/freebsd/sys/contrib/device-tree/Bindings/input/ |
H A D | adi,adp5588.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Nuno Sá <nuno.sa@analog.com> 14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf 17 - $ref: matrix-keymap.yaml# 18 - $ref: input.yaml# 23 - adi,adp5587 24 - adi,adp5588 29 vcc-supply: [all …]
|
/freebsd/contrib/unbound/util/storage/ |
H A D | lruhash.h | 2 * util/storage/lruhash.h - hashtable, hash function, LRU keeping. 55 * o find entry (if failed, unlock hash, unl bin, exit). 57 * o unlock hashtable. 59 * o unlock hash bin. 61 * o unlock entry. 66 * be deleted, it would cause race conditions. So instead, unlock and 70 * o unlock the entry if you hold the lock already. 74 * o find entry (if failed, unlock hash, unl bin, exit). 76 * o unlock hashtable. 78 * o unlock hash bin. [all …]
|
/freebsd/contrib/ncurses/man/ |
H A D | user_caps.5 | 3 .\" Copyright 2018-2023,2024 Thomas E. Dickey * 32 .TH user_caps 5 2024-03-16 "ncurses @NCURSES_MAJOR@.@NCURSES_MINOR@" "File formats" 49 user_caps \- 50 user-defined \fIterminfo\fR capability format 52 .B @INFOCMP@ \-x 54 .B @TIC@ \-x 76 and reverse-engineering the compiled terminfo files to match the binary format. 79 copy the SVr2 binary format, which uses 16-bit signed integers, 80 and is limited to 4096-byte entries. 97 databases for AIX, HP-UX or OSF/1, [all …]
|
/freebsd/crypto/openssh/ |
H A D | authfd.h | 25 struct sshkey **keys; member 34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ 35 struct sshkey **keys; member 95 /* lock/unlock the agent */ 115 /* additional error code for ssh.com's ssh-agent2 */
|
H A D | ssh-add.1 | 1 .\" $OpenBSD: ssh-add.1,v 1.86 2023/12/19 06:57:34 jmc Exp $ 42 .Nm ssh-add 45 .Nm ssh-add 53 .Nm ssh-add 57 .Nm ssh-add 59 .Nm ssh-add 65 .Xr ssh-agent 1 . 78 .Pa -cert.pub 96 .Bl -tag -width Ds 98 When loading keys into or deleting keys from the agent, process [all …]
|
H A D | authfd.c | 63 #define MAX_AGENT_IDENTITIES 2048 /* Max keys in agent reply */ 99 if ((sock = socket(AF_UNIX, SOCK_STREAM, 0)) == -1) in ssh_get_authentication_socket_path() 103 if (fcntl(sock, F_SETFD, FD_CLOEXEC) == -1 || in ssh_get_authentication_socket_path() 104 connect(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) == -1) { in ssh_get_authentication_socket_path() 127 *fdp = -1; in ssh_get_authentication_socket() 175 len -= l; in ssh_request_reply() 213 /* Lock/unlock agent */ 305 /* Deserialise the response into a list of keys/comments */ in ssh_fetch_identitylist() 307 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL || in ssh_fetch_identitylist() 308 (idl->comments = calloc(num, sizeof(*idl->comments))) == NULL) { in ssh_fetch_identitylist() [all …]
|
H A D | ssh-agent.c | 1 /* $OpenBSD: ssh-agent.c,v 1.306 2024/03/09 05:12:13 djm Exp $ */ 50 #include "openbsd-compat/sys-queue.h" 54 #include "openbsd-compat/openssl-compat.h" 90 #include "ssh-pkcs11.h" 91 #include "sk-api.h" 162 pid_t parent_pid = -1; 174 /* Pattern-list of allowed PKCS#11/Security key paths */ 178 * Allows PKCS11 providers or SK keys that use non-internal providers to 179 * be added over a remote connection (identified by session-bind@openssh.com). 198 /* Refuse signing of non-SSH messages for web-origin FIDO keys */ [all …]
|
/freebsd/crypto/heimdal/doc/doxyout/hdb/man/man3/ |
H A D | HDB.3 | 1 .TH "HDB" 3 "11 Jan 2012" "Version 1.5.2" "Heimdalhdblibrary" \" -*- nroff -*- 5 HDB \- 102 …rther transactions, wont release any permanant resources. the database can be ->hdb_open-ed again. 130 Unlock database 163 Will update keys for the entry when given password. The new keys must be written into the entry and… 172 In case the entry is locked out, the backend should set the hdb_entry.flags.locked-out flag.
|
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | hdb.h | 2 * Copyright (c) 1997 - 2007 Kungliga Tekniska Högskolan 51 #define HDB_F_DECRYPT 1 /* decrypt keys */ 62 #define HDB_F_ALL_KVNOS 2048 /* we want all the keys, live or not */ 84 * ->hdb_fetch_kvno(), so that we the kadmin/kpasswd backend gets around to 85 * ->hdb_store(), the backend doesn't need to lookup the entry again. 126 * permanant resources. the database can be ->hdb_open-ed again. 172 * Unlock database 224 * Will update keys for the entry when given password. The new 225 * keys must be written into the entry and will then later be 226 * ->hdb_store() into the database. The backend will still perform [all …]
|
H A D | hdb-mitdb.c | 2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan 84 read-of-data: key-encrypted, key-usage 0, master-key 87 version2 = salt in key_data->key_data_contents[1] 117 key->data = str; in mdb_principal2key() 118 key->length = strlen(str) + 1; in mdb_principal2key() 134 Salt *salt = ent->keys.val[key_num].salt; in fix_salt() 136 switch((int)salt->type) { in fix_salt() 138 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 141 krb5_data_free(&salt->salt); in fix_salt() 142 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() [all …]
|
/freebsd/lib/libsys/ |
H A D | _umtx_op.2 | 49 .St -p1003.1-2001 57 All objects require ABI-mandated alignment, but this is not currently 61 .Bl -tag -width indent 63 Allow selection of the process-shared sleep queue for the thread sleep 66 The process-shared or process-private sleep queue is selected based on 70 Otherwise, if the flag is not specified, the process-private sleep queue 77 .Bl -hang -offset indent 79 .Bd -literal 95 .Bl -tag -width indent 104 The robust mutex is in a non-recoverable state. [all …]
|
/freebsd/contrib/unbound/validator/ |
H A D | val_kcache.c | 2 * validator/val_kcache.c - validator key shared cache with validated keys 59 numtables = cfg->key_cache_slabs; in key_cache_create() 61 maxmem = cfg->key_cache_size; in key_cache_create() 62 kcache->slab = slabhash_create(numtables, start_size, maxmem, in key_cache_create() 65 if(!kcache->slab) { in key_cache_create() 78 slabhash_delete(kcache->slab); in key_cache_delete() 90 slabhash_insert(kcache->slab, k->entry.hash, &k->entry, in key_cache_insert() 91 k->entry.data, NULL); in key_cache_insert() 96 * Caller must unlock it after use. 116 e = slabhash_lookup(kcache->slab, lookfor.entry.hash, &lookfor, wr); in key_cache_search() [all …]
|
H A D | autotrust.c | 2 * validator/autotrust.c - RFC5011 trust anchor management for unbound. 80 rbtree_init(&global->probe, &probetree_cmp); in autr_global_create() 96 log_assert(a->autr && b->autr); in probetree_cmp() 97 if(a->autr->next_probe_time < b->autr->next_probe_time) in probetree_cmp() 98 return -1; in probetree_cmp() 99 if(a->autr->next_probe_time > b->autr->next_probe_time) in probetree_cmp() 111 lock_basic_lock(&anchors->lock); in autr_get_num_anchors() 112 if(anchors->autr) in autr_get_num_anchors() 113 res = anchors->autr->probe.count; in autr_get_num_anchors() 114 lock_basic_unlock(&anchors->lock); in autr_get_num_anchors() [all …]
|
/freebsd/sbin/camcontrol/ |
H A D | camcontrol.8 | 145 .Bk -words 402 .Bl -tag -width 14n 419 function-specific arguments. 437 .Bl -tag -width 14n 477 .Bl -tag -width periphlist 500 .Bl -tag -width 4n 514 .Bl -tag -width 4n 534 .Bl -tag -width 14n 541 .Bl -tag -width 012345678 569 .Bl -tag -width 5n [all …]
|
/freebsd/sys/sys/ |
H A D | umtxvar.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 39 * umtx implementation to map userland addresses to unique keys. 155 /* Per-key wait-queue */ 165 /* Userland lock object's wait-queue chain */ 196 return (k1->type == k2->type && in umtx_key_match() 197 k1->info.both.a == k2->info.both.a && in umtx_key_match() 198 k1->info.both.b == k2->info.both.b); in umtx_key_match() 250 mtx_lock(&_uc->uc_lock); \ 254 * Unlock a chain. [all …]
|
/freebsd/lib/libnetmap/ |
H A D | libnetmap.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 32 /* if thread-safety is not needed, define LIBNETMAP_NOTHREADSAFE before including 78 * -NN bind individual NIC ring pair 94 * option:key1=value1,key2=value2,... (multi-key option) 96 * For multi-key options, the keys can be assigned in any order, but they 98 * option keys: unmentioned keys will receive default values. Some multi-key 99 * options define a default key and also accept the single-key syntax, by 105 * The currently available options are (default keys, when defined, are marked 108 * share (single-key) [all …]
|
/freebsd/contrib/unbound/doc/ |
H A D | README | 17 * libexpat (for the unbound-anchor helper program) (MIT license) 20 * --with-libevent=/path/to/libevent 22 --with-libevent=no gives a builtin alternative implementation. 26 * --with-libexpat=/path/to/libexpat 28 * --without-pthreads 31 altogether, or, on Solaris, also use --with(out)-solaris-threads. 32 * --enable-checking 36 * --enable-static-exe 39 * --enable-lock-checks 40 This enables a debug option to check lock and unlock calls. It needs [all …]
|
/freebsd/contrib/sendmail/contrib/ |
H A D | qtool.pl | 3 ## Copyright (c) 1998-2002 Proofpoint, Inc. and its suppliers. 6 ## $Id: qtool.pl,v 8.32 2013-11-22 20:51:18 ca Exp $ 37 ## to the $conditions object. See the handling of the '-s' option for an 44 ## The -e option: 45 ## The -e option takes any valid perl expression and evaluates it 51 ## ./qtool.pl -e '$msg{num_delivery_attempts} >= 2' /q1 /q2 77 my $lock_both = -1; 86 $result = $destination->add($source); 97 return $source->delete(); 104 return $source->bounce(); [all …]
|
/freebsd/share/man/man7/ |
H A D | security.7 | 47 multi-user systems have some inherent security, the job of building and 60 As yesterday's mini-computers and mainframes 74 .Bl -enum -offset indent 89 Typically, DoS attacks are brute-force mechanisms that attempt 99 Brute-force network attacks are harder to deal with. 100 A spoofed-packet attack, for example, is 114 The result is that if you have any moderate-sized user base, 137 may find a bug in a root-run server and be able to break root over a network 138 connection to that server, or the attacker may know of a bug in an SUID-root 152 Security remedies should always be implemented with a multi-layered [all …]
|
/freebsd/share/termcap/ |
H A D | termcap.5 | 31 .\" * ncurses is copyright (C) 1992-1995 * 32 .\" * Zeyd M. Ben-Halim * 77 consist of a number of `:'-separated fields. 98 in 132-column mode would be 99 .Dq vt100-w . 101 .Bl -column indent "With automatic margins (usually default)xx" -offset indent 103 -w Wide mode (more than 80 columns) vt100-w 104 -am With automatic margins (usually default) vt100-am 105 -nam Without automatic margins vt100-nam 106 .Pf \- Ar n Ta No "Number of lines on screen aaa-60" [all …]
|
/freebsd/contrib/ncurses/include/ |
H A D | Caps.uwin | 2 # Copyright 2019-2023,2024 Thomas E. Dickey # 3 # Copyright 2001-2015,2016 Free Software Foundation, Inc. # 43 # This file has three major sections; a standard-capabilities table, two 44 # extension-capability tables, and a section of aliases declarations. 53 # Column 5: KEY_xxx name, if any, `-' otherwise 54 # Column 6: value for KEY_xxx name, if any, `-' otherwise 56 # translations, `-' otherwise 59 # The codes following [Y-] in column 7 describe the versions of termcap which 63 # lot of old termcap-using programs). The codes read as follows: 95 # as an already-supported one. The compiler will handle aliasing, emitting [all …]
|
H A D | Caps.keys | 2 # Copyright 2019-2023,2024 Thomas E. Dickey # 3 # Copyright 2001-2015,2016 Free Software Foundation, Inc. # 33 # $Id: Caps.keys,v 1.25 2024/04/20 21:05:02 tom Exp $ 36 # is illustrates an experimental extension to describe alt-, shift- and 37 # control-modifiers applied to function and normal keys, as done on IBM pc's. 45 # This file has three major sections; a standard-capabilities table, two 46 # extension-capability tables, and a section of aliases declarations. 55 # Column 5: KEY_xxx name, if any, `-' otherwise 56 # Column 6: value for KEY_xxx name, if any, `-' otherwise 58 # translations, `-' otherwise [all …]
|
H A D | Caps.osf1r5 | 2 # Copyright 2019-2023,2024 Thomas E. Dickey # 3 # Copyright 2002-2015,2016 Free Software Foundation, Inc. # 43 # This file has three major sections; a standard-capabilities table, two 44 # extension-capability tables, and a section of aliases declarations. 53 # Column 5: KEY_xxx name, if any, `-' otherwise 54 # Column 6: value for KEY_xxx name, if any, `-' otherwise 56 # translations, `-' otherwise 59 # The codes following [Y-] in column 7 describe the versions of termcap which 63 # lot of old termcap-using programs). The codes read as follows: 95 # as an already-supported one. The compiler will handle aliasing, emitting [all …]
|
H A D | Caps.hpux11 | 2 # Copyright 2019-2023,2024 Thomas E. Dickey # 3 # Copyright 2002-2015,2016 Free Software Foundation, Inc. # 43 # This file has three major sections; a standard-capabilities table, two 44 # extension-capability tables, and a section of aliases declarations. 53 # Column 5: KEY_xxx name, if any, `-' otherwise 54 # Column 6: value for KEY_xxx name, if any, `-' otherwise 56 # translations, `-' otherwise 59 # The codes following [Y-] in column 7 describe the versions of termcap which 63 # lot of old termcap-using programs). The codes read as follows: 95 # as an already-supported one. The compiler will handle aliasing, emitting [all …]
|
H A D | Caps | 2 # Copyright 2019-2023,2024 Thomas E. Dickey # 3 # Copyright 1998-2015,2016 Free Software Foundation, Inc. # 30 # Author: Zeyd M. Ben-Halim <zmbenhal@netcom.com> 1992,1995 43 # This file has three major sections; a standard-capabilities table, two 44 # extension-capability tables, and a section of aliases declarations. 53 # Column 5: KEY_xxx name, if any, `-' otherwise 54 # Column 6: value for KEY_xxx name, if any, `-' otherwise 56 # translations, `-' otherwise 59 # The codes following [Y-] in column 7 describe the versions of termcap which 63 # lot of old termcap-using programs). The codes read as follows: [all …]
|