Searched refs:key (Results 126 - 150 of 1712) sorted by relevance

1234567891011>>

/freebsd-9.3-release/sys/crypto/blowfish/
H A Dbf_skey.c73 BF_set_key(key, len, data)
74 BF_KEY *key;
82 memcpy((char *)key, (const char *)&bf_init, sizeof(BF_KEY));
83 p = key->P;
112 BF_encrypt(in, key);
117 p = key->S;
119 BF_encrypt(in, key);
H A Dbf_ecb.c72 BF_KEY *key, int encrypt)
79 BF_encrypt(d,key);
81 BF_decrypt(d,key);
71 BF_ecb_encrypt(const unsigned char *in, unsigned char *out, BF_KEY *key, int encrypt) argument
/freebsd-9.3-release/contrib/ofed/management/opensm/opensm/
H A Dst.c54 st_data_t key; member in struct:st_table_entry
81 static inline st_ptr_t st_strhash(void *key) argument
83 return strhash((const char *)key);
108 #define do_hash(key,table) (unsigned int)(*(table)->type->hash)(((void*)key))
109 #define do_hash_bin(key,table) (do_hash(key, table)%(table)->num_bins)
257 #define PTR_NOT_EQUAL(table, ptr, hash_val, key) \
258 ((ptr) != 0 && (ptr->hash != (hash_val) || !EQUAL((table), (key), (ptr)->key)))
492 delete_never(st_data_t key, st_data_t value, st_data_t never) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dkeys.c61 keys[i].key.keyvalue.length = 0;
62 keys[i].key.keyvalue.data = NULL;
91 if (keys1[i].key.keytype != keys2[i].key.keytype)
93 if (keys1[i].key.keyvalue.length != keys2[i].key.keyvalue.length)
95 if (memcmp (keys1[i].key.keyvalue.data, keys2[i].key.keyvalue.data,
96 keys1[i].key.keyvalue.length) != 0)
/freebsd-9.3-release/contrib/nvi/clib/
H A Dbsearch.c67 bsearch(key, base0, nmemb, size, compar)
68 register const void *key;
81 cmp = (*compar)(key, p);
84 if (cmp > 0) { /* key > p: move right */
/freebsd-9.3-release/lib/libc/iconv/
H A Dcitrus_lookup.h52 _citrus_lookup_alias(const char *path, const char *key, char *buf, size_t n, argument
57 ret = _citrus_lookup_simple(path, key, buf, n, ignore_case);
59 ret = key;
/freebsd-9.3-release/lib/libc/stdlib/
H A Dbsearch.c56 bsearch(key, base0, nmemb, size, compar)
57 const void *key;
70 cmp = (*compar)(key, p);
73 if (cmp > 0) { /* key > p: move right */
/freebsd-9.3-release/sys/libkern/
H A Dbsearch.c56 bsearch(key, base0, nmemb, size, compar)
57 register const void *key;
70 cmp = (*compar)(key, p);
73 if (cmp > 0) { /* key > p: move right */
/freebsd-9.3-release/tools/tools/termcap/
H A Dtermcap.pl118 foreach my $key (sort(keys(%keys))) {
119 next if (!defined $tc{$tca}{$key} && !defined $tc{$tcb}{$key});
121 defined $tc{$tca}{$key} ? "+" : "",
122 defined $tc{$tcb}{$key} ? "+" : "",
123 $key,
139 foreach my $key (sort(keys(%keys))) {
140 next if (!defined $tc{$tca}{$key});
141 printf("%s\n", $key);
146 foreach my $key (key
[all...]
/freebsd-9.3-release/contrib/ntp/lib/isc/tests/
H A Dsymtab_test.c33 undefine(char *key, unsigned int type, isc_symvalue_t value, void *arg) { argument
37 isc_mem_free(mctx, key);
72 char str[16], *key; local
75 key = isc_mem_strdup(mctx, str);
76 ATF_REQUIRE(key != NULL);
79 result = isc_symtab_define(st, key, 1, value, policy);
82 undefine(key, 1, value, NULL);
89 char str[16], *key; local
92 key = isc_mem_strdup(mctx, str);
93 ATF_REQUIRE(key !
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/bf/
H A Dbf_ecb.c83 const BF_KEY *key, int encrypt)
92 BF_encrypt(d, key);
94 BF_decrypt(d, key);
82 BF_ecb_encrypt(const unsigned char *in, unsigned char *out, const BF_KEY *key, int encrypt) argument
/freebsd-9.3-release/crypto/openssl/crypto/camellia/
H A Dcmll_cfb.c128 const CAMELLIA_KEY *key, unsigned char *ivec,
136 assert(in && out && key && ivec && num);
143 Camellia_encrypt(ivec, ivec, key);
151 Camellia_encrypt(ivec, ivec, key);
168 const int nbits, const CAMELLIA_KEY *key,
180 Camellia_encrypt(ivec, ivec, key);
203 const CAMELLIA_KEY *key, unsigned char *ivec,
209 assert(in && out && key && ivec && num);
215 Camellia_cfbr_encrypt_block(c, d, 1, key, ivec, enc);
223 const CAMELLIA_KEY *key, unsigne
126 Camellia_cfb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument
167 Camellia_cfbr_encrypt_block(const unsigned char *in, unsigned char *out, const int nbits, const CAMELLIA_KEY *key, unsigned char *ivec, const int enc) argument
201 Camellia_cfb1_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument
221 Camellia_cfb8_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument
[all...]
H A Dcmll_ofb.c124 const CAMELLIA_KEY *key, unsigned char *ivec,
131 assert(in && out && key && ivec && num);
137 Camellia_encrypt(ivec, ivec, key);
122 Camellia_ofb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num) argument
/freebsd-9.3-release/crypto/openssl/crypto/evp/
H A De_cast.c68 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
82 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
85 CAST_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
H A De_bf.c67 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
80 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
83 BF_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
H A De_seed.c65 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
75 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
78 SEED_set_key(key, ctx->cipher_data);
/freebsd-9.3-release/crypto/openssl/crypto/idea/
H A Di_skey.c70 void idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks) argument
74 private_idea_set_encrypt_key(key, ks);
77 void private_idea_set_encrypt_key(const unsigned char *key, argument
80 void idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks)
87 n2s(key, kt[0]);
88 n2s(key, kt[1]);
89 n2s(key, kt[2]);
90 n2s(key, kt[3]);
91 n2s(key, kt[4]);
92 n2s(key, k
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/aes/
H A Daes_ofb.c124 const unsigned long length, const AES_KEY *key,
131 assert(in && out && key && ivec && num);
137 AES_encrypt(ivec, ivec, key);
123 AES_ofb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num) argument
H A Daes_cfb.c126 const unsigned long length, const AES_KEY *key,
134 assert(in && out && key && ivec && num);
141 AES_encrypt(ivec, ivec, key);
149 AES_encrypt(ivec, ivec, key);
166 const int nbits, const AES_KEY *key,
178 AES_encrypt(ivec, ivec, key);
200 const unsigned long length, const AES_KEY *key,
206 assert(in && out && key && ivec && num);
211 AES_cfbr_encrypt_block(c, d, 1, key, ivec, enc);
218 const unsigned long length, const AES_KEY *key,
125 AES_cfb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument
165 AES_cfbr_encrypt_block(const unsigned char *in, unsigned char *out, const int nbits, const AES_KEY *key, unsigned char *ivec, const int enc) argument
199 AES_cfb1_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument
217 AES_cfb8_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/hdb/
H A Dcommon.c39 hdb_principal2key(krb5_context context, krb5_const_principal p, krb5_data *key) argument
50 ASN1_MALLOC_ENCODE(Principal, key->data, key->length, &new, &len, ret);
51 if (ret == 0 && key->length != len)
58 hdb_key2principal(krb5_context context, krb5_data *key, krb5_principal p) argument
60 return decode_Principal(key->data, key->length, p, NULL);
107 krb5_data key, value; local
110 hdb_principal2key(context, principal, &key);
111 code = db->hdb__get(context, db, key,
151 hdb_remove_aliases(krb5_context context, HDB *db, krb5_data *key) argument
196 krb5_data key, value; local
225 krb5_data key, value; local
269 krb5_data key; local
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Ddnssec.c145 dst_key_t **key)
153 INSIST(key != NULL);
154 INSIST(*key == NULL);
161 return (dst_key_fromdns(name, rdata->rdclass, &b, mctx, key));
193 dns_dnssec_sign(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, argument
215 REQUIRE(key != NULL);
225 * Is the key allowed to sign data?
227 flags = dst_key_flags(key);
243 RUNTIME_CHECK(dns_name_downcase(dst_key_name(key),
248 sig.algorithm = dst_key_alg(key);
144 dns_dnssec_keyfromrdata(dns_name_t *name, dns_rdata_t *rdata, isc_mem_t *mctx, dst_key_t **key) argument
372 dns_dnssec_verify2(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, isc_boolean_t ignoretime, isc_mem_t *mctx, dns_rdata_t *sigrdata, dns_name_t *wild) argument
381 dns_dnssec_verify3(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, isc_boolean_t ignoretime, unsigned int maxbits, isc_mem_t *mctx, dns_rdata_t *sigrdata, dns_name_t *wild) argument
599 dns_dnssec_verify(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, isc_boolean_t ignoretime, isc_mem_t *mctx, dns_rdata_t *sigrdata) argument
613 dns_dnssec_keyactive(dst_key_t *key, isc_stdtime_t now) argument
824 dns_dnssec_signmessage(dns_message_t *msg, dst_key_t *key) argument
961 dns_dnssec_verifymessage(isc_buffer_t *source, dns_message_t *msg, dst_key_t *key) argument
1120 dns_rdata_dnskey_t key; local
1214 get_hints(dns_dnsseckey_t *key, isc_stdtime_t now) argument
1314 dns_dnsseckey_t *key = NULL; local
1422 dns_dnsseckey_t *key; local
1477 dns_dnsseckey_t *key; local
1653 make_dnskey(dst_key_t *key, unsigned char *buf, int bufsize, dns_rdata_t *target) argument
1673 publish_key(dns_diff_t *diff, dns_dnsseckey_t *key, dns_name_t *origin, dns_ttl_t ttl, isc_mem_t *mctx, isc_boolean_t allzsk, void (*report)(const char *, ...)) argument
1715 remove_key(dns_diff_t *diff, dns_dnsseckey_t *key, dns_name_t *origin, dns_ttl_t ttl, isc_mem_t *mctx, const char *reason, void (*report)(const char *, ...)) argument
1753 dns_dnsseckey_t *key, *key1, *key2, *next; local
[all...]
/freebsd-9.3-release/lib/libc/db/test/btree.tests/
H A Dmain.c87 "a", 2, 1, append, "append key def", "append key with data def",
90 "delc", 0, 0, delcur, "delcur", "delete key the cursor references",
94 "g", 1, 1, get, "get key", "locate key",
96 "ia", 2, 1, iafter, "iafter key data", "insert data after key",
97 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key",
98 "ic", 2, 1, icursor, "icursor key dat
275 DBT key, data; local
305 DBT data, key; local
345 DBT key; local
380 DBT data, key; local
403 DBT data, key; local
445 DBT key, data; local
475 DBT key, data; local
506 DBT data, key; local
535 DBT data, key; local
563 DBT data, key; local
586 DBT data, key; local
611 DBT data, key; local
664 DBT data, key; local
687 DBT data, key; local
[all...]
/freebsd-9.3-release/crypto/openssh/
H A Dauth-rsa.c8 * validity of the host key.
39 #include "key.h"
56 * Session identifier that is used to bind key exchange and authentication
72 auth_rsa_generate_challenge(Key *key) argument
84 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0)
92 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument
99 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
102 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE);
135 auth_rsa_challenge_dialog(Key *key) argument
144 challenge = PRIVSEP(auth_rsa_generate_challenge(key));
175 Key *key; local
308 Key *key; local
[all...]
/freebsd-9.3-release/bin/stty/
H A DMakefile5 SRCS= cchar.c gfmt.c key.c modes.c print.c stty.c util.c
/freebsd-9.3-release/contrib/bind9/lib/isc/include/isc/
H A Dsymtab.h30 * Keys are C strings, and key comparisons are case-insensitive. A type may
35 * It's possible that a client will attempt to define a <key, type, value>
36 * tuple when a tuple with the given key and type already exists in the table.
42 * with the old <key, type, value> tuple.
47 * A lookup of a key using type 0 will return the most-recently defined
48 * symbol with that key. An undefine of a key using type 0 will undefine the
49 * most-recently defined symbol with that key. Trying to define a key with
52 * The symbol table library does not make a copy the key fiel
[all...]

Completed in 261 milliseconds

1234567891011>>