/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/asn1/ |
H A D | hash.h | 66 void *ptr); /* The key */ 87 #define hashtabdel(htab,key) _hashtabdel(htab,key,FALSE) 89 #define hashtabfree(htab,key) _hashtabdel(htab,key,TRUE) /* Do! */
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | check-cracklib.pl | 71 my $key=$md5context->hexdigest(); 74 if (!$DB{$key} || ($timenow - $DB{$key} < $reusetime)) { 76 $DB{$key}=$timenow; 92 die "key value pair not correct: $_";
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | generate_seq_number.c | 40 const krb5_keyblock *key, 39 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, uint32_t *seqno) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/wind/ |
H A D | map.c | 46 translation_cmp(const void *key, const void *data) argument 48 const struct translation *t1 = (const struct translation *)key; 51 return t1->key - t2->key;
|
H A D | gen-map.py | 68 uint32_t key; 99 for key in xrange(start,end,1): 100 trans.append((key, value, desc, [t])) 104 key = int(m.group(1), 0x10) variable 107 trans.append((key, value, desc, [t])) 120 (key, value, description, table) = x 124 offsetTable[key] = i 126 offsetTable[key] = len(valTable) 130 (key, value, description, tables) = x 133 print "no symbol for %s %s (%s)" % (key, descriptio [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/lib/libwind/ |
H A D | map_table.h | 10 uint32_t key; member in struct:translation
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | ssh-ecdsa.c | 43 #include "key.h" 46 ssh_ecdsa_sign(const Key *key, u_char **sigp, u_int *lenp, argument 56 if (key == NULL || key->ecdsa == NULL || 57 (key->type != KEY_ECDSA && key->type != KEY_ECDSA_CERT)) { 58 error("%s: no ECDSA key", __func__); 61 evp_md = key_ec_nid_to_evpmd(key->ecdsa_nid); 66 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 80 buffer_put_cstring(&b, key_ssh_name_plain(key)); 95 ssh_ecdsa_verify(const Key *key, const u_char *signature, u_int signaturelen, const u_char *data, u_int datalen) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rc4/asm/ |
H A D | rc4-s390x.pl | 46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 50 $key="%r2"; 71 llgc $XX[0],0($key) 72 llgc $YY,1($key) 77 llgc $TX[0],2($XX[0],$key) 92 llgc $acc,2($TY,$key) 96 ic $acc,2($TY,$key) 99 llgc $TY,2($YY,$key) 100 stc $TX[0],2($YY,$key) 101 llgc $TX[1],2($XX[1],$key) [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rc4/ |
H A D | rc4_skey.c | 88 void private_RC4_set_key(RC4_KEY *key, int len, const unsigned char *data) argument 95 d= &(key->data[0]); 96 key->x = 0; 97 key->y = 0;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rc5/ |
H A D | rc5.h | 103 void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, 105 void RC5_32_ecb_encrypt(const unsigned char *in,unsigned char *out,RC5_32_KEY *key, 107 void RC5_32_encrypt(RC5_32_INT *data,RC5_32_KEY *key); 108 void RC5_32_decrypt(RC5_32_INT *data,RC5_32_KEY *key);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/include/isc/ |
H A D | symtab.h | 32 * Keys are C strings, and key comparisons are case-insensitive. A type may 37 * It's possible that a client will attempt to define a <key, type, value> 38 * tuple when a tuple with the given key and type already exists in the table. 44 * with the old <key, type, value> tuple. 49 * A lookup of a key using type 0 will return the most-recently defined 50 * symbol with that key. An undefine of a key using type 0 will undefine the 51 * most-recently defined symbol with that key. Trying to define a key with 54 * The symbol table library does not make a copy the key fiel [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/irs/ |
H A D | gai_strerror.c | 60 static pthread_key_t key; 73 if (pthread_key_create(&key, free) != 0) { 83 buf = pthread_getspecific(key); 88 if (pthread_setspecific(key, buf) != 0) {
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/lib/isc/include/isc/ |
H A D | symtab.h | 32 * Keys are C strings, and key comparisons are case-insensitive. A type may 37 * It's possible that a client will attempt to define a <key, type, value> 38 * tuple when a tuple with the given key and type already exists in the table. 44 * with the old <key, type, value> tuple. 49 * A lookup of a key using type 0 will return the most-recently defined 50 * symbol with that key. An undefine of a key using type 0 will undefine the 51 * most-recently defined symbol with that key. Trying to define a key with 54 * The symbol table library does not make a copy the key fiel [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/ |
H A D | input-keys.c | 28 * key code and translates it into something suitable to be sent to the 34 int key; member in struct:input_key_ent 38 #define INPUTKEY_KEYPAD 0x1 /* keypad key */ 39 #define INPUTKEY_CURSOR 0x2 /* cursor key */ 43 /* Backspace key. */ 135 /* Translate a key code into an output key sequence. */ 137 input_key(struct window_pane *wp, int key) argument 145 log_debug2("writing key 0x%x", key); [all...] |
H A D | tty-acs.c | 29 u_char key; member in struct:tty_acs_entry 68 tty_acs_cmp(const void *key, const void *value) argument 73 ch = *(const u_char *) key; 74 return (ch - entry->key);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | crypto_none.c | 27 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) argument
|
H A D | sha1.h | 20 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 int sha1_prf(const u8 *key, size_t key_len, const char *label, 26 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_peap_common.h | 18 void peap_prfplus(int version, const u8 *key, size_t key_len,
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.c-torture/compile/ |
H A D | pr26425.c | 2 struct key *keys[0];
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/torture/ |
H A D | pr25947-1.c | 10 rl_vi_complete (int ignore, int key) argument
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.dg/torture/ |
H A D | pr25947-1.c | 9 rl_vi_complete (int ignore, int key) argument
|
/netbsd-6-1-5-RELEASE/libexec/makekey/ |
H A D | makekey.c | 56 char *r, key[9], salt[3]; local 58 get(key, sizeof(key) - 1); 60 len = strlen(r = crypt(key, salt));
|
/netbsd-6-1-5-RELEASE/sys/arch/bebox/stand/boot/ |
H A D | cpu.c | 124 volatile long *key = (volatile long *)0x0080; local 127 *key = 0; 129 while (*key == 0) 132 run(NULL, NULL, NULL, NULL, (void *)*key);
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/util/ |
H A D | dict_thash.c | 76 * Optionally fold the key. 96 const char **key, const char **value) 122 *key = dict_thash->cursor[0]->key; 155 char *key; local 192 * trailing whitespace from key and value. 194 key = STR(line_buffer); 195 value = key + strcspn(key, " \t\r\n"); 200 trimblanks(key, 95 dict_thash_sequence(DICT *dict, int function, const char **key, const char **value) argument [all...] |
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/bsd-core/ |
H A D | drm_hashtab.h | 43 unsigned long key; member in struct:drm_hash_item 58 extern int drm_ht_find_item(struct drm_open_hash *ht, unsigned long key, struct drm_hash_item **item); 60 extern void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key); 61 extern int drm_ht_remove_key(struct drm_open_hash *ht, unsigned long key);
|