Home
last modified time | relevance | path

Searched +full:unlock +full:- +full:keys (Results 1 – 25 of 111) sorted by relevance

12345

/freebsd/sys/contrib/device-tree/Bindings/input/
H A Dadi,adp5588.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Nuno Sá <nuno.sa@analog.com>
14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf
17 - $ref: matrix-keymap.yaml#
18 - $ref: input.yaml#
23 - adi,adp5587
24 - adi,adp5588
29 vcc-supply:
[all …]
/freebsd/contrib/unbound/util/storage/
H A Dlruhash.h2 * util/storage/lruhash.h - hashtable, hash function, LRU keeping.
55 * o find entry (if failed, unlock hash, unl bin, exit).
57 * o unlock hashtable.
59 * o unlock hash bin.
61 * o unlock entry.
66 * be deleted, it would cause race conditions. So instead, unlock and
70 * o unlock the entry if you hold the lock already.
74 * o find entry (if failed, unlock hash, unl bin, exit).
76 * o unlock hashtable.
78 * o unlock has
[all...]
/freebsd/crypto/krb5/src/man/
H A Dkadmin.man4 .nr rst2man-indent-level 0
7 \\$1 \\n[an-margin]
8 level \\n[rst2man-indent-level]
9 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
10 -
11 \\n[rst2man-indent0]
12 \\n[rst2man-indent1]
13 \\n[rst2man-indent2]
18 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
19 . nr rst2man-indent-level +1
[all …]
/freebsd/contrib/ncurses/man/
H A Duser_caps.53 .\" Copyright 2018-2023,2024 Thomas E. Dickey *
32 .TH user_caps 5 2024-03-16 "ncurses @NCURSES_MAJOR@.@NCURSES_MINOR@" "File formats"
49 user_caps \-
50 user-defined \fIterminfo\fR capability format
52 .B @INFOCMP@ \-x
54 .B @TIC@ \-x
76 and reverse-engineering the compiled terminfo files to match the binary format.
79 copy the SVr2 binary format, which uses 16-bit signed integers,
80 and is limited to 4096-byte entries.
97 databases for AIX, HP-UX or OSF/1,
[all …]
/freebsd/crypto/krb5/doc/html/_sources/admin/admin_commands/
H A Dkadmin_local.rst.txt7 --------
12 [**-O**\|\ **-N**]
13 [**-r** *realm*]
14 [**-p** *principal*]
15 [**-q** *query*]
16 [[**-c** *cache_name*]\|[**-k** [**-t** *keytab*]]\|\ **-n**]
17 [**-w** *password*]
18 [**-s** *admin_server*\ [:*port*]]
22 [**-r** *realm*]
23 [**-p** *principal*]
[all …]
/freebsd/crypto/krb5/doc/admin/admin_commands/
H A Dkadmin_local.rst7 --------
12 [**-O**\|\ **-N**]
13 [**-r** *realm*]
14 [**-p** *principal*]
15 [**-q** *query*]
16 [[**-c** *cache_name*]\|[**-k** [**-t** *keytab*]]\|\ **-n**]
17 [**-w** *password*]
18 [**-s** *admin_server*\ [:*port*]]
22 [**-r** *realm*]
23 [**-p** *principal*]
[all …]
/freebsd/crypto/openssh/
H A Dauthfd.h25 struct sshkey **keys; member
34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */
35 struct sshkey **keys; member
95 /* lock/unlock the agent */
115 /* additional error code for ssh.com's ssh-agent2 */
H A Dssh-add.11 .\" $OpenBSD: ssh-add.1,v 1.87 2024/06/17 08:30:29 djm Exp $
42 .Nm ssh-add
45 .Nm ssh-add
53 .Nm ssh-add
57 .Nm ssh-add
59 .Nm ssh-add
65 .Xr ssh-agent 1 .
77 .Pa -cert.pub
95 .Bl -tag -width Ds
97 When loading keys into or deleting keys from the agent, process
[all …]
H A Dauthfd.c63 #define MAX_AGENT_IDENTITIES 2048 /* Max keys in agent reply */
99 if ((sock = socket(AF_UNIX, SOCK_STREAM, 0)) == -1) in ssh_get_authentication_socket_path()
103 if (fcntl(sock, F_SETFD, FD_CLOEXEC) == -1 || in ssh_get_authentication_socket_path()
104 connect(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) == -1) { in ssh_get_authentication_socket_path()
127 *fdp = -1; in ssh_get_authentication_socket()
175 len -= l; in ssh_request_reply()
213 /* Lock/unlock agent */
305 /* Deserialise the response into a list of keys/comments */ in ssh_fetch_identitylist()
307 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL || in ssh_fetch_identitylist()
308 (idl->comments = calloc(num, sizeof(*idl->comments))) == NULL) { in ssh_fetch_identitylist()
[all …]
/freebsd/crypto/krb5/src/tests/
H A Dt_policy.py8 realm.run([kadminl, 'addpol', '-minlength', '6', '-minclasses', '2', 'pwpol'])
9 realm.run([kadminl, 'addprinc', '-randkey', '-policy', 'pwpol', 'pwuser'])
10 realm.run([kadminl, 'cpw', '-pw', 'sh0rt', 'pwuser'], expected_code=1,
12 realm.run([kadminl, 'cpw', '-pw', 'longenough', 'pwuser'], expected_code=1,
14 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'])
19 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1,
21 realm.run([kadminl, 'modpol', '-history', '2', 'pwpol'])
22 realm.run([kadminl, 'cpw', '-pw', 'an0therpw', 'pwuser'])
23 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1,
25 realm.run([kadminl, 'cpw', '-pw', '3rdpassword', 'pwuser'])
[all …]
H A Dkdbtest.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
2 /* tests/kdbtest.c - test program to exercise KDB modules */
90 * stored as untranslated tl-data. tl3 contains an encoded osa_princ_ent with
110 static krb5_key_data keys[] = { variable
159 keys
185 CHECK_COND(strcmp(pol->name, sample_policy.name) == 0); in check_policy()
186 CHECK_COND(pol->pw_min_life == sample_policy.pw_min_life); in check_policy()
187 CHECK_COND(pol->pw_max_life == sample_policy.pw_max_life); in check_policy()
188 CHECK_COND(pol->pw_min_length == sample_policy.pw_min_length); in check_policy()
189 CHECK_COND(pol->pw_min_classes == sample_policy.pw_min_classes); in check_policy()
[all …]
/freebsd/crypto/heimdal/doc/doxyout/hdb/man/man3/
H A DHDB.31 .TH "HDB" 3 "11 Jan 2012" "Version 1.5.2" "Heimdalhdblibrary" \" -*- nroff -*-
5 HDB \-
102 …rther transactions, wont release any permanant resources. the database can be ->hdb_open-ed again.
130 Unlock database
163 Will update keys for the entry when given password. The new keys must be written into the entry and…
172 In case the entry is locked out, the backend should set the hdb_entry.flags.locked-out flag.
/freebsd/crypto/krb5/src/kadmin/cli/
H A Dkadmin_ct.ct78 unlock;
80 request kadmin_purgekeys, "Purge previously retained old keys from a principal",
92 # list_requests is generic -- unrelated to Kerberos
/freebsd/crypto/krb5/src/lib/krb5/error_tables/
H A Dkdb5_err.et42 ec KRB5_KDB_DB_INUSE, "Database is locked or in use--try again later"
48 ec KRB5_KDB_NOTLOCKED, "Attempt to unlock database when not locked"
53 ec KRB5_KDB_ILLDIRECTION, "Bad direction for converting keys"
/freebsd/crypto/krb5/src/lib/kadm5/srv/
H A Dsvr_principal.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
7 #include "k5-int.h"
41 idx = (from->key_data_ver == 1 ? 1 : 2);
44 if ( from->key_data_length[i] ) {
45 to->key_data_contents[i] = malloc(from->key_data_length[i]);
46 if (to->key_data_contents[i] == NULL) {
48 zapfree(to->key_data_contents[i], to->key_data_length[i]);
51 memcpy(to->key_data_contents[i], from->key_data_contents[i],
52 from->key_data_length[i]);
65 n->tl_data_contents = malloc(tl->tl_data_length); in dup_tl_data()
[all …]
/freebsd/crypto/heimdal/lib/hdb/
H A Dhdb.h2 * Copyright (c) 1997 - 2007 Kungliga Tekniska Högskolan
51 #define HDB_F_DECRYPT 1 /* decrypt keys */
62 #define HDB_F_ALL_KVNOS 2048 /* we want all the keys, live or not */
84 * ->hdb_fetch_kvno(), so that we the kadmin/kpasswd backend gets around to
85 * ->hdb_store(), the backend doesn't need to lookup the entry again.
126 * permanant resources. the database can be ->hdb_open-ed again.
172 * Unlock database
224 * Will update keys for the entry when given password. The new
225 * keys must be written into the entry and will then later be
226 * ->hdb_store() into the database. The backend will still perform
[all …]
H A Dhdb-mitdb.c2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
84 read-of-data: key-encrypted, key-usage 0, master-key
87 version2 = salt in key_data->key_data_contents[1]
117 key->data = str; in mdb_principal2key()
118 key->length = strlen(str) + 1; in mdb_principal2key()
134 Salt *salt = ent->keys.val[key_num].salt; in fix_salt()
136 switch((int)salt->type) { in fix_salt()
138 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
141 krb5_data_free(&salt->salt); in fix_salt()
142 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
[all …]
/freebsd/lib/libsys/
H A D_umtx_op.249 .St -p1003.1-2001
57 All objects require ABI-mandated alignment, but this is not currently
61 .Bl -tag -width indent
63 Allow selection of the process-shared sleep queue for the thread sleep
66 The process-shared or process-private sleep queue is selected based on
70 Otherwise, if the flag is not specified, the process-private sleep queue
77 .Bl -hang -offset indent
79 .Bd -literal
95 .Bl -tag -width indent
104 The robust mutex is in a non-recoverable state.
[all …]
/freebsd/crypto/krb5/doc/html/admin/admin_commands/
H A Dkadmin_local.html6 <meta charset="utf-8" />
7 …<meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="generator" con…
13 …<script data-url_root="../../" id="documentation_options" src="../../_static/documentation_options…
24 <div class="header-wrapper">
42 <a href="mailto:krb5-bugs@mit.edu?subject=Documentation__kadmin">feedback</a>
47 <div class="content-wrapper">
56 <span id="kadmin-1"></span><h1>kadmin<a class="headerlink" href="#kadmin" title="Permalink to this …
59 <p id="kadmin-synopsis"><strong>kadmin</strong>
60 [<strong>-O</strong>|<strong>-N</strong>]
61 [<strong>-r</strong> <em>realm</em>]
[all …]
/freebsd/contrib/unbound/validator/
H A Dval_kcache.c2 * validator/val_kcache.c - validator key shared cache with validated keys
59 numtables = cfg->key_cache_slabs; in key_cache_create()
61 maxmem = cfg->key_cache_size; in key_cache_create()
62 kcache->slab = slabhash_create(numtables, start_size, maxmem, in key_cache_create()
65 if(!kcache->slab) { in key_cache_create()
78 slabhash_delete(kcache->slab); in key_cache_delete()
90 slabhash_insert(kcache->slab, k->entry.hash, &k->entry, in key_cache_insert()
91 k->entry.data, NULL); in key_cache_insert()
96 * Caller must unlock it after use.
116 e = slabhash_lookup(kcache->slab, lookfor.entry.hash, &lookfor, wr); in key_cache_search()
[all …]
/freebsd/sbin/camcontrol/
H A Dcamcontrol.8145 .Bk -words
402 .Bl -tag -width 14n
419 function-specific arguments.
437 .Bl -tag -width 14n
477 .Bl -tag -width periphlist
500 .Bl -tag -width 4n
514 .Bl -tag -width 4n
534 .Bl -tag -width 14n
541 .Bl -tag -width 012345678
569 .Bl -tag -width 5n
[all …]
/freebsd/sys/sys/
H A Dumtxvar.h1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
39 * umtx implementation to map userland addresses to unique keys.
155 /* Per-key wait-queue */
165 /* Userland lock object's wait-queue chain */
196 return (k1->type == k2->type && in umtx_key_match()
197 k1->info.both.a == k2->info.both.a && in umtx_key_match()
198 k1->info.both.b == k2->info.both.b); in umtx_key_match()
251 mtx_lock(&_uc->uc_lock); \
255 * Unlock a chain.
[all …]
/freebsd/contrib/sendmail/contrib/
H A Dqtool.pl3 ## Copyright (c) 1998-2002 Proofpoint, Inc. and its suppliers.
6 ## $Id: qtool.pl,v 8.32 2013-11-22 20:51:18 ca Exp $
37 ## to the $conditions object. See the handling of the '-s' option for an
44 ## The -e option:
45 ## The -e option takes any valid perl expression and evaluates it
51 ## ./qtool.pl -e '$msg{num_delivery_attempts} >= 2' /q1 /q2
77 my $lock_both = -1;
86 $result = $destination->add($source);
97 return $source->delete();
104 return $source->bounce();
[all …]
/freebsd/lib/libnetmap/
H A Dlibnetmap.h1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
32 /* if thread-safety is not needed, define LIBNETMAP_NOTHREADSAFE before including
78 * -NN bind individual NIC ring pair
94 * option:key1=value1,key2=value2,... (multi-key option)
96 * For multi-key options, the keys can be assigned in any order, but they
98 * option keys: unmentioned keys will receive default values. Some multi-key
99 * options define a default key and also accept the single-key syntax, by
105 * The currently available options are (default keys, when defined, are marked
108 * share (single-key)
[all …]
/freebsd/contrib/unbound/doc/
H A DREADME17 * libexpat (for the unbound-anchor helper program) (MIT license)
20 * --with-libevent=/path/to/libevent
22 --with-libevent=no gives a builtin alternative implementation.
26 * --with-libexpa
[all...]

12345