/freebsd-11.0-release/contrib/opie/libopie/ |
H A D | btoa8.c | 21 char *opiebtoa8 FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument 24 unsigned char *in = (unsigned char *)inkey;
|
H A D | btoh.c | 20 char *opiebtoh FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument 24 unsigned char *in = (unsigned char *)inkey;
|
/freebsd-11.0-release/usr.bin/ypmatch/ |
H A D | ypmatch.c | 77 char *domainname, *inkey, *inmap, *outbuf; local 120 inkey = argv[optind]; 122 r = yp_match(domainname, inmap, inkey, 123 strlen(inkey), &outbuf, &outbuflen); 127 printf("%s: ", inkey); 134 inkey, inmap, yperr_string(r));
|
/freebsd-11.0-release/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 134 STACK_OF(ASN1_TYPE) *inkey; 143 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 149 if (sk_ASN1_TYPE_num(inkey) == 6) 151 else if (sk_ASN1_TYPE_num(inkey) == 4) 153 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 158 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 175 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/freebsd-11.0-release/sys/kgssapi/krb5/ |
H A D | kcrypto_des.c | 102 const uint8_t *inkey = in; local 119 outkey[0] = inkey[0]; 120 outkey[1] = inkey[1]; 121 outkey[2] = inkey[2]; 122 outkey[3] = inkey[3]; 123 outkey[4] = inkey[4]; 124 outkey[5] = inkey[5]; 125 outkey[6] = inkey[6]; 126 outkey[7] = (((inkey[0] & 1) << 1) 127 | ((inkey[ [all...] |
H A D | kcrypto_des3.c | 108 const uint8_t *inkey; local 111 for (subkey = 0, outkey = ks->ks_key, inkey = in; subkey < 3; 112 subkey++, outkey += 8, inkey += 7) { 128 outkey[0] = inkey[0]; 129 outkey[1] = inkey[1]; 130 outkey[2] = inkey[2]; 131 outkey[3] = inkey[3]; 132 outkey[4] = inkey[4]; 133 outkey[5] = inkey[5]; 134 outkey[6] = inkey[ [all...] |
H A D | kcrypto.c | 185 krb5_derive_key(struct krb5_key_state *inkey, argument 189 const struct krb5_encryption_class *ec = inkey->ks_class; 212 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0);
|
H A D | kcrypto.h | 147 krb5_derive_key(struct krb5_key_state *inkey,
|
/freebsd-11.0-release/usr.sbin/ypserv/common/ |
H A D | yplib_host.h | 35 const char *inkey, int inkeylen, char **outval, int *outvallen); 38 int yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey,
|
H A D | yplib_host.c | 139 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, argument 155 yprk.key.keydat_val = (char *)inkey; 216 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, argument 232 yprk.key.keydat_val = inkey;
|
/freebsd-11.0-release/include/rpcsvc/ |
H A D | ypclnt.h | 77 int yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, 81 int yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
|
/freebsd-11.0-release/usr.bin/ypcat/ |
H A D | ypcat.c | 76 printit(u_long instatus, char *inkey, int inkeylen, char *inval, int invallen, argument 82 printf("%*.*s ", inkeylen, inkeylen, inkey);
|
/freebsd-11.0-release/crypto/openssl/apps/ |
H A D | pkeyutl.c | 105 const char *inkey = NULL; local 138 } else if (!strcmp(*argv, "-inkey")) { 142 inkey = *++argv; 215 if (inkey == NULL || 220 ctx = init_ctx(&keysize, inkey, keyform, key_type, 381 BIO_printf(bio_err, "-inkey file input key\n");
|
H A D | ts.c | 99 char *queryfile, char *passin, char *inkey, 105 char *queryfile, char *passin, char *inkey, 148 char *inkey = NULL; local 231 } else if (strcmp(*argv, "-inkey") == 0) { 234 inkey = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 649 char *queryfile, char *passin, char *inkey, 678 passin, inkey, signer, chain, policy); 773 char *queryfile, char *passin, char *inkey, 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/freebsd-11.0-release/lib/libc/yp/ |
H A D | yplib.c | 649 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, argument 663 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 676 yprk.key.keydat_val = (char *)inkey; 682 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey, 850 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen, argument 861 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 886 yprk.key.keydat_val = inkey;
|
/freebsd-11.0-release/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha1.c | 122 const unsigned char *inkey, 129 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 131 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 121 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha256.c | 118 const unsigned char *inkey, 126 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 128 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 117 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/freebsd-11.0-release/usr.sbin/ypldap/ |
H A D | aldap.c | 508 aldap_match_attr(struct aldap_message *msg, char *inkey, char ***outvalues) argument 526 if (strcasecmp(descr, inkey) == 0)
|
/freebsd-11.0-release/usr.sbin/portsnap/portsnap/ |
H A D | portsnap.sh | 489 openssl rsautl -pubin -inkey pub.ssl -verify \
|
/freebsd-11.0-release/usr.sbin/freebsd-update/ |
H A D | freebsd-update.sh | 1123 openssl rsautl -pubin -inkey pub.ssl -verify \
|