/freebsd-11-stable/contrib/netbsd-tests/lib/libc/gen/ |
H A D | t_ftok.c | 44 static const int key = 123456789; variable 54 ATF_REQUIRE(ftok("/a/b/c/d/e/f/g/h/i", key) == -1); 60 atf_tc_set_md_var(tc, "descr", "Test that links return the same key"); 75 k1 = ftok(path, key); 76 k2 = ftok(hlnk, key); 77 k3 = ftok(slnk, key); 84 atf_tc_fail("ftok(3) gave different key for a hard link"); 87 atf_tc_fail("ftok(3) gave different key for a symbolic link");
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | sha256-prf.c | 18 * @key: Key for PRF 19 * @key_len: Length of the key in bytes 21 * @data: Extra data to bind into the key 23 * @buf: Buffer for the generated pseudo-random key 24 * @buf_len: Number of bytes of key to generate 28 * given key. 30 int sha256_prf(const u8 *key, size_t key_len, const char *label, argument 33 return sha256_prf_bits(key, key_len, label, data, data_len, buf, 40 * @key: Key for KDF 41 * @key_len: Length of the key i 54 sha256_prf_bits(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len_bits) argument [all...] |
H A D | sha512-prf.c | 18 * @key: Key for KDF 19 * @key_len: Length of the key in bytes 21 * @data: Extra data to bind into the key 23 * @buf: Buffer for the generated pseudo-random key 24 * @buf_len: Number of bytes of key to generate 28 * given key. 30 int sha512_prf(const u8 *key, size_t key_len, const char *label, argument 33 return sha512_prf_bits(key, key_len, label, data, data_len, buf, 40 * @key: Key for KDF 41 * @key_len: Length of the key i 54 sha512_prf_bits(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len_bits) argument [all...] |
H A D | sha384-prf.c | 18 * @key: Key for KDF 19 * @key_len: Length of the key in bytes 21 * @data: Extra data to bind into the key 23 * @buf: Buffer for the generated pseudo-random key 24 * @buf_len: Number of bytes of key to generate 28 * given key. 30 int sha384_prf(const u8 *key, size_t key_len, const char *label, argument 33 return sha384_prf_bits(key, key_len, label, data, data_len, buf, 40 * @key: Key for KDF 41 * @key_len: Length of the key i 54 sha384_prf_bits(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len_bits) argument [all...] |
H A D | sha1-prf.c | 18 * @key: Key for PRF 19 * @key_len: Length of the key in bytes 21 * @data: Extra data to bind into the key 23 * @buf: Buffer for the generated pseudo-random key 24 * @buf_len: Number of bytes of key to generate 28 * given key (e.g., PMK in IEEE 802.11i). 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
/freebsd-11-stable/crypto/heimdal/lib/hdb/ |
H A D | keys.c | 54 krb5_free_keyblock_contents(context, &keys[i].key); 83 parse_key_set(krb5_context context, const char *key, argument 95 p = key; 165 krb5_set_error_message(context, EINVAL, "bad value for default_keys `%s'", key); 204 Key key, *tmp; local 206 memset(&key, 0, sizeof(key)); 214 key.key.keytype = enctype; 215 key [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | cache-inprocess.c | 38 /* HASH maps a key (of size KLEN) to a struct cache_entry. */ 111 const void *key; member in struct:cache_entry 173 const void *key, 177 return apr_pstrdup(pool, key); 179 return apr_pmemdup(pool, key, cache->klen); 186 const void *key, 189 struct cache_entry *entry = apr_hash_get(cache->hash, key, cache->klen); 215 const void *key, 220 if (key) 229 key, 172 duplicate_key(inprocess_cache_t *cache, const void *key, apr_pool_t *pool) argument 183 inprocess_cache_get_internal(char **buffer, apr_size_t *size, inprocess_cache_t *cache, const void *key, apr_pool_t *result_pool) argument 212 inprocess_cache_get(void **value_p, svn_boolean_t *found, void *cache_void, const void *key, apr_pool_t *result_pool) argument 249 inprocess_cache_has_key_internal(svn_boolean_t *found, inprocess_cache_t *cache, const void *key, apr_pool_t *scratch_pool) argument 260 inprocess_cache_has_key(svn_boolean_t *found, void *cache_void, const void *key, apr_pool_t *scratch_pool) argument 312 inprocess_cache_set_internal(inprocess_cache_t *cache, const void *key, void *value, apr_pool_t *scratch_pool) argument 439 inprocess_cache_set(void *cache_void, const void *key, void *value, apr_pool_t *scratch_pool) argument 466 iter_cb(void *baton, const void *key, apr_ssize_t klen, void *val, apr_pool_t *pool) argument 497 inprocess_cache_get_partial_internal(void **value_p, svn_boolean_t *found, inprocess_cache_t *cache, const void *key, svn_cache__partial_getter_func_t func, void *baton, apr_pool_t *result_pool) argument 519 inprocess_cache_get_partial(void **value_p, svn_boolean_t *found, void *cache_void, const void *key, svn_cache__partial_getter_func_t func, void *baton, apr_pool_t *result_pool) argument 545 inprocess_cache_set_partial_internal(inprocess_cache_t *cache, const void *key, svn_cache__partial_setter_func_t func, void *baton, apr_pool_t *scratch_pool) argument 568 inprocess_cache_set_partial(void *cache_void, const void *key, svn_cache__partial_setter_func_t func, void *baton, apr_pool_t *scratch_pool) argument [all...] |
/freebsd-11-stable/usr.sbin/ctld/ |
H A D | uclparse.c | 66 "\"user\" string key", auth_group->ag_name); 73 "\"secret\" string key", auth_group->ag_name); 96 "\"user\" string key", auth_group->ag_name); 103 "\"secret\" string key", auth_group->ag_name); 110 "\"mutual-user\" string key", auth_group->ag_name); 117 "\"mutual-secret\" string key", auth_group->ag_name); 144 "\"name\" string key", target->t_name); 151 "\"auth-group-name\" string key", target->t_name); 251 const char *key = ucl_object_key(obj); local 253 if (!strcmp(key, "debu 369 const char *key = ucl_object_key(obj); local 397 const char *key; local 498 const char *key; local 621 const char *key; local 811 const char *key; local [all...] |
/freebsd-11-stable/contrib/unbound/sldns/ |
H A D | keyraw.c | 2 * keyraw.c - raw key operations and conversions 106 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument 112 if (key[3] == LDNS_RSAMD5) { 115 memmove(&ac16, key + keysize - 3, 2); 123 ac32 += (i & 1) ? key[i] : key[i] << 8; 195 sldns_key_buf2dsa_raw(unsigned char* key, size_t len) argument 206 T = (uint8_t)key[0]; 216 Q = BN_bin2bn(key+offset, SHA_DIGEST_LENGTH, NULL); 219 P = BN_bin2bn(key 266 sldns_key_buf2rsa_raw(unsigned char* key, size_t len) argument 333 sldns_gost2pkey_raw(unsigned char* key, size_t keylen) argument 358 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument 401 sldns_ed255192pkey_raw(const unsigned char* key, size_t keylen) argument 422 sldns_ed4482pkey_raw(const unsigned char* key, size_t keylen) argument [all...] |
/freebsd-11-stable/contrib/gcclibs/libiberty/ |
H A D | splay-tree.c | 63 KDEL (node->key); 66 /* We use the "key" field to hold the "next" pointer. */ 67 node->key = (splay_tree_key)pending; 82 /* active points to a node which has its key and value 87 KDEL (active->left->key); 89 active->left->key = (splay_tree_key)pending; 94 KDEL (active->right->key); 96 active->right->key = (splay_tree_key)pending; 101 active = (splay_tree_node)(temp->key); 135 /* Bottom up splay of key 138 splay_tree_splay(splay_tree sp, splay_tree_key key) argument 295 splay_tree_insert(splay_tree sp, splay_tree_key key, splay_tree_value value) argument 347 splay_tree_remove(splay_tree sp, splay_tree_key key) argument 387 splay_tree_lookup(splay_tree sp, splay_tree_key key) argument 433 splay_tree_predecessor(splay_tree sp, splay_tree_key key) argument 464 splay_tree_successor(splay_tree sp, splay_tree_key key) argument [all...] |
/freebsd-11-stable/contrib/binutils/libiberty/ |
H A D | splay-tree.c | 63 KDEL (node->key); 66 /* We use the "key" field to hold the "next" pointer. */ 67 node->key = (splay_tree_key)pending; 82 /* active points to a node which has its key and value 87 KDEL (active->left->key); 89 active->left->key = (splay_tree_key)pending; 94 KDEL (active->right->key); 96 active->right->key = (splay_tree_key)pending; 101 active = (splay_tree_node)(temp->key); 135 /* Bottom up splay of key 138 splay_tree_splay(splay_tree sp, splay_tree_key key) argument 295 splay_tree_insert(splay_tree sp, splay_tree_key key, splay_tree_value value) argument 347 splay_tree_remove(splay_tree sp, splay_tree_key key) argument 387 splay_tree_lookup(splay_tree sp, splay_tree_key key) argument 433 splay_tree_predecessor(splay_tree sp, splay_tree_key key) argument 464 splay_tree_successor(splay_tree sp, splay_tree_key key) argument [all...] |
/freebsd-11-stable/contrib/ncurses/ncurses/tinfo/ |
H A D | hashed_db.c | 204 _nc_db_put(DB * db, DBT * key, DBT * data) argument 209 (void) db->del(db, NULL, key, 0); 210 result = db->put(db, NULL, key, data, DB_NOOVERWRITE); 212 result = db->put(db, key, data, R_NOOVERWRITE); 223 _nc_db_get(DB * db, DBT * key, DBT * data) argument 229 result = db->get(db, NULL, key, data, 0); 231 result = db->get(db, key, data, 0); 242 _nc_db_first(DB * db, DBT * key, DBT * data) argument 246 memset(key, 0, sizeof(*key)); 264 _nc_db_next(DB * db, DBT * key, DBT * data) argument [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_base/bdb/ |
H A D | locks-table.c | 85 DBT key, value; local 90 svn_fs_base__str_to_dbt(&key, lock_token); 95 &key, &value, 0)); 107 DBT key; local 110 svn_fs_base__str_to_dbt(&key, lock_token); 112 db_err = bfd->locks->del(bfd->locks, trail->db_txn, &key, 0); 129 DBT key, value; local 136 svn_fs_base__str_to_dbt(&key, lock_token), 186 matching path-key. */ 204 DBT key, valu local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | collector.c | 104 free_private_key(struct private_key *key) argument 106 free_AlgorithmIdentifier(&key->alg); 107 if (key->private_key) 108 hx509_private_key_free(&key->private_key); 109 der_free_octet_string(&key->localKeyId); 110 free(key); 121 struct private_key *key; local 125 key = calloc(1, sizeof(*key)); 126 if (key [all...] |
/freebsd-11-stable/lib/libc/iconv/ |
H A D | citrus_db.c | 98 _citrus_db_lookup(struct _citrus_db *db, struct _citrus_region *key, argument 121 hashval = db->db_hashfunc(key)%num_entries; 150 /* compare key length */ 151 if (be32toh(dex->dex_key_size) == _region_size(key)) { 152 /* seek to the head of the key. */ 156 /* get the region of the key */ 158 _region_size(key)) == NULL) 160 /* compare key byte stream */ 161 if (memcmp(_region_head(&r), _region_head(key), 162 _region_size(key)) 181 _citrus_db_lookup_by_string(struct _citrus_db *db, const char *key, struct _citrus_region *data, struct _citrus_db_locator *dl) argument 192 _citrus_db_lookup8_by_string(struct _citrus_db *db, const char *key, uint8_t *rval, struct _citrus_db_locator *dl) argument 212 _citrus_db_lookup16_by_string(struct _citrus_db *db, const char *key, uint16_t *rval, struct _citrus_db_locator *dl) argument 235 _citrus_db_lookup32_by_string(struct _citrus_db *db, const char *key, uint32_t *rval, struct _citrus_db_locator *dl) argument 258 _citrus_db_lookup_string_by_string(struct _citrus_db *db, const char *key, const char **rdata, struct _citrus_db_locator *dl) argument 293 _citrus_db_get_entry(struct _citrus_db *db, int idx, struct _region *key, struct _region *data) argument [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | auth2-pubkey.c | 55 #include "key.h" 81 Key *key = NULL; local 109 logit("%s: unsupported public key algorithm: %s", 113 key = key_from_blob(pkblob, blen); 114 if (key == NULL) { 115 error("%s: cannot decode key: %s", __func__, pkalg); 118 if (key->type != pktype) { 119 error("%s: type mismatch for decoded key " 120 "(received %d, expected %d)", __func__, key->type, pktype); 123 if (key_type_plain(key 223 pubkey_auth_info(Authctxt *authctxt, const Key *key, const char *fmt, ...) argument 636 match_principals_command(struct passwd *user_pw, const struct sshkey *key) argument 764 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) argument 879 user_cert_trusted_ca(struct passwd *pw, Key *key) argument 945 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument 968 user_key_command_allowed2(struct passwd *user_pw, Key *key) argument 1091 user_key_allowed(struct passwd *pw, Key *key, int auth_attempt) argument 1125 auth2_record_userkey(Authctxt *authctxt, struct sshkey *key) argument 1140 auth2_userkey_already_used(Authctxt *authctxt, struct sshkey *key) argument [all...] |
/freebsd-11-stable/contrib/llvm-project/lldb/source/Interpreter/ |
H A D | OptionValueDictionary.cpp | 110 "assign operation takes one or more key=value arguments"); 120 "assign operation takes one or more key=value arguments"); 124 llvm::StringRef key, value; local 125 std::tie(key, value) = entry.ref().split('='); 127 if (key.empty()) { 128 error.SetErrorString("empty dictionary key"); 132 if (key.front() == '[') { 133 // Key name starts with '[', so the key value must be in single or 134 // double quotes like: ['<key>'] ["<key>"] 231 llvm::StringRef key, quote_char; local 287 SetValueForKey(ConstString key, const lldb::OptionValueSP &value_sp, bool can_replace) argument 304 DeleteValueForKey(ConstString key) argument [all...] |
/freebsd-11-stable/contrib/apr-util/dbm/ |
H A D | apr_dbm_ndbm.c | 121 static apr_status_t vt_ndbm_fetch(apr_dbm_t *dbm, apr_datum_t key, argument 126 kd.dptr = key.dptr; 127 kd.dsize = key.dsize; 139 static apr_status_t vt_ndbm_store(apr_dbm_t *dbm, apr_datum_t key, argument 145 kd.dptr = key.dptr; 146 kd.dsize = key.dsize; 157 static apr_status_t vt_ndbm_del(apr_dbm_t *dbm, apr_datum_t key) argument 162 kd.dptr = key.dptr; 163 kd.dsize = key.dsize; 171 static int vt_ndbm_exists(apr_dbm_t *dbm, apr_datum_t key) argument [all...] |
H A D | apr_dbm_sdbm.c | 104 static apr_status_t vt_sdbm_fetch(apr_dbm_t *dbm, apr_datum_t key, argument 110 kd.dptr = key.dptr; 111 kd.dsize = (int)key.dsize; 123 static apr_status_t vt_sdbm_store(apr_dbm_t *dbm, apr_datum_t key, argument 129 kd.dptr = key.dptr; 130 kd.dsize = (int)key.dsize; 141 static apr_status_t vt_sdbm_del(apr_dbm_t *dbm, apr_datum_t key) argument 146 kd.dptr = key.dptr; 147 kd.dsize = (int)key.dsize; 155 static int vt_sdbm_exists(apr_dbm_t *dbm, apr_datum_t key) argument [all...] |
/freebsd-11-stable/sys/crypto/camellia/ |
H A D | camellia.h | 37 int bits; /* key-length */ 38 uint32_t subkey[CAMELLIA_SUBKEYWORD]; /* encrypt/decrypt key schedule */ 60 void camellia_setup128(const unsigned char *key, uint32_t *subkey); 61 void camellia_setup192(const unsigned char *key, uint32_t *subkey); 62 void camellia_setup256(const unsigned char *key, uint32_t *subkey);
|
/freebsd-11-stable/sys/crypto/rijndael/ |
H A D | rijndael-api.c | 40 rijndael_set_key(rijndael_ctx *ctx, const u_char *key, int bits) argument 43 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); 44 rijndaelKeySetupDec(ctx->dk, key, bits);
|
/freebsd-11-stable/lib/libc/stdlib/ |
H A D | bsearch.c | 64 bsearch_b(const void *key, const void *base0, size_t nmemb, size_t size, argument 68 bsearch(const void *key, const void *base0, size_t nmemb, size_t size, 79 cmp = COMPAR(key, p); 82 if (cmp > 0) { /* key > p: move right */
|
/freebsd-11-stable/contrib/nvi/vi/ |
H A D | v_ch.c | 142 ARG_CHAR_T key; local 147 * If it's a dot command, it doesn't reset the key for which we're 150 key = vp->character; 152 VIP(sp)->lastckey = key; 162 empty: notfound(sp, key); 169 while (++p < endp && *p != key); 171 notfound(sp, key); 224 ARG_CHAR_T key; local 229 * If it's a dot command, it doesn't reset the key for which 233 key [all...] |
/freebsd-11-stable/sys/mips/broadcom/ |
H A D | bcm_socinfo.c | 55 bcm_get_socinfo_by_socid(uint32_t key) argument 59 if(!key) 63 if(start->id == key)
|
/freebsd-11-stable/crypto/openssl/crypto/modes/ |
H A D | cbc128.c | 67 size_t len, const void *key, 73 assert(in && out && key && ivec); 81 (*block) (out, out, key); 92 (*block) (out, out, key); 105 (*block) (out, out, key); 117 size_t len, const void *key, 126 assert(in && out && key && ivec); 135 (*block) (in, out, key); 147 (*block) (in, out, key); 162 (*block) (in, tmp.c, key); 66 CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument 116 CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument [all...] |