Home
last modified time | relevance | path

Searched refs:side (Results 1 – 25 of 391) sorted by relevance

12345678910>>...16

/freebsd/sbin/ipf/libipf/
H A Dprintnatside.c11 printnatside(char *side, nat_stat_side_t *ns) in printnatside() argument
13 PRINTF("%lu\tproxy create fail %s\n", ns->ns_appr_fail, side); in printnatside()
14 PRINTF("%lu\tproxy fail %s\n", ns->ns_ipf_proxy_fail, side); in printnatside()
15 PRINTF("%lu\tbad nat %s\n", ns->ns_badnat, side); in printnatside()
16 PRINTF("%lu\tbad nat new %s\n", ns->ns_badnatnew, side); in printnatside()
17 PRINTF("%lu\tbad next addr %s\n", ns->ns_badnextaddr, side); in printnatside()
18 PRINTF("%lu\tbucket max %s\n", ns->ns_bucket_max, side); in printnatside()
19 PRINTF("%lu\tclone nomem %s\n", ns->ns_clone_nomem, side); in printnatside()
20 PRINTF("%lu\tdecap bad %s\n", ns->ns_decap_bad, side); in printnatside()
21 PRINTF("%lu\tdecap fail %s\n", ns->ns_decap_fail, side); in printnatside()
[all …]
/freebsd/tools/regression/poll/14/
H A Dsockpoll.out5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
6 ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLHUP
7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLHUP
9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT
10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
19 ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT
20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
[all …]
/freebsd/tools/regression/poll/l/
H A Dsockpoll.out5 ok 4 state other side after large write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
6 not ok 5 state other side after close: expected POLLIN | POLLHUP; got POLLIN | POLLOUT | POLLHUP
7 not ok 6 state other side after reading input: expected POLLHUP; got POLLIN | POLLOUT | POLLHUP
9 ok 8 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT
10 ok 9 state other side after reading EOF: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
11 ok 10 state after data from other side: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
17 ok 16 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
19 not ok 18 state other side after shutdown(SHUT_WR): expected POLLIN | POLLOUT; got POLLIN | POLLOUT…
20 ok 19 state other side after shutdown(SHUT_RD): expected POLLOUT; got POLLOUT
21 ok 20 state other side after write: expected POLLIN | POLLOUT; got POLLIN | POLLOUT
[all …]
/freebsd/share/examples/ppp/
H A Dlogin-auth49 pack .l.prompt -side left;
53 pack .l.value -side right;
55 pack .l -side top -padx $fxpad -pady $fypad;
60 pack .p.prompt -side left;
63 pack .p.value -side right;
66 pack .p -side top -padx $fxpad -pady $fypad;
70 pack .b.ok -side left;
72 pack .b.cancel -side right;
73 pack .b -side top -padx $fxpad -pady $fypad;
H A Dchap-auth52 pack .$n.prompt -side left;
62 pack .$n.value -side right;
70 pack .$n -side top -padx $fxpad -pady $fypad;
86 pack .k.value -side right;
89 pack .k -side top -padx $fxpad -pady $fypad;
93 pack .b.ok -side left;
95 pack .b.cancel -side right;
96 pack .b -side top -padx $fxpad -pady $fypad;
/freebsd/sys/contrib/device-tree/Bindings/devfreq/
H A Drk3399_dmc.txt77 the ODT on the DRAM side and controller side are
81 the DRAM side driver strength in ohms. Default
85 the DRAM side ODT strength in ohms. Default value
89 the phy side CA line (incluing command line,
94 the PHY side DQ line (including DQS/DQ/DM line)
98 the PHY side ODT strength. Default value is 240.
103 the ODT on the DRAM side and controller side are
107 the DRAM side driver strength in ohms. Default
111 the DRAM side ODT strength in ohms. Default value
115 the PHY side CA line (including command line,
[all …]
/freebsd/contrib/openbsm/bin/auditdistd/
H A Dproto.c71 proto_alloc(struct proto *proto, int side) in proto_alloc() argument
76 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_alloc()
77 side == PROTO_SIDE_SERVER_LISTEN || in proto_alloc()
78 side == PROTO_SIDE_SERVER_WORK); in proto_alloc()
83 conn->pc_side = side; in proto_alloc()
106 int side, struct proto_conn **connp) in proto_common_setup() argument
113 PJDLOG_ASSERT(side == PROTO_SIDE_CLIENT || in proto_common_setup()
114 side == PROTO_SIDE_SERVER_LISTEN); in proto_common_setup()
117 if (side == PROTO_SIDE_CLIENT) { in proto_common_setup()
148 conn = proto_alloc(proto, side); in proto_common_setup()
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-digest.pod100 OSSL_FUNC_digest_newctx() should create and return a pointer to a provider side
107 OSSL_FUNC_digest_freectx() is passed a pointer to the provider side digest context in
111 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the
117 provider side digest context in the I<dctx> parameter.
124 side context.
131 The I<dctx> parameter contains a pointer to the provider side context.
137 No provider side digest context is used.
153 provider side digest context I<dctx> to I<params>.
158 the given provider side digest context I<dctx> and stores them in I<params>.
170 the provider side context if I<dctx> is not NULL and on the provider
[all …]
H A Dprovider-mac.pod93 OSSL_FUNC_mac_newctx() should create and return a pointer to a provider side
100 OSSL_FUNC_mac_freectx() is passed a pointer to the provider side mac context in
106 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the
112 side mac context in the I<mctx> parameter. The I<params> are set before setting
118 side context.
123 The I<mctx> parameter contains a pointer to the provider side context.
138 provider side mac context I<mctx> to I<params>.
143 associated with the given provider side mac context I<mctx> and stores them
153 with the provider side context I<mctx> in its current state if it is
155 provider side algorithm I<provctx>.
[all …]
H A Dprovider-cipher.pod112 OSSL_FUNC_cipher_newctx() should create and return a pointer to a provider side
119 OSSL_FUNC_cipher_freectx() is passed a pointer to the provider side cipher context in
123 OSSL_FUNC_cipher_dupctx() should duplicate the provider side cipher context in the
129 newly created provider side cipher context in the I<cctx> parameter.
141 side context.
162 The I<cctx> parameter contains a pointer to the provider side context.
168 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher
191 provider side cipher context I<cctx> to I<params>.
196 the given provider side cipher context I<cctx> and stores them in I<params>.
205 with the provider side context I<cctx> in its current state if it is
[all …]
H A Dprovider-kem.pod104 OSSL_FUNC_kem_newctx() should create and return a pointer to a provider side
111 OSSL_FUNC_kem_freectx() is passed a pointer to the provider side asymmetric
115 OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem
121 encapsulation given a provider side asymmetric kem context in the I<ctx>
147 decapsulation given a provider side asymmetric kem context in the I<ctx>
172 with the given provider side asymmetric kem context I<ctx> and stores them in
177 with the given provider side asymmetric kem context I<ctx> to I<params>.
191 created provider side asymmetric kem context, or NULL on failure.
H A Dprovider-kdf.pod91 OSSL_FUNC_kdf_newctx() should create and return a pointer to a provider side
98 OSSL_FUNC_kdf_freectx() is passed a pointer to the provider side KDF context in
104 OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the
110 side KDF context in the I<kctx> parameter.
114 The I<kctx> parameter contains a pointer to the provider side context.
128 provider side KDF context I<kctx> to I<params>.
133 with the given provider side KDF context I<kctx> and stores them in I<params>.
142 with the provider side context I<kctx> in its current state if it is
144 provider side algorithm I<provctx>.
326 provider side KDF context, or NULL on failure.
H A Dprovider-asym_cipher.pod108 OSSL_FUNC_asym_cipher_newctx() should create and return a pointer to a provider side
115 OSSL_FUNC_asym_cipher_freectx() is passed a pointer to the provider side asymmetric
119 OSSL_FUNC_asym_cipher_dupctx() should duplicate the provider side asymmetric cipher
125 given a provider side asymmetric cipher context in the I<ctx> parameter, and a
146 given a provider side asymmetric cipher context in the I<ctx> parameter, and a
173 with the given provider side asymmetric cipher context I<ctx> and stores them in
178 with the given provider side asymmetric cipher context I<ctx> to I<params>.
247 created provider side asymmetric cipher context, or NULL on failure.
H A Dprovider-signature.pod181 OSSL_FUNC_signature_newctx() should create and return a pointer to a provider side
190 OSSL_FUNC_signature_freectx() is passed a pointer to the provider side signature
194 OSSL_FUNC_signature_dupctx() should duplicate the provider side signature context in
199 OSSL_FUNC_signature_sign_init() initialises a context for signing given a provider side
222 a provider side signature context in the I<ctx> parameter, and a pointer to a
240 signed data given a provider side signature context in the I<ctx> parameter, and
261 provider side signature context in the I<ctx> parameter, and a pointer to a
298 provider side verification context in the I<ctx> parameter, and a pointer to a
332 given provider side signature context I<ctx> and stored them in I<params>.
336 given provider side signature context I<ctx> to I<params>.
[all …]
H A Dprovider-keyexch.pod93 OSSL_FUNC_keyexch_newctx() should create and return a pointer to a provider side
100 OSSL_FUNC_keyexch_freectx() is passed a pointer to the provider side key exchange
104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in
109 OSSL_FUNC_keyexch_init() initialises a key exchange operation given a provider side key
139 given provider side key exchange context I<ctx> to I<params>,
145 given provider side key exchange context I<ctx> into I<params>,
212 provider side key exchange context, or NULL on failure.
/freebsd/sys/contrib/device-tree/Bindings/soc/qcom/
H A Dqcom,aoss-qmp.txt1 Qualcomm Always-On Subsystem side channel binding
3 This binding describes the hardware component responsible for side channel
10 The AOSS side channel exposes control over a set of resources, used to control
58 The AOSS side channel also provides the controls for three cooling devices,
69 The following example represents the AOSS side-channel message RAM and the
/freebsd/sbin/hastd/
H A Dproto_tcp.c191 tcp_setup_new(const char *addr, int side, void **ctxp) in tcp_setup_new() argument
197 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_new()
198 side == TCP_SIDE_SERVER_LISTEN); in tcp_setup_new()
229 tctx->tc_side = side; in tcp_setup_new()
237 tcp_setup_wrap(int fd, int side, void **ctxp) in tcp_setup_wrap() argument
242 PJDLOG_ASSERT(side == TCP_SIDE_CLIENT || in tcp_setup_wrap()
243 side == TCP_SIDE_SERVER_WORK); in tcp_setup_wrap()
252 tctx->tc_side = side; in tcp_setup_wrap()
/freebsd/crypto/heimdal/appl/telnet/
H A Dtelnet.state2 Three pieces of state need to be kept for each side of each option.
66 an option that the other side doesn't understand is:
73 If the other side does not expect to receive the latter case,
79 if() statement in, but we expect the other side to generate the
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_status_cb.pod59 On the client side SSL_get_tlsext_status_type() can be used to determine whether
62 side SSL_get_tlsext_status_type() can be used to determine whether the client
85 The callback when used on the client side should return a negative value on
89 The callback when used on the server side should return with either
106 side if SSL_set_tlsext_status_type() was previously called, or on the server
107 side if the client requested OCSP stapling. Otherwise -1 is returned.
H A DSRP_Calc_B.pod25 /* server side .... */
37 /* client side .... */
55 and I<u> parameters are used on the server side and are calculated via
58 client side and are calculated via the functions SRP_Calc_client_key_ex(),
H A DSSL_CTX_set0_CA_list.pod54 In most cases it is not necessary to set CA names on the client side. The list
58 and therefore setting CA names on the client side will have no impact if that
63 server side.
93 has sent. This can be called on either the server or the client side. The
101 used on the server side then the "client CA list" functions take precedence.
102 Typically, on the server side, the "client CA list " functions should be used in
104 the client side.
H A DOPENSSL_Applink.pod13 OPENSSL_Applink is application-side interface which provides a glue
15 Even though it appears at application side, it's essentially OpenSSL
/freebsd/sys/contrib/device-tree/Bindings/clock/
H A Drenesas,rcar-usb2-clock-sel.txt43 - The functional clock of USB 2.0 host side must be "ehci_ohci"
44 - The functional clock of HS-USB side must be "hs-usb-if"
52 - The reset of USB 2.0 host side must be "ehci_ohci"
53 - The reset of HS-USB side must be "hs-usb-if"
/freebsd/sbin/ipf/ipfstat/
H A Dipfstat.c697 static void printside(char *side, ipf_statistics_t *frs) in printside() argument
701 PRINTF("%lu\t%s bad packets\n", frs->fr_bad, side); in printside()
703 PRINTF("%lu\t%s IPv6 packets\n", frs->fr_ipv6, side); in printside()
705 PRINTF("%lu\t%s packets blocked\n", frs->fr_block, side); in printside()
706 PRINTF("%lu\t%s packets passed\n", frs->fr_pass, side); in printside()
707 PRINTF("%lu\t%s packets not matched\n", frs->fr_nom, side); in printside()
708 PRINTF("%lu\t%s packets counted\n", frs->fr_acct, side); in printside()
709 PRINTF("%lu\t%s packets short\n", frs->fr_short, side); in printside()
710 PRINTF("%lu\t%s packets logged and blocked\n", frs->fr_bpkl, side); in printside()
711 PRINTF("%lu\t%s packets logged and passed\n", frs->fr_ppkl, side); in printside()
[all …]
/freebsd/contrib/tcsh/nls/ukrainian/
H A Dset193 91 No previous left hand side
94 92 Right hand side too long

12345678910>>...16