/freebsd-current/sys/contrib/openzfs/contrib/dracut/90zfs/ |
H A D | zfs-generator.sh.in | 20 mkdir -p "$GENERATOR_DIR"/sysroot.mount.d "$GENERATOR_DIR"/dracut-pre-mount.service.d 38 } > "$GENERATOR_DIR"/dracut-pre-mount.service.d/zfs-enhancement.conf
|
H A D | zfs-load-key.sh.in | 14 systemctl is-failed --quiet zfs-import-cache.service zfs-import-scan.service && return 1
|
/freebsd-current/sys/contrib/vchiq/interface/vchiq_arm/ |
H A D | vchiq_arm.c | 101 VCHIQ_SERVICE_T *service; member in struct:user_service_struct 240 completion->service_userdata = user_service->service; 246 lock_service(user_service->service); 281 VCHIQ_SERVICE_T *service; local 288 service = handle_to_service(handle); 289 BUG_ON(!service); 290 user_service = (USER_SERVICE_T *)service->base.userdata; 297 "service_callback - service %lx(%d,%p), reason %d, header %lx, " 300 service->localport, user_service->userdata, 405 user_service->service 430 VCHIQ_SERVICE_T *service = NULL; local 1233 VCHIQ_SERVICE_T *service; local 1420 VCHIQ_SERVICE_T *service = state->services[i]; local 1431 VCHIQ_SERVICE_T *service = state->services[i]; local 1462 vchiq_dump_platform_service_state(void *dump_context, VCHIQ_SERVICE_T *service) argument 2371 vchiq_use_internal(VCHIQ_STATE_T *state, VCHIQ_SERVICE_T *service, enum USE_TYPE_E use_type) argument 2504 vchiq_release_internal(VCHIQ_STATE_T *state, VCHIQ_SERVICE_T *service) argument 2583 vchiq_use_service_internal(VCHIQ_SERVICE_T *service) argument 2589 vchiq_release_service_internal(VCHIQ_SERVICE_T *service) argument 2611 VCHIQ_SERVICE_T *service = find_service_by_handle(handle); local 2624 VCHIQ_SERVICE_T *service = find_service_by_handle(handle); local 2637 VCHIQ_SERVICE_T *service = find_service_by_handle(handle); local 2728 vchiq_check_service(VCHIQ_SERVICE_T *service) argument 2846 VCHIQ_SERVICE_T *service; local [all...] |
H A D | vchiq_kern_lib.c | 230 VCHIQ_SERVICE_T *service = NULL; local 242 service = vchiq_add_service_internal( 249 if (service) { 250 *phandle = service->handle; 275 VCHIQ_SERVICE_T *service = NULL; local 285 service = vchiq_add_service_internal(state, 291 if (service) { 292 *phandle = service->handle; 293 status = vchiq_open_service_internal(service, 296 vchiq_remove_service(service 384 VCHIQ_SERVICE_T *service; local [all...] |
H A D | vchiq_core.h | 158 #define VCHIQ_SERVICE_STATS_INC(service, stat) (service->stats. stat++) 159 #define VCHIQ_SERVICE_STATS_ADD(service, stat, addend) \ 160 (service->stats. stat += addend) 163 #define VCHIQ_SERVICE_STATS_INC(service, stat) ((void)0) 164 #define VCHIQ_SERVICE_STATS_ADD(service, stat, addend) ((void)0) 334 statically allocated, since for accounting reasons a service's slot 483 /* The number of the first unused service */ 546 vchiq_open_service_internal(VCHIQ_SERVICE_T *service, int client_id); 549 vchiq_close_service_internal(VCHIQ_SERVICE_T *service, in [all...] |
/freebsd-current/crypto/heimdal/kdc/ |
H A D | log.c | 40 const char *service, 45 s = krb5_config_get_strings(context, NULL, service, "logging", NULL); 47 s = krb5_config_get_strings(context, NULL, "logging", service, NULL); 39 kdc_openlog(krb5_context context, const char *service, krb5_kdc_configuration *config) argument
|
/freebsd-current/contrib/openpam/lib/libpam/ |
H A D | openpam_configure.c | 57 * Validate a service name. 148 * service and facility, or -1 if a system error occurred or a syntax 153 const char *service, 181 /* check service name if necessary */ 183 strcmp(wordv[i++], service) != 0) { 208 "%s(%d): missing or invalid service name", 340 const char *service, 370 ret = openpam_parse_chain(pamh, service, facility, 376 * Locates the policy file for a given service and reads the given chains 380 * service an 152 openpam_parse_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility, FILE *f, const char *filename, openpam_style_t style) argument 339 openpam_load_file(pam_handle_t *pamh, const char *service, pam_facility_t facility, const char *filename, openpam_style_t style) argument 384 openpam_load_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility) argument 450 openpam_configure(pam_handle_t *pamh, const char *service) argument [all...] |
/freebsd-current/crypto/heimdal/appl/test/ |
H A D | tcp_server.c | 40 proto (int sock, const char *service) argument 69 service, 156 doit (int port, const char *service) argument 160 return proto (STDIN_FILENO, service); 167 return doit (port, service);
|
H A D | nt_gss_server.c | 53 char *service = SERVICE; variable 58 { "service", 's', arg_string, &service, "service to use", "service" }, 68 proto (int sock, const char *service) argument 156 doit (int port, const char *service) argument 185 return proto (sock2, service); 243 return doit (port, service);
|
H A D | tcp_client.c | 40 proto (int sock, const char *hostname, const char *service) argument 61 service, 131 return client_doit (argv[argc], port, service, proto);
|
H A D | nt_gss_client.c | 46 proto (int sock, const char *hostname, const char *service) argument 61 "%s@%s", service, hostname); 72 "Error importing name `%s@%s':\n", service, hostname); 166 return client_doit (argv[argc], port, service, proto);
|
/freebsd-current/contrib/wireguard-tools/ |
H A D | showconf.c | 77 char service[512 + 1]; local 84 if (!getnameinfo(&peer->endpoint.addr, addr_len, host, sizeof(host), service, sizeof(service), NI_DGRAM | NI_NUMERICSERV | NI_NUMERICHOST)) { 86 printf("Endpoint = [%s]:%s\n", host, service); 88 printf("Endpoint = %s:%s\n", host, service);
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | verify_user.c | 42 const char *service, 50 ret = krb5_sname_to_principal (context, NULL, service, KRB5_NT_SRV_HST, 86 * If `secure', also verify against local service key for `service'. 96 opt->service = "host"; 137 krb5_verify_opt_set_service(krb5_verify_opt *opt, const char *service) argument 139 opt->service = service; 180 OPT(service, "host"), cred); 224 const char *service) 37 verify_common(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds cred) argument 219 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 243 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
/freebsd-current/usr.sbin/unbound/setup/ |
H A D | local-unbound-setup.sh | 50 service="" 91 : ${service:=local_unbound} 201 echo "unbound_service=\"${service}\"" 203 echo "unbound_restart=\"service ${service} reload\"" 335 echo " -s service name of unbound service" 383 service="$OPTARG" 473 elif ! service "${service}" enable [all...] |
/freebsd-current/crypto/openssl/crypto/bio/ |
H A D | bio_addr.c | 191 * addr_strings - helper function to get host and service names 197 * @service: a pointer to a pointer to a memory area to store the 198 * service name or numeric representation. Unused if NULL. 204 char **hostname, char **service) 247 if (service != NULL) 248 *service = OPENSSL_strdup(serv); 253 if (service != NULL) { 256 *service = OPENSSL_strdup(serv); 261 || (service != NULL && *service 203 addr_strings(const BIO_ADDR *ap, int numeric, char **hostname, char **service) argument 289 char *service = NULL; local 480 BIO_parse_hostserv(const char *hostserv, char **host, char **service, enum BIO_hostserv_priorities hostserv_prio) argument 623 BIO_lookup(const char *host, const char *service, enum BIO_lookup_type lookup_type, int family, int socktype, BIO_ADDRINFO **res) argument 652 BIO_lookup_ex(const char *host, const char *service, int lookup_type, int family, int socktype, int protocol, BIO_ADDRINFO **res) argument [all...] |
/freebsd-current/contrib/tcp_wrappers/ |
H A D | inetcf.c | 44 * Structure with everything we know about a service. 62 char *service; local 105 service = strtok(buf, whitespace); /* service */ 106 if (service == 0 || *service == '#') 108 if (STR_NE(service, "stream") && STR_NE(service, "dgram")) 120 if (path[0] == '?') /* IRIX optional service */ 191 tcpd_warn("%s may be an insecure service", tcpd_proc_nam [all...] |
/freebsd-current/tools/test/stress2/misc/ |
H A D | marcus4.sh | 40 pgrep -q watchdogd && { service watchdogd stop > /dev/null && restart=1; } 85 [ $restart ] && service watchdogd start > /dev/null
|
H A D | audit2.sh | 35 pgrep -q auditd && exit 0 || service auditd onestart 56 service auditd onestop
|
/freebsd-current/kerberos5/libexec/digest-service/ |
H A D | Makefile | 4 PROG= digest-service
|
/freebsd-current/include/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon66 106 * Structure used to enforce a particular QOP and service. 144 const char *mechanism, rpc_gss_service_t service, const char *qop, 146 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, 155 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
|
/freebsd-current/contrib/openpam/bin/pamtest/ |
H A D | pamtest.c | 97 pt_start(const char *service, const char *user) argument 102 pt_verbose("pam_start(%s, %s)", service, user); 103 if ((pame = pam_start(service, user, &pamc, &pamh)) != PAM_SUCCESS) 104 pt_error(pame, "pam_start(%s)", service); 271 fprintf(stderr, "usage: pamtest %s service command ...\n", 319 const char *service = NULL; local 382 service = *argv; 387 if (service == NULL) 388 service = "pamtest"; 402 if ((pame = pt_start(service, use [all...] |
/freebsd-current/lib/libcasper/libcasper/ |
H A D | libcasper_service.c | 55 struct service *cs_service; 63 #define CSERVICE_IS_CORE(service) \ 64 (strcmp(service_name(service->cs_service), CORE_CASPER_NAME) == 0) 107 casper_allowed_service(const nvlist_t *limits, const char *service) argument 113 if (nvlist_exists_null(limits, service)) 141 struct service *service; local 149 if (!nvlist_exists_string(nvl, "service")) 151 servname = nvlist_get_string(nvl, "service"); 155 service [all...] |
/freebsd-current/sys/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon46 106 * Structure used to enforce a particular QOP and service. 153 rpc_gss_service_t service); 157 const char *mechanism, rpc_gss_service_t service, 161 rpc_gss_service_t service, const char *qop); 218 gss_OID mech_oid, rpc_gss_service_t service) 224 mech_oid, service); 239 rpc_gss_service_t service, cons 217 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal, gss_OID mech_oid, rpc_gss_service_t service) argument 237 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 252 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument [all...] |
/freebsd-current/usr.sbin/bluetooth/sdpcontrol/ |
H A D | search.c | 70 * which each data element is a UUID representing the service classes that 71 * a given service record conforms to. The UUIDs are listed in order from 73 * must contain at least one service class UUID. 159 * highest layer protocol used to gain access to the service. If it is possible 161 * service, the ProtocolDescriptorList takes the form of a data element 400 * information about a Bluetooth profile to which the service represented by 401 * this service record conforms. Each profile descriptor is a data element 534 uint16_t service; local 545 service = SDP_SERVICE_CLASS_COMMON_ISDN_ACCESS; 549 service [all...] |
/freebsd-current/crypto/heimdal/lib/ipc/ |
H A D | tc.c | 70 test_ipc(const char *service) argument 77 ret = heim_ipc_init_context(service, &ipc);
|