/freebsd-current/usr.bin/ypmatch/ |
H A D | ypmatch.c | 76 char *domainname, *inkey, *inmap, *outbuf; local 119 inkey = argv[optind]; 121 r = yp_match(domainname, inmap, inkey, 122 strlen(inkey), &outbuf, &outbuflen); 126 printf("%s: ", inkey); 133 inkey, inmap, yperr_string(r));
|
/freebsd-current/usr.sbin/ypserv/common/ |
H A D | yplib_host.h | 33 const char *inkey, int inkeylen, char **outval, int *outvallen); 36 int yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey,
|
H A D | yplib_host.c | 136 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, argument 152 yprk.key.keydat_val = (char *)inkey; 213 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, argument 229 yprk.key.keydat_val = inkey;
|
/freebsd-current/include/rpcsvc/ |
H A D | ypclnt.h | 77 int yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, 81 int yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
|
/freebsd-current/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 168 STACK_OF(ASN1_TYPE) *inkey; 178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 184 if (sk_ASN1_TYPE_num(inkey) == 6) { 186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { 188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha.h | 18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
|
/freebsd-current/usr.bin/ypcat/ |
H A D | ypcat.c | 75 printit(u_long instatus, char *inkey, int inkeylen, char *inval, int invallen, argument 81 printf("%*.*s ", inkeylen, inkeylen, inkey);
|
/freebsd-current/sys/kgssapi/krb5/ |
H A D | kcrypto.c | 181 krb5_derive_key(struct krb5_key_state *inkey, argument 185 const struct krb5_encryption_class *ec = inkey->ks_class; 208 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0);
|
H A D | kcrypto.h | 143 krb5_derive_key(struct krb5_key_state *inkey,
|
/freebsd-current/crypto/openssl/apps/ |
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 97 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 143 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local 256 inkey = opt_arg(); 331 password, inkey, md, signer, chain, policy, 585 const char *queryfile, const char *passin, const char *inkey, 608 passin, inkey, md, signer, chain, policy); 694 const char *inkey, cons 584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) argument 692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) argument [all...] |
H A D | pkeyutl.c | 73 {"inkey", OPT_INKEY, 's', "Input private key file"}, 120 const char *inkey = NULL; local 157 inkey = opt_arg(); 289 } else if (inkey == NULL) { 291 "%s: no private key given (-inkey parameter).\n", prog); 305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 45 const unsigned char *inkey, 54 RC4_set_key(&key->ks, keylen, inkey); 44 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_chacha20_poly1305.c | 168 const unsigned char *inkey, 173 if (!inkey && !iv) 190 chacha_init_key(ctx, inkey, temp, enc); 196 chacha_init_key(ctx, inkey, NULL, enc); 167 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha1.c | 70 const unsigned char *inkey, 77 ret = aesni_set_encrypt_key(inkey, 81 ret = aesni_set_decrypt_key(inkey, 69 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha256.c | 66 const unsigned char *inkey, 73 ret = aesni_set_encrypt_key(inkey, 77 ret = aesni_set_decrypt_key(inkey, 65 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/freebsd-current/lib/libc/yp/ |
H A D | yplib.c | 644 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, argument 658 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 671 yprk.key.keydat_val = (char *)inkey; 677 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey, 845 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen, argument 856 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || 881 yprk.key.keydat_val = inkey;
|
/freebsd-current/sys/dev/ice/ |
H A D | ice_flex_pipe.c | 2152 struct ice_prof_id_key inkey; local 2154 inkey.xlt1 = ptg; 2155 inkey.xlt2_cdid = CPU_TO_LE16(vsig); 2156 inkey.flags = CPU_TO_LE16(flags); 2164 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_2_M); 2165 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_2_S); 2170 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_4_M); 2171 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_4_S); 2176 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_8_M); 2177 inkey [all...] |
/freebsd-current/usr.sbin/ypldap/ |
H A D | aldap.c | 507 aldap_match_attr(struct aldap_message *msg, char *inkey, char ***outvalues) argument 525 if (strcasecmp(descr, inkey) == 0)
|
/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 80-test_cms.t | 233 "-inkey", catfile($smdir, "smrsa3-key.pem"), 588 [ "{cmd2}", @defaultprov, "-decrypt", "-inkey", catfile($smdir, "smec3.pem"), 869 "-inkey", catfile($smdir, "smec3.pem"), 1067 '-inkey', catfile($smdir, "smrsa3-key.pem"),
|
/freebsd-current/crypto/openssl/engines/ |
H A D | e_ossltest.c | 781 const unsigned char *inkey, 780 ossltest_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/freebsd-current/usr.sbin/freebsd-update/ |
H A D | freebsd-update.sh | 1310 openssl rsautl -pubin -inkey pub.ssl -verify \
|