| /src/external/mpl/bind/dist/bin/tests/system/dnssec-malformed-dnskey/ns2/ |
| trusted.conf.j2 | 15 example. static-key 257 3 14 "@ksk_public_key@"; 18 * The key tag in the trust anchor must match that of the revoked 19 * truncated self-signed key in the truncated.selfsigned. zone. 22 * key doesn't have the revoked bit here and that flag is part of the 23 * key tag. The following decodes to key tag 33167, which is the same 24 * as the revoked truncated key in the zone file. 26 truncated.selfsigned. static-key 257 3 14 "fYA=";
|
| /src/external/mpl/bind/dist/bin/tests/system/dnssec-malformed-dnskey/ns3/ |
| trusted.conf.j2 | 15 example. static-key 257 3 14 "@ksk_public_key@"; 18 * The key tag in the trust anchor must match that of the revoked 19 * truncated self-signed key in the truncated.selfsigned. zone. 22 * key doesn't have the revoked bit here and that flag is part of the 23 * key tag. The following decodes to key tag 33167, which is the same 24 * as the revoked truncated key in the zone file. 26 truncated.selfsigned. static-key 257 3 14 "fYA=";
|
| /src/external/mpl/bind/dist/bin/tests/system/rndc/ns2/ |
| secondkey.conf.j2 | 15 default-key "secondkey"; 18 key secondkey {
|
| /src/crypto/external/bsd/heimdal/dist/lib/otp/ |
| otp_print.c | 46 otp_checksum (OtpKey key) 52 sum += ((key[i] >> 0) & 0x03) 53 + ((key[i] >> 2) & 0x03) 54 + ((key[i] >> 4) & 0x03) 55 + ((key[i] >> 6) & 0x03); 61 otp_print_stddict (OtpKey key, char *str, size_t sz) 65 sum = otp_checksum (key); 68 std_dict[(key[0] << 3) | (key[1] >> 5)], 69 std_dict[((key[1] & 0x1F) << 6) | (key[2] >> 2)] [all...] |
| otp_md.h | 38 int otp_md4_init (OtpKey key, const char *pwd, const char *seed); 40 int otp_md4_next (OtpKey key); 42 int otp_md5_init (OtpKey key, const char *pwd, const char *seed); 44 int otp_md5_next (OtpKey key); 46 int otp_sha_init (OtpKey key, const char *pwd, const char *seed); 48 int otp_sha_next (OtpKey key);
|
| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-tsig.conf.j2 | 15 key "badtsig" {
|
| bad-kasp-keydir1.conf.j2 | 16 * may not have the same key-directory. 20 key "keyforview1" { 25 key "keyforview2" { 31 match-clients { key "keyforview1"; }; 36 key-directory "."; 42 match-clients { key "keyforview2"; }; 47 key-directory ".";
|
| /src/external/ibm-public/postfix/dist/src/postconf/ |
| extract.awk | 109 for (key in int_vars) 110 print key 114 for (key in str_vars) 115 print key 119 for (key in str_fn_vars) 120 print key 124 for (key in raw_vars) 125 print key 129 for (key in bool_vars) 130 print key [all...] |
| /src/external/mit/libcbor/dist/docs/doxygen/search/ |
| all_8.js | 3 ['key',['key',['../structcbor__pair.html#a5122c22ad7ef32b2c6ae0a413caca7a1',1,'cbor_pair']]]
|
| variables_8.js | 3 ['key',['key',['../structcbor__pair.html#a5122c22ad7ef32b2c6ae0a413caca7a1',1,'cbor_pair']]]
|
| /src/external/mpl/bind/dist/bin/tests/system/dlzexternal/ |
| setup.sh | 16 $TSIGKEYGEN ddns-key.example.nil >ns1/ddns.key
|
| /src/external/mpl/bind/dist/bin/tests/system/statschannel/ |
| server-json.pl | 24 foreach $key (keys %{$ref->{opcodes}}) { 25 print "opcode " . $key . ": " . $ref->{opcodes}->{$key} . "\n"; 27 foreach $key (keys %{$ref->{rcodes}}) { 28 print "rcode " . $key . ": " . $ref->{rcodes}->{$key} . "\n"; 30 foreach $key (keys %{$ref->{qtypes}}) { 31 print "qtype " . $key . ": " . $ref->{qtypes}->{$key} . "\n"; 33 foreach $key (keys %{$ref->{nsstats}}) [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/tsig/ns1/ |
| named-md5.conf.j2 | 14 key "md5" { 19 key "md5-trunc" { 24 key "hmac-md5-legacy" {
|
| /src/crypto/external/apache2/openssl/dist/crypto/slh_dsa/ |
| slh_dsa_key.h | 13 #define SLH_DSA_SK_SEED(key) ((key)->priv) 14 #define SLH_DSA_SK_PRF(key) ((key)->priv + (key)->params->n) 15 #define SLH_DSA_PK_SEED(key) ((key)->priv + (key)->params->n * 2) 16 #define SLH_DSA_PK_ROOT(key) ((key)->priv + (key)->params->n * 3 [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/camellia/ |
| cmll_misc.c | 21 CAMELLIA_KEY *key) 23 if (!userKey || !key) 27 key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key); 32 const CAMELLIA_KEY *key) 34 Camellia_EncryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out); 38 const CAMELLIA_KEY *key) 40 Camellia_DecryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out) [all...] |
| cmll_ecb.c | 20 const CAMELLIA_KEY *key, const int enc) 23 Camellia_encrypt(in, out, key); 25 Camellia_decrypt(in, out, key);
|
| /src/crypto/external/bsd/openssl/dist/crypto/camellia/ |
| cmll_misc.c | 21 CAMELLIA_KEY *key) 23 if (!userKey || !key) 27 key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key); 32 const CAMELLIA_KEY *key) 34 Camellia_EncryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out); 38 const CAMELLIA_KEY *key) 40 Camellia_DecryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out) [all...] |
| cmll_ecb.c | 20 const CAMELLIA_KEY *key, const int enc) 23 Camellia_encrypt(in, out, key); 25 Camellia_decrypt(in, out, key);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/camellia/ |
| cmll_misc.c | 15 CAMELLIA_KEY *key) 17 if (!userKey || !key) 21 key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key); 26 const CAMELLIA_KEY *key) 28 Camellia_EncryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out); 32 const CAMELLIA_KEY *key) 34 Camellia_DecryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out) [all...] |
| cmll_ecb.c | 14 const CAMELLIA_KEY *key, const int enc) 17 Camellia_encrypt(in, out, key); 19 Camellia_decrypt(in, out, key);
|
| /src/lib/libcurses/ |
| keyname.c | 48 * Return name of key or NULL; 51 keyname(int key) 58 if (key < 0) { 64 if (key == 0x100) { 70 if (key < 0x20) { 72 name[1] = (char) (key + 64); /* Offset of '@' */ 78 if (key < 0x7F) { 79 name[0] = (char) key; 84 /* Delete key */ 85 if (key == 0x7F) [all...] |
| /src/lib/libpthread/ |
| tss.c | 41 tss_create(tss_t *key, tss_dtor_t dtor) 44 _DIAGASSERT(key != NULL); 46 if (pthread_key_create(key, dtor) == 0) 53 tss_delete(tss_t key) 59 (void)pthread_key_delete(key); 63 tss_get(tss_t key) 66 return pthread_getspecific(key); 70 tss_set(tss_t key, void *val) 73 if (pthread_setspecific(key, val) == 0)
|
| /src/lib/libtelnet/ |
| encrypt.h | 67 #define VALIDKEY(key) ( key[0] | key[1] | key[2] | key[3] | \ 68 key[4] | key[5] | key[6] | key[7])
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| keydump.c | 17 * Dump the contents of a key file saved by e.g. srp-simple as a DNS key. 33 const char *key_name = "com.apple.srp-client.host-key"; 34 srp_key_t *key; local 36 key = srp_get_key(key_name, NULL); 37 if (key == NULL) { 38 if (key == NULL) { 39 printf("Unable to load key from %s.", key_name); 44 srp_print_key(key);
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| key.c | 1 /* $NetBSD: key.c,v 1.1 2024/02/18 20:57:32 christos Exp $ */ 81 dst_key_name(const dst_key_t *key) { 82 REQUIRE(VALID_KEY(key)); 83 return (key->key_name); 87 dst_key_size(const dst_key_t *key) { 88 REQUIRE(VALID_KEY(key)); 89 return (key->key_size); 93 dst_key_proto(const dst_key_t *key) { 94 REQUIRE(VALID_KEY(key)); 95 return (key->key_proto) [all...] |