Searched refs:keys (Results 226 - 250 of 272) sorted by relevance

1234567891011

/freebsd-13-stable/contrib/llvm-project/llvm/include/llvm/ProfileData/
H A DInstrProfReader.h412 return Symtab.create(HashTable->keys());
/freebsd-13-stable/tools/tools/shlib-compat/
H A Dshlib-compat.py236 return self.symbols.keys()
305 if param not in vals.keys():
966 verdiff = ListDiff(origlib.versions.keys(), newlib.versions.keys())
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dtls_openssl.c3958 struct tls_random *keys)
3962 if (conn == NULL || keys == NULL)
3968 os_memset(keys, 0, sizeof(*keys));
3969 keys->client_random = conn->client_random;
3970 keys->client_random_len = SSL_get_client_random(
3972 keys->server_random = conn->server_random;
3973 keys->server_random_len = SSL_get_server_random(
4127 "OpenSSL: EAP-FAST keys cannot be exported in FIPS mode");
3957 tls_connection_get_random(void *ssl_ctx, struct tls_connection *conn, struct tls_random *keys) argument
/freebsd-13-stable/crypto/openssl/ssl/
H A Ds3_lib.c3828 unsigned char *keys = parg; local
3832 if (keys == NULL)
3839 memcpy(ctx->ext.tick_key_name, keys,
3842 keys + sizeof(ctx->ext.tick_key_name),
3845 keys + sizeof(ctx->ext.tick_key_name) +
3849 memcpy(keys, ctx->ext.tick_key_name,
3851 memcpy(keys + sizeof(ctx->ext.tick_key_name),
3854 memcpy(keys + sizeof(ctx->ext.tick_key_name) +
/freebsd-13-stable/sys/contrib/openzfs/contrib/pyzfs/libzfs_core/test/
H A Dtest_nvlist.py48 for key in dict1.keys():
55 for key in dict1.keys():
/freebsd-13-stable/contrib/ofed/opensm/opensm/
H A Dosm_pkey_mgr.c112 p_orig_pkey = cl_map_get(&p_pkey_tbl->keys, pkey);
114 p_orig_pkey = cl_map_get(&p_pkey_tbl->keys,
/freebsd-13-stable/contrib/ntp/sntp/
H A Dmain.c79 struct key * keys = NULL; variable in typeref:struct:key
215 auth_init(OPT_ARG(KEYFILE), &keys); local
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dhxtool.c1200 hx509_private_key *keys; local
1210 ret = _hx509_certs_keys_get(context, certs, &keys);
1214 if (keys[0] == NULL)
1215 errx(1, "no keys in key store: %s", fn);
1217 *key = _hx509_private_key_ref(keys[0]);
1218 _hx509_certs_keys_free(context, keys);
1240 errx(1, "can only handle rsa keys for now");
/freebsd-13-stable/contrib/ntp/ntpd/
H A Dntp_config.c165 char * keysdir = default_keysdir; /* crypto keys directory */
415 if (ptree->auth.keys) {
416 free(ptree->auth.keys);
417 ptree->auth.keys = NULL;
696 if (ptree->auth.keys != NULL)
697 fprintf(df, "keys \"%s\"\n", ptree->auth.keys);
2062 * Count the number of trusted keys to preallocate storage and
2085 if (ptree->auth.keys)
2086 getauthkeys(ptree->auth.keys);
[all...]
/freebsd-13-stable/contrib/llvm-project/lldb/source/Plugins/ScriptInterpreter/Python/
H A DPythonDataObjects.cpp785 PythonList keys(GetKeys());
786 uint32_t num_keys = keys.GetSize();
788 PythonObject key = keys.GetItemAtIndex(i);
/freebsd-13-stable/sys/dev/cxgbe/tom/
H A Dt4_tls.c404 t4_aes_getdeckey(kwr->keys.edkey, kctx->rx.key,
406 memcpy(kwr->keys.edkey + kctx->cipher_secret_size,
410 memcpy(kwr->keys.edkey, kctx->rx.key,
432 memcpy(kwr->keys.edkey, kctx->tx.key, HDR_KCTX_SIZE);
/freebsd-13-stable/contrib/llvm-project/llvm/include/llvm/Support/
H A DOnDiskHashTable.h55 /// /// Determine if two keys are equal. Optional, only needed by contains.
251 /// /// Compare two keys for equality.
443 /// Iterates over all of the keys in the table.
500 /// Iterates over all of the keys in the table.
542 iterator_range<key_iterator> keys() { function in class:llvm::OnDiskIterableChainedHashTable
/freebsd-13-stable/contrib/llvm-project/llvm/lib/Target/AMDGPU/
H A DSIMachineFunctionInfo.h172 auto Keys = YamlIO.keys();
/freebsd-13-stable/sys/dev/rtwn/
H A Dif_rtwnvar.h121 const struct ieee80211_key *keys[IEEE80211_WEP_NKID]; member in struct:rtwn_vap
/freebsd-13-stable/usr.bin/sort/
H A Dradixsort.c567 reverse_sort = sort_opts_vals.kflag ? keys[0].sm.rflag :
/freebsd-13-stable/sys/xen/interface/
H A Dsysctl.h169 /* Inject debug keys into Xen. */
173 XEN_GUEST_HANDLE_64(const_char) keys; member in struct:xen_sysctl_debug_keys
/freebsd-13-stable/tests/sys/opencrypto/
H A Dcryptodev.py410 remain = self.fields.copy() - set(values.keys())
418 # the generic KATParser. In particular, some keys are set globally at
/freebsd-13-stable/contrib/unbound/validator/
H A Dval_utils.c299 /* find keys for the item at skip */
337 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys,
361 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
457 reason, "no keys have a DS");
938 * with the wrong keys. Validation has tried to
336 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument
/freebsd-13-stable/crypto/heimdal/lib/hdb/
H A DMakefile.in141 hdb-private.h keys.c keytab.c dbinfo.c mkey.c ndbm.c print.c
145 hdb-mitdb.lo keys.lo keytab.lo dbinfo.lo mkey.lo ndbm.lo \
507 keys.c \
666 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/keys.Plo@am__quote@
/freebsd-13-stable/crypto/heimdal/lib/kadm5/
H A DMakefile.in147 get_princs_s.lo get_s.lo init_s.lo keys.lo log.lo marshall.lo \
553 keys.c \
858 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/keys.Plo@am__quote@
/freebsd-13-stable/sys/dev/cxgbe/crypto/
H A Dt4_kern_tls.c101 struct keys { struct in struct:tls_keyctx
105 } keys; member in struct:tls_keyctx
181 /* Only used outside of setup and teardown when using inline keys. */
754 * Store the salt and keys in the key context. For
810 key = kctx->keys.edkey;
/freebsd-13-stable/sys/crypto/openssl/aarch64/
H A Dvpaes-armv8.S120 ## (%rdx) = scheduled keys
670 ## round produces 192 bits of key material, or 1.5 round keys.
672 ## keys.
/freebsd-13-stable/contrib/ldns/
H A Dlibdns.vim351 " ldns/keys.h
/freebsd-13-stable/contrib/lib9p/pytest/
H A Dp9conn.py448 self.tagalloc.free_multi(self.tagstate.keys())
579 self.fidalloc.free_multi(self.live_fids.keys())
/freebsd-13-stable/sys/contrib/openzfs/cmd/arc_summary/
H A Darc_summary21072 for name in sorted(tunables.keys()):

Completed in 391 milliseconds

1234567891011