HomeSort by: relevance | last modified time | path
    Searched defs:newkey (Results 1 - 19 of 19) sorted by relevancy

  /src/crypto/external/bsd/heimdal/dist/kadmin/
random_password.c 60 OtpKey newkey; local
62 krb5_generate_random_block(&newkey, sizeof(newkey));
63 otp_print_stddict (newkey, pw, len);
  /src/external/mpl/bind/dist/lib/dns/
keystore.c 196 dst_key_t *newkey = NULL; local
243 mctx, &newkey, NULL);
260 mctx, &newkey, NULL);
264 *dstkey = newkey;
keymgr.c 458 keymgr_keyid_conflict(dst_key_t *newkey, uint16_t min, uint16_t max,
460 uint16_t id = dst_key_id(newkey);
461 uint32_t rid = dst_key_rid(newkey);
462 uint32_t alg = dst_key_alg(newkey);
503 dst_key_t *newkey = NULL; local
529 NULL, mctx, &newkey, NULL));
533 rdclass, mctx, alg, size, flags, &newkey));
537 conflict = keymgr_keyid_conflict(newkey, kkey->tag_min,
541 newkey, kkey->tag_min, kkey->tag_max, &keykeys);
545 newkey, kkey->tag_min, kkey->tag_max, newkeys)
2215 dns_dnsseckey_t *newkey = NULL; local
    [all...]
zone.c 10698 bool newkey = false; local
10801 newkey = true;
10844 if (!deletekey && !newkey) {
10857 newkey = true;
10885 if (deletekey || !newkey) {
10904 } else if (newkey) {
10934 INSIST(newkey || updatekey);
  /src/external/bsd/tmux/dist/
input-keys.c 583 key_code newkey; local
599 newkey = options_get_number(global_options, "backspace");
601 key, newkey);
604 if ((newkey & KEYC_MASK_MODIFIERS) == 0)
605 ud.data[0] = newkey;
606 else if ((newkey & KEYC_MASK_MODIFIERS) == KEYC_CTRL) {
607 newkey &= KEYC_MASK_KEY;
608 if (newkey == '?')
610 else if (newkey >= '@' && newkey <= '_'
    [all...]
  /src/external/bsd/unbound/dist/testcode/
unitslabhash.c 63 static testkey_type* newkey(int id) { function
85 testkey_type* k = newkey(12);
86 testkey_type* k2 = newkey(14);
113 testkey_type* key = newkey(numtoadd);
124 testkey_type* key = newkey(num);
135 testkey_type* key = newkey(num);
200 testkey_type* key = newkey(numtoadd);
212 testkey_type* key = newkey(num);
224 testkey_type* key = newkey(num);
unitlruhash.c 61 static testkey_type* newkey(int id) { function
83 testkey_type* k = newkey(12);
85 testkey_type* k2 = newkey(12 + 1024);
86 testkey_type* k3 = newkey(14);
87 testkey_type* k4 = newkey(12 + 1024*2);
164 testkey_type* k = newkey(12);
165 testkey_type* k2 = newkey(14);
211 testkey_type* k = newkey(12);
212 testkey_type* k2 = newkey(14);
239 testkey_type* key = newkey(numtoadd)
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
cmp_msg_test.c 66 static EVP_PKEY *newkey = NULL; variable
151 || !TEST_true(set1_newPkey(ctx, newkey))
167 if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey))
169 /* newkey used by default for signing does not match cert: */
194 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
208 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
227 || !TEST_true(set1_newPkey(ctx, newkey))
243 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
257 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))
272 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
cmp_msg_test.c 66 static EVP_PKEY *newkey = NULL; variable
155 || !TEST_true(set1_newPkey(ctx, newkey))
171 if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey))
173 /* newkey used by default for signing does not match cert: */
198 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
212 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
231 || !TEST_true(set1_newPkey(ctx, newkey))
247 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
261 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))
276 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/lib/
netpgp.c 1060 char *newkey; local
1076 key, &newkey,
1078 if (newkey) {
1079 printf("%s\n", newkey);
1080 free(newkey);
1140 char *newkey; local
1147 key, &newkey,
1149 netpgp_getvar(netpgp, "subkey sigs") != NULL) > 0) ? newkey : NULL;
1152 key, &newkey, "signature",
1154 netpgp_getvar(netpgp, "subkey sigs") != NULL) > 0) ? newkey : NULL
    [all...]
  /src/external/gpl3/gdb/dist/readline/readline/
readline.c 866 int r, newkey; local
904 newkey = _rl_to_lower ((unsigned char)key);
905 if (newkey != key)
906 return (_rl_dispatch (newkey, map));
1064 newkey = _rl_subseq_getchar (key);
1065 if (newkey < 0)
1071 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function);
1122 int newkey = _rl_to_lower ((unsigned char)key); local
1124 r = (newkey != key) ? _rl_dispatch (newkey, map) : 1
    [all...]
  /src/external/gpl3/gdb.old/dist/readline/readline/
readline.c 844 int r, newkey; local
1031 newkey = _rl_subseq_getchar (key);
1032 if (newkey < 0)
1038 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function);
  /src/external/mpl/dhcp/bind/dist/lib/dns/
keymgr.c 402 keymgr_keyid_conflict(dst_key_t *newkey, dns_dnsseckeylist_t *keys) {
403 uint16_t id = dst_key_id(newkey);
404 uint32_t rid = dst_key_rid(newkey);
405 uint32_t alg = dst_key_alg(newkey);
438 dst_key_t *newkey = NULL; local
449 &newkey, NULL));
452 conflict = keymgr_keyid_conflict(newkey, keylist);
454 conflict = keymgr_keyid_conflict(newkey, newkeys);
461 dst_key_id(newkey));
462 dst_key_free(&newkey);
1971 dns_dnsseckey_t *newkey = NULL; local
    [all...]
zone.c 10733 bool newkey = false; local
10836 newkey = true;
10879 if (!deletekey && !newkey) {
10892 newkey = true;
10920 if (deletekey || !newkey) {
10939 } else if (newkey) {
10969 INSIST(newkey || updatekey);
  /src/crypto/external/bsd/openssh/dist/
packet.c 2392 struct newkeys *newkey; local
2395 if ((newkey = ssh->state->newkeys[mode]) == NULL)
2397 enc = &newkey->enc;
2398 mac = &newkey->mac;
2399 comp = &newkey->comp;
2466 struct newkeys *newkey = NULL; local
2470 if ((newkey = calloc(1, sizeof(*newkey))) == NULL) {
2479 enc = &newkey->enc;
2480 mac = &newkey->mac
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
req.c 112 {"newkey", OPT_NEWKEY, 's', "Specify as type:bits"},
243 long newkey = -1; local
575 if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) {
576 newkey = DEFAULT_KEY_LENGTH;
580 genctx = set_keygen_ctx(keyalg, &pkey_type, &newkey,
586 if (newkey < MIN_KEY_LENGTH
590 MIN_KEY_LENGTH, newkey);
594 if (pkey_type == EVP_PKEY_RSA && newkey > OPENSSL_RSA_MAX_MODULUS_BITS)
598 OPENSSL_RSA_MAX_MODULUS_BITS, newkey);
601 if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BITS
    [all...]
  /src/external/gpl2/texinfo/dist/info/
session.c 4690 unsigned char newkey;
4692 newkey = info_get_another_input_char ();
4693 info_dispatch_on_key (newkey, (Keymap)map[key].function);
4677 unsigned char newkey; local
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-signzone.c 2693 dst_key_t *newkey = NULL; local
2697 DST_TYPE_PUBLIC | DST_TYPE_PRIVATE, mctx, &newkey);
2703 if (!dns_name_equal(gorigin, dst_key_name(newkey))) {
2707 if (!dst_key_isprivate(newkey)) {
2716 if (dst_key_id(key->key) == dst_key_id(newkey) &&
2717 dst_key_alg(key->key) == dst_key_alg(newkey))
2725 dns_dnsseckey_create(mctx, &newkey, &key);
2730 key->key = newkey;
  /src/external/mit/xorg/lib/libxcb/files/
xkb.h 1454 xcb_keycode_t newkey; member in struct:xcb_xkb_sa_redirect_key_t

Completed in 211 milliseconds