/netbsd-current/share/examples/wsmoused/ |
H A D | wsmoused.conf | 12 # List of modes that will be activated at runtime (selection is the default). 13 #modes = "selection action"; 19 mode selection {
|
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/ |
H A D | encode_key2blob.c | 55 static int key2blob_check_selection(int selection, int selection_mask) argument 58 * The selections are kinda sorta "levels", i.e. each selection given 69 if (selection == 0) 73 int check1 = (selection & checks[i]) != 0; 88 static int key2blob_encode(void *vctx, const void *key, int selection, argument 110 * The selection is understood as a "level" rather than an exact set of 113 * the encoded public key itself, no matter if the selection bits include 114 * OSSL_KEYMGMT_SELECT_PARAMETERS or not. However, if the selection includes 129 static void *impl##2blob_import_object(void *ctx, int selection, \ 133 ctx, selection, param [all...] |
H A D | decode_msblob2key.c | 59 /* The selection that is passed to msblob2key_decode() */ 60 int selection; member in struct:msblob2key_ctx_st 82 static int msblob2key_does_selection(void *provctx, int selection) argument 84 if (selection == 0) 87 if ((selection & (OSSL_KEYMGMT_SELECT_PRIVATE_KEY 94 static int msblob2key_decode(void *vctx, OSSL_CORE_BIO *cin, int selection, argument 122 ctx->selection = selection; 145 if ((selection == 0 146 || (selection 226 int selection = ctx->selection; local [all...] |
H A D | decode_pvk2key.c | 59 /* The selection that is passed to der2key_decode() */ 60 int selection; member in struct:pvk2key_ctx_st 82 static int pvk2key_does_selection(void *provctx, int selection) argument 84 if (selection == 0) 87 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 93 static int pvk2key_decode(void *vctx, OSSL_CORE_BIO *cin, int selection, argument 105 ctx->selection = selection; 107 if ((selection == 0 108 || (selection 193 int selection = ctx->selection; local [all...] |
H A D | encode_key2text.c | 216 static int dh_to_text(BIO *out, const void *key, int selection) argument 230 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 232 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 234 else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 237 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 244 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 251 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { 292 static int dsa_to_text(BIO *out, const void *key, int selection) argument 305 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 307 else if ((selection 491 ec_to_text(BIO *out, const void *key, int selection) argument 568 ecx_to_text(BIO *out, const void *key, int selection) argument 628 rsa_to_text(BIO *out, const void *key, int selection) argument 794 key2text_encode(void *vctx, const void *key, int selection, OSSL_CORE_BIO *cout, int (*key2text)(BIO *out, const void *key, int selection), OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg) argument [all...] |
H A D | encode_key2ms.c | 112 static int key2ms_does_selection(void *vctx, int selection) argument 114 return (selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0; 128 static int key2msblob_encode(void *vctx, const void *key, int selection, argument 137 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 139 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 150 static int key2pvk_encode(void *vctx, const void *key, int selection, argument 158 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) == 0) 186 impl##2##output##_import_object(void *ctx, int selection, \ 190 ctx, selection, params); \ 199 int selection, \ [all...] |
H A D | decode_der2key.c | 60 /* The selection mask for OSSL_FUNC_decoder_does_selection() */ 92 /* The selection that is passed to der2key_decode() */ 93 int selection; member in struct:der2key_ctx_st 142 static int der2key_check_selection(int selection, argument 146 * The selections are kinda sorta "levels", i.e. each selection given 157 if (selection == 0) 161 int check1 = (selection & checks[i]) != 0; 176 static int der2key_decode(void *vctx, OSSL_CORE_BIO *cin, int selection, argument 187 ctx->selection = selection; 319 int selection = ctx->selection; local [all...] |
/netbsd-current/external/apache2/llvm/dist/llvm/include/llvm/CodeGen/PBQP/ |
H A D | Solution.h | 25 /// To get the selection for each node in the problem use the getSelection method. 35 /// Set the selection for a given node. 37 /// @param selection Selection for nodeId. 38 void setSelection(GraphBase::NodeId nodeId, unsigned selection) { argument 39 selections[nodeId] = selection; 42 /// Get a node's selection. 44 /// @return The selection for nodeId; 47 assert(sItr != selections.end() && "No selection for node.");
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | keymgmt_lib.c | 50 if (evp_keymgmt_import(data->keymgmt, data->keydata, data->selection, 87 int evp_keymgmt_util_export(const EVP_PKEY *pk, int selection, argument 92 return evp_keymgmt_export(pk->keymgmt, pk->keydata, selection, 97 int selection) 131 op = evp_keymgmt_util_find_operation_cache(pk, keymgmt, selection); 161 import_data.selection = selection; 167 if (!evp_keymgmt_util_export(pk, selection, 177 op = evp_keymgmt_util_find_operation_cache(pk, keymgmt, selection); 201 selection)) { 96 evp_keymgmt_util_export_to_provider(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, int selection) argument 236 evp_keymgmt_util_find_operation_cache(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, int selection) argument 255 evp_keymgmt_util_cache_keydata(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument 314 evp_keymgmt_util_fromdata(EVP_PKEY *target, EVP_KEYMGMT *keymgmt, int selection, const OSSL_PARAM params[]) argument 328 evp_keymgmt_util_has(EVP_PKEY *pk, int selection) argument 350 evp_keymgmt_util_match(EVP_PKEY *pk1, EVP_PKEY *pk2, int selection) argument 444 evp_keymgmt_util_copy(EVP_PKEY *to, EVP_PKEY *from, int selection) argument [all...] |
H A D | keymgmt_meth.c | 330 void *evp_keymgmt_gen_init(const EVP_KEYMGMT *keymgmt, int selection, argument 337 return keymgmt->gen_init(provctx, selection, params); 432 int evp_keymgmt_has(const EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument 435 return keymgmt->has(keydata, selection); 439 int selection, int checktype) 444 return keymgmt->validate(keydata, selection, checktype); 449 int selection) 454 return keymgmt->match(keydata1, keydata2, selection); 458 int selection, const OSSL_PARAM params[]) 462 return keymgmt->import(keydata, selection, param 438 evp_keymgmt_validate(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, int checktype) argument 447 evp_keymgmt_match(const EVP_KEYMGMT *keymgmt, const void *keydata1, const void *keydata2, int selection) argument 457 evp_keymgmt_import(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, const OSSL_PARAM params[]) argument 465 evp_keymgmt_import_types(const EVP_KEYMGMT *keymgmt, int selection) argument 473 evp_keymgmt_export(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument 481 evp_keymgmt_export_types(const EVP_KEYMGMT *keymgmt, int selection) argument 489 evp_keymgmt_dup(const EVP_KEYMGMT *keymgmt, const void *keydata_from, int selection) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 56 int selection; member in struct:dsa_gen_ctx 130 static int dsa_has(const void *keydata, int selection) argument 137 if ((selection & DSA_POSSIBLE_SELECTIONS) == 0) 138 return 1; /* the selection is not missing */ 140 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 142 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 144 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 149 static int dsa_match(const void *keydata1, const void *keydata2, int selection) argument 158 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 161 if ((selection 191 dsa_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 215 dsa_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument 291 dsa_imexport_types(int selection) argument 302 dsa_import_types(int selection) argument 307 dsa_export_types(int selection) argument 378 dsa_validate(const void *keydata, int selection, int checktype) argument 405 dsa_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 651 dsa_dup(const void *keydata_from, int selection) argument [all...] |
H A D | rsa_kmgmt.c | 115 static int rsa_has(const void *keydata, int selection) argument 122 if ((selection & RSA_POSSIBLE_SELECTIONS) == 0) 123 return 1; /* the selection is not missing */ 126 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) 128 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 130 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 135 static int rsa_match(const void *keydata1, const void *keydata2, int selection) argument 146 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 149 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { 159 && (selection 173 rsa_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 203 rsa_export(void *keydata, int selection, OSSL_CALLBACK *param_callback, void *cbarg) argument 313 rsa_imexport_types(int selection) argument 320 rsa_import_types(int selection) argument 325 rsa_export_types(int selection) argument 392 rsa_validate(const void *keydata, int selection, int checktype) argument 450 gen_init(void *provctx, int selection, int rsa_type, const OSSL_PARAM params[]) argument 486 rsa_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 492 rsapss_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 682 rsa_dup(const void *keydata_from, int selection) argument [all...] |
H A D | mac_legacy_kmgmt.c | 58 int selection; member in struct:mac_gen_ctx 138 static int mac_has(const void *keydata, int selection) argument 151 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 157 static int mac_match(const void *keydata1, const void *keydata2, int selection) argument 166 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 231 static int mac_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 238 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) == 0) 273 static int mac_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, argument 284 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) == 0) 291 if ((selection 311 mac_imexport_types(int selection) argument 325 cmac_imexport_types(int selection) argument 381 mac_gen_init_common(void *provctx, int selection) argument 396 mac_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 408 cmac_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument [all...] |
H A D | ecx_kmgmt.c | 80 int selection; member in struct:ecx_gen_ctx 122 static int ecx_has(const void *keydata, int selection) argument 134 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 137 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 143 static int ecx_match(const void *keydata1, const void *keydata2, int selection) argument 152 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 154 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 157 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { 172 && (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 191 static int ecx_import(void *keydata, int selection, cons argument 230 ecx_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument 274 ecx_imexport_types(int selection) argument 475 ecx_gen_init(void *provctx, int selection, const OSSL_PARAM params[], ECX_KEY_TYPE type) argument 496 x25519_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 502 x448_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 508 ed25519_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 514 ed448_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 715 ecx_dup(const void *keydata_from, int selection) argument 749 ecx_validate(const void *keydata, int selection, int type, size_t keylen) argument 777 x25519_validate(const void *keydata, int selection, int checktype) argument 782 x448_validate(const void *keydata, int selection, int checktype) argument 787 ed25519_validate(const void *keydata, int selection, int checktype) argument 792 ed448_validate(const void *keydata, int selection, int checktype) argument [all...] |
H A D | ec_kmgmt.c | 304 int ec_has(const void *keydata, int selection) argument 311 if ((selection & EC_POSSIBLE_SELECTIONS) == 0) 312 return 1; /* the selection is not missing */ 314 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 316 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 318 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 328 static int ec_match(const void *keydata1, const void *keydata2, int selection) argument 344 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 347 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 350 if ((selection 390 common_import(void *keydata, int selection, const OSSL_PARAM params[], int sm2_wanted) argument 433 ec_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 441 sm2_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 449 ec_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument 557 ec_imexport_types(int selection) argument 573 ec_import_types(int selection) argument 579 ec_export_types(int selection) argument 897 sm2_validate(const void *keydata, int selection, int checktype) argument 936 ec_validate(const void *keydata, int selection, int checktype) argument 989 int selection; member in struct:ec_gen_ctx 994 ec_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 1017 sm2_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 1400 ec_dup(const void *keydata_from, int selection) argument [all...] |
H A D | dh_kmgmt.c | 57 int selection; member in struct:dh_gen_ctx 129 static int dh_has(const void *keydata, int selection) argument 136 if ((selection & DH_POSSIBLE_SELECTIONS) == 0) 137 return 1; /* the selection is not missing */ 139 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 141 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 143 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 148 static int dh_match(const void *keydata1, const void *keydata2, int selection) argument 157 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 160 if ((selection 190 dh_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 214 dh_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument 293 dh_imexport_types(int selection) argument 304 dh_import_types(int selection) argument 309 dh_export_types(int selection) argument 409 dh_validate(const void *keydata, int selection, int checktype) argument 444 dh_gen_init_base(void *provctx, int selection, const OSSL_PARAM params[], int type) argument 485 dh_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 491 dhx_gen_init(void *provctx, int selection, const OSSL_PARAM params[]) argument 819 dh_dup(const void *keydata_from, int selection) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/demos/encode/ |
H A D | ec_encode.c | 34 int selection = 0; local 41 * The selection argument here specifies whether we are willing to accept a 47 selection, 104 int selection; local 112 * The selection argument controls whether the private key is exported 121 selection = (passphrase != NULL) 125 ectx = OSSL_ENCODER_CTX_new_for_pkey(pkey, selection, "PEM", NULL, propq);
|
H A D | rsa_encode.c | 34 int selection = 0; local 41 * The selection argument here specifies whether we are willing to accept a 47 selection, 104 int selection; local 112 * The selection argument controls whether the private key is exported 121 selection = (passphrase != NULL) 125 ectx = OSSL_ENCODER_CTX_new_for_pkey(pkey, selection, "PEM", NULL, propq);
|
/netbsd-current/external/bsd/nvi/dist/motif_l/ |
H A D | m_copypaste.c | 64 Atom *selection, 71 static void peekProc( widget, data, selection, type, value, length, format ) 74 Atom *selection, *type; 81 (*icccm_error)( stderr, "Nothing in the primary selection buffer"); 83 (*icccm_error)( stderr, "Unknown type return from selection"); 115 /* we have lost ownership of the selection. clear it */ 128 Atom *selection, 136 static int convertProc( widget, selection, target, type, value, length, format ) 138 Atom *selection, *target, *type; 147 /* someone wants a copy of the selection 62 peekProc( Widget widget, void *data, Atom *selection, Atom *type, void *value, unsigned long *length, int *format ) argument 127 convertProc( Widget widget, Atom *selection, Atom *target, Atom *type, void **value, int *length, int *format ) argument 206 gotProc( Widget widget, void *data, Atom *selection, Atom *type, void *value, unsigned long *length, int *format ) argument [all...] |
/netbsd-current/external/gpl2/gettext/dist/gettext-tools/tests/ |
H A D | gettext-3-prg.c | 38 const char *selection; member in struct:data_t 77 printf ("%s - %s\n", strings[j].selection,
|
/netbsd-current/external/gpl3/gdb.old/dist/gas/testsuite/gas/ppc/ |
H A D | altivec_and_spe.d | 3 #name: Check that ISA extensions can be specified before CPU selection
|
/netbsd-current/external/ibm-public/postfix/dist/src/postmulti/ |
H A D | postmulti.c | 89 /* .SH "Instance selection" 160 /* .SH "Existing instance selection" 573 * Instance selection. One can either select all instances, select by 581 #define INST_SEL_NONE 0 /* default: no selection */ 741 static void insert_instance(INSTANCE *ip, INST_SELECTION *selection) argument 753 if (selection && selection->type != INST_SEL_NONE) { 755 if (match_instance_selection(RING_TO_INSTANCE(old), selection)) { 760 if (selection->type != INST_SEL_ALL) 901 static int match_instance_selection(INSTANCE *ip, INST_SELECTION *selection) argument 1288 install_new_instance(int edit_cmd, char **argv, INST_SELECTION *selection, NAME_ASSIGNMENT *assignment, int *export_flags) argument 1317 select_existing_instance(INST_SELECTION *selection, int unlink_flag, int *export_flags) argument 1358 manage(int edit_cmd, int argc, char **argv, INST_SELECTION *selection, NAME_ASSIGNMENT *assignment) argument 1491 iterate_postfix_command(int iter_cmd, int argc, char **argv, INST_SELECTION *selection) argument 1538 list_instances(int iter_flags, INST_SELECTION *selection) argument 1561 iterate_command(int iter_cmd, int iter_flags, char **argv, INST_SELECTION *selection) argument 1592 iterate(int iter_cmd, int iter_flags, int argc, char **argv, INST_SELECTION *selection) argument 1658 INST_SELECTION selection; local [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | endecoder_legacy_test.c | 304 EVP_PKEY *provided_pkey, int selection, 322 OSSL_ENCODER_CTX_new_for_pkey(provided_pkey, selection, 338 keytype, selection, 372 EVP_PKEY *provided_pkey, int selection, 390 OSSL_ENCODER_CTX_new_for_pkey(provided_pkey, selection, 405 keytype, selection, 437 EVP_PKEY *provided_pkey, int selection, 455 OSSL_ENCODER_CTX_new_for_pkey(provided_pkey, selection, 472 keytype, selection, 530 int selection local 298 test_protected_PEM(const char *keytype, int evp_type, const void *legacy_key, PEM_write_bio_of_void_protected *pem_write_bio, PEM_read_bio_of_void *pem_read_bio, EVP_PKEY_eq_fn *evp_pkey_eq, EVP_PKEY_print_fn *evp_pkey_print, EVP_PKEY *provided_pkey, int selection, const char *structure) argument 366 test_unprotected_PEM(const char *keytype, int evp_type, const void *legacy_key, PEM_write_bio_of_void_unprotected *pem_write_bio, PEM_read_bio_of_void *pem_read_bio, EVP_PKEY_eq_fn *evp_pkey_eq, EVP_PKEY_print_fn *evp_pkey_print, EVP_PKEY *provided_pkey, int selection, const char *structure) argument 433 test_DER(const char *keytype, int evp_type, const void *legacy_key, i2d_of_void *i2d, d2i_of_void *d2i, EVP_PKEY_eq_fn *evp_pkey_eq, EVP_PKEY_print_fn *evp_pkey_print, EVP_PKEY *provided_pkey, int selection, const char *structure) argument 548 int selection = local 568 int selection = OSSL_KEYMGMT_SELECT_ALL_PARAMETERS; local 587 int selection = local 605 int selection = OSSL_KEYMGMT_SELECT_ALL; local 623 int selection = local 643 int selection = OSSL_KEYMGMT_SELECT_ALL_PARAMETERS; local 660 int selection = local [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/dsa/ |
H A D | dsa_backend.c | 82 DSA *ossl_dsa_dup(const DSA *dsa, int selection) argument 93 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0 99 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0 100 && ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) == 0 104 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0 105 && ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) == 0
|
/netbsd-current/usr.sbin/wsmoused/ |
H A D | Makefile | 21 SRCS+= selection.c
|