/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | misc.c | 126 * available keys and return the most preferred key. 135 Key **key) 146 ret = hdb_enctype2key(context, &h->entry, p[i], key); 154 *key = NULL; 157 if (krb5_enctype_valid(context, h->entry.keys.val[i].key.keytype) 161 h->entry.keys.val[i].key.keytype, key); 165 *enctype = (*key)->key.keytype; 171 "No valid kerberos key foun 130 _kdc_get_preferred_key(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *h, const char *name, krb5_enctype *enctype, Key **key) argument [all...] |
H A D | hprop.h | 62 DES_cblock key; member in struct:v4_principal
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | keyscan.sh | 11 KEYTYPES=`${SSH} -Q key-plain`
|
/freebsd-11-stable/crypto/openssl/crypto/des/ |
H A D | read2pwd.c | 117 int DES_read_password(DES_cblock *key, const char *prompt, int verify) argument 123 DES_string_to_key(buf, key);
|
/freebsd-11-stable/lib/libc/iconv/ |
H A D | citrus_hash.h | 48 #define _CITRUS_HASH_SEARCH(head, elm, field, matchfunc, key, hashval) \ 51 if (matchfunc((elm), key) == 0) \
|
/freebsd-11-stable/crypto/openssl/crypto/idea/ |
H A D | idea.h | 86 void private_idea_set_encrypt_key(const unsigned char *key, 89 void idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks);
|
/freebsd-11-stable/usr.sbin/ndiscvt/ |
H A D | inf.h | 19 const char * key; member in struct:assign 31 const char * key; member in struct:reg
|
/freebsd-11-stable/sys/dev/liquidio/ |
H A D | lio_rss.h | 69 uint8_t key[LIO_RSS_KEY_SZ]; member in struct:lio_rss_params 74 uint8_t key[LIO_RSS_KEY_SZ]; member in struct:lio_rss_params_set
|
/freebsd-11-stable/contrib/llvm-project/lld/include/lld/Common/ |
H A D | Args.h | 28 int64_t getInteger(llvm::opt::InputArgList &args, unsigned key, 33 uint64_t getZOptionValue(llvm::opt::InputArgList &args, int id, StringRef key,
|
/freebsd-11-stable/sys/compat/linuxkpi/common/include/linux/ |
H A D | lockdep.h | 38 #define lockdep_set_class(lock, key) 40 #define lockdep_set_class_and_name(lock, key, name)
|
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_cryptor_private.h | 58 uint8_t key[AES_MAX_KEY_SIZE]; member in struct:__anon5 95 uint8_t key[AES_MAX_KEY_SIZE]; member in struct:__anon7 119 uint8_t key[AES_MAX_KEY_SIZE]; member in struct:__anon8 134 uint8_t key[AES_MAX_KEY_SIZE]; member in struct:__anon9 153 #define archive_decrypto_aes_ctr_init(ctx, key, key_len) \ 154 __archive_cryptor.decrypto_aes_ctr_init(ctx, key, key_len) 160 #define archive_encrypto_aes_ctr_init(ctx, key, key_len) \ 161 __archive_cryptor.encrypto_aes_ctr_init(ctx, key, key_len)
|
/freebsd-11-stable/contrib/ofed/opensm/complib/ |
H A D | cl_event_wheel.c | 101 p_event->pfn_aged_callback(p_event->key, 239 CL_DBG("cl_event_wheel_dump: Found event key:<0x%" 241 p_event->key, p_event->num_regs, p_event->aging_time); 265 " key:<0x%" PRIx64 ">\n", p_event->key); 285 IN const uint64_t key, 302 /* Make sure such a key does not exists */ 303 p_map_item = cl_qmap_get(&p_event_wheel->events_map, key); 305 CL_DBG("cl_event_wheel_reg: Already exists key:0x%" 306 PRIx64 "\n", key); 284 cl_event_wheel_reg(IN cl_event_wheel_t * const p_event_wheel, IN const uint64_t key, IN const uint64_t aging_time_usec, IN cl_pfn_event_aged_cb_t pfn_callback, IN void *const context) argument 398 cl_event_wheel_unreg(IN cl_event_wheel_t * const p_event_wheel, IN uint64_t key) argument 434 cl_event_wheel_num_regs(IN cl_event_wheel_t * const p_event_wheel, IN uint64_t key) argument 505 __test_event_aging(uint64_t key, uint32_t num_regs, void *context) argument [all...] |
/freebsd-11-stable/contrib/sendmail/libsmdb/ |
H A D | smcdb.c | 48 static int smcdb_del __P((SMDB_DATABASE *database, SMDB_DBENT *key, unsigned int flags)); 51 static int smcdb_get __P((SMDB_DATABASE *database, SMDB_DBENT *key, SMDB_DBENT *data, unsigned int flags)); 52 static int smcdb_put __P((SMDB_DATABASE *database, SMDB_DBENT *key, SMDB_DBENT *data, unsigned int flags)); 57 static int smcdb_cursor_get __P((SMDB_CURSOR *cursor, SMDB_DBENT *key, SMDB_DBENT *value, SMDB_FLAG flags)); 58 static int smcdb_cursor_put __P((SMDB_CURSOR *cursor, SMDB_DBENT *key, SMDB_DBENT *value, SMDB_FLAG flags)); 151 smcdb_del(database, key, flags) 153 SMDB_DBENT *key; 206 smcdb_get(database, key, data, flags) 208 SMDB_DBENT *key; 224 key [all...] |
/freebsd-11-stable/contrib/ntp/sntp/libevent/include/event2/ |
H A D | keyvalq_struct.h | 61 char *key; member in struct:evkeyval
|
/freebsd-11-stable/contrib/gcc/ |
H A D | gthr-posix.c | 44 pthread_key_create (pthread_key_t *key ATTRIBUTE_UNUSED, 51 pthread_key_delete (pthread_key_t key ATTRIBUTE_UNUSED) 57 pthread_getspecific (pthread_key_t key ATTRIBUTE_UNUSED) 63 pthread_setspecific (pthread_key_t key ATTRIBUTE_UNUSED,
|
/freebsd-11-stable/contrib/libreadline/ |
H A D | rldefs.h | 103 /* If you cast map[key].function to type (Keymap) on a Cray, 104 the compiler takes the value of map[key].function and 109 # define FUNCTION_TO_KEYMAP(map, key) (Keymap)((int)map[key].function) 112 # define FUNCTION_TO_KEYMAP(map, key) (Keymap)(map[key].function)
|
/freebsd-11-stable/contrib/apr/file_io/unix/ |
H A D | fileacc.c | 108 APR_DECLARE(apr_status_t) apr_file_data_get(void **data, const char *key, 111 return apr_pool_userdata_get(data, key, file->pool); 115 const char *key, 118 return apr_pool_userdata_set(data, key, cleanup, file->pool);
|
/freebsd-11-stable/contrib/tcp_wrappers/ |
H A D | update.c | 40 int key; local 43 while ((key = va_arg(ap, int)) > 0) { 44 switch (key) { 46 tcpd_warn("request_fill: invalid key: %d", key);
|
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | del_enctype.c | 91 krb5_key_data *key = &princ.key_data[i]; local 95 if (etypes[k] == key->key_data_type[0]) { 100 new_key_data[j++] = *key; 104 kadm5_free_key_data (kadm_handle, &ignore, key);
|
/freebsd-11-stable/lib/libc/rpc/ |
H A D | getpublickey.c | 41 * Public key lookup routines 62 * Get somebody's public key 90 getpublicandprivatekey(const char *key, char *ret) argument 122 err = yp_match(domain, PKMAP, key, strlen(key), &lookup, &len); 156 if (strcmp(mkey, key) == 0) {
|
/freebsd-11-stable/lib/libc/db/recno/ |
H A D | rec_utils.c | 51 * e: key/data pair to be returned 53 * key: user's key structure 60 __rec_ret(BTREE *t, EPG *e, recno_t nrec, DBT *key, DBT *data) argument 65 if (key == NULL) 68 /* We have to copy the key, it's not on the page. */ 77 key->size = sizeof(recno_t); 78 key->data = t->bt_rkey.data;
|
/freebsd-11-stable/sys/dev/random/ |
H A D | hash.h | 47 keyInstance key; /* Key schedule */ member in struct:randomdev_key
|
/freebsd-11-stable/contrib/openresolv/ |
H A D | libc.in | 39 local key="$1" x= line= 45 "$key"*) echo "${line##$key}";; 52 "$key"*) echo "${line##$key}";; 61 local key x line found 65 for key do 67 "$key"*|"#"*|" "*|" "*|"") found=true;;
|
/freebsd-11-stable/crypto/openssh/ |
H A D | mac.h | 35 u_char *key; member in struct:sshmac
|
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_secalgo.h | 97 * @param key: public key data from DNSKEY RR. 105 unsigned char* key, unsigned int keylen, char** reason);
|