/macosx-10.10/Libc-1044.1.2/darwin/ |
H A D | kvm.c | 28 kvm_close(void* kd) argument 34 kvm_getargv(void* kd, const void* p, int nchr) argument 40 kvm_getenvv(void* kd, const void* p, int nchr) argument 46 kvm_geterr(void* kd) argument 52 kvm_getloadavg(void* kd, double loadagv[], int nelem) argument 58 kvm_getfiles(void* kd, int op, int arg, int* cnt) argument 65 kvm_getprocs(void* kd, int op, int arg, int* cnt) argument 72 kvm_nlist(void* kd, void* nl) argument 92 kvm_read(void* kd, unsigned long addr, void* buf, unsigned int nbytes) argument 98 kvm_uread(void* kd, voi argument 104 kvm_write(void* kd, unsigned long addr, const void* buf, unsigned int nbytes) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | salt-aes.c | 49 struct _krb5_key_data kd; local 64 kd.schedule = NULL; 65 ALLOC(kd.key, 1); 66 if(kd.key == NULL) { 70 kd.key->keytype = enctype; 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 80 et->keytype->size, kd.key->keyvalue.data); 82 _krb5_free_key_data(context, &kd, et); 88 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); 90 ret = krb5_copy_keyblock_contents(context, kd [all...] |
H A D | krbhst.c | 363 append_host_hostinfo(kd, hi); 388 krbhst_empty(struct krb5_krbhst_data *kd) argument 392 HEIMDAL_MUTEX_lock(&kd->mutex); 393 empty = (kd->index == &kd->hosts); 394 HEIMDAL_MUTEX_unlock(&kd->mutex); 400 * Return the default protocol for the `kd' (either TCP or UDP) 404 krbhst_get_default_proto(struct krb5_krbhst_data *kd) argument 406 if (kd->flags & KD_LARGE_MSG) 412 krbhst_get_default_port(struct krb5_krbhst_data *kd) argument 433 parse_hostspec(krb5_context context, struct krb5_krbhst_data *kd, const char *spec, int def_port, int port) argument 550 append_host_hostinfo(struct krb5_krbhst_data *kd, struct krb5_krbhst_info *host) argument 575 append_host_string(krb5_context context, struct krb5_krbhst_data *kd, const char *host, int def_port, int port) argument 696 get_next(struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 719 srv_get_hosts(krb5_context context, struct krb5_krbhst_data *kd, const char *proto, const char *service) argument 789 config_get_hosts(krb5_context context, struct krb5_krbhst_data *kd, const char *conf_string) argument 817 fallback_get_hosts(krb5_context context, struct krb5_krbhst_data *kd, const char *serv_string, int port, int proto) argument 890 add_plugin_host(struct krb5_krbhst_data *kd, const char *host, const char *port, int portnum, int proto) argument 925 struct krb5_krbhst_data *kd = ctx; local 969 struct krb5_krbhst_data *kd; member in struct:plctx 990 plugin_get_hosts(krb5_context context, struct krb5_krbhst_data *kd, enum locate_service_type type) argument 1009 hostnames_get_hosts(krb5_context context, struct krb5_krbhst_data *kd, const char *type) argument 1024 kdc_get_next(krb5_context context, struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 1101 admin_get_next(krb5_context context, struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 1155 kpasswd_get_next(krb5_context context, struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 1238 struct krb5_krbhst_data *kd; local 1284 struct krb5_krbhst_data *kd; local [all...] |
H A D | salt.c | 254 struct _krb5_key_data kd; local 266 ALLOC(kd.key, 1); 267 if(kd.key == NULL) { 272 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 274 free(kd.key); 277 kd.key->keytype = etype; 280 krb5_free_keyblock(context, kd.key); 290 kd.schedule = NULL; 291 _krb5_DES3_random_to_key(context, kd.key, tmp, keylen); 296 &kd, [all...] |
H A D | crypto-aes.c | 58 struct _krb5_key_data *kd) 60 struct cc_schedule *key = kd->schedule->data; 70 kd->key->keyvalue.data, 71 kd->key->keyvalue.length, 84 kd->key->keyvalue.data, 85 kd->key->keyvalue.length, 95 _krb5_cc_cleanup(krb5_context context, struct _krb5_key_data *kd) argument 97 struct cc_schedule *key = kd->schedule->data; 56 _krb5_cc_schedule(krb5_context context, struct _krb5_key_type *kt, struct _krb5_key_data *kd) argument
|
H A D | crypto-evp.c | 39 struct _krb5_key_data *kd) 41 struct _krb5_evp_schedule *key = kd->schedule->data; 47 EVP_CipherInit_ex(&key->ectx, c, NULL, kd->key->keyvalue.data, NULL, 1); 48 EVP_CipherInit_ex(&key->dctx, c, NULL, kd->key->keyvalue.data, NULL, 0); 52 _krb5_evp_cleanup(krb5_context context, struct _krb5_key_data *kd) argument 54 struct _krb5_evp_schedule *key = kd->schedule->data; 37 _krb5_evp_schedule(krb5_context context, struct _krb5_key_type *kt, struct _krb5_key_data *kd) argument
|
/macosx-10.10/apr-32/apr-util/apr-util/dbm/ |
H A D | apr_dbm_ndbm.c | 124 datum kd, rd; local 126 kd.dptr = key.dptr; 127 kd.dsize = key.dsize; 129 rd = dbm_fetch(dbm->file, kd); 143 datum kd, vd; local 145 kd.dptr = key.dptr; 146 kd.dsize = key.dsize; 151 rc = dbm_store(dbm->file, kd, vd, DBM_REPLACE); 160 datum kd; local 162 kd 173 datum kd, rd; local 198 datum kd, rd; local [all...] |
H A D | apr_dbm_sdbm.c | 108 apr_sdbm_datum_t kd, rd; local 110 kd.dptr = key.dptr; 111 kd.dsize = (int)key.dsize; 113 rv = apr_sdbm_fetch(dbm->file, &rd, kd); 127 apr_sdbm_datum_t kd, vd; local 129 kd.dptr = key.dptr; 130 kd.dsize = (int)key.dsize; 135 rv = apr_sdbm_store(dbm->file, kd, vd, APR_SDBM_REPLACE); 144 apr_sdbm_datum_t kd; local 146 kd 158 apr_sdbm_datum_t vd, kd; local [all...] |
H A D | apr_dbm_gdbm.c | 131 datum kd, rd; local 133 kd.dptr = key.dptr; 134 kd.dsize = key.dsize; 136 rd = gdbm_fetch(dbm->file, kd); 154 datum kd, vd; local 156 kd.dptr = key.dptr; 157 kd.dsize = key.dsize; 162 rc = gdbm_store(dbm->file, kd, vd, GDBM_REPLACE); 171 datum kd; local 173 kd 184 datum kd; local 211 datum kd, rd; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | appleSession.c | 81 unsigned char *kd = key->data; local 86 kd[0],kd[1],kd[2],kd[3], kd[4],kd[5],kd[6],kd[7], 92 kd[ [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | appleSession.c | 81 unsigned char *kd = key->data; local 86 kd[0],kd[1],kd[2],kd[3], kd[4],kd[5],kd[6],kd[7], 92 kd[ [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | appleSession.c | 81 unsigned char *kd = key->data; local 86 kd[0],kd[1],kd[2],kd[3], kd[4],kd[5],kd[6],kd[7], 92 kd[ [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | get_s.c | 76 krb5_key_data *kd; local 82 kd = &out->key_data[out->n_key_data]; 83 kd->key_data_ver = 2; 84 kd->key_data_kvno = kvno; 85 kd->key_data_type[0] = key->key.keytype; 87 kd->key_data_type[1] = key->salt->type; 89 kd->key_data_type[1] = KRB5_PADATA_PW_SALT; 91 kd->key_data_length[0] = key->key.keyvalue.length; 92 kd->key_data_contents[0] = malloc(kd [all...] |
H A D | set_keys.c | 83 setup_Key(Key *k, Salt *s, krb5_key_data *kd, size_t kd_offset) argument 86 k->key.keytype = kd[kd_offset].key_data_type[0]; 87 k->key.keyvalue.length = kd[kd_offset].key_data_length[0]; 88 k->key.keyvalue.data = kd[kd_offset].key_data_contents[0]; 90 if(kd[kd_offset].key_data_ver == 2) { 92 s->type = kd[kd_offset].key_data_type[1]; 93 s->salt.length = kd[kd_offset].key_data_length[1]; 94 s->salt.data = kd[kd_offset].key_data_contents[1];
|
/macosx-10.10/Heimdal-398.1.2/lib/kafs/ |
H A D | afskrb5.c | 259 struct kafs_data kd; local 263 kd.name = "krb5"; 264 kd.afslog_uid = afslog_uid_int; 265 kd.get_cred = get_cred; 266 kd.get_realm = get_realm; 267 kd.get_error = get_error; 268 kd.free_error = free_error; 269 kd.data = &d; 283 ret = afslog_uid_int(&kd, cell, 0, uid, homedir); 328 struct kafs_data kd; local [all...] |
/macosx-10.10/BerkeleyDB-21/db/test/ |
H A D | rep078.tcl | 204 set kd [$marker get CHILD1] 205 while { [llength $kd] == 0 } { 208 set kd [$marker get CHILD1] 215 set key [lindex [lindex $kd 0] 1] 257 set kd [$marker get CHILD2] 258 while { [llength $kd] == 0 } { 261 set kd [$marker get CHILD2] 268 set key [lindex [lindex $kd 0] 1] 278 set kd [$marker get CHILD3] 279 while { [llength $kd] [all...] |
H A D | sdb010.tcl | 135 set kd [$dbc get -first] 136 error_check_good trunc_dbcget [llength $kd] 0 151 set kd [$dbc get -first] 152 error_check_bad notrunc_dbcget1 [llength $kd] 0 154 error_check_good key2 $kd $db2kd 155 set kd [$dbc get -next] 156 error_check_good notrunc_dbget2 [llength $kd] 0
|
H A D | rep043script.tcl | 75 set kd [$marker get ITER] 76 if { [llength $kd] == 0 } { 79 set iter [lindex [lindex $kd 0] 1]
|
H A D | test103.tcl | 143 for { set kd [$curs get -first] } { $count < $nentries } \ 144 { set kd [$curs get -next] } { 199 set kd [lindex $d $i] 200 set k [lindex $kd 0] 201 set data [lindex $kd 1]
|
H A D | test089.tcl | 137 for {set kd [$dbc get -first] } { [llength $kd] != 0 } \ 138 {set kd [$dbc get -next] } { 253 for {set kd [$dbcw get -first] } { [llength $kd] != 0 } \ 254 {set kd [$dbcw get -next] } {
|
/macosx-10.10/system_cmds-643.1.1/latency.tproj/ |
H A D | latency.c | 336 static void enter_syscall(FILE *fp, kd_buf *kd, int thread, int type, char *command, uint64_t now, uint64_t idelta, uint64_t start_bias, int print_info); 337 static void exit_syscall(FILE *fp, kd_buf *kd, int thread, int type, char *command, uint64_t now, uint64_t idelta, uint64_t start_bias, int print_info); 338 static void print_entry(FILE *fp, kd_buf *kd, int thread, int type, char *command, uint64_t now, uint64_t idelta, uint64_t start_bias, kd_buf *kd_note); 339 static void log_info(uint64_t now, uint64_t idelta, uint64_t start_bias, kd_buf *kd, kd_buf *kd_note); 352 static int check_for_scheduler_latency(int type, uintptr_t *thread, uint64_t now, kd_buf *kd, kd_buf **kd_start, int *priority, double *latency); 1484 insert_run_event(uintptr_t thread, int priority, kd_buf *kd, uint64_t now) argument 1509 trp->tr_entry = kd; 1820 kd_buf *kd, *end_of_sample; local 1851 kd = (kd_buf *)my_buffer; 1852 first_now = kd 1931 enter_syscall(FILE *fp, kd_buf *kd, int thread, int type, char *command, uint64_t now, uint64_t idelta, uint64_t start_bias, int print_info) argument 1979 exit_syscall(FILE *fp, kd_buf *kd, int thread, int type, char *command, uint64_t now, uint64_t idelta, uint64_t start_bias, int print_info) argument 2021 print_entry(FILE *fp, kd_buf *kd, int thread, int type, char *command, uint64_t now, uint64_t idelta, uint64_t start_bias, kd_buf *kd_note) argument 2077 log_info(uint64_t now, uint64_t idelta, uint64_t start_bias, kd_buf *kd, kd_buf *kd_note) argument 2245 kd_buf *kd; local 2425 check_for_scheduler_latency(int type, uintptr_t *thread, uint64_t now, kd_buf *kd, kd_buf **kd_start, int *priority, double *latency) argument 2486 handle_decrementer(kd_buf *kd, int cpunum) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | ext.c | 74 krb5_key_data *kd = &princ.key_data[i]; local 77 keys[i].vno = kd->key_data_kvno; 78 keys[i].keyblock.keytype = kd->key_data_type[0]; 79 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; 80 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0];
|
/macosx-10.10/system_cmds-643.1.1/fs_usage.tproj/ |
H A D | fs_usage.c | 2592 kd_buf *kd; local 2648 kd = (kd_buf *)my_buffer; 2666 thread = kd[i].arg5; 2667 debugid = kd[i].debugid; 2668 type = kd[i].debugid & DBG_FUNC_MASK; 2670 now = kdbg_get_timestamp(&kd[i]); 2690 insert_diskio(type, kd[i].arg1, kd[i].arg2, kd[i].arg3, kd[ 3019 enter_event_now(uintptr_t thread, int type, kd_buf *kd, char *name, double now) argument 3119 enter_event(uintptr_t thread, int type, kd_buf *kd, char *name, double now) argument 3165 extend_syscall(uintptr_t thread, int type, kd_buf *kd) argument [all...] |
/macosx-10.10/vim-55/runtime/ |
H A D | termcap | 18 :up=\E[A:nd=\E[C:ku=\E[A:kd=\E[B:kr=\E[C:kl=\E[D:\ 39 :dl=\ER:do=^V:ei=:ic=\EQ:if=/usr/share/lib/tabset/std:im=:kb=^H:kd=^V:\ 52 :ku=\EOA:kd=\EOB:kr=\EOC:kl=\EOD:kb=^H:\ 59 :cl=\014:ku=\233A:kd=\233B:kl=\233D:kr=\233C:kb=^H:\ 103 :kd=\316:\
|
/macosx-10.10/system_cmds-643.1.1/sc_usage.tproj/ |
H A D | sc_usage.c | 1318 kd_buf *kd; local 1360 kd = (kd_buf *)my_buffer; 1370 thread = kd[i].arg5; 1371 debugid = kd[i].debugid; 1372 type = kd[i].debugid & DBG_FUNC_MASK; 1378 now = kd[i].timestamp & KDBG_TIMESTAMP_MASK; 1392 *sargptr++ = kd[i].arg2; 1393 *sargptr++ = kd[i].arg3; 1394 *sargptr++ = kd[i].arg4; 1428 *sargptr++ = kd[ [all...] |