| /freebsd/usr.sbin/makefs/ffs/ |
| H A D | ffs_balloc.c | 4 /*- 5 * SPDX-License-Identifier: BSD-3-Clause 60 * the inode and the logical block number in a file. 68 if (ip->i_fs->fs_magic == FS_UFS2_MAGIC) in ffs_balloc() 82 struct fs *fs = ip->i_fs; in ffs_balloc_ufs1() 97 assert(size <= fs->fs_bsize); in ffs_balloc_ufs1() 102 * If the next write will extend the file into a new block, in ffs_balloc_ufs1() 104 * this fragment has to be extended to be a full block. in ffs_balloc_ufs1() 107 lastlbn = lblkno(fs, ip->i_ffs1_size); in ffs_balloc_ufs1() 111 if (osize < fs->fs_bsize && osize > 0) { in ffs_balloc_ufs1() [all …]
|
| /freebsd/share/misc/ |
| H A D | scsi_modes | 35 # 'i' is a byte-sized integral types, followed by a field width of 38 # 'b' is a bit-sized integral type 39 # 't' is a bitfield type- followed by a bit field width 42 # 'z' values are null-padded strings 77 {SBLP (Supported Block Lengths and Protection)} t1 81 {Extended Self-Test Completion Time} i2 95 0x02 "Disconnect-Reconnect" { 111 0x16 "Extended Device-Type Specific"; 154 0x18 "Protocol-Specific Logical Unit"; 156 0x19 "Protocol-Specific Port"; [all …]
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | store.c | 2 * Copyright (c) 1997-2008 Kungliga Tekniska Högskolan 35 #include "store-int.h" 37 #define BYTEORDER_IS(SP, V) (((SP)->flags & KRB5_STORAGE_BYTEORDER_MASK) == (V)) 44 * Add the flags on a storage buffer by or-ing in the flags to the buffer. 55 sp->flags |= flags; in krb5_storage_set_flags() 70 sp->flags &= ~flags; in krb5_storage_clear_flags() 88 return (sp->flags & flags) == flags; in krb5_storage_is_flags() 106 sp->flags &= ~KRB5_STORAGE_BYTEORDER_MASK; in krb5_storage_set_byteorder() 107 sp->flags |= byteorder; in krb5_storage_set_byteorder() 119 return sp->flags & KRB5_STORAGE_BYTEORDER_MASK; in krb5_storage_get_byteorder() [all …]
|
| H A D | store_mem.c | 2 * Copyright (c) 1997 - 2000, 2002 Kungliga Tekniska Högskolan 35 #include "store-int.h" 46 mem_storage *s = (mem_storage*)sp->data; in mem_fetch() 47 if(size > (size_t)(s->base + s->size - s->ptr)) in mem_fetch() 48 size = s->base + s->size - s->ptr; in mem_fetch() 49 memmove(data, s->ptr, size); in mem_fetch() 50 sp->seek(sp, size, SEEK_CUR); in mem_fetch() 57 mem_storage *s = (mem_storage*)sp->data; in mem_store() 58 if(size > (size_t)(s->base + s->size - s->ptr)) in mem_store() 59 size = s->base + s->size - s->ptr; in mem_store() [all …]
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | README-HS20 | 4 This document describe how the IEEE 802.11u Interworking and Wi-Fi 7 GUI or Wi-Fi framework) is used to manage this functionality. 10 Introduction to Wi-Fi Hotspot 2.0 11 --------------------------------- 13 Hotspot 2.0 is the name of the Wi-Fi Alliance specification that is used 14 in the Wi-Fi CERTIFIED Passpoint<TM> program. More information about 17 http://www.wi-fi.org/knowledge-center/white-papers/wi-fi-certified-passpoint%E2%84%A2-new-program-w… 20 https://www.wi-fi.org/knowledge-center/published-specifications 23 standardized in IEEE Std 802.11u-2011 which is now part of the IEEE Std 24 802.11-2012. [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_DigestVerifyInit.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH EVP_DIGESTVERIFYINIT 3ossl 2025-09-30 3.5.4 OpenSSL 65 EVP_DigestVerifyFinal, EVP_DigestVerify \- EVP signature verification functions 85 The EVP signature routines are a high-level interface to digital signatures. 92 implement that digest directly itself or it may (optionally) choose to fetch it 95 for the properties to be used during the fetch. Finally, the passed parameters 98 The \fIpkey\fR algorithm is used to fetch a \fBEVP_SIGNATURE\fR method implicitly, to 99 be used for the actual signing. See "Implicit fetch" in \fBprovider\fR\|(7) for 102 The OpenSSL default and legacy providers support fetching digests and can fetch 104 supports fetching digests but will only fetch digests that are themselves [all …]
|
| H A D | EVP_DigestSignInit.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH EVP_DIGESTSIGNINIT 3ossl 2025-09-30 3.5.4 OpenSSL 65 EVP_DigestSignFinal, EVP_DigestSign \- EVP signing functions 86 The EVP signature routines are a high-level interface to digital signatures. 93 implement that digest directly itself or it may (optionally) choose to fetch it 96 the properties to be used during the fetch. Finally, the passed parameters 99 The \fIpkey\fR algorithm is used to fetch a \fBEVP_SIGNATURE\fR method implicitly, to 100 be used for the actual signing. See "Implicit fetch" in \fBprovider\fR\|(7) for 103 The OpenSSL default and legacy providers support fetching digests and can fetch 105 supports fetching digests but will only fetch digests that are themselves [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_DigestVerifyInit.pod | 6 EVP_DigestVerifyFinal, EVP_DigestVerify - EVP signature verification functions 26 The EVP signature routines are a high-level interface to digital signatures. 33 implement that digest directly itself or it may (optionally) choose to fetch it 36 for the properties to be used during the fetch. Finally, the passed parameters 39 The I<pkey> algorithm is used to fetch a B<EVP_SIGNATURE> method implicitly, to 40 be used for the actual signing. See L<provider(7)/Implicit fetch> for 43 The OpenSSL default and legacy providers support fetching digests and can fetch 45 supports fetching digests but will only fetch digests that are themselves 87 SHA3-224, SHA3-256, SHA3-384, SHA3-512 103 If RSA-PSS is used and restrictions apply then the digest must match. [all …]
|
| H A D | EVP_DigestSignInit.pod | 6 EVP_DigestSignFinal, EVP_DigestSign - EVP signing functions 27 The EVP signature routines are a high-level interface to digital signatures. 34 implement that digest directly itself or it may (optionally) choose to fetch it 37 the properties to be used during the fetch. Finally, the passed parameters 40 The I<pkey> algorithm is used to fetch a B<EVP_SIGNATURE> method implicitly, to 41 be used for the actual signing. See L<provider(7)/Implicit fetch> for 44 The OpenSSL default and legacy providers support fetching digests and can fetch 46 supports fetching digests but will only fetch digests that are themselves 70 "signing". Built-in EVP_PKEY types supported by these functions are CMAC, 96 SHA3-224, SHA3-256, SHA3-384, SHA3-512 [all …]
|
| /freebsd/usr.sbin/bsdinstall/distfetch/ |
| H A D | distfetch.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 37 #include <fetch.h> 128 uint8_t block[4096]; in fetch_files() local 162 errconf.title = "Fetch Error"; in fetch_files() 197 while ((chunk = fread(block, 1, sizeof(block), fetch_out)) in fetch_files() 199 if (fwrite(block, 1, chunk, file_out) < chunk) in fetch_files()
|
| /freebsd/sys/fs/ext2fs/ |
| H A D | ext2_balloc.c | 1 /*- 7 /*- 8 * SPDX-License-Identifier: BSD-3-Clause 65 fs = ip->i_e2fs; in ext2_ext_balloc() 66 blks = howmany(size, fs->e2fs_bsize); in ext2_ext_balloc() 73 bp = getblk(vp, lbn, fs->e2fs_bsize, 0, 0, 0); in ext2_ext_balloc() 77 error = bread(vp, lbn, fs->e2fs_bsize, NOCRED, &bp); in ext2_ext_balloc() 83 bp->b_blkno = fsbtodb(fs, newblk); in ext2_ext_balloc() 95 * the inode and the logical block number in a file. 113 fs = ip->i_e2fs; in ext2_balloc() [all …]
|
| /freebsd/crypto/openssl/demos/cipher/ |
| H A D | ariacbc.c | 2 * Copyright 2012-2024 The OpenSSL Project Authors. All Rights Reserved. 71 /* Fetch the cipher implementation */ in aria_cbc_encrypt() 72 if ((cipher = EVP_CIPHER_fetch(libctx, "ARIA-256-CBC", propq)) == NULL) in aria_cbc_encrypt() 91 /* Output encrypted block */ in aria_cbc_encrypt() 126 /* Fetch the cipher implementation */ in aria_cbc_decrypt() 127 if ((cipher = EVP_CIPHER_fetch(libctx, "ARIA-256-CBC", propq)) == NULL) in aria_cbc_decrypt() 146 /* Output decrypted block */ in aria_cbc_decrypt()
|
| H A D | aeskeywrap.c | 2 * Copyright 2022-2024 The OpenSSL Project Authors. All Rights Reserved. 74 /* Fetch the cipher implementation */ in aes_wrap_encrypt() 75 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-256-WRAP", propq)) == NULL) in aes_wrap_encrypt() 94 /* Output encrypted block */ in aes_wrap_encrypt() 131 /* Fetch the cipher implementation */ in aes_wrap_decrypt() 132 if ((cipher = EVP_CIPHER_fetch(libctx, "aes-256-wrap", propq)) == NULL) in aes_wrap_decrypt() 151 /* Output decrypted block */ in aes_wrap_decrypt()
|
| H A D | aesgcm.c | 2 * Copyright 2012-2024 The OpenSSL Project Authors. All Rights Reserved. 21 /* AES-GCM test data obtained from NIST public test vectors */ 91 /* Fetch the cipher implementation */ in aes_gcm_encrypt() 92 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-256-GCM", propq)) == NULL) in aes_gcm_encrypt() 117 /* Output encrypted block */ in aes_gcm_encrypt() 166 /* Fetch the cipher implementation */ in aes_gcm_decrypt() 167 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-256-GCM", propq)) == NULL) in aes_gcm_decrypt() 189 /* Output decrypted block */ in aes_gcm_decrypt()
|
| H A D | aesccm.c | 2 * Copyright 2013-2024 The OpenSSL Project Authors. All Rights Reserved. 21 /* AES-CCM test data obtained from NIST public test vectors */ 93 /* Fetch the cipher implementation */ in aes_ccm_encrypt() 94 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-192-CCM", propq)) == NULL) in aes_ccm_encrypt() 97 /* Default nonce length for AES-CCM is 7 bytes (56 bits). */ in aes_ccm_encrypt() 127 /* Output encrypted block */ in aes_ccm_encrypt() 177 /* Fetch the cipher implementation */ in aes_ccm_decrypt() 178 if ((cipher = EVP_CIPHER_fetch(libctx, "AES-192-CCM", propq)) == NULL) in aes_ccm_decrypt() 210 /* Output decrypted block: if tag verify failed we get nothing */ in aes_ccm_decrypt()
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_MAC-CMAC.pod | 5 EVP_MAC-CMAC - The CMAC EVP_MAC implementation 46 Sets the properties to be queried when trying to fetch the underlying cipher. 50 =item "encrypt-check" (B<OSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK>) <integer> 55 The default value of 1 causes an error when a unapproved Triple-DES encryption 58 "fips-indicator" to 0. 59 This option breaks FIPS compliance if it causes the approved "fips-indicator" 75 =item "block-size" (B<OSSL_MAC_PARAM_BLOCK_SIZE>) <unsigned integer> 77 Gets the MAC block size. The "block-size" parameter can also be retrieved with 80 =item "fips-indicator" (B<OSSL_CIPHER_PARAM_FIPS_APPROVED_INDICATOR>) <integer> 86 It may return 0 if the "encrypt-check" option is set to 0. [all …]
|
| H A D | EVP_MAC-HMAC.pod | 5 EVP_MAC-HMAC - The HMAC EVP_MAC implementation 45 Sets the properties to be queried when trying to fetch the underlying digest. 49 =item "digest-noinit" (B<OSSL_MAC_PARAM_DIGEST_NOINIT>) <integer> 57 =item "digest-oneshot" (B<OSSL_MAC_PARAM_DIGEST_ONESHOT>) <integer> 59 A flag to set the MAC digest to be a one-shot operation. 64 =item "tls-data-size" (B<OSSL_MAC_PARAM_TLS_DATA_SIZE>) <unsigned integer> 66 =item "key-check" (B<OSSL_MAC_PARAM_FIPS_KEY_CHECK>) <integer> 68 See L<provider-mac(7)/Mac Parameters>. 83 =item "block-size" (B<OSSL_MAC_PARAM_BLOCK_SIZE>) <unsigned integer> 85 Gets the MAC block size. The "block-size" parameter can also be retrieved with [all …]
|
| /freebsd/sys/dev/bhnd/tools/ |
| H A D | nvram_map_gen.awk | 1 #!/usr/bin/awk -f 3 #- 4 # Copyright (c) 2015-2016 Landon Fuller <landon@landonf.org> 39 print "usage: bhnd_nvram_map.awk <input map> [-hd] [-o output file]" 74 if (ARGV[_i] == "--debug") { 76 } else if (ARGV[_i] == "-d" && OUT_T == null) { 78 } else if (ARGV[_i] == "-h" && OUT_T == null) { 80 } else if (ARGV[_i] == "-v") { 82 } else if (ARGV[_i] == "-o") { 88 } else if (ARGV[_i] == "--") { [all …]
|
| /freebsd/sys/dev/bhnd/bcma/ |
| H A D | bcma_subr.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2015-2016 Landon Fuller <landon@landonf.org> 74 cfg->core_info = (struct bhnd_core_info) { in bcma_alloc_corecfg() 82 STAILQ_INIT(&cfg->master_ports); in bcma_alloc_corecfg() 83 cfg->num_master_ports = 0; in bcma_alloc_corecfg() 85 STAILQ_INIT(&cfg->dev_ports); in bcma_alloc_corecfg() 86 cfg->num_dev_ports = 0; in bcma_alloc_corecfg() 88 STAILQ_INIT(&cfg->bridge_ports); in bcma_alloc_corecfg() 89 cfg->num_bridge_ports = 0; in bcma_alloc_corecfg() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | EVP_MAC-HMAC.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_MAC-HMAC 7ossl" 58 .TH EVP_MAC-HMAC 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_MAC\-HMAC \- The HMAC EVP_MAC implementation 92 Sets the properties to be queried when trying to fetch the underlying digest. 95 .IP """digest-noinit"" (\fBOSSL_MAC_PARAM_DIGEST_NOINIT\fR) <integer>" 4 96 .IX Item """digest-noinit"" (OSSL_MAC_PARAM_DIGEST_NOINIT) <integer>" 102 .IP """digest-oneshot"" (\fBOSSL_MAC_PARAM_DIGEST_ONESHOT\fR) <integer>" 4 103 .IX Item """digest-oneshot"" (OSSL_MAC_PARAM_DIGEST_ONESHOT) <integer>" 104 A flag to set the MAC digest to be a one-shot operation. [all …]
|
| H A D | EVP_MAC-CMAC.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_MAC-CMAC 7ossl" 58 .TH EVP_MAC-CMAC 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_MAC\-CMAC \- The CMAC EVP_MAC implementation 93 Sets the properties to be queried when trying to fetch the underlying cipher. 96 .IP """encrypt-check"" (\fBOSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK\fR) <integer>" 4 97 .IX Item """encrypt-check"" (OSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK) <integer>" 101 The default value of 1 causes an error when a unapproved Triple-DES encryption 104 "fips-indicator" to 0. 105 This option breaks FIPS compliance if it causes the approved "fips-indicator" [all …]
|
| /freebsd/sys/dev/bhnd/ |
| H A D | bhnd.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2015-2016 Landon Fuller <landonf@FreeBSD.org> 40 * The Broadcom HND family of devices consists of both SoCs and host-connected 46 * PCIe. As a result, the majority of hardware support code should be re-usable 50 * Earlier HND models used the siba(4) on-chip interconnect, while later models 113 sc->dev = dev; in bhnd_generic_attach() 134 /* Fetch children in detach order */ in bhnd_delete_children() 135 error = bhnd_bus_get_children(sc->dev, &devs, &ndevs, in bhnd_delete_children() 145 if ((error = device_delete_child(sc->dev, child))) in bhnd_delete_children() [all …]
|
| /freebsd/contrib/unbound/iterator/ |
| H A D | iterator.h | 2 * iterator/iterator.h - iterative resolver DNS query response module 77 /* max number of time-outs for minimised query. Prevents resolving failures 85 #define MINIMISE_MULTIPLE_LABS (MAX_MINIMISE_COUNT - MINIMISE_ONE_LAB) 86 /** at what query-sent-count to stop target fetch policy */ 115 /** NAT64 prefix address, cf. dns64_env->prefix_addr */ 151 * The target fetch policy for each dependency level. This is 153 * negative numbers (usually just -1) mean fetch [all...] |
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/stat/ |
| H A D | statx_dioalign.ksh | 1 #!/bin/ksh -p 2 # SPDX-License-Identifier: CDDL-1.0 11 # or https://opensource.org/licenses/CDDL-1.0. 41 if [[ $(linux_version) -lt $(linux_version "6.1") ]] ; then 57 rm -f ${TESTFILE} 69 typeset -i memalign=$2 70 typeset -i ioalign=$3 72 typeset -a v=($(statx dioalign $file | cut -f2- -d' ')) 74 log_must [ ${v[0]} -eq $memalign -a ${v[1]} -eq $ioalign ] 87 typeset -i PAGE_SIZE=$(getconf PAGE_SIZE) [all …]
|
| /freebsd/contrib/llvm-project/lldb/source/Plugins/SymbolFile/Breakpad/ |
| H A D | SymbolFileBreakpad.cpp | 1 //===-- SymbolFileBreakpad.cpp --------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 49 m_next_section_idx(m_obj->GetSectionList()->GetNumSections(0)), in LineIterator() 96 *obj.GetSectionList()->GetSectionAtIndex(m_next_section_idx - 1); in LineIterator() 109 const SectionList &list = *m_obj->GetSectionList(); in operator ++() 123 m_obj->ReadSectionData(§, data); in operator ++() 146 return m_map.try_emplace(file, m_map.size() + 1).first->second; in operator []() 190 return m_cu_data->GetSize(); in CalculateNumCompileUnits() 194 if (index >= m_cu_data->GetSize()) in ParseCompileUnitAtIndex() [all …]
|