/freebsd-11-stable/sys/crypto/rc4/ |
H A D | rc4.h | 49 extern void rc4_init(struct rc4_state *state, const u_char *key, int keylen);
|
/freebsd-11-stable/contrib/sendmail/contrib/ |
H A D | socketmapServer.pl | 54 my ($mapName, $key) = split(' ', $request); 55 my $value = mapLookup($mapName, $key); 70 my $key = shift; 71 my $value = ($mapName eq "virtuser") ? $mapping{$key} : undef;
|
/freebsd-11-stable/libexec/bootpd/ |
H A D | hash.h | 48 * equivalent (i.e. have the same key value) or FALSE (0) 55 * compare function with the "key" parameter as the first parameter, 56 * and a full data element as the second parameter. Thus, the key 64 * int compare(key, element) 65 * char *key; 68 * return !strcmp(key, element->name); 71 * key = "John C. Doe" 73 * hash_Lookup(table, hashcode, compare, key); 132 hash_cmpfp, hash_datum *key); 135 hash_cmpfp, hash_datum *key, [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | authfd.h | 33 int ssh_add_identity_constrained(int sock, struct sshkey *key, 35 int ssh_remove_identity(int sock, struct sshkey *key); 40 int ssh_decrypt_challenge(int sock, struct sshkey* key, BIGNUM *challenge, 42 int ssh_agent_sign(int sock, struct sshkey *key, 74 /* add key with constraints */
|
H A D | authfile.h | 50 int sshkey_check_revoked(struct sshkey *key, const char *revoked_keys_file);
|
H A D | poly1305.h | 17 const u_char key[POLY1305_KEYLEN])
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | test_pkcs11.in | 44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key 54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | salt-arcfour.c | 42 krb5_keyblock *key) 89 key->keytype = enctype; 90 ret = krb5_data_alloc (&key->keyvalue, 16); 95 EVP_DigestFinal_ex (m, key->keyvalue.data, NULL); 37 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
H A D | test_prf.c | 40 * key: string2key(aes256, "testkey", "testkey", default_params) 44 * key: string2key(aes128, "testkey", "testkey", default_params) 54 krb5_keyblock key; local 64 ret = krb5_generate_random_keyblock(context, etype, &key); 72 ret = krb5_crypto_init(context, &key, 0, &crypto); 95 krb5_free_keyblock_contents(context, &key);
|
/freebsd-11-stable/crypto/heimdal/lib/wind/ |
H A D | normalize_table.h | 12 uint32_t key; member in struct:translation
|
/freebsd-11-stable/include/rpcsvc/ |
H A D | ypupdate_prot.x | 74 yp_buf key; 80 yp_buf key;
|
/freebsd-11-stable/lib/libc/db/test/hash.tests/ |
H A D | tcreat3.c | 58 DBT item, key; local 80 key.data = wp1; 88 key.size = strlen(wp1); 92 * enter key/data pair into the table 94 if ((dbp->put)(dbp, &key, &item, R_NOOVERWRITE) != NULL) { 95 fprintf(stderr, "cannot enter: key %s\n",
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_idea.c | 68 static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 98 static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 108 idea_set_encrypt_key(key, ctx->cipher_data); 112 idea_set_encrypt_key(key, &tmp);
|
H A D | p_seal.c | 73 unsigned char key[EVP_MAX_KEY_LENGTH]; local 83 if (EVP_CIPHER_CTX_rand_key(ctx, key) <= 0) 89 if (!EVP_EncryptInit_ex(ctx, NULL, NULL, key, iv)) 94 EVP_PKEY_encrypt_old(ek[i], key, EVP_CIPHER_CTX_key_length(ctx),
|
/freebsd-11-stable/crypto/openssl/crypto/hmac/ |
H A D | hmac.h | 81 unsigned char key[HMAC_MAX_MD_CBLOCK]; member in struct:hmac_ctx_st 93 int HMAC_Init(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md); 94 int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, 98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/freebsd-11-stable/crypto/openssl/crypto/modes/ |
H A D | cfb128.c | 68 size_t len, const void *key, 75 assert(in && out && key && ivec && num); 94 (*block) (ivec, ivec, key); 105 (*block) (ivec, ivec, key); 119 (*block) (ivec, ivec, key); 143 (*block) (ivec, ivec, key); 155 (*block) (ivec, ivec, key); 172 (*block) (ivec, ivec, key); 188 int nbits, const void *key, 202 (*block) (ivec, ivec, key); 67 CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], int *num, int enc, block128_f block) argument 187 cfbr_encrypt_block(const unsigned char *in, unsigned char *out, int nbits, const void *key, unsigned char ivec[16], int enc, block128_f block) argument 223 CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out, size_t bits, const void *key, unsigned char ivec[16], int *num, int enc, block128_f block) argument 242 CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out, size_t length, const void *key, unsigned char ivec[16], int *num, int enc, block128_f block) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 78 unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH]; local 103 iter, EVP_CIPHER_key_length(cipher), key, md)) { 115 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 116 OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH);
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-cbc.c | 18 * @key: Encryption key 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 34 ctx = aes_encrypt_init(key, 16); 54 * @key: Decryption key 60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 70 ctx = aes_decrypt_init(key, 16);
|
H A D | sha256.h | 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 18 int sha256_prf(const u8 *key, size_t key_len, const char *label, 20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
|
H A D | aes-ctr.c | 18 * @key: Key for encryption (key_len bytes) 19 * @key_len: Length of the key (16, 24, or 32 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, argument 34 ctx = aes_encrypt_init(key, key_len); 61 * @key: Key for encryption (key_len bytes) 67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 70 return aes_ctr_encrypt(key, 16, nonce, data, data_len);
|
/freebsd-11-stable/usr.bin/ssh-copy-id/ |
H A D | ssh-copy-id.sh | 45 while read alg key comment ; do \ 46 [ -n "$key" ] || continue; \ 47 if ! grep -sqwF "$key" "$keyfile"; then \ 48 printf "$alg $key $comment\n" >> "$keyfile" ; \
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | rbtree.h | 62 /** pointer to sorting key */ 63 const void *key; member in struct:rbnode_type 91 * Create new tree (malloced) with given key compare function. 98 * Init a new tree (malloced by caller) with given key compare function. 108 * @return: data ptr or NULL if key already present. 115 * @param key: key of item to delete. 119 rbnode_type *rbtree_delete(rbtree_type *rbtree, const void *key); 122 * Find key in tree. Returns NULL if not found. 124 * @param key [all...] |
/freebsd-11-stable/contrib/unbound/util/shm_side/ |
H A D | shm_main.h | 59 int key; member in struct:shm_main_info
|
/freebsd-11-stable/contrib/llvm-project/lldb/bindings/interface/ |
H A D | SBValueList.i | 136 def __getitem__(self, key): 141 if type(key) is int: 142 if key < count: 143 return self.GetValueAtIndex(key) 147 elif type(key) is str: 151 if value.name == key: 157 elif isinstance(key, type(re.compile('.'))): 161 re_match = key.search(value.name)
|
/freebsd-11-stable/contrib/mdocml/ |
H A D | tbl_opts.c | 38 int key; member in struct:tbl_phrase 65 arg(struct tbl_node *tbl, int ln, const char *p, int *pos, int key) argument 81 switch (key) { 106 tbl->parse, ln, *pos, keys[key].name); 110 keys[key].name, want, len); 168 if (keys[i].key) 169 tbl->opts.opts |= keys[i].key;
|