/freebsd/sbin/ipf/libipf/ |
H A D | printnatside.c | 11 printnatside(char *side, nat_stat_side_t *ns) in printnatside() argument 13 PRINTF("%lu\tproxy create fail %s\n", ns->ns_appr_fail, side); in printnatside() 14 PRINTF("%lu\tproxy fail %s\n", ns->ns_ipf_proxy_fail, side); in printnatside() 15 PRINTF("%lu\tbad nat %s\n", ns->ns_badnat, side); in printnatside() 16 PRINTF("%lu\tbad nat new %s\n", ns->ns_badnatnew, side); in printnatside() 17 PRINTF("%lu\tbad next addr %s\n", ns->ns_badnextaddr, side); in printnatside() 18 PRINTF("%lu\tbucket max %s\n", ns->ns_bucket_max, side); in printnatside() 19 PRINTF("%lu\tclone nomem %s\n", ns->ns_clone_nomem, side); in printnatside() 20 PRINTF("%lu\tdecap bad %s\n", ns->ns_decap_bad, side); in printnatside() 21 PRINTF("%lu\tdecap fail %s\n", ns->ns_decap_fail, side); in printnatside() [all …]
|
/freebsd/tools/regression/poll/14/ |
H A D | sockpoll.out | 5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 6 ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLHUP 7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLHUP 9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT 10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 19 ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT 20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT [all …]
|
/freebsd/tools/regression/poll/l/ |
H A D | sockpoll.out | 5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 6 not ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLOUT | POLLHUP 7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLOUT | POLLHUP 9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT 10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 19 not ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT… 20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT [all …]
|
/freebsd/share/examples/ppp/ |
H A D | login-auth | 49 pack .l.prompt -side left; 53 pack .l.value -side right; 55 pack .l -side top -padx $fxpad -pady $fypad; 60 pack .p.prompt -side left; 63 pack .p.value -side right; 66 pack .p -side top -padx $fxpad -pady $fypad; 70 pack .b.ok -side left; 72 pack .b.cancel -side right; 73 pack .b -side top -padx $fxpad -pady $fypad;
|
H A D | chap-auth | 52 pack .$n.prompt -side left; 62 pack .$n.value -side right; 70 pack .$n -side top -padx $fxpad -pady $fypad; 86 pack .k.value -side right; 89 pack .k -side top -padx $fxpad -pady $fypad; 93 pack .b.ok -side left; 95 pack .b.cancel -side right; 96 pack .b -side top -padx $fxpad -pady $fypad;
|
/freebsd/sys/contrib/device-tree/Bindings/devfreq/ |
H A D | rk3399_dmc.txt | 77 the ODT on the DRAM side and controller side are 81 the DRAM side driver strength in ohms. Default 85 the DRAM side ODT strength in ohms. Default value 89 the phy side CA line (incluing command line, 94 the PHY side DQ line (including DQS/DQ/DM line) 98 the PHY side ODT strength. Default value is 240. 103 the ODT on the DRAM side and controller side are 107 the DRAM side driver strength in ohms. Default 111 the DRAM side ODT strength in ohms. Default value 115 the PHY side CA line (including command line, [all …]
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | proto.c | 71 proto_alloc(struct proto *proto, int side) in proto_alloc() argument 76 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_alloc() 77 side == PROTO_SIDE_SERVER_LISTEN || in proto_alloc() 78 side == PROTO_SIDE_SERVER_WORK); in proto_alloc() 83 conn->pc_side = side; in proto_alloc() 106 int side, struct proto_conn **connp) in proto_common_setup() argument 113 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_common_setup() 114 side == PROTO_SIDE_SERVER_LISTEN); in proto_common_setup() 117 if (side == PROTO_SIDE_CLIENT) { in proto_common_setup() 148 conn = proto_alloc(proto, side); in proto_common_setup()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-digest.pod | 100 OSSL_FUNC_digest_newctx() should create and return a pointer to a provider side 107 OSSL_FUNC_digest_freectx() is passed a pointer to the provider side digest context in 111 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the 117 provider side digest context in the I<dctx> parameter. 124 side context. 131 The I<dctx> parameter contains a pointer to the provider side context. 137 No provider side digest context is used. 153 provider side digest context I<dctx> to I<params>. 158 the given provider side digest context I<dctx> and stores them in I<params>. 170 the provider side context if I<dctx> is not NULL and on the provider [all …]
|
H A D | provider-mac.pod | 93 OSSL_FUNC_mac_newctx() should create and return a pointer to a provider side 100 OSSL_FUNC_mac_freectx() is passed a pointer to the provider side mac context in 106 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the 112 side mac context in the I<mctx> parameter. The I<params> are set before setting 118 side context. 123 The I<mctx> parameter contains a pointer to the provider side context. 138 provider side mac context I<mctx> to I<params>. 143 associated with the given provider side mac context I<mctx> and stores them 153 with the provider side context I<mctx> in its current state if it is 155 provider side algorithm I<provctx>. [all …]
|
H A D | provider-cipher.pod | 112 OSSL_FUNC_cipher_newctx() should create and return a pointer to a provider side 119 OSSL_FUNC_cipher_freectx() is passed a pointer to the provider side cipher context in 123 OSSL_FUNC_cipher_dupctx() should duplicate the provider side cipher context in the 129 newly created provider side cipher context in the I<cctx> parameter. 141 side context. 162 The I<cctx> parameter contains a pointer to the provider side context. 168 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher 191 provider side cipher context I<cctx> to I<params>. 196 the given provider side cipher context I<cctx> and stores them in I<params>. 205 with the provider side context I<cctx> in its current state if it is [all …]
|
H A D | provider-kem.pod | 104 OSSL_FUNC_kem_newctx() should create and return a pointer to a provider side 111 OSSL_FUNC_kem_freectx() is passed a pointer to the provider side asymmetric 115 OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem 121 encapsulation given a provider side asymmetric kem context in the I<ctx> 147 decapsulation given a provider side asymmetric kem context in the I<ctx> 172 with the given provider side asymmetric kem context I<ctx> and stores them in 177 with the given provider side asymmetric kem context I<ctx> to I<params>. 191 created provider side asymmetric kem context, or NULL on failure.
|
H A D | provider-kdf.pod | 91 OSSL_FUNC_kdf_newctx() should create and return a pointer to a provider side 98 OSSL_FUNC_kdf_freectx() is passed a pointer to the provider side KDF context in 104 OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the 110 side KDF context in the I<kctx> parameter. 114 The I<kctx> parameter contains a pointer to the provider side context. 128 provider side KDF context I<kctx> to I<params>. 133 with the given provider side KDF context I<kctx> and stores them in I<params>. 142 with the provider side context I<kctx> in its current state if it is 144 provider side algorithm I<provctx>. 326 provider side KDF context, or NULL on failure.
|
H A D | provider-asym_cipher.pod | 108 OSSL_FUNC_asym_cipher_newctx() should create and return a pointer to a provider side 115 OSSL_FUNC_asym_cipher_freectx() is passed a pointer to the provider side asymmetric 119 OSSL_FUNC_asym_cipher_dupctx() should duplicate the provider side asymmetric cipher 125 given a provider side asymmetric cipher context in the I<ctx> parameter, and a 146 given a provider side asymmetric cipher context in the I<ctx> parameter, and a 173 with the given provider side asymmetric cipher context I<ctx> and stores them in 178 with the given provider side asymmetric cipher context I<ctx> to I<params>. 247 created provider side asymmetric cipher context, or NULL on failure.
|
H A D | provider-signature.pod | 181 OSSL_FUNC_signature_newctx() should create and return a pointer to a provider side 190 OSSL_FUNC_signature_freectx() is passed a pointer to the provider side signature 194 OSSL_FUNC_signature_dupctx() should duplicate the provider side signature context in 199 OSSL_FUNC_signature_sign_init() initialises a context for signing given a provider side 222 a provider side signature context in the I<ctx> parameter, and a pointer to a 240 signed data given a provider side signature context in the I<ctx> parameter, and 261 provider side signature context in the I<ctx> parameter, and a pointer to a 298 provider side verification context in the I<ctx> parameter, and a pointer to a 332 given provider side signature context I<ctx> and stored them in I<params>. 336 given provider side signature context I<ctx> to I<params>. [all …]
|
H A D | provider-keyexch.pod | 93 OSSL_FUNC_keyexch_newctx() should create and return a pointer to a provider side 100 OSSL_FUNC_keyexch_freectx() is passed a pointer to the provider side key exchange 104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in 109 OSSL_FUNC_keyexch_init() initialises a key exchange operation given a provider side key 139 given provider side key exchange context I<ctx> to I<params>, 145 given provider side key exchange context I<ctx> into I<params>, 212 provider side key exchange context, or NULL on failure.
|
/freebsd/sys/contrib/device-tree/Bindings/soc/qcom/ |
H A D | qcom,aoss-qmp.txt | 1 Qualcomm Always-On Subsystem side channel binding 3 This binding describes the hardware component responsible for side channel 10 The AOSS side channel exposes control over a set of resources, used to control 58 The AOSS side channel also provides the controls for three cooling devices, 69 The following example represents the AOSS side-channel message RAM and the
|
/freebsd/sbin/hastd/ |
H A D | proto_tcp.c | 191 tcp_setup_new(const char *addr, int side, void **ctxp) in tcp_setup_new() argument 197 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_new() 198 side == TCP_SIDE_SERVER_LISTEN); in tcp_setup_new() 229 tctx->tc_side = side; in tcp_setup_new() 237 tcp_setup_wrap(int fd, int side, void **ctxp) in tcp_setup_wrap() argument 242 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_wrap() 243 side == TCP_SIDE_SERVER_WORK); in tcp_setup_wrap() 252 tctx->tc_side = side; in tcp_setup_wrap()
|
/freebsd/crypto/heimdal/appl/telnet/ |
H A D | telnet.state | 2 Three pieces of state need to be kept for each side of each option. 66 an option that the other side doesn't understand is: 73 If the other side does not expect to receive the latter case, 79 if() statement in, but we expect the other side to generate the
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_tlsext_status_cb.pod | 59 On the client side SSL_get_tlsext_status_type() can be used to determine whether 62 side SSL_get_tlsext_status_type() can be used to determine whether the client 85 The callback when used on the client side should return a negative value on 89 The callback when used on the server side should return with either 106 side if SSL_set_tlsext_status_type() was previously called, or on the server 107 side if the client requested OCSP stapling. Otherwise -1 is returned.
|
H A D | SRP_Calc_B.pod | 25 /* server side .... */ 37 /* client side .... */ 55 and I<u> parameters are used on the server side and are calculated via 58 client side and are calculated via the functions SRP_Calc_client_key_ex(),
|
H A D | SSL_CTX_set0_CA_list.pod | 54 In most cases it is not necessary to set CA names on the client side. The list 58 and therefore setting CA names on the client side will have no impact if that 63 server side. 93 has sent. This can be called on either the server or the client side. The 101 used on the server side then the "client CA list" functions take precedence. 102 Typically, on the server side, the "client CA list " functions should be used in 104 the client side.
|
H A D | OPENSSL_Applink.pod | 13 OPENSSL_Applink is application-side interface which provides a glue 15 Even though it appears at application side, it's essentially OpenSSL
|
/freebsd/sys/contrib/device-tree/Bindings/clock/ |
H A D | renesas,rcar-usb2-clock-sel.txt | 43 - The functional clock of USB 2.0 host side must be "ehci_ohci" 44 - The functional clock of HS-USB side must be "hs-usb-if" 52 - The reset of USB 2.0 host side must be "ehci_ohci" 53 - The reset of HS-USB side must be "hs-usb-if"
|
/freebsd/sbin/ipf/ipfstat/ |
H A D | ipfstat.c | 697 static void printside(char *side, ipf_statistics_t *frs) in printside() argument 701 PRINTF("%lu\t%s bad packets\n", frs->fr_bad, side); in printside() 703 PRINTF("%lu\t%s IPv6 packets\n", frs->fr_ipv6, side); in printside() 705 PRINTF("%lu\t%s packets blocked\n", frs->fr_block, side); in printside() 706 PRINTF("%lu\t%s packets passed\n", frs->fr_pass, side); in printside() 707 PRINTF("%lu\t%s packets not matched\n", frs->fr_nom, side); in printside() 708 PRINTF("%lu\t%s packets counted\n", frs->fr_acct, side); in printside() 709 PRINTF("%lu\t%s packets short\n", frs->fr_short, side); in printside() 710 PRINTF("%lu\t%s packets logged and blocked\n", frs->fr_bpkl, side); in printside() 711 PRINTF("%lu\t%s packets logged and passed\n", frs->fr_ppkl, side); in printside() [all …]
|
/freebsd/contrib/tcsh/nls/ukrainian/ |
H A D | set1 | 93 91 No previous left hand side 94 92 Right hand side too long
|