| /netbsd-src/external/gpl2/lvm2/dist/lib/misc/ |
| H A D | lvm-string.c | 137 const char *lvname, const char *layer) in build_dm_name() argument 146 if (layer && *layer) { in build_dm_name() 147 _count_chars(layer, &len, &hyphens, '-', 0); in build_dm_name() 155 " for %s %s %s.", len, vgname, lvname, layer); in build_dm_name() 164 if (layer && *layer) { in build_dm_name() 166 if (*layer != '_') in build_dm_name() 168 _quote_hyphens(&out, layer); in build_dm_name()
|
| /netbsd-src/external/bsd/wpa/dist/hostapd/logwatch/ |
| H A D | hostapd | 29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) { 34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++; 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 46 print " $layer:\n"; 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) { 49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
|
| /netbsd-src/external/gpl2/lvm2/dist/lib/activate/ |
| H A D | dev_manager.c | 64 static char *_build_dlid(struct dm_pool *mem, const char *lvid, const char *layer) in _build_dlid() argument 69 if (!layer) in _build_dlid() 70 layer = ""; in _build_dlid() 72 len = sizeof(UUID_PREFIX) + sizeof(union lvid) + strlen(layer); in _build_dlid() 76 " %s %s.", len, lvid, layer); in _build_dlid() 80 sprintf(dlid, UUID_PREFIX "%s%s%s", lvid, (*layer) ? "-" : "", layer); in _build_dlid() 85 char *build_dlid(struct dev_manager *dm, const char *lvid, const char *layer) in build_dlid() argument 87 return _build_dlid(dm->mem, lvid, layer); in build_dlid() 659 struct logical_volume *lv, const char *layer) in _add_dev_to_dtree() argument 664 if (!(name = build_dm_name(dm->mem, lv->vg->name, lv->name, layer))) in _add_dev_to_dtree() [all …]
|
| /netbsd-src/sys/dev/sun/ |
| H A D | files.sun | 15 # upper layer of sun kbd driver 25 # e.g. - lower layer: sun keyboard at zs 29 # e.g. - lower layer: sun keyboard at a line discipline 33 # e.g. - middle layer: serial attachment of sun keyboard 37 # upper layer of sun ms driver 38 # XXX: middle layer for sun serial mice (split out?) 42 # e.g. - lower layer: sun (mouse systems) mouse at zs 46 # e.g. - lower layer: sun (mouse systems) mouse at a line discipline 50 # XXX: middle layer for sun (mouse systems) serial mice consists of 52 # for consistency into a separate middle-layer file.
|
| /netbsd-src/sbin/mount_umap/ |
| H A D | umap_manual | 15 contain identical user ID information, The umap layer can be used to 18 The umap layer is a file system layer that sits on top of the normal 19 file layer. The umap layer maps Unix-style UIDs from 34 In order for the umap layer to work properly, all users 43 Groups work similarly. The umap layer can translate group ID's between 48 The umap layer has no provisions for enrolling UID's from other domains 60 the umap layer code and, as a result, the entire kernel. These 64 When the umap layer is in use, one of the participating domains is declared 68 of the umap layer, as it already has all of the correct mappings. All 69 other domains must run a umap layer on top of any other layers they use. [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/record/ |
| H A D | README | 5 record layer code to aid future maintenance. 7 The record layer is divided into a number of components. At the time of writing 16 be private to the record layer, or whether they form part of the API to the rest 27 interface to the record layer for the rest of libssl. The other 3 components are 28 entirely private to the record layer and therefore should never be accessed 70 the main one is rec_layer_s3.c which provides the core SSL/TLS layer. The second
|
| /netbsd-src/crypto/external/bsd/openssl/dist/ssl/record/ |
| H A D | README.md | 5 record layer code to aid future maintenance. 7 The record layer is divided into a number of components. At the time of writing 16 be private to the record layer, or whether they form part of the API to the rest 27 interface to the record layer for the rest of libssl. The other 3 components are 28 entirely private to the record layer and therefore should never be accessed 69 the main one is rec_layer_s3.c which provides the core SSL/TLS layer. The second
|
| /netbsd-src/external/bsd/libpcap/dist/doc/ |
| H A D | README.sita | 39 PCAP into two halves. The top layer performs the majority of the 41 provide the lower layer functionality of actual sniffing and 58 back to the local 'top layer' for forwarding to the actual 61 Note that the DLT_SITA link-layer type includes a proprietary header 67 - Link layer hardware signal status (1 octet)
|
| /netbsd-src/crypto/external/bsd/libsaslc/dist/ref/ |
| H A D | rfc4422.txt | 37 protocol exchanges within a data security layer. 41 carrying a data security layer over a connection. In addition, this 126 exchanges within a data security layer. The data security layer can 134 SASL is conceptually a framework that provides an abstraction layer 141 SASL abstraction layer 146 It is through the interfaces of this abstraction layer that the 148 layer does generally hide the particulars of protocols from 150 layer does not generally hide the particulars of mechanisms from 330 If the outcome is successful and a security layer was negotiated, 331 this layer is then installed (see Section 3.7). This also applies to [all …]
|
| H A D | rfc4752.txt | 132 security layer failure. 145 be requesting a security layer, it MUST also supply to the 148 security layer providing confidentiality protection, it MUST also 181 integ_avail flag is not set in the context, then no security layer 185 layer with confidentiality can be offered or accepted. If the 197 if the server does not advertise support for any security layer. 200 bit-mask specifying the selected security layer, the second through 203 client does not support any security layer), and the remaining octets 290 integ_avail flag is not set in the context, then no security layer 292 context, then no security layer with confidentiality can be offered [all …]
|
| H A D | rfc2222.txt | 49 7.2.3 Security layer ........................................ 11 72 protocol interactions. If its use is negotiated, a security layer is 76 carrying a negotiated security layer over the connection. 132 security layer for subsequent protocol interactions. 161 mechanism-specific security layer. If the use of a security layer is 184 If use of a security layer is negotiated, it is applied to all 185 subsequent data sent over the connection. The security layer takes 188 for data sent by the server. Once the security layer is in effect, 189 the protocol stream is processed by the security layer into buffers 231 4. Identification of the octet where any negotiated security layer [all …]
|
| /netbsd-src/external/apache2/llvm/dist/llvm/docs/tutorial/ |
| H A D | BuildingAJIT2.rst | 28 In this layer we'll learn more about the ORC layer concept by using a new layer, 53 constructor for this layer takes a reference to the execution session and the 54 layer below (as all layers do) plus an *IR optimization function* that it will 86 the ExecutionSession and output layer (standard practice for layers), along with 141 to see how layers compose. It also provides a neat entry point to the *layer* 196 layer through the transform function object, and (2) implementing the ORC 203 succeeds, passes the transformed module to the base layer. If the transform 226 These two operations, ``add`` and ``emit``, together constitute the layer 227 concept: A layer is a way to wrap a portion of a compiler pipeline (in this case 233 can compose neatly by calling the 'emit' method of a base layer to complete
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/include/ |
| H A D | tcslog.h | 25 #define LogMessage(dest, priority, layer, fmt, ...) \ argument 28 fprintf(dest, "%s " fmt "\n", layer, ## __VA_ARGS__); \ 30 openlog(layer, LOG_NDELAY|LOG_PID, TSS_SYSLOG_LVL); \
|
| H A D | tsplog.h | 22 #define LogMessage(dest, priority, layer, fmt, ...) \ argument 25 fprintf(dest, "%s %s %s:%d " fmt "\n", priority, layer, __FILE__, __LINE__, ## __VA_ARGS__); \
|
| /netbsd-src/crypto/external/bsd/openssh/dist/ |
| H A D | xmss_hash_address.c | 14 void setLayerADRS(uint32_t adrs[8], uint32_t layer){ in setLayerADRS() argument 15 adrs[0] = layer; in setLayerADRS()
|
| /netbsd-src/external/bsd/openldap/dist/doc/rfc/ |
| H A D | rfc4531.txt | 249 illustrates the relationship between the LDAP message layer, SASL 250 layer, TLS layer, and transport connection within an LDAP session. 253 | LDAP message layer | 256 | SASL layer | 259 | TLS layer | 270 negotiation of a TLS layer. If a TLS is already installed, the 271 StartTLS operation must fail. Upon establishment of the TLS layer, 277 As specified in [RFC4422], a newly negotiated SASL security layer 278 replaces the installed SASL security layer. Though the client/server 288 exchanges, only one SASL security layer may be installed at any [all …]
|
| H A D | rfc4513.txt | 260 with IP layer security [RFC4301]. 277 for establishing transport-layer security services. 323 The term "TLS layer" refers to TLS services used in providing 327 The term "SASL layer" refers to SASL services used in providing 331 The term "LDAP message layer" refers to the LDAP Message (PDU) 344 connection, TLS layer, SASL layer, LDAP message layer) and their 423 consideration various aspects of the TLS layer including discovery of 596 After a TLS layer is established in an LDAP session, both parties are 600 SHOULD remove the TLS layer immediately after the TLS (re)negotiation 603 upon finding it inadequate, should remove the TLS layer. [all …]
|
| /netbsd-src/sys/arch/sparc/conf/ |
| H A D | files.sparc | 182 file dev/sun/kbd_zs.c kbd_zs # kbd lower layer 187 file dev/sun/sunkbd.c kbd_tty # kbd lower layer 190 # shared middle layer for serial keyboard 191 file dev/sun/kbdsun.c kbd_zs | kbd_tty # kbd middle layer 200 file dev/sun/ms_zs.c ms_zs # mouse lower layer 205 file dev/sun/sunms.c ms_tty # mouse lower layer 207 # XXX: middle layer for sun (mouse systems) serial mice consists of 208 # just one function in dev/sun/ms.c (upper layer). Split it out?
|
| /netbsd-src/external/gpl2/lvm2/dist/udev/ |
| H A D | 11-dm-lvm.rules | 13 # DM_LV_LAYER - logical volume layer (blank if not set) 21 # Use DM name and split it up into its VG/LV/layer constituents.
|
| /netbsd-src/external/gpl2/lvm2/dist/libdm/ |
| H A D | libdm-string.c | 96 char **vgname, char **lvname, char **layer) in dm_split_lvm_name() argument 101 _unquote(*layer = _unquote(*lvname = _unquote(*vgname))); in dm_split_lvm_name()
|
| /netbsd-src/external/apache2/llvm/dist/llvm/lib/Target/VE/ |
| H A D | VVPInstrInfo.td | 10 // SDNodes are an intermediate isel layer between the vector SDNodes emitted by 15 // The standard The VVP layer SDNode. The VE vector instruction.
|
| /netbsd-src/sys/dev/acpi/ |
| H A D | acpi_debug.c | 69 const char *layer, *level; in acpi_debug_init() local 124 layer = acpi_debug_getkey(acpi_debug_layer_d, AcpiDbgLayer); in acpi_debug_init() 127 strlcpy(acpi_debug_layer_s, layer, ACPI_DEBUG_MAX); in acpi_debug_init()
|
| /netbsd-src/crypto/dist/ipsec-tools/src/racoon/ |
| H A D | TODO | 92 o interaction between IKE/IPsec and socket layer. 94 part of network subsystem, including socket layer. this presents the 99 we may be able to give socket layer some feedback from IKE/IPsec layer.
|
| /netbsd-src/sys/external/bsd/drm2/dist/drm/vmwgfx/device_include/ |
| H A D | svga3d_surfacedefs.h | 1438 u32 mip_level, u32 layer) in svga3dsurface_subres() argument 1440 return cache->num_mip_levels * layer + mip_level; in svga3dsurface_subres() 1514 u32 layer; in svga3dsurface_get_loc() local 1520 layer = offset / cache->mip_chain_bytes; in svga3dsurface_get_loc() 1521 offset -= layer * cache->mip_chain_bytes; in svga3dsurface_get_loc() 1528 loc->sub_resource = svga3dsurface_subres(cache, i, layer); in svga3dsurface_get_loc()
|
| /netbsd-src/crypto/external/bsd/libsaslc/dist/doc/ |
| H A D | library.txt | 70 char **out, size_t *outlen); - function encodes data using security layer 76 char **out, size_t *outlen); - function decodes data using security layer 149 according to negotiated security layer */ 151 according to negotiated security layer */
|