/freebsd-13-stable/contrib/ofed/opensm/opensm/ |
H A D | osm_db_files.c | 690 cl_list_t keys; local 696 cl_list_construct(&keys); 697 cl_list_init(&keys, 10); 717 if (osm_db_keys(p_dbd, &keys)) { 718 printf("failed to get keys\n"); 720 kI = cl_list_head(&keys); 721 while (kI != cl_list_end(&keys)) { 730 cl_list_remove_all(&keys); 753 if (osm_db_keys(p_dbd, &keys)) { 754 printf("failed to get keys\ [all...] |
/freebsd-13-stable/contrib/llvm-project/lldb/include/lldb/API/ |
H A D | SBStructuredData.h | 51 /// Fill keys with the keys in this object and return true if this data 53 bool GetKeys(lldb::SBStringList &keys) const;
|
/freebsd-13-stable/contrib/llvm-project/lldb/source/API/ |
H A D | SBStructuredData.cpp | 123 bool SBStructuredData::GetKeys(lldb::SBStringList &keys) const { 125 (lldb::SBStringList &), keys); 145 key_arr->ForEach([&keys] (StructuredData::Object *object) -> bool { 147 keys.AppendString(key.str().c_str());
|
/freebsd-13-stable/contrib/unbound/validator/ |
H A D | autotrust.h | 96 /** the keys */ 97 struct autr_ta* keys; member in struct:autr_point_data
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.h | 36 struct ikev2_keys keys; member in struct:ikev2_responder_data
|
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.h | 35 struct ikev2_keys keys; member in struct:ikev2_initiator_data
|
/freebsd-13-stable/crypto/heimdal/admin/ |
H A D | change.c | 47 krb5_keyblock *keys; local 99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); 113 new_entry.keyblock = keys[i]; 118 krb5_free_keyblock_contents (context, &keys[i]); 125 * their keys, writing the new keys
|
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | init.c | 49 krb5_keyblock *keys; local 86 /* Replace the string2key based keys with real random bytes */ 87 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys); 94 krb5_free_keyblock_contents(context, &keys[i]); 95 free(keys);
|
H A D | load.c | 146 * Parse dumped keys in `str' and store them in `ent' 165 key = realloc(ent->keys.val, 166 (ent->keys.len + 1) * sizeof(*ent->keys.val)); 169 ent->keys.val = key; 170 key = ent->keys.val + ent->keys.len; 171 ent->keys.len++; 459 fprintf (stderr, "%s:%d:error parsing keys (%s)\n",
|
/freebsd-13-stable/crypto/heimdal/lib/hdb/ |
H A D | hdb-mitdb.c | 134 Salt *salt = ent->keys.val[key_num].salt; 190 free(ent->keys.val[key_num].salt); 191 ent->keys.val[key_num].salt = NULL; 225 * keys} that follow it. Nothing supports such "extra data" 325 * keys for this kvno, the second meaning there's keys and salt[s?]. 346 * kvno keys. 350 * these keys, but keep them elsewhere. 352 for (j = 0; j < entry->keys.len; j++) 353 free_Key(&entry->keys [all...] |
/freebsd-13-stable/kerberos5/lib/libkadm5srv/ |
H A D | Makefile | 26 keys.c \
|
/freebsd-13-stable/share/ |
H A D | Makefile | 15 keys \
|
/freebsd-13-stable/lib/libldns/ |
H A D | Makefile | 16 keys.c net.c packet.c parse.c radix.c rbtree.c rdata.c resolver.c \
|
/freebsd-13-stable/contrib/ldns/ldns/ |
H A D | ldns.h | 118 #include <ldns/keys.h>
|
/freebsd-13-stable/contrib/mtree/ |
H A D | extern.h | 87 extern int ftsoptions, keys;
|
H A D | mtree.c | 152 keys = F_TYPE; 155 keys |= parsekey(p, NULL); 160 keys |= parsekey(p, NULL); 203 keys &= ~parsekey(p, NULL);
|
/freebsd-13-stable/crypto/openssh/ |
H A D | authfd.h | 22 struct sshkey **keys; member in struct:ssh_identitylist
|
H A D | hostfile.h | 48 const char *host, const char *ip, struct sshkey **keys, size_t nkeys, 60 * Iterate through a hostkeys file, optionally parsing keys and matching
|
/freebsd-13-stable/usr.sbin/ctld/ |
H A D | Makefile | 9 SRCS= chap.c ctld.c discovery.c isns.c kernel.c keys.c log.c
|
/freebsd-13-stable/tools/tools/notescheck/ |
H A D | notescheck.py | 148 keys = list(self.options.keys()) 149 keys.sort() 150 for key in keys:
|
/freebsd-13-stable/usr.bin/fortune/tools/ |
H A D | do_uniq.py | 48 for key in list(dups.keys()):
|
/freebsd-13-stable/tools/regression/geom_gpt/ |
H A D | gctl_test.t | 161 my $count = keys (%steps); 166 foreach my $key (sort keys %steps) {
|
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | announce.c | 501 CFMutableArrayRef keys; local 510 keys = CFArrayCreateMutable(kCFAllocatorDefault, 2, &kCFTypeArrayCallBacks); 511 if (keys == NULL) 514 CFArrayAppendValue(keys, computerNameKey); 515 CFArrayAppendValue(keys, NetworkChangedKey_BackToMyMac); 517 if (SCDynamicStoreSetNotificationKeys(store, keys, NULL) == false) 521 CFRelease(keys);
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | keyset.c | 47 * keys. Support storing the certificates. DER format only supports 768 hx509_private_key **keys) 771 *keys = NULL; 774 return (*certs->ops->getkeys)(context, certs, certs->ops_data, keys); 795 hx509_private_key *keys) 798 for (i = 0; keys[i]; i++) 799 hx509_private_key_free(&keys[i]); 800 free(keys); 766 _hx509_certs_keys_get(hx509_context context, hx509_certs certs, hx509_private_key **keys) argument 794 _hx509_certs_keys_free(hx509_context context, hx509_private_key *keys) argument
|
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | get_s.c | 147 for(n = 0; n < ent.entry.keys.len; n++) 148 if(ent.entry.keys.val[n].mkvno) { 149 out->mkvno = *ent.entry.keys.val[n].mkvno; /* XXX this isn't right */ 178 out->key_data = malloc(ent.entry.keys.len * sizeof(*out->key_data)); 179 if (out->key_data == NULL && ent.entry.keys.len != 0) { 183 for(i = 0; i < ent.entry.keys.len; i++){ 184 key = &ent.entry.keys.val[i];
|