Searched refs:key (Results 226 - 250 of 2274) sorted by relevance

1234567891011>>

/freebsd-11-stable/sys/opencrypto/
H A Dxform_rijndael.c77 rijndael128_encrypt(caddr_t key, u_int8_t *blk) argument
79 rijndael_encrypt((rijndael_ctx *) key, (u_char *) blk, (u_char *) blk);
83 rijndael128_decrypt(caddr_t key, u_int8_t *blk) argument
85 rijndael_decrypt(((rijndael_ctx *) key), (u_char *) blk,
90 rijndael128_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
99 rijndael_set_key((rijndael_ctx *) *sched, (u_char *) key,
H A Dxform_skipjack.c76 skipjack_encrypt(caddr_t key, u_int8_t *blk) argument
78 skipjack_forwards(blk, blk, (u_int8_t **) key);
82 skipjack_decrypt(caddr_t key, u_int8_t *blk) argument
84 skipjack_backwards(blk, blk, (u_int8_t **) key);
88 skipjack_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
104 subkey_table_gen(key, (u_int8_t **) *sched);
H A Dcast.c27 t = ROL(key->xkey[i] + r, key->xkey[i+16]); \
31 t = ROL(key->xkey[i] ^ r, key->xkey[i+16]); \
35 t = ROL(key->xkey[i] - r, key->xkey[i+16]); \
42 void cast_encrypt(cast_key* key, u_int8_t* inblock, u_int8_t* outblock) argument
64 /* Only do full 16 rounds if key length > 80 bits */
65 if (key->rounds > 12) {
87 void cast_decrypt(cast_key* key, u_int8_ argument
132 cast_setkey(cast_key* key, u_int8_t* rawkey, int keybytes) argument
[all...]
/freebsd-11-stable/contrib/llvm-project/llvm/include/llvm/DebugInfo/GSYM/
H A DFileEntry.h36 // Implement operator== so that FileEntry can be used as key in
50 uint32_t key = DenseMapInfo<uint32_t>::getEmptyKey(); local
51 return gsym::FileEntry(key, key);
54 uint32_t key = DenseMapInfo<uint32_t>::getTombstoneKey(); local
55 return gsym::FileEntry(key, key);
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/
H A Dprefix_string.c71 svn_prefix_string__t key; member in struct:node_t
74 * 0 for the root node. Only then will key.prefix be NULL. */
108 return node->key.data[7] == 0;
141 unsigned char key,
152 if ((unsigned char)sub_nodes[current]->key.data[0] < key)
168 tree->root->key.data[7] = '\xff'; /* This is not a leaf. See is_leaf(). */
199 || node->sub_nodes[idx]->key.data[0] != s[node->length])
208 if (strcmp(sub_node->key.data, s + node->length) == 0)
209 return &sub_node->key;
140 search_lower_bound(node_t **sub_nodes, unsigned char key, int count) argument
[all...]
/freebsd-11-stable/contrib/libreadline/
H A Dtext.c237 The second is the key which invoked this command.
253 rl_forward_byte (count, key)
254 int count, key;
257 return (rl_backward_byte (-count, key));
286 rl_forward_char (count, key)
287 int count, key;
292 return (rl_forward_byte (count, key));
295 return (rl_backward_char (-count, key));
319 rl_forward_char (count, key)
320 int count, key;
[all...]
/freebsd-11-stable/contrib/ntp/lib/isc/
H A Dhmacsha.c39 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key, argument
42 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha1());
70 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key, argument
73 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha224());
101 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key, argument
104 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha256());
132 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key, argument
135 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha384());
163 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key, argument
166 HMAC_Init(ctx, (const void *) key, (in
202 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key, unsigned int len) argument
270 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key, unsigned int len) argument
336 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key, unsigned int len) argument
402 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key, unsigned int len) argument
468 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key, unsigned int len) argument
[all...]
/freebsd-11-stable/crypto/heimdal/base/
H A Ddict.c41 heim_object_t key; member in struct:hashentry
59 heim_release(g->key);
155 if (heim_cmp(ptr, p->key) == 0)
165 * @value key the key to search for
167 * @return a retained copy of the value for key or NULL if not found
171 heim_dict_copy_value(heim_dict_t dict, heim_object_t key) argument
174 p = _search(dict, key);
182 * Add key and value to dict
185 * @value key th
192 heim_dict_add_value(heim_dict_t dict, heim_object_t key, heim_object_t value) argument
231 heim_dict_delete_key(heim_dict_t dict, heim_object_t key) argument
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hdb/
H A Dmkey.c61 int kvno, krb5_keyblock *key, krb5_enctype etype,
75 ret = krb5_copy_keyblock_contents(context, key, &(*mkey)->keytab.keyblock);
81 ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto);
92 hdb_add_master_key(krb5_context context, krb5_keyblock *key, argument
102 ret = hdb_process_master_key(context, vno, key, 0, &p);
155 krb5_keyblock key; local
179 key.keytype = enctype;
180 ret = krb5_ret_data(sp, &key.keyvalue);
184 ret = hdb_process_master_key(context, 1, &key, 0, mkey);
185 krb5_free_keyblock_contents(context, &key);
60 hdb_process_master_key(krb5_context context, int kvno, krb5_keyblock *key, krb5_enctype etype, hdb_master_key *mkey) argument
198 krb5_keyblock key; local
245 krb5_keyblock key; local
389 _hdb_mkey_decrypt(krb5_context context, hdb_master_key key, krb5_key_usage usage, void *ptr, size_t size, krb5_data *res) argument
398 _hdb_mkey_encrypt(krb5_context context, hdb_master_key key, krb5_key_usage usage, const void *ptr, size_t size, krb5_data *res) argument
414 hdb_master_key key; local
495 hdb_master_key key; local
559 hdb_set_master_key(krb5_context context, HDB *db, krb5_keyblock *key) argument
582 hdb_master_key key; local
[all...]
/freebsd-11-stable/usr.bin/cap_mkdb/
H A Dcap_mkdb.c77 * capability record whereas a reference contains the name (key) under which
159 DBT key, data; local
166 key.data = NULL;
203 key.data = bp;
204 key.size = p - bp;
206 switch(capdbp->put(capdbp, &key, &data, R_NOOVERWRITE)) {
212 (int)key.size, (char *)key.data);
225 memmove(&((u_char *)(data.data))[1], key.data, key
[all...]
/freebsd-11-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/lua/
H A Dltable.c73 {{NILCONSTANT, NULL}} /* key */
97 static Node *mainposition (const Table *t, const TValue *key) { argument
98 switch (ttype(key)) {
100 return hashnum(t, nvalue(key));
102 TString *s = rawtsvalue(key);
107 return hashstr(t, rawtsvalue(key));
110 return hashstr(t, rawtsvalue(key));
112 return hashboolean(t, bvalue(key));
114 return hashpointer(t, pvalue(key));
116 return hashpointer(t, fvalue(key));
127 arrayindex(const TValue *key) argument
144 findindex(lua_State *L, Table *t, StkId key) argument
169 luaH_next(lua_State *L, Table *t, StkId key) argument
218 countint(const TValue *key, int *nums) argument
405 luaH_newkey(lua_State *L, Table *t, const TValue *key) argument
446 luaH_getint(Table *t, int key) argument
466 luaH_getstr(Table *t, TString *key) argument
481 luaH_get(Table *t, const TValue *key) argument
511 luaH_set(lua_State *L, Table *t, const TValue *key) argument
519 luaH_setint(lua_State *L, Table *t, int key, TValue *value) argument
583 luaH_mainposition(const Table *t, const TValue *key) argument
[all...]
/freebsd-11-stable/contrib/apr-util/crypto/
H A Dapr_crypto_nss.c78 apr_crypto_key_t *key; member in struct:apr_crypto_block_t
95 /* sufficient space to wrap a key */
270 apr_crypto_key_t *key = data; local
271 if (key->symKey) {
272 PK11_FreeSymKey(key->symKey);
273 key->symKey = NULL;
353 * @brief Get a hash table of key types, keyed by the name of the type against
356 * @param types - hashtable of key types keyed to constants.
368 * @brief Get a hash table of key modes, keyed by the name of the mode against
371 * @param modes - hashtable of key mode
385 crypto_cipher_mechanism(apr_crypto_key_t *key, const apr_crypto_block_key_type_e type, const apr_crypto_block_key_mode_e mode, const int doPad) argument
486 apr_crypto_key_t *key; local
683 apr_crypto_key_t *key = *k; local
756 crypto_block_encrypt_init(apr_crypto_block_t **ctx, const unsigned char **iv, const apr_crypto_key_t *key, apr_size_t *blockSize, apr_pool_t *p) argument
936 crypto_block_decrypt_init(apr_crypto_block_t **ctx, apr_size_t *blockSize, const unsigned char *iv, const apr_crypto_key_t *key, apr_pool_t *p) argument
[all...]
/freebsd-11-stable/sys/dev/gpio/
H A Dgpiokeys.c130 int sc_state; /* shift/lock key state */
131 int sc_accents; /* accent key index (> 0) */
156 gpiokeys_put_key(struct gpiokeys_softc *sc, uint32_t key) argument
162 sc->sc_input[sc->sc_inputtail] = key;
176 uint32_t key; local
179 key = keycode & SCAN_KEYCODE_MASK;
182 key |= KEY_RELEASE;
190 gpiokeys_put_key(sc, key);
199 struct gpiokey *key; local
201 key
215 struct gpiokey *key; local
242 struct gpiokey *key; local
258 gpiokeys_attach_key(struct gpiokeys_softc *sc, phandle_t node, struct gpiokey *key) argument
352 gpiokeys_detach_key(struct gpiokeys_softc *sc, struct gpiokey *key) argument
[all...]
/freebsd-11-stable/contrib/ntp/lib/isc/include/isc/
H A Dhmacsha.h52 unsigned char key[ISC_HMACSHA1_KEYLENGTH]; member in struct:__anon4824
57 unsigned char key[ISC_HMACSHA224_KEYLENGTH]; member in struct:__anon4825
62 unsigned char key[ISC_HMACSHA256_KEYLENGTH]; member in struct:__anon4826
67 unsigned char key[ISC_HMACSHA384_KEYLENGTH]; member in struct:__anon4827
72 unsigned char key[ISC_HMACSHA512_KEYLENGTH]; member in struct:__anon4828
79 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key,
97 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key,
115 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key,
133 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key,
151 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key,
[all...]
/freebsd-11-stable/lib/librpcsvc/
H A Dxcrypt.c54 * Encrypt a secret key given passwd
55 * The secret key is passed and returned in hex notation.
61 char key[8]; local
73 passwd2des(passwd, key);
76 err = cbc_crypt(key, buf, len, DES_ENCRYPT | DES_HW, ivec);
87 * Decrypt secret key using passwd
88 * The secret key is passed and returned in hex notation.
94 char key[8]; local
106 passwd2des(passwd, key);
109 err = cbc_crypt(key, bu
124 passwd2des(char *pw, char *key) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Daes-eax.c18 * @key: Key for encryption (16 bytes)
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac))
59 if (omac1_aes_128(key, buf, 16 + hdr_len, hdr_mac))
62 if (aes_128_ctr_encrypt(key, nonce_mac, data, data_len))
66 if (omac1_aes_128(key, buf, 16 + data_len, data_mac))
82 * @key: Key for decryption (16 bytes)
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
118 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) {
125 if (omac1_aes_128(key, bu
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Denv.c43 * Add a new key/value pair to the hx509_env.
47 * @param key key to add
57 const char *key, const char *value)
69 n->name = strdup(key);
94 * Add a new key/binding pair to the hx509_env.
98 * @param key key to add
108 const char *key, hx509_env list)
120 n->name = strdup(key);
56 hx509_env_add(hx509_context context, hx509_env *env, const char *key, const char *value) argument
107 hx509_env_add_binding(hx509_context context, hx509_env *env, const char *key, hx509_env list) argument
154 hx509_env_lfind(hx509_context context, hx509_env env, const char *key, size_t len) argument
179 hx509_env_find(hx509_context context, hx509_env env, const char *key) argument
202 hx509_env_find_binding(hx509_context context, hx509_env env, const char *key) argument
[all...]
/freebsd-11-stable/stand/libsa/geli/
H A Dgeliboot_crypto.c39 const u_char *key, size_t keysize, u_char *iv)
50 (const char *)key);
81 rijndael_set_key(&ctxp->key1, key, xts_len / 2);
82 rijndael_set_key(&ctxp->key2, key + (xts_len / 16), xts_len / 2);
109 const u_char *key, size_t keysize)
114 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv));
119 const u_char *key, size_t keysize)
126 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize));
131 const u_char *key, size_t keysize)
138 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysiz
38 geliboot_crypt(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize, u_char *iv) argument
108 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
118 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
130 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
/freebsd-11-stable/contrib/llvm-project/lld/lib/ReaderWriter/MachO/
H A DLayoutPass.h44 SortKey(SortKey &&key) : _atom(std::move(key._atom)), _root(key._root), argument
45 _override(key._override) {
46 key._root = nullptr;
49 SortKey &operator=(SortKey &&key) { argument
50 _atom = std::move(key._atom);
51 _root = key._root;
52 key._root = nullptr;
53 _override = key
[all...]
/freebsd-11-stable/crypto/openssh/regress/
H A Dhostkey-agent.sh6 rm -f $OBJ/agent-key.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig
17 for k in `${SSH} -Q key-plain` ; do
18 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k"
21 cat $OBJ/agent-key.$k.pub
23 ${SSHADD} $OBJ/agent-key.$k >/dev/null 2>&1 || \
24 fatal "couldn't load key $OBJ/agent-key.$k"
25 echo "Hostkey $OBJ/agent-key.${k}" >> $OBJ/sshd_proxy.orig
26 # Remove private key so the server can't use it.
27 rm $OBJ/agent-key
[all...]
/freebsd-11-stable/contrib/nvi/ex/
H A Dex_usage.c46 "For a vi key usage statement enter \":viusage [key]<CR>\"\n");
133 * ex_viusage -- :viusage [key]
143 int key; local
152 key = cmdp->argv[0]->bp[0];
153 if (key > MAXVIKEY)
157 if ((key == '[' || key == ']') && cmdp->argv[0]->bp[1] != key)
161 if (key
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dssh-ecdsa.c48 ssh_ecdsa_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, argument
63 if (key == NULL || key->ecdsa == NULL ||
64 sshkey_type_plain(key->type) != KEY_ECDSA)
67 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 ||
74 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) {
86 if ((ret = sshbuf_put_cstring(b, sshkey_ssh_name_plain(key))) != 0 ||
111 ssh_ecdsa_verify(const struct sshkey *key, argument
123 if (key == NULL || key
[all...]
/freebsd-11-stable/lib/libnv/tests/
H A Dnv_tests.cc68 const char *key; local
71 key = "key";
75 ATF_REQUIRE(!nvlist_exists(nvl, key));
77 nvlist_add_null(nvl, key);
80 ATF_REQUIRE(nvlist_exists(nvl, key));
81 ATF_REQUIRE(nvlist_exists_null(nvl, key));
82 ATF_REQUIRE(nvlist_exists_null(nvl, "key"));
84 /* Iterate over the nvlist; ensure that it has only our one key. */
86 ATF_REQUIRE_EQ(strcmp(nvlist_next(nvl, &type, &it), key),
98 const char *key; local
130 const char *key; local
163 const char *key; local
200 const char *key, *subkey; local
259 const char *key; local
320 const char *key; local
665 const char *key; local
714 const char *key; local
734 const char *key; local
1037 const char *key; local
1053 const char *key; local
1069 const char *key; local
1085 const char *key; local
1101 const char *key; local
1117 const char *key; local
1133 const char *key; local
1149 const char *key; local
1165 const char *key; local
1181 const char *key; local
1197 const char *key; local
1213 const char *key; local
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dtest_pkinit_dh2key.c47 krb5_keyblock key; local
54 &key);
58 if (key.keyvalue.length != result->length ||
59 memcmp(key.keyvalue.data, result->data, result->length) != 0)
60 krb5_errx(context, 1, "resulting key wrong: %d", i);
62 krb5_free_keyblock_contents(context, &key);
69 krb5_data key; member in struct:__anon6045
210 tests[i].type, &tests[i].key);
/freebsd-11-stable/lib/libc/db/test/hash.tests/
H A Dtdel.c59 DBT item, key; local
82 key.data = wp1;
90 key.size = strlen(wp1);
94 * enter key/data pair into the table
96 if ((dbp->put)(dbp, &key, &item, R_NOOVERWRITE) != NULL) {
97 fprintf(stderr, "cannot enter: key %s\n",
109 key.size = strlen(wp1);
110 stat = (dbp->del)(dbp, &key, 0);
112 fprintf ( stderr, "Error retrieving %s\n", key.data );

Completed in 332 milliseconds

1234567891011>>