Home
last modified time | relevance | path

Searched refs:negotiate (Results 1 – 25 of 27) sorted by relevance

12

/freebsd/sys/contrib/device-tree/Bindings/net/
H A Dnokia-bluetooth.txt9 and a few new packet types used to negotiate uart speed.
H A Dkeystone-netcp.txt98 - mac<->mac auto negotiate mode: 0
/freebsd/sys/contrib/device-tree/Bindings/net/bluetooth/
H A Dnokia,h4p-bluetooth.txt9 and a few new packet types used to negotiate uart speed.
/freebsd/crypto/openssl/doc/man3/
H A DSSL_alert_type_string.pod96 sender was unable to negotiate an acceptable set of security
177 The protocol version the client has attempted to negotiate is
H A DSSL_CTX_set_tlsext_use_srtp.pod65 protection profiles that it is willing to negotiate.
H A DSSL_CTX_set_client_hello_cb.pod48 mechanism by which to negotiate compression.
H A DSSL_read.pod34 If necessary, a read function will negotiate a TLS/SSL session, if not already
H A DSSL_write.pod34 If necessary, a write function will negotiate a TLS/SSL session, if not already
H A DSSL_CTX_set_psk_client_callback.pod72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
H A DSSL_CTX_set_options.pod224 Normally clients and servers will transparently attempt to negotiate the
232 Normally clients and servers will transparently attempt to negotiate the
H A DSSL_CTX_new.pod193 and be able to negotiate with all possible clients, but to only
/freebsd/sys/dev/ixgbe/
H A Dif_ix.c1479 bool sfp, negotiate; in ixgbe_config_link() local
1495 &negotiate); in ixgbe_config_link()
3790 bool negotiate; in ixgbe_handle_msf() local
3797 hw->mac.ops.get_link_capabilities(hw, &autoneg, &negotiate); in ixgbe_handle_msf()
4371 bool negotiate = false; in ixgbe_set_advertise() local
4400 &negotiate); in ixgbe_set_advertise()
4491 bool negotiate = false; in ixgbe_get_default_advertise() local
4501 err = hw->mac.ops.get_link_capabilities(hw, &link_caps, &negotiate); in ixgbe_get_default_advertise()
/freebsd/sys/dev/e1000/
H A DREADME112 connections will attempt to auto-negotiate with its link partner to determine
129 will not attempt to auto-negotiate with its link partner since those adapters
/freebsd/crypto/openssh/
H A DOVERVIEW139 negotiate encryption, then perform authentication, preparatory
/freebsd/usr.sbin/ppp/
H A DREADME.changes135 o MSCHAPv2 is now accepted by default. If you don't wish to negotiate
/freebsd/sys/cam/ata/
H A Data_xpt.c413 negotiate: in aprobestart()
444 goto negotiate; in aprobestart()
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl.pod577 With B<-dtls>, clients will negotiate any supported DTLS protocol version.
/freebsd/crypto/heimdal/appl/telnet/
H A DChangeLog326 * telnet/telnet.c: only try to negotiate encryption if we're
/freebsd/crypto/heimdal/
H A DNEWS661 * telnetd: do not negotiate KERBEROS5 authentication if there's no keytab.
/freebsd/share/examples/ppp/
H A Dppp.conf.sample633 # we negotiate callback *after* authentication or E.164 callback where
/freebsd/contrib/ncurses/
H A DANNOUNCE93 initialization with terminals which do not negotiate window
/freebsd/share/doc/IPv6/
H A DIMPLEMENTATION1919 - You can negotiate IPComp association with racoon IKE daemon.
2091 interfaces separately from IPsec, IKE daemons would need to negotiate
2119 CON: cannot negotiate IKE with other IPsec tunnel-mode devices
/freebsd/contrib/tcsh/
H A Dcomplete.tcsh509 modepage negotiate periphlist rescan reset \
/freebsd/crypto/openssl/
H A DCHANGES.md849 In order for this attack to work both endpoints must legitimately negotiate
868 6) Both endpoints must negotiate the RC4-MD5 ciphersuite in preference to any
2090 negotiate EMS will fail. Unfortunately this also means that TLS connections
2092 fix will fail if they negotiate EMS.
2829 negotiate EMS will fail. Unfortunately this also means that TLS connections
2831 fix will fail if they negotiate EMS.
6008 users who want to negotiate SSLv2 via the version-flexible SSLv23_method()
6173 A malicious client can negotiate SSLv2 ciphers that have been disabled on
7210 users who want to negotiate SSLv2 via the version-flexible SSLv23_method()
7351 A malicious client can negotiate SSLv2 ciphers that have been disabled on
[all …]
/freebsd/contrib/wpa/hostapd/
H A DChangeLog604 (do not send QoS frames if the STA did not negotiate use of QoS for

12