/freebsd-9.3-release/sys/crypto/blowfish/ |
H A D | bf_skey.c | 73 BF_set_key(key, len, data) 74 BF_KEY *key; 82 memcpy((char *)key, (const char *)&bf_init, sizeof(BF_KEY)); 83 p = key->P; 112 BF_encrypt(in, key); 117 p = key->S; 119 BF_encrypt(in, key);
|
H A D | bf_ecb.c | 72 BF_KEY *key, int encrypt) 79 BF_encrypt(d,key); 81 BF_decrypt(d,key); 71 BF_ecb_encrypt(const unsigned char *in, unsigned char *out, BF_KEY *key, int encrypt) argument
|
/freebsd-9.3-release/contrib/ofed/management/opensm/opensm/ |
H A D | st.c | 54 st_data_t key; member in struct:st_table_entry 81 static inline st_ptr_t st_strhash(void *key) argument 83 return strhash((const char *)key); 108 #define do_hash(key,table) (unsigned int)(*(table)->type->hash)(((void*)key)) 109 #define do_hash_bin(key,table) (do_hash(key, table)%(table)->num_bins) 257 #define PTR_NOT_EQUAL(table, ptr, hash_val, key) \ 258 ((ptr) != 0 && (ptr->hash != (hash_val) || !EQUAL((table), (key), (ptr)->key))) 492 delete_never(st_data_t key, st_data_t value, st_data_t never) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | keys.c | 61 keys[i].key.keyvalue.length = 0; 62 keys[i].key.keyvalue.data = NULL; 91 if (keys1[i].key.keytype != keys2[i].key.keytype) 93 if (keys1[i].key.keyvalue.length != keys2[i].key.keyvalue.length) 95 if (memcmp (keys1[i].key.keyvalue.data, keys2[i].key.keyvalue.data, 96 keys1[i].key.keyvalue.length) != 0)
|
/freebsd-9.3-release/contrib/nvi/clib/ |
H A D | bsearch.c | 67 bsearch(key, base0, nmemb, size, compar) 68 register const void *key; 81 cmp = (*compar)(key, p); 84 if (cmp > 0) { /* key > p: move right */
|
/freebsd-9.3-release/lib/libc/iconv/ |
H A D | citrus_lookup.h | 52 _citrus_lookup_alias(const char *path, const char *key, char *buf, size_t n, argument 57 ret = _citrus_lookup_simple(path, key, buf, n, ignore_case); 59 ret = key;
|
/freebsd-9.3-release/lib/libc/stdlib/ |
H A D | bsearch.c | 56 bsearch(key, base0, nmemb, size, compar) 57 const void *key; 70 cmp = (*compar)(key, p); 73 if (cmp > 0) { /* key > p: move right */
|
/freebsd-9.3-release/sys/libkern/ |
H A D | bsearch.c | 56 bsearch(key, base0, nmemb, size, compar) 57 register const void *key; 70 cmp = (*compar)(key, p); 73 if (cmp > 0) { /* key > p: move right */
|
/freebsd-9.3-release/tools/tools/termcap/ |
H A D | termcap.pl | 118 foreach my $key (sort(keys(%keys))) { 119 next if (!defined $tc{$tca}{$key} && !defined $tc{$tcb}{$key}); 121 defined $tc{$tca}{$key} ? "+" : "", 122 defined $tc{$tcb}{$key} ? "+" : "", 123 $key, 139 foreach my $key (sort(keys(%keys))) { 140 next if (!defined $tc{$tca}{$key}); 141 printf("%s\n", $key); 146 foreach my $key (key [all...] |
/freebsd-9.3-release/contrib/ntp/lib/isc/tests/ |
H A D | symtab_test.c | 33 undefine(char *key, unsigned int type, isc_symvalue_t value, void *arg) { argument 37 isc_mem_free(mctx, key); 72 char str[16], *key; local 75 key = isc_mem_strdup(mctx, str); 76 ATF_REQUIRE(key != NULL); 79 result = isc_symtab_define(st, key, 1, value, policy); 82 undefine(key, 1, value, NULL); 89 char str[16], *key; local 92 key = isc_mem_strdup(mctx, str); 93 ATF_REQUIRE(key ! [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/bf/ |
H A D | bf_ecb.c | 83 const BF_KEY *key, int encrypt) 92 BF_encrypt(d, key); 94 BF_decrypt(d, key); 82 BF_ecb_encrypt(const unsigned char *in, unsigned char *out, const BF_KEY *key, int encrypt) argument
|
/freebsd-9.3-release/crypto/openssl/crypto/camellia/ |
H A D | cmll_cfb.c | 128 const CAMELLIA_KEY *key, unsigned char *ivec, 136 assert(in && out && key && ivec && num); 143 Camellia_encrypt(ivec, ivec, key); 151 Camellia_encrypt(ivec, ivec, key); 168 const int nbits, const CAMELLIA_KEY *key, 180 Camellia_encrypt(ivec, ivec, key); 203 const CAMELLIA_KEY *key, unsigned char *ivec, 209 assert(in && out && key && ivec && num); 215 Camellia_cfbr_encrypt_block(c, d, 1, key, ivec, enc); 223 const CAMELLIA_KEY *key, unsigne 126 Camellia_cfb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument 167 Camellia_cfbr_encrypt_block(const unsigned char *in, unsigned char *out, const int nbits, const CAMELLIA_KEY *key, unsigned char *ivec, const int enc) argument 201 Camellia_cfb1_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument 221 Camellia_cfb8_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument [all...] |
H A D | cmll_ofb.c | 124 const CAMELLIA_KEY *key, unsigned char *ivec, 131 assert(in && out && key && ivec && num); 137 Camellia_encrypt(ivec, ivec, key); 122 Camellia_ofb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num) argument
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | e_cast.c | 68 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 82 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 85 CAST_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
|
H A D | e_bf.c | 67 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 80 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 83 BF_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
|
H A D | e_seed.c | 65 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 75 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 78 SEED_set_key(key, ctx->cipher_data);
|
/freebsd-9.3-release/crypto/openssl/crypto/idea/ |
H A D | i_skey.c | 70 void idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks) argument 74 private_idea_set_encrypt_key(key, ks); 77 void private_idea_set_encrypt_key(const unsigned char *key, argument 80 void idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks) 87 n2s(key, kt[0]); 88 n2s(key, kt[1]); 89 n2s(key, kt[2]); 90 n2s(key, kt[3]); 91 n2s(key, kt[4]); 92 n2s(key, k [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/aes/ |
H A D | aes_ofb.c | 124 const unsigned long length, const AES_KEY *key, 131 assert(in && out && key && ivec && num); 137 AES_encrypt(ivec, ivec, key); 123 AES_ofb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num) argument
|
H A D | aes_cfb.c | 126 const unsigned long length, const AES_KEY *key, 134 assert(in && out && key && ivec && num); 141 AES_encrypt(ivec, ivec, key); 149 AES_encrypt(ivec, ivec, key); 166 const int nbits, const AES_KEY *key, 178 AES_encrypt(ivec, ivec, key); 200 const unsigned long length, const AES_KEY *key, 206 assert(in && out && key && ivec && num); 211 AES_cfbr_encrypt_block(c, d, 1, key, ivec, enc); 218 const unsigned long length, const AES_KEY *key, 125 AES_cfb128_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument 165 AES_cfbr_encrypt_block(const unsigned char *in, unsigned char *out, const int nbits, const AES_KEY *key, unsigned char *ivec, const int enc) argument 199 AES_cfb1_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument 217 AES_cfb8_encrypt(const unsigned char *in, unsigned char *out, const unsigned long length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hdb/ |
H A D | common.c | 39 hdb_principal2key(krb5_context context, krb5_const_principal p, krb5_data *key) argument 50 ASN1_MALLOC_ENCODE(Principal, key->data, key->length, &new, &len, ret); 51 if (ret == 0 && key->length != len) 58 hdb_key2principal(krb5_context context, krb5_data *key, krb5_principal p) argument 60 return decode_Principal(key->data, key->length, p, NULL); 107 krb5_data key, value; local 110 hdb_principal2key(context, principal, &key); 111 code = db->hdb__get(context, db, key, 151 hdb_remove_aliases(krb5_context context, HDB *db, krb5_data *key) argument 196 krb5_data key, value; local 225 krb5_data key, value; local 269 krb5_data key; local [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | dnssec.c | 145 dst_key_t **key) 153 INSIST(key != NULL); 154 INSIST(*key == NULL); 161 return (dst_key_fromdns(name, rdata->rdclass, &b, mctx, key)); 193 dns_dnssec_sign(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, argument 215 REQUIRE(key != NULL); 225 * Is the key allowed to sign data? 227 flags = dst_key_flags(key); 243 RUNTIME_CHECK(dns_name_downcase(dst_key_name(key), 248 sig.algorithm = dst_key_alg(key); 144 dns_dnssec_keyfromrdata(dns_name_t *name, dns_rdata_t *rdata, isc_mem_t *mctx, dst_key_t **key) argument 372 dns_dnssec_verify2(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, isc_boolean_t ignoretime, isc_mem_t *mctx, dns_rdata_t *sigrdata, dns_name_t *wild) argument 381 dns_dnssec_verify3(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, isc_boolean_t ignoretime, unsigned int maxbits, isc_mem_t *mctx, dns_rdata_t *sigrdata, dns_name_t *wild) argument 599 dns_dnssec_verify(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key, isc_boolean_t ignoretime, isc_mem_t *mctx, dns_rdata_t *sigrdata) argument 613 dns_dnssec_keyactive(dst_key_t *key, isc_stdtime_t now) argument 824 dns_dnssec_signmessage(dns_message_t *msg, dst_key_t *key) argument 961 dns_dnssec_verifymessage(isc_buffer_t *source, dns_message_t *msg, dst_key_t *key) argument 1120 dns_rdata_dnskey_t key; local 1214 get_hints(dns_dnsseckey_t *key, isc_stdtime_t now) argument 1314 dns_dnsseckey_t *key = NULL; local 1422 dns_dnsseckey_t *key; local 1477 dns_dnsseckey_t *key; local 1653 make_dnskey(dst_key_t *key, unsigned char *buf, int bufsize, dns_rdata_t *target) argument 1673 publish_key(dns_diff_t *diff, dns_dnsseckey_t *key, dns_name_t *origin, dns_ttl_t ttl, isc_mem_t *mctx, isc_boolean_t allzsk, void (*report)(const char *, ...)) argument 1715 remove_key(dns_diff_t *diff, dns_dnsseckey_t *key, dns_name_t *origin, dns_ttl_t ttl, isc_mem_t *mctx, const char *reason, void (*report)(const char *, ...)) argument 1753 dns_dnsseckey_t *key, *key1, *key2, *next; local [all...] |
/freebsd-9.3-release/lib/libc/db/test/btree.tests/ |
H A D | main.c | 87 "a", 2, 1, append, "append key def", "append key with data def", 90 "delc", 0, 0, delcur, "delcur", "delete key the cursor references", 94 "g", 1, 1, get, "get key", "locate key", 96 "ia", 2, 1, iafter, "iafter key data", "insert data after key", 97 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key", 98 "ic", 2, 1, icursor, "icursor key dat 275 DBT key, data; local 305 DBT data, key; local 345 DBT key; local 380 DBT data, key; local 403 DBT data, key; local 445 DBT key, data; local 475 DBT key, data; local 506 DBT data, key; local 535 DBT data, key; local 563 DBT data, key; local 586 DBT data, key; local 611 DBT data, key; local 664 DBT data, key; local 687 DBT data, key; local [all...] |
/freebsd-9.3-release/crypto/openssh/ |
H A D | auth-rsa.c | 8 * validity of the host key. 39 #include "key.h" 56 * Session identifier that is used to bind key exchange and authentication 72 auth_rsa_generate_challenge(Key *key) argument 84 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) 92 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument 99 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { 102 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); 135 auth_rsa_challenge_dialog(Key *key) argument 144 challenge = PRIVSEP(auth_rsa_generate_challenge(key)); 175 Key *key; local 308 Key *key; local [all...] |
/freebsd-9.3-release/bin/stty/ |
H A D | Makefile | 5 SRCS= cchar.c gfmt.c key.c modes.c print.c stty.c util.c
|
/freebsd-9.3-release/contrib/bind9/lib/isc/include/isc/ |
H A D | symtab.h | 30 * Keys are C strings, and key comparisons are case-insensitive. A type may 35 * It's possible that a client will attempt to define a <key, type, value> 36 * tuple when a tuple with the given key and type already exists in the table. 42 * with the old <key, type, value> tuple. 47 * A lookup of a key using type 0 will return the most-recently defined 48 * symbol with that key. An undefine of a key using type 0 will undefine the 49 * most-recently defined symbol with that key. Trying to define a key with 52 * The symbol table library does not make a copy the key fiel [all...] |