/netbsd-current/usr.bin/ypmatch/ |
H A D | ypmatch.c | 57 char *inkey, *outbuf; local 130 inkey = argv[c]; 132 len = strlen(inkey); 135 r = yp_match(domainname, inmap, inkey, len, 140 printf("%s: ", inkey); 150 inkey, inmap, yperr_string(r));
|
/netbsd-current/usr.sbin/ypserv/common/ |
H A D | yplib_host.h | 33 const char *inkey, int inkeylen, char **outval, 39 char *inkey, int inkeylen, char **outkey,
|
H A D | yplib_host.c | 127 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, argument 139 yprk.keydat.dptr = __UNCONST(inkey); 194 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, argument 207 yprk.keydat.dptr = inkey;
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
H A D | d2i_pr.c | 105 STACK_OF(ASN1_TYPE) *inkey; 133 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 139 if (sk_ASN1_TYPE_num(inkey) == 6) 141 else if (sk_ASN1_TYPE_num(inkey) == 4) 145 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | d2i_pr.c | 168 STACK_OF(ASN1_TYPE) *inkey; 178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 184 if (sk_ASN1_TYPE_num(inkey) == 6) { 186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { 188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/netbsd-current/distrib/utils/libhack/ |
H A D | yplib.c | 173 yp_match(indomain, inmap, inkey, inkeylen, outval, outvallen) 176 const char *inkey; 204 yp_next(indomain, inmap, inkey, inkeylen, outkey, outkeylen, outval, outvallen) 207 const char *inkey;
|
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha.h | 18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
|
/netbsd-current/sys/arch/hpcmips/vr/ |
H A D | vrkiu.c | 254 unsigned char inkey[KIU_NSCANLINE], *prevkey, *reskey; local 263 inkey[i] = reskey[i]; 267 if (countbits(inkey[i]) > 1) { 269 if (i != j && (inkey[i] & inkey[j])) { 274 i, inkey[i], prevkey[i])); 276 j, inkey[j], prevkey[j]));
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/data/ |
H A D | gen-req.sh | 124 -inkey test.key \ 134 -inkey sub-cert.key \ 147 -inkey test.key \ 160 -inkey test.key \ 170 -inkey test.key \ 181 -inkey test.key \ 194 -inkey test.key \ 205 -inkey test.key \ 216 -inkey test.key \
|
/netbsd-current/lib/libc/yp/ |
H A D | yp_match.c | 165 yp_match(const char *indomain, const char *inmap, const char *inkey, argument 183 if (inkey == NULL || inkeylen == 0) 191 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey, 204 yprk.keydat.dptr = __UNCONST(inkey); 232 if (!ypmatch_add(inmap, inkey, inkeylen,
|
H A D | yp_first.c | 121 yp_next(const char *indomain, const char *inmap, const char *inkey, argument 131 inkey == NULL) 148 yprk.keydat.dptr = inkey;
|
/netbsd-current/usr.bin/ypcat/ |
H A D | ypcat.c | 151 printit(int instatus, char *inkey, int inkeylen, char *inval, argument 158 (void)printf("%*.*s", inkeylen, inkeylen, inkey);
|
/netbsd-current/lib/libcurses/ |
H A D | get_wch.c | 55 static int inkey(wchar_t *wc, int to, int delay); 73 * inkey - do the work to process keyboard input, check for multi-key 78 inkey(wchar_t *wc, int to, int delay) function 90 __CTRACE(__CTRACE_INPUT, "inkey (%p, %d, %d)\n", wc, to, delay); 106 "inkey (wstate normal) got '%s'\n", unctrl(k)); 113 "inkey: NORM=>ASSEMBLING: start(%d), " 122 "inkey: BACKOUT=>ASSEMBLING, start(%d), " 148 "inkey (wstate assembling) got '%s'\n", unctrl(k)); 158 "inkey: ASSEMBLING=>TIMEOUT, start(%d), " 166 "inkey [all...] |
H A D | getch.c | 50 short _cursesi_state; /* state of the inkey function */ 222 static wchar_t inkey(int to, int delay); 438 /* init the inkey state variable */ 516 perror("inkey: Cannot allocate new key entry chunk"); 529 * inkey - do the work to process keyboard input, check for multi-key 535 inkey(int to, int delay) function 544 __CTRACE(__CTRACE_INPUT, "inkey (%d, %d)\n", to, delay); 561 "inkey (state normal) got '%s'\n", unctrl(k)); 602 "inkey (state assembling) got '%s'\n", unctrl(k)); 856 inp = inkey (wi [all...] |
/netbsd-current/external/gpl2/texinfo/dist/info/ |
H A D | pcterm.c | 376 int inkey; 494 for (i = 0; DJGPP_keytab[i].inkey; i++) 495 if (key == DJGPP_keytab[i].inkey) 375 int inkey; member in struct:__anon786
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | pkeyutl.c | 63 {"inkey", OPT_INKEY, 's', "Input private key file"}, 92 const char *inkey = NULL; local 123 inkey = opt_arg(); 207 } else if (inkey == NULL) { 209 "%s: no private key given (-inkey parameter).\n", prog); 216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
|
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 106 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 134 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local 242 inkey = opt_arg(); 305 password, inkey, md, signer, chain, policy, 557 const char *queryfile, const char *passin, const char *inkey, 580 passin, inkey, md, signer, chain, policy); 666 const char *inkey, cons 556 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) argument 664 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/apps/ |
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 97 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 143 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local 256 inkey = opt_arg(); 331 password, inkey, md, signer, chain, policy, 588 const char *queryfile, const char *passin, const char *inkey, 611 passin, inkey, md, signer, chain, policy); 697 const char *inkey, cons 587 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) argument 695 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) argument [all...] |
H A D | pkeyutl.c | 73 {"inkey", OPT_INKEY, 's', "Input private key file"}, 120 const char *inkey = NULL; local 157 inkey = opt_arg(); 289 } else if (inkey == NULL) { 291 "%s: no private key given (-inkey parameter).\n", prog); 305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
|
/netbsd-current/usr.sbin/ypserv/yppush/ |
H A D | yppush.c | 293 pushit(int instatus, char *inkey, int inkeylen, char *inval, argument 298 push(inkey, inkeylen, ypi); /* do it! */
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 38 const unsigned char *inkey, 43 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 37 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_chacha20_poly1305.c | 166 const unsigned char *inkey, 171 if (!inkey && !iv) 188 chacha_init_key(ctx, inkey, temp, enc); 194 chacha_init_key(ctx, inkey, NULL, enc); 165 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 45 const unsigned char *inkey, 54 RC4_set_key(&key->ks, keylen, inkey); 44 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_chacha20_poly1305.c | 168 const unsigned char *inkey, 173 if (!inkey && !iv) 190 chacha_init_key(ctx, inkey, temp, enc); 196 chacha_init_key(ctx, inkey, NULL, enc); 167 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/netbsd-current/sys/arch/x68k/stand/libdos/ |
H A D | Makefile | 18 inkey.S getc.S print.S gets.S keysns.S kflushgp.S kflushio.S \
|