Searched refs:key (Results 151 - 175 of 1829) sorted by relevance

1234567891011>>

/freebsd-10.0-release/contrib/nvi/common/
H A Dmark.c32 * Marks are maintained in a key sorted singly linked list. We can't
33 * use arrays because we have no idea how big an index key could be.
116 ARG_CHAR_T key,
122 if (key == ABSMARK2)
123 key = ABSMARK1;
125 lmp = mark_find(sp, key);
126 if (lmp == NULL || lmp->name != key) {
127 msgq(sp, mtype, "017|Mark %s: not set", KEY_NAME(sp, key));
132 "018|Mark %s: the line was deleted", KEY_NAME(sp, key));
144 KEY_NAME(sp, key));
114 mark_get( SCR *sp, ARG_CHAR_T key, MARK *mp, mtype_t mtype) argument
159 mark_set( SCR *sp, ARG_CHAR_T key, MARK *value, int userset) argument
201 mark_find( SCR *sp, ARG_CHAR_T key) argument
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/asn1/
H A Dx_pubkey.c133 EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key)
137 if (key == NULL) goto error;
139 if (key->pkey != NULL)
141 CRYPTO_add(&key->pkey->references, 1, CRYPTO_LOCK_EVP_PKEY);
142 return key->pkey;
145 if (key->public_key == NULL) goto error;
153 if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm)))
161 if (!ret->ameth->pub_decode(ret, key))
174 /* Check to see if another thread set key->pkey first */
176 if (key
[all...]
/freebsd-10.0-release/lib/libc/db/test/btree.tests/
H A Dmain.c87 "a", 2, 1, append, "append key def", "append key with data def",
90 "delc", 0, 0, delcur, "delcur", "delete key the cursor references",
94 "g", 1, 1, get, "get key", "locate key",
96 "ia", 2, 1, iafter, "iafter key data", "insert data after key",
97 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key",
98 "ic", 2, 1, icursor, "icursor key dat
275 DBT key, data; local
305 DBT data, key; local
345 DBT key; local
380 DBT data, key; local
403 DBT data, key; local
445 DBT key, data; local
475 DBT key, data; local
506 DBT data, key; local
535 DBT data, key; local
563 DBT data, key; local
586 DBT data, key; local
611 DBT data, key; local
664 DBT data, key; local
687 DBT data, key; local
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/hdb/
H A Dcommon.c37 hdb_principal2key(krb5_context context, krb5_const_principal p, krb5_data *key) argument
48 ASN1_MALLOC_ENCODE(Principal, key->data, key->length, &new, &len, ret);
49 if (ret == 0 && key->length != len)
56 hdb_key2principal(krb5_context context, krb5_data *key, krb5_principal p) argument
58 return decode_Principal(key->data, key->length, p, NULL);
106 krb5_data key, value; local
125 hdb_principal2key(context, principal, &key);
128 code = db->hdb__get(context, db, key,
168 hdb_remove_aliases(krb5_context context, HDB *db, krb5_data *key) argument
213 krb5_data key, value; local
284 krb5_data key, value; local
333 krb5_data key; local
[all...]
/freebsd-10.0-release/bin/stty/
H A DMakefile5 SRCS= cchar.c gfmt.c key.c modes.c print.c stty.c util.c
/freebsd-10.0-release/contrib/apr-util/crypto/
H A Dapr_crypto_nss.c78 apr_crypto_key_t *key; member in struct:apr_crypto_block_t
259 apr_crypto_key_t *key; local
261 while ((key = apr_array_pop(f->keys))) {
262 if (key->symKey) {
263 PK11_FreeSymKey(key->symKey);
264 key->symKey = NULL;
337 * @brief Get a hash table of key types, keyed by the name of the type against
340 * @param types - hashtable of key types keyed to constants.
352 * @brief Get a hash table of key modes, keyed by the name of the mode against
355 * @param modes - hashtable of key mode
406 apr_crypto_key_t *key = *k; local
528 crypto_block_encrypt_init(apr_crypto_block_t **ctx, const unsigned char **iv, const apr_crypto_key_t *key, apr_size_t *blockSize, apr_pool_t *p) argument
709 crypto_block_decrypt_init(apr_crypto_block_t **ctx, apr_size_t *blockSize, const unsigned char *iv, const apr_crypto_key_t *key, apr_pool_t *p) argument
[all...]
H A Dcrypt_blowfish.h21 extern char *_crypt_blowfish_rn(const char *key, const char *setting,
/freebsd-10.0-release/contrib/opie/libopie/
H A Dverify.c72 struct opie_otpkey key, fkey, lastkey; local
109 if (opieetob(&key, response) == 1) {
110 memcpy(&fkey, &key, sizeof(struct opie_otpkey));
114 if (i && opieatob8(&key, response)) {
115 memcpy(&fkey, &key, sizeof(struct opie_otpkey));
123 if (opieetob(&key, c) == 1) {
124 memcpy(&fkey, &key, sizeof(struct opie_otpkey));
132 if (opieatob8(&key, c)) {
133 memcpy(&fkey, &key, sizeof(struct opie_otpkey));
149 if (!opieatob8(&key,
[all...]
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dcrypto_none.c21 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) argument
H A Dsha1.h14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
18 int sha1_prf(const u8 *key, size_t key_len, const char *label,
20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_peap_common.h12 int peap_prfplus(int version, const u8 *key, size_t key_len,
/freebsd-10.0-release/crypto/heimdal/lib/asn1/
H A Dhash.h64 void *ptr); /* The key */
85 #define hashtabdel(htab,key) _hashtabdel(htab,key,FALSE)
87 #define hashtabfree(htab,key) _hashtabdel(htab,key,TRUE) /* Do! */
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Dcheck-cracklib.pl71 my $key=$md5context->hexdigest();
74 if (!$DB{$key} || ($timenow - $DB{$key} < $reusetime)) {
76 $DB{$key}=$timenow;
92 die "key value pair not correct: $_";
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dgenerate_seq_number.c38 const krb5_keyblock *key,
37 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, uint32_t *seqno) argument
/freebsd-10.0-release/crypto/heimdal/lib/wind/
H A Dmap.c44 translation_cmp(const void *key, const void *data) argument
46 const struct translation *t1 = (const struct translation *)key;
49 return t1->key - t2->key;
H A Dmap_table.h10 uint32_t key; member in struct:translation
/freebsd-10.0-release/crypto/openssh/
H A Dauth-rsa.c8 * validity of the host key.
40 #include "key.h"
55 * Session identifier that is used to bind key exchange and authentication
71 auth_rsa_generate_challenge(Key *key) argument
83 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0)
91 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument
98 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
100 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE);
131 auth_rsa_challenge_dialog(Key *key) argument
140 challenge = PRIVSEP(auth_rsa_generate_challenge(key));
171 Key *key; local
304 Key *key; local
[all...]
H A Dssh-ecdsa.c44 #include "key.h"
47 ssh_ecdsa_sign(const Key *key, u_char **sigp, u_int *lenp, argument
57 if (key == NULL || key->ecdsa == NULL ||
58 (key->type != KEY_ECDSA && key->type != KEY_ECDSA_CERT)) {
59 error("%s: no ECDSA key", __func__);
62 evp_md = key_ec_nid_to_evpmd(key->ecdsa_nid);
67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa);
81 buffer_put_cstring(&b, key_ssh_name_plain(key));
96 ssh_ecdsa_verify(const Key *key, const u_char *signature, u_int signaturelen, const u_char *data, u_int datalen) argument
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/rc4/asm/
H A Drc4-s390x.pl46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out)
50 $key="%r2";
71 llgc $XX[0],0($key)
72 llgc $YY,1($key)
77 llgc $TX[0],2($XX[0],$key)
92 llgc $acc,2($TY,$key)
96 ic $acc,2($TY,$key)
99 llgc $TY,2($YY,$key)
100 stc $TX[0],2($YY,$key)
101 llgc $TX[1],2($XX[1],$key)
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/rc4/
H A Drc4_skey.c88 void private_RC4_set_key(RC4_KEY *key, int len, const unsigned char *data) argument
95 d= &(key->data[0]);
96 key->x = 0;
97 key->y = 0;
/freebsd-10.0-release/crypto/openssl/crypto/rc5/
H A Drc5.h98 void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data,
100 void RC5_32_ecb_encrypt(const unsigned char *in,unsigned char *out,RC5_32_KEY *key,
102 void RC5_32_encrypt(unsigned long *data,RC5_32_KEY *key);
103 void RC5_32_decrypt(unsigned long *data,RC5_32_KEY *key);
/freebsd-10.0-release/gnu/usr.bin/texinfo/infokey/
H A DMakefile4 SRCS= infokey.c key.c
/freebsd-10.0-release/libexec/mknetid/
H A Dhash.h43 char *key; /* username */ member in struct:member_entry
/freebsd-10.0-release/sys/dev/drm/
H A Ddrm_hashtab.h46 unsigned long key; member in struct:drm_hash_item
61 extern int drm_ht_find_item(struct drm_open_hash *ht, unsigned long key, struct drm_hash_item **item);
63 extern void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key);
64 extern int drm_ht_remove_key(struct drm_open_hash *ht, unsigned long key);
/freebsd-10.0-release/sys/dev/drm2/
H A Ddrm_hashtab.h46 unsigned long key; member in struct:drm_hash_item
61 extern int drm_ht_find_item(struct drm_open_hash *ht, unsigned long key, struct drm_hash_item **item);
63 extern void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key);
64 extern int drm_ht_remove_key(struct drm_open_hash *ht, unsigned long key);

Completed in 130 milliseconds

1234567891011>>