Searched refs:rkey (Results 1 - 25 of 31) sorted by relevance

12

/macosx-10.10/Libc-1044.1.2/db/btree/FreeBSD/
H A Dbt_utils.c56 * rkey: memory area to hold key
65 __bt_ret(BTREE *t, EPG *e, DBT *key, DBT *rkey, DBT *data, DBT *rdata, int copy) argument
82 &key->size, &rkey->data, &rkey->size))
84 key->data = rkey->data;
86 if (bl->ksize > rkey->size) {
87 p = realloc(rkey->data, bl->ksize);
90 rkey->data = p;
91 rkey->size = bl->ksize;
93 memmove(rkey
[all...]
/macosx-10.10/OpenSSL098-52/src/test/
H A Digetest.c285 unsigned char rkey[16]; local
300 RAND_pseudo_bytes(rkey, sizeof rkey);
308 AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
312 AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
326 AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
334 AES_set_decrypt_key(rkey,
[all...]
/macosx-10.10/BerkeleyDB-21/db/test/
H A Dtest037.tcl106 set rkey 0
118 incr rkey
120 set key $rkey
158 incr rkey
160 set key $rkey
/macosx-10.10/OpenSSH-189/openssh/
H A Dauth-rsa.c170 const BIGNUM *client_n, Key **rkey)
262 if (allowed && rkey != NULL)
263 *rkey = key;
276 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) argument
288 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey);
169 rsa_key_allowed_in_file(struct passwd *pw, char *file, const BIGNUM *client_n, Key **rkey) argument
H A Dmonitor_wrap.c1088 mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) argument
1111 if (allowed && rkey != NULL) {
1115 *rkey = key;
/macosx-10.10/tcl-105/tk/tk/library/demos/
H A Dunicodeout.tcl18 set rkey [join {
28 if {[catch {registry values $rkey} w32langs]} {
/macosx-10.10/Heimdal-398.1.2/lib/hx509/data/
H A Dgen-req.sh298 -rkey ocsp-responder.key \
307 -rkey ca.key \
316 -rkey ocsp-responder.key \
326 -rkey ocsp-responder.key \
341 -rkey ocsp-responder.key \
/macosx-10.10/OpenSSL098-52/src/engines/
H A De_capi.c592 RSA *rkey = NULL; local
635 rkey = RSA_new_method(eng);
636 if (!rkey)
639 rkey->e = BN_new();
640 rkey->n = BN_new();
642 if (!rkey->e || !rkey->n)
645 if (!BN_set_word(rkey->e, rp->pubexp))
649 if (!lend_tobn(rkey->n, rsa_modulus, rsa_modlen))
652 RSA_set_ex_data(rkey, rsa_capi_id
[all...]
/macosx-10.10/OpenSSL098-52/src/apps/
H A Docsp.c80 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
113 EVP_PKEY *key = NULL, *rkey = NULL; local
510 else if (!strcmp(*args, "-rkey"))
577 BIO_printf (bio_err, "-rkey file responder key to sign responses with\n");
640 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL,
642 if (!rkey)
711 if (ridx_filename && (!rkey || !rsigner || !rca_cert))
726 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays);
867 EVP_PKEY_free(rkey);
1014 X509 *ca, X509 *rcert, EVP_PKEY *rkey,
1013 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument
[all...]
/macosx-10.10/BerkeleyDB-21/db/build_brew/
H A Ddb_int.h728 (dbc)->rkey = &(owner)->my_rkey; \
736 (dest)->rkey = (src)->rkey; \
744 (dbc)->rkey = &(dbc)->my_rkey; \
/macosx-10.10/BerkeleyDB-21/db/build_s60/
H A Ddb_int.h727 (dbc)->rkey = &(owner)->my_rkey; \
735 (dest)->rkey = (src)->rkey; \
743 (dbc)->rkey = &(dbc)->my_rkey; \
/macosx-10.10/BerkeleyDB-21/db/build_vxworks/
H A Ddb_int.h730 (dbc)->rkey = &(owner)->my_rkey; \
738 (dest)->rkey = (src)->rkey; \
746 (dbc)->rkey = &(dbc)->my_rkey; \
/macosx-10.10/BerkeleyDB-21/db/build_wince/
H A Ddb_int.h727 (dbc)->rkey = &(owner)->my_rkey; \
735 (dest)->rkey = (src)->rkey; \
743 (dbc)->rkey = &(dbc)->my_rkey; \
/macosx-10.10/BerkeleyDB-21/db/build_windows/
H A Ddb_int.h727 (dbc)->rkey = &(owner)->my_rkey; \
735 (dest)->rkey = (src)->rkey; \
743 (dbc)->rkey = &(dbc)->my_rkey; \
/macosx-10.10/BerkeleyDB-21/db/btree/
H A Dbt_recno.c179 sizeof(cp->recno), &dbc->rkey->data, &dbc->rkey->ulen);
553 &dbc->rkey->data, &dbc->rkey->ulen);
724 sizeof(cp->recno), &dbc->rkey->data, &dbc->rkey->ulen);
/macosx-10.10/BerkeleyDB-21/db/build_vxworks/db_load/
H A Ddb_load.c285 DBT key, rkey, data, *readp, *writep; local
300 memset(&rkey, 0, sizeof(DBT));
440 readp = &rkey;
567 if (rkey.data != NULL)
568 free(rkey.data);
/macosx-10.10/BerkeleyDB-21/db/db_load/
H A Ddb_load.c270 DBT key, rkey, data, *readp, *writep; local
285 memset(&rkey, 0, sizeof(DBT));
425 readp = &rkey;
552 if (rkey.data != NULL)
553 free(rkey.data);
/macosx-10.10/swig-12/Source/Swig/
H A Dnaming.c1033 const char **rkey; local
1059 for (rkey = keys; *rkey != 0; ++rkey) {
1060 if (strcmp(ckey, *rkey) == 0) {
1061 Setattr(nameobj, *rkey, Getattr(kw, "value"));
/macosx-10.10/BerkeleyDB-21/db/dbinc/
H A Ddb_int.in726 (dbc)->rkey = &(owner)->my_rkey; \
734 (dest)->rkey = (src)->rkey; \
742 (dbc)->rkey = &(dbc)->my_rkey; \
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/
H A Daccept_sec_context.c928 krb5_keyblock *rkey; local
936 &rkey);
940 rkey);
943 krb5_free_keyblock(context, rkey);
/macosx-10.10/ICU-531.30/icuSources/common/
H A Dserv.h819 * @param rkey the registry key.
823 virtual UBool unregister(URegistryKey rkey, UErrorCode& status);
H A Dserv.cpp877 ICUService::unregister(URegistryKey rkey, UErrorCode& status) argument
879 ICUServiceFactory *factory = (ICUServiceFactory*)rkey;
/macosx-10.10/BerkeleyDB-21/db/db/
H A Ddb_cam.c792 &dbc_arg->rkey->data, &dbc_arg->rkey->ulen)) != 0) {
1915 * we return values using the DBTs dbc->rskey, dbc->rkey, and
1925 * the rkey/rdata from the *secondary* cursor.
1928 * with to the c_get, but swapping the contents of rskey and rkey,
1929 * respectively, into rkey and rdata; __db_ret will treat them like
1932 * rskey/rkey/rdata to normal, and do a get on the primary with the
1991 dbc_n->rdata = dbc->rkey;
1992 dbc_n->rkey = dbc->rskey;
2012 * their memory--we need to swap around the rkey/rdat
[all...]
H A Ddb_iface.c1432 dbc->rkey = &dbc->my_rkey;
/macosx-10.10/BerkeleyDB-21/db/qam/
H A Dqam.c496 &recno, sizeof(recno), &dbc->rkey->data, &dbc->rkey->ulen);
1076 &dbc->rkey->data, &dbc->rkey->ulen)) != 0)

Completed in 337 milliseconds

12