/freebsd-13-stable/contrib/opie/libopie/ |
H A D | btoa8.c | 21 char *opiebtoa8 FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument 24 unsigned char *in = (unsigned char *)inkey;
|
H A D | btoh.c | 20 char *opiebtoh FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument 24 unsigned char *in = (unsigned char *)inkey;
|
/freebsd-13-stable/usr.bin/ypmatch/ |
H A D | ypmatch.c | 79 char *domainname, *inkey, *inmap, *outbuf; local 122 inkey = argv[optind]; 124 r = yp_match(domainname, inmap, inkey, 125 strlen(inkey), &outbuf, &outbuflen); 129 printf("%s: ", inkey); 136 inkey, inmap, yperr_string(r));
|
/freebsd-13-stable/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 84 STACK_OF(ASN1_TYPE) *inkey; 93 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 99 if (sk_ASN1_TYPE_num(inkey) == 6) 101 else if (sk_ASN1_TYPE_num(inkey) == 4) 103 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 108 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 125 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/freebsd-13-stable/usr.sbin/ypserv/common/ |
H A D | yplib_host.h | 35 const char *inkey, int inkeylen, char **outval, int *outvallen); 38 int yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey,
|
H A D | yplib_host.c | 139 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, argument 155 yprk.key.keydat_val = (char *)inkey; 216 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, argument 232 yprk.key.keydat_val = inkey;
|
/freebsd-13-stable/include/rpcsvc/ |
H A D | ypclnt.h | 79 int yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, 83 int yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
|
/freebsd-13-stable/usr.bin/ypcat/ |
H A D | ypcat.c | 78 printit(u_long instatus, char *inkey, int inkeylen, char *inval, int invallen, argument 84 printf("%*.*s ", inkeylen, inkeylen, inkey);
|
/freebsd-13-stable/sys/kgssapi/krb5/ |
H A D | kcrypto.c | 184 krb5_derive_key(struct krb5_key_state *inkey, argument 188 const struct krb5_encryption_class *ec = inkey->ks_class; 211 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0);
|
H A D | kcrypto.h | 145 krb5_derive_key(struct krb5_key_state *inkey,
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | pkeyutl.c | 63 {"inkey", OPT_INKEY, 's', "Input private key file"}, 92 const char *inkey = NULL; local 123 inkey = opt_arg(); 207 } else if (inkey == NULL) { 209 "%s: no private key given (-inkey parameter).\n", prog); 216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
|
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 106 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 134 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local 242 inkey = opt_arg(); 305 password, inkey, md, signer, chain, policy, 557 const char *queryfile, const char *passin, const char *inkey, 580 passin, inkey, md, signer, chain, policy); 666 const char *inkey, cons 556 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) argument 664 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) argument [all...] |
/freebsd-13-stable/lib/libc/yp/ |
H A D | yplib.c | 651 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, argument 665 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 678 yprk.key.keydat_val = (char *)inkey; 684 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey, 852 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen, argument 863 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 888 yprk.key.keydat_val = inkey;
|
/freebsd-13-stable/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 38 const unsigned char *inkey, 43 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 37 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_chacha20_poly1305.c | 166 const unsigned char *inkey, 171 if (!inkey && !iv) 188 chacha_init_key(ctx, inkey, temp, enc); 194 chacha_init_key(ctx, inkey, NULL, enc); 165 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha1.c | 64 const unsigned char *inkey, 71 ret = aesni_set_encrypt_key(inkey, 75 ret = aesni_set_decrypt_key(inkey, 63 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha256.c | 61 const unsigned char *inkey, 68 ret = aesni_set_encrypt_key(inkey, 72 ret = aesni_set_decrypt_key(inkey, 60 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/freebsd-13-stable/sys/dev/ice/ |
H A D | ice_flex_pipe.c | 3911 struct ice_prof_id_key inkey; local 3913 inkey.xlt1 = ptg; 3914 inkey.xlt2_cdid = CPU_TO_LE16(vsig); 3915 inkey.flags = CPU_TO_LE16(flags); 3923 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_2_M); 3924 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_2_S); 3929 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_4_M); 3930 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_4_S); 3935 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_8_M); 3936 inkey [all...] |
/freebsd-13-stable/usr.sbin/ypldap/ |
H A D | aldap.c | 508 aldap_match_attr(struct aldap_message *msg, char *inkey, char ***outvalues) argument 526 if (strcasecmp(descr, inkey) == 0)
|
/freebsd-13-stable/usr.sbin/portsnap/portsnap/ |
H A D | portsnap.sh | 491 openssl rsautl -pubin -inkey pub.ssl -verify \
|
/freebsd-13-stable/usr.sbin/freebsd-update/ |
H A D | freebsd-update.sh | 1180 openssl rsautl -pubin -inkey pub.ssl -verify \
|