/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_pubkey.c | 127 EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key) 131 if (key == NULL) 134 if (key->pkey != NULL) { 135 CRYPTO_add(&key->pkey->references, 1, CRYPTO_LOCK_EVP_PKEY); 136 return key->pkey; 139 if (key->public_key == NULL) 147 if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm))) { 153 if (!ret->ameth->pub_decode(ret, key)) { 162 /* Check to see if another thread set key->pkey first */ 164 if (key [all...] |
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 102 AES_KEY *key); 104 AES_KEY *key); 109 const AES_KEY *key, unsigned char *ivec, int enc); 112 const AES_KEY *key, unsigned char iv[16], 116 const AES_KEY *key, unsigned char iv[16], 125 EVP_AES_HMAC_SHA1 *key = data(ctx); local 129 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 131 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 133 SHA1_Init(&key->head); /* handy when benchmarking */ 134 key 208 tls1_1_multi_block_encrypt(EVP_AES_HMAC_SHA1 *key, unsigned char *out, const unsigned char *inp, size_t inp_len, int n4x) argument 459 EVP_AES_HMAC_SHA1 *key = data(ctx); local 821 EVP_AES_HMAC_SHA1 *key = data(ctx); local [all...] |
/freebsd-11-stable/lib/libc/db/test/btree.tests/ |
H A D | main.c | 87 "a", 2, 1, append, "append key def", "append key with data def", 90 "delc", 0, 0, delcur, "delcur", "delete key the cursor references", 94 "g", 1, 1, get, "get key", "locate key", 96 "ia", 2, 1, iafter, "iafter key data", "insert data after key", 97 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key", 98 "ic", 2, 1, icursor, "icursor key dat 275 DBT key, data; local 305 DBT data, key; local 345 DBT key; local 380 DBT data, key; local 403 DBT data, key; local 445 DBT key, data; local 475 DBT key, data; local 506 DBT data, key; local 535 DBT data, key; local 563 DBT data, key; local 586 DBT data, key; local 611 DBT data, key; local 664 DBT data, key; local 687 DBT data, key; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hdb/ |
H A D | common.c | 37 hdb_principal2key(krb5_context context, krb5_const_principal p, krb5_data *key) argument 48 ASN1_MALLOC_ENCODE(Principal, key->data, key->length, &new, &len, ret); 49 if (ret == 0 && key->length != len) 56 hdb_key2principal(krb5_context context, krb5_data *key, krb5_principal p) argument 58 return decode_Principal(key->data, key->length, p, NULL); 106 krb5_data key, value; local 125 hdb_principal2key(context, principal, &key); 128 code = db->hdb__get(context, db, key, 168 hdb_remove_aliases(krb5_context context, HDB *db, krb5_data *key) argument 213 krb5_data key, value; local 284 krb5_data key, value; local 333 krb5_data key; local [all...] |
/freebsd-11-stable/crypto/openssl/crypto/modes/ |
H A D | modes.h | 14 unsigned char out[16], const void *key); 17 size_t len, const void *key, 21 size_t blocks, const void *key, 25 size_t blocks, const void *key, 30 size_t len, const void *key, 33 size_t len, const void *key, 37 size_t len, const void *key, 43 size_t len, const void *key, 49 size_t len, const void *key, 54 size_t len, const void *key, [all...] |
/freebsd-11-stable/crypto/openssl/crypto/rc4/asm/ |
H A D | rc4-s390x.pl | 46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 50 $key="%r2"; 71 llgc $XX[0],0($key) 72 llgc $YY,1($key) 77 llgc $TX[0],2($XX[0],$key) 92 llgc $acc,2($TY,$key) 96 ic $acc,2($TY,$key) 99 llgc $TY,2($YY,$key) 100 stc $TX[0],2($YY,$key) 101 llgc $TX[1],2($XX[1],$key) [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | auth2-hostbased.c | 42 #include "key.h" 62 Key *key = NULL; local 92 "public key algorithm: %s", pkalg); 95 key = key_from_blob(pkblob, blen); 96 if (key == NULL) { 97 error("userauth_hostbased: cannot decode key: %s", pkalg); 100 if (key->type != pktype) { 101 error("userauth_hostbased: type mismatch for decoded key " 102 "(received %d, expected %d)", key->type, pktype); 105 if (key_type_plain(key 160 hostbased_key_allowed(struct passwd *pw, const char *cuser, char *chost, Key *key) argument [all...] |
/freebsd-11-stable/contrib/ntp/lib/isc/include/isc/ |
H A D | symtab.h | 30 * Keys are C strings, and key comparisons are case-insensitive. A type may 35 * It's possible that a client will attempt to define a <key, type, value> 36 * tuple when a tuple with the given key and type already exists in the table. 42 * with the old <key, type, value> tuple. 47 * A lookup of a key using type 0 will return the most-recently defined 48 * symbol with that key. An undefine of a key using type 0 will undefine the 49 * most-recently defined symbol with that key. Trying to define a key with 52 * The symbol table library does not make a copy the key fiel [all...] |
/freebsd-11-stable/contrib/apr-util/crypto/ |
H A D | crypt_blowfish.h | 21 extern char *_crypt_blowfish_rn(const char *key, const char *setting,
|
/freebsd-11-stable/sys/dev/drm/ |
H A D | drm_hashtab.h | 46 unsigned long key; member in struct:drm_hash_item 61 extern int drm_ht_find_item(struct drm_open_hash *ht, unsigned long key, struct drm_hash_item **item); 63 extern void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key); 64 extern int drm_ht_remove_key(struct drm_open_hash *ht, unsigned long key);
|
/freebsd-11-stable/sys/dev/drm2/ |
H A D | drm_hashtab.h | 46 unsigned long key; member in struct:drm_hash_item 61 extern int drm_ht_find_item(struct drm_open_hash *ht, unsigned long key, struct drm_hash_item **item); 63 extern void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key); 64 extern int drm_ht_remove_key(struct drm_open_hash *ht, unsigned long key);
|
/freebsd-11-stable/crypto/heimdal/lib/asn1/ |
H A D | hash.h | 64 void *ptr); /* The key */ 85 #define hashtabdel(htab,key) _hashtabdel(htab,key,FALSE) 87 #define hashtabfree(htab,key) _hashtabdel(htab,key,TRUE) /* Do! */
|
/freebsd-11-stable/contrib/opie/libopie/ |
H A D | verify.c | 73 struct opie_otpkey key, fkey, lastkey; local 110 if (opieetob(&key, response) == 1) { 111 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 115 if (i && opieatob8(&key, response)) { 116 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 124 if (opieetob(&key, c) == 1) { 125 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 133 if (opieatob8(&key, c)) { 134 memcpy(&fkey, &key, sizeof(struct opie_otpkey)); 150 if (!opieatob8(&key, [all...] |
/freebsd-11-stable/libexec/mknetid/ |
H A D | hash.h | 43 char *key; /* username */ member in struct:member_entry
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
/freebsd-11-stable/crypto/heimdal/lib/kadm5/ |
H A D | check-cracklib.pl | 71 my $key=$md5context->hexdigest(); 74 if (!$DB{$key} || ($timenow - $DB{$key} < $reusetime)) { 76 $DB{$key}=$timenow; 92 die "key value pair not correct: $_";
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | generate_seq_number.c | 38 const krb5_keyblock *key, 37 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, uint32_t *seqno) argument
|
/freebsd-11-stable/crypto/heimdal/lib/wind/ |
H A D | map.c | 44 translation_cmp(const void *key, const void *data) argument 46 const struct translation *t1 = (const struct translation *)key; 49 return t1->key - t2->key;
|
H A D | map_table.h | 10 uint32_t key; member in struct:translation
|
/freebsd-11-stable/sys/geom/eli/ |
H A D | pkcs5v2.h | 31 void pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt,
|
/freebsd-11-stable/crypto/openssl/crypto/rc4/ |
H A D | rc4_skey.c | 89 void private_RC4_set_key(RC4_KEY *key, int len, const unsigned char *data) argument 96 d = &(key->data[0]); 97 key->x = 0; 98 key->y = 0;
|
/freebsd-11-stable/crypto/openssl/crypto/rc5/ |
H A D | rc5.h | 95 void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, 98 RC5_32_KEY *key, int enc); 99 void RC5_32_encrypt(unsigned long *data, RC5_32_KEY *key); 100 void RC5_32_decrypt(unsigned long *data, RC5_32_KEY *key);
|
/freebsd-11-stable/usr.sbin/rpc.ypupdated/ |
H A D | ypupdated_server.c | 114 args->key.yp_buf_len, args->key.yp_buf_val, 121 args->key.yp_buf_len, args->key.yp_buf_val, 148 args->key.yp_buf_len, args->key.yp_buf_val, 155 args->key.yp_buf_len, args->key.yp_buf_val, 182 args->key.yp_buf_len, args->key [all...] |
/freebsd-11-stable/contrib/ntp/sntp/tests/ |
H A D | keyFile.c | 10 bool CompareKeys(struct key expected, struct key actual); 11 bool CompareKeysAlternative(int key_id,int key_len,const char* type,const char* key_seq,struct key actual); 21 struct key expected, 22 struct key actual 55 struct key actual 58 struct key temp; 72 struct key * keys = NULL; 73 const char * path = CreatePath("key-test-empty", INPUT_DIR); 86 struct key * key [all...] |