Home
last modified time | relevance | path

Searched refs:incoming (Results 1 – 25 of 150) sorted by relevance

123456

/freebsd/contrib/llvm-project/lldb/source/Breakpoint/
H A DBreakpointOptions.cpp160 void BreakpointOptions::CopyOverSetOptions(const BreakpointOptions &incoming) in CopyOverSetOptions() argument
162 if (incoming.m_set_flags.Test(eEnabled)) in CopyOverSetOptions()
164 m_enabled = incoming.m_enabled; in CopyOverSetOptions()
167 if (incoming.m_set_flags.Test(eOneShot)) in CopyOverSetOptions()
169 m_one_shot = incoming.m_one_shot; in CopyOverSetOptions()
172 if (incoming.m_set_flags.Test(eCallback)) in CopyOverSetOptions()
174 m_callback = incoming.m_callback; in CopyOverSetOptions()
175 m_callback_baton_sp = incoming.m_callback_baton_sp; in CopyOverSetOptions()
176 m_callback_is_synchronous = incoming.m_callback_is_synchronous; in CopyOverSetOptions()
177 m_baton_is_command_baton = incoming.m_baton_is_command_baton; in CopyOverSetOptions()
[all …]
/freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/
H A DBreakpointName.h81 void MergeInto(const Permissions &incoming) in MergeInto() argument
83 MergePermission(incoming, listPerm); in MergeInto()
84 MergePermission(incoming, disablePerm); in MergeInto()
85 MergePermission(incoming, deletePerm); in MergeInto()
130 void MergePermission(const Permissions &incoming, in MergePermission() argument
132 if (incoming.IsSet(permission)) in MergePermission()
135 incoming.m_permissions[permission])); in MergePermission()
/freebsd/crypto/openssl/doc/man3/
H A DSSL_set_incoming_stream_policy.pod7 SSL_INCOMING_STREAM_POLICY_REJECT - manage the QUIC incoming stream
23 SSL_set_incoming_stream_policy() policy changes the incoming stream policy for a
25 automatically reject incoming streams initiated by the peer. This is intended to
49 B<SSL_DEFAULT_STREAM_MODE_AUTO_UNI>, the incoming stream is rejected.
54 the application is assumed to be stream aware, and the incoming stream is
61 Always accept incoming streams, allowing them to be dequeued using
66 Always reject incoming streams.
70 Where an incoming stream is rejected, it is rejected immediately and it is not
H A DSSL_accept_stream.pod6 accept an incoming QUIC stream from a QUIC peer
20 The SSL_accept_stream() function attempts to dequeue an incoming stream from the
24 If the queue of incoming streams is empty, this function returns NULL (in
25 nonblocking mode) or waits for an incoming stream (in blocking mode). This
40 SSL_get_accept_stream_queue_len() returns the number of incoming streams
46 necessary to explicitly configure the incoming stream policy before streams can
54 no new incoming streams are available, or if the connection has been terminated,
58 SSL_get_accept_stream_queue_len() returns the number of incoming streams
H A DBIO_s_accept.pod51 waits for an incoming connection.
61 incoming connection.
97 will be duplicated and prepended to the chain when an incoming
123 and subsequent calls to BIO_do_accept() will await an incoming
129 incoming connection before processing I/O calls. When an accept
136 an initial accept socket will await an incoming connection then
145 incoming connections. This can be done by waiting for a connection and
152 again which can be used to await further incoming connections.
158 however because the accept BIO will still accept additional incoming
163 called to await an incoming connection it is possible for
[all …]
H A DDTLSv1_listen.pod7 - Statelessly listen for incoming connections
18 SSL_stateless() statelessly listens for new incoming TLSv1.3 connections.
19 DTLSv1_listen() statelessly listens for new incoming DTLS connections. If a
90 Since DTLSv1_listen() operates entirely statelessly whilst processing incoming
H A DSSL_new_listener.pod115 The SSL_listen() function begins monitoring the listener I<ssl> for incoming
128 accepts a new incoming connection. A new SSL object representing the accepted
129 connection is created and returned on success. If no incoming connection is
183 incoming and outgoing connections.
/freebsd/sys/netgraph/
H A Dng_bridge.c708 link_p foundFirst, incoming; member
765 if (destLink == ctx->incoming) { in ng_bridge_send_ctx()
789 counter_u64_add(ctx->incoming->stats.memoryFailures, 1); in ng_bridge_send_ctx()
812 ctx.incoming = NG_HOOK_PRIVATE(hook); in ng_bridge_rcvdata()
815 counter_u64_add(ctx.incoming->stats.recvRunts, 1); in ng_bridge_rcvdata()
821 counter_u64_add(ctx.incoming->stats.memoryFailures, 1); in ng_bridge_rcvdata()
827 counter_u64_add(ctx.incoming->stats.recvInvalid, 1); in ng_bridge_rcvdata()
834 if (ctx.incoming->loopCount != 0) { in ng_bridge_rcvdata()
835 counter_u64_add(ctx.incoming->stats.loopDrops, 1); in ng_bridge_rcvdata()
842 counter_u64_add(ctx.incoming->stats.recvPackets, 1); in ng_bridge_rcvdata()
[all …]
/freebsd/share/examples/ipfilter/
H A Dipf.conf.restrictive17 # 100 incoming ed1
19 # 200 incoming fxp0
28 # incoming ed1 traffic - group 100
42 # allow incoming ftp-data
62 # incoming traffic on fxp0 - group 200
H A Dfirewall.233 # Block all incoming UDP traffic except talk and DNS traffic. NFS
43 # Block all incoming TCP traffic connections to known services,
50 # Allow incoming TCP connections to ports between 1024 and 5000, as
59 # Now allow various incoming TCP connections to particular hosts, TCP
/freebsd/sys/netinet/libalias/
H A DHISTORY5 - Host accepts incoming connections for ports 0 to 1023.
11 - Generalized mechanism for handling incoming
21 - Corrected error in handling incoming UDP packets
96 to support multiple incoming addresses and static
100 - Now supports outgoing as well as incoming ICMP
/freebsd/usr.sbin/ppp/
H A DREADME.nat142 Set to "yes" to disable all incoming connections. This just drops
145 all incoming TCP and UDP requests, making the NAT software a
147 all incoming connections to telnetd, ftpd, etc.
204 This command allows incoming traffic to <nat port> on the host
229 The above command would redirect all incoming traffic to
239 then incoming traffic will be directed to the last
255 ICMP error messages are currently handled only in the incoming direction.
267 host address, outgoing NAT and incoming de-NATing).
296 PPP host accepts incoming connections for ports 0 to 1023.
302 - Generalised mechanism for handling incoming connections
[all …]
/freebsd/contrib/unbound/contrib/
H A Dunbound_munin_81 unbound_munin_by_type - incoming queries by type
82 unbound_munin_by_class - incoming queries by class
83 unbound_munin_by_opcode - incoming queries by opcode
85 unbound_munin_by_flags - incoming queries by flags
/freebsd/share/examples/ipfilter/rules/
H A Dexample.12 # block all incoming TCP packets on le0 from host 10.1.1.1 to any destination.
H A Dexample.107 # block incoming connection requests to my internal network from the big bad
H A Dexample.82 # block all incoming TCP connections but send back a TCP-RST for ones to
/freebsd/contrib/llvm-project/llvm/lib/ProfileData/
H A DGCOV.cpp481 src->incoming = (GCOVArc *)1; // Mark u available for cycle detection in augmentOneCycle()
498 if (succ->dst.incoming == nullptr) { in augmentOneCycle()
499 succ->dst.incoming = succ; in augmentOneCycle()
505 minCount = std::min(minCount, v->incoming->cycleCount); in augmentOneCycle()
506 v = &v->incoming->src; in augmentOneCycle()
512 v->incoming->cycleCount -= minCount; in augmentOneCycle()
513 v = &v->incoming->src; in augmentOneCycle()
533 const_cast<GCOVBlock *>(b)->incoming = nullptr; in getCyclesCount()
/freebsd/sys/contrib/openzfs/module/zfs/
H A Dspa_log_spacemap.c648 uint64_t incoming = spa_estimate_incoming_log_blocks(spa); in spa_estimate_metaslabs_to_flush() local
666 spa_log_sm_blocklimit(spa) - spa_log_sm_nblocks(spa) - incoming; in spa_estimate_metaslabs_to_flush()
695 uint64_t skip_txgs = (incoming == 0) ? in spa_estimate_metaslabs_to_flush()
697 (available_blocks / incoming) + 1); in spa_estimate_metaslabs_to_flush()
698 available_blocks -= (skip_txgs * incoming); in spa_estimate_metaslabs_to_flush()
701 ASSERT3S(available_blocks, >=, -incoming); in spa_estimate_metaslabs_to_flush()
/freebsd/sys/contrib/device-tree/Bindings/soc/qcom/
H A Dqcom,smp2p.txt65 Usage: required for incoming entries
73 Usage: required for incoming entries
/freebsd/contrib/llvm-project/llvm/lib/Target/RISCV/
H A DRISCVInstrInfoXqccmp.td15 // closest to the incoming stack pointer (to be compatible with the
19 // `fp` to the incoming stack pointer value, as expected by the frame-pointer
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Scalar/
H A DLoopDeletion.cpp76 Value *incoming = P.getIncomingValueForBlock(ExitingBlocks[0]); in isLoopDead() local
84 return incoming == P.getIncomingValueForBlock(BB); in isLoopDead()
90 if (Instruction *I = dyn_cast<Instruction>(incoming)) { in isLoopDead()
/freebsd/contrib/sendmail/cf/feature/
H A Dvirtusertable.m422 # Virtual user table (maps incoming users)
/freebsd/contrib/dma/
H A DREADME.markdown12 incoming connections.
/freebsd/contrib/libpcap/doc/
H A DREADME.hpux25 >it, but I can only see incoming data, never outgoing.
48 Subject: Re: tcpdump only shows incoming packets
55 > closer look I only get to see the incoming packets not the
77 Subject: Re: tcpdump only shows incoming packets
/freebsd/sys/contrib/device-tree/Bindings/iio/gyroscope/
H A Dinvensense,mpu3050.txt19 incoming I2C bus, alternatively drive traffic to a slave device (usually

123456