Searched refs:keylist (Results 1 - 13 of 13) sorted by relevance
/freebsd-11-stable/usr.sbin/fmtree/ |
H A D | misc.c | 56 static KEY keylist[] = { variable 94 k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
|
/freebsd-11-stable/contrib/mtree/ |
H A D | misc.c | 64 static KEY keylist[] = { variable 125 for (i = 0; i < sizeof(keylist) / sizeof(KEY); i++) 126 allbits |= keylist[i].val; 131 k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
|
/freebsd-11-stable/contrib/nvi/common/ |
H A D | key.c | 64 KEYLIST keylist[] = { variable 94 (sizeof(keylist) / sizeof(keylist[0])) - ADDITIONAL_CHARACTERS; 120 qsort(keylist, nkeylist, sizeof(keylist[0]), v_key_cmp); 123 for (kp = keylist, cnt = nkeylist; cnt--; ++kp) 143 * We've left some open slots in the keylist table, and if these values exist, 164 for (kp = keylist; kp->value != K_NOTUSED; ++kp) 172 keylist[nkeylist].ch = ch; 173 keylist[nkeylis [all...] |
H A D | key.h | 149 extern KEYLIST keylist[];
|
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_anchor.h | 108 struct ta_key* keylist; member in struct:trust_anchor 111 /** number of DSs in the keylist */ 113 /** number of DNSKEYs in the keylist */
|
H A D | val_anchor.c | 126 p = ta->keylist; 264 for(k = ta->keylist; k; k = k->next) { 342 k->next = ta->keylist; 343 ta->keylist = k; 912 for(tk = ta->keylist; tk; tk = tk->next) { 1226 if(ta->keylist || ta->autr || ta->numDS || ta->numDNSKEY) {
|
/freebsd-11-stable/contrib/ntp/sntp/ |
H A D | networking.h | 89 keyid_t *keylist; /* session key ID list */ member in struct:speer
|
/freebsd-11-stable/contrib/ncurses/ncurses/win32con/ |
H A D | win_driver.c | 57 static const LONG keylist[] = variable 70 #define N_INI ((int)(sizeof(keylist)/sizeof(keylist[0]))) 823 sizeof(keylist[0]), 1005 PropOf(TCB)->rmap[i] = PropOf(TCB)->map[i] = (DWORD) keylist[i]; 1012 sizeof(keylist[0]), 1016 sizeof(keylist[0]), 1502 sizeof(keylist[0]), 1547 sizeof(keylist[0]),
|
/freebsd-11-stable/contrib/nvi/cl/ |
H A D | cl_term.c | 119 for (kp = keylist;; ++kp)
|
/freebsd-11-stable/contrib/ntp/include/ |
H A D | ntp.h | 331 keyid_t *keylist; /* session key ID list */ member in struct:peer
|
/freebsd-11-stable/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 2417 report_event(PEVNT_AUTH, peer, "keylist"); 3161 * tossed immediately upon use. Therefore, the keylist can be 4191 * Allocate and initialize a keylist if not 4207 * broken. In that case, purge the keylist and 4214 xkeyid = peer->keylist[peer->keynumber]; 4227 * new keylist is generated; otherwise, push the 4249 * keylist is generated, the autokey values are pushed. 4944 if (peer->keylist != NULL) { 4946 authtrust(peer->keylist[i], 0); 4947 free(peer->keylist); [all...] |
H A D | ntp_crypto.c | 331 if (peer->keylist == NULL) 332 peer->keylist = eallocarray(NTP_MAXSESSION, 363 peer->keylist[i] = keyid; 884 * sever/peer cookie changes or a new keylist is
|
/freebsd-11-stable/contrib/unbound/daemon/ |
H A D | remote.c | 2615 if(!a->keylist && !a->numDS && !a->numDNSKEY) 2641 if(!a->keylist && !a->numDS && !a->numDNSKEY)
|
Completed in 228 milliseconds