/dragonfly/usr.bin/chat/ |
H A D | chat.c | 168 static char *clean(char *s, int sending); 553 clean(char *s, int sending) in clean() argument 557 int add_return = sending; in clean() 584 if (sending) { in clean() 597 if (sending && *s == '\0') in clean() 607 if (sending) in clean() 614 if (sending && phone_num) { in clean() 625 if (sending && phone_num2) { in clean() 656 if (sending) { in clean() 676 if (cur_chr != 0 || sending) { in clean() [all …]
|
/dragonfly/crypto/libressl/ssl/ |
H A D | tls13_handshake.c | 357 int sending; in tls13_handshake_perform() local 400 sending = action->sender == ctx->mode; in tls13_handshake_perform() 403 sending ? "sending" : "receiving", in tls13_handshake_perform() 409 if (sending) in tls13_handshake_perform() 431 if (sending) in tls13_handshake_perform()
|
/dragonfly/contrib/lvm2/dist/udev/ |
H A D | 95-dm-notify.rules | 7 # These rules are responsible for sending a notification to a process
|
/dragonfly/usr.bin/msgs/ |
H A D | msgs.c | 116 bool sending = NO; variable 343 sending = YES; in main() 660 if (sending) { in onintr()
|
/dragonfly/sbin/init/ |
H A D | NOTES | 38 was responsible for sending SIGHUP to the foreground process 42 kernel is also responsible for sending SIGCONT to stopped
|
/dragonfly/contrib/ee/ |
H A D | ee.msg | 80 70 "sending contents of buffer to \"%s\" " 121 111 "sending contents of edit buffer to 'spell'"
|
/dragonfly/share/examples/netgraph/ |
H A D | ngctl | 59 # supplied by the system. We do this by sending the ksocket node a 164 # By sending a node the ``listhooks'' command using ngctl, we can see
|
/dragonfly/contrib/binutils-2.27/bfd/ |
H A D | README | 39 Patches are encouraged. When sending patches, always send the output
|
/dragonfly/contrib/gdb-7/bfd/ |
H A D | README | 39 Patches are encouraged. When sending patches, always send the output
|
/dragonfly/crypto/openssh/ |
H A D | PROTOCOL | 114 an endpoint to request that its peer should cease sending data to it 133 On receiving this message, the peer SHOULD cease sending data of 206 and sending them as channel data. This ensures that packet boundaries 342 The SSH channels protocol (RFC4254 section 6.9) supports sending a 344 extension signal "INFO@openssh.com" that allows sending SIGINFO on
|
H A D | PROTOCOL.mux | 111 server disconnecting without sending an exit message.
|
/dragonfly/tools/tools/net80211/wlaninject/ |
H A D | README | 54 -l Override the length of the packet. This is useful for sending
|
/dragonfly/sbin/natd/ |
H A D | HISTORY | 78 - Support for sending ICMP 'need fragmentation' messages
|
/dragonfly/sys/vfs/procfs/ |
H A D | README | 96 arranges for the sending process
|
/dragonfly/usr.bin/indent/ |
H A D | README | 71 | don't know their feelings about sending it out.
|
/dragonfly/libexec/bootpd/ |
H A D | README | 12 You can subscribe to this mailing list by sending mail to:
|
H A D | Changes | 115 before sending a BOOTREPLY to a client. Support for
|
/dragonfly/games/fortune/datfiles/ |
H A D | dragonfly-funny | 102 <@Dianora> hsu is sending me porn!
|
/dragonfly/contrib/gcc-4.7/gcc/doc/ |
H A D | objc.texi | 140 which can be accessed by the program directly, without sending a message 173 initialized, thus sending messages to the @code{nil} object. The 249 allocation of or sending messages to arbitrary objects; 252 allocation of or sending messages to objects whose classes have a 256 sending messages to Objective-C constant strings (@code{@@"this is a
|
/dragonfly/sys/net/wg/ |
H A D | wg_noise.c | 950 noise_keypair_should_refresh(struct noise_remote *r, bool sending) in noise_keypair_should_refresh() argument 963 if (sending) { in noise_keypair_should_refresh()
|
/dragonfly/crypto/libressl/ |
H A D | ChangeLog | 810 * Avoid transcript initialization when sending a TLS HelloRequest, 828 * When sending an alert in TLSv1.3, only set its error code when no 1096 * Stop sending GOST R 34.10-94 as a CertificateType. 1197 * Support sending certificate status requests from the TLS 1.3 1200 * Support sending certificate status replies from the TLS 1.3 server 1219 * Support sending dummy change_cipher_spec records for TLS 1.3 middlebox 1760 for ClientHello. However, F5 is sending it in ServerHello. We need 2028 TLS client repeatedly renegotiating and sending OCSP Status Request
|
/dragonfly/contrib/xz/ |
H A D | README | 158 so here are a few things to do before sending a bug report:
|
/dragonfly/share/syscons/keymaps/ |
H A D | cz.iso2.kbd | 104 # If you are sending email from aol.com, hotmail.com, or
|
H A D | sk.iso2.kbd | 106 # If you are sending email from aol.com, hotmail.com, or
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | eap_testing.txt | 238 1, but then ends up sending Access-Reject. Maybe an issue with TTLS
|