Searched refs:inkey (Results 1 - 22 of 22) sorted by relevance

/freebsd-11.0-release/contrib/opie/libopie/
H A Dbtoa8.c21 char *opiebtoa8 FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument
24 unsigned char *in = (unsigned char *)inkey;
H A Dbtoh.c20 char *opiebtoh FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument
24 unsigned char *in = (unsigned char *)inkey;
/freebsd-11.0-release/usr.bin/ypmatch/
H A Dypmatch.c77 char *domainname, *inkey, *inmap, *outbuf; local
120 inkey = argv[optind];
122 r = yp_match(domainname, inmap, inkey,
123 strlen(inkey), &outbuf, &outbuflen);
127 printf("%s: ", inkey);
134 inkey, inmap, yperr_string(r));
/freebsd-11.0-release/crypto/openssl/crypto/asn1/
H A Dd2i_pr.c134 STACK_OF(ASN1_TYPE) *inkey;
143 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
149 if (sk_ASN1_TYPE_num(inkey) == 6)
151 else if (sk_ASN1_TYPE_num(inkey) == 4)
153 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
158 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
175 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/freebsd-11.0-release/sys/kgssapi/krb5/
H A Dkcrypto_des.c102 const uint8_t *inkey = in; local
119 outkey[0] = inkey[0];
120 outkey[1] = inkey[1];
121 outkey[2] = inkey[2];
122 outkey[3] = inkey[3];
123 outkey[4] = inkey[4];
124 outkey[5] = inkey[5];
125 outkey[6] = inkey[6];
126 outkey[7] = (((inkey[0] & 1) << 1)
127 | ((inkey[
[all...]
H A Dkcrypto_des3.c108 const uint8_t *inkey; local
111 for (subkey = 0, outkey = ks->ks_key, inkey = in; subkey < 3;
112 subkey++, outkey += 8, inkey += 7) {
128 outkey[0] = inkey[0];
129 outkey[1] = inkey[1];
130 outkey[2] = inkey[2];
131 outkey[3] = inkey[3];
132 outkey[4] = inkey[4];
133 outkey[5] = inkey[5];
134 outkey[6] = inkey[
[all...]
H A Dkcrypto.c185 krb5_derive_key(struct krb5_key_state *inkey, argument
189 const struct krb5_encryption_class *ec = inkey->ks_class;
212 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0);
H A Dkcrypto.h147 krb5_derive_key(struct krb5_key_state *inkey,
/freebsd-11.0-release/usr.sbin/ypserv/common/
H A Dyplib_host.h35 const char *inkey, int inkeylen, char **outval, int *outvallen);
38 int yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey,
H A Dyplib_host.c139 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, argument
155 yprk.key.keydat_val = (char *)inkey;
216 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, argument
232 yprk.key.keydat_val = inkey;
/freebsd-11.0-release/include/rpcsvc/
H A Dypclnt.h77 int yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen,
81 int yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
/freebsd-11.0-release/usr.bin/ypcat/
H A Dypcat.c76 printit(u_long instatus, char *inkey, int inkeylen, char *inval, int invallen, argument
82 printf("%*.*s ", inkeylen, inkeylen, inkey);
/freebsd-11.0-release/crypto/openssl/apps/
H A Dpkeyutl.c105 const char *inkey = NULL; local
138 } else if (!strcmp(*argv, "-inkey")) {
142 inkey = *++argv;
215 if (inkey == NULL ||
220 ctx = init_ctx(&keysize, inkey, keyform, key_type,
381 BIO_printf(bio_err, "-inkey file input key\n");
H A Dts.c99 char *queryfile, char *passin, char *inkey,
105 char *queryfile, char *passin, char *inkey,
148 char *inkey = NULL; local
231 } else if (strcmp(*argv, "-inkey") == 0) {
234 inkey = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
649 char *queryfile, char *passin, char *inkey,
678 passin, inkey, signer, chain, policy);
773 char *queryfile, char *passin, char *inkey,
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A DCA.sh150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
/freebsd-11.0-release/lib/libc/yp/
H A Dyplib.c649 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, argument
663 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 ||
676 yprk.key.keydat_val = (char *)inkey;
682 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey,
850 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen, argument
861 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 ||
886 yprk.key.keydat_val = inkey;
/freebsd-11.0-release/crypto/openssl/crypto/evp/
H A De_rc4_hmac_md5.c86 const unsigned char *inkey,
91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha1.c122 const unsigned char *inkey,
129 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks);
131 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks);
121 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha256.c118 const unsigned char *inkey,
126 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks);
128 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks);
117 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/freebsd-11.0-release/usr.sbin/ypldap/
H A Daldap.c508 aldap_match_attr(struct aldap_message *msg, char *inkey, char ***outvalues) argument
526 if (strcasecmp(descr, inkey) == 0)
/freebsd-11.0-release/usr.sbin/portsnap/portsnap/
H A Dportsnap.sh489 openssl rsautl -pubin -inkey pub.ssl -verify \
/freebsd-11.0-release/usr.sbin/freebsd-update/
H A Dfreebsd-update.sh1123 openssl rsautl -pubin -inkey pub.ssl -verify \

Completed in 290 milliseconds