Searched refs:keylist (Results 1 - 10 of 10) sorted by relevance
/freebsd-10.0-release/usr.sbin/mtree/ |
H A D | misc.c | 56 static KEY keylist[] = { variable 94 k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
|
/freebsd-10.0-release/contrib/mtree/ |
H A D | misc.c | 64 static KEY keylist[] = { variable 125 for (i = 0; i < sizeof(keylist) / sizeof(KEY); i++) 126 allbits |= keylist[i].val; 131 k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
|
/freebsd-10.0-release/contrib/nvi/common/ |
H A D | key.c | 64 KEYLIST keylist[] = { variable 94 (sizeof(keylist) / sizeof(keylist[0])) - ADDITIONAL_CHARACTERS; 120 qsort(keylist, nkeylist, sizeof(keylist[0]), v_key_cmp); 123 for (kp = keylist, cnt = nkeylist; cnt--; ++kp) 143 * We've left some open slots in the keylist table, and if these values exist, 164 for (kp = keylist; kp->value != K_NOTUSED; ++kp) 172 keylist[nkeylist].ch = ch; 173 keylist[nkeylis [all...] |
H A D | key.h | 147 extern KEYLIST keylist[];
|
/freebsd-10.0-release/contrib/unbound/validator/ |
H A D | val_anchor.h | 109 struct ta_key* keylist; member in struct:trust_anchor 112 /** number of DSs in the keylist */ 114 /** number of DNSKEYs in the keylist */
|
H A D | val_anchor.c | 124 p = ta->keylist; 260 for(k = ta->keylist; k; k = k->next) { 338 k->next = ta->keylist; 339 ta->keylist = k; 922 for(tk = ta->keylist; tk; tk = tk->next) { 1249 if(ta->keylist || ta->autr || ta->numDS || ta->numDNSKEY) {
|
/freebsd-10.0-release/contrib/nvi/cl/ |
H A D | cl_term.c | 119 for (kp = keylist;; ++kp)
|
/freebsd-10.0-release/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 286 * keylist, since no further transmissions will be made. 1407 * has changed and we have a keylist, the lifetimes in the 1408 * keylist are probably bogus. In this case purge the keylist 1486 * tossed immediately upon use. Therefore, the keylist can be 2500 * Allocate and initialize a keylist if not 2516 * that case, purge the keylist and regenerate 2523 xkeyid = peer->keylist[peer->keynumber]; 2536 * new keylist is generated; otherwise, push the 2555 * until then. In any case, if a new keylist i [all...] |
H A D | ntp_crypto.c | 279 if (peer->keylist == NULL) 280 peer->keylist = emalloc(sizeof(keyid_t) * 309 peer->keylist[i] = keyid; 922 * sever/peer cookie changes or a new keylist is
|
/freebsd-10.0-release/contrib/ntp/include/ |
H A D | ntp.h | 320 keyid_t *keylist; /* session key ID list */ member in struct:peer
|
Completed in 101 milliseconds