/freebsd-11-stable/sys/geom/eli/ |
H A D | g_eli_key.c | 51 * Verify if the given 'key' is correct. 55 g_eli_mkey_verify(const unsigned char *mkey, const unsigned char *key) argument 62 * The key for HMAC calculations is: hmkey = HMAC_SHA512(Derived-Key, 0) 64 g_eli_crypto_hmac(key, G_ELI_USERKEYLEN, "\x00", 1, hmkey, 0); 76 * If two HMACs are equal, 'key' is correct. 85 g_eli_mkey_hmac(unsigned char *mkey, const unsigned char *key) argument 91 * The key for HMAC calculations is: hmkey = HMAC_SHA512(Derived-Key, 0) 93 g_eli_crypto_hmac(key, G_ELI_USERKEYLEN, "\x00", 1, hmkey, 0); 104 * Find and decrypt Master Key encrypted with 'key' at slot 'nkey'. 105 * Return 0 on success, > 0 on failure, -1 on bad key 108 g_eli_mkey_decrypt(const struct g_eli_metadata *md, const unsigned char *key, unsigned char *mkey, unsigned nkey) argument 154 g_eli_mkey_decrypt_any(const struct g_eli_metadata *md, const unsigned char *key, unsigned char *mkey, unsigned *nkeyp) argument 182 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, unsigned char *mkey) argument [all...] |
/freebsd-11-stable/contrib/llvm-project/lldb/bindings/interface/ |
H A D | SBInstructionList.i | 82 def __getitem__(self, key): 84 if type(key) is int: 86 if key < len(self): 87 return self.GetInstructionAtIndex(key) 88 elif type(key) is SBAddress: 90 lookup_file_addr = key.file_addr
|
/freebsd-11-stable/contrib/subversion/subversion/include/private/ |
H A D | svn_sorts_private.h | 40 /** This structure is used to hold a key/value from a hash table. 44 /** pointer to the key */ member in struct:svn_sort__item_t 45 const void *key; 47 /** size of the key */ 57 * @a item.key and @a item.size are the hash key, and @a item.value points to 84 /** Return the lowest index at which the element @a *key should be inserted into 88 * @a key will always passed to it as the second parameter. 94 const void *key, 97 /** Find the lowest index at which the element @a *key shoul [all...] |
/freebsd-11-stable/crypto/openssl/crypto/rc4/asm/ |
H A D | rc4-parisc.pl | 72 $key="%r26"; 94 `sprintf("$LDX %$TY(%$key),%$dat1") if ($i>0)` 96 $LDX $YY($key),$TY 97 $MKX $YY,$key,$ix 98 $LDX $XX[1]($key),$TX[1] 99 $MKX $XX[0],$key,$iy 117 $MKX $YY,$key,$iy 118 $LDX $YY($key),$TY 119 $MKX $XX[0],$key,$ix 127 $LDX $TY($key), [all...] |
/freebsd-11-stable/sys/contrib/ck/src/ |
H A D | ck_ht.c | 111 const void *key, 115 table->h(h, key, key_length, table->seed); 122 uintptr_t key) 125 ck_ht_hash(h, table, &key, sizeof(key)); 131 const void *key, 136 h->value = (unsigned long)MurmurHash64A(key, length, seed); 284 const void *key, 324 if (cursor->key == CK_HT_KEY_TOMBSTONE) { 333 if (cursor->key 109 ck_ht_hash(struct ck_ht_hash *h, struct ck_ht *table, const void *key, uint16_t key_length) argument 120 ck_ht_hash_direct(struct ck_ht_hash *h, struct ck_ht *table, uintptr_t key) argument 130 ck_ht_hash_wrapper(struct ck_ht_hash *h, const void *key, size_t length, uint64_t seed) argument 280 ck_ht_map_probe_wr(struct ck_ht_map *map, ck_ht_hash_t h, ck_ht_entry_t *snapshot, ck_ht_entry_t **available, const void *key, uint16_t key_length, CK_HT_TYPE *probe_limit, CK_HT_TYPE *probe_wr) argument 497 ck_ht_map_probe_rd(struct ck_ht_map *map, ck_ht_hash_t h, ck_ht_entry_t *snapshot, const void *key, uint16_t key_length) argument 617 uintptr_t key; local 685 void *key; local [all...] |
/freebsd-11-stable/contrib/libreadline/ |
H A D | kill.c | 201 rl_kill_word (count, key) 202 int count, key; 207 return (rl_backward_kill_word (-count, key)); 211 rl_forward_word (count, key); 316 rl_unix_word_rubout (count, key) 317 int count, key; 349 rl_unix_filename_rubout (count, key) 350 int count, key; 387 key-bindings. We have a choice of killing the entire line, or 393 rl_unix_line_discard (count, key) [all...] |
H A D | readline.c | 123 so functions can find out whether they were called from a key binding 616 _rl_subseq_getchar (key) 617 int key; 621 if (key == ESC) 626 if (key == ESC) 685 another key, and dispatch into that map. */ 687 _rl_dispatch (key, map) 688 register int key; 692 return _rl_dispatch_subseq (key, map, 0); 696 _rl_dispatch_subseq (key, ma [all...] |
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | agent-pkcs11.sh | 31 trace "generating key/cert" 32 rm -f $OBJ/pkcs11.key $OBJ/pkcs11.crt 33 openssl genrsa -out $OBJ/pkcs11.key 2048 > /dev/null 2>&1 34 chmod 600 $OBJ/pkcs11.key 35 openssl req -key $OBJ/pkcs11.key -new -x509 \ 37 printf "a\ta\t$OBJ/pkcs11.crt\t$OBJ/pkcs11.key" > $SOFTPKCS11RC 39 ${SSHKEYGEN} -y -f $OBJ/pkcs11.key > $OBJ/authorized_keys_$USER 41 trace "add pkcs11 key to agent"
|
/freebsd-11-stable/sys/opencrypto/ |
H A D | xform_blf.c | 77 blf_encrypt(caddr_t key, u_int8_t *blk) argument 85 BF_encrypt(t, (BF_KEY *) key); 92 blf_decrypt(caddr_t key, u_int8_t *blk) argument 100 BF_decrypt(t, (BF_KEY *) key); 107 blf_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 114 BF_set_key((BF_KEY *) *sched, len, key);
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/hash/ |
H A D | t_hmac.c | 45 uint8_t key[256]; local 74 for (size_t k = 0; k < sizeof(key); k++) 75 key[k] = k; 80 for (size_t i = 1; i < sizeof(key); i += 9) 89 e1 = HMAC(evps[t], key, i, data, j, tmp1, &tmp1len); 91 tmp2len = hmac(names[t], key, i, data, j, tmp2,
|
/freebsd-11-stable/contrib/ntp/lib/isc/include/isc/ |
H A D | hash.h | 158 isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key, 161 isc_hash_calc(const unsigned char *key, unsigned int keylen, 172 * 'key' is the hash key, which is a variable length buffer. 174 * 'keylen' specifies the key length, which must not be larger than the limit 177 * 'case_sensitive' specifies whether the hash key should be treated as 178 * case_sensitive values. It should typically be ISC_FALSE if the hash key
|
/freebsd-11-stable/contrib/gcc/ |
H A D | gthr-tpf.h | 112 __gthread_key_create (__gthread_key_t *key, void (*dtor) (void *)) argument 115 return __gthrw_(pthread_key_create) (key, dtor); 121 __gthread_key_delete (__gthread_key_t key) argument 124 return __gthrw_(pthread_key_delete) (key); 130 __gthread_getspecific (__gthread_key_t key) argument 133 return __gthrw_(pthread_getspecific) (key); 139 __gthread_setspecific (__gthread_key_t key, const void *ptr) argument 142 return __gthrw_(pthread_setspecific) (key, ptr);
|
/freebsd-11-stable/contrib/dialog/ |
H A D | yesno.c | 47 int key = 0, fkey; local 103 key = dlg_mouse_wgetch(dialog, &fkey); 104 if (dlg_result_key(key, fkey, &result)) 106 if ((code = dlg_char_to_button(key, buttons)) >= 0) { 112 switch (key) { 142 if (is_DLGK_MOUSE(key)) { 143 result = dlg_yes_buttoncode(key - M_EVENT); 146 } else if (dlg_check_scrolled(key, last, page,
|
/freebsd-11-stable/contrib/groff/src/libs/libgroff/ |
H A D | glyphuni.cpp | 38 const char *key; member in struct:S 496 glyph_to_unicode_table.define(glyph_to_unicode_list[i].key, gtu);
|
H A D | uniglyph.cpp | 38 const char *key; member in struct:S 496 unicode_to_glyph_table.define(unicode_to_glyph_list[i].key, utg);
|
H A D | uniuni.cpp | 43 const char *key; member in struct:S 1986 unicode_decompose_table.define(unicode_decompose_list[i].key, dec);
|
/freebsd-11-stable/contrib/groff/src/utils/hpftodit/ |
H A D | hpuni.cpp | 37 const char *key; member in struct:S 690 hp_msl_to_unicode_table.define(hp_msl_to_unicode_list[i].key, ptu);
|
/freebsd-11-stable/sys/crypto/camellia/ |
H A D | camellia-api.c | 39 camellia_set_key(camellia_ctx *ctx, const u_char *key, int bits) argument 42 Camellia_Ekeygen(bits, key, ctx->subkey);
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_base/bdb/ |
H A D | lock-tokens-table.c | 82 DBT key, value; local 84 svn_fs_base__str_to_dbt(&key, path); 89 &key, &value, 0)); 100 DBT key; local 103 svn_fs_base__str_to_dbt(&key, path); 105 db_err = bfd->lock_tokens->del(bfd->lock_tokens, trail->db_txn, &key, 0); 120 DBT key, value; local 128 svn_fs_base__str_to_dbt(&key, path),
|
/freebsd-11-stable/crypto/openssh/ |
H A D | rsa.c | 75 rsa_public_encrypt(BIGNUM *out, BIGNUM *in, RSA *key) argument 80 if (BN_num_bits(key->e) < 2 || !BN_is_odd(key->e)) 83 olen = BN_num_bytes(key->n); 96 if ((len = RSA_public_encrypt(ilen, inbuf, outbuf, key, 121 rsa_private_decrypt(BIGNUM *out, BIGNUM *in, RSA *key) argument 126 olen = BN_num_bytes(key->n); 139 if ((len = RSA_private_decrypt(ilen, inbuf, outbuf, key,
|
/freebsd-11-stable/crypto/openssl/crypto/camellia/asm/ |
H A D | cmllt4-sparcv9.pl | 15 # 128-bit key 192/256- 28 # 128-bit key 192/256- 35 # improved by ... 0% for 128-bit key, and 11% for 192/256-bit one. 43 # one byte in 38 cycles with 128-bit key on same processor. 59 my ($inp,$out,$key,$rounds,$tmp,$mask)=map("%o$_",(0..5)); 70 ldx [$key + 0], %g4 71 ldx [$key + 8], %g5 86 ld [$key + 272], $rounds ! grandRounds, 3 or 4 87 ldd [$key + 16], %f12 88 ldd [$key [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto-null.c | 53 struct _krb5_key_data *key, 74 struct _krb5_key_data *key, 52 NONE_checksum(krb5_context context, struct _krb5_key_data *key, const void *data, size_t len, unsigned usage, Checksum *C) argument 73 NULL_encrypt(krb5_context context, struct _krb5_key_data *key, void *data, size_t len, krb5_boolean encryptp, int usage, void *ivec) argument
|
/freebsd-11-stable/lib/libc/db/btree/ |
H A D | bt_put.c | 56 * key: key 61 * RET_ERROR, RET_SUCCESS and RET_SPECIAL if the key is already in the 65 __bt_put(const DB *dbp, DBT *key, const DBT *data, u_int flags) argument 112 * If the key/data pair won't fit on a page, store it on overflow 113 * pages. Only put the key on the overflow page if the pair are 120 if (key->size + data->size > t->bt_ovflsize) { 121 if (key->size > t->bt_ovflsize) { 122 storekey: if (__ovfl_put(t, key, &pg) == RET_ERROR) 127 tmp = key 264 bt_fast(BTREE *t, const DBT *key, const DBT *data, int *exactp) argument [all...] |
H A D | bt_search.c | 51 * Search a btree for a key. 55 * key: key to find 60 * of the key, if it were inserted into the tree, is entered into 64 __bt_search(BTREE *t, const DBT *key, int *exactp) argument 80 if ((cmp = __bt_cmp(t, key, &t->bt_cur)) == 0) { 105 __bt_sprev(t, h, key, exactp)) 109 __bt_snext(t, h, key, exactp)) 119 * key and may be zero or a last + 1 index. If it's non-zero, 121 * be a parent page for the key 146 __bt_snext(BTREE *t, PAGE *h, const DBT *key, int *exactp) argument 181 __bt_sprev(BTREE *t, PAGE *h, const DBT *key, int *exactp) argument [all...] |
/freebsd-11-stable/lib/libc/gen/ |
H A D | crypt.c | 56 des_setkey(const char *key __unused) 79 setkey(const char *key __unused)
|