/freebsd/sys/contrib/device-tree/Bindings/input/ |
H A D | adi,adp5588.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Nuno Sá <nuno.sa@analog.com> 14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf 17 - $ref: matrix-keymap.yaml# 18 - $ref: input.yaml# 23 - adi,adp5587 24 - adi,adp5588 29 vcc-supply: [all …]
|
/freebsd/contrib/unbound/util/storage/ |
H A D | lruhash.h | 2 * util/storage/lruhash.h - hashtable, hash function, LRU keeping. 55 * o find entry (if failed, unlock hash, unl bin, exit). 57 * o unlock hashtable. 59 * o unlock hash bin. 61 * o unlock entry. 66 * be deleted, it would cause race conditions. So instead, unlock and 70 * o unlock the entry if you hold the lock already. 74 * o find entry (if failed, unlock hash, unl bin, exit). 76 * o unlock hashtable. 78 * o unlock has [all...] |
/freebsd/crypto/krb5/src/man/ |
H A D | kadmin.man | 4 .nr rst2man-indent-level 0 7 \\$1 \\n[an-margin] 8 level \\n[rst2man-indent-level] 9 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] 10 - 11 \\n[rst2man-indent0] 12 \\n[rst2man-indent1] 13 \\n[rst2man-indent2] 18 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] 19 . nr rst2man-indent-level +1 [all …]
|
/freebsd/contrib/ncurses/man/ |
H A D | user_caps.5 | 3 .\" Copyright 2018-2023,2024 Thomas E. Dickey * 32 .TH user_caps 5 2024-03-16 "ncurses @NCURSES_MAJOR@.@NCURSES_MINOR@" "File formats" 49 user_caps \- 50 user-defined \fIterminfo\fR capability format 52 .B @INFOCMP@ \-x 54 .B @TIC@ \-x 76 and reverse-engineering the compiled terminfo files to match the binary format. 79 copy the SVr2 binary format, which uses 16-bit signed integers, 80 and is limited to 4096-byte entries. 97 databases for AIX, HP-UX or OSF/1, [all …]
|
/freebsd/crypto/krb5/doc/html/_sources/admin/admin_commands/ |
H A D | kadmin_local.rst.txt | 7 -------- 12 [**-O**\|\ **-N**] 13 [**-r** *realm*] 14 [**-p** *principal*] 15 [**-q** *query*] 16 [[**-c** *cache_name*]\|[**-k** [**-t** *keytab*]]\|\ **-n**] 17 [**-w** *password*] 18 [**-s** *admin_server*\ [:*port*]] 22 [**-r** *realm*] 23 [**-p** *principal*] [all …]
|
/freebsd/crypto/krb5/doc/admin/admin_commands/ |
H A D | kadmin_local.rst | 7 -------- 12 [**-O**\|\ **-N**] 13 [**-r** *realm*] 14 [**-p** *principal*] 15 [**-q** *query*] 16 [[**-c** *cache_name*]\|[**-k** [**-t** *keytab*]]\|\ **-n**] 17 [**-w** *password*] 18 [**-s** *admin_server*\ [:*port*]] 22 [**-r** *realm*] 23 [**-p** *principal*] [all …]
|
/freebsd/crypto/openssh/ |
H A D | authfd.h | 25 struct sshkey **keys; member 34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ 35 struct sshkey **keys; member 95 /* lock/unlock the agent */ 115 /* additional error code for ssh.com's ssh-agent2 */
|
H A D | ssh-add.1 | 1 .\" $OpenBSD: ssh-add.1,v 1.87 2024/06/17 08:30:29 djm Exp $ 42 .Nm ssh-add 45 .Nm ssh-add 53 .Nm ssh-add 57 .Nm ssh-add 59 .Nm ssh-add 65 .Xr ssh-agent 1 . 77 .Pa -cert.pub 95 .Bl -tag -width Ds 97 When loading keys into or deleting keys from the agent, process [all …]
|
H A D | authfd.c | 63 #define MAX_AGENT_IDENTITIES 2048 /* Max keys in agent reply */ 99 if ((sock = socket(AF_UNIX, SOCK_STREAM, 0)) == -1) in ssh_get_authentication_socket_path() 103 if (fcntl(sock, F_SETFD, FD_CLOEXEC) == -1 || in ssh_get_authentication_socket_path() 104 connect(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) == -1) { in ssh_get_authentication_socket_path() 127 *fdp = -1; in ssh_get_authentication_socket() 175 len -= l; in ssh_request_reply() 213 /* Lock/unlock agent */ 305 /* Deserialise the response into a list of keys/comments */ in ssh_fetch_identitylist() 307 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL || in ssh_fetch_identitylist() 308 (idl->comments = calloc(num, sizeof(*idl->comments))) == NULL) { in ssh_fetch_identitylist() [all …]
|
/freebsd/crypto/krb5/src/tests/ |
H A D | t_policy.py | 8 realm.run([kadminl, 'addpol', '-minlength', '6', '-minclasses', '2', 'pwpol']) 9 realm.run([kadminl, 'addprinc', '-randkey', '-policy', 'pwpol', 'pwuser']) 10 realm.run([kadminl, 'cpw', '-pw', 'sh0rt', 'pwuser'], expected_code=1, 12 realm.run([kadminl, 'cpw', '-pw', 'longenough', 'pwuser'], expected_code=1, 14 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser']) 19 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1, 21 realm.run([kadminl, 'modpol', '-history', '2', 'pwpol']) 22 realm.run([kadminl, 'cpw', '-pw', 'an0therpw', 'pwuser']) 23 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1, 25 realm.run([kadminl, 'cpw', '-pw', '3rdpassword', 'pwuser']) [all …]
|
H A D | kdbtest.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* tests/kdbtest.c - test program to exercise KDB modules */ 90 * stored as untranslated tl-data. tl3 contains an encoded osa_princ_ent with 110 static krb5_key_data keys[] = { variable 159 keys 185 CHECK_COND(strcmp(pol->name, sample_policy.name) == 0); in check_policy() 186 CHECK_COND(pol->pw_min_life == sample_policy.pw_min_life); in check_policy() 187 CHECK_COND(pol->pw_max_life == sample_policy.pw_max_life); in check_policy() 188 CHECK_COND(pol->pw_min_length == sample_policy.pw_min_length); in check_policy() 189 CHECK_COND(pol->pw_min_classes == sample_policy.pw_min_classes); in check_policy() [all …]
|
/freebsd/crypto/heimdal/doc/doxyout/hdb/man/man3/ |
H A D | HDB.3 | 1 .TH "HDB" 3 "11 Jan 2012" "Version 1.5.2" "Heimdalhdblibrary" \" -*- nroff -*- 5 HDB \- 102 …rther transactions, wont release any permanant resources. the database can be ->hdb_open-ed again. 130 Unlock database 163 Will update keys for the entry when given password. The new keys must be written into the entry and… 172 In case the entry is locked out, the backend should set the hdb_entry.flags.locked-out flag.
|
/freebsd/crypto/krb5/src/kadmin/cli/ |
H A D | kadmin_ct.ct | 78 unlock; 80 request kadmin_purgekeys, "Purge previously retained old keys from a principal", 92 # list_requests is generic -- unrelated to Kerberos
|
/freebsd/crypto/krb5/src/lib/krb5/error_tables/ |
H A D | kdb5_err.et | 42 ec KRB5_KDB_DB_INUSE, "Database is locked or in use--try again later" 48 ec KRB5_KDB_NOTLOCKED, "Attempt to unlock database when not locked" 53 ec KRB5_KDB_ILLDIRECTION, "Bad direction for converting keys"
|
/freebsd/crypto/krb5/src/lib/kadm5/srv/ |
H A D | svr_principal.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 7 #include "k5-int.h" 41 idx = (from->key_data_ver == 1 ? 1 : 2); 44 if ( from->key_data_length[i] ) { 45 to->key_data_contents[i] = malloc(from->key_data_length[i]); 46 if (to->key_data_contents[i] == NULL) { 48 zapfree(to->key_data_contents[i], to->key_data_length[i]); 51 memcpy(to->key_data_contents[i], from->key_data_contents[i], 52 from->key_data_length[i]); 65 n->tl_data_contents = malloc(tl->tl_data_length); in dup_tl_data() [all …]
|
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | hdb.h | 2 * Copyright (c) 1997 - 2007 Kungliga Tekniska Högskolan 51 #define HDB_F_DECRYPT 1 /* decrypt keys */ 62 #define HDB_F_ALL_KVNOS 2048 /* we want all the keys, live or not */ 84 * ->hdb_fetch_kvno(), so that we the kadmin/kpasswd backend gets around to 85 * ->hdb_store(), the backend doesn't need to lookup the entry again. 126 * permanant resources. the database can be ->hdb_open-ed again. 172 * Unlock database 224 * Will update keys for the entry when given password. The new 225 * keys must be written into the entry and will then later be 226 * ->hdb_store() into the database. The backend will still perform [all …]
|
H A D | hdb-mitdb.c | 2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan 84 read-of-data: key-encrypted, key-usage 0, master-key 87 version2 = salt in key_data->key_data_contents[1] 117 key->data = str; in mdb_principal2key() 118 key->length = strlen(str) + 1; in mdb_principal2key() 134 Salt *salt = ent->keys.val[key_num].salt; in fix_salt() 136 switch((int)salt->type) { in fix_salt() 138 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 141 krb5_data_free(&salt->salt); in fix_salt() 142 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() [all …]
|
/freebsd/lib/libsys/ |
H A D | _umtx_op.2 | 49 .St -p1003.1-2001 57 All objects require ABI-mandated alignment, but this is not currently 61 .Bl -tag -width indent 63 Allow selection of the process-shared sleep queue for the thread sleep 66 The process-shared or process-private sleep queue is selected based on 70 Otherwise, if the flag is not specified, the process-private sleep queue 77 .Bl -hang -offset indent 79 .Bd -literal 95 .Bl -tag -width indent 104 The robust mutex is in a non-recoverable state. [all …]
|
/freebsd/crypto/krb5/doc/html/admin/admin_commands/ |
H A D | kadmin_local.html | 6 <meta charset="utf-8" /> 7 …<meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="generator" con… 13 …<script data-url_root="../../" id="documentation_options" src="../../_static/documentation_options… 24 <div class="header-wrapper"> 42 <a href="mailto:krb5-bugs@mit.edu?subject=Documentation__kadmin">feedback</a> 47 <div class="content-wrapper"> 56 <span id="kadmin-1"></span><h1>kadmin<a class="headerlink" href="#kadmin" title="Permalink to this … 59 <p id="kadmin-synopsis"><strong>kadmin</strong> 60 [<strong>-O</strong>|<strong>-N</strong>] 61 [<strong>-r</strong> <em>realm</em>] [all …]
|
/freebsd/contrib/unbound/validator/ |
H A D | val_kcache.c | 2 * validator/val_kcache.c - validator key shared cache with validated keys 59 numtables = cfg->key_cache_slabs; in key_cache_create() 61 maxmem = cfg->key_cache_size; in key_cache_create() 62 kcache->slab = slabhash_create(numtables, start_size, maxmem, in key_cache_create() 65 if(!kcache->slab) { in key_cache_create() 78 slabhash_delete(kcache->slab); in key_cache_delete() 90 slabhash_insert(kcache->slab, k->entry.hash, &k->entry, in key_cache_insert() 91 k->entry.data, NULL); in key_cache_insert() 96 * Caller must unlock it after use. 116 e = slabhash_lookup(kcache->slab, lookfor.entry.hash, &lookfor, wr); in key_cache_search() [all …]
|
/freebsd/sbin/camcontrol/ |
H A D | camcontrol.8 | 145 .Bk -words 402 .Bl -tag -width 14n 419 function-specific arguments. 437 .Bl -tag -width 14n 477 .Bl -tag -width periphlist 500 .Bl -tag -width 4n 514 .Bl -tag -width 4n 534 .Bl -tag -width 14n 541 .Bl -tag -width 012345678 569 .Bl -tag -width 5n [all …]
|
/freebsd/sys/sys/ |
H A D | umtxvar.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 39 * umtx implementation to map userland addresses to unique keys. 155 /* Per-key wait-queue */ 165 /* Userland lock object's wait-queue chain */ 196 return (k1->type == k2->type && in umtx_key_match() 197 k1->info.both.a == k2->info.both.a && in umtx_key_match() 198 k1->info.both.b == k2->info.both.b); in umtx_key_match() 251 mtx_lock(&_uc->uc_lock); \ 255 * Unlock a chain. [all …]
|
/freebsd/contrib/sendmail/contrib/ |
H A D | qtool.pl | 3 ## Copyright (c) 1998-2002 Proofpoint, Inc. and its suppliers. 6 ## $Id: qtool.pl,v 8.32 2013-11-22 20:51:18 ca Exp $ 37 ## to the $conditions object. See the handling of the '-s' option for an 44 ## The -e option: 45 ## The -e option takes any valid perl expression and evaluates it 51 ## ./qtool.pl -e '$msg{num_delivery_attempts} >= 2' /q1 /q2 77 my $lock_both = -1; 86 $result = $destination->add($source); 97 return $source->delete(); 104 return $source->bounce(); [all …]
|
/freebsd/lib/libnetmap/ |
H A D | libnetmap.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 32 /* if thread-safety is not needed, define LIBNETMAP_NOTHREADSAFE before including 78 * -NN bind individual NIC ring pair 94 * option:key1=value1,key2=value2,... (multi-key option) 96 * For multi-key options, the keys can be assigned in any order, but they 98 * option keys: unmentioned keys will receive default values. Some multi-key 99 * options define a default key and also accept the single-key syntax, by 105 * The currently available options are (default keys, when defined, are marked 108 * share (single-key) [all …]
|
/freebsd/contrib/unbound/doc/ |
H A D | README | 17 * libexpat (for the unbound-anchor helper program) (MIT license) 20 * --with-libevent=/path/to/libevent 22 --with-libevent=no gives a builtin alternative implementation. 26 * --with-libexpa [all...] |