/freebsd/usr.bin/ypmatch/ |
H A D | ypmatch.c | 76 char *domainname, *inkey, *inmap, *outbuf; in main() local 119 inkey = argv[optind]; in main() 121 r = yp_match(domainname, inmap, inkey, in main() 122 strlen(inkey), &outbuf, &outbuflen); in main() 126 printf("%s: ", inkey); in main() 133 inkey, inmap, yperr_string(r)); in main()
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 168 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy() 178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy() 184 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy() 186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy() 188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy() 193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy() 210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
|
/freebsd/usr.sbin/ypserv/common/ |
H A D | yplib_host.h | 33 const char *inkey, int inkeylen, char **outval, int *outvallen); 36 int yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey,
|
H A D | yplib_host.c | 136 yp_match_host(CLIENT *client, char *indomain, char *inmap, const char *inkey, in yp_match_host() argument 152 yprk.key.keydat_val = (char *)inkey; in yp_match_host() 213 yp_next_host(CLIENT *client, char *indomain, char *inmap, char *inkey, in yp_next_host() argument 229 yprk.key.keydat_val = inkey; in yp_next_host()
|
/freebsd/include/rpcsvc/ |
H A D | ypclnt.h | 77 int yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, 81 int yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
|
/freebsd/usr.bin/ypcat/ |
H A D | ypcat.c | 75 printit(u_long instatus, char *inkey, int inkeylen, char *inval, int invallen, in printit() argument 81 printf("%*.*s ", inkeylen, inkeylen, inkey); in printit()
|
/freebsd/crypto/openssl/apps/ |
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 97 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 143 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 256 inkey = opt_arg(); in ts_main() 331 password, inkey, md, signer, chain, policy, in ts_main() 588 const char *queryfile, const char *passin, const char *inkey, in reply_command() 611 passin, inkey, md, signer, chain, policy); in reply_command() 697 const char *inkey, cons in create_response() 585 reply_command(CONF * conf,const char * section,const char * engine,const char * queryfile,const char * passin,const char * inkey,const EVP_MD * md,const char * signer,const char * chain,const char * policy,const char * in,int token_in,const char * out,int token_out,int text) reply_command() argument 694 create_response(CONF * conf,const char * section,const char * engine,const char * queryfile,const char * passin,const char * inkey,const EVP_MD * md,const char * signer,const char * chain,const char * policy) create_response() argument [all...] |
H A D | pkeyutl.c | 121 const char *inkey = NULL; in pkeyutl_main() local 158 inkey = opt_arg(); in pkeyutl_main() 290 } else if (inkey == NULL) { in pkeyutl_main() 306 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-rsautl.pod.in | 16 [B<-inkey> I<filename>|I<uri>] 68 =item B<-inkey> I<filename>|I<uri> 137 openssl rsautl -sign -in file -inkey key.pem -out sig 141 openssl rsautl -verify -in sig -inkey key.pem 145 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump 197 openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
|
H A D | openssl-pkeyutl.pod.in | 17 [B<-inkey> I<filename>|I<uri>] 97 =item B<-inkey> I<filename>|I<uri> 388 openssl pkeyutl -sign -in file -inkey key.pem -out sig 392 openssl pkeyutl -verifyrecover -in sig -inkey key.pem 396 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem 400 openssl pkeyutl -sign -in file -inkey key.pem -out sig -pkeyopt digest:sha256 404 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret 424 openssl pkeyutl -sign -in file -inkey sm2.key -out sig -rawin -digest sm3 \ 429 openssl pkeyutl -verify -certin -in file -inkey sm2.cert -sigfile sig \ 434 openssl pkeyutl -decrypt -in file -inkey key.pem -out secret \
|
H A D | openssl-smime.pod.in | 37 [B<-inkey> I<filename>|I<uri>] 251 =item B<-inkey> I<filename>|I<uri> 378 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem 413 openssl smime -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
|
H A D | openssl-pkcs12.pod.in | 49 [B<-inkey> I<filename>|I<uri>] 250 =item B<-inkey> I<filename>|I<uri> 448 openssl pkcs12 -export -in cert.pem -inkey key.pem -out file.p12 -legacy
|
H A D | openssl-ts.pod.in | 35 [B<-inkey> I<filename>|I<uri>] 238 =item B<-inkey> I<filename>|I<uri> 428 The private key of the TSA in PEM format. The same as the B<-inkey> 546 openssl ts -reply -queryfile design1.tsq -inkey tsakey.pem \
|
H A D | openssl-cms.pod.in | 55 [B<-inkey> I<filename>|I<uri>] 341 =item B<-inkey> I<filename>|I<uri> 786 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem 821 openssl cms -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
|
/freebsd/sys/kgssapi/krb5/ |
H A D | kcrypto.c | 181 krb5_derive_key(struct krb5_key_state *inkey, in krb5_derive_key() argument 185 const struct krb5_encryption_class *ec = inkey->ks_class; in krb5_derive_key() 208 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0); in krb5_derive_key()
|
H A D | kcrypto.h | 143 krb5_derive_key(struct krb5_key_state *inkey,
|
/freebsd/lib/libc/yp/ |
H A D | yplib.c | 644 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen, in yp_match() argument 658 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || in yp_match() 671 yprk.key.keydat_val = (char *)inkey; in yp_match() 845 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen, in yp_next() argument 856 if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 || in yp_next() 881 yprk.key.keydat_val = inkey; in yp_next()
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha.h | 18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 45 const unsigned char *inkey, in rc4_hmac_md5_init_key() argument 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
|
H A D | e_chacha20_poly1305.c | 168 const unsigned char *inkey, in chacha20_poly1305_init_key() argument 173 if (!inkey && !iv) in chacha20_poly1305_init_key() 190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key() 196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key()
|
H A D | e_aes_cbc_hmac_sha1.c | 70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key() argument 77 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key() 81 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key()
|
H A D | e_aes_cbc_hmac_sha256.c | 66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key() argument 73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key() 77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
|
/freebsd/sys/dev/ice/ |
H A D | ice_flex_pipe.c | 2152 struct ice_prof_id_key inkey; in ice_prof_gen_key() 2154 inkey.xlt1 = ptg; in ice_prof_gen_key() 2155 inkey.xlt2_cdid = CPU_TO_LE16(vsig); in ice_prof_gen_key() 2156 inkey.flags = CPU_TO_LE16(flags); in ice_prof_gen_key() 2164 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_2_M); in ice_prof_gen_key() 2165 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_2_S); in ice_prof_gen_key() 2170 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_4_M); in ice_prof_gen_key() 2171 inkey.xlt2_cdid |= CPU_TO_LE16(BIT(cdid) << ICE_CD_4_S); in ice_prof_gen_key() 2176 inkey.xlt2_cdid &= ~CPU_TO_LE16(ICE_CD_8_M); in ice_prof_gen_key() 2177 inkey in ice_prof_gen_key() 2151 struct ice_prof_id_key inkey; ice_prof_gen_key() local [all...] |
/freebsd/usr.sbin/ypldap/ |
H A D | aldap.c | 507 aldap_match_attr(struct aldap_message *msg, char *inkey, char ***outvalues) in aldap_match_attr() argument 525 if (strcasecmp(descr, inkey) == 0) in aldap_match_attr()
|
/freebsd/crypto/openssl/engines/ |
H A D | e_ossltest.c | 781 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key() argument
|