/freebsd-10.0-release/contrib/nvi/common/ |
H A D | mark.c | 32 * Marks are maintained in a key sorted singly linked list. We can't 33 * use arrays because we have no idea how big an index key could be. 116 ARG_CHAR_T key, 122 if (key == ABSMARK2) 123 key = ABSMARK1; 125 lmp = mark_find(sp, key); 126 if (lmp == NULL || lmp->name != key) { 127 msgq(sp, mtype, "017|Mark %s: not set", KEY_NAME(sp, key)); 132 "018|Mark %s: the line was deleted", KEY_NAME(sp, key)); 144 KEY_NAME(sp, key)); 114 mark_get( SCR *sp, ARG_CHAR_T key, MARK *mp, mtype_t mtype) argument 159 mark_set( SCR *sp, ARG_CHAR_T key, MARK *value, int userset) argument 201 mark_find( SCR *sp, ARG_CHAR_T key) argument [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/asn1/ |
H A D | x_pubkey.c | 133 EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key) 137 if (key == NULL) goto error; 139 if (key->pkey != NULL) 141 CRYPTO_add(&key->pkey->references, 1, CRYPTO_LOCK_EVP_PKEY); 142 return key->pkey; 145 if (key->public_key == NULL) goto error; 153 if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm))) 161 if (!ret->ameth->pub_decode(ret, key)) 174 /* Check to see if another thread set key->pkey first */ 176 if (key [all...] |
/freebsd-10.0-release/lib/libc/db/test/btree.tests/ |
H A D | main.c | 87 "a", 2, 1, append, "append key def", "append key with data def", 90 "delc", 0, 0, delcur, "delcur", "delete key the cursor references", 94 "g", 1, 1, get, "get key", "locate key", 96 "ia", 2, 1, iafter, "iafter key data", "insert data after key", 97 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key", 98 "ic", 2, 1, icursor, "icursor key dat 275 DBT key, data; local 305 DBT data, key; local 345 DBT key; local 380 DBT data, key; local 403 DBT data, key; local 445 DBT key, data; local 475 DBT key, data; local 506 DBT data, key; local 535 DBT data, key; local 563 DBT data, key; local 586 DBT data, key; local 611 DBT data, key; local 664 DBT data, key; local 687 DBT data, key; local [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/hdb/ |
H A D | common.c | 37 hdb_principal2key(krb5_context context, krb5_const_principal p, krb5_data *key) argument 48 ASN1_MALLOC_ENCODE(Principal, key->data, key->length, &new, &len, ret); 49 if (ret == 0 && key->length != len) 56 hdb_key2principal(krb5_context context, krb5_data *key, krb5_principal p) argument 58 return decode_Principal(key->data, key->length, p, NULL); 106 krb5_data key, value; local 125 hdb_principal2key(context, principal, &key); 128 code = db->hdb__get(context, db, key, 168 hdb_remove_aliases(krb5_context context, HDB *db, krb5_data *key) argument 213 krb5_data key, value; local 284 krb5_data key, value; local 333 krb5_data key; local [all...] |
/freebsd-10.0-release/bin/stty/ |
H A D | Makefile | 5 SRCS= cchar.c gfmt.c key.c modes.c print.c stty.c util.c
|
/freebsd-10.0-release/contrib/apr-util/crypto/ |
H A D | apr_crypto_nss.c | 78 apr_crypto_key_t *key; member in struct:apr_crypto_block_t 259 apr_crypto_key_t *key; local 261 while ((key = apr_array_pop(f->keys))) { 262 if (key->symKey) { 263 PK11_FreeSymKey(key->symKey); 264 key->symKey = NULL; 337 * @brief Get a hash table of key types, keyed by the name of the type against 340 * @param types - hashtable of key types keyed to constants. 352 * @brief Get a hash table of key modes, keyed by the name of the mode against 355 * @param modes - hashtable of key mode 406 apr_crypto_key_t *key = *k; local 528 crypto_block_encrypt_init(apr_crypto_block_t **ctx, const unsigned char **iv, const apr_crypto_key_t *key, apr_size_t *blockSize, apr_pool_t *p) argument 709 crypto_block_decrypt_init(apr_crypto_block_t **ctx, apr_size_t *blockSize, const unsigned char *iv, const apr_crypto_key_t *key, apr_pool_t *p) argument [all...] |
H A D | crypt_blowfish.h | 21 extern char *_crypt_blowfish_rn(const char *key, const char *setting,
|
/freebsd-10.0-release/contrib/opie/libopie/ |
H A D | verify.c | 72 struct opie_otpkey key, fkey, lastkey; local 109 if (opieetob(&key, response) == 1) { 110 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 114 if (i && opieatob8(&key, response)) { 115 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 123 if (opieetob(&key, c) == 1) { 124 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 132 if (opieatob8(&key, c)) { 133 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 149 if (!opieatob8(&key, [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_none.c | 21 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) argument
|
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
/freebsd-10.0-release/crypto/heimdal/lib/asn1/ |
H A D | hash.h | 64 void *ptr); /* The key */ 85 #define hashtabdel(htab,key) _hashtabdel(htab,key,FALSE) 87 #define hashtabfree(htab,key) _hashtabdel(htab,key,TRUE) /* Do! */
|
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/ |
H A D | check-cracklib.pl | 71 my $key=$md5context->hexdigest(); 74 if (!$DB{$key} || ($timenow - $DB{$key} < $reusetime)) { 76 $DB{$key}=$timenow; 92 die "key value pair not correct: $_";
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | generate_seq_number.c | 38 const krb5_keyblock *key, 37 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, uint32_t *seqno) argument
|
/freebsd-10.0-release/crypto/heimdal/lib/wind/ |
H A D | map.c | 44 translation_cmp(const void *key, const void *data) argument 46 const struct translation *t1 = (const struct translation *)key; 49 return t1->key - t2->key;
|
H A D | map_table.h | 10 uint32_t key; member in struct:translation
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth-rsa.c | 8 * validity of the host key. 40 #include "key.h" 55 * Session identifier that is used to bind key exchange and authentication 71 auth_rsa_generate_challenge(Key *key) argument 83 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) 91 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument 98 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { 100 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); 131 auth_rsa_challenge_dialog(Key *key) argument 140 challenge = PRIVSEP(auth_rsa_generate_challenge(key)); 171 Key *key; local 304 Key *key; local [all...] |
H A D | ssh-ecdsa.c | 44 #include "key.h" 47 ssh_ecdsa_sign(const Key *key, u_char **sigp, u_int *lenp, argument 57 if (key == NULL || key->ecdsa == NULL || 58 (key->type != KEY_ECDSA && key->type != KEY_ECDSA_CERT)) { 59 error("%s: no ECDSA key", __func__); 62 evp_md = key_ec_nid_to_evpmd(key->ecdsa_nid); 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 81 buffer_put_cstring(&b, key_ssh_name_plain(key)); 96 ssh_ecdsa_verify(const Key *key, const u_char *signature, u_int signaturelen, const u_char *data, u_int datalen) argument [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/rc4/asm/ |
H A D | rc4-s390x.pl | 46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 50 $key="%r2"; 71 llgc $XX[0],0($key) 72 llgc $YY,1($key) 77 llgc $TX[0],2($XX[0],$key) 92 llgc $acc,2($TY,$key) 96 ic $acc,2($TY,$key) 99 llgc $TY,2($YY,$key) 100 stc $TX[0],2($YY,$key) 101 llgc $TX[1],2($XX[1],$key) [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/rc4/ |
H A D | rc4_skey.c | 88 void private_RC4_set_key(RC4_KEY *key, int len, const unsigned char *data) argument 95 d= &(key->data[0]); 96 key->x = 0; 97 key->y = 0;
|
/freebsd-10.0-release/crypto/openssl/crypto/rc5/ |
H A D | rc5.h | 98 void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, 100 void RC5_32_ecb_encrypt(const unsigned char *in,unsigned char *out,RC5_32_KEY *key, 102 void RC5_32_encrypt(unsigned long *data,RC5_32_KEY *key); 103 void RC5_32_decrypt(unsigned long *data,RC5_32_KEY *key);
|
/freebsd-10.0-release/gnu/usr.bin/texinfo/infokey/ |
H A D | Makefile | 4 SRCS= infokey.c key.c
|
/freebsd-10.0-release/libexec/mknetid/ |
H A D | hash.h | 43 char *key; /* username */ member in struct:member_entry
|
/freebsd-10.0-release/sys/dev/drm/ |
H A D | drm_hashtab.h | 46 unsigned long key; member in struct:drm_hash_item 61 extern int drm_ht_find_item(struct drm_open_hash *ht, unsigned long key, struct drm_hash_item **item); 63 extern void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key); 64 extern int drm_ht_remove_key(struct drm_open_hash *ht, unsigned long key);
|
/freebsd-10.0-release/sys/dev/drm2/ |
H A D | drm_hashtab.h | 46 unsigned long key; member in struct:drm_hash_item 61 extern int drm_ht_find_item(struct drm_open_hash *ht, unsigned long key, struct drm_hash_item **item); 63 extern void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key); 64 extern int drm_ht_remove_key(struct drm_open_hash *ht, unsigned long key);
|