Searched refs:key (Results 1 - 25 of 2801) sorted by last modified time

1234567891011>>

/freebsd-current/usr.sbin/ctladm/
H A Dctladm.c2297 uint64_t key = 0, sa_key = 0; local
2318 key = strtoull(optarg, NULL, 0);
2359 /*key*/ key,
2360 /*sa key*/ sa_key,
4154 " <-r restype] [-k key] [-s sa_key]\n"
4208 "-a action : specify the action value: 0-2 (read key, read\n"
4213 "-k key : key value\n"
/freebsd-current/usr.sbin/bhyve/
H A Dbhyverun.c123 * 1. It accepts null key=value tokens ",," as setting "cpus" to an
169 parse_int_value(const char *key, const char *value, int minval, int maxval) argument
178 errx(4, "Invalid value for %s: '%s'", key, value);
244 char key[16]; local
263 snprintf(key, sizeof(key), "vcpu.%d.cpuset", vcpu);
264 value = get_config_value(key);
272 set_config_value(key, newval);
326 char key[16]; local
332 snprintf(key, sizeo
[all...]
/freebsd-current/sys/netinet/
H A Din_fib_dxr.c33 * the search key are used to directly index a two-stage trie, while the
309 const struct flm_lookup_key key, uint32_t scopeid __unused) \
314 ntohl(key.addr4.s_addr))]); \
1080 dxr_fib_lookup(void *algo_data, const struct flm_lookup_key key, argument
1085 return (dxr->nh_tbl[dxr_lookup(dxr, ntohl(key.addr4.s_addr))]);
H A Dip_fw.h306 * Defines key types used by lookup instruction
926 uint32_t key; /* uid/gid/port */ member in union:_ipfw_obj_tentry::__anon16
/freebsd-current/sys/kern/
H A Dsysv_shm.c126 static int shmget_allocate_segment(struct thread *td, key_t key, size_t size,
206 shm_find_segment_by_key(struct prison *pr, key_t key) argument
214 shmsegs[i].u.shm_perm.key == key)
295 shmseg->u.shm_perm.key = IPC_PRIVATE;
557 shmidp->shm_perm.key = IPC_PRIVATE;
681 shmget_allocate_segment(struct thread *td, key_t key, size_t size, int mode) argument
750 shmseg->u.shm_perm.key = key;
770 key_t key; member in struct:shmget_args
[all...]
H A Dsysv_sem.c742 arg->buf->sem_perm.key = IPC_PRIVATE;
797 arg->buf->sem_perm.key = IPC_PRIVATE;
959 key_t key; member in struct:semget_args
968 int key = uap->key; local
973 DPRINTF(("semget(0x%x, %d, 0%o)\n", key, nsems, semflg));
981 if (key != IPC_PRIVATE) {
986 sema[semid].u.sem_perm.key == key)
991 DPRINTF(("found public key\
[all...]
H A Dsysv_msg.c612 msqbuf->msg_perm.key = IPC_PRIVATE;
637 key_t key; member in struct:msgget_args
646 int key = uap->key; local
651 DPRINTF(("msgget(0x%x, 0%o)\n", key, msgflg));
657 if (key != IPC_PRIVATE) {
663 msqkptr->u.msg_perm.key == key)
667 DPRINTF(("found public key\n"));
691 if (key
[all...]
/freebsd-current/sys/dev/mlx4/mlx4_en/
H A Dmlx4_en_tx.c873 dseg->lkey = cpu_to_be32(priv->mdev->mr.key);
/freebsd-current/sys/contrib/openzfs/module/zfs/
H A Dspa.c2934 uint64_t key; member in struct:sublist_delete_arg
2944 uint64_t key = sda->key; local
2948 dsl_deadlist_remove_entry(ll, key, tx);
3016 .key = dle->dle_mintxg,
/freebsd-current/sys/compat/linuxkpi/common/src/
H A Dlinux_compat.c995 linux_poll_wakeup_callback(wait_queue_t *wq, unsigned int wq_state, int flags, void *key) argument
/freebsd-current/contrib/bsddialog/lib/
H A Dtextbox.c207 if (conf->key.enable_esc) {
252 if (conf->key.f1_file == NULL &&
253 conf->key.f1_message == NULL)
H A Dtimebox.c140 if (conf->key.enable_esc) {
208 if (conf->key.f1_file == NULL &&
209 conf->key.f1_message == NULL)
H A Dmessagebox.c125 if (d.conf->key.enable_esc) {
168 if (d.conf->key.f1_file == NULL &&
169 d.conf->key.f1_message == NULL)
H A Dmenubox.c280 getnextshortcut(int npritems, struct privateitem *pritems, int abs, wint_t key) argument
288 if (pritems[i].shortcut == (wchar_t)key) {
553 if (conf->key.enable_esc) {
573 if (conf->key.f1_file == NULL &&
574 conf->key.f1_message == NULL)
H A Dlib_util.h127 bool shortcut_buttons(wint_t key, struct buttons *bs);
H A Dlib_util.c402 bool shortcut_buttons(wint_t key, struct buttons *bs) argument
409 if (towlower(key) == towlower(bs->first[i])) {
973 if (conf->key.f1_message != NULL)
974 output = bsddialog_msgbox(&hconf, conf->key.f1_message, 0, 0);
976 if (output != BSDDIALOG_ERROR && conf->key.f1_file != NULL)
977 output = bsddialog_textbox(&hconf, conf->key.f1_file, 0, 0);
H A Dformbox.c728 if (conf->key.enable_esc) {
834 if (conf->key.f1_file == NULL &&
835 conf->key.f1_message == NULL)
H A Ddatebox.c379 if (conf->key.enable_esc) {
501 if (conf->key.f1_file == NULL &&
502 conf->key.f1_message == NULL)
649 if (conf->key.enable_esc) {
714 if (conf->key.f1_file == NULL &&
715 conf->key.f1_message == NULL)
H A Dbsddialog.h98 } key; member in struct:bsddialog_conf
H A Dbarbox.c513 if (conf->key.enable_esc) {
566 if (conf->key.f1_file == NULL &&
567 conf->key.f1_message == NULL)
668 if (conf->key.enable_esc) {
685 if (conf->key.f1_file == NULL &&
686 conf->key.f1_message == NULL)
/freebsd-current/sys/net80211/
H A Dieee80211_crypto.c59 * Default "null" key management routines.
68 * Not in the global key table, the driver should handle this
69 * by allocating a slot in the h/w key table/cache. In
70 * lieu of that return key slot 0 for any unicast key
71 * request. We disallow the request if this is a group key.
73 * with a 4 key table. It also handles devices that pass
75 * and key index 0.
79 *keyix = 0; /* NB: use key index 0 for ucast key */
102 cipher_detach(struct ieee80211_key *key) argument
108 cipher_attach(struct ieee80211vap *vap, struct ieee80211_key *key) argument
117 dev_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *key, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
125 dev_key_delete(struct ieee80211vap *vap, const struct ieee80211_key *key) argument
132 dev_key_set(struct ieee80211vap *vap, const struct ieee80211_key *key) argument
337 ieee80211_crypto_newkey(struct ieee80211vap *vap, int cipher, int flags, struct ieee80211_key *key) argument
496 _ieee80211_crypto_delkey(struct ieee80211vap *vap, struct ieee80211_key *key) argument
530 ieee80211_crypto_delkey(struct ieee80211vap *vap, struct ieee80211_key *key) argument
562 ieee80211_crypto_setkey(struct ieee80211vap *vap, struct ieee80211_key *key) argument
685 ieee80211_crypto_decap(struct ieee80211_node *ni, struct mbuf *m, int hdrlen, struct ieee80211_key **key) argument
[all...]
/freebsd-current/contrib/bmake/
H A Dvar.c547 Var *v = VarNew(FStr_InitRefer(/* aliased to */ he->key), value,
1153 v->name = FStr_InitRefer(/* aliased to */ he->key);
4808 *(const char **)Vector_Push(&vec) = hi.entry->key;
H A Dmain.c2000 if (he->key[0] != '/') {
2001 DEBUG1(DIR, "cached_realpath: purging %s\n", he->key);
/freebsd-current/sys/net/
H A Dif_ovpn.c83 uint8_t key[32]; member in struct:ovpn_kkey_dir
115 uint32_t opcode; /* opcode, key id, peer id */
723 const void *key, *iv; local
743 if (! nvlist_exists_binary(nvl, "key"))
745 key = nvlist_get_binary(nvl, "key", &keylen);
746 if (keylen > sizeof(kdir->key))
762 memcpy(kdir->key, key, keylen);
779 csp.csp_cipher_key = kdir->key;
1514 ovpn_finish_rx(struct ovpn_softc *sc, struct mbuf *m, struct ovpn_kpeer *peer, struct ovpn_kkey *key, uint32_t seq, struct rm_priotracker *_ovpn_lock_trackerp) argument
1580 struct ovpn_kkey *key = NULL; local
1601 struct ovpn_kkey *key; local
1830 struct ovpn_kkey *key; local
2151 ovpn_check_replay(struct ovpn_kkey_dir *key, uint32_t seq) argument
2225 struct ovpn_kkey *key; local
[all...]
/freebsd-current/sys/sys/
H A Dsoundcard.h356 * Endian aware patch key generation algorithm.
373 /* u_short key; Use GUS_PATCH here */
374 short key; /* Use GUS_PATCH here */ member in struct:patch_info
455 short key; /* Use GUS_PATCH here */ member in struct:sysex_info
490 u_long key; /* Don't worry. Reserved for communication member in struct:patmgr_info
539 * /dev/sequencer is opened or closed. A record with key == PM_K_EVENT is
692 * the instrument structure Set the key field of the structure to
696 * For Gravis UltraSound use struct patch_info. Initialize the key field
709 u_short key; /* FM_PATCH or OPL3_PATCH */ member in struct:sbi_instrument
1465 #define SEQ_ECHO_BACK(key) _TIMER_EVEN
[all...]

Completed in 301 milliseconds

1234567891011>>