/macosx-10.10.1/CPANInternal-159.1/SOAP-Lite-1.11/examples/UDDI/ |
H A D | publish1.pl | 27 my $newkey = $newent->businessKey; 30 print $newkey, "\n"; 33 print "Deleting '$newkey'...\n"; 34 my $result = delete_business($auth, $newkey)->result;
|
H A D | syntax1.pl | 28 my $newkey = $newent->businessKey;
|
/macosx-10.10.1/Heimdal-398.1.2/kadmin/ |
H A D | random_password.c | 58 OtpKey newkey; local 60 krb5_generate_random_block(&newkey, sizeof(newkey)); 61 otp_print_stddict (newkey, pw, len);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | gencerts.sh | 4 openssl req -x509 -newkey rsa:1024 -sha1 -days 3650 -subj "$SUBJECT" -nodes -keyout privkey-1.pem -out cert-1.pem
|
/macosx-10.10.1/postfix-255/postfix/src/tls/ |
H A D | tls_scache.c | 45 /* TLS_TICKET_KEY *tls_scache_key_rotate(newkey) 46 /* TLS_TICKET_KEY *newkey; 122 /* .IP newkey 570 TLS_TICKET_KEY *tls_scache_key_rotate(TLS_TICKET_KEY *newkey) argument 578 keys[1] = (TLS_TICKET_KEY *) mymalloc(sizeof(*newkey)); 579 *keys[1] = *newkey; 580 newkey = keys[1]; 588 keys[0] = newkey; 590 return (newkey);
|
/macosx-10.10.1/OpenSSL098-52/src/util/ |
H A D | mkcerts.sh | 21 -new -md5 -newkey $CAbits \ 57 -new -md5 -newkey $CAbits \ 94 -new -md5 -newkey 512 \ 131 -new -md5 -newkey 1024 \ 168 -new -md5 -newkey 512 \
|
/macosx-10.10.1/apache-793/httpd/modules/session/ |
H A D | mod_session_dbd.c | 253 const char *newkey, const char *val, apr_int64_t expiry) 277 statement, val, &expiry, newkey, oldkey, NULL); 281 "using database query '%s': %s/%s", oldkey, newkey, conf->updatelabel, apr_dbd_error(dbd->driver, dbd->handle, rv)); 305 val, &expiry, newkey, NULL); 309 "in database with '%s': %s", newkey, conf->insertlabel, 324 "to the database for session '%s', session not inserted", newkey); 407 char *oldkey = NULL, *newkey = NULL; local 420 newkey = apr_pcalloc(r->pool, APR_UUID_FORMATTED_LENGTH + 1); 421 apr_uuid_format(newkey, z->uuid); 424 newkey 252 dbd_save(request_rec * r, const char *oldkey, const char *newkey, const char *val, apr_int64_t expiry) argument [all...] |
/macosx-10.10.1/libtelnet-13/ |
H A D | kerberos5.c | 236 krb5_keyblock *newkey = 0; local 334 krb5_auth_con_getlocalsubkey(telnet_context, auth_context, &newkey); 340 if (newkey) { 343 if ((newkey->enctype != ENCTYPE_DES_CBC_CRC) && 344 (newkey-> enctype != ENCTYPE_DES_CBC_MD5)) { 353 krb5_copy_keyblock(telnet_context, newkey, &session_key); 355 krb5_free_keyblock(telnet_context, newkey); 393 krb5_keyblock *newkey = NULL; local 555 &newkey); 560 if (newkey) { [all...] |
/macosx-10.10.1/OpenSSL098-52/src/demos/ssltest-ecc/ |
H A D | ECCcertgen.sh | 60 -newkey ec:$TEST_CA_CURVE.pem -new \ 98 -newkey ec:$TEST_SERVER_CURVE.pem -new \ 137 -newkey ec:$TEST_CLIENT_CURVE.pem -new \
|
H A D | RSAcertgen.sh | 51 -newkey rsa:1024 -new \ 77 -newkey rsa:1024 -new \ 102 -newkey rsa:1024 -new \
|
H A D | ECC-RSAcertgen.sh | 53 -newkey ec:$TEST_SERVER_CURVE.pem -new \ 79 -newkey ec:$TEST_CLIENT_CURVE.pem -new \
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/ |
H A D | CreateCerts.sh | 37 ${OPENSSL} req -x509 -nodes -days 365 -subj '/CN=SecurityTest CA Cert (RSA)' -newkey rsa:1024 -keyout CAKey.rsa.pem -out CACert.rsa.pem 38 ${OPENSSL} req -x509 -nodes -days 365 -subj '/CN=SecurityTest CA Cert (ECC)' -newkey ec:ecparam.pem -keyout CAKey.ecc.pem -out CACert.ecc.pem 45 ${OPENSSL} req -new -nodes -days 365 -subj '/CN=SecurityTests Server Cert (RSA)' -newkey rsa:1024 -keyout ServerKey.rsa.pem -out ServerReq.rsa.pem 53 ${OPENSSL} req -new -nodes -days 365 -subj '/CN=SecurityTests Client Cert (RSA)' -newkey rsa:1024 -keyout ClientKey.rsa.pem -out ClientReq.rsa.pem
|
/macosx-10.10.1/apache-793/httpd/include/ |
H A D | ap_regkey.h | 59 * @param newkey The opened registry key 78 * @param pool The pool in which newkey is allocated 80 AP_DECLARE(apr_status_t) ap_regkey_open(ap_regkey_t **newkey,
|
/macosx-10.10.1/tcl-105/tcl_ext/xotcl/xotcl/library/store/XOTclGdbm/ |
H A D | xotclgdbm.c | 271 datum newkey; local 286 newkey = gdbm_nextkey(db->db, *db->lastSearchKey); 288 if (!newkey.dptr) { 300 Tcl_AppendResult (in, newkey.dptr, (char*)0); 304 db->lastSearchKey->dptr = newkey.dptr; 305 db->lastSearchKey->dsize = newkey.dsize;
|
/macosx-10.10.1/bind9-45.101/bind9/contrib/zkt/ |
H A D | zkt-signer.c | 465 int newkey; local 508 newkey = ksk5011status (&zp->keys, zp->dir, zp->zone, zp->conf); 509 if ( (newkey & 02) != 02 ) /* not a rfc 5011 zone ? */ 514 newkey |= kskstatus (zonelist, zp); 517 newkey &= ~02; /* reset bit 2 */ 521 newkey += zskstatus (&zp->keys, zp->dir, zp->zone, zp->conf); 526 if ( !newkey ) 527 newkey = check_keydb_timestamp (zp->keys, file_mtime (path)); 532 if ( !newkey ) 536 if ( !newkey [all...] |
/macosx-10.10.1/OpenSSL098-52/src/apps/ |
H A D | CA.sh | 86 $REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS 88 echo "Certificate is in newcert.pem, private key is in newkey.pem" 92 $REQ -new -keyout newkey.pem -out newreq.pem $DAYS 94 echo "Request is in newreq.pem, private key is in newkey.pem"
|
H A D | req.c | 120 * -newkey - make a key and a request. 177 long newkey = -1; local 293 else if (strcmp(*argv,"-newkey") == 0) 305 newkey= atoi(p); 344 newkey=BN_num_bits(dsa_params->p); 397 newkey = EC_GROUP_get_degree(EC_KEY_get0_group(ec_params)); 521 BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n"); 522 BIO_printf(bio_err," -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n"); 524 BIO_printf(bio_err," -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n"); 743 if (newkey < [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/dst/ |
H A D | dst_test.c | 106 dst_key_t *newkey = NULL; local 117 &buf1, mctx, &newkey); 123 ret = dst_key_todns(newkey, &buf2); 134 dst_key_free(&newkey);
|
/macosx-10.10.1/tcl-105/tcl_ext/xotcl/xotcl/library/store/XOTclSdbm/ |
H A D | xotclsdbm.c | 316 datum newkey; local 327 newkey = sdbm_nextkey(db->db); 329 if (!newkey.dptr) { 336 Tcl_AppendResult (in, newkey.dptr, (char*)0);
|
/macosx-10.10.1/apache-793/httpd/os/win32/ |
H A D | ap_regkey.c | 58 AP_DECLARE(apr_status_t) ap_regkey_open(ap_regkey_t **newkey, 111 *newkey = apr_palloc(pool, sizeof(**newkey)); 112 (*newkey)->pool = pool; 113 (*newkey)->hkey = hkey; 114 apr_pool_cleanup_register((*newkey)->pool, (void *)(*newkey),
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | monitor_wrap.c | 477 Newkeys *newkey = NULL; local 489 newkey = xmalloc(sizeof(*newkey)); 490 enc = &newkey->enc; 491 mac = &newkey->mac; 492 comp = &newkey->comp; 528 return (newkey); 539 Newkeys *newkey = (Newkeys *)packet_get_newkeys(mode); local 541 debug3("%s: converting %p", __func__, newkey); 543 if (newkey [all...] |
/macosx-10.10.1/bash-94.1.2/bash-3.2/lib/readline/ |
H A D | readline.c | 701 int r, newkey; local 824 newkey = _rl_subseq_getchar (key); 825 if (newkey < 0) 831 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function);
|
/macosx-10.10.1/emacs-93/emacs/lisp/international/ |
H A D | kkc.el | 459 (let ((newkey (make-vector kkc-length-head 0)) 463 ;; For the moment, (setq kkc-original-kana (concat newkey)) 467 (aset newkey i (aref kkc-current-key (+ idx i))) 469 (concat kkc-original-kana (char-to-string (aref newkey i)))) 471 (setq kkc-current-key newkey)
|
/macosx-10.10.1/ruby-106/ruby/ext/dl/win32/lib/win32/ |
H A D | registry.rb | 385 newkey = API.OpenKey(hkey.hkey, subkey, opt, desired) 386 obj = new(newkey, hkey, subkey, REG_OPENED_EXISTING_KEY) 412 newkey, disp = API.CreateKey(hkey.hkey, subkey, opt, desired) 413 obj = new(newkey, hkey, subkey, disp)
|
/macosx-10.10.1/ruby-106/ruby/ext/fiddle/win32/lib/win32/ |
H A D | registry.rb | 385 newkey = API.OpenKey(hkey.hkey, subkey, opt, desired) 386 obj = new(newkey, hkey, subkey, REG_OPENED_EXISTING_KEY) 412 newkey, disp = API.CreateKey(hkey.hkey, subkey, opt, desired) 413 obj = new(newkey, hkey, subkey, disp)
|