/freebsd/sbin/ipf/libipf/ |
H A D | printnatside.c | 11 printnatside(char *side, nat_stat_side_t *ns) in printnatside() argument 13 PRINTF("%lu\tproxy create fail %s\n", ns->ns_appr_fail, side); in printnatside() 14 PRINTF("%lu\tproxy fail %s\n", ns->ns_ipf_proxy_fail, side); in printnatside() 15 PRINTF("%lu\tbad nat %s\n", ns->ns_badnat, side); in printnatside() 16 PRINTF("%lu\tbad nat new %s\n", ns->ns_badnatnew, side); in printnatside() 17 PRINTF("%lu\tbad next addr %s\n", ns->ns_badnextaddr, side); in printnatside() 18 PRINTF("%lu\tbucket max %s\n", ns->ns_bucket_max, side); in printnatside() 19 PRINTF("%lu\tclone nomem %s\n", ns->ns_clone_nomem, side); in printnatside() 20 PRINTF("%lu\tdecap bad %s\n", ns->ns_decap_bad, side); in printnatside() 21 PRINTF("%lu\tdecap fail %s\n", ns->ns_decap_fail, side); in printnatside() [all …]
|
/freebsd/tools/regression/poll/14/ |
H A D | sockpoll.out | 5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 6 ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLHUP 7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLHUP 9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT 10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 19 ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT 20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT [all …]
|
/freebsd/tools/regression/poll/l/ |
H A D | sockpoll.out | 5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 6 not ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLOUT | POLLHUP 7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLOUT | POLLHUP 9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT 10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT 17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 19 not ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT… 20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT 21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT [all …]
|
/freebsd/share/examples/ppp/ |
H A D | login-auth | 49 pack .l.prompt -side left; 53 pack .l.value -side right; 55 pack .l -side top -padx $fxpad -pady $fypad; 60 pack .p.prompt -side left; 63 pack .p.value -side right; 66 pack .p -side top -padx $fxpad -pady $fypad; 70 pack .b.ok -side left; 72 pack .b.cancel -side right; 73 pack .b -side top -padx $fxpad -pady $fypad;
|
H A D | chap-auth | 52 pack .$n.prompt -side left; 62 pack .$n.value -side right; 70 pack .$n -side top -padx $fxpad -pady $fypad; 86 pack .k.value -side right; 89 pack .k -side top -padx $fxpad -pady $fypad; 93 pack .b.ok -side left; 95 pack .b.cancel -side right; 96 pack .b -side top -padx $fxpad -pady $fypad;
|
/freebsd/sys/contrib/device-tree/Bindings/devfreq/ |
H A D | rk3399_dmc.txt | 77 the ODT on the DRAM side and controller side are 81 the DRAM side driver strength in ohms. Default 85 the DRAM side ODT strength in ohms. Default value 89 the phy side CA line (incluing command line, 94 the PHY side DQ line (including DQS/DQ/DM line) 98 the PHY side ODT strength. Default value is 240. 103 the ODT on the DRAM side and controller side are 107 the DRAM side driver strength in ohms. Default 111 the DRAM side ODT strength in ohms. Default value 115 the PHY side CA line (including command line, [all …]
|
/freebsd/crypto/openssl/doc/internal/man3/ |
H A D | ossl_rcu_lock_new.pod | 65 indicates the number of write side threads which may execute 67 larger to obtain increased write side throughput at the cost of additional 73 ossl_rcu_read_lock() acquires a read side hold on data protected by 78 ossl_rcu_read_unlock() releases a read side hold on data protected by 83 ossl_rcu_write_lock() acquires a write side hold on data protected by 88 ossl_rcu_write_unlock() releases a write side hold on data protected 93 ossl_synchronize_rcu() blocks the calling thread until all read side 95 the write side thread is safe to free. 182 * acquire the write side lock 204 * 5) Release the write side lock [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-digest.pod | 103 OSSL_FUNC_digest_newctx() should create and return a pointer to a provider side 110 OSSL_FUNC_digest_freectx() is passed a pointer to the provider side digest context in 114 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the 117 OSSL_FUNC_digest_copyctx() should copy the provider side digest context in the 118 I<vinctx> parameter to the I<voutctx> parameter which is the another provider side 128 provider side digest context in the I<dctx> parameter. 135 side context. 142 The I<dctx> parameter contains a pointer to the provider side context. 148 No provider side digest context is used. 164 provider side digest context I<dctx> to I<params>. [all …]
|
H A D | provider-mac.pod | 96 OSSL_FUNC_mac_newctx() should create and return a pointer to a provider side 103 OSSL_FUNC_mac_freectx() is passed a pointer to the provider side mac context in 109 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the 115 side mac context in the I<mctx> parameter. The I<params> are set before setting 124 side context. 129 The I<mctx> parameter contains a pointer to the provider side context. 144 provider side mac context I<mctx> to I<params>. 149 associated with the given provider side mac context I<mctx> and stores them 159 with the provider side context I<mctx> in its current state if it is 161 provider side algorithm I<provctx>. [all …]
|
H A D | provider-cipher.pod | 143 OSSL_FUNC_cipher_newctx() should create and return a pointer to a provider side 150 OSSL_FUNC_cipher_freectx() is passed a pointer to the provider side cipher context in 154 OSSL_FUNC_cipher_dupctx() should duplicate the provider side cipher context in the 160 newly created provider side cipher context in the I<cctx> parameter. 177 side context. 198 The I<cctx> parameter contains a pointer to the provider side context. 204 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher 237 provider side cipher context I<cctx> to I<params>. 242 the given provider side cipher context I<cctx> and stores them in I<params>. 251 with the provider side context I<cctx> in its current state if it is [all …]
|
H A D | provider-kdf.pod | 91 OSSL_FUNC_kdf_newctx() should create and return a pointer to a provider side 98 OSSL_FUNC_kdf_freectx() is passed a pointer to the provider side KDF context in 104 OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the 110 side KDF context in the I<kctx> parameter. 114 The I<kctx> parameter contains a pointer to the provider side context. 128 provider side KDF context I<kctx> to I<params>. 133 with the given provider side KDF context I<kctx> and stores them in I<params>. 142 with the provider side context I<kctx> in its current state if it is 144 provider side algorithm I<provctx>. 326 provider side KDF context, or NULL on failure.
|
H A D | provider-kem.pod | 114 OSSL_FUNC_kem_newctx() should create and return a pointer to a provider side 121 OSSL_FUNC_kem_freectx() is passed a pointer to the provider side asymmetric 125 OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem 131 encapsulation given a provider side asymmetric kem context in the I<ctx> 161 decapsulation given a provider side asymmetric kem context in the I<ctx> 214 with the given provider side asymmetric kem context I<ctx> and stores them in 219 with the given provider side asymmetric kem context I<ctx> to I<params>. 233 created provider side asymmetric kem context, or NULL on failure.
|
H A D | provider-asym_cipher.pod | 108 OSSL_FUNC_asym_cipher_newctx() should create and return a pointer to a provider side 115 OSSL_FUNC_asym_cipher_freectx() is passed a pointer to the provider side asymmetric 119 OSSL_FUNC_asym_cipher_dupctx() should duplicate the provider side asymmetric cipher 125 given a provider side asymmetric cipher context in the I<ctx> parameter, and a 146 given a provider side asymmetric cipher context in the I<ctx> parameter, and a 173 with the given provider side asymmetric cipher context I<ctx> and stores them in 178 with the given provider side asymmetric cipher context I<ctx> to I<params>. 243 if the code using the RSA decryption API is not implemented in side-channel 278 created provider side asymmetric cipher context, or NULL on failure.
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | proto.c | 71 proto_alloc(struct proto *proto, int side) in proto_alloc() argument 76 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_alloc() 77 side == PROTO_SIDE_SERVER_LISTEN || in proto_alloc() 78 side == PROTO_SIDE_SERVER_WORK); in proto_alloc() 83 conn->pc_side = side; in proto_alloc() 106 int side, struct proto_conn **connp) in proto_common_setup() argument 113 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_common_setup() 114 side == PROTO_SIDE_SERVER_LISTEN); in proto_common_setup() 117 if (side == PROTO_SIDE_CLIENT) { in proto_common_setup() 148 conn = proto_alloc(proto, side); in proto_common_setup()
|
/freebsd/sys/contrib/device-tree/Bindings/soc/qcom/ |
H A D | qcom,aoss-qmp.txt | 1 Qualcomm Always-On Subsystem side channel binding 3 This binding describes the hardware component responsible for side channel 10 The AOSS side channel exposes control over a set of resources, used to control 58 The AOSS side channel also provides the controls for three cooling devices, 69 The following example represents the AOSS side-channel message RAM and the
|
/freebsd/sbin/hastd/ |
H A D | proto_tcp.c | 191 tcp_setup_new(const char *addr, int side, void **ctxp) in tcp_setup_new() argument 197 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_new() 198 side == TCP_SIDE_SERVER_LISTEN); in tcp_setup_new() 229 tctx->tc_side = side; in tcp_setup_new() 237 tcp_setup_wrap(int fd, int side, void **ctxp) in tcp_setup_wrap() argument 242 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_wrap() 243 side == TCP_SIDE_SERVER_WORK); in tcp_setup_wrap() 252 tctx->tc_side = side; in tcp_setup_wrap()
|
/freebsd/crypto/heimdal/appl/telnet/ |
H A D | telnet.state | 2 Three pieces of state need to be kept for each side of each option. 66 an option that the other side doesn't understand is: 73 If the other side does not expect to receive the latter case, 79 if() statement in, but we expect the other side to generate the
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_tlsext_status_cb.pod | 59 On the client side SSL_get_tlsext_status_type() can be used to determine whether 62 side SSL_get_tlsext_status_type() can be used to determine whether the client 85 The callback when used on the client side should return a negative value on 89 The callback when used on the server side should return with either 106 side if SSL_set_tlsext_status_type() was previously called, or on the server 107 side if the client requested OCSP stapling. Otherwise -1 is returned.
|
H A D | SRP_Calc_B.pod | 25 /* server side .... */ 37 /* client side .... */ 55 and I<u> parameters are used on the server side and are calculated via 58 client side and are calculated via the functions SRP_Calc_client_key_ex(),
|
H A D | SSL_CTX_set0_CA_list.pod | 54 In most cases it is not necessary to set CA names on the client side. The list 58 and therefore setting CA names on the client side will have no impact if that 63 server side. 93 has sent. This can be called on either the server or the client side. The 101 used on the server side then the "client CA list" functions take precedence. 102 Typically, on the server side, the "client CA list " functions should be used in 104 the client side.
|
/freebsd/crypto/openssl/doc/designs/quic-design/ |
H A D | quic-fc.md | 65 - (RX side only) **Retirement**, which refers to where we dequeue one or more 73 - (RX side only) The **Retired Watermark** (RWM), the total number of retired 77 sent (for the TX side) or received (for the RX side). This represents the 79 and never decreases. On the RX side, such bytes have not necessarily been 89 - (RX side only) The **threshold**, which is how close we let the RWM 93 - (RX side only) The **window size**, which is the amount by which we or a peer 100 - If the available credit is zero, the TX side is blocked due to a lack of 110 TX side flow control is exceptionally simple. It can be modelled as the 121 value is added to the TX-side SWM value. Note that this may be zero, though 159 control for the TX side. [all …]
|
H A D | demuxer.md | 21 These are optional features of the client side demuxer, not required for MVP 32 - on the server side packets can create a new connection potentially 33 - server side packet handling for unsupported version packets:
|
/freebsd/sys/contrib/device-tree/Bindings/clock/ |
H A D | renesas,rcar-usb2-clock-sel.txt | 43 - The functional clock of USB 2.0 host side must be "ehci_ohci" 44 - The functional clock of HS-USB side must be "hs-usb-if" 52 - The reset of USB 2.0 host side must be "ehci_ohci" 53 - The reset of HS-USB side must be "hs-usb-if"
|
/freebsd/sbin/ipf/ipfstat/ |
H A D | ipfstat.c | 697 static void printside(char *side, ipf_statistics_t *frs) in printside() argument 701 PRINTF("%lu\t%s bad packets\n", frs->fr_bad, side); in printside() 703 PRINTF("%lu\t%s IPv6 packets\n", frs->fr_ipv6, side); in printside() 705 PRINTF("%lu\t%s packets blocked\n", frs->fr_block, side); in printside() 706 PRINTF("%lu\t%s packets passed\n", frs->fr_pass, side); in printside() 707 PRINTF("%lu\t%s packets not matched\n", frs->fr_nom, side); in printside() 708 PRINTF("%lu\t%s packets counted\n", frs->fr_acct, side); in printside() 709 PRINTF("%lu\t%s packets short\n", frs->fr_short, side); in printside() 710 PRINTF("%lu\t%s packets logged and blocked\n", frs->fr_bpkl, side); in printside() 711 PRINTF("%lu\t%s packets logged and passed\n", frs->fr_ppkl, side); in printside() [all …]
|
/freebsd/contrib/tcsh/nls/ukrainian/ |
H A D | set1 | 93 91 No previous left hand side 94 92 Right hand side too long
|