/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/ps/ |
H A D | ps_utils.c | 131 UINT32 num_keys; local 150 rc = read(fd, &num_keys, sizeof(UINT32)); 151 num_keys = LE_32(num_keys); 157 num_keys = 1; 179 num_keys = LE_32(num_keys); 180 if ((rc = write_data(fd, &num_keys, sizeof(UINT32)))) { 199 num_keys++; 207 num_keys 277 UINT32 num_keys; local 305 int num_keys = 0; local 358 UINT32 num_keys = get_num_keys_in_file(fd); local [all...] |
H A D | tcsps.c | 679 UINT32 head_offset = 0, tail_offset, num_keys; local 765 rc = read(fd, &num_keys, sizeof(UINT32)); 766 num_keys = LE_32(num_keys); 779 num_keys--; 781 num_keys = LE_32(num_keys); 782 if ((result = write_data(fd, (void *)&num_keys, sizeof(UINT32)))) {
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | set_keys.c | 50 size_t num_keys; local 55 password, &keys, &num_keys); 61 ent->keys.len = num_keys; 207 size_t num_keys; local 211 &keys, &num_keys, 1); 215 kblock = malloc(num_keys * sizeof(kblock[0])); 218 _kadm5_free_keys (context->context, num_keys, keys); 221 memset(kblock, 0, num_keys * sizeof(kblock[0])); 224 for (i = 0; i < num_keys; i++) { 258 for (i = 0; i < num_keys; [all...] |
H A D | chpass_s.c | 50 size_t num_keys; local 70 num_keys = ent.entry.keys.len; 78 _kadm5_free_keys (context->context, num_keys, keys); 85 keys, num_keys); 86 _kadm5_free_keys (context->context, num_keys, keys);
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/tools/ |
H A D | ps_inspect.c | 274 bad_file_size(UINT32 num_keys, off_t file_size) argument 276 if ((num_keys * 360) > (unsigned long)file_size) 279 if ((num_keys * 560) < (unsigned long)file_size) 289 UINT32 *num_keys; local 301 num_keys = (UINT32 *)&buf[1]; 302 if (*num_keys == 0 || bad_file_size(*num_keys, file_size)) 309 num_keys = (UINT32 *)&buf[0]; 310 if (*num_keys == 0 || bad_file_size(*num_keys, file_siz [all...] |
H A D | ps_convert.c | 188 UINT32 *num_keys; local 201 num_keys = (UINT32 *)&buf[1]; 202 if (*num_keys == 0)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | cpw.c | 52 int num_keys; local 54 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys); 57 for(i = 0; i < num_keys; i++)
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ps/ |
H A D | tspps.c | 392 UINT32 num_keys; local 400 rc = read(fd, &num_keys, sizeof(UINT32)); 405 num_keys = LE_32(num_keys); 408 num_keys++; 410 num_keys--; 418 num_keys = LE_32(num_keys); 419 if ((result = write_data(fd, (void *)&num_keys, sizeof(UINT32)))) { 682 UINT32 i, num_keys local 1065 UINT32 num_keys; local 1110 UINT32 i, num_keys = psfile_get_num_keys(fd); local 1212 UINT32 i, num_keys = psfile_get_num_keys(fd); local [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/btkey/ |
H A D | device.c | 45 uint8_t num_keys; member in struct:stored_link_keys 155 for (i = 0 ; i < ep->num_keys ; i++) { 194 if (ep->num_keys != 1 236 cp.num_keys = 1;
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/readline/examples/rlfe/ |
H A D | rlfe.c | 258 int num_keys = 0; variable 345 num_keys = 0; 597 DPRINT1("[tty avail num_keys:%d]\n", num_keys); 621 if (do_canon == 0 && num_keys == 0) 641 if (num_keys == 0) 681 num_keys++;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hdb/ |
H A D | keys.c | 366 Key **keys, size_t *num_keys) 372 keys, num_keys, 0); 376 for (i = 0; i < (*num_keys); i++) { 394 hdb_free_keys (context, *num_keys, *keys); 363 hdb_generate_key_set_password(krb5_context context, krb5_principal principal, const char *password, Key **keys, size_t *num_keys) argument
|
H A D | hdb-mitdb.c | 208 uint16_t u16, num_keys, num_tl; local 287 num_keys = u16; 330 for (i = 0; i < num_keys; i++) {
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | deprecated.c | 110 static int num_keys = sizeof(keys) / sizeof(keys[0]); variable 128 for(i = 0; i < num_keys; i++) { 135 if(i >= num_keys) { 165 for(i = 0; i < num_keys; i++)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/admin/ |
H A D | change.c | 50 int num_keys; local 101 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); 109 for (i = 0; i < num_keys; ++i) {
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | misc.c | 562 u_int num_keys, i, j; local 572 for (num_keys = 0; num_keys < EXPAND_MAX_KEYS; num_keys++) { 573 keys[num_keys].key = va_arg(ap, char *); 574 if (keys[num_keys].key == NULL) 576 keys[num_keys].repl = va_arg(ap, char *); 577 if (keys[num_keys].repl == NULL) 580 if (num_keys == EXPAND_MAX_KEYS && va_arg(ap, char *) != NULL) 599 for (j = 0; j < num_keys; [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/ |
H A D | tcs_caps.c | 179 &p->num_keys)))
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libmudflap/ |
H A D | mf-runtime.c | 106 unsigned num_keys; member in struct:mfsplay_tree_s 2560 if (sp->num_keys <= 2) 2563 all_nodes = mfsplay_tree_xmalloc (sizeof (mfsplay_tree_node) * sp->num_keys); 2571 sp->root = mfsplay_tree_rebalance_helper2 (all_nodes, 0, sp->num_keys - 1); 2628 sp->num_keys = 0; 2663 sp->num_keys++; 2700 sp->num_keys--; 2807 if (st->root == NULL) /* => num_keys == 0 */ 2810 stack1 = mfsplay_tree_xmalloc (sizeof (mfsplay_tree_node) * st->num_keys); 2811 stack2 = mfsplay_tree_xmalloc (sizeof (char) * st->num_keys); [all...] |
/netbsd-6-1-5-RELEASE/external/mit/xorg/lib/libxcb/files/ |
H A D | xinput.h | 188 uint16_t num_keys; /**< */ member in struct:xcb_input_key_info_t 1357 uint8_t num_keys; /**< */ member in struct:xcb_input_key_state_t 1859 uint8_t num_keys; /**< */ member in struct:xcb_input_device_state_notify_event_t
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/include/ |
H A D | tcs_utils.h | 42 UINT32 num_keys; member in struct:tpm_properties
|
/netbsd-6-1-5-RELEASE/sys/netbt/ |
H A D | hci.h | 2005 uint8_t num_keys; /* # of keys */ member in struct:__anon9225 2006 /* these are repeated "num_keys" times
|