Searched refs:inkey (Results 1 - 25 of 32) sorted by relevance

12

/netbsd-current/usr.bin/ypmatch/
H A Dypmatch.c57 char *inkey, *outbuf; local
130 inkey = argv[c];
132 len = strlen(inkey);
135 r = yp_match(domainname, inmap, inkey, len,
140 printf("%s: ", inkey);
150 inkey, inmap, yperr_string(r));
/netbsd-current/usr.sbin/ypserv/common/
H A Dyplib_host.h33 const char *inkey, int inkeylen, char **outval,
39 char *inkey, int inkeylen, char **outkey,
H A Dyplib_host.c127 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, argument
139 yprk.keydat.dptr = __UNCONST(inkey);
194 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, argument
207 yprk.keydat.dptr = inkey;
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/asn1/
H A Dd2i_pr.c105 STACK_OF(ASN1_TYPE) *inkey;
133 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
139 if (sk_ASN1_TYPE_num(inkey) == 6)
141 else if (sk_ASN1_TYPE_num(inkey) == 4)
145 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/asn1/
H A Dd2i_pr.c168 STACK_OF(ASN1_TYPE) *inkey;
178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
184 if (sk_ASN1_TYPE_num(inkey) == 6) {
186 } else if (sk_ASN1_TYPE_num(inkey) == 4) {
188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/netbsd-current/distrib/utils/libhack/
H A Dyplib.c173 yp_match(indomain, inmap, inkey, inkeylen, outval, outvallen)
176 const char *inkey;
204 yp_next(indomain, inmap, inkey, inkeylen, outkey, outkeylen, outval, outvallen)
207 const char *inkey;
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/
H A Dcipher_aes_cbc_hmac_sha.h18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
/netbsd-current/sys/arch/hpcmips/vr/
H A Dvrkiu.c254 unsigned char inkey[KIU_NSCANLINE], *prevkey, *reskey; local
263 inkey[i] = reskey[i];
267 if (countbits(inkey[i]) > 1) {
269 if (i != j && (inkey[i] & inkey[j])) {
274 i, inkey[i], prevkey[i]));
276 j, inkey[j], prevkey[j]));
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/data/
H A Dgen-req.sh124 -inkey test.key \
134 -inkey sub-cert.key \
147 -inkey test.key \
160 -inkey test.key \
170 -inkey test.key \
181 -inkey test.key \
194 -inkey test.key \
205 -inkey test.key \
216 -inkey test.key \
/netbsd-current/lib/libc/yp/
H A Dyp_match.c165 yp_match(const char *indomain, const char *inmap, const char *inkey, argument
183 if (inkey == NULL || inkeylen == 0)
191 if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey,
204 yprk.keydat.dptr = __UNCONST(inkey);
232 if (!ypmatch_add(inmap, inkey, inkeylen,
H A Dyp_first.c121 yp_next(const char *indomain, const char *inmap, const char *inkey, argument
131 inkey == NULL)
148 yprk.keydat.dptr = inkey;
/netbsd-current/usr.bin/ypcat/
H A Dypcat.c151 printit(int instatus, char *inkey, int inkeylen, char *inval, argument
158 (void)printf("%*.*s", inkeylen, inkeylen, inkey);
/netbsd-current/lib/libcurses/
H A Dget_wch.c55 static int inkey(wchar_t *wc, int to, int delay);
73 * inkey - do the work to process keyboard input, check for multi-key
78 inkey(wchar_t *wc, int to, int delay) function
90 __CTRACE(__CTRACE_INPUT, "inkey (%p, %d, %d)\n", wc, to, delay);
106 "inkey (wstate normal) got '%s'\n", unctrl(k));
113 "inkey: NORM=>ASSEMBLING: start(%d), "
122 "inkey: BACKOUT=>ASSEMBLING, start(%d), "
148 "inkey (wstate assembling) got '%s'\n", unctrl(k));
158 "inkey: ASSEMBLING=>TIMEOUT, start(%d), "
166 "inkey
[all...]
H A Dgetch.c50 short _cursesi_state; /* state of the inkey function */
222 static wchar_t inkey(int to, int delay);
438 /* init the inkey state variable */
516 perror("inkey: Cannot allocate new key entry chunk");
529 * inkey - do the work to process keyboard input, check for multi-key
535 inkey(int to, int delay) function
544 __CTRACE(__CTRACE_INPUT, "inkey (%d, %d)\n", to, delay);
561 "inkey (state normal) got '%s'\n", unctrl(k));
602 "inkey (state assembling) got '%s'\n", unctrl(k));
856 inp = inkey (wi
[all...]
/netbsd-current/external/gpl2/texinfo/dist/info/
H A Dpcterm.c376 int inkey;
494 for (i = 0; DJGPP_keytab[i].inkey; i++)
495 if (key == DJGPP_keytab[i].inkey)
375 int inkey; member in struct:__anon786
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/
H A Dpkeyutl.c63 {"inkey", OPT_INKEY, 's', "Input private key file"},
92 const char *inkey = NULL; local
123 inkey = opt_arg();
207 } else if (inkey == NULL) {
209 "%s: no private key given (-inkey parameter).\n", prog);
216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
H A Dts.c50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
106 {"inkey", OPT_INKEY, 's', "File with private key for reply"},
134 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local
242 inkey = opt_arg();
305 password, inkey, md, signer, chain, policy,
557 const char *queryfile, const char *passin, const char *inkey,
580 passin, inkey, md, signer, chain, policy);
666 const char *inkey, cons
556 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) argument
664 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) argument
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/apps/
H A Dts.c50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
97 {"inkey", OPT_INKEY, 's', "File with private key for reply"},
143 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local
256 inkey = opt_arg();
331 password, inkey, md, signer, chain, policy,
588 const char *queryfile, const char *passin, const char *inkey,
611 passin, inkey, md, signer, chain, policy);
697 const char *inkey, cons
587 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) argument
695 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) argument
[all...]
H A Dpkeyutl.c73 {"inkey", OPT_INKEY, 's', "Input private key file"},
120 const char *inkey = NULL; local
157 inkey = opt_arg();
289 } else if (inkey == NULL) {
291 "%s: no private key given (-inkey parameter).\n", prog);
305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
/netbsd-current/usr.sbin/ypserv/yppush/
H A Dyppush.c293 pushit(int instatus, char *inkey, int inkeylen, char *inval, argument
298 push(inkey, inkeylen, ypi); /* do it! */
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/evp/
H A De_rc4_hmac_md5.c38 const unsigned char *inkey,
43 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
37 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_chacha20_poly1305.c166 const unsigned char *inkey,
171 if (!inkey && !iv)
188 chacha_init_key(ctx, inkey, temp, enc);
194 chacha_init_key(ctx, inkey, NULL, enc);
165 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/
H A De_rc4_hmac_md5.c45 const unsigned char *inkey,
54 RC4_set_key(&key->ks, keylen, inkey);
44 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_chacha20_poly1305.c168 const unsigned char *inkey,
173 if (!inkey && !iv)
190 chacha_init_key(ctx, inkey, temp, enc);
196 chacha_init_key(ctx, inkey, NULL, enc);
167 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/netbsd-current/sys/arch/x68k/stand/libdos/
H A DMakefile18 inkey.S getc.S print.S gets.S keysns.S kflushgp.S kflushio.S \

Completed in 394 milliseconds

12