Searched refs:inkey (Results 1 - 21 of 21) sorted by relevance

/freebsd-13-stable/contrib/opie/libopie/
H A Dbtoa8.c21 char *opiebtoa8 FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument
24 unsigned char *in = (unsigned char *)inkey;
H A Dbtoh.c20 char *opiebtoh FUNCTION((out, in), char *out AND struct opie_otpkey *inkey) argument
24 unsigned char *in = (unsigned char *)inkey;
/freebsd-13-stable/usr.bin/ypmatch/
H A Dypmatch.c79 char *domainname, *inkey, *inmap, *outbuf; local
122 inkey = argv[optind];
124 r = yp_match(domainname, inmap, inkey,
125 strlen(inkey), &outbuf, &outbuflen);
129 printf("%s: ", inkey);
136 inkey, inmap, yperr_string(r));
/freebsd-13-stable/crypto/openssl/crypto/asn1/
H A Dd2i_pr.c84 STACK_OF(ASN1_TYPE) *inkey;
93 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
99 if (sk_ASN1_TYPE_num(inkey) == 6)
101 else if (sk_ASN1_TYPE_num(inkey) == 4)
103 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
108 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
125 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/freebsd-13-stable/usr.sbin/ypserv/common/
H A Dyplib_host.h35 const char *inkey, int inkeylen, char **outval, int *outvallen);
38 int yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey,
H A Dyplib_host.c139 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, argument
155 yprk.key.keydat_val = (char *)inkey;
216 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, argument
232 yprk.key.keydat_val = inkey;
/freebsd-13-stable/include/rpcsvc/
H A Dypclnt.h79 int yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen,
83 int yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
/freebsd-13-stable/usr.bin/ypcat/
H A Dypcat.c78 printit(u_long instatus, char *inkey, int inkeylen, char *inval, int invallen, argument
84 printf("%*.*s ", inkeylen, inkeylen, inkey);
/freebsd-13-stable/sys/kgssapi/krb5/
H A Dkcrypto.c184 krb5_derive_key(struct krb5_key_state *inkey, argument
188 const struct krb5_encryption_class *ec = inkey->ks_class;
211 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0);
H A Dkcrypto.h145 krb5_derive_key(struct krb5_key_state *inkey,
/freebsd-13-stable/crypto/openssl/apps/
H A Dpkeyutl.c63 {"inkey", OPT_INKEY, 's', "Input private key file"},
92 const char *inkey = NULL; local
123 inkey = opt_arg();
207 } else if (inkey == NULL) {
209 "%s: no private key given (-inkey parameter).\n", prog);
216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
H A Dts.c50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
106 {"inkey", OPT_INKEY, 's', "File with private key for reply"},
134 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local
242 inkey = opt_arg();
305 password, inkey, md, signer, chain, policy,
557 const char *queryfile, const char *passin, const char *inkey,
580 passin, inkey, md, signer, chain, policy);
666 const char *inkey, cons
556 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) argument
664 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) argument
[all...]
/freebsd-13-stable/lib/libc/yp/
H A Dyplib.c651 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, argument
665 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 ||
678 yprk.key.keydat_val = (char *)inkey;
684 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey,
852 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen, argument
863 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 ||
888 yprk.key.keydat_val = inkey;
/freebsd-13-stable/crypto/openssl/crypto/evp/
H A De_rc4_hmac_md5.c38 const unsigned char *inkey,
43 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
37 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_chacha20_poly1305.c166 const unsigned char *inkey,
171 if (!inkey && !iv)
188 chacha_init_key(ctx, inkey, temp, enc);
194 chacha_init_key(ctx, inkey, NULL, enc);
165 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha1.c64 const unsigned char *inkey,
71 ret = aesni_set_encrypt_key(inkey,
75 ret = aesni_set_decrypt_key(inkey,
63 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha256.c61 const unsigned char *inkey,
68 ret = aesni_set_encrypt_key(inkey,
72 ret = aesni_set_decrypt_key(inkey,
60 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/freebsd-13-stable/sys/dev/ice/
H A Dice_flex_pipe.c3911 struct ice_prof_id_key inkey; local
3913 inkey.xlt1 = ptg;
3914 inkey.xlt2_cdid = CPU_TO_LE16(vsig);
3915 inkey.flags = CPU_TO_LE16(flags);
3923 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_2_M);
3924 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_2_S);
3929 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_4_M);
3930 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_4_S);
3935 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_8_M);
3936 inkey
[all...]
/freebsd-13-stable/usr.sbin/ypldap/
H A Daldap.c508 aldap_match_attr(struct aldap_message *msg, char *inkey, char ***outvalues) argument
526 if (strcasecmp(descr, inkey) == 0)
/freebsd-13-stable/usr.sbin/portsnap/portsnap/
H A Dportsnap.sh491 openssl rsautl -pubin -inkey pub.ssl -verify \
/freebsd-13-stable/usr.sbin/freebsd-update/
H A Dfreebsd-update.sh1180 openssl rsautl -pubin -inkey pub.ssl -verify \

Completed in 244 milliseconds