/freebsd-9.3-release/bin/stty/ |
H A D | key.c | 75 } keys[] = { variable in typeref:struct:key 119 if (!(kp = (struct key *)bsearch(&tmp, keys, 120 sizeof(keys)/sizeof(struct key), sizeof(struct key), c_key)))
|
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Bin/ |
H A D | guess.d | 50 keys[pos] = *(char *)key; 56 /self->inguess && keys[pos-1] == '\n'/ 60 guess = fac * (keys[pos] - '0'); 63 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess; 66 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess;
|
H A D | hotkernel | 109 foreach my $name (sort { $Count{$a} <=> $Count{$b} } keys %Count) {
|
H A D | hotuser | 122 foreach my $name (sort { $Count{$a} <=> $Count{$b} } keys %Count) {
|
H A D | wpm.d | 59 keys = 0; 100 keys++; 132 printf("\n\nCharacters typed : %d\n", keys);
|
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Misc/ |
H A D | guess.d | 50 keys[pos] = *(char *)key; 56 /self->inguess && keys[pos-1] == '\n'/ 60 guess = fac * (keys[pos] - '0'); 63 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess; 66 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess;
|
H A D | wpm.d | 59 keys = 0; 100 keys++; 132 printf("\n\nCharacters typed : %d\n", keys);
|
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/ |
H A D | hotkernel | 109 foreach my $name (sort { $Count{$a} <=> $Count{$b} } keys %Count) {
|
H A D | hotuser | 122 foreach my $name (sort { $Count{$a} <=> $Count{$b} } keys %Count) {
|
/freebsd-9.3-release/cddl/contrib/opensolaris/lib/pyzfs/common/ |
H A D | allow.py | 62 for whokey in raw.keys(): 63 perms = raw[whokey].keys() 239 for whokey in raw.keys(): 247 if permname in perms_subcmd.keys() or permname in perms_other.keys(): 333 for fs in sorted(p.keys(), reverse=True):
|
H A D | userspace.py | 217 for prop in props.keys():
|
/freebsd-9.3-release/contrib/amd/scripts/ |
H A D | expn.1 | 485 for $i (sort keys %fall_table) { 489 for $i (sort keys %fellback) { 843 $domainify_fallback{"$u *** $host"} = join(' ',sort {$fallback{$b} <=> $fallback{$a};} keys %fallback) if %fallback; 854 $domainify_fallback{"$u *** $newhost"} = join(' ',sort {$fallback{$b} <=> $fallback{$a};} keys %fallback) if %fallback;
|
H A D | expn.in | 484 for $i (sort keys %fall_table) { 488 for $i (sort keys %fellback) { 842 $domainify_fallback{"$u *** $host"} = join(' ',sort {$fallback{$b} <=> $fallback{$a};} keys %fallback) if %fallback; 853 $domainify_fallback{"$u *** $newhost"} = join(' ',sort {$fallback{$b} <=> $fallback{$a};} keys %fallback) if %fallback;
|
H A D | fix-amd-map.in | 46 foreach $m (keys %mappings) {
|
/freebsd-9.3-release/contrib/bind9/bin/named/ |
H A D | config.c | 48 #include "bind.keys.h" 79 bindkeys-file \"" NS_SYSCONFDIR "/bind.keys\";\n\ 263 # sysconfdir/bind.keys doesn't exist).\n\ 267 /* Imported from bind.keys.h: */ 513 dns_name_t **keys = NULL; local 649 memmove(new, keys, oldsize); 650 isc_mem_put(mctx, keys, oldsize); 652 keys = new; 659 keys[i] = NULL; 663 keys[ 756 dns_name_t **keys = *keysp; local [all...] |
H A D | controlconf.c | 99 controlkeylist_t keys; member in struct:controllistener 147 free_controlkeylist(&listener->keys, listener->mctx); 361 for (key = ISC_LIST_HEAD(listener->keys); 722 * Find the keys corresponding to the keyids used by this listener. 899 control_keylist = cfg_tuple_get(control, "keys"); 923 controlkeylist_t keys; local 964 ISC_LIST_INIT(keys); 966 listener->mctx, &keys); 968 free_controlkeylist(&listener->keys, listener->mctx); 969 listener->keys [all...] |
H A D | server.c | 690 load_view_keys(const cfg_obj_t *keys, const cfg_obj_t *vconfig, argument 702 for (elt = cfg_list_first(keys); 745 * Configure DNSSEC keys for a view. 777 (void) cfg_map_get(voptions, "trusted-keys", 779 (void) cfg_map_get(voptions, "managed-keys", 786 (void)cfg_map_get(config, "trusted-keys", &global_keys); 787 (void)cfg_map_get(config, "managed-keys", &global_managed_keys); 815 * If bind.keys exists, it overrides the managed-keys 819 (void)cfg_map_get(bindkeys, "trusted-keys", [all...] |
/freebsd-9.3-release/contrib/bind9/bin/named/include/named/ |
H A D | config.h | 66 dns_name_t ***keys, isc_uint32_t *countp); 70 dns_name_t ***keys, isc_uint32_t count);
|
/freebsd-9.3-release/contrib/bind9/bin/rndc/ |
H A D | rndc.c | 126 Update zone keys, and sign as needed.\n\ 128 Update keys without signing immediately.\n\ 153 tsig-list List all currently active TSIG keys, including both statically\n\ 154 configured and TKEY-negotiated keys.\n\ 170 Remove the private records for all keys that have\n\ 476 const cfg_obj_t *keys = NULL; local 570 DO("get config key list", cfg_map_get(config, "key", &keys)); 571 for (elt = cfg_list_first(keys);
|
/freebsd-9.3-release/contrib/bind9/lib/bind9/ |
H A D | check.c | 1948 * are valid domain names as these keys are used for TSIG. 1953 check_keylist(const cfg_obj_t *keys, isc_symtab_t *symtab, argument 1965 for (element = cfg_list_first(keys); 2032 * RNDC keys are not normalised unlike TSIG keys. 2065 const cfg_obj_t *v1, *v2, *keys; local 2136 keys = NULL; 2137 cfg_map_get(v1, "keys", &keys); 2138 if (keys ! 2256 const cfg_obj_t *keys = NULL; local [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | dnssec.c | 627 * keys are assumed active 671 unsigned int maxkeys, dst_key_t **keys, 682 REQUIRE(keys != NULL); 687 memset(keys, 0, sizeof(*keys) * maxkeys); 704 keys[count] = NULL; 710 mctx, &keys[count]); 729 mctx, &keys[count]); 731 dst_key_pubcompare(pubkey, keys[count], 733 dst_key_setflags(keys[coun 668 dns_dnssec_findzonekeys2(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, const char *directory, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 814 dns_dnssec_findzonekeys(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 1528 dns_rdataset_t keys; local 1746 dns_dnssec_updatekeys(dns_dnsseckeylist_t *keys, dns_dnsseckeylist_t *newkeys, dns_dnsseckeylist_t *removed, dns_name_t *origin, dns_ttl_t hint_ttl, dns_diff_t *diff, isc_boolean_t allzsk, isc_mem_t *mctx, void (*report)(const char *, ...)) argument [all...] |
H A D | tsig.c | 231 (void)dns_rbt_deletename(tkey->ring->keys, &tkey->name, ISC_FALSE); 277 result = dns_rbt_addname(ring->keys, name, tkey); 281 * recently used key if there are too many keys on the list. 501 result = dns_rbtnodechain_first(&chain, ring->keys, &foundname, 535 dns_rbt_destroy(&ring->keys); 685 result = dns_rbtnodechain_first(&chain, ring->keys, &foundname, 1730 result = dns_rbt_findname(ring->keys, name, 0, NULL, (void *)&key); 1802 ring->keys = NULL; 1803 result = dns_rbt_create(mctx, free_tsignode, NULL, &ring->keys);
|
H A D | update.c | 1048 dst_key_t **keys, unsigned int *nkeys) 1055 directory, mctx, maxkeys, keys, nkeys)); 1068 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, 1100 * have both KSK and non-KSK keys that are not revoked per 1106 if (!dst_key_isprivate(keys[i])) 1109 if (check_ksk && !REVOKE(keys[i])) { 1111 if (KSK(keys[i])) { 1119 if (j == i || ALG(keys[i]) != ALG(keys[j])) 1121 if (REVOKE(keys[ 1046 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 1066 add_sigs(dns_update_log_t *log, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly) argument 1175 del_keysigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys) argument 1249 add_exposed_sigs(dns_update_log_t *log, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, isc_boolean_t cut, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly) argument [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | dnssec.h | 38 /*%< Maximum number of keys supported in a zone. */ 71 for keys to import into the zone */ 175 unsigned int maxkeys, dst_key_t **keys, 182 unsigned int maxkeys, dst_key_t **keys, 185 * Finds a set of zone keys. 295 * Append all such keys, along with use hints gleaned from their 322 * matching key files, and load the private keys that go with 323 * the public ones. If 'savekeys' is ISC_TRUE, mark the keys so 332 dns_dnssec_updatekeys(dns_dnsseckeylist_t *keys, dns_dnsseckeylist_t *newkeys, 337 * Update the list of keys i [all...] |
H A D | tsig.h | 62 dns_rbt_t *keys; member in struct:dns_tsig_keyring 67 * LRU list of generated key along with a count of the keys on the 114 * not NULL, *key will contain a copy of the key. The keys validity
|