Home
last modified time | relevance | path

Searched +full:block +full:- +full:fetch (Results 1 – 25 of 410) sorted by relevance

12345678910>>...17

/freebsd/usr.sbin/makefs/ffs/
H A Dffs_balloc.c4 /*-
5 * SPDX-License-Identifier: BSD-3-Clause
60 * the inode and the logical block number in a file.
68 if (ip->i_fs->fs_magic == FS_UFS2_MAGIC) in ffs_balloc()
82 struct fs *fs = ip->i_fs; in ffs_balloc_ufs1()
97 assert(size <= fs->fs_bsize); in ffs_balloc_ufs1()
102 * If the next write will extend the file into a new block, in ffs_balloc_ufs1()
104 * this fragment has to be extended to be a full block. in ffs_balloc_ufs1()
107 lastlbn = lblkno(fs, ip->i_ffs1_size); in ffs_balloc_ufs1()
111 if (osize < fs->fs_bsize && osize > 0) { in ffs_balloc_ufs1()
[all …]
/freebsd/share/misc/
H A Dscsi_modes35 # 'i' is a byte-sized integral types, followed by a field width of
38 # 'b' is a bit-sized integral type
39 # 't' is a bitfield type- followed by a bit field width
42 # 'z' values are null-padded strings
77 {SBLP (Supported Block Lengths and Protection)} t1
81 {Extended Self-Test Completion Time} i2
95 0x02 "Disconnect-Reconnect" {
111 0x16 "Extended Device-Type Specific";
154 0x18 "Protocol-Specific Logical Unit";
156 0x19 "Protocol-Specific Port";
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Dstore.c2 * Copyright (c) 1997-2008 Kungliga Tekniska Högskolan
35 #include "store-int.h"
37 #define BYTEORDER_IS(SP, V) (((SP)->flags & KRB5_STORAGE_BYTEORDER_MASK) == (V))
44 * Add the flags on a storage buffer by or-ing in the flags to the buffer.
55 sp->flags |= flags; in krb5_storage_set_flags()
70 sp->flags &= ~flags; in krb5_storage_clear_flags()
88 return (sp->flags & flags) == flags; in krb5_storage_is_flags()
106 sp->flags &= ~KRB5_STORAGE_BYTEORDER_MASK; in krb5_storage_set_byteorder()
107 sp->flags |= byteorder; in krb5_storage_set_byteorder()
119 return sp->flags & KRB5_STORAGE_BYTEORDER_MASK; in krb5_storage_get_byteorder()
[all …]
H A Dstore_mem.c2 * Copyright (c) 1997 - 2000, 2002 Kungliga Tekniska Högskolan
35 #include "store-int.h"
46 mem_storage *s = (mem_storage*)sp->data; in mem_fetch()
47 if(size > (size_t)(s->base + s->size - s->ptr)) in mem_fetch()
48 size = s->base + s->size - s->ptr; in mem_fetch()
49 memmove(data, s->ptr, size); in mem_fetch()
50 sp->seek(sp, size, SEEK_CUR); in mem_fetch()
57 mem_storage *s = (mem_storage*)sp->data; in mem_store()
58 if(size > (size_t)(s->base + s->size - s->ptr)) in mem_store()
59 size = s->base + s->size - s->ptr; in mem_store()
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A DREADME-HS204 This document describe how the IEEE 802.11u Interworking and Wi-Fi
7 GUI or Wi-Fi framework) is used to manage this functionality.
10 Introduction to Wi-Fi Hotspot 2.0
11 ---------------------------------
13 Hotspot 2.0 is the name of the Wi-Fi Alliance specification that is used
14 in the Wi-Fi CERTIFIED Passpoint<TM> program. More information about
17 http://www.wi-fi.org/knowledge-center/white-papers/wi-fi-certified-passpoint%E2%84%A2-new-program-w…
20 https://www.wi-fi.org/knowledge-center/published-specifications
23 standardized in IEEE Std 802.11u-2011 which is now part of the IEEE Std
24 802.11-2012.
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_DigestVerifyInit.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH EVP_DIGESTVERIFYINIT 3ossl 2025-09-30 3.5.4 OpenSSL
65 EVP_DigestVerifyFinal, EVP_DigestVerify \- EVP signature verification functions
85 The EVP signature routines are a high-level interface to digital signatures.
92 implement that digest directly itself or it may (optionally) choose to fetch it
95 for the properties to be used during the fetch. Finally, the passed parameters
98 The \fIpkey\fR algorithm is used to fetch a \fBEVP_SIGNATURE\fR method implicitly, to
99 be used for the actual signing. See "Implicit fetch" in \fBprovider\fR\|(7) for
102 The OpenSSL default and legacy providers support fetching digests and can fetch
104 supports fetching digests but will only fetch digests that are themselves
[all …]
H A DEVP_DigestSignInit.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH EVP_DIGESTSIGNINIT 3ossl 2025-09-30 3.5.4 OpenSSL
65 EVP_DigestSignFinal, EVP_DigestSign \- EVP signing functions
86 The EVP signature routines are a high-level interface to digital signatures.
93 implement that digest directly itself or it may (optionally) choose to fetch it
96 the properties to be used during the fetch. Finally, the passed parameters
99 The \fIpkey\fR algorithm is used to fetch a \fBEVP_SIGNATURE\fR method implicitly, to
100 be used for the actual signing. See "Implicit fetch" in \fBprovider\fR\|(7) for
103 The OpenSSL default and legacy providers support fetching digests and can fetch
105 supports fetching digests but will only fetch digests that are themselves
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_DigestVerifyInit.pod6 EVP_DigestVerifyFinal, EVP_DigestVerify - EVP signature verification functions
26 The EVP signature routines are a high-level interface to digital signatures.
33 implement that digest directly itself or it may (optionally) choose to fetch it
36 for the properties to be used during the fetch. Finally, the passed parameters
39 The I<pkey> algorithm is used to fetch a B<EVP_SIGNATURE> method implicitly, to
40 be used for the actual signing. See L<provider(7)/Implicit fetch> for
43 The OpenSSL default and legacy providers support fetching digests and can fetch
45 supports fetching digests but will only fetch digests that are themselves
87 SHA3-224, SHA3-256, SHA3-384, SHA3-512
103 If RSA-PSS is used and restrictions apply then the digest must match.
[all …]
H A DEVP_DigestSignInit.pod6 EVP_DigestSignFinal, EVP_DigestSign - EVP signing functions
27 The EVP signature routines are a high-level interface to digital signatures.
34 implement that digest directly itself or it may (optionally) choose to fetch it
37 the properties to be used during the fetch. Finally, the passed parameters
40 The I<pkey> algorithm is used to fetch a B<EVP_SIGNATURE> method implicitly, to
41 be used for the actual signing. See L<provider(7)/Implicit fetch> for
44 The OpenSSL default and legacy providers support fetching digests and can fetch
46 supports fetching digests but will only fetch digests that are themselves
70 "signing". Built-in EVP_PKEY types supported by these functions are CMAC,
96 SHA3-224, SHA3-256, SHA3-384, SHA3-512
[all …]
/freebsd/usr.sbin/bsdinstall/distfetch/
H A Ddistfetch.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
37 #include <fetch.h>
128 uint8_t block[4096]; in fetch_files() local
162 errconf.title = "Fetch Error"; in fetch_files()
197 while ((chunk = fread(block, 1, sizeof(block), fetch_out)) in fetch_files()
199 if (fwrite(block, 1, chunk, file_out) < chunk) in fetch_files()
/freebsd/sys/fs/ext2fs/
H A Dext2_balloc.c1 /*-
7 /*-
8 * SPDX-License-Identifier: BSD-3-Clause
65 fs = ip->i_e2fs; in ext2_ext_balloc()
66 blks = howmany(size, fs->e2fs_bsize); in ext2_ext_balloc()
73 bp = getblk(vp, lbn, fs->e2fs_bsize, 0, 0, 0); in ext2_ext_balloc()
77 error = bread(vp, lbn, fs->e2fs_bsize, NOCRED, &bp); in ext2_ext_balloc()
83 bp->b_blkno = fsbtodb(fs, newblk); in ext2_ext_balloc()
95 * the inode and the logical block number in a file.
113 fs = ip->i_e2fs; in ext2_balloc()
[all …]
/freebsd/crypto/openssl/demos/cipher/
H A Dariacbc.c2 * Copyright 2012-2024 The OpenSSL Project Authors. All Rights Reserved.
71 /* Fetch the cipher implementation */ in aria_cbc_encrypt()
72 if ((cipher = EVP_CIPHER_fetch(libctx, "ARIA-256-CBC", propq)) == NULL) in aria_cbc_encrypt()
91 /* Output encrypted block */ in aria_cbc_encrypt()
126 /* Fetch the cipher implementation */ in aria_cbc_decrypt()
127 if ((cipher = EVP_CIPHER_fetch(libctx, "ARIA-256-CBC", propq)) == NULL) in aria_cbc_decrypt()
146 /* Output decrypted block */ in aria_cbc_decrypt()
H A Daeskeywrap.c2 * Copyright 2022-2024 The OpenSSL Project Authors. All Rights Reserved.
74 /* Fetch the cipher implementation */ in aes_wrap_encrypt()
75 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-256-WRAP", propq)) == NULL) in aes_wrap_encrypt()
94 /* Output encrypted block */ in aes_wrap_encrypt()
131 /* Fetch the cipher implementation */ in aes_wrap_decrypt()
132 if ((cipher = EVP_CIPHER_fetch(libctx, "aes-256-wrap", propq)) == NULL) in aes_wrap_decrypt()
151 /* Output decrypted block */ in aes_wrap_decrypt()
H A Daesgcm.c2 * Copyright 2012-2024 The OpenSSL Project Authors. All Rights Reserved.
21 /* AES-GCM test data obtained from NIST public test vectors */
91 /* Fetch the cipher implementation */ in aes_gcm_encrypt()
92 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-256-GCM", propq)) == NULL) in aes_gcm_encrypt()
117 /* Output encrypted block */ in aes_gcm_encrypt()
166 /* Fetch the cipher implementation */ in aes_gcm_decrypt()
167 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-256-GCM", propq)) == NULL) in aes_gcm_decrypt()
189 /* Output decrypted block */ in aes_gcm_decrypt()
H A Daesccm.c2 * Copyright 2013-2024 The OpenSSL Project Authors. All Rights Reserved.
21 /* AES-CCM test data obtained from NIST public test vectors */
93 /* Fetch the cipher implementation */ in aes_ccm_encrypt()
94 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-192-CCM", propq)) == NULL) in aes_ccm_encrypt()
97 /* Default nonce length for AES-CCM is 7 bytes (56 bits). */ in aes_ccm_encrypt()
127 /* Output encrypted block */ in aes_ccm_encrypt()
177 /* Fetch the cipher implementation */ in aes_ccm_decrypt()
178 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-192-CCM", propq)) == NULL) in aes_ccm_decrypt()
210 /* Output decrypted block: if tag verify failed we get nothing */ in aes_ccm_decrypt()
/freebsd/crypto/openssl/doc/man7/
H A DEVP_MAC-CMAC.pod5 EVP_MAC-CMAC - The CMAC EVP_MAC implementation
46 Sets the properties to be queried when trying to fetch the underlying cipher.
50 =item "encrypt-check" (B<OSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK>) <integer>
55 The default value of 1 causes an error when a unapproved Triple-DES encryption
58 "fips-indicator" to 0.
59 This option breaks FIPS compliance if it causes the approved "fips-indicator"
75 =item "block-size" (B<OSSL_MAC_PARAM_BLOCK_SIZE>) <unsigned integer>
77 Gets the MAC block size. The "block-size" parameter can also be retrieved with
80 =item "fips-indicator" (B<OSSL_CIPHER_PARAM_FIPS_APPROVED_INDICATOR>) <integer>
86 It may return 0 if the "encrypt-check" option is set to 0.
[all …]
H A DEVP_MAC-HMAC.pod5 EVP_MAC-HMAC - The HMAC EVP_MAC implementation
45 Sets the properties to be queried when trying to fetch the underlying digest.
49 =item "digest-noinit" (B<OSSL_MAC_PARAM_DIGEST_NOINIT>) <integer>
57 =item "digest-oneshot" (B<OSSL_MAC_PARAM_DIGEST_ONESHOT>) <integer>
59 A flag to set the MAC digest to be a one-shot operation.
64 =item "tls-data-size" (B<OSSL_MAC_PARAM_TLS_DATA_SIZE>) <unsigned integer>
66 =item "key-check" (B<OSSL_MAC_PARAM_FIPS_KEY_CHECK>) <integer>
68 See L<provider-mac(7)/Mac Parameters>.
83 =item "block-size" (B<OSSL_MAC_PARAM_BLOCK_SIZE>) <unsigned integer>
85 Gets the MAC block size. The "block-size" parameter can also be retrieved with
[all …]
/freebsd/sys/dev/bhnd/tools/
H A Dnvram_map_gen.awk1 #!/usr/bin/awk -f
3 #-
4 # Copyright (c) 2015-2016 Landon Fuller <landon@landonf.org>
39 print "usage: bhnd_nvram_map.awk <input map> [-hd] [-o output file]"
74 if (ARGV[_i] == "--debug") {
76 } else if (ARGV[_i] == "-d" && OUT_T == null) {
78 } else if (ARGV[_i] == "-h" && OUT_T == null) {
80 } else if (ARGV[_i] == "-v") {
82 } else if (ARGV[_i] == "-o") {
88 } else if (ARGV[_i] == "--") {
[all …]
/freebsd/sys/dev/bhnd/bcma/
H A Dbcma_subr.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2015-2016 Landon Fuller <landon@landonf.org>
74 cfg->core_info = (struct bhnd_core_info) { in bcma_alloc_corecfg()
82 STAILQ_INIT(&cfg->master_ports); in bcma_alloc_corecfg()
83 cfg->num_master_ports = 0; in bcma_alloc_corecfg()
85 STAILQ_INIT(&cfg->dev_ports); in bcma_alloc_corecfg()
86 cfg->num_dev_ports = 0; in bcma_alloc_corecfg()
88 STAILQ_INIT(&cfg->bridge_ports); in bcma_alloc_corecfg()
89 cfg->num_bridge_ports = 0; in bcma_alloc_corecfg()
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A DEVP_MAC-HMAC.71 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "EVP_MAC-HMAC 7ossl"
58 .TH EVP_MAC-HMAC 7ossl 2025-09-30 3.5.4 OpenSSL
64 EVP_MAC\-HMAC \- The HMAC EVP_MAC implementation
92 Sets the properties to be queried when trying to fetch the underlying digest.
95 .IP """digest-noinit"" (\fBOSSL_MAC_PARAM_DIGEST_NOINIT\fR) <integer>" 4
96 .IX Item """digest-noinit"" (OSSL_MAC_PARAM_DIGEST_NOINIT) <integer>"
102 .IP """digest-oneshot"" (\fBOSSL_MAC_PARAM_DIGEST_ONESHOT\fR) <integer>" 4
103 .IX Item """digest-oneshot"" (OSSL_MAC_PARAM_DIGEST_ONESHOT) <integer>"
104 A flag to set the MAC digest to be a one-shot operation.
[all …]
H A DEVP_MAC-CMAC.71 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "EVP_MAC-CMAC 7ossl"
58 .TH EVP_MAC-CMAC 7ossl 2025-09-30 3.5.4 OpenSSL
64 EVP_MAC\-CMAC \- The CMAC EVP_MAC implementation
93 Sets the properties to be queried when trying to fetch the underlying cipher.
96 .IP """encrypt-check"" (\fBOSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK\fR) <integer>" 4
97 .IX Item """encrypt-check"" (OSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK) <integer>"
101 The default value of 1 causes an error when a unapproved Triple-DES encryption
104 "fips-indicator" to 0.
105 This option breaks FIPS compliance if it causes the approved "fips-indicator"
[all …]
/freebsd/sys/dev/bhnd/
H A Dbhnd.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2015-2016 Landon Fuller <landonf@FreeBSD.org>
40 * The Broadcom HND family of devices consists of both SoCs and host-connected
46 * PCIe. As a result, the majority of hardware support code should be re-usable
50 * Earlier HND models used the siba(4) on-chip interconnect, while later models
113 sc->dev = dev; in bhnd_generic_attach()
134 /* Fetch children in detach order */ in bhnd_delete_children()
135 error = bhnd_bus_get_children(sc->dev, &devs, &ndevs, in bhnd_delete_children()
145 if ((error = device_delete_child(sc->dev, child))) in bhnd_delete_children()
[all …]
/freebsd/contrib/unbound/iterator/
H A Diterator.h2 * iterator/iterator.h - iterative resolver DNS query response module
77 /* max number of time-outs for minimised query. Prevents resolving failures
85 #define MINIMISE_MULTIPLE_LABS (MAX_MINIMISE_COUNT - MINIMISE_ONE_LAB)
86 /** at what query-sent-count to stop target fetch policy */
115 /** NAT64 prefix address, cf. dns64_env->prefix_addr */
151 * The target fetch policy for each dependency level. This is
153 * negative numbers (usually just -1) mean fetch
[all...]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/stat/
H A Dstatx_dioalign.ksh1 #!/bin/ksh -p
2 # SPDX-License-Identifier: CDDL-1.0
11 # or https://opensource.org/licenses/CDDL-1.0.
41 if [[ $(linux_version) -lt $(linux_version "6.1") ]] ; then
57 rm -f ${TESTFILE}
69 typeset -i memalign=$2
70 typeset -i ioalign=$3
72 typeset -a v=($(statx dioalign $file | cut -f2- -d' '))
74 log_must [ ${v[0]} -eq $memalign -a ${v[1]} -eq $ioalign ]
87 typeset -i PAGE_SIZE=$(getconf PAGE_SIZE)
[all …]
/freebsd/contrib/llvm-project/lldb/source/Plugins/SymbolFile/Breakpad/
H A DSymbolFileBreakpad.cpp1 //===-- SymbolFileBreakpad.cpp --------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
49 m_next_section_idx(m_obj->GetSectionList()->GetNumSections(0)), in LineIterator()
96 *obj.GetSectionList()->GetSectionAtIndex(m_next_section_idx - 1); in LineIterator()
109 const SectionList &list = *m_obj->GetSectionList(); in operator ++()
123 m_obj->ReadSectionData(&sect, data); in operator ++()
146 return m_map.try_emplace(file, m_map.size() + 1).first->second; in operator []()
190 return m_cu_data->GetSize(); in CalculateNumCompileUnits()
194 if (index >= m_cu_data->GetSize()) in ParseCompileUnitAtIndex()
[all …]

12345678910>>...17