/freebsd-11-stable/lib/libc/stdlib/ |
H A D | hsearch_r.c | 50 if (entry->key == NULL) 56 * Computes an FNV-1a hash of the key. Depending on the pointer size, this 83 hash = hsearch_hash(hsearch->offset_basis, item.key); 86 * Search the hash table for an existing entry for this key. 91 if (entry->key == NULL) 93 if (strcmp(entry->key, item.key) == 0) { 126 if (entry->key != NULL) { 128 entry->key);
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto-des-common.c | 43 _krb5_xor (DES_cblock *key, const unsigned char *b) argument 45 unsigned char *a = (unsigned char*)key; 60 struct _krb5_key_data *key, 65 struct _krb5_evp_schedule *ctx = key->schedule->data; 93 struct _krb5_key_data *key, 98 struct _krb5_evp_schedule *ctx = key->schedule->data; 133 struct _krb5_key_data *key, 58 _krb5_des_checksum(krb5_context context, const EVP_MD *evp_md, struct _krb5_key_data *key, const void *data, size_t len, Checksum *cksum) argument 91 _krb5_des_verify(krb5_context context, const EVP_MD *evp_md, struct _krb5_key_data *key, const void *data, size_t len, Checksum *C) argument 132 RSA_MD5_checksum(krb5_context context, struct _krb5_key_data *key, const void *data, size_t len, unsigned usage, Checksum *C) argument
|
H A D | keyblock.c | 97 * @param inblock the key to copy 98 * @param to the output key. 118 * @param inblock the key to copy 119 * @param to the output key. 165 * Fill in `key' with key data of type `enctype' from `data' of length 178 krb5_keyblock *key) 183 memset(key, 0, sizeof(*key)); 191 "Encryption key 174 krb5_keyblock_init(krb5_context context, krb5_enctype type, const void *data, size_t size, krb5_keyblock *key) argument [all...] |
/freebsd-11-stable/contrib/amd/amd/ |
H A D | info_ndbm.c | 54 int ndbm_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp); 58 search_ndbm(mnt_map *m, DBM *db, char *key, char **val) argument 62 k.dptr = key; 63 k.dsize = strlen(key) + 1; 67 *val = sun_entry2amd(key, v.dptr); 77 ndbm_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp) argument 98 error = search_ndbm(m, db, key, pval);
|
H A D | info_passwd.c | 56 int passwd_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp); 91 passwd_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp) argument 96 if (STREQ(key, "/defaults")) { 100 pw = getpwnam(key); 176 dlog("passwd_search: map=%s key=%s -> %s", map, key, val);
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_nettle.c | 29 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) argument 35 /* Add parity bits to the key */ 38 tmp = key[i]; 108 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 117 hmac_md5_set_key(&ctx, key_len, key); 126 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 129 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 133 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 142 hmac_sha1_set_key(&ctx, key_len, key); 151 int hmac_sha1(const u8 *key, size_ argument 160 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 178 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 189 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 207 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 218 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 236 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 245 aes_encrypt_init(const u8 *key, size_t len) argument 276 aes_decrypt_init(const u8 *key, size_t len) argument 411 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument [all...] |
H A D | crypto_internal.c | 34 u8 key[64]; member in struct:crypto_hash 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 78 MD5Update(&ctx->u.md5, key, key_len); 80 key = tk; 83 os_memcpy(ctx->key, key, key_len); 86 os_memcpy(k_pad, key, key_len); 97 SHA1Update(&ctx->u.sha1, key, key_len); 99 key = tk; 102 os_memcpy(ctx->key, ke [all...] |
/freebsd-11-stable/contrib/unbound/contrib/ |
H A D | unbound-querycachedb.py | 25 def _redis_get(options, key): 27 return redis.Redis(options.address, int(options.port)).get(key) 29 def _dump_value(options, qname, key, value): 31 print(';; key=%s' % key) 68 key = _calc_hashkey(args[0], options.secret, options.qtype) 69 value = get_func(options, key) 70 _dump_value(options, args[0], key, value)
|
/freebsd-11-stable/libexec/ypxfr/ |
H A D | ypxfr_main.c | 123 ypxfr_foreach(int status, char *key, int keylen, char *val, int vallen, argument 138 dbkey.data = key; 174 DBT key, data; local 308 key.data = "YP_MASTER_NAME"; 309 key.size = sizeof("YP_MASTER_NAME") - 1; 312 &key, &data, 1) != YP_TRUE) { 374 key.data = "YP_LAST_MODIFIED"; 375 key.size = sizeof("YP_LAST_MODIFIED") - 1; 381 if (yp_get_record(ypxfr_dest_domain,ypxfr_mapname,&key,&data,1) != YP_TRUE) { 440 if (yp_put_record(dbp, &key, [all...] |
/freebsd-11-stable/contrib/apr/tables/ |
H A D | apr_tables.c | 298 #define TABLE_HASH(key) (TABLE_INDEX_MASK & *(unsigned char *)(key)) 302 /* Compute the "checksum" for a key, consisting of the first 308 #define COMPUTE_KEY_CHECKSUM(key, checksum) \ 310 const char *k = (key); \ 345 * - Hash the key into the index: 346 * - index_first[TABLE_HASH(key)] is the offset within 347 * the table of the first entry with that key 348 * - index_last[TABLE_HASH(key)] is the offset within 349 * the table of the last entry with that key 471 apr_table_get(const apr_table_t *t, const char *key) argument 500 apr_table_set(apr_table_t *t, const char *key, const char *val) argument 572 apr_table_setn(apr_table_t *t, const char *key, const char *val) argument 644 apr_table_unset(apr_table_t *t, const char *key) argument 698 apr_table_merge(apr_table_t *t, const char *key, const char *val) argument 735 apr_table_mergen(apr_table_t *t, const char *key, const char *val) argument 790 apr_table_add(apr_table_t *t, const char *key, const char *val) argument 810 apr_table_addn(apr_table_t *t, const char *key, const char *val) argument 1254 table_getm_do(void *v, const char *key, const char *val) argument 1280 apr_table_getm(apr_pool_t *p, const apr_table_t *t, const char *key) argument [all...] |
/freebsd-11-stable/contrib/gcc/ |
H A D | gthr-nks.h | 72 /* Initialize the thread storage key. */ 300 __gthread_key_create (__gthread_key_t *key, void (*dtor) (void *)) argument 302 return NXKeyCreate (dtor, NULL, key); 306 __gthread_key_dtor (__gthread_key_t key, void *ptr) argument 308 /* Just reset the key value to zero. */ 310 return NXKeySetValue (key, NULL); 315 __gthread_key_delete (__gthread_key_t key) argument 317 return NXKeyDelete (key); 321 __gthread_getspecific (__gthread_key_t key) argument 325 if (NXKeyGetValue (key, 331 __gthread_setspecific(__gthread_key_t key, const void *ptr) argument [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_base/bdb/ |
H A D | copies-table.c | 31 #include "../key-gen.h" 57 /* Create the initial `next-key' table entry. */ 60 DBT key, value; local 62 svn_fs_base__str_to_dbt(&key, NEXT_KEY_KEY), 82 DBT key, value; local 89 svn_fs_base__str_to_dbt(&key, copy_id); 94 &key, &value, 0)); 112 /* Get the current value associated with the `next-key' key in the 115 SVN_ERR(BDB_WRAP(fs, N_("allocating new copy ID (getting 'next-key')"), 163 DBT key; local 183 DBT key, value; local [all...] |
/freebsd-11-stable/sys/netpfil/ipfw/test/ |
H A D | test_dn_heap.c | 51 uint32_t hf(uintptr_t key, int flags, void *arg) argument 54 ((struct x *)key)->buf[0] : *(char *)key; 57 int matchf(void *obj, uintptr_t key, int flags, void *arg) argument 60 ((struct x *)key)->buf : (char *)key; 64 void *newfn(uintptr_t key, int flags, void *arg) argument 66 char *s = (char *)key; 151 uint64_t k = h.p[0].key; 156 printf("%d key [all...] |
/freebsd-11-stable/sys/geom/eli/ |
H A D | g_eli_hmac.c | 52 u_char k_ipad[128], k_opad[128], key[128]; local 56 bzero(key, sizeof(key)); 60 bcopy(hkey, key, hkeylen); 62 /* If key is longer than 128 bytes reset it to key = SHA512(key). */ 65 SHA512_Final(key, &lctx); 68 /* XOR key with ipad and opad values. */ 69 for (i = 0; i < sizeof(key); [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | ssh-ed25519.c | 36 ssh_ed25519_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, argument 50 if (key == NULL || 51 sshkey_type_plain(key->type) != KEY_ED25519 || 52 key->ed25519_sk == NULL || 60 key->ed25519_sk)) != 0 || smlen <= datalen) { 95 ssh_ed25519_verify(const struct sshkey *key, argument 107 if (key == NULL || 108 sshkey_type_plain(key->type) != KEY_ED25519 || 109 key->ed25519_pk == NULL || 144 key [all...] |
H A D | authfd.c | 206 struct sshkey *key; local 211 if ((key = sshkey_new(KEY_RSA1)) == NULL) 214 (r = sshbuf_get_bignum1(ids, key->rsa->e)) != 0 || 215 (r = sshbuf_get_bignum1(ids, key->rsa->n)) != 0 || 218 keybits = BN_num_bits(key->rsa->n); 225 *keyp = key; 226 key = NULL; 234 sshkey_free(key); 344 /* Gracefully skip unknown key types */ 390 ssh_decrypt_challenge(int sock, struct sshkey* key, BIGNU argument 431 agent_encode_alg(struct sshkey *key, const char *alg) argument 444 ssh_agent_sign(int sock, struct sshkey *key, u_char **sigp, size_t *lenp, const u_char *data, size_t datalen, const char *alg, u_int compat) argument 499 ssh_encode_identity_rsa1(struct sshbuf *b, RSA *key, const char *comment) argument 518 ssh_encode_identity_ssh2(struct sshbuf *b, struct sshkey *key, const char *comment) argument 553 ssh_add_identity_constrained(int sock, struct sshkey *key, const char *comment, u_int life, u_int confirm) argument 613 ssh_remove_identity(int sock, struct sshkey *key) argument [all...] |
/freebsd-11-stable/usr.sbin/ypldap/ |
H A D | yp.c | 326 char *key; local 328 log_debug("matching '%.*s' in map %s", arg->key.keydat_len, 329 arg->key.keydat_val, arg->map); 341 if (arg->key.keydat_len > YPMAXRECORD) { 345 key = calloc(arg->key.keydat_len + 1, 1); 346 if (key == NULL) 348 (void)strncpy(key, arg->key.keydat_val, arg->key 487 char *key; local 656 yp_make_keyval(struct ypresp_key_val *res, char *key, char *line) argument [all...] |
/freebsd-11-stable/lib/libc/iconv/ |
H A D | citrus_lookup_factory.c | 53 char data[LINE_MAX], key[LINE_MAX]; local 60 /* key */ 67 snprintf(key, sizeof(key), "%.*s", (int)(p-line), line); 68 _bcs_convert_to_lower(key); 75 return (_db_factory_addstr_by_s(df, key, data));
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_xcbc_d.c | 69 static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 75 DES_key_schedule ks; /* key schedule */ 101 static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 104 DES_cblock *deskey = (DES_cblock *)key; 107 memcpy(&data(ctx)->inw[0], &key[8], 8); 108 memcpy(&data(ctx)->outw[0], &key[16], 8); local
|
/freebsd-11-stable/contrib/expat/xmlwf/ |
H A D | xmlmime.c | 105 /* key must be lowercase ASCII */ 108 matchkey(const char *start, const char *end, const char *key) { argument 111 for (; start != end; start++, key++) 112 if (*start != *key && *start != 'A' + (*key - 'a')) 114 return *key == '\0';
|
H A D | ct.c | 101 /* key must be lowercase ASCII */ 104 matchkey(const char *start, const char *end, const char *key) { argument 107 for (; start != end; start++, key++) 108 if (*start != *key && *start != 'A' + (*key - 'a')) 110 return *key == '\0';
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | locks.h | 176 #define ub_thread_key_create(key, f) LOCKRET(pthread_key_create(key, f)) 177 #define ub_thread_key_set(key, v) LOCKRET(pthread_setspecific(key, v)) 178 #define ub_thread_key_get(key) pthread_getspecific(key) 214 #define ub_thread_key_create(key, f) LOCKRET(thr_keycreate(key, f)) 215 #define ub_thread_key_set(key, v) LOCKRET(thr_setspecific(key, [all...] |
/freebsd-11-stable/contrib/llvm-project/lld/Common/ |
H A D | Args.cpp | 29 int64_t lld::args::getInteger(opt::InputArgList &args, unsigned key, 31 auto *a = args.getLastArg(key); 52 StringRef key, uint64_t Default) { 55 if (kv.first == key) { 58 error("invalid " + key + ": " + kv.second); 51 getZOptionValue(opt::InputArgList &args, int id, StringRef key, uint64_t Default) argument
|
/freebsd-11-stable/contrib/apr-util/include/private/ |
H A D | apr_crypto_internal.h | 52 * @param params - array of key parameters 61 * @brief Get a hash table of key types, keyed by the name of the type against 64 * @param types - hashtable of key types keyed to constants. 72 * @brief Get a hash table of key modes, keyed by the name of the mode against 75 * @param modes - hashtable of key modes keyed to constants. 83 * @brief Create a key from the given passphrase. By default, the PBKDF2 84 * algorithm is used to generate the key from the passphrase. It is expected 85 * that the same pass phrase will generate the same key, regardless of the 86 * backend crypto platform used. The key is cleaned up when the context 89 * @note If *key i 286 apr_status_t (*key)(apr_crypto_key_t **key, const apr_crypto_key_rec_t *rec, member in struct:apr_crypto_driver_t [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | cache-null.c | 35 const void *key, 48 const void *key, 58 const void *key, 84 const void *key, 96 const void *key, 32 null_cache_get(void **value_p, svn_boolean_t *found, void *cache_void, const void *key, apr_pool_t *result_pool) argument 46 null_cache_has_key(svn_boolean_t *found, void *cache_void, const void *key, apr_pool_t *scratch_pool) argument 57 null_cache_set(void *cache_void, const void *key, void *value, apr_pool_t *scratch_pool) argument 81 null_cache_get_partial(void **value_p, svn_boolean_t *found, void *cache_void, const void *key, svn_cache__partial_getter_func_t func, void *baton, apr_pool_t *result_pool) argument 95 null_cache_set_partial(void *cache_void, const void *key, svn_cache__partial_setter_func_t func, void *baton, apr_pool_t *scratch_pool) argument
|