Searched refs:keylist (Results 1 - 12 of 12) sorted by relevance
/freebsd-10-stable/usr.sbin/mtree/ |
H A D | misc.c | 56 static KEY keylist[] = { variable 94 k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
|
/freebsd-10-stable/contrib/mtree/ |
H A D | misc.c | 64 static KEY keylist[] = { variable 125 for (i = 0; i < sizeof(keylist) / sizeof(KEY); i++) 126 allbits |= keylist[i].val; 131 k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
|
/freebsd-10-stable/contrib/nvi/common/ |
H A D | key.c | 64 KEYLIST keylist[] = { variable 94 (sizeof(keylist) / sizeof(keylist[0])) - ADDITIONAL_CHARACTERS; 120 qsort(keylist, nkeylist, sizeof(keylist[0]), v_key_cmp); 123 for (kp = keylist, cnt = nkeylist; cnt--; ++kp) 143 * We've left some open slots in the keylist table, and if these values exist, 164 for (kp = keylist; kp->value != K_NOTUSED; ++kp) 172 keylist[nkeylist].ch = ch; 173 keylist[nkeylis [all...] |
H A D | key.h | 149 extern KEYLIST keylist[];
|
/freebsd-10-stable/contrib/unbound/validator/ |
H A D | val_anchor.h | 110 struct ta_key* keylist; member in struct:trust_anchor 113 /** number of DSs in the keylist */ 115 /** number of DNSKEYs in the keylist */
|
H A D | val_anchor.c | 126 p = ta->keylist; 264 for(k = ta->keylist; k; k = k->next) { 342 k->next = ta->keylist; 343 ta->keylist = k; 912 for(tk = ta->keylist; tk; tk = tk->next) { 1257 if(ta->keylist || ta->autr || ta->numDS || ta->numDNSKEY) {
|
/freebsd-10-stable/contrib/ntp/sntp/ |
H A D | networking.h | 89 keyid_t *keylist; /* session key ID list */ member in struct:speer
|
/freebsd-10-stable/contrib/nvi/cl/ |
H A D | cl_term.c | 119 for (kp = keylist;; ++kp)
|
/freebsd-10-stable/contrib/ntp/include/ |
H A D | ntp.h | 331 keyid_t *keylist; /* session key ID list */ member in struct:peer
|
/freebsd-10-stable/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 2364 report_event(PEVNT_AUTH, peer, "keylist"); 3057 * tossed immediately upon use. Therefore, the keylist can be 4066 * Allocate and initialize a keylist if not 4082 * broken. In that case, purge the keylist and 4089 xkeyid = peer->keylist[peer->keynumber]; 4102 * new keylist is generated; otherwise, push the 4124 * keylist is generated, the autokey values are pushed. 4739 if (peer->keylist != NULL) { 4741 authtrust(peer->keylist[i], 0); 4742 free(peer->keylist); [all...] |
H A D | ntp_crypto.c | 331 if (peer->keylist == NULL) 332 peer->keylist = eallocarray(NTP_MAXSESSION, 363 peer->keylist[i] = keyid; 884 * sever/peer cookie changes or a new keylist is
|
/freebsd-10-stable/contrib/unbound/daemon/ |
H A D | remote.c | 2199 if(!a->keylist && !a->numDS && !a->numDNSKEY) 2225 if(!a->keylist && !a->numDS && !a->numDNSKEY)
|
Completed in 223 milliseconds