Searched refs:key (Results 351 - 375 of 2274) sorted by relevance

<<11121314151617181920>>

/freebsd-11-stable/sys/crypto/rc4/
H A Drc4.h49 extern void rc4_init(struct rc4_state *state, const u_char *key, int keylen);
/freebsd-11-stable/contrib/sendmail/contrib/
H A DsocketmapServer.pl54 my ($mapName, $key) = split(' ', $request);
55 my $value = mapLookup($mapName, $key);
70 my $key = shift;
71 my $value = ($mapName eq "virtuser") ? $mapping{$key} : undef;
/freebsd-11-stable/libexec/bootpd/
H A Dhash.h48 * equivalent (i.e. have the same key value) or FALSE (0)
55 * compare function with the "key" parameter as the first parameter,
56 * and a full data element as the second parameter. Thus, the key
64 * int compare(key, element)
65 * char *key;
68 * return !strcmp(key, element->name);
71 * key = "John C. Doe"
73 * hash_Lookup(table, hashcode, compare, key);
132 hash_cmpfp, hash_datum *key);
135 hash_cmpfp, hash_datum *key,
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dauthfd.h33 int ssh_add_identity_constrained(int sock, struct sshkey *key,
35 int ssh_remove_identity(int sock, struct sshkey *key);
40 int ssh_decrypt_challenge(int sock, struct sshkey* key, BIGNUM *challenge,
42 int ssh_agent_sign(int sock, struct sshkey *key,
74 /* add key with constraints */
H A Dauthfile.h50 int sshkey_check_revoked(struct sshkey *key, const char *revoked_keys_file);
H A Dpoly1305.h17 const u_char key[POLY1305_KEYLEN])
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dtest_pkcs11.in44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key
54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dsalt-arcfour.c42 krb5_keyblock *key)
89 key->keytype = enctype;
90 ret = krb5_data_alloc (&key->keyvalue, 16);
95 EVP_DigestFinal_ex (m, key->keyvalue.data, NULL);
37 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
H A Dtest_prf.c40 * key: string2key(aes256, "testkey", "testkey", default_params)
44 * key: string2key(aes128, "testkey", "testkey", default_params)
54 krb5_keyblock key; local
64 ret = krb5_generate_random_keyblock(context, etype, &key);
72 ret = krb5_crypto_init(context, &key, 0, &crypto);
95 krb5_free_keyblock_contents(context, &key);
/freebsd-11-stable/crypto/heimdal/lib/wind/
H A Dnormalize_table.h12 uint32_t key; member in struct:translation
/freebsd-11-stable/include/rpcsvc/
H A Dypupdate_prot.x74 yp_buf key;
80 yp_buf key;
/freebsd-11-stable/lib/libc/db/test/hash.tests/
H A Dtcreat3.c58 DBT item, key; local
80 key.data = wp1;
88 key.size = strlen(wp1);
92 * enter key/data pair into the table
94 if ((dbp->put)(dbp, &key, &item, R_NOOVERWRITE) != NULL) {
95 fprintf(stderr, "cannot enter: key %s\n",
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A De_idea.c68 static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
98 static int idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
108 idea_set_encrypt_key(key, ctx->cipher_data);
112 idea_set_encrypt_key(key, &tmp);
H A Dp_seal.c73 unsigned char key[EVP_MAX_KEY_LENGTH]; local
83 if (EVP_CIPHER_CTX_rand_key(ctx, key) <= 0)
89 if (!EVP_EncryptInit_ex(ctx, NULL, NULL, key, iv))
94 EVP_PKEY_encrypt_old(ek[i], key, EVP_CIPHER_CTX_key_length(ctx),
/freebsd-11-stable/crypto/openssl/crypto/hmac/
H A Dhmac.h81 unsigned char key[HMAC_MAX_MD_CBLOCK]; member in struct:hmac_ctx_st
93 int HMAC_Init(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md);
94 int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len,
98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
/freebsd-11-stable/crypto/openssl/crypto/modes/
H A Dcfb128.c68 size_t len, const void *key,
75 assert(in && out && key && ivec && num);
94 (*block) (ivec, ivec, key);
105 (*block) (ivec, ivec, key);
119 (*block) (ivec, ivec, key);
143 (*block) (ivec, ivec, key);
155 (*block) (ivec, ivec, key);
172 (*block) (ivec, ivec, key);
188 int nbits, const void *key,
202 (*block) (ivec, ivec, key);
67 CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], int *num, int enc, block128_f block) argument
187 cfbr_encrypt_block(const unsigned char *in, unsigned char *out, int nbits, const void *key, unsigned char ivec[16], int enc, block128_f block) argument
223 CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out, size_t bits, const void *key, unsigned char ivec[16], int *num, int enc, block128_f block) argument
242 CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out, size_t length, const void *key, unsigned char ivec[16], int *num, int enc, block128_f block) argument
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_crpt.c78 unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH]; local
103 iter, EVP_CIPHER_key_length(cipher), key, md)) {
115 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
116 OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH);
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Daes-cbc.c18 * @key: Encryption key
24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
34 ctx = aes_encrypt_init(key, 16);
54 * @key: Decryption key
60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
70 ctx = aes_decrypt_init(key, 16);
H A Dsha256.h14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
18 int sha256_prf(const u8 *key, size_t key_len, const char *label,
20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
H A Daes-ctr.c18 * @key: Key for encryption (key_len bytes)
19 * @key_len: Length of the key (16, 24, or 32 bytes)
25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, argument
34 ctx = aes_encrypt_init(key, key_len);
61 * @key: Key for encryption (key_len bytes)
67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
70 return aes_ctr_encrypt(key, 16, nonce, data, data_len);
/freebsd-11-stable/usr.bin/ssh-copy-id/
H A Dssh-copy-id.sh45 while read alg key comment ; do \
46 [ -n "$key" ] || continue; \
47 if ! grep -sqwF "$key" "$keyfile"; then \
48 printf "$alg $key $comment\n" >> "$keyfile" ; \
/freebsd-11-stable/contrib/unbound/util/
H A Drbtree.h62 /** pointer to sorting key */
63 const void *key; member in struct:rbnode_type
91 * Create new tree (malloced) with given key compare function.
98 * Init a new tree (malloced by caller) with given key compare function.
108 * @return: data ptr or NULL if key already present.
115 * @param key: key of item to delete.
119 rbnode_type *rbtree_delete(rbtree_type *rbtree, const void *key);
122 * Find key in tree. Returns NULL if not found.
124 * @param key
[all...]
/freebsd-11-stable/contrib/unbound/util/shm_side/
H A Dshm_main.h59 int key; member in struct:shm_main_info
/freebsd-11-stable/contrib/llvm-project/lldb/bindings/interface/
H A DSBValueList.i136 def __getitem__(self, key):
141 if type(key) is int:
142 if key < count:
143 return self.GetValueAtIndex(key)
147 elif type(key) is str:
151 if value.name == key:
157 elif isinstance(key, type(re.compile('.'))):
161 re_match = key.search(value.name)
/freebsd-11-stable/contrib/mdocml/
H A Dtbl_opts.c38 int key; member in struct:tbl_phrase
65 arg(struct tbl_node *tbl, int ln, const char *p, int *pos, int key) argument
81 switch (key) {
106 tbl->parse, ln, *pos, keys[key].name);
110 keys[key].name, want, len);
168 if (keys[i].key)
169 tbl->opts.opts |= keys[i].key;

Completed in 224 milliseconds

<<11121314151617181920>>