/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dnssec/ns5/ |
H A D | trusted.conf.bad | 20 trusted-keys {
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.old-deja/g++.brendan/ |
H A D | crash49.C | 5 const int keys = 10; variable 6 const int key[keys] = {6, key[1], 2, keys, 1, 7, 6, key[2], key[8]}; 10 for(int i = 0; i < keys;) std::cout << key[i++] << " ";
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/g++.old-deja/g++.brendan/ |
H A D | crash49.C | 5 const int keys = 10; variable 6 const int key[keys] = {6, key[1], 2, keys, 1, 7, 6, key[2], key[8]}; 10 for(int i = 0; i < keys;) std::cout << key[i++] << " ";
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/ |
H A D | pr33923.c | 17 unsigned long int keys; local 30 keys |= 1; 31 if ((routingKeyCount == 0) && keys) 35 doChord:switch (keys); 41 if (keys & 0X01UL) 43 if (keys & 0X02UL) 45 if (keys & 0X04UL) 47 if (keys & 0X08UL) 49 if (keys & 0X10UL) 51 if (keys [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | set_keys.c | 41 * Set the keys of `ent' to the string-to-key of `password' 49 Key *keys; local 55 password, &keys, &num_keys); 59 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); 60 ent->keys.val = keys; 61 ent->keys.len = num_keys; 78 * Set the keys of `ent' to (`n_key_data', `key_data') 90 Key *keys; local 149 Key *keys; local 208 Key *keys; local [all...] |
H A D | default_keys.c | 42 print_keys(krb5_context context, Key *keys, size_t nkeys) argument 48 printf("keys:\n"); 52 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 55 (int)keys[i].key.keytype); 60 if (keys[i].salt) { 63 switch (keys[i].salt->type) { 71 printf("unknown salt: %d", keys[i].salt->type); 74 if (keys[i].salt->salt.length) 75 printf("%.*s", (int)keys[i].salt->salt.length, 76 (char *)keys[ 88 Key *keys; local [all...] |
H A D | keys.c | 41 * free all the memory used by (len, keys) 46 int len, Key *keys) 48 hdb_free_keys(context, len, keys); 52 * null-ify `len', `keys' 56 _kadm5_init_keys (Key *keys, int len) argument 61 keys[i].mkvno = NULL; 62 keys[i].salt = NULL; 63 keys[i].key.keyvalue.length = 0; 64 keys[i].key.keyvalue.data = NULL; 45 _kadm5_free_keys(krb5_context context, int len, Key *keys) argument
|
H A D | chpass_s.c | 49 Key *keys; local 70 num_keys = ent.entry.keys.len; 71 keys = ent.entry.keys.val; 73 ent.entry.keys.len = 0; 74 ent.entry.keys.val = NULL; 78 _kadm5_free_keys (context->context, num_keys, keys); 83 existsp = _kadm5_exists_keys (ent.entry.keys.val, 84 ent.entry.keys.len, 85 keys, num_key [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.c-torture/compile/ |
H A D | pr26425.c | 2 struct key *keys[0]; member in struct:keyring_list 8 key_put(keyring->keys[loop]);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | ext.c | 49 krb5_keytab_entry *keys = NULL; local 59 keys = malloc(sizeof(*keys) * princ.n_key_data); 60 if (keys == NULL) { 68 keys[i].principal = princ.principal; 69 keys[i].vno = kd->key_data_kvno; 70 keys[i].keyblock.keytype = kd->key_data_type[0]; 71 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; 72 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0]; 73 keys[ [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/tree-ssa/ |
H A D | pr33922.c | 19 unsigned long int keys; local 32 keys |= 1; 33 if ((routingKeyCount == 0) && keys) 37 doChord:switch (keys); 43 if (keys & 0X01UL) 45 if (keys & 0X02UL) 47 if (keys & 0X04UL) 49 if (keys & 0X08UL) 51 if (keys & 0X10UL) 53 if (keys [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | ks_mem.c | 50 hx509_private_key *keys; member in struct:mem_data 82 for (i = 0; mem->keys && mem->keys[i]; i++) 83 hx509_private_key_free(&mem->keys[i]); 84 free(mem->keys); 160 hx509_private_key **keys) 165 for (i = 0; mem->keys && mem->keys[i]; i++) 167 *keys = calloc(i + 1, sizeof(**keys)); 157 mem_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/hostapd/logwatch/ |
H A D | hostapd | 40 if (keys %hostapd) { 41 foreach my $iface (sort keys %hostapd) { 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) {
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_ikev2_common.c | 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 33 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 84 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, argument 91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 112 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len,
|
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 38 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | salt-des3.c | 50 DES_cblock keys[3]; local 75 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); 76 DES_set_odd_parity(keys + i); 77 if(DES_is_weak_key(keys + i)) 78 _krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); 79 DES_set_key_unchecked(keys + i, &s[i]); 88 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); 89 DES_set_odd_parity(keys [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/conf/ |
H A D | beauregard.conf | 20 keys /usr/local/etc/ntp.keys # path for keys file 21 trustedkey 3 4 5 6 14 15 # define trusted keys
|
H A D | malarky.conf | 7 # /usr/local/bin/ntpd -a -k /usr/local/bin/ntp.keys -m -t 3 21 keys /usr/local/etc/ntp.keys # path for key file 22 trustedkey 3 4 5 6 14 # define trusted keys
|
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/scripts/ |
H A D | fix-amd-map.in | 46 foreach $m (keys %mappings) {
|
/netbsd-6-1-5-RELEASE/games/tetris/ |
H A D | tetris.c | 130 const char *keys; local 145 keys = "jkl pq"; 150 if (strlen(keys = optarg) != 6) 181 if (keys[i] == keys[j]) { 182 errx(1, "duplicate command keys specified."); 185 if (keys[i] == ' ') 188 key_write[i][0] = keys[i]; 246 * Handle command keys. 248 if (c == keys[ [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/test/hash_tests/ |
H A D | test_hash.c | 51 * List of all property keys. 55 static const char *keys[] = { variable 96 for (i = 0; i < __arraycount(keys); i++) { 97 hval = hash(keys[i], hsize, hinit, shift); 102 used[hval] = keys[i]; 119 printf("min and max hash size must be >= %zu\n", __arraycount(keys)); 148 h_min = __arraycount(keys); 168 if (h_max < __arraycount(keys) || 169 h_min < __arraycount(keys) ||
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/ |
H A D | tcs_context_key.c | 28 /* runs through the list of all keys loaded by context c and decrements 39 cur = prev = c->keys; 48 /* Traverse loaded keys list and if matching key handle is found return TRUE else return FALSE 63 k = c->keys; 76 /* Traverse loaded keys list and if matching key handle is found remove it */ 91 for (prev = cur = c->keys; cur; prev = cur, cur = cur->next) { 93 if (prev == c->keys) 94 c->keys = cur->next; 108 /* make a new entry in the per-context list of loaded keys. If the list already 123 k = c->keys; [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dlvauto/ns1/ |
H A D | sign.sh | 40 # Create bind.keys file for the use of the resolving server 41 echo "managed-keys {" > bind.keys 48 ' >> bind.keys 55 ' >> bind.keys 56 echo "};" >> bind.keys
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/mantools/ |
H A D | specmiss | 24 for $name (sort keys %found) {
|