| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| random_password.c | 60 OtpKey newkey; local 62 krb5_generate_random_block(&newkey, sizeof(newkey)); 63 otp_print_stddict (newkey, pw, len);
|
| /src/external/mpl/bind/dist/lib/dns/ |
| keystore.c | 196 dst_key_t *newkey = NULL; local 243 mctx, &newkey, NULL); 260 mctx, &newkey, NULL); 264 *dstkey = newkey;
|
| keymgr.c | 458 keymgr_keyid_conflict(dst_key_t *newkey, uint16_t min, uint16_t max, 460 uint16_t id = dst_key_id(newkey); 461 uint32_t rid = dst_key_rid(newkey); 462 uint32_t alg = dst_key_alg(newkey); 503 dst_key_t *newkey = NULL; local 529 NULL, mctx, &newkey, NULL)); 533 rdclass, mctx, alg, size, flags, &newkey)); 537 conflict = keymgr_keyid_conflict(newkey, kkey->tag_min, 541 newkey, kkey->tag_min, kkey->tag_max, &keykeys); 545 newkey, kkey->tag_min, kkey->tag_max, newkeys) 2215 dns_dnsseckey_t *newkey = NULL; local [all...] |
| zone.c | 10698 bool newkey = false; local 10801 newkey = true; 10844 if (!deletekey && !newkey) { 10857 newkey = true; 10885 if (deletekey || !newkey) { 10904 } else if (newkey) { 10934 INSIST(newkey || updatekey);
|
| /src/external/bsd/tmux/dist/ |
| input-keys.c | 583 key_code newkey; local 599 newkey = options_get_number(global_options, "backspace"); 601 key, newkey); 604 if ((newkey & KEYC_MASK_MODIFIERS) == 0) 605 ud.data[0] = newkey; 606 else if ((newkey & KEYC_MASK_MODIFIERS) == KEYC_CTRL) { 607 newkey &= KEYC_MASK_KEY; 608 if (newkey == '?') 610 else if (newkey >= '@' && newkey <= '_' [all...] |
| /src/external/bsd/unbound/dist/testcode/ |
| unitslabhash.c | 63 static testkey_type* newkey(int id) { function 85 testkey_type* k = newkey(12); 86 testkey_type* k2 = newkey(14); 113 testkey_type* key = newkey(numtoadd); 124 testkey_type* key = newkey(num); 135 testkey_type* key = newkey(num); 200 testkey_type* key = newkey(numtoadd); 212 testkey_type* key = newkey(num); 224 testkey_type* key = newkey(num);
|
| unitlruhash.c | 61 static testkey_type* newkey(int id) { function 83 testkey_type* k = newkey(12); 85 testkey_type* k2 = newkey(12 + 1024); 86 testkey_type* k3 = newkey(14); 87 testkey_type* k4 = newkey(12 + 1024*2); 164 testkey_type* k = newkey(12); 165 testkey_type* k2 = newkey(14); 211 testkey_type* k = newkey(12); 212 testkey_type* k2 = newkey(14); 239 testkey_type* key = newkey(numtoadd) [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| cmp_msg_test.c | 66 static EVP_PKEY *newkey = NULL; variable 151 || !TEST_true(set1_newPkey(ctx, newkey)) 167 if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey)) 169 /* newkey used by default for signing does not match cert: */ 194 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { 208 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { 227 || !TEST_true(set1_newPkey(ctx, newkey)) 243 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { 257 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey)) 272 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| cmp_msg_test.c | 66 static EVP_PKEY *newkey = NULL; variable 155 || !TEST_true(set1_newPkey(ctx, newkey)) 171 if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey)) 173 /* newkey used by default for signing does not match cert: */ 198 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { 212 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { 231 || !TEST_true(set1_newPkey(ctx, newkey)) 247 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { 261 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey)) 276 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| netpgp.c | 1060 char *newkey; local 1076 key, &newkey, 1078 if (newkey) { 1079 printf("%s\n", newkey); 1080 free(newkey); 1140 char *newkey; local 1147 key, &newkey, 1149 netpgp_getvar(netpgp, "subkey sigs") != NULL) > 0) ? newkey : NULL; 1152 key, &newkey, "signature", 1154 netpgp_getvar(netpgp, "subkey sigs") != NULL) > 0) ? newkey : NULL [all...] |
| /src/external/gpl3/gdb/dist/readline/readline/ |
| readline.c | 866 int r, newkey; local 904 newkey = _rl_to_lower ((unsigned char)key); 905 if (newkey != key) 906 return (_rl_dispatch (newkey, map)); 1064 newkey = _rl_subseq_getchar (key); 1065 if (newkey < 0) 1071 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function); 1122 int newkey = _rl_to_lower ((unsigned char)key); local 1124 r = (newkey != key) ? _rl_dispatch (newkey, map) : 1 [all...] |
| /src/external/gpl3/gdb.old/dist/readline/readline/ |
| readline.c | 844 int r, newkey; local 1031 newkey = _rl_subseq_getchar (key); 1032 if (newkey < 0) 1038 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function);
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| keymgr.c | 402 keymgr_keyid_conflict(dst_key_t *newkey, dns_dnsseckeylist_t *keys) { 403 uint16_t id = dst_key_id(newkey); 404 uint32_t rid = dst_key_rid(newkey); 405 uint32_t alg = dst_key_alg(newkey); 438 dst_key_t *newkey = NULL; local 449 &newkey, NULL)); 452 conflict = keymgr_keyid_conflict(newkey, keylist); 454 conflict = keymgr_keyid_conflict(newkey, newkeys); 461 dst_key_id(newkey)); 462 dst_key_free(&newkey); 1971 dns_dnsseckey_t *newkey = NULL; local [all...] |
| zone.c | 10733 bool newkey = false; local 10836 newkey = true; 10879 if (!deletekey && !newkey) { 10892 newkey = true; 10920 if (deletekey || !newkey) { 10939 } else if (newkey) { 10969 INSIST(newkey || updatekey);
|
| /src/crypto/external/bsd/openssh/dist/ |
| packet.c | 2392 struct newkeys *newkey; local 2395 if ((newkey = ssh->state->newkeys[mode]) == NULL) 2397 enc = &newkey->enc; 2398 mac = &newkey->mac; 2399 comp = &newkey->comp; 2466 struct newkeys *newkey = NULL; local 2470 if ((newkey = calloc(1, sizeof(*newkey))) == NULL) { 2479 enc = &newkey->enc; 2480 mac = &newkey->mac [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| req.c | 112 {"newkey", OPT_NEWKEY, 's', "Specify as type:bits"}, 243 long newkey = -1; local 575 if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) { 576 newkey = DEFAULT_KEY_LENGTH; 580 genctx = set_keygen_ctx(keyalg, &pkey_type, &newkey, 586 if (newkey < MIN_KEY_LENGTH 590 MIN_KEY_LENGTH, newkey); 594 if (pkey_type == EVP_PKEY_RSA && newkey > OPENSSL_RSA_MAX_MODULUS_BITS) 598 OPENSSL_RSA_MAX_MODULUS_BITS, newkey); 601 if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BITS [all...] |
| /src/external/gpl2/texinfo/dist/info/ |
| session.c | 4690 unsigned char newkey; 4692 newkey = info_get_another_input_char (); 4693 info_dispatch_on_key (newkey, (Keymap)map[key].function); 4677 unsigned char newkey; local
|
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-signzone.c | 2693 dst_key_t *newkey = NULL; local 2697 DST_TYPE_PUBLIC | DST_TYPE_PRIVATE, mctx, &newkey); 2703 if (!dns_name_equal(gorigin, dst_key_name(newkey))) { 2707 if (!dst_key_isprivate(newkey)) { 2716 if (dst_key_id(key->key) == dst_key_id(newkey) && 2717 dst_key_alg(key->key) == dst_key_alg(newkey)) 2725 dns_dnsseckey_create(mctx, &newkey, &key); 2730 key->key = newkey;
|
| /src/external/mit/xorg/lib/libxcb/files/ |
| xkb.h | 1454 xcb_keycode_t newkey; member in struct:xcb_xkb_sa_redirect_key_t
|