 to support multiple incoming addresses and static 100 - Now supports outgoing as well as incoming ICMP
|
| /freebsd/usr.sbin/ppp/ |
| H A D | README.nat | 142 Set to "yes" to disable all incoming connections. This just drops 145 all incoming TCP and UDP requests, making the NAT software a 147 all incoming connections to telnetd, ftpd, etc. 204 This command allows incoming traffic to <nat port> on the host 229 The above command would redirect all incoming traffic to 239 then incoming traffic will be directed to the last 255 ICMP error messages are currently handled only in the incoming direction. 267 host address, outgoing NAT and incoming de-NATing). 296 PPP host accepts incoming connections for ports 0 to 1023. 302 - Generalised mechanism for handling incoming connections [all …]
|
| /freebsd/contrib/unbound/contrib/ |
| H A D | unbound_munin_ | 81 unbound_munin_by_type - incoming queries by type 82 unbound_munin_by_class - incoming queries by class 83 unbound_munin_by_opcode - incoming queries by opcode 85 unbound_munin_by_flags - incoming queries by flags
|
| /freebsd/share/examples/ipfilter/rules/ |
| H A D | example.1 | 2 # block all incoming TCP packets on le0 from host 10.1.1.1 to any destination.
|
| H A D | example.10 | 7 # block incoming connection requests to my internal network from the big bad
|
| H A D | example.8 | 2 # block all incoming TCP connections but send back a TCP-RST for ones to
|
| /freebsd/contrib/llvm-project/llvm/lib/ProfileData/ |
| H A D | GCOV.cpp | 481 src->incoming = (GCOVArc *)1; // Mark u available for cycle detection in augmentOneCycle() 498 if (succ->dst.incoming == nullptr) { in augmentOneCycle() 499 succ->dst.incoming = succ; in augmentOneCycle() 505 minCount = std::min(minCount, v->incoming->cycleCount); in augmentOneCycle() 506 v = &v->incoming->src; in augmentOneCycle() 512 v->incoming->cycleCount -= minCount; in augmentOneCycle() 513 v = &v->incoming->src; in augmentOneCycle() 533 const_cast<GCOVBlock *>(b)->incoming = nullptr; in getCyclesCount()
|
| /freebsd/sys/contrib/openzfs/module/zfs/ |
| H A D | spa_log_spacemap.c | 648 uint64_t incoming = spa_estimate_incoming_log_blocks(spa); in spa_estimate_metaslabs_to_flush() local 666 spa_log_sm_blocklimit(spa) - spa_log_sm_nblocks(spa) - incoming; in spa_estimate_metaslabs_to_flush() 695 uint64_t skip_txgs = (incoming == 0) ? in spa_estimate_metaslabs_to_flush() 697 (available_blocks / incoming) + 1); in spa_estimate_metaslabs_to_flush() 698 available_blocks -= (skip_txgs * incoming); in spa_estimate_metaslabs_to_flush() 701 ASSERT3S(available_blocks, >=, -incoming); in spa_estimate_metaslabs_to_flush()
|
| /freebsd/sys/contrib/device-tree/Bindings/soc/qcom/ |
| H A D | qcom,smp2p.txt | 65 Usage: required for incoming entries 73 Usage: required for incoming entries
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/RISCV/ |
| H A D | RISCVInstrInfoXqccmp.td | 15 // closest to the incoming stack pointer (to be compatible with the 19 // `fp` to the incoming stack pointer value, as expected by the frame-pointer
|
| /freebsd/contrib/llvm-project/llvm/lib/Transforms/Scalar/ |
| H A D | LoopDeletion.cpp | 76 Value *incoming = P.getIncomingValueForBlock(ExitingBlocks[0]); in isLoopDead() local 84 return incoming == P.getIncomingValueForBlock(BB); in isLoopDead() 90 if (Instruction *I = dyn_cast<Instruction>(incoming)) { in isLoopDead()
|
| /freebsd/contrib/sendmail/cf/feature/ |
| H A D | virtusertable.m4 | 22 # Virtual user table (maps incoming users)
|
| /freebsd/contrib/dma/ |
| H A D | README.markdown | 12 incoming connections.
|
| /freebsd/contrib/libpcap/doc/ |
| H A D | README.hpux | 25 >it, but I can only see incoming data, never outgoing. 48 Subject: Re: tcpdump only shows incoming packets 55 > closer look I only get to see the incoming packets not the 77 Subject: Re: tcpdump only shows incoming packets
|
| /freebsd/sys/contrib/device-tree/Bindings/iio/gyroscope/ |
| H A D | invensense,mpu3050.txt | 19 incoming I2C bus, alternatively drive traffic to a slave device (usually
|