| /freebsd/crypto/krb5/src/lib/kadm5/ |
| H A D | t_kadm5.c | 34 #include <kadm5/admin.h> 42 #define ADMIN_PASSWORD "admin" 67 * authenticate to kadmin/changepw; otherwise authenticate to kadmin/admin. If 111 void *handle = get_handle("admin"); in create_simple_policy() 123 void *handle = get_handle("admin"); in delete_policy() 133 void *handle = get_handle("admin"); in compare_policy() 162 void *handle = get_handle("admin"); in create_simple_princ() 178 void *handle = get_handle("admin"); in delete_princ() 199 void *handle = get_handle("admin"); in compare_princ() 290 handle = get_handle("admin"); in test_chpass() [all …]
|
| H A D | t_kadm5.py | 10 admin admcilse 11 admin/get il 12 admin/modify mc 13 admin/delete d 14 admin/add a 15 admin/rename adil 33 realm.run([kadminl, 'addprinc', '-pw', 'admin', 'admin']) 34 realm.run([kadminl, 'addprinc', '-pw', 'admin', 'admin/get']) 35 realm.run([kadminl, 'addprinc', '-pw', 'admin', 'admin/modify']) 36 realm.run([kadminl, 'addprinc', '-pw', 'admin', 'admin/delete']) [all …]
|
| /freebsd/crypto/krb5/src/windows/installer/wix/ |
| H A D | property.wxi | 33 <Property Id="LEASHAUTOINIT" Admin="yes" Secure="yes">-autoinit</Property> 34 <Property Id="LEASHAUTOSTART" Admin="yes" Secure="yes">1</Property> 61 …<Property Id="LEASHCREATEMISSINGCONFIG" Admin="yes" Secure="yes">$(var.LeashCreateMissingConfig)</… 62 …<Property Id="LEASHAUTORENEWTICKETS" Admin="yes" Secure="yes">$(var.LeashAutoRenewTickets)</Proper… 63 <Property Id="LEASHLIFETIME" Admin="yes" Secure="yes">$(var.LeashLifetime)</Property> 64 <Property Id="LEASHRENEWTILL" Admin="yes" Secure="yes">$(var.LeashRenewTill)</Property> 65 <Property Id="LEASHRENEWABLE" Admin="yes" Secure="yes">$(var.LeashRenewable)</Property> 66 <Property Id="LEASHFORWARDABLE" Admin="yes" Secure="yes">$(var.LeashForwardable)</Property> 67 <Property Id="LEASHNOADDRESSES" Admin="yes" Secure="yes">$(var.LeashNoAddresses)</Property> 68 <Property Id="LEASHPROXIABLE" Admin="yes" Secure="yes">$(var.LeashProxiable)</Property> [all …]
|
| /freebsd/sys/dev/qat/qat_common/ |
| H A D | adf_freebsd_admin.c | 28 /* Admin Messages Registers */ 137 struct adf_admin_comms *admin = accel_dev->admin; in adf_put_admin_msg_sync() local 139 struct resource *mailbox = admin->mailbox_addr; in adf_put_admin_msg_sync() 150 sx_xlock(&admin->lock); in adf_put_admin_msg_sync() 153 sx_xunlock(&admin->lock); in adf_put_admin_msg_sync() 157 memcpy(admin->virt_addr + offset, in, ADF_ADMINMSG_LEN); in adf_put_admin_msg_sync() 170 admin->virt_addr + offset + ADF_ADMINMSG_LEN, in adf_put_admin_msg_sync() 174 "Failed to send admin msg %d to accelerator %d\n", in adf_put_admin_msg_sync() 178 sx_xunlock(&admin->lock); in adf_put_admin_msg_sync() 239 req.init_cfg_ptr = (u64)accel_dev->admin->aram_map_phys_addr; in adf_init_me() [all …]
|
| /freebsd/sys/dev/gve/ |
| H A D | gve_adminq.h | 40 /* Admin queue opcodes */ 58 /* Admin queue status codes */ 94 "gve: bad admin queue struct length"); 113 "gve: bad admin queue struct length"); 122 "gve: bad admin queue struct length"); 129 "gve: bad admin queue struct length"); 136 "gve: bad admin queue struct length"); 145 "gve: bad admin queue struct length"); 154 "gve: bad admin queue struct length"); 162 "gve: bad admin queue struct length"); [all …]
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kdb5_ldap_util.man | 151 kdb5_ldap_util \-D cn=admin,o=org \-H ldaps://ldap\-server1.mit.edu 153 Password for \(dqcn=admin,o=org\(dq: 211 shell% kdb5_ldap_util \-r ATHENA.MIT.EDU \-D cn=admin,o=org \-H 213 Password for \(dqcn=admin,o=org\(dq: 232 kdb5_ldap_util \-D cn=admin,o=org \-H ldaps://ldap\-server1.mit.edu 234 Password for \(dqcn=admin,o=org\(dq: 264 shell% kdb5_ldap_util \-r ATHENA.MIT.EDU \-D cn=admin,o=org \-H 266 Password for \(dqcn=admin,o=org\(dq: 288 shell% kdb5_ldap_util \-D cn=admin,o=org \-H 290 Password for \(dqcn=admin,o=org\(dq: [all …]
|
| H A D | kadmin.man | 66 using the service principal \fBkadmin/admin\fP or \fBkadmin/ADMINHOST\fP 67 (where \fIADMINHOST\fP is the fully\-qualified hostname of the admin 88 \fB/admin\fP to the primary principal name of the default ccache, 119 should contain a service ticket for the \fBkadmin/admin\fP or 121 hostname of the admin server) service; it can be acquired with the 139 Specifies the admin server which kadmin should contact. 258 on the admin server. 621 kadmin: getprinc tlyu/admin 622 Principal: tlyu/admin@BLEEP.COM 628 Last modified: Mon Aug 12 14:16:47 EDT 1996 (bjaspan/admin@BLEEP.COM) [all …]
|
| /freebsd/contrib/lutok/admin/ |
| H A D | clean-all.sh | 54 # admin directory. 55 rm -f admin/compile 56 rm -f admin/config.guess 57 rm -f admin/config.sub 58 rm -f admin/depcomp 59 rm -f admin/install-sh 60 rm -f admin/ltmain.sh 61 rm -f admin/mdate-sh 62 rm -f admin/missing 63 rm -f admin/texinfo.tex
|
| /freebsd/contrib/kyua/admin/ |
| H A D | clean-all.sh | 54 # admin directory. 55 rm -f admin/ar-lib 56 rm -f admin/compile 57 rm -f admin/config.guess 58 rm -f admin/config.sub 59 rm -f admin/depcomp 60 rm -f admin/install-sh 61 rm -f admin/ltmain.sh 62 rm -f admin/mdate-sh 63 rm -f admin/missing
|
| H A D | Makefile.am.inc | 31 @$(srcdir)/admin/check-style.sh \ 36 EXTRA_DIST += admin/check-style-common.awk \ 37 admin/check-style-cpp.awk \ 38 admin/check-style-make.awk \ 39 admin/check-style-man.awk \ 40 admin/check-style-shell.awk \ 41 admin/check-style.sh
|
| /freebsd/sys/dev/nvmf/controller/ |
| H A D | nvmft_controller.c | 119 qp = nvmft_qpair_init(trtype, params, 0, "admin queue"); in nvmft_handoff_admin_queue() 121 printf("NVMFT: Failed to setup admin queue from %.*s\n", in nvmft_handoff_admin_queue() 161 ctrlr->admin = qp; in nvmft_handoff_admin_queue() 357 * If the admin queue was closed while shutting down or a in nvmft_controller_shutdown() 387 /* Disable updates to CC while destroying admin qpair. */ in nvmft_controller_terminate() 391 nvmft_qpair_destroy(ctrlr->admin); in nvmft_controller_terminate() 419 * If the admin queue pair is closed while idle or while in nvmft_controller_error() 425 if (qp != ctrlr->admin) in nvmft_controller_error() 441 * change if the admin queue pair has closed. in nvmft_controller_error() 444 * queues, only the admin queue needs to be in nvmft_controller_error() [all …]
|
| /freebsd/sys/dev/nvmf/host/ |
| H A D | nvmf.c | 210 const nvlist_t *admin, *rparams; in nvmf_copyin_handoff() local 221 !nvlist_exists_nvlist(nvl, "admin") || in nvmf_copyin_handoff() 234 admin = nvlist_get_nvlist(nvl, "admin"); in nvmf_copyin_handoff() 235 if (!nvmf_validate_qpair_nvlist(admin, false)) in nvmf_copyin_handoff() 237 if (!nvlist_get_bool(admin, "admin")) in nvmf_copyin_handoff() 291 const nvlist_t *admin; in nvmf_establish_connection() local 298 admin = nvlist_get_nvlist(nvl, "admin"); in nvmf_establish_connection() 305 /* Setup the admin queue. */ in nvmf_establish_connection() 306 sc->admin = nvmf_init_qp(sc, trtype, admin, "admin queue", 0); in nvmf_establish_connection() 307 if (sc->admin == NULL) { in nvmf_establish_connection() [all …]
|
| /freebsd/contrib/pam-krb5/tests/tap/ |
| H A D | kadmin.c | 56 * expired password. This requires that the realm admin server be configured 59 * stored in config/admin-keytab. 72 krb5_principal admin = NULL; in kerberos_expire_password() local 81 path = test_file_path("config/admin-keytab"); in kerberos_expire_password() 87 admin = kerberos_keytab_principal(ctx, path); in kerberos_expire_password() 88 realm = krb5_principal_get_realm(ctx, admin); in kerberos_expire_password() 92 code = krb5_unparse_name(ctx, admin, &user); in kerberos_expire_password() 94 bail_krb5(ctx, code, "cannot unparse admin principal"); in kerberos_expire_password() 126 krb5_free_principal(ctx, admin); in kerberos_expire_password()
|
| /freebsd/sys/dev/smartpqi/ |
| H A D | smartpqi_queue.c | 30 * Submit an admin IU to the adapter. 31 * TODO : Admin command implemented using polling, 61 /* Submit the command to the admin ib queue */ in pqisrc_submit_admin_req() 71 DBG_ERR("Admin cmd timeout\n"); in pqisrc_submit_admin_req() 124 DBG_INIT(" admin ib: num_elem=%u elem_size=%u\n", in pqisrc_get_admin_queue_config() 126 DBG_INIT(" admin ob: num_elem=%u elem_size=%u\n", in pqisrc_get_admin_queue_config() 131 * Decide the no of elements in admin ib and ob queues. 136 /* Determine num elements in Admin IBQ */ in pqisrc_decide_admin_queue_config() 140 /* Determine num elements in Admin OBQ */ in pqisrc_decide_admin_queue_config() 286 * Allocate DMA memory for admin queue and initialize. [all …]
|
| /freebsd/crypto/heimdal/admin/ |
| H A D | ktutil.8 | 75 Oo Fl Fl a Ar host Oc Oo Fl Fl admin-server= Ns Ar host Oc \ 77 Update one or several keys to new versions. By default, use the admin 87 .It get Oo Fl p Ar admin principal Oc \ 88 Oo Fl Fl principal= Ns Ar admin principal Oc Oo Fl e Ar enctype Oc \ 90 Oo Fl Fl realm= Ns Ar realm Oc Oo Fl a Ar admin server Oc \ 91 Oo Fl Fl admin-server= Ns Ar admin server Oc Oo Fl s Ar server port Oc \
|
| /freebsd/sys/contrib/ena-com/ |
| H A D | ena_com.h | 247 ena_spinlock_t q_lock; /* spinlock for the admin queue */ 255 /* Indicate if the admin queue should poll for completion */ 264 * process new admin commands 270 /* Count the number of outstanding admin commands */ 539 /* ena_com_admin_init - Init the admin and the async queues 543 * Initialize the admin submission and completion queues. 551 /* ena_com_admin_destroy - Destroy the admin and the async events queues. 555 * won't send any additional admin completions/aenq. 605 /* ena_com_set_admin_running_state - Set the state of the admin queue 608 * Change the state of the admin queue (enable/disable) [all …]
|
| /freebsd/contrib/libpcap/ |
| H A D | chmod_bpf | 7 # This startup item will make it owned by the admin group, 8 # with permissions rw-rw----, so that anybody in the admin 16 # admin group can capture packets. 18 chgrp admin /dev/bpf*
|
| /freebsd/contrib/pam-krb5/tests/config/ |
| H A D | README | 6 admin-keytab 9 configured in password) that has admin access to inspect and modify 13 file is optional; if not present, the tests requiring admin 22 (KDC, kpasswd server, and admin server) for the realm you're using for 42 /etc/krb5.conf) with the KDC, kpasswd server, and admin server, you
|
| /freebsd/contrib/libpcap/ChmodBPF/ |
| H A D | ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
| /freebsd/contrib/pam-krb5/ci/ |
| H A D | kdc-setup-mit | 18 apt-get install krb5-admin-server krb5-kdc krb5-pkinit openssl 40 kadmin.local -q 'add_principal +requires_preauth -randkey test/admin@MIT.TEST' 41 kadmin.local -q 'ktadd -k tests/config/admin-keytab test/admin@MIT.TEST' 89 systemctl stop krb5-kdc krb5-admin-server 90 systemctl start krb5-kdc krb5-admin-server
|
| /freebsd/sbin/nvmecontrol/ |
| H A D | fabrics.c | 253 qparams.admin = true; in connect_discovery_adminq() 305 * XXX: Should this accept the admin queue size as a parameter rather 438 uint32_t kato, struct nvmf_qpair **admin, struct nvmf_qpair **io, in connect_nvm_queues() argument 470 /* Admin queue. */ in connect_nvm_queues() 472 qparams.admin = true; in connect_nvm_queues() 477 error = connect_nvm_adminq(na, &qparams, admin, cntlid, subnqn, hostnqn, in connect_nvm_queues() 497 error = nvmf_host_identify_controller(*admin, cdata); in connect_nvm_queues() 506 error = nvmf_host_request_queues(*admin, num_io_queues, &queues); in connect_nvm_queues() 522 qparams.admin = false; in connect_nvm_queues() 530 nvmf_cntlid(*admin), subnqn, hostnqn, 0); in connect_nvm_queues() [all …]
|
| H A D | fabrics.h | 27 /* Connect to a discovery controller and return the Admin qpair. */ 32 * Connect to an NVM controller establishing an Admin qpair and one or 40 uint32_t kato, struct nvmf_qpair **admin, struct nvmf_qpair **io, 47 void disconnect_nvm_queues(struct nvmf_qpair *admin, struct nvmf_qpair **io,
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_import/ |
| H A D | zpool_import_parallel_admin.ksh | 39 # Verify that admin commands to different pool are not blocked by import 45 # 5. Execute some admin commands against both pools 46 # 6. Verify that the admin commands to the non-imported pool don't stall 119 log_assert "Simple admin commands to different pool not blocked by import" 139 # run some admin commands on the pools while the import is in progress 166 log_pass "Simple admin commands to different pool not blocked by import"
|
| /freebsd/sbin/pfctl/tests/files/ |
| H A D | pf0010.ok | 21 block return-icmp6(admin-unr) in inet6 proto ipv6-icmp all 22 block return-icmp6(admin-unr) in inet6 proto ipv6-icmp all 29 block return-icmp(srcfail, admin-unr) in all 30 block return-icmp(srcfail, admin-unr) in all
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_export/ |
| H A D | zpool_export_parallel_admin.ksh | 37 # Verify that admin commands cannot race a pool export 42 # 3. Execute some admin commands against the pool 56 log_assert "admin commands cannot race a pool export" 73 log_pass "admin commands cannot race a pool export"
|