Searched refs:keys (Results 101 - 125 of 272) sorted by relevance

1234567891011

/freebsd-13-stable/crypto/openssh/
H A Dssh-add.c175 * to remove all keys, attempt to remove both protocol v.1 and v.2
176 * keys.
288 if (!sshkey_equal_public(idlist->keys[i], private))
290 left = sshkey_signatures_left(idlist->keys[i]);
439 fp = sshkey_fingerprint(idlist->keys[i],
441 printf("%u %s %s (%s)\n", sshkey_size(idlist->keys[i]),
443 sshkey_type(idlist->keys[i]));
446 if ((r = sshkey_write(idlist->keys[i], stdout)) != 0) {
452 left = sshkey_signatures_left(idlist->keys[i]);
516 fprintf(stderr, " -k Load only keys an
[all...]
H A Dssh-pkcs11-helper.c113 struct sshkey **keys; local
124 if ((nkeys = pkcs11_add_provider(name, pin, &keys)) > 0) {
130 if ((r = sshkey_to_blob(keys[i], &blob, &blen)) != 0) {
140 add_key(keys[i], name);
142 free(keys);
H A Dauthfd.c64 #define MAX_AGENT_IDENTITIES 2048 /* Max keys in agent reply */
272 /* Deserialise the response into a list of keys/comments */
274 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL ||
280 if ((r = deserialise_identity2(msg, &(idl->keys[i]),
310 if (idl->keys != NULL)
311 sshkey_free(idl->keys[i]);
556 * keys from an agent, we generally want to clear both protocol v1 and v2
557 * keys.
/freebsd-13-stable/contrib/ldns/
H A Ddnssec_verify.c106 ldns_rr_list *keys; local
112 keys = ldns_pkt_rr_list_by_name_and_type(
118 if (!keys) {
125 keys = ldns_pkt_rr_list_by_name_and_type(
133 keys,
142 keys,
147 ldns_rr_list_deep_free(keys);
161 /* okay, either we have other keys signing the current one,
1093 const ldns_rr_list *keys,
1101 if (!rrset || !rrsig || !keys) {
1090 ldns_verify_time( const ldns_rr_list *rrset, const ldns_rr_list *rrsig, const ldns_rr_list *keys, time_t check_time, ldns_rr_list *good_keys ) argument
1134 ldns_verify(ldns_rr_list *rrset, ldns_rr_list *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument
1141 ldns_verify_notime(ldns_rr_list *rrset, ldns_rr_list *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument
1181 ldns_fetch_valid_domain_keys_time(const ldns_resolver *res, const ldns_rdf *domain, const ldns_rr_list *keys, time_t check_time, ldns_status *status) argument
1249 ldns_fetch_valid_domain_keys(const ldns_resolver *res, const ldns_rdf *domain, const ldns_rr_list *keys, ldns_status *status) argument
1259 ldns_validate_domain_dnskey_time( const ldns_resolver * res, const ldns_rdf * domain, const ldns_rr_list * keys, time_t check_time ) argument
1353 ldns_validate_domain_dnskey(const ldns_resolver * res, const ldns_rdf * domain, const ldns_rr_list * keys) argument
1362 ldns_validate_domain_ds_time( const ldns_resolver *res, const ldns_rdf * domain, const ldns_rr_list * keys, time_t check_time) argument
1410 ldns_validate_domain_ds(const ldns_resolver *res, const ldns_rdf * domain, const ldns_rr_list * keys) argument
2423 ldns_verify_rrsig_keylist_time( const ldns_rr_list *rrset, const ldns_rr *rrsig, const ldns_rr_list *keys, time_t check_time, ldns_rr_list *good_keys) argument
2463 ldns_verify_rrsig_keylist(ldns_rr_list *rrset, ldns_rr *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument
2473 ldns_verify_rrsig_keylist_notime(const ldns_rr_list *rrset, const ldns_rr *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument
[all...]
/freebsd-13-stable/contrib/mandoc/
H A Dtbl_layout.c40 static const struct tbl_phrase keys[] = { variable in typeref:struct:tbl_phrase
53 #define KEYS_MAX ((int)(sizeof(keys)/sizeof(keys[0])))
234 if (tolower((unsigned char)p[*pos]) == keys[i].name)
243 c = keys[i].key;
/freebsd-13-stable/contrib/llvm-project/lldb/source/Symbol/
H A DLocateSymbolFileMacOSX.cpp373 CFStringRef *keys = local
377 if (keys != nullptr && values != nullptr) {
379 (const void **)keys,
385 if (keys[i] && CFGetTypeID(keys[i]) == CFStringGetTypeID()) {
386 CFCString::FileSystemRepresentation(keys[i], DBGBuildSourcePath);
425 if (keys)
426 free(keys);
611 std::vector<CFStringRef> keys(num_values, NULL);
/freebsd-13-stable/contrib/ntp/ntpd/
H A DMakefile.in647 man5_MANS = ntp.conf.5 ntp.keys.5
679 invoke-ntp.keys.menu \
680 invoke-ntp.keys.texi \
691 ntp.keys.5man \
692 ntp.keys.5mdoc \
693 ntp.keys.def \
694 ntp.keys.man.in \
695 ntp.keys.mdoc.in \
696 ntp.keys.html \
697 ntp.keys
[all...]
/freebsd-13-stable/cddl/contrib/opensolaris/lib/pyzfs/common/
H A Dallow.py62 for whokey in raw.keys():
63 perms = raw[whokey].keys()
239 for whokey in raw.keys():
247 if permname in perms_subcmd.keys() or permname in perms_other.keys():
333 for fs in sorted(p.keys(), reverse=True):
/freebsd-13-stable/lib/libnetmap/
H A Dlibnetmap.h97 * For multi-key options, the keys can be assigned in any order, but they
99 * option keys: unmentioned keys will receive default values. Some multi-key
106 * The currently available options are (default keys, when defined, are marked
119 * The keys are:
132 * (more specific keys override the less specific ones)
133 * All keys default to zero if not assigned, and the
140 * The keys are:
150 * file must be assigned. The other keys default to zero,
481 * keys mentione
522 struct nmreq_opt_key keys[NMREQ_OPT_MAXKEYS]; member in struct:nmreq_opt_parser
534 const char *keys[NMREQ_OPT_MAXKEYS]; member in struct:nmreq_parse_ctx
[all...]
/freebsd-13-stable/contrib/cortex-strings/scripts/
H A Dbench.py53 VARIANTS = sorted(HAS.keys())
54 FUNCTIONS = sorted(ALIGNMENTS.keys())
/freebsd-13-stable/contrib/googletest/googletest/test/
H A Dgtest_xml_test_utils.py77 actual_node.tagName, expected_attributes.keys(),
78 actual_attributes.keys()))
/freebsd-13-stable/tools/tools/commitsdb/
H A Dquery_commit_db39 foreach (sort keys %possible_files) {
/freebsd-13-stable/contrib/subversion/subversion/include/
H A Dsvn_hash.h73 * have <tt>const char *</tt> keys and <tt>svn_string_t *</tt> values.
89 * hash has <tt>const char *</tt> keys and <tt>svn_string_t *</tt>
116 * keys which differ between @a hash and @a oldhash, and also writes
117 * out deletion lines for keys which are present in @a oldhash but not
188 * For each key in the union of @a hash_a's and @a hash_b's keys, invoke
193 * Process all keys of @a hash_a first, then all remaining keys of @a hash_b.
220 * Return the keys to @a hash in @a *array. The keys are assumed to be
221 * (const char *). The keys ar
[all...]
/freebsd-13-stable/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_program/
H A Dzfs_program_json.ksh100 # the same as the input and the --sort-keys option was added. Detect when
101 # --sort-keys is supported and apply the option to ensure the expected order.
103 if python -m json.tool --sort-keys <<< "{}"; then
104 JSON_TOOL_CMD="python -m json.tool --sort-keys"
/freebsd-13-stable/crypto/heimdal/lib/wind/
H A Dstringprep.py41 for table in source.keys():
/freebsd-13-stable/usr.bin/sort/
H A Dcoll.h111 * Set of keys container object.
146 extern struct key_specs *keys;
H A Dsort.c1046 keys = sort_realloc(keys, keys_num *
1048 memset(&(keys[keys_num - 1]), 0,
1051 if (parse_k(optarg, &(keys[keys_num - 1]))
1210 keys = sort_realloc(keys, sizeof(struct key_specs));
1211 memset(&(keys[0]), 0, sizeof(struct key_specs));
1212 keys[0].c1 = 1;
1213 keys[0].pos1b = default_sort_mods->bflag;
1214 keys[
[all...]
/freebsd-13-stable/bin/stty/
H A Dkey.c74 } keys[] = { variable in typeref:struct:key
118 if (!(kp = (struct key *)bsearch(&tmp, keys,
119 sizeof(keys)/sizeof(struct key), sizeof(struct key), c_key)))
/freebsd-13-stable/contrib/ntp/sntp/
H A Dcrypto.c211 /* Load keys from the specified keyfile into the key structures.
213 * number of keys it read
218 struct key **keys
291 *keys = act;
307 key_ptr = *keys;
/freebsd-13-stable/contrib/ncurses/ncurses/
H A DMakefile.in178 keys.list
232 init_keytry.h: make_keys$(BUILD_EXEEXT) keys.list
233 ./make_keys$(BUILD_EXEEXT) keys.list > $@
235 keys.list : $(tinfo)/MKkeys_list.sh
272 ./lib_keyname.c: keys.list $(base)/MKkeyname.awk
273 $(AWK) -f $(base)/MKkeyname.awk bigstrings=$(USE_BIG_STRINGS) keys.list > $@
/freebsd-13-stable/contrib/subversion/subversion/libsvn_fs_x/
H A Dtemp_serializer.c507 /* reference to the keys */
508 const char **keys; member in struct:properties_data_t
571 properties.keys = apr_palloc(pool, sizeof(const char*) * (properties.count + 1));
577 properties.keys[i] = apr_hash_this_key(hi);
587 properties.keys[i] = "";
588 serialize_cstring_array(context, &properties.keys, properties.count + 1);
611 svn_temp_deserializer__resolve(properties, (void**)&properties->keys);
617 apr_size_t len = properties->keys[i+1] - properties->keys[i] - 1;
618 svn_temp_deserializer__resolve(properties->keys,
[all...]
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Deap_tls_common.c360 * @label: Label string for deriving the keys, e.g., "client EAP encryption"
411 struct tls_random keys; local
438 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys) ||
439 keys.client_random == NULL || keys.server_random == NULL)
442 *len = 1 + keys.client_random_len + keys.server_random_len;
449 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
450 os_memcpy(out + 1 + keys
[all...]
/freebsd-13-stable/crypto/heimdal/lib/kadm5/
H A Dlog.c701 for (i = 0; i < ent.entry.keys.len; ++i)
702 free_Key(&ent.entry.keys.val[i]);
703 free (ent.entry.keys.val);
705 num = log_ent.entry.keys.len;
707 ent.entry.keys.len = num;
708 ent.entry.keys.val = malloc(len * sizeof(*ent.entry.keys.val));
709 if (ent.entry.keys.val == NULL) {
713 for (i = 0; i < ent.entry.keys.len; ++i) {
714 ret = copy_Key(&log_ent.entry.keys
[all...]
/freebsd-13-stable/contrib/wpa/src/tls/
H A Dtlsv1_client.c742 * @keys: Structure of random data (filled on success)
745 int tlsv1_client_get_random(struct tlsv1_client *conn, struct tls_random *keys) argument
747 os_memset(keys, 0, sizeof(*keys));
751 keys->client_random = conn->client_random;
752 keys->client_random_len = TLS_RANDOM_LEN;
755 keys->server_random = conn->server_random;
756 keys->server_random_len = TLS_RANDOM_LEN;
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dks_file.c380 hx509_private_key *keys = NULL; local
477 ret = _hx509_collector_collect_private_keys(context, pem_ctx.c, &keys);
481 for (i = 0; keys[i]; i++)
482 _hx509_certs_keys_add(context, ksf->certs, keys[i]);
483 _hx509_certs_keys_free(context, keys);
626 hx509_private_key **keys)
629 return _hx509_certs_keys_get(context, ksf->certs, keys);
623 file_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument

Completed in 370 milliseconds

1234567891011