/freebsd-13-stable/crypto/openssh/ |
H A D | ssh-add.c | 175 * to remove all keys, attempt to remove both protocol v.1 and v.2 176 * keys. 288 if (!sshkey_equal_public(idlist->keys[i], private)) 290 left = sshkey_signatures_left(idlist->keys[i]); 439 fp = sshkey_fingerprint(idlist->keys[i], 441 printf("%u %s %s (%s)\n", sshkey_size(idlist->keys[i]), 443 sshkey_type(idlist->keys[i])); 446 if ((r = sshkey_write(idlist->keys[i], stdout)) != 0) { 452 left = sshkey_signatures_left(idlist->keys[i]); 516 fprintf(stderr, " -k Load only keys an [all...] |
H A D | ssh-pkcs11-helper.c | 113 struct sshkey **keys; local 124 if ((nkeys = pkcs11_add_provider(name, pin, &keys)) > 0) { 130 if ((r = sshkey_to_blob(keys[i], &blob, &blen)) != 0) { 140 add_key(keys[i], name); 142 free(keys);
|
H A D | authfd.c | 64 #define MAX_AGENT_IDENTITIES 2048 /* Max keys in agent reply */ 272 /* Deserialise the response into a list of keys/comments */ 274 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL || 280 if ((r = deserialise_identity2(msg, &(idl->keys[i]), 310 if (idl->keys != NULL) 311 sshkey_free(idl->keys[i]); 556 * keys from an agent, we generally want to clear both protocol v1 and v2 557 * keys.
|
/freebsd-13-stable/contrib/ldns/ |
H A D | dnssec_verify.c | 106 ldns_rr_list *keys; local 112 keys = ldns_pkt_rr_list_by_name_and_type( 118 if (!keys) { 125 keys = ldns_pkt_rr_list_by_name_and_type( 133 keys, 142 keys, 147 ldns_rr_list_deep_free(keys); 161 /* okay, either we have other keys signing the current one, 1093 const ldns_rr_list *keys, 1101 if (!rrset || !rrsig || !keys) { 1090 ldns_verify_time( const ldns_rr_list *rrset, const ldns_rr_list *rrsig, const ldns_rr_list *keys, time_t check_time, ldns_rr_list *good_keys ) argument 1134 ldns_verify(ldns_rr_list *rrset, ldns_rr_list *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument 1141 ldns_verify_notime(ldns_rr_list *rrset, ldns_rr_list *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument 1181 ldns_fetch_valid_domain_keys_time(const ldns_resolver *res, const ldns_rdf *domain, const ldns_rr_list *keys, time_t check_time, ldns_status *status) argument 1249 ldns_fetch_valid_domain_keys(const ldns_resolver *res, const ldns_rdf *domain, const ldns_rr_list *keys, ldns_status *status) argument 1259 ldns_validate_domain_dnskey_time( const ldns_resolver * res, const ldns_rdf * domain, const ldns_rr_list * keys, time_t check_time ) argument 1353 ldns_validate_domain_dnskey(const ldns_resolver * res, const ldns_rdf * domain, const ldns_rr_list * keys) argument 1362 ldns_validate_domain_ds_time( const ldns_resolver *res, const ldns_rdf * domain, const ldns_rr_list * keys, time_t check_time) argument 1410 ldns_validate_domain_ds(const ldns_resolver *res, const ldns_rdf * domain, const ldns_rr_list * keys) argument 2423 ldns_verify_rrsig_keylist_time( const ldns_rr_list *rrset, const ldns_rr *rrsig, const ldns_rr_list *keys, time_t check_time, ldns_rr_list *good_keys) argument 2463 ldns_verify_rrsig_keylist(ldns_rr_list *rrset, ldns_rr *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument 2473 ldns_verify_rrsig_keylist_notime(const ldns_rr_list *rrset, const ldns_rr *rrsig, const ldns_rr_list *keys, ldns_rr_list *good_keys) argument [all...] |
/freebsd-13-stable/contrib/mandoc/ |
H A D | tbl_layout.c | 40 static const struct tbl_phrase keys[] = { variable in typeref:struct:tbl_phrase 53 #define KEYS_MAX ((int)(sizeof(keys)/sizeof(keys[0]))) 234 if (tolower((unsigned char)p[*pos]) == keys[i].name) 243 c = keys[i].key;
|
/freebsd-13-stable/contrib/llvm-project/lldb/source/Symbol/ |
H A D | LocateSymbolFileMacOSX.cpp | 373 CFStringRef *keys = local 377 if (keys != nullptr && values != nullptr) { 379 (const void **)keys, 385 if (keys[i] && CFGetTypeID(keys[i]) == CFStringGetTypeID()) { 386 CFCString::FileSystemRepresentation(keys[i], DBGBuildSourcePath); 425 if (keys) 426 free(keys); 611 std::vector<CFStringRef> keys(num_values, NULL);
|
/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | Makefile.in | 647 man5_MANS = ntp.conf.5 ntp.keys.5 679 invoke-ntp.keys.menu \ 680 invoke-ntp.keys.texi \ 691 ntp.keys.5man \ 692 ntp.keys.5mdoc \ 693 ntp.keys.def \ 694 ntp.keys.man.in \ 695 ntp.keys.mdoc.in \ 696 ntp.keys.html \ 697 ntp.keys [all...] |
/freebsd-13-stable/cddl/contrib/opensolaris/lib/pyzfs/common/ |
H A D | allow.py | 62 for whokey in raw.keys(): 63 perms = raw[whokey].keys() 239 for whokey in raw.keys(): 247 if permname in perms_subcmd.keys() or permname in perms_other.keys(): 333 for fs in sorted(p.keys(), reverse=True):
|
/freebsd-13-stable/lib/libnetmap/ |
H A D | libnetmap.h | 97 * For multi-key options, the keys can be assigned in any order, but they 99 * option keys: unmentioned keys will receive default values. Some multi-key 106 * The currently available options are (default keys, when defined, are marked 119 * The keys are: 132 * (more specific keys override the less specific ones) 133 * All keys default to zero if not assigned, and the 140 * The keys are: 150 * file must be assigned. The other keys default to zero, 481 * keys mentione 522 struct nmreq_opt_key keys[NMREQ_OPT_MAXKEYS]; member in struct:nmreq_opt_parser 534 const char *keys[NMREQ_OPT_MAXKEYS]; member in struct:nmreq_parse_ctx [all...] |
/freebsd-13-stable/contrib/cortex-strings/scripts/ |
H A D | bench.py | 53 VARIANTS = sorted(HAS.keys()) 54 FUNCTIONS = sorted(ALIGNMENTS.keys())
|
/freebsd-13-stable/contrib/googletest/googletest/test/ |
H A D | gtest_xml_test_utils.py | 77 actual_node.tagName, expected_attributes.keys(), 78 actual_attributes.keys()))
|
/freebsd-13-stable/tools/tools/commitsdb/ |
H A D | query_commit_db | 39 foreach (sort keys %possible_files) {
|
/freebsd-13-stable/contrib/subversion/subversion/include/ |
H A D | svn_hash.h | 73 * have <tt>const char *</tt> keys and <tt>svn_string_t *</tt> values. 89 * hash has <tt>const char *</tt> keys and <tt>svn_string_t *</tt> 116 * keys which differ between @a hash and @a oldhash, and also writes 117 * out deletion lines for keys which are present in @a oldhash but not 188 * For each key in the union of @a hash_a's and @a hash_b's keys, invoke 193 * Process all keys of @a hash_a first, then all remaining keys of @a hash_b. 220 * Return the keys to @a hash in @a *array. The keys are assumed to be 221 * (const char *). The keys ar [all...] |
/freebsd-13-stable/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_program/ |
H A D | zfs_program_json.ksh | 100 # the same as the input and the --sort-keys option was added. Detect when 101 # --sort-keys is supported and apply the option to ensure the expected order. 103 if python -m json.tool --sort-keys <<< "{}"; then 104 JSON_TOOL_CMD="python -m json.tool --sort-keys"
|
/freebsd-13-stable/crypto/heimdal/lib/wind/ |
H A D | stringprep.py | 41 for table in source.keys():
|
/freebsd-13-stable/usr.bin/sort/ |
H A D | coll.h | 111 * Set of keys container object. 146 extern struct key_specs *keys;
|
H A D | sort.c | 1046 keys = sort_realloc(keys, keys_num * 1048 memset(&(keys[keys_num - 1]), 0, 1051 if (parse_k(optarg, &(keys[keys_num - 1])) 1210 keys = sort_realloc(keys, sizeof(struct key_specs)); 1211 memset(&(keys[0]), 0, sizeof(struct key_specs)); 1212 keys[0].c1 = 1; 1213 keys[0].pos1b = default_sort_mods->bflag; 1214 keys[ [all...] |
/freebsd-13-stable/bin/stty/ |
H A D | key.c | 74 } keys[] = { variable in typeref:struct:key 118 if (!(kp = (struct key *)bsearch(&tmp, keys, 119 sizeof(keys)/sizeof(struct key), sizeof(struct key), c_key)))
|
/freebsd-13-stable/contrib/ntp/sntp/ |
H A D | crypto.c | 211 /* Load keys from the specified keyfile into the key structures. 213 * number of keys it read 218 struct key **keys 291 *keys = act; 307 key_ptr = *keys;
|
/freebsd-13-stable/contrib/ncurses/ncurses/ |
H A D | Makefile.in | 178 keys.list 232 init_keytry.h: make_keys$(BUILD_EXEEXT) keys.list 233 ./make_keys$(BUILD_EXEEXT) keys.list > $@ 235 keys.list : $(tinfo)/MKkeys_list.sh 272 ./lib_keyname.c: keys.list $(base)/MKkeyname.awk 273 $(AWK) -f $(base)/MKkeyname.awk bigstrings=$(USE_BIG_STRINGS) keys.list > $@
|
/freebsd-13-stable/contrib/subversion/subversion/libsvn_fs_x/ |
H A D | temp_serializer.c | 507 /* reference to the keys */ 508 const char **keys; member in struct:properties_data_t 571 properties.keys = apr_palloc(pool, sizeof(const char*) * (properties.count + 1)); 577 properties.keys[i] = apr_hash_this_key(hi); 587 properties.keys[i] = ""; 588 serialize_cstring_array(context, &properties.keys, properties.count + 1); 611 svn_temp_deserializer__resolve(properties, (void**)&properties->keys); 617 apr_size_t len = properties->keys[i+1] - properties->keys[i] - 1; 618 svn_temp_deserializer__resolve(properties->keys, [all...] |
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.c | 360 * @label: Label string for deriving the keys, e.g., "client EAP encryption" 411 struct tls_random keys; local 438 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys) || 439 keys.client_random == NULL || keys.server_random == NULL) 442 *len = 1 + keys.client_random_len + keys.server_random_len; 449 os_memcpy(out + 1, keys.client_random, keys.client_random_len); 450 os_memcpy(out + 1 + keys [all...] |
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | log.c | 701 for (i = 0; i < ent.entry.keys.len; ++i) 702 free_Key(&ent.entry.keys.val[i]); 703 free (ent.entry.keys.val); 705 num = log_ent.entry.keys.len; 707 ent.entry.keys.len = num; 708 ent.entry.keys.val = malloc(len * sizeof(*ent.entry.keys.val)); 709 if (ent.entry.keys.val == NULL) { 713 for (i = 0; i < ent.entry.keys.len; ++i) { 714 ret = copy_Key(&log_ent.entry.keys [all...] |
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_client.c | 742 * @keys: Structure of random data (filled on success) 745 int tlsv1_client_get_random(struct tlsv1_client *conn, struct tls_random *keys) argument 747 os_memset(keys, 0, sizeof(*keys)); 751 keys->client_random = conn->client_random; 752 keys->client_random_len = TLS_RANDOM_LEN; 755 keys->server_random = conn->server_random; 756 keys->server_random_len = TLS_RANDOM_LEN;
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 380 hx509_private_key *keys = NULL; local 477 ret = _hx509_collector_collect_private_keys(context, pem_ctx.c, &keys); 481 for (i = 0; keys[i]; i++) 482 _hx509_certs_keys_add(context, ksf->certs, keys[i]); 483 _hx509_certs_keys_free(context, keys); 626 hx509_private_key **keys) 629 return _hx509_certs_keys_get(context, ksf->certs, keys); 623 file_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument
|