| /src/tests/sys/netinet/ |
| H A D | tcp_user_cookie.c | 57 int sock, accepted, port, cookie; in main() local 91 accepted = accept(sock, NULL, 0); in main() 93 if (accepted < 0) in main() 96 ret = setsockopt(accepted, SOL_SOCKET, SO_USER_COOKIE, in main() 101 ret = read(accepted, &recvbuf, buflen); in main() 106 close(accepted); in main()
|
| /src/contrib/wpa/src/ap/ |
| H A D | ieee802_11_auth.c | 35 int accepted; /* HOSTAPD_ACL_* */ member 95 return entry->accepted; in hostapd_acl_cache_get() 542 cache->accepted = HOSTAPD_ACL_ACCEPT_TIMEOUT; in hostapd_acl_recv_radius() 544 cache->accepted = HOSTAPD_ACL_ACCEPT; in hostapd_acl_recv_radius() 582 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius() 596 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius() 598 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius() 604 bool success = cache->accepted == HOSTAPD_ACL_ACCEPT || in hostapd_acl_recv_radius() 605 cache->accepted == HOSTAPD_ACL_ACCEPT_TIMEOUT; in hostapd_acl_recv_radius() 615 (ieee802_11_set_radius_info(hapd, sta, cache->accepted, in hostapd_acl_recv_radius() [all …]
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_tlsext_servername_callback.pod | 41 accepted. Typically a server will call SSL_set_SSL_CTX() in the callback to set 46 In this case the servername requested by the client is not accepted and the 53 If this value is returned then the servername is not accepted by the server. 62 This return value indicates that the servername is not accepted by the server. 83 session from the original handshake had a servername accepted by the server then 91 If the session from the original handshake had a servername accepted by the 110 If a servername was accepted by the server in the original handshake then it 159 handshake, the server accepted it, and then the client successfully resumed but
|
| H A D | SSL_set_incoming_stream_policy.pod | 40 This is the default setting. Incoming streams are accepted according to the 55 accepted.
|
| H A D | BIO_s_accept.pod | 44 Using accept BIOs, TCP/IP connections can be accepted and data 103 BIO_get_accept_ip_family() returns the IP family accepted by the BIO I<b>, 106 BIO_set_accept_ip_family() sets the IP family I<family> accepted by BIO I<b>. 153 If no further connections will be accepted the B<accept> can 167 accepted a connection and retry the call.
|
| H A D | SSL_get_default_timeout.pod | 21 after which it will not be accepted for session reuse. If the timeout
|
| H A D | BIO_connect.pod | 44 on the accepted socket. The flags are described in L</FLAGS> below. 102 BIO_accept_ex() returns the accepted socket on success or
|
| H A D | SSL_read_early_data.pod | 121 connection has been completed you can determine whether the server accepted or 123 SSL_EARLY_DATA_ACCEPTED if the data was accepted, SSL_EARLY_DATA_REJECTED if it 218 The recv_max_early_data value also has an impact on early data that is accepted. 219 The amount of data that is accepted will always be the lower of the 231 is accepted or not, for example to mitigate replay risks (see L</REPLAY PROTECTION> 353 accepted by the server, SSL_EARLY_DATA_REJECTED if early data was rejected by
|
| /src/lib/libc/rpc/ |
| H A D | rpc_prot.c | 54 static void accepted(enum accept_stat, struct rpc_err *); 224 accepted(enum accept_stat acpt_stat, struct rpc_err *error) in accepted() function 302 accepted(msg->acpted_rply.ar_stat, error); in _seterr_reply()
|
| /src/sys/rpc/ |
| H A D | rpc_prot.c | 60 static enum clnt_stat accepted(enum accept_stat, struct rpc_err *); 243 accepted(enum accept_stat acpt_stat, struct rpc_err *error) in accepted() function 316 stat = accepted(msg->acpted_rply.ar_stat, error); in _seterr_reply()
|
| /src/contrib/llvm-project/clang/include/clang/Basic/ |
| H A D | Diagnostic.td | 134 // accepted language extensions should use Extension or ExtWarn below instead. 139 // Extensions are warnings about accepted language extensions. 142 // ExtWarns are warnings about accepted language extensions.
|
| /src/bin/sh/tests/parameters/ |
| H A D | pwd1.0 | 1 # Check that bogus PWD values are not accepted from the environment.
|
| H A D | pwd2.0 | 1 # Check that PWD is exported and accepted from the environment.
|
| /src/crypto/krb5/src/lib/rpc/ |
| H A D | rpc_prot.c | 179 accepted(enum accept_stat acpt_stat, struct rpc_err *error) in accepted() function 249 accepted(msg->acpted_rply.ar_stat, error); in gssrpc__seterr_reply()
|
| /src/crypto/krb5/src/lib/krb5/os/ |
| H A D | localauth.c | 391 krb5_boolean accepted = FALSE; in krb5_kuserok() local 401 accepted = TRUE; in krb5_kuserok() 405 return accepted; in krb5_kuserok()
|
| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpencod.txt | 167 # Multiline output with line break in the middle of a b64 block is accepted 172 # Long lines are accepted
|
| /src/usr.sbin/ppp/ |
| H A D | README.changes | 94 o Protocol-compressed packets are accepted even if they were denied 113 o The words ``host'' and ``port'' are no longer accepted by the ``set filter'' 135 o MSCHAPv2 is now accepted by default. If you don't wish to negotiate 137 o MPPE is enabled and accepted by default (although deflate and predictor1
|
| /src/sys/contrib/device-tree/Bindings/leds/backlight/ |
| H A D | led-backlight.txt | 13 in the range accepted by the underlying LED devices.
|
| /src/crypto/openssl/doc/man7/ |
| H A D | ossl-guide-quic-server-block.pod | 20 Once the current client disconnects, the next client connection is accepted. 130 /* Setup ALPN negotiation callback to decide which ALPN is accepted. */ 137 * are accepted. 205 L<SSL_accept_connection(3)> will return an accepted connection within a fresh
|
| H A D | ossl-guide-tls-server-block.pod | 20 Once the current client disconnects, the next client connection is accepted. 243 /* Client went away before we accepted the connection */ 247 On success the accepted client connection has been wrapped in a fresh BIO and 253 fprintf(stderr, "New client connection accepted\n");
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-format-options.pod | 35 Refer to the individual man page to see which options are accepted. 56 Both uppercase and lowercase are accepted.
|
| /src/contrib/ee/ |
| H A D | Changes | 21 specified options are no longer accepted (that is, they are treated as file
|
| /src/contrib/sendmail/cf/feature/ |
| H A D | check_other.m4 | 40 dnl accept anything that will be accepted by the MTA
|
| /src/sys/contrib/device-tree/Bindings/net/ |
| H A D | marvell-neta-bm.txt | 17 - pool<0 : 3>,pkt-size: maximum size of a packet accepted by a given buffer
|
| /src/contrib/wpa/hostapd/ |
| H A D | README | 153 Unauthorized state and only IEEE 802.1X frames are accepted at this 157 station are accepted. 320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 348 # accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all
|