| /freebsd/sys/contrib/device-tree/Bindings/input/ |
| H A D | adi,adp5588.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Nuno Sá <nuno.sa@analog.com> 14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf 17 - $ref: matrix-keymap.yaml# 18 - $ref: input.yaml# 23 - adi,adp5587 24 - adi,adp5588 29 vcc-supply: [all …]
|
| /freebsd/contrib/unbound/util/storage/ |
| H A D | lruhash.h | 2 * util/storage/lruhash.h - hashtable, hash function, LRU keeping. 55 * o find entry (if failed, unlock hash, unl bin, exit). 57 * o unlock hashtable. 59 * o unlock hash bin. 61 * o unlock entry. 66 * be deleted, it would cause race conditions. So instead, unlock and 70 * o unlock the entry if you hold the lock already. 74 * o find entry (if failed, unlock hash, unl bin, exit). 76 * o unlock hashtable. 78 * o unlock has [all...] |
| /freebsd/sys/contrib/device-tree/Bindings/mfd/ |
| H A D | adi,adp5585.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Laurent Pinchart <laurent.pinchart@ideasonboard.com> 19 - items: 20 - enum: 21 - adi,adp5585-00 # Default 22 - adi,adp5585-01 # 11 GPIOs 23 - adi,adp5585-02 # No pull-up resistors by default on special pins 24 - adi,adp5585-03 # Alternate I2C address [all …]
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kadmin.man | 4 .nr rst2man-indent-level 0 7 \\$1 \\n[an-margin] 8 level \\n[rst2man-indent-level] 9 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] 10 - 11 \\n[rst2man-indent0] 12 \\n[rst2man-indent1] 13 \\n[rst2man-indent2] 18 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] 19 . nr rst2man-indent-level +1 [all …]
|
| /freebsd/contrib/ncurses/man/ |
| H A D | user_caps.5 | 3 .\" Copyright 2018-2023,2024 Thomas E. Dickey * 32 .TH user_caps 5 2024-03-16 "ncurses @NCURSES_MAJOR@.@NCURSES_MINOR@" "File formats" 49 user_caps \- 50 user-defined \fIterminfo\fR capability format 52 .B @INFOCMP@ \-x 54 .B @TIC@ \-x 76 and reverse-engineering the compiled terminfo files to match the binary format. 79 copy the SVr2 binary format, which uses 16-bit signed integers, 80 and is limited to 4096-byte entries. 97 databases for AIX, HP-UX or OSF/1, [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | authfd.h | 25 struct sshkey **keys; member 34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ 35 struct sshkey **keys; member 95 /* lock/unlock the agent */ 115 /* additional error code for ssh.com's ssh-agent2 */
|
| H A D | ssh-add.1 | 1 .\" $OpenBSD: ssh-add.1,v 1.87 2024/06/17 08:30:29 djm Exp $ 42 .Nm ssh-add 45 .Nm ssh-add 53 .Nm ssh-add 57 .Nm ssh-add 59 .Nm ssh-add 65 .Xr ssh-agent 1 . 77 .Pa -cert.pub 95 .Bl -tag -width Ds 97 When loading keys into or deleting keys from the agent, process [all …]
|
| H A D | authfd.c | 63 #define MAX_AGENT_IDENTITIES 2048 /* Max keys in agent reply */ 99 if ((sock = socket(AF_UNIX, SOCK_STREAM, 0)) == -1) in ssh_get_authentication_socket_path() 103 if (fcntl(sock, F_SETFD, FD_CLOEXEC) == -1 || in ssh_get_authentication_socket_path() 104 connect(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) == -1) { in ssh_get_authentication_socket_path() 127 *fdp = -1; in ssh_get_authentication_socket() 175 len -= l; in ssh_request_reply() 213 /* Lock/unlock agent */ 305 /* Deserialise the response into a list of keys/comments */ in ssh_fetch_identitylist() 307 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL || in ssh_fetch_identitylist() 308 (idl->comments = calloc(num, sizeof(*idl->comments))) == NULL) { in ssh_fetch_identitylist() [all …]
|
| /freebsd/crypto/heimdal/doc/doxyout/hdb/man/man3/ |
| H A D | HDB.3 | 1 .TH "HDB" 3 "11 Jan 2012" "Version 1.5.2" "Heimdalhdblibrary" \" -*- nroff -*- 5 HDB \- 102 …rther transactions, wont release any permanant resources. the database can be ->hdb_open-ed again. 130 Unlock database 163 Will update keys for the entry when given password. The new keys must be written into the entry and… 172 In case the entry is locked out, the backend should set the hdb_entry.flags.locked-out flag.
|
| /freebsd/crypto/krb5/src/kadmin/cli/ |
| H A D | kadmin_ct.ct | 81 unlock; 83 request kadmin_purgekeys, "Purge previously retained old keys from a principal", 95 # list_requests is generic -- unrelated to Kerberos
|
| H A D | kadmin.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 34 #include "k5-int.h" 103 error(_("Usage: %s [-r realm] [-p principal] [-q query] " in usage() 106 "\tclnt args: [-s admin_server[:port]] " in usage() 107 "[[-c ccache]|[-k [-t keytab]]]|[-n] [-O | -N]\n" in usage() 108 "\tlocal args: [-x db_args]* [-d dbname] " in usage() 109 "[-e \"enc:salt ...\"] [-m] [-w password] " in usage() 110 "where,\n\t[-x db_args]* - any number of database specific " in usage() 124 duration *= -1; in strdur() 135 snprintf(out, sizeof(out), "%s%d %s %02d:%02d:%02d", neg ? "-" : "", in strdur() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/error_tables/ |
| H A D | kdb5_err.et | 42 ec KRB5_KDB_DB_INUSE, "Database is locked or in use--try again later" 48 ec KRB5_KDB_NOTLOCKED, "Attempt to unlock database when not locked" 53 ec KRB5_KDB_ILLDIRECTION, "Bad direction for converting keys"
|
| /freebsd/lib/libsys/ |
| H A D | _umtx_op.2 | 49 .St -p1003.1-2001 57 All objects require ABI-mandated alignment, but this is not currently 61 .Bl -tag -width indent 63 Allow selection of the process-shared sleep queue for the thread sleep 66 The process-shared or process-private sleep queue is selected based on 70 Otherwise, if the flag is not specified, the process-private sleep queue 77 .Bl -hang -offset indent 79 .Bd -literal 95 .Bl -tag -width indent 104 The robust mutex is in a non-recoverable state. [all …]
|
| /freebsd/crypto/krb5/src/lib/kadm5/srv/ |
| H A D | svr_principal.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 7 #include "k5-int.h" 41 idx = (from->key_data_ver == 1 ? 1 : 2); in krb5_copy_key_data_contents() 44 if ( from->key_data_length[i] ) { in krb5_copy_key_data_contents() 45 to->key_data_contents[i] = malloc(from->key_data_length[i]); in krb5_copy_key_data_contents() 46 if (to->key_data_contents[i] == NULL) { in krb5_copy_key_data_contents() 48 zapfree(to->key_data_contents[i], to->key_data_length[i]); in krb5_copy_key_data_contents() 51 memcpy(to->key_data_contents[i], from->key_data_contents[i], in krb5_copy_key_data_contents() 52 from->key_data_length[i]); in krb5_copy_key_data_contents() 65 n->tl_data_contents = malloc(tl->tl_data_length); in dup_tl_data() [all …]
|
| /freebsd/crypto/heimdal/lib/hdb/ |
| H A D | hdb.h | 2 * Copyright (c) 1997 - 2007 Kungliga Tekniska Högskolan 51 #define HDB_F_DECRYPT 1 /* decrypt keys */ 62 #define HDB_F_ALL_KVNOS 2048 /* we want all the keys, live or not */ 84 * ->hdb_fetch_kvno(), so that we the kadmin/kpasswd backend gets around to 85 * ->hdb_store(), the backend doesn't need to lookup the entry again. 126 * permanant resources. the database can be ->hdb_open-ed again. 172 * Unlock database 224 * Will update keys for the entry when given password. The new 225 * keys must be written into the entry and will then later be 226 * ->hdb_store() into the database. The backend will still perform [all …]
|
| H A D | hdb-mitdb.c | 2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan 84 read-of-data: key-encrypted, key-usage 0, master-key 87 version2 = salt in key_data->key_data_contents[1] 97 flags->postdate = !(attr & KRB5_KDB_DISALLOW_POSTDATED); in attr_to_flags() 98 flags->forwardable = !(attr & KRB5_KDB_DISALLOW_FORWARDABLE); in attr_to_flags() 99 flags->initial = !!(attr & KRB5_KDB_DISALLOW_TGT_BASED); in attr_to_flags() 100 flags->renewable = !(attr & KRB5_KDB_DISALLOW_RENEWABLE); in attr_to_flags() 101 flags->proxiable = !(attr & KRB5_KDB_DISALLOW_PROXIABLE); in attr_to_flags() 103 flags->invalid = !!(attr & KRB5_KDB_DISALLOW_ALL_TIX); in attr_to_flags() 104 flags->require_preauth = !!(attr & KRB5_KDB_REQUIRES_PRE_AUTH); in attr_to_flags() [all …]
|
| /freebsd/contrib/unbound/validator/ |
| H A D | val_kcache.c | 2 * validator/val_kcache.c - validator key shared cache with validated keys 59 numtables = cfg->key_cache_slabs; in key_cache_create() 61 maxmem = cfg->key_cache_size; in key_cache_create() 62 kcache->slab = slabhash_create(numtables, start_size, maxmem, in key_cache_create() 65 if(!kcache->slab) { in key_cache_create() 78 slabhash_delete(kcache->slab); in key_cache_delete() 90 slabhash_insert(kcache->slab, k->entry.hash, &k->entry, in key_cache_insert() 91 k->entry.data, NULL); in key_cache_insert() 96 * Caller must unlock it after use. 116 e = slabhash_lookup(kcache->slab, lookfor.entry.hash, &lookfor, wr); in key_cache_search() [all …]
|
| /freebsd/sbin/camcontrol/ |
| H A D | camcontrol.8 | 145 .Bk -words 402 .Bl -tag -width 14n 419 function-specific arguments. 437 .Bl -tag -width 14n 477 .Bl -tag -width periphlist 500 .Bl -tag -width 4n 514 .Bl -tag -width 4n 534 .Bl -tag -width 14n 541 .Bl -tag -width 012345678 569 .Bl -tag -width 5n [all …]
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | hashtable.h | 2 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved. 109 (key)->key_header.keysize = (sizeof(*(key)) - sizeof(HT_KEY)); \ 110 (key)->key_header.keybuf = (((uint8_t *)key) + sizeof(HT_KEY)); \ 116 #define HT_KEY_RESET(key) memset((key)->key_header.keybuf, 0, (key)->key_header.keysize) 121 #define HT_SET_KEY_FIELD(key, member, value) (key)->keyfields.member = value; 129 strncpy((key)->keyfields.member, value, sizeof((key)->keyfields.member) - 1); \ 139 ossl_ht_strcase((key)->keyfields.member, value, sizeof((key)->keyfields.member) -1); \ 147 if (len < sizeof((key)->keyfields.member)) \ 148 strncpy((key)->keyfields.member, value, len); \ 150 strncpy((key)->keyfields.member, value, sizeof((key)->keyfields.member) - 1); \ [all …]
|
| /freebsd/sys/sys/ |
| H A D | umtxvar.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 39 * umtx implementation to map userland addresses to unique keys. 155 /* Per-key wait-queue */ 165 /* Userland lock object's wait-queue chain */ 196 return (k1->type == k2->type && in umtx_key_match() 197 k1->info.both.a == k2->info.both.a && in umtx_key_match() 198 k1->info.both.b == k2->info.both.b); in umtx_key_match() 251 mtx_lock(&_uc->uc_lock); \ 255 * Unlock a chain. [all …]
|
| /freebsd/contrib/sendmail/contrib/ |
| H A D | qtool.pl | 3 ## Copyright (c) 1998-2002 Proofpoint, Inc. and its suppliers. 6 ## $Id: qtool.pl,v 8.32 2013-11-22 20:51:18 ca Exp $ 37 ## to the $conditions object. See the handling of the '-s' option for an 44 ## The -e option: 45 ## The -e option takes any valid perl expression and evaluates it 51 ## ./qtool.pl -e '$msg{num_delivery_attempts} >= 2' /q1 /q2 77 my $lock_both = -1; 86 $result = $destination->add($source); 97 return $source->delete(); 104 return $source->bounce(); [all …]
|
| /freebsd/contrib/unbound/doc/ |
| H A D | README | 17 * libexpat (for the unbound-anchor helper program) (MIT license) 20 * --with-libevent=/path/to/libevent 22 --with-libevent=no gives a builtin alternative implementation. 26 * --with-libexpat=/path/to/libexpat 28 * --without-pthreads 31 altogether, or, on Solaris, also use --with(out)-solaris-threads. 32 * --enable-checking 36 * --enable-static-exe 39 * --enable-lock-checks 40 This enables a debug option to check lock and unlock calls. It needs [all …]
|
| /freebsd/lib/libnetmap/ |
| H A D | libnetmap.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 32 /* if thread-safety is not needed, define LIBNETMAP_NOTHREADSAFE before including 78 * -NN bind individual NIC ring pair 94 * option:key1=value1,key2=value2,... (multi-key option) 96 * For multi-key options, the keys can be assigned in any order, but they 98 * option keys: unmentioned keys will receive default values. Some multi-key 99 * options define a default key and also accept the single-key syntax, by 105 * The currently available options are (default keys, when defined, are marked 108 * share (single-key) [all …]
|
| /freebsd/crypto/krb5/src/include/ |
| H A D | kdb.h | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 59 * - We may make arbitrary incompatible changes between feature 61 * - We will make some effort to avoid making incompatible changes for 113 /* Map cross-realm principals */ 119 /* User-to-user */ 121 /* Cross-realm */ 143 * Note --- these structures cannot be modified without changing the 154 /* String attributes (currently stored inside tl-data) map C string keys to 187 * they set e_length appropriately (non-zero if the data should be marshalled 189 * caller-constructed principal entries. [all …]
|
| /freebsd/sys/contrib/dev/iwlwifi/mld/ |
| H A D | sta.c | 1 // SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause 3 * Copyright (C) 2024-2025 Intel Corporation 29 lockdep_assert_wiphy(mld->wiphy); in iwl_mld_fw_sta_id_from_link_sta() 33 return -ENOENT; in iwl_mld_fw_sta_id_from_link_sta() 38 return -ENOENT; in iwl_mld_fw_sta_id_from_link_sta() 41 return mld_link_sta->fw_id; in iwl_mld_fw_sta_id_from_link_sta() 56 * of Draft P802.11be D.30 Table 10-12a--Fields used for calculating in iwl_mld_fill_ampdu_size_and_dens() 57 * the maximum A-MPDU size of various PPDU types in different bands, in iwl_mld_fill_ampdu_size_and_dens() 61 if (link_sta->ht_cap.ht_supported) { in iwl_mld_fill_ampdu_size_and_dens() 62 agg_size = link_sta->ht_cap.ampdu_factor; in iwl_mld_fill_ampdu_size_and_dens() [all …]
|