Home
last modified time | relevance | path

Searched refs:side (Results 1 – 25 of 436) sorted by relevance

12345678910>>...18

/freebsd/sbin/ipf/libipf/
H A Dprintnatside.c11 printnatside(char *side, nat_stat_side_t *ns) in printnatside() argument
13 PRINTF("%lu\tproxy create fail %s\n", ns->ns_appr_fail, side); in printnatside()
14 PRINTF("%lu\tproxy fail %s\n", ns->ns_ipf_proxy_fail, side); in printnatside()
15 PRINTF("%lu\tbad nat %s\n", ns->ns_badnat, side); in printnatside()
16 PRINTF("%lu\tbad nat new %s\n", ns->ns_badnatnew, side); in printnatside()
17 PRINTF("%lu\tbad next addr %s\n", ns->ns_badnextaddr, side); in printnatside()
18 PRINTF("%lu\tbucket max %s\n", ns->ns_bucket_max, side); in printnatside()
19 PRINTF("%lu\tclone nomem %s\n", ns->ns_clone_nomem, side); in printnatside()
20 PRINTF("%lu\tdecap bad %s\n", ns->ns_decap_bad, side); in printnatside()
21 PRINTF("%lu\tdecap fail %s\n", ns->ns_decap_fail, side); in printnatside()
[all …]
/freebsd/tools/regression/poll/14/
H A Dsockpoll.out5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
6 ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLHUP
7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLHUP
9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT
10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
19 ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT
20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
[all …]
/freebsd/tools/regression/poll/l/
H A Dsockpoll.out5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
6 not ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLOUT | POLLHUP
7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLOUT | POLLHUP
9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT
10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
19 not ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT…
20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
[all …]
/freebsd/share/examples/ppp/
H A Dlogin-auth49 pack .l.prompt -side left;
53 pack .l.value -side right;
55 pack .l -side top -padx $fxpad -pady $fypad;
60 pack .p.prompt -side left;
63 pack .p.value -side right;
66 pack .p -side top -padx $fxpad -pady $fypad;
70 pack .b.ok -side left;
72 pack .b.cancel -side right;
73 pack .b -side top -padx $fxpad -pady $fypad;
H A Dchap-auth52 pack .$n.prompt -side left;
62 pack .$n.value -side right;
70 pack .$n -side top -padx $fxpad -pady $fypad;
86 pack .k.value -side right;
89 pack .k -side top -padx $fxpad -pady $fypad;
93 pack .b.ok -side left;
95 pack .b.cancel -side right;
96 pack .b -side top -padx $fxpad -pady $fypad;
/freebsd/sys/contrib/device-tree/Bindings/devfreq/
H A Drk3399_dmc.txt77 the ODT on the DRAM side and controller side are
81 the DRAM side driver strength in ohms. Default
85 the DRAM side ODT strength in ohms. Default value
89 the phy side CA line (incluing command line,
94 the PHY side DQ line (including DQS/DQ/DM line)
98 the PHY side ODT strength. Default value is 240.
103 the ODT on the DRAM side and controller side are
107 the DRAM side driver strength in ohms. Default
111 the DRAM side ODT strength in ohms. Default value
115 the PHY side CA line (including command line,
[all …]
/freebsd/crypto/openssl/doc/internal/man3/
H A Dossl_rcu_lock_new.pod65 indicates the number of write side threads which may execute
67 larger to obtain increased write side throughput at the cost of additional
73 ossl_rcu_read_lock() acquires a read side hold on data protected by
78 ossl_rcu_read_unlock() releases a read side hold on data protected by
83 ossl_rcu_write_lock() acquires a write side hold on data protected by
88 ossl_rcu_write_unlock() releases a write side hold on data protected
93 ossl_synchronize_rcu() blocks the calling thread until all read side
95 the write side thread is safe to free.
182 * acquire the write side lock
204 * 5) Release the write side lock
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-digest.pod103 OSSL_FUNC_digest_newctx() should create and return a pointer to a provider side
110 OSSL_FUNC_digest_freectx() is passed a pointer to the provider side digest context in
114 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the
117 OSSL_FUNC_digest_copyctx() should copy the provider side digest context in the
118 I<vinctx> parameter to the I<voutctx> parameter which is the another provider side
128 provider side digest context in the I<dctx> parameter.
135 side context.
142 The I<dctx> parameter contains a pointer to the provider side context.
148 No provider side digest context is used.
164 provider side digest context I<dctx> to I<params>.
[all …]
H A Dprovider-mac.pod96 OSSL_FUNC_mac_newctx() should create and return a pointer to a provider side
103 OSSL_FUNC_mac_freectx() is passed a pointer to the provider side mac context in
109 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the
115 side mac context in the I<mctx> parameter. The I<params> are set before setting
124 side context.
129 The I<mctx> parameter contains a pointer to the provider side context.
144 provider side mac context I<mctx> to I<params>.
149 associated with the given provider side mac context I<mctx> and stores them
159 with the provider side context I<mctx> in its current state if it is
161 provider side algorithm I<provctx>.
[all …]
H A Dprovider-cipher.pod143 OSSL_FUNC_cipher_newctx() should create and return a pointer to a provider side
150 OSSL_FUNC_cipher_freectx() is passed a pointer to the provider side cipher context in
154 OSSL_FUNC_cipher_dupctx() should duplicate the provider side cipher context in the
160 newly created provider side cipher context in the I<cctx> parameter.
177 side context.
198 The I<cctx> parameter contains a pointer to the provider side context.
204 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher
237 provider side cipher context I<cctx> to I<params>.
242 the given provider side cipher context I<cctx> and stores them in I<params>.
251 with the provider side context I<cctx> in its current state if it is
[all …]
H A Dprovider-kdf.pod91 OSSL_FUNC_kdf_newctx() should create and return a pointer to a provider side
98 OSSL_FUNC_kdf_freectx() is passed a pointer to the provider side KDF context in
104 OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the
110 side KDF context in the I<kctx> parameter.
114 The I<kctx> parameter contains a pointer to the provider side context.
128 provider side KDF context I<kctx> to I<params>.
133 with the given provider side KDF context I<kctx> and stores them in I<params>.
142 with the provider side context I<kctx> in its current state if it is
144 provider side algorithm I<provctx>.
326 provider side KDF context, or NULL on failure.
H A Dprovider-kem.pod114 OSSL_FUNC_kem_newctx() should create and return a pointer to a provider side
121 OSSL_FUNC_kem_freectx() is passed a pointer to the provider side asymmetric
125 OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem
131 encapsulation given a provider side asymmetric kem context in the I<ctx>
161 decapsulation given a provider side asymmetric kem context in the I<ctx>
214 with the given provider side asymmetric kem context I<ctx> and stores them in
219 with the given provider side asymmetric kem context I<ctx> to I<params>.
233 created provider side asymmetric kem context, or NULL on failure.
H A Dprovider-asym_cipher.pod108 OSSL_FUNC_asym_cipher_newctx() should create and return a pointer to a provider side
115 OSSL_FUNC_asym_cipher_freectx() is passed a pointer to the provider side asymmetric
119 OSSL_FUNC_asym_cipher_dupctx() should duplicate the provider side asymmetric cipher
125 given a provider side asymmetric cipher context in the I<ctx> parameter, and a
146 given a provider side asymmetric cipher context in the I<ctx> parameter, and a
173 with the given provider side asymmetric cipher context I<ctx> and stores them in
178 with the given provider side asymmetric cipher context I<ctx> to I<params>.
243 if the code using the RSA decryption API is not implemented in side-channel
278 created provider side asymmetric cipher context, or NULL on failure.
/freebsd/contrib/openbsm/bin/auditdistd/
H A Dproto.c71 proto_alloc(struct proto *proto, int side) in proto_alloc() argument
76 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_alloc()
77 side == PROTO_SIDE_SERVER_LISTEN || in proto_alloc()
78 side == PROTO_SIDE_SERVER_WORK); in proto_alloc()
83 conn->pc_side = side; in proto_alloc()
106 int side, struct proto_conn **connp) in proto_common_setup() argument
113 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_common_setup()
114 side == PROTO_SIDE_SERVER_LISTEN); in proto_common_setup()
117 if (side == PROTO_SIDE_CLIENT) { in proto_common_setup()
148 conn = proto_alloc(proto, side); in proto_common_setup()
/freebsd/sys/contrib/device-tree/Bindings/soc/qcom/
H A Dqcom,aoss-qmp.txt1 Qualcomm Always-On Subsystem side channel binding
3 This binding describes the hardware component responsible for side channel
10 The AOSS side channel exposes control over a set of resources, used to control
58 The AOSS side channel also provides the controls for three cooling devices,
69 The following example represents the AOSS side-channel message RAM and the
/freebsd/sbin/hastd/
H A Dproto_tcp.c191 tcp_setup_new(const char *addr, int side, void **ctxp) in tcp_setup_new() argument
197 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_new()
198 side == TCP_SIDE_SERVER_LISTEN); in tcp_setup_new()
229 tctx->tc_side = side; in tcp_setup_new()
237 tcp_setup_wrap(int fd, int side, void **ctxp) in tcp_setup_wrap() argument
242 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_wrap()
243 side == TCP_SIDE_SERVER_WORK); in tcp_setup_wrap()
252 tctx->tc_side = side; in tcp_setup_wrap()
/freebsd/crypto/heimdal/appl/telnet/
H A Dtelnet.state2 Three pieces of state need to be kept for each side of each option.
66 an option that the other side doesn't understand is:
73 If the other side does not expect to receive the latter case,
79 if() statement in, but we expect the other side to generate the
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_status_cb.pod59 On the client side SSL_get_tlsext_status_type() can be used to determine whether
62 side SSL_get_tlsext_status_type() can be used to determine whether the client
85 The callback when used on the client side should return a negative value on
89 The callback when used on the server side should return with either
106 side if SSL_set_tlsext_status_type() was previously called, or on the server
107 side if the client requested OCSP stapling. Otherwise -1 is returned.
H A DSRP_Calc_B.pod25 /* server side .... */
37 /* client side .... */
55 and I<u> parameters are used on the server side and are calculated via
58 client side and are calculated via the functions SRP_Calc_client_key_ex(),
H A DSSL_CTX_set0_CA_list.pod54 In most cases it is not necessary to set CA names on the client side. The list
58 and therefore setting CA names on the client side will have no impact if that
63 server side.
93 has sent. This can be called on either the server or the client side. The
101 used on the server side then the "client CA list" functions take precedence.
102 Typically, on the server side, the "client CA list " functions should be used in
104 the client side.
/freebsd/crypto/openssl/doc/designs/quic-design/
H A Dquic-fc.md65 - (RX side only) **Retirement**, which refers to where we dequeue one or more
73 - (RX side only) The **Retired Watermark** (RWM), the total number of retired
77 sent (for the TX side) or received (for the RX side). This represents the
79 and never decreases. On the RX side, such bytes have not necessarily been
89 - (RX side only) The **threshold**, which is how close we let the RWM
93 - (RX side only) The **window size**, which is the amount by which we or a peer
100 - If the available credit is zero, the TX side is blocked due to a lack of
110 TX side flow control is exceptionally simple. It can be modelled as the
121 value is added to the TX-side SWM value. Note that this may be zero, though
159 control for the TX side.
[all …]
H A Ddemuxer.md21 These are optional features of the client side demuxer, not required for MVP
32 - on the server side packets can create a new connection potentially
33 - server side packet handling for unsupported version packets:
/freebsd/sys/contrib/device-tree/Bindings/clock/
H A Drenesas,rcar-usb2-clock-sel.txt43 - The functional clock of USB 2.0 host side must be "ehci_ohci"
44 - The functional clock of HS-USB side must be "hs-usb-if"
52 - The reset of USB 2.0 host side must be "ehci_ohci"
53 - The reset of HS-USB side must be "hs-usb-if"
/freebsd/sbin/ipf/ipfstat/
H A Dipfstat.c697 static void printside(char *side, ipf_statistics_t *frs) in printside() argument
701 PRINTF("%lu\t%s bad packets\n", frs->fr_bad, side); in printside()
703 PRINTF("%lu\t%s IPv6 packets\n", frs->fr_ipv6, side); in printside()
705 PRINTF("%lu\t%s packets blocked\n", frs->fr_block, side); in printside()
706 PRINTF("%lu\t%s packets passed\n", frs->fr_pass, side); in printside()
707 PRINTF("%lu\t%s packets not matched\n", frs->fr_nom, side); in printside()
708 PRINTF("%lu\t%s packets counted\n", frs->fr_acct, side); in printside()
709 PRINTF("%lu\t%s packets short\n", frs->fr_short, side); in printside()
710 PRINTF("%lu\t%s packets logged and blocked\n", frs->fr_bpkl, side); in printside()
711 PRINTF("%lu\t%s packets logged and passed\n", frs->fr_ppkl, side); in printside()
[all …]
/freebsd/contrib/tcsh/nls/ukrainian/
H A Dset193 91 No previous left hand side
94 92 Right hand side too long

12345678910>>...18