/freebsd-current/usr.sbin/ctladm/ |
H A D | ctladm.c | 2297 uint64_t key = 0, sa_key = 0; local 2318 key = strtoull(optarg, NULL, 0); 2359 /*key*/ key, 2360 /*sa key*/ sa_key, 4154 " <-r restype] [-k key] [-s sa_key]\n" 4208 "-a action : specify the action value: 0-2 (read key, read\n" 4213 "-k key : key value\n"
|
/freebsd-current/usr.sbin/bhyve/ |
H A D | bhyverun.c | 123 * 1. It accepts null key=value tokens ",," as setting "cpus" to an 169 parse_int_value(const char *key, const char *value, int minval, int maxval) argument 178 errx(4, "Invalid value for %s: '%s'", key, value); 244 char key[16]; local 263 snprintf(key, sizeof(key), "vcpu.%d.cpuset", vcpu); 264 value = get_config_value(key); 272 set_config_value(key, newval); 326 char key[16]; local 332 snprintf(key, sizeo [all...] |
/freebsd-current/sys/netinet/ |
H A D | in_fib_dxr.c | 33 * the search key are used to directly index a two-stage trie, while the 309 const struct flm_lookup_key key, uint32_t scopeid __unused) \ 314 ntohl(key.addr4.s_addr))]); \ 1080 dxr_fib_lookup(void *algo_data, const struct flm_lookup_key key, argument 1085 return (dxr->nh_tbl[dxr_lookup(dxr, ntohl(key.addr4.s_addr))]);
|
H A D | ip_fw.h | 306 * Defines key types used by lookup instruction 926 uint32_t key; /* uid/gid/port */ member in union:_ipfw_obj_tentry::__anon16
|
/freebsd-current/sys/kern/ |
H A D | sysv_shm.c | 126 static int shmget_allocate_segment(struct thread *td, key_t key, size_t size, 206 shm_find_segment_by_key(struct prison *pr, key_t key) argument 214 shmsegs[i].u.shm_perm.key == key) 295 shmseg->u.shm_perm.key = IPC_PRIVATE; 557 shmidp->shm_perm.key = IPC_PRIVATE; 681 shmget_allocate_segment(struct thread *td, key_t key, size_t size, int mode) argument 750 shmseg->u.shm_perm.key = key; 770 key_t key; member in struct:shmget_args [all...] |
H A D | sysv_sem.c | 742 arg->buf->sem_perm.key = IPC_PRIVATE; 797 arg->buf->sem_perm.key = IPC_PRIVATE; 959 key_t key; member in struct:semget_args 968 int key = uap->key; local 973 DPRINTF(("semget(0x%x, %d, 0%o)\n", key, nsems, semflg)); 981 if (key != IPC_PRIVATE) { 986 sema[semid].u.sem_perm.key == key) 991 DPRINTF(("found public key\ [all...] |
H A D | sysv_msg.c | 612 msqbuf->msg_perm.key = IPC_PRIVATE; 637 key_t key; member in struct:msgget_args 646 int key = uap->key; local 651 DPRINTF(("msgget(0x%x, 0%o)\n", key, msgflg)); 657 if (key != IPC_PRIVATE) { 663 msqkptr->u.msg_perm.key == key) 667 DPRINTF(("found public key\n")); 691 if (key [all...] |
/freebsd-current/sys/dev/mlx4/mlx4_en/ |
H A D | mlx4_en_tx.c | 873 dseg->lkey = cpu_to_be32(priv->mdev->mr.key);
|
/freebsd-current/sys/contrib/openzfs/module/zfs/ |
H A D | spa.c | 2934 uint64_t key; member in struct:sublist_delete_arg 2944 uint64_t key = sda->key; local 2948 dsl_deadlist_remove_entry(ll, key, tx); 3016 .key = dle->dle_mintxg,
|
/freebsd-current/sys/compat/linuxkpi/common/src/ |
H A D | linux_compat.c | 995 linux_poll_wakeup_callback(wait_queue_t *wq, unsigned int wq_state, int flags, void *key) argument
|
/freebsd-current/contrib/bsddialog/lib/ |
H A D | textbox.c | 207 if (conf->key.enable_esc) { 252 if (conf->key.f1_file == NULL && 253 conf->key.f1_message == NULL)
|
H A D | timebox.c | 140 if (conf->key.enable_esc) { 208 if (conf->key.f1_file == NULL && 209 conf->key.f1_message == NULL)
|
H A D | messagebox.c | 125 if (d.conf->key.enable_esc) { 168 if (d.conf->key.f1_file == NULL && 169 d.conf->key.f1_message == NULL)
|
H A D | menubox.c | 280 getnextshortcut(int npritems, struct privateitem *pritems, int abs, wint_t key) argument 288 if (pritems[i].shortcut == (wchar_t)key) { 553 if (conf->key.enable_esc) { 573 if (conf->key.f1_file == NULL && 574 conf->key.f1_message == NULL)
|
H A D | lib_util.h | 127 bool shortcut_buttons(wint_t key, struct buttons *bs);
|
H A D | lib_util.c | 402 bool shortcut_buttons(wint_t key, struct buttons *bs) argument 409 if (towlower(key) == towlower(bs->first[i])) { 973 if (conf->key.f1_message != NULL) 974 output = bsddialog_msgbox(&hconf, conf->key.f1_message, 0, 0); 976 if (output != BSDDIALOG_ERROR && conf->key.f1_file != NULL) 977 output = bsddialog_textbox(&hconf, conf->key.f1_file, 0, 0);
|
H A D | formbox.c | 728 if (conf->key.enable_esc) { 834 if (conf->key.f1_file == NULL && 835 conf->key.f1_message == NULL)
|
H A D | datebox.c | 379 if (conf->key.enable_esc) { 501 if (conf->key.f1_file == NULL && 502 conf->key.f1_message == NULL) 649 if (conf->key.enable_esc) { 714 if (conf->key.f1_file == NULL && 715 conf->key.f1_message == NULL)
|
H A D | bsddialog.h | 98 } key; member in struct:bsddialog_conf
|
H A D | barbox.c | 513 if (conf->key.enable_esc) { 566 if (conf->key.f1_file == NULL && 567 conf->key.f1_message == NULL) 668 if (conf->key.enable_esc) { 685 if (conf->key.f1_file == NULL && 686 conf->key.f1_message == NULL)
|
/freebsd-current/sys/net80211/ |
H A D | ieee80211_crypto.c | 59 * Default "null" key management routines. 68 * Not in the global key table, the driver should handle this 69 * by allocating a slot in the h/w key table/cache. In 70 * lieu of that return key slot 0 for any unicast key 71 * request. We disallow the request if this is a group key. 73 * with a 4 key table. It also handles devices that pass 75 * and key index 0. 79 *keyix = 0; /* NB: use key index 0 for ucast key */ 102 cipher_detach(struct ieee80211_key *key) argument 108 cipher_attach(struct ieee80211vap *vap, struct ieee80211_key *key) argument 117 dev_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *key, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument 125 dev_key_delete(struct ieee80211vap *vap, const struct ieee80211_key *key) argument 132 dev_key_set(struct ieee80211vap *vap, const struct ieee80211_key *key) argument 337 ieee80211_crypto_newkey(struct ieee80211vap *vap, int cipher, int flags, struct ieee80211_key *key) argument 496 _ieee80211_crypto_delkey(struct ieee80211vap *vap, struct ieee80211_key *key) argument 530 ieee80211_crypto_delkey(struct ieee80211vap *vap, struct ieee80211_key *key) argument 562 ieee80211_crypto_setkey(struct ieee80211vap *vap, struct ieee80211_key *key) argument 685 ieee80211_crypto_decap(struct ieee80211_node *ni, struct mbuf *m, int hdrlen, struct ieee80211_key **key) argument [all...] |
/freebsd-current/contrib/bmake/ |
H A D | var.c | 547 Var *v = VarNew(FStr_InitRefer(/* aliased to */ he->key), value, 1153 v->name = FStr_InitRefer(/* aliased to */ he->key); 4808 *(const char **)Vector_Push(&vec) = hi.entry->key;
|
H A D | main.c | 2000 if (he->key[0] != '/') { 2001 DEBUG1(DIR, "cached_realpath: purging %s\n", he->key);
|
/freebsd-current/sys/net/ |
H A D | if_ovpn.c | 83 uint8_t key[32]; member in struct:ovpn_kkey_dir 115 uint32_t opcode; /* opcode, key id, peer id */ 723 const void *key, *iv; local 743 if (! nvlist_exists_binary(nvl, "key")) 745 key = nvlist_get_binary(nvl, "key", &keylen); 746 if (keylen > sizeof(kdir->key)) 762 memcpy(kdir->key, key, keylen); 779 csp.csp_cipher_key = kdir->key; 1514 ovpn_finish_rx(struct ovpn_softc *sc, struct mbuf *m, struct ovpn_kpeer *peer, struct ovpn_kkey *key, uint32_t seq, struct rm_priotracker *_ovpn_lock_trackerp) argument 1580 struct ovpn_kkey *key = NULL; local 1601 struct ovpn_kkey *key; local 1830 struct ovpn_kkey *key; local 2151 ovpn_check_replay(struct ovpn_kkey_dir *key, uint32_t seq) argument 2225 struct ovpn_kkey *key; local [all...] |
/freebsd-current/sys/sys/ |
H A D | soundcard.h | 356 * Endian aware patch key generation algorithm. 373 /* u_short key; Use GUS_PATCH here */ 374 short key; /* Use GUS_PATCH here */ member in struct:patch_info 455 short key; /* Use GUS_PATCH here */ member in struct:sysex_info 490 u_long key; /* Don't worry. Reserved for communication member in struct:patmgr_info 539 * /dev/sequencer is opened or closed. A record with key == PM_K_EVENT is 692 * the instrument structure Set the key field of the structure to 696 * For Gravis UltraSound use struct patch_info. Initialize the key field 709 u_short key; /* FM_PATCH or OPL3_PATCH */ member in struct:sbi_instrument 1465 #define SEQ_ECHO_BACK(key) _TIMER_EVEN [all...] |