| /src/external/bsd/ntp/dist/ntpd/ |
| cmd_args.c | 122 u_long tkey; local 125 tkey = (int)atol(p); 126 if (tkey == 0 || tkey > NTP_MAXKEY) { 131 authtrust(tkey, 1);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_enc.c | 30 unsigned char *tkey = NULL; local 92 tkey = OPENSSL_malloc(tkeylen); 93 if (tkey == NULL) { 97 if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0) 102 ec->key = tkey; 104 tkey = NULL; 126 ec->key = tkey; 128 tkey = NULL; 163 OPENSSL_clear_free(tkey, tkeylen);
|
| /src/external/mpl/bind/dist/tests/isc/ |
| ht_test.c | 215 unsigned char *tkey = NULL; local 219 isc_ht_iter_currentkey(iter, &tkey, &tksize); 224 assert_memory_equal(key, tkey, 16); 234 unsigned char *tkey = NULL; local 238 isc_ht_iter_currentkey(iter, &tkey, &tksize); 243 assert_memory_equal(key, tkey, 16); 258 unsigned char *tkey = NULL; local 262 isc_ht_iter_currentkey(iter, &tkey, &tksize); 267 assert_memory_equal(key, tkey, 16);
|
| hashmap_test.c | 268 const uint8_t *tkey = NULL; local 272 isc_hashmap_iter_currentkey(iter, &tkey); 279 assert_memory_equal(key, tkey, 16); 295 const uint8_t *tkey = NULL; local 299 isc_hashmap_iter_currentkey(iter, &tkey); 304 assert_memory_equal(key, tkey, 16); 326 const uint8_t *tkey = NULL; local 330 isc_hashmap_iter_currentkey(iter, &tkey); 335 assert_memory_equal(key, tkey, 16);
|
| /src/lib/libc/db/btree/ |
| bt_put.c | 73 DBT tkey, tdata; local 128 tkey.data = kb; 129 tkey.size = NOVFLSIZE; 134 key = &tkey;
|
| /src/crypto/external/apache2/openssl/dist/crypto/cms/ |
| cms_enc.c | 35 unsigned char *tkey = NULL; local 128 tkey = OPENSSL_malloc(tkeylen); 129 if (tkey == NULL) 131 if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0) 136 ec->key = tkey; 138 tkey = NULL; 158 ec->key = tkey; 160 tkey = NULL; 202 OPENSSL_clear_free(tkey, tkeylen);
|
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_enc.c | 35 unsigned char *tkey = NULL; local 123 tkey = OPENSSL_malloc(tkeylen); 124 if (tkey == NULL) { 128 if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0) 133 ec->key = tkey; 135 tkey = NULL; 156 ec->key = tkey; 158 tkey = NULL; 200 OPENSSL_clear_free(tkey, tkeylen);
|
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| tkey_249.c | 16 /* draft-ietf-dnsext-tkey-01.txt */ 365 dns_rdata_tkey_t *tkey = source; local 368 REQUIRE(tkey != NULL); 369 REQUIRE(tkey->common.rdtype == type); 370 REQUIRE(tkey->common.rdclass == rdclass); 378 RETERR(name_tobuffer(&tkey->algorithm, target)); 383 RETERR(uint32_tobuffer(tkey->inception, target)); 388 RETERR(uint32_tobuffer(tkey->expire, target)); 393 RETERR(uint16_tobuffer(tkey->mode, target)); 398 RETERR(uint16_tobuffer(tkey->error, target)) 423 dns_rdata_tkey_t *tkey = target; local 498 dns_rdata_tkey_t *tkey = (dns_rdata_tkey_t *)source; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| tkey_249.c | 16 /* draft-ietf-dnsext-tkey-01.txt */ 364 dns_rdata_tkey_t *tkey = source; local 367 REQUIRE(tkey != NULL); 368 REQUIRE(tkey->common.rdtype == type); 369 REQUIRE(tkey->common.rdclass == rdclass); 377 RETERR(name_tobuffer(&tkey->algorithm, target)); 382 RETERR(uint32_tobuffer(tkey->inception, target)); 387 RETERR(uint32_tobuffer(tkey->expire, target)); 392 RETERR(uint16_tobuffer(tkey->mode, target)); 397 RETERR(uint16_tobuffer(tkey->error, target)) 422 dns_rdata_tkey_t *tkey = target; local 515 dns_rdata_tkey_t *tkey = (dns_rdata_tkey_t *)source; local [all...] |
| /src/external/bsd/jemalloc/dist/src/ |
| ckh.c | 135 const void *key, *data, *tkey, *tdata; local 158 tkey = cell->key; tdata = cell->data; 160 key = tkey; data = tdata;
|
| /src/external/bsd/jemalloc.old/dist/src/ |
| ckh.c | 136 const void *key, *data, *tkey, *tdata; local 159 tkey = cell->key; tdata = cell->data; 161 key = tkey; data = tdata;
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
| pk7_doit.c | 410 unsigned char *ek = NULL, *tkey = NULL; local 606 tkey = OPENSSL_malloc(tkeylen); 607 if (tkey == NULL) 609 if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0) 612 ek = tkey; 614 tkey = NULL; 626 ek = tkey; 628 tkey = NULL; 638 OPENSSL_clear_free(tkey, tkeylen); 639 tkey = NULL [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/ |
| pk7_doit.c | 372 unsigned char *ek = NULL, *tkey = NULL; local 525 tkey = OPENSSL_malloc(tkeylen); 526 if (tkey == NULL) 528 if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0) 531 ek = tkey; 533 tkey = NULL; 545 ek = tkey; 547 tkey = NULL; 557 OPENSSL_clear_free(tkey, tkeylen); 558 tkey = NULL [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| tkey.c | 1 /* $NetBSD: tkey.c,v 1.16 2026/01/29 18:37:50 christos Exp $ */ 48 #include <dns/tkey.h> 179 * accept with tkey-gssapi-credential, or you have to 180 * configure a specific keytab (with tkey-gssapi-keytab) in 184 tkey_log("process_gsstkey(): no tkey-gssapi-credential " 185 "or tkey-gssapi-keytab configured"); 276 * We found a TKEY to respond with. If the request is not TSIG signed, 330 * was not generated with TKEY and is in the config file, it may be 372 * Look for a TKEY record that matches the question. 377 tkey_log("dns_tkey_processquery: couldn't find a TKEY " 552 dns_rdata_tkey_t tkey; local 626 dns_rdata_tkey_t rtkey, qtkey, tkey; local [all...] |
| tsig.c | 161 dns_tsigkey_t *tkey = node; local 163 return dns_name_equal(tkey->name, key); 172 rm_hashmap(dns_tsigkey_t *tkey) { 173 REQUIRE(VALID_TSIGKEY(tkey)); 174 REQUIRE(VALID_TSIGKEYRING(tkey->ring)); 176 (void)isc_hashmap_delete(tkey->ring->keys, dns_name_hash(tkey->name), 177 match_ptr, tkey); 178 dns_tsigkey_detach(&tkey); 182 rm_lru(dns_tsigkey_t *tkey) { 216 dns_tsigkey_t *tkey = NULL; local 304 dns_tsigkey_t *tkey = NULL; local 353 dns_tsigkey_t *tkey = NULL; local 458 dns_tsigkey_t *tkey = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/ |
| pk7_doit.c | 452 unsigned char *ek = NULL, *tkey = NULL; local 649 tkey = OPENSSL_malloc(tkeylen); 650 if (tkey == NULL) 652 if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0) 655 ek = tkey; 657 tkey = NULL; 669 ek = tkey; 671 tkey = NULL; 681 OPENSSL_clear_free(tkey, tkeylen); 682 tkey = NULL [all...] |
| /src/sys/crypto/aes/ |
| aes_ct.c | 393 uint32_t tkey[60]; local 402 tkey[0] = skey[4*num_rounds + 0]; 403 tkey[1] = skey[4*num_rounds + 1]; 404 tkey[2] = skey[4*num_rounds + 2]; 405 tkey[3] = skey[4*num_rounds + 3]; 417 tkey[4*(num_rounds - i) + 0] = q[2*0]; 418 tkey[4*(num_rounds - i) + 1] = q[2*1]; 419 tkey[4*(num_rounds - i) + 2] = q[2*2]; 420 tkey[4*(num_rounds - i) + 3] = q[2*3]; 422 tkey[4*num_rounds + 0] = skey[0] [all...] |
| aes_ct64.c | 480 uint32_t tkey[60]; local 492 tkey[0] = skey[4*num_rounds + 0]; 493 tkey[1] = skey[4*num_rounds + 1]; 494 tkey[2] = skey[4*num_rounds + 2]; 495 tkey[3] = skey[4*num_rounds + 3]; 501 br_aes_ct64_interleave_out(&tkey[4*(num_rounds - i)], 504 tkey[4*num_rounds + 0] = skey[0]; 505 tkey[4*num_rounds + 1] = skey[1]; 506 tkey[4*num_rounds + 2] = skey[2]; 507 tkey[4*num_rounds + 3] = skey[3] [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| krb5tgs.c | 1221 Key *tkey; local 1317 ap_req.ticket.enc_part.etype, &tkey); 1346 &tkey->key,
|
| /src/external/gpl3/gcc.old/dist/gcc/d/ |
| expr.cc | 481 Type *tkey = tb2->isTypeAArray ()->index->toBasetype (); local 482 tree key = convert_expr (build_expr (e->e1), e->e1->type, tkey); 487 build_typeinfo (e, tkey), 1237 Type *tkey = tb1->isTypeAArray ()->index->toBasetype (); local 1238 tree key = convert_expr (build_expr (e->e2), e->e2->type, tkey); 1252 tinfo = build_typeinfo (e, tkey); 1475 Type *tkey = tb->isTypeAArray ()->index->toBasetype (); local 1476 tree index = convert_expr (build_expr (e->e2), e->e2->type, tkey); 1480 build_typeinfo (e, tkey),
|
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| message.h | 263 unsigned int tkey : 1; /* 13 */ member in struct:dns_message 1275 * it was generated by an unsigned TKEY process
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| message.h | 238 unsigned int tkey : 1; member in struct:dns_message 1265 * it was generated by an unsigned TKEY process
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| tkey.c | 1 /* $NetBSD: tkey.c,v 1.1 2024/02/18 20:57:34 christos Exp $ */ 43 #include <dns/tkey.h> 369 tkey_log("process_dhtkey: tkey-dhkey not defined"); 520 * accept with tkey-gssapi-credential, or you have to 521 * configure a specific keytab (with tkey-gssapi-keytab) in 525 tkey_log("process_gsstkey(): no tkey-gssapi-credential " 526 "or tkey-gssapi-keytab configured"); 630 * We found a TKEY to respond with. If the request is not TSIG signed, 688 * was not generated with TKEY and is in the config file, it may be 731 * Look for a TKEY record that matches the question 1044 dns_rdata_tkey_t tkey; local 1120 dns_rdata_tkey_t tkey; local 1168 dns_rdata_tkey_t tkey; local 1493 dns_rdata_tkey_t rtkey, qtkey, tkey; local [all...] |
| tsig.c | 182 remove_fromring(dns_tsigkey_t *tkey) { 183 if (tkey->generated) { 184 ISC_LIST_UNLINK(tkey->ring->lru, tkey, link); 185 tkey->ring->generated--; 187 (void)dns_rbt_deletename(tkey->ring->keys, &tkey->name, false); 191 adjust_lru(dns_tsigkey_t *tkey) { 192 if (tkey->generated) { 193 RWLOCK(&tkey->ring->lock, isc_rwlocktype_write) 253 dns_tsigkey_t *tkey; local 395 dns_tsigkey_t *tkey; local 607 dns_tsigkey_t *tkey; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_extra_test.c | 3167 EVP_PKEY *tkey = NULL; local 3181 if (!TEST_ptr(tkey = EVP_PKEY_new()) 3182 || !TEST_true(EVP_PKEY_set_type(tkey, EVP_PKEY_RSA)) 3183 || !TEST_ptr(ctx = EVP_PKEY_CTX_new(tkey, NULL))) 3196 EVP_PKEY_free(tkey);
|