HomeSort by: relevance | last modified time | path
    Searched defs:tkey (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/external/bsd/ntp/dist/ntpd/
cmd_args.c 122 u_long tkey; local
125 tkey = (int)atol(p);
126 if (tkey == 0 || tkey > NTP_MAXKEY) {
131 authtrust(tkey, 1);
  /src/crypto/external/bsd/openssl.old/dist/crypto/cms/
cms_enc.c 30 unsigned char *tkey = NULL; local
92 tkey = OPENSSL_malloc(tkeylen);
93 if (tkey == NULL) {
97 if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0)
102 ec->key = tkey;
104 tkey = NULL;
126 ec->key = tkey;
128 tkey = NULL;
163 OPENSSL_clear_free(tkey, tkeylen);
  /src/external/mpl/bind/dist/tests/isc/
ht_test.c 215 unsigned char *tkey = NULL; local
219 isc_ht_iter_currentkey(iter, &tkey, &tksize);
224 assert_memory_equal(key, tkey, 16);
234 unsigned char *tkey = NULL; local
238 isc_ht_iter_currentkey(iter, &tkey, &tksize);
243 assert_memory_equal(key, tkey, 16);
258 unsigned char *tkey = NULL; local
262 isc_ht_iter_currentkey(iter, &tkey, &tksize);
267 assert_memory_equal(key, tkey, 16);
hashmap_test.c 268 const uint8_t *tkey = NULL; local
272 isc_hashmap_iter_currentkey(iter, &tkey);
279 assert_memory_equal(key, tkey, 16);
295 const uint8_t *tkey = NULL; local
299 isc_hashmap_iter_currentkey(iter, &tkey);
304 assert_memory_equal(key, tkey, 16);
326 const uint8_t *tkey = NULL; local
330 isc_hashmap_iter_currentkey(iter, &tkey);
335 assert_memory_equal(key, tkey, 16);
  /src/lib/libc/db/btree/
bt_put.c 73 DBT tkey, tdata; local
128 tkey.data = kb;
129 tkey.size = NOVFLSIZE;
134 key = &tkey;
  /src/crypto/external/apache2/openssl/dist/crypto/cms/
cms_enc.c 35 unsigned char *tkey = NULL; local
128 tkey = OPENSSL_malloc(tkeylen);
129 if (tkey == NULL)
131 if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0)
136 ec->key = tkey;
138 tkey = NULL;
158 ec->key = tkey;
160 tkey = NULL;
202 OPENSSL_clear_free(tkey, tkeylen);
  /src/crypto/external/bsd/openssl/dist/crypto/cms/
cms_enc.c 35 unsigned char *tkey = NULL; local
123 tkey = OPENSSL_malloc(tkeylen);
124 if (tkey == NULL) {
128 if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0)
133 ec->key = tkey;
135 tkey = NULL;
156 ec->key = tkey;
158 tkey = NULL;
200 OPENSSL_clear_free(tkey, tkeylen);
  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
tkey_249.c 16 /* draft-ietf-dnsext-tkey-01.txt */
365 dns_rdata_tkey_t *tkey = source; local
368 REQUIRE(tkey != NULL);
369 REQUIRE(tkey->common.rdtype == type);
370 REQUIRE(tkey->common.rdclass == rdclass);
378 RETERR(name_tobuffer(&tkey->algorithm, target));
383 RETERR(uint32_tobuffer(tkey->inception, target));
388 RETERR(uint32_tobuffer(tkey->expire, target));
393 RETERR(uint16_tobuffer(tkey->mode, target));
398 RETERR(uint16_tobuffer(tkey->error, target))
423 dns_rdata_tkey_t *tkey = target; local
498 dns_rdata_tkey_t *tkey = (dns_rdata_tkey_t *)source; local
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
tkey_249.c 16 /* draft-ietf-dnsext-tkey-01.txt */
364 dns_rdata_tkey_t *tkey = source; local
367 REQUIRE(tkey != NULL);
368 REQUIRE(tkey->common.rdtype == type);
369 REQUIRE(tkey->common.rdclass == rdclass);
377 RETERR(name_tobuffer(&tkey->algorithm, target));
382 RETERR(uint32_tobuffer(tkey->inception, target));
387 RETERR(uint32_tobuffer(tkey->expire, target));
392 RETERR(uint16_tobuffer(tkey->mode, target));
397 RETERR(uint16_tobuffer(tkey->error, target))
422 dns_rdata_tkey_t *tkey = target; local
515 dns_rdata_tkey_t *tkey = (dns_rdata_tkey_t *)source; local
    [all...]
  /src/external/bsd/jemalloc/dist/src/
ckh.c 135 const void *key, *data, *tkey, *tdata; local
158 tkey = cell->key; tdata = cell->data;
160 key = tkey; data = tdata;
  /src/external/bsd/jemalloc.old/dist/src/
ckh.c 136 const void *key, *data, *tkey, *tdata; local
159 tkey = cell->key; tdata = cell->data;
161 key = tkey; data = tdata;
  /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/
pk7_doit.c 410 unsigned char *ek = NULL, *tkey = NULL; local
606 tkey = OPENSSL_malloc(tkeylen);
607 if (tkey == NULL)
609 if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0)
612 ek = tkey;
614 tkey = NULL;
626 ek = tkey;
628 tkey = NULL;
638 OPENSSL_clear_free(tkey, tkeylen);
639 tkey = NULL
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/
pk7_doit.c 372 unsigned char *ek = NULL, *tkey = NULL; local
525 tkey = OPENSSL_malloc(tkeylen);
526 if (tkey == NULL)
528 if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0)
531 ek = tkey;
533 tkey = NULL;
545 ek = tkey;
547 tkey = NULL;
557 OPENSSL_clear_free(tkey, tkeylen);
558 tkey = NULL
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
tkey.c 1 /* $NetBSD: tkey.c,v 1.16 2026/01/29 18:37:50 christos Exp $ */
48 #include <dns/tkey.h>
179 * accept with tkey-gssapi-credential, or you have to
180 * configure a specific keytab (with tkey-gssapi-keytab) in
184 tkey_log("process_gsstkey(): no tkey-gssapi-credential "
185 "or tkey-gssapi-keytab configured");
276 * We found a TKEY to respond with. If the request is not TSIG signed,
330 * was not generated with TKEY and is in the config file, it may be
372 * Look for a TKEY record that matches the question.
377 tkey_log("dns_tkey_processquery: couldn't find a TKEY "
552 dns_rdata_tkey_t tkey; local
626 dns_rdata_tkey_t rtkey, qtkey, tkey; local
    [all...]
tsig.c 161 dns_tsigkey_t *tkey = node; local
163 return dns_name_equal(tkey->name, key);
172 rm_hashmap(dns_tsigkey_t *tkey) {
173 REQUIRE(VALID_TSIGKEY(tkey));
174 REQUIRE(VALID_TSIGKEYRING(tkey->ring));
176 (void)isc_hashmap_delete(tkey->ring->keys, dns_name_hash(tkey->name),
177 match_ptr, tkey);
178 dns_tsigkey_detach(&tkey);
182 rm_lru(dns_tsigkey_t *tkey) {
216 dns_tsigkey_t *tkey = NULL; local
304 dns_tsigkey_t *tkey = NULL; local
353 dns_tsigkey_t *tkey = NULL; local
458 dns_tsigkey_t *tkey = NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/
pk7_doit.c 452 unsigned char *ek = NULL, *tkey = NULL; local
649 tkey = OPENSSL_malloc(tkeylen);
650 if (tkey == NULL)
652 if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0)
655 ek = tkey;
657 tkey = NULL;
669 ek = tkey;
671 tkey = NULL;
681 OPENSSL_clear_free(tkey, tkeylen);
682 tkey = NULL
    [all...]
  /src/sys/crypto/aes/
aes_ct.c 393 uint32_t tkey[60]; local
402 tkey[0] = skey[4*num_rounds + 0];
403 tkey[1] = skey[4*num_rounds + 1];
404 tkey[2] = skey[4*num_rounds + 2];
405 tkey[3] = skey[4*num_rounds + 3];
417 tkey[4*(num_rounds - i) + 0] = q[2*0];
418 tkey[4*(num_rounds - i) + 1] = q[2*1];
419 tkey[4*(num_rounds - i) + 2] = q[2*2];
420 tkey[4*(num_rounds - i) + 3] = q[2*3];
422 tkey[4*num_rounds + 0] = skey[0]
    [all...]
aes_ct64.c 480 uint32_t tkey[60]; local
492 tkey[0] = skey[4*num_rounds + 0];
493 tkey[1] = skey[4*num_rounds + 1];
494 tkey[2] = skey[4*num_rounds + 2];
495 tkey[3] = skey[4*num_rounds + 3];
501 br_aes_ct64_interleave_out(&tkey[4*(num_rounds - i)],
504 tkey[4*num_rounds + 0] = skey[0];
505 tkey[4*num_rounds + 1] = skey[1];
506 tkey[4*num_rounds + 2] = skey[2];
507 tkey[4*num_rounds + 3] = skey[3]
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
krb5tgs.c 1221 Key *tkey; local
1317 ap_req.ticket.enc_part.etype, &tkey);
1346 &tkey->key,
  /src/external/gpl3/gcc.old/dist/gcc/d/
expr.cc 481 Type *tkey = tb2->isTypeAArray ()->index->toBasetype (); local
482 tree key = convert_expr (build_expr (e->e1), e->e1->type, tkey);
487 build_typeinfo (e, tkey),
1237 Type *tkey = tb1->isTypeAArray ()->index->toBasetype (); local
1238 tree key = convert_expr (build_expr (e->e2), e->e2->type, tkey);
1252 tinfo = build_typeinfo (e, tkey);
1475 Type *tkey = tb->isTypeAArray ()->index->toBasetype (); local
1476 tree index = convert_expr (build_expr (e->e2), e->e2->type, tkey);
1480 build_typeinfo (e, tkey),
  /src/external/mpl/bind/dist/lib/dns/include/dns/
message.h 263 unsigned int tkey : 1; /* 13 */ member in struct:dns_message
1275 * it was generated by an unsigned TKEY process
  /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/
message.h 238 unsigned int tkey : 1; member in struct:dns_message
1265 * it was generated by an unsigned TKEY process
  /src/external/mpl/dhcp/bind/dist/lib/dns/
tkey.c 1 /* $NetBSD: tkey.c,v 1.1 2024/02/18 20:57:34 christos Exp $ */
43 #include <dns/tkey.h>
369 tkey_log("process_dhtkey: tkey-dhkey not defined");
520 * accept with tkey-gssapi-credential, or you have to
521 * configure a specific keytab (with tkey-gssapi-keytab) in
525 tkey_log("process_gsstkey(): no tkey-gssapi-credential "
526 "or tkey-gssapi-keytab configured");
630 * We found a TKEY to respond with. If the request is not TSIG signed,
688 * was not generated with TKEY and is in the config file, it may be
731 * Look for a TKEY record that matches the question
1044 dns_rdata_tkey_t tkey; local
1120 dns_rdata_tkey_t tkey; local
1168 dns_rdata_tkey_t tkey; local
1493 dns_rdata_tkey_t rtkey, qtkey, tkey; local
    [all...]
tsig.c 182 remove_fromring(dns_tsigkey_t *tkey) {
183 if (tkey->generated) {
184 ISC_LIST_UNLINK(tkey->ring->lru, tkey, link);
185 tkey->ring->generated--;
187 (void)dns_rbt_deletename(tkey->ring->keys, &tkey->name, false);
191 adjust_lru(dns_tsigkey_t *tkey) {
192 if (tkey->generated) {
193 RWLOCK(&tkey->ring->lock, isc_rwlocktype_write)
253 dns_tsigkey_t *tkey; local
395 dns_tsigkey_t *tkey; local
607 dns_tsigkey_t *tkey; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
evp_extra_test.c 3167 EVP_PKEY *tkey = NULL; local
3181 if (!TEST_ptr(tkey = EVP_PKEY_new())
3182 || !TEST_true(EVP_PKEY_set_type(tkey, EVP_PKEY_RSA))
3183 || !TEST_ptr(ctx = EVP_PKEY_CTX_new(tkey, NULL)))
3196 EVP_PKEY_free(tkey);

Completed in 57 milliseconds

1 2