/freebsd-10-stable/contrib/opie/libopie/ |
H A D | btoa8.c | 21 char *opiebtoa8 FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument 24 unsigned char *in = (unsigned char *)inkey;
|
H A D | btoh.c | 20 char *opiebtoh FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument 24 unsigned char *in = (unsigned char *)inkey;
|
/freebsd-10-stable/usr.bin/ypmatch/ |
H A D | ypmatch.c | 78 char *inkey, *inmap, *outbuf; local 117 inkey = argv[optind]; 119 r = yp_match(domainname, inmap, inkey, 120 strlen(inkey), &outbuf, &outbuflen); 124 printf("%s ", inkey); 131 inkey, inmap, yperr_string(r));
|
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 134 STACK_OF(ASN1_TYPE) *inkey; 143 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 149 if (sk_ASN1_TYPE_num(inkey) == 6) 151 else if (sk_ASN1_TYPE_num(inkey) == 4) 153 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 158 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 175 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/freebsd-10-stable/sys/kgssapi/krb5/ |
H A D | kcrypto_des.c | 102 const uint8_t *inkey = in; local 119 outkey[0] = inkey[0]; 120 outkey[1] = inkey[1]; 121 outkey[2] = inkey[2]; 122 outkey[3] = inkey[3]; 123 outkey[4] = inkey[4]; 124 outkey[5] = inkey[5]; 125 outkey[6] = inkey[6]; 126 outkey[7] = (((inkey[0] & 1) << 1) 127 | ((inkey[ [all...] |
H A D | kcrypto_des3.c | 108 const uint8_t *inkey; local 111 for (subkey = 0, outkey = ks->ks_key, inkey = in; subkey < 3; 112 subkey++, outkey += 8, inkey += 7) { 128 outkey[0] = inkey[0]; 129 outkey[1] = inkey[1]; 130 outkey[2] = inkey[2]; 131 outkey[3] = inkey[3]; 132 outkey[4] = inkey[4]; 133 outkey[5] = inkey[5]; 134 outkey[6] = inkey[ [all...] |
H A D | kcrypto.c | 185 krb5_derive_key(struct krb5_key_state *inkey, argument 189 const struct krb5_encryption_class *ec = inkey->ks_class; 213 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0);
|
H A D | kcrypto.h | 147 krb5_derive_key(struct krb5_key_state *inkey,
|
/freebsd-10-stable/include/rpcsvc/ |
H A D | ypclnt.h | 77 int yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, 81 int yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
|
/freebsd-10-stable/usr.bin/ypcat/ |
H A D | ypcat.c | 77 printit(unsigned long instatus, char *inkey, int inkeylen, char *inval, int invallen, void *dummy __unused) argument 82 printf("%*.*s ", inkeylen, inkeylen, inkey);
|
/freebsd-10-stable/crypto/openssl/apps/ |
H A D | ts.c | 99 char *queryfile, char *passin, char *inkey, 105 char *queryfile, char *passin, char *inkey, 148 char *inkey = NULL; local 231 } else if (strcmp(*argv, "-inkey") == 0) { 234 inkey = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 649 char *queryfile, char *passin, char *inkey, 678 passin, inkey, signer, chain, policy); 773 char *queryfile, char *passin, char *inkey, 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/freebsd-10-stable/lib/libc/yp/ |
H A D | yplib.c | 650 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, argument 664 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 677 yprk.key.keydat_val = (char *)inkey; 683 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey, 851 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen, argument 862 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 887 yprk.key.keydat_val = inkey;
|
/freebsd-10-stable/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha1.c | 117 const unsigned char *inkey, 124 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 126 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 116 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/freebsd-10-stable/usr.sbin/portsnap/portsnap/ |
H A D | portsnap.sh | 484 openssl rsautl -pubin -inkey pub.ssl -verify \
|
/freebsd-10-stable/usr.sbin/freebsd-update/ |
H A D | freebsd-update.sh | 1123 openssl rsautl -pubin -inkey pub.ssl -verify \
|