| /src/lib/libcurses/ |
| keyname.c | 48 * Return name of key or NULL; 51 keyname(int key) 58 if (key < 0) { 64 if (key == 0x100) { 70 if (key < 0x20) { 72 name[1] = (char) (key + 64); /* Offset of '@' */ 78 if (key < 0x7F) { 79 name[0] = (char) key; 84 /* Delete key */ 85 if (key == 0x7F) [all...] |
| /src/lib/libpthread/ |
| tss.c | 41 tss_create(tss_t *key, tss_dtor_t dtor) 44 _DIAGASSERT(key != NULL); 46 if (pthread_key_create(key, dtor) == 0) 53 tss_delete(tss_t key) 59 (void)pthread_key_delete(key); 63 tss_get(tss_t key) 66 return pthread_getspecific(key); 70 tss_set(tss_t key, void *val) 73 if (pthread_setspecific(key, val) == 0)
|
| /src/lib/libtelnet/ |
| encrypt.h | 67 #define VALIDKEY(key) ( key[0] | key[1] | key[2] | key[3] | \ 68 key[4] | key[5] | key[6] | key[7])
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| keydump.c | 17 * Dump the contents of a key file saved by e.g. srp-simple as a DNS key. 33 const char *key_name = "com.apple.srp-client.host-key"; 34 srp_key_t *key; local 36 key = srp_get_key(key_name, NULL); 37 if (key == NULL) { 38 if (key == NULL) { 39 printf("Unable to load key from %s.", key_name); 44 srp_print_key(key);
|
| /src/sys/crypto/skipjack/ |
| skipjack.h | 17 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key); 18 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key); 19 extern void subkey_table_gen(const u_int8_t *key, u_int8_t **key_tables);
|
| /src/sys/netipsec/ |
| key_var.h | 57 #define _KEYLEN(key) ((u_int)((key)->sadb_key_bits >> 3)) 58 #define _KEYBITS(key) ((u_int)((key)->sadb_key_bits)) 59 #define _KEYBUF(key) ((u_int8_t *)((u_int8_t*)(key) + sizeof(struct sadb_key)))
|
| /src/external/bsd/kyua-cli/dist/utils/config/ |
| keys.cpp | 39 /// Converts a key to its textual representation. 41 /// \param key The key to convert. 43 utils::config::detail::flatten_key(const tree_key& key) 45 PRE(!key.empty()); 46 return text::join(key, "."); 50 /// Parses and validates a textual key. 52 /// \param str The key to process in dotted notation. 54 /// \return The tokenized key if valid. 56 /// \throw invalid_key_error If the input key is empty or invalid for any othe 61 const tree_key key = text::split(str, '.'); local [all...] |
| /src/external/bsd/ppp/dist/pppd/ |
| crypto_ms.h | 50 * const unsigned char *key: 58 int DesEncrypt(const unsigned char *clear, const unsigned char *key, 68 * const unsigned char *key: 69 * A raw 7-byte array to be expanded to a 8-byte key with odd-parity 76 int DesDecrypt(const unsigned char *cipher, const unsigned char *key,
|
| /src/external/bsd/tmux/dist/ |
| input-keys.c | 28 * key code and translates it into something suitable to be sent to the 35 /* Entry in the key tree. */ 37 key_code key; member in struct:input_key_entry 53 { .key = KEYC_PASTE_START, 56 { .key = KEYC_PASTE_START|KEYC_IMPLIED_META, 59 { .key = KEYC_PASTE_END, 62 { .key = KEYC_PASTE_END|KEYC_IMPLIED_META, 67 { .key = KEYC_F1, 70 { .key = KEYC_F2, 73 { .key = KEYC_F3 375 key_code key; local [all...] |
| /src/external/gpl2/texinfo/dist/info/ |
| echo-area.h | 62 extern void ea_insert (WINDOW *window, int count, unsigned char key); 63 extern void ea_quoted_insert (WINDOW *window, int count, unsigned char key); 64 extern void ea_beg_of_line (WINDOW *window, int count, unsigned char key); 65 extern void ea_backward (WINDOW *window, int count, unsigned char key); 66 extern void ea_delete (WINDOW *window, int count, unsigned char key); 67 extern void ea_end_of_line (WINDOW *window, int count, unsigned char key); 68 extern void ea_forward (WINDOW *window, int count, unsigned char key); 69 extern void ea_abort (WINDOW *window, int count, unsigned char key); 70 extern void ea_rubout (WINDOW *window, int count, unsigned char key); 71 extern void ea_complete (WINDOW *window, int count, unsigned char key); [all...] |
| session.h | 38 void name (WINDOW *window, int count, unsigned char key) 66 extern void info_dispatch_on_key (unsigned char key, Keymap map); 121 extern void info_next_line (WINDOW *window, int count, unsigned char key); 122 extern void info_prev_line (WINDOW *window, int count, unsigned char key); 123 extern void info_end_of_line (WINDOW *window, int count, unsigned char key); 124 extern void info_beginning_of_line (WINDOW *window, int count, unsigned char key); 125 extern void info_forward_char (WINDOW *window, int count, unsigned char key); 126 extern void info_backward_char (WINDOW *window, int count, unsigned char key); 127 extern void info_forward_word (WINDOW *window, int count, unsigned char key); 128 extern void info_backward_word (WINDOW *window, int count, unsigned char key); [all...] |
| /src/external/apache2/llvm/dist/llvm/lib/Support/Unix/ |
| ThreadLocal.inc | 31 pthread_key_t* key = reinterpret_cast<pthread_key_t*>(&data); 32 int errorcode = pthread_key_create(key, nullptr); 38 pthread_key_t* key = reinterpret_cast<pthread_key_t*>(&data); 39 int errorcode = pthread_key_delete(*key); 45 pthread_key_t* key = reinterpret_cast<pthread_key_t*>(&data); 46 int errorcode = pthread_setspecific(*key, d); 52 pthread_key_t* key = reinterpret_cast<pthread_key_t*>(&data); 53 return pthread_getspecific(*key);
|
| /src/external/gpl3/gcc.old/dist/gcc/ |
| prefix.h | 30 /* Update PATH using KEY if PATH starts with PREFIX. The returned 33 extern char *update_path (const char *path, const char *key);
|
| /src/external/bsd/wpa/dist/src/tls/ |
| rsa.c | 18 int private_key; /* whether private key is set */ 55 * crypto_rsa_import_public_key - Import an RSA public key 56 * @buf: Key buffer (DER encoded RSA public key) 57 * @len: Key buffer length in bytes 58 * Returns: Pointer to the public key or %NULL on failure 63 struct crypto_rsa_key *key; local 67 key = os_zalloc(sizeof(*key)); 68 if (key == NULL 118 struct crypto_rsa_key *key; local 146 struct crypto_rsa_key *key; local [all...] |
| /src/sys/dev/fdt/ |
| gpiokeys.c | 57 /* Key and button events */ 162 struct gpiokeys_key *key; local 184 key = kmem_zalloc(sizeof(*key), KM_SLEEP); 185 key->key_sc = sc; 186 key->key_phandle = child; 187 key->key_code = code; 188 key->key_label = kmem_zalloc(len, KM_SLEEP); 189 if (OF_getprop(child, "label", key->key_label, len) != len) { 190 kmem_free(key->key_label, len) 282 struct gpiokeys_key *key; local 300 struct gpiokeys_key *key = priv; local [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
| asan_posix.cc | 51 tsd_key() : key(nullptr) {} 54 if (key) 55 (*tsd_destructor)(key); 57 void *key; member in struct:__asan::tsd_key 60 static thread_local struct tsd_key key; member in namespace:__asan 69 return key.key; 75 CHECK(!key.key); 76 key.key = tsd [all...] |
| /src/external/bsd/unbound/dist/sldns/ |
| keyraw.h | 2 * keyraw.h -- raw key and signature access and conversion 13 * raw key and signature access and conversion 33 * \param[in] keydata the raw key data 35 * \param[in] alg the cryptographic algorithm this is a key for 42 * Calculates keytag of DNSSEC key, operates on wireformat rdata. 43 * \param[in] key the key as uncompressed wireformat rdata. 44 * \param[in] keysize length of key data. 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize); 63 * \param[in] key the uncompressed wireformat of the key [all...] |
| /src/sys/crypto/aes/ |
| aes_keysched.c | 47 * aes_keysched_enc(rk, key, keybytes) 49 * Compute the standard AES encryption key schedule, expanding a 50 * 16-, 24-, or 32-byte key into 44, 52, or 60 32-bit round keys 51 * for encryption. Returns the number of rounds for the key of 55 aes_keysched_enc(uint32_t *rk, const void *key, size_t keybytes) 59 return br_aes_ct64_keysched_stdenc(rk, key, keybytes); 61 return br_aes_ct_keysched_stdenc(rk, key, keybytes); 66 * aes_keysched_dec(rk, key, keybytes) 68 * Compute the standard AES decryption key schedule, expanding a 69 * 16-, 24-, or 32-byte key into 44, 52, or 60 32-bit round key [all...] |
| /src/sys/dev/sysmon/ |
| sysmon_envsys_util.c | 46 sme_sensor_upbool(prop_dictionary_t dict, const char *key, bool val) 52 obj = prop_dictionary_get(dict, key); 55 if (!prop_dictionary_set_bool(dict, key, val)) { 57 __func__, key, val)); 62 if (!prop_dictionary_set_bool(dict, key, val)) { 64 __func__, key, val)); 73 sme_sensor_upint32(prop_dictionary_t dict, const char *key, int32_t val) 79 obj = prop_dictionary_get(dict, key); 82 if (!prop_dictionary_set_int32(dict, key, val)) { 84 __func__, key, val)) [all...] |
| /src/sys/external/isc/libsodium/dist/test/default/ |
| auth5.c | 5 static unsigned char key[32]; variable 15 crypto_auth_keygen(key); 17 crypto_auth(a, c, clen, key); 18 if (crypto_auth_verify(a, c, clen, key) != 0) { 24 if (crypto_auth_verify(a, c, clen, key) == 0) { 29 if (crypto_auth_verify(a, c, clen, key) == 0) {
|
| auth7.c | 5 static unsigned char key[32]; variable 15 crypto_auth_keygen(key); 17 crypto_auth_hmacsha512(a, c, clen, key); 18 if (crypto_auth_hmacsha512_verify(a, c, clen, key) != 0) { 24 if (crypto_auth_hmacsha512_verify(a, c, clen, key) == 0) { 29 if (crypto_auth_hmacsha512_verify(a, c, clen, key) == 0) {
|
| onetimeauth7.c | 5 static unsigned char key[32]; variable 15 crypto_onetimeauth_keygen(key); 17 crypto_onetimeauth(a, c, clen, key); 18 if (crypto_onetimeauth_verify(a, c, clen, key) != 0) { 24 if (crypto_onetimeauth_verify(a, c, clen, key) == 0) { 29 if (crypto_onetimeauth_verify(a, c, clen, key) == 0) {
|
| /src/sys/rump/librump/rumpkern/ |
| etfs_wrap.c | 39 rump_etfs_register(const char *key, const char *hostpath, 43 return rump__etfs_register(key, hostpath, ftype, 48 rump_etfs_register_withsize(const char *key, const char *hostpath, 52 return rump__etfs_register(key, hostpath, ftype, begin, size); 56 rump_etfs_remove(const char *key) 59 return rump__etfs_remove(key);
|
| /src/external/apache2/llvm/dist/llvm/utils/ |
| merge-stats.py | 26 for key in data: 27 if key in result: 28 result[key] += data[key] 30 result[key] = data[key]
|
| /src/external/bsd/ntp/dist/sntp/ |
| crypto.h | 20 struct key { struct 21 struct key * next; 29 extern int auth_init(const char *keyfile, struct key **keys); 30 extern void get_key(keyid_t key_id, struct key **d_key); 32 const struct key *cmp_key, void *digest, 35 size_t dig_len, const struct key *cmp_key);
|