/freebsd-current/contrib/libucl/tests/basic/ |
H A D | 15.inc | 2 key = "overrided";
|
H A D | 16.inc | 2 key = "overrided";
|
H A D | 19-rewrite.inc | 2 key = value1;
|
H A D | 19-append.inc | 2 key = value1;
|
H A D | 19-merge.inc | 2 key = value1;
|
/freebsd-current/contrib/libucl/tests/basic/include_dir/ |
H A D | test1.conf | 0 key = value1;
|
H A D | test2.conf | 0 key = value2;
|
H A D | test3.conf | 0 key = value3;
|
/freebsd-current/usr.sbin/bluetooth/hcsecd/ |
H A D | parser.y | 51 static void free_key (link_key_p key); 59 static link_key_p key = NULL; 77 key = (link_key_p) malloc(sizeof(*key)); 78 if (key == NULL) { 84 memset(key, 0, sizeof(*key)); 88 if (get_key(&key->bdaddr, 1) != NULL) { 91 bt_ntoa(&key->bdaddr, NULL)); 92 free_key(key); 134 key: T_KEY T_HEXSTRING label [all...] |
H A D | hcsecd.conf | 17 # key 0x11223344 | nokey ; - to set link key for the device 26 # "nokey" means that no link key has been defined and we should 38 key nokey; 45 key nokey; 52 key 0x00112233445566778899aabbccddeeff; # 16 bytes key (hex string)
|
/freebsd-current/lib/libstdthreads/ |
H A D | tss.c | 35 tss_create(tss_t *key, tss_dtor_t dtor) argument 38 if (pthread_key_create(key, dtor) != 0) 44 tss_delete(tss_t key) argument 47 (void)pthread_key_delete(key); 51 tss_get(tss_t key) argument 54 return (pthread_getspecific(key)); 58 tss_set(tss_t key, void *val) argument 61 if (pthread_setspecific(key, val) != 0)
|
/freebsd-current/crypto/openssl/crypto/camellia/ |
H A D | cmll_misc.c | 21 CAMELLIA_KEY *key) 23 if (!userKey || !key) 27 key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key); 32 const CAMELLIA_KEY *key) 34 Camellia_EncryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out); 38 const CAMELLIA_KEY *key) 40 Camellia_DecryptBlock_Rounds(key->grand_rounds, in, key 20 Camellia_set_key(const unsigned char *userKey, const int bits, CAMELLIA_KEY *key) argument 31 Camellia_encrypt(const unsigned char *in, unsigned char *out, const CAMELLIA_KEY *key) argument 37 Camellia_decrypt(const unsigned char *in, unsigned char *out, const CAMELLIA_KEY *key) argument [all...] |
H A D | cmll_ecb.c | 20 const CAMELLIA_KEY *key, const int enc) 23 Camellia_encrypt(in, out, key); 25 Camellia_decrypt(in, out, key); 19 Camellia_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAMELLIA_KEY *key, const int enc) argument
|
/freebsd-current/contrib/telnet/libtelnet/ |
H A D | encrypt.h | 69 #define VALIDKEY(key) ( key[0] | key[1] | key[2] | key[3] | \ 70 key[4] | key[5] | key[6] | key[7])
|
/freebsd-current/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.h | 66 #define VALIDKEY(key) ( key[0] | key[1] | key[2] | key[3] | \ 67 key[4] | key[5] | key[6] | key[7])
|
/freebsd-current/lib/libsecureboot/openpgp/ |
H A D | opgp_key.c | 60 * @brief decode a key packet 67 decode_key(int tag, unsigned char **pptr, size_t len, OpenPGP_key *key) argument 86 key->key = NULL; 90 /* comput key fingerprint and id @sa rfc4880:12.2 */ 109 key->id = octets2hex(&mdata[mlen - 8], 8); 115 key->sig_alg = *ptr++; 116 if (key->sig_alg == 1) { /* RSA */ 118 key->key 161 OpenPGP_key *key; local 201 openpgp_trust_add(OpenPGP_key *key) argument 223 OpenPGP_key *key; local 240 OpenPGP_key *key, *tkey; local 265 OpenPGP_key *key; local 284 OpenPGP_key *key; local 335 OpenPGP_key *key; local 354 OpenPGP_key *key; local [all...] |
/freebsd-current/sys/netipsec/ |
H A D | key_var.h | 53 #define _KEYLEN(key) ((u_int)((key)->bits >> 3)) 54 #define _KEYBITS(key) ((u_int)((key)->bits)) 55 #define _KEYBUF(key) ((caddr_t)((caddr_t)(key) + sizeof(struct sadb_key)))
|
/freebsd-current/contrib/kyua/utils/config/ |
H A D | keys.cpp | 39 /// Converts a key to its textual representation. 41 /// \param key The key to convert. 43 /// \return a flattened representation of \p key, "."-joined. 45 utils::config::detail::flatten_key(const tree_key& key) argument 47 PRE(!key.empty()); 48 return text::join(key, "."); 52 /// Parses and validates a textual key. 54 /// \param str The key to process in dotted notation. 56 /// \return The tokenized key i 63 const tree_key key = text::split(str, '.'); local [all...] |
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | param_build.h | 26 int OSSL_PARAM_BLD_push_int(OSSL_PARAM_BLD *bld, const char *key, int val); 27 int OSSL_PARAM_BLD_push_uint(OSSL_PARAM_BLD *bld, const char *key, 29 int OSSL_PARAM_BLD_push_long(OSSL_PARAM_BLD *bld, const char *key, 31 int OSSL_PARAM_BLD_push_ulong(OSSL_PARAM_BLD *bld, const char *key, 33 int OSSL_PARAM_BLD_push_int32(OSSL_PARAM_BLD *bld, const char *key, 35 int OSSL_PARAM_BLD_push_uint32(OSSL_PARAM_BLD *bld, const char *key, 37 int OSSL_PARAM_BLD_push_int64(OSSL_PARAM_BLD *bld, const char *key, 39 int OSSL_PARAM_BLD_push_uint64(OSSL_PARAM_BLD *bld, const char *key, 41 int OSSL_PARAM_BLD_push_size_t(OSSL_PARAM_BLD *bld, const char *key, 43 int OSSL_PARAM_BLD_push_time_t(OSSL_PARAM_BLD *bld, const char *key, [all...] |
/freebsd-current/crypto/openssl/crypto/aes/ |
H A D | aes_ecb.c | 22 const AES_KEY *key, const int enc) 25 assert(in && out && key); 29 AES_encrypt(in, out, key); 31 AES_decrypt(in, out, key); 21 AES_ecb_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key, const int enc) argument
|
/freebsd-current/contrib/wpa/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ 55 * crypto_rsa_import_public_key - Import an RSA public key 56 * @buf: Key buffer (DER encoded RSA public key) 58 * Returns: Pointer to the public key or %NULL on failure 63 struct crypto_rsa_key *key; local 67 key = os_zalloc(sizeof(*key)); 68 if (key == NULL) 71 key->n = bignum_init(); 72 key 118 struct crypto_rsa_key *key; local 146 struct crypto_rsa_key *key; local 240 crypto_rsa_get_modulus_len(struct crypto_rsa_key *key) argument 256 crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, struct crypto_rsa_key *key, int use_private) argument 353 crypto_rsa_free(struct crypto_rsa_key *key) argument [all...] |
/freebsd-current/contrib/wireguard-tools/ |
H A D | encoding.h | 16 void key_to_base64(char base64[static WG_KEY_LEN_BASE64], const uint8_t key[static WG_KEY_LEN]); 17 bool key_from_base64(uint8_t key[static WG_KEY_LEN], const char *base64); 19 void key_to_hex(char hex[static WG_KEY_LEN_HEX], const uint8_t key[static WG_KEY_LEN]); 20 bool key_from_hex(uint8_t key[static WG_KEY_LEN], const char *hex); 22 bool key_is_zero(const uint8_t key[static WG_KEY_LEN]);
|
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ecx_key.c | 57 void ossl_ecx_key_free(ECX_KEY *key) argument 61 if (key == NULL) 64 CRYPTO_DOWN_REF(&key->references, &i, key->lock); 65 REF_PRINT_COUNT("ECX_KEY", key); 70 OPENSSL_free(key->propq); 71 OPENSSL_secure_clear_free(key->privkey, key->keylen); 72 CRYPTO_THREAD_lock_free(key->lock); 73 OPENSSL_free(key); 76 ossl_ecx_key_set0_libctx(ECX_KEY *key, OSSL_LIB_CTX *libctx) argument 81 ossl_ecx_key_up_ref(ECX_KEY *key) argument 93 ossl_ecx_key_allocate_privkey(ECX_KEY *key) argument [all...] |
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out, 48 EVP_RC4_HMAC_MD5 *key = data(ctx); local 54 RC4_set_key(&key->ks, keylen, inkey); 56 MD5_Init(&key->head); /* handy when benchmarking */ 57 key->tail = key->head; 58 key->md = key->head; 60 key->payload_length = NO_PAYLOAD_LENGTH; 79 EVP_RC4_HMAC_MD5 *key local 189 EVP_RC4_HMAC_MD5 *key = data(ctx); local [all...] |
/freebsd-current/contrib/unbound/sldns/ |
H A D | keyraw.h | 2 * keyraw.h -- raw key and signature access and conversion 13 * raw key and signature access and conversion 33 * \param[in] keydata the raw key data 35 * \param[in] alg the cryptographic algorithm this is a key for 42 * Calculates keytag of DNSSEC key, operates on wireformat rdata. 43 * \param[in] key the key as uncompressed wireformat rdata. 44 * \param[in] keysize length of key data. 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize); 63 * \param[in] key th [all...] |