| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| default_keys.c | 42 print_keys(krb5_context context, Key *keys, size_t nkeys) 50 for (i = 0; i < nkeys; i++) { 87 size_t nkeys; local 90 ret = hdb_generate_key_set(context, principal, NULL, 0, &keys, &nkeys, 95 print_keys(context, keys, nkeys); 97 hdb_free_keys(context, nkeys, keys);
|
| /src/crypto/external/bsd/openssh/dist/ |
| sshconnect.h | 33 int nkeys; member in struct:Sensitive
|
| ssh-pkcs11-helper.c | 67 int r, i, nkeys; local 79 if ((nkeys = pkcs11_add_provider(providername, pin, 83 (r = sshbuf_put_u32(msg, nkeys)) != 0) 85 for (i = 0; i < nkeys; i++) { 94 (r = sshbuf_put_u32(msg, -nkeys)) != 0)
|
| authfd.h | 25 size_t nkeys; member in struct:ssh_identitylist 35 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ member in struct:dest_constraint_hop
|
| ssh-pkcs11-client.c | 393 u_int ret = -1, nkeys, i; local 415 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) 416 fatal_fr(r, "parse nkeys"); 417 debug3_f("helper return %u keys", nkeys); 418 *keysp = xcalloc(nkeys, sizeof(struct sshkey *)); 420 *labelsp = xcalloc(nkeys, sizeof(char *)); 421 for (i = 0; i < nkeys; i++) { 437 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) 445 return ret == 0 ? (int)nkeys : -1;
|
| hostfile.c | 571 size_t nkeys; member in struct:host_delete_ctx 589 for (i = 0; i < ctx->nkeys; i++) { 621 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) 639 if ((ctx.match_keys = calloc(nkeys, sizeof(*ctx.match_keys))) == NULL) 642 ctx.nkeys = nkeys; 678 for (i = 0; i < nkeys; i++) {
|
| sshd-session.c | 543 u_int i, nkeys; local 553 for (i = nkeys = 0; i < options.num_host_key_files; i++) { 562 if (nkeys == 0) { 578 nkeys++; 580 debug3_f("sent %u hostkeys", nkeys); 581 if (nkeys == 0)
|
| ssh-pkcs11.c | 842 pkcs11_key_included(struct sshkey ***keysp, int *nkeys, struct sshkey *key) 846 for (i = 0; i < *nkeys; i++) 1409 * add 'wrapped' public keys to the 'keysp' array and increment nkeys. 1410 * keysp points to an (possibly empty) array with *nkeys keys. 1414 struct sshkey ***keysp, char ***labelsp, int *nkeys) 1483 if (pkcs11_key_included(keysp, nkeys, key)) { 1488 *keysp = xrecallocarray(*keysp, *nkeys, 1489 *nkeys + 1, sizeof(struct sshkey *)); 1490 (*keysp)[*nkeys] = key; 1492 *labelsp = xrecallocarray(*labelsp, *nkeys, 1836 int nkeys, need_finalize = 0; local 2032 int nkeys; local [all...] |
| ssh.c | 1735 sensitive_data.nkeys = 0; 1740 sensitive_data.nkeys = 10; 1741 sensitive_data.keys = xcalloc(sensitive_data.nkeys, 1746 if ((o) >= sensitive_data.nkeys) \ 1756 if ((o) >= sensitive_data.nkeys) \ 1834 if (sensitive_data.nkeys != 0) { 1835 for (i = 0; i < sensitive_data.nkeys; i++) { 2487 int nkeys; local 2504 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, 2506 for (i = 0; i < nkeys; i++) [all...] |
| clientloop.c | 2061 size_t nkeys, nnew, nincomplete; /* total, new keys, incomplete match */ member in struct:hostkeys_update_ctx 2085 for (i = 0; i < ctx->nkeys; i++) 2133 for (i = 0; i < ctx->nkeys; i++) { 2182 for (i = 0; i < ctx->nkeys; i++) { 2278 for (i = 0; i < ctx->nkeys; i++) { 2354 i == 0 ? ctx->keys : NULL, i == 0 ? ctx->nkeys : 0, 2394 for (ndone = i = 0; i < ctx->nkeys; i++) { 2519 for (i = 0; i < ctx->nkeys; i++) { 2527 if ((tmp = recallocarray(ctx->keys, ctx->nkeys, ctx->nkeys + 1 [all...] |
| /src/external/gpl2/groff/dist/src/include/ |
| search.h | 45 int nkeys; member in class:linear_searcher
|
| /src/games/arithmetic/ |
| arithmetic.c | 98 static int nkeys = sizeof(defaultkeys) - 1; variable 127 nkeys = p - optarg; 199 op = keys[random() % nkeys];
|
| /src/lib/libc/db/btree/ |
| bt_debug.c | 306 unsigned long ifree, lfree, nkeys; local 313 nkeys = ifree = lfree = 0; 326 nkeys += NEXTINDEX(h); 351 levels, levels == 1 ? "" : "s", nkeys);
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| collector.c | 292 size_t i, nkeys; local 296 for (i = 0, nkeys = 0; i < c->val.len; i++) 298 nkeys++; 300 *keys = calloc(nkeys + 1, sizeof(**keys)); 306 for (i = 0, nkeys = 0; i < c->val.len; i++) { 308 (*keys)[nkeys++] = c->val.data[i]->private_key; 312 (*keys)[nkeys] = NULL;
|
| /src/lib/libpam/modules/pam_ssh/ |
| pam_ssh.c | 171 int nkeys, nullok, pam_err, pass; local 189 nkeys = 0; 209 ++nkeys; 221 if (nkeys == 0 && pass == 1 && 229 if (nkeys == 0)
|
| /src/sys/dev/hid/ |
| hidkbd.c | 482 int nkeys, i, j; local 484 #define ADDKEY(c) ibuf[nkeys++] = (c) 514 nkeys = 0; 555 if (nkeys == 0) 560 memcpy(kbd->sc_pollchars, ibuf, nkeys * sizeof(u_int16_t)); 561 kbd->sc_npollchar = nkeys; 573 for (i = j = 0; i < nkeys; i++) { 594 for (i = 0; i < nkeys; i++) { 619 for (i = 0; i < nkeys; i++) {
|
| /src/external/mpl/bind/dist/tests/dns/ |
| sigs_test.c | 197 dns_db_t *db, dst_key_t *zone_keys[], unsigned int nkeys, 245 result = dns__zone_updatesigs(&raw_diff, db, version, zone_keys, nkeys, 297 unsigned int nkeys; local 318 zone_keys, &nkeys); 320 assert_int_equal(nkeys, 2); 428 updatesigs_test(tests[i], zone, db, zone_keys, nkeys, now); 434 for (i = 0; i < nkeys; i++) {
|
| /src/sys/dev/bluetooth/ |
| btkbd.c | 468 #define ADDKEY(c) ibuf[nkeys++] = (c) 479 int nkeys, i, j; local 499 nkeys = 0; 544 if (nkeys == 0) 555 for (i = j = 0 ; i < nkeys ; i++) { 595 for (i = 0 ; i < nkeys ; i++) {
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/smbk5pwd/ |
| smbk5pwd.c | 372 size_t nkeys; local 404 qpw->rs_new.bv_val, &ent.keys.val, &nkeys); 405 ent.keys.len = nkeys;
|
| /src/lib/libc/db/hash/ |
| hash.h | 84 int32_t nkeys; /* Number of keys in hash table */ member in struct:hashhdr 293 #define NKEYS hdr.nkeys
|
| /src/sys/dev/usb/ |
| ukbd.c | 779 int nkeys, i; local 785 KASSERT(nkeys < MAXKEYS); \ 786 ibuf[nkeys++] = (c); \ 823 nkeys = 0; 840 if (nkeys == 0) 845 memcpy(sc->sc_pollchars, ibuf, nkeys * sizeof(uint16_t)); 846 sc->sc_npollchar = nkeys; 857 for (i = j = 0; i < nkeys; i++) { 904 for (i = 0; i < nkeys; i++) {
|
| /src/external/bsd/ntp/dist/util/ |
| ntp-keygen.c | 170 int nkeys; /* MV keys */ variable 415 nkeys = OPT_VALUE_MV_PARAMS; 419 nkeys = OPT_VALUE_MV_KEYS; 1595 n = nkeys;
|
| /src/external/mpl/bind/dist/lib/dns/ |
| update.c | 944 dst_key_t **keys, unsigned int *nkeys) { 967 *nkeys = 0; 992 *nkeys = count; 1002 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, 1046 for (i = 0; i < nkeys; i++) { 1116 keys, nkeys, i, false, KSK(keys[i]), 1193 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys) { 1227 for (i = 0; i < nkeys; i++) { 1273 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, 1325 nkeys, now, inception, expire) 1372 unsigned int nkeys; member in struct:dns_update_state [all...] |
| zoneverify.c | 176 dst_key_t **dstkeys, size_t nkeys, dns_rdataset_t *rdataset) { 183 for (size_t key = 0; key < nkeys; key++) { 812 dns_dbnode_t *node, dst_key_t **dstkeys, size_t nkeys) { 877 if (goodsig(vctx, &rdata, name, dstkeys, nkeys, rdataset)) { 915 bool delegation, dst_key_t **dstkeys, size_t nkeys, 949 nkeys); 1704 size_t count, nkeys = 0; local 1724 dstkeys[nkeys] = NULL; 1726 vctx->mctx, &dstkeys[nkeys]); 1728 nkeys++ [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| zoneverify.c | 177 dst_key_t **dstkeys, size_t nkeys, dns_rdataset_t *rdataset) { 184 for (size_t key = 0; key < nkeys; key++) { 812 dns_dbnode_t *node, dst_key_t **dstkeys, size_t nkeys) { 877 if (goodsig(vctx, &rdata, name, dstkeys, nkeys, rdataset)) { 915 bool delegation, dst_key_t **dstkeys, size_t nkeys, 950 nkeys); 1703 size_t count, nkeys = 0; local 1723 dstkeys[nkeys] = NULL; 1725 vctx->mctx, &dstkeys[nkeys]); 1727 nkeys++ [all...] |