/dports/security/pks/pks/ |
H A D | pkscheck.c | 69 DBT ikey, idata, kkey, kdata; in main() local 95 memset (&kkey, 0, sizeof (kkey)); in main() 109 kkey.size = 4; in main() 112 if ((*(keydb (&kkey)->get)) (keydb (&kkey), NULL, &kkey, &kdata, 0)) in main() 115 ((unsigned char *) kkey.data)[0], in main() 116 ((unsigned char *) kkey.data)[1], in main() 117 ((unsigned char *) kkey.data)[2], in main() 134 memset (&kkey, 0, sizeof (kkey)); in main() 151 kkey.size = 4; in main() 154 if ((((unsigned long *) kkey.data)[0] > 0) && (*(keydb (&kkey)->get)) in main() [all …]
|
/dports/net/samba412/samba-4.12.15/source4/kdc/mit-kdb/ |
H A D | kdb_samba_pac.c | 36 krb5_keyblock *kkey, 43 ZERO_STRUCTP(kkey); 45 kkey->magic = KV5M_KEYBLOCK; 46 kkey->enctype = key_data->key_data_type[0]; 48 if (kkey->contents == NULL) { 51 memcpy(kkey->contents, 54 kkey->length = key_data->key_data_length[0]; 60 free(kkey->contents); 74 const krb5_keyblock *kkey, 94 kkey->contents, [all …]
|
/dports/dns/p5-DNS-Config/DNS-Config-0.66/lib/DNS/Config/File/ |
H A D | Nsd.pm | 249 $curflag = $kkey; 252 push @addys, $kkey; 254 $port = $kkey; 262 $result .= " $kkey;"; 445 my @foo = @{$kkey}; 454 my @foo = @{$kkey}; 533 if( ! ref( $kkey ) ){ 537 print " $kkey"; 630 if( ref( $kkey ) ){ 656 if( ref( $kkey ) ){ [all …]
|
/dports/dns/unbound/unbound-1.14.0/validator/ |
H A D | val_kentry.c | 114 newk = regional_alloc_init(region, kkey, sizeof(*kkey)); in key_entry_copy_toregion() 117 newk->name = regional_alloc_init(region, kkey->name, kkey->namelen); in key_entry_copy_toregion() 124 kkey->entry.data; in key_entry_copy_toregion() 155 key_entry_copy(struct key_entry_key* kkey) in key_entry_copy() argument 158 if(!kkey) in key_entry_copy() 160 newk = memdup(kkey, sizeof(*kkey)); in key_entry_copy() 163 newk->name = memdup(kkey->name, kkey->namelen); in key_entry_copy() 173 kkey->entry.data; in key_entry_copy() 353 rrk->rk.dname = regional_alloc_init(region, kkey->name, kkey->namelen); in key_entry_get_rrset() 356 rrk->rk.dname_len = kkey->namelen; in key_entry_get_rrset() [all …]
|
H A D | val_kentry.h | 114 struct key_entry_key* key_entry_copy_toregion(struct key_entry_key* kkey, 122 struct key_entry_key* key_entry_copy(struct key_entry_key* kkey); 129 int key_entry_isnull(struct key_entry_key* kkey); 136 int key_entry_isgood(struct key_entry_key* kkey); 143 int key_entry_isbad(struct key_entry_key* kkey); 151 void key_entry_set_reason(struct key_entry_key* kkey, char* reason); 159 char* key_entry_get_reason(struct key_entry_key* kkey); 210 struct ub_packed_rrset_key* key_entry_get_rrset(struct key_entry_key* kkey, 218 size_t key_entry_keysize(struct key_entry_key* kkey);
|
H A D | val_nsec3.h | 119 struct query_info* qinfo, struct key_entry_key* kkey); 153 struct query_info* qinfo, struct key_entry_key* kkey); 175 struct query_info* qinfo, struct key_entry_key* kkey, uint8_t* wc); 199 struct query_info* qinfo, struct key_entry_key* kkey, char** reason, 220 struct query_info* qinfo, struct key_entry_key* kkey, int* nodata);
|
H A D | val_nsec3.c | 475 struct key_entry_key* kkey) in nsec3_iteration_count_high() argument 481 size_t bits = key_entry_keysize(kkey); in nsec3_iteration_count_high() 1072 if(!list || num == 0 || !kkey || !key_entry_isgood(kkey)) in nsec3_prove_nameerror() 1078 if(nsec3_iteration_count_high(ve, &flt, kkey)) in nsec3_prove_nameerror() 1231 if(!list || num == 0 || !kkey || !key_entry_isgood(kkey)) in nsec3_prove_nodata() 1237 if(nsec3_iteration_count_high(ve, &flt, kkey)) in nsec3_prove_nodata() 1255 if(!list || num == 0 || !kkey || !key_entry_isgood(kkey)) in nsec3_prove_wildcard() 1261 if(nsec3_iteration_count_high(ve, &flt, kkey)) in nsec3_prove_wildcard() 1329 if(!list || num == 0 || !kkey || !key_entry_isgood(kkey)) { in nsec3_prove_nods() 1341 if(nsec3_iteration_count_high(ve, &flt, kkey)) in nsec3_prove_nods() [all …]
|
/dports/net-mgmt/netmagis-topo/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/net-mgmt/netmagis-www/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/net-mgmt/netmagis-metro/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/net-mgmt/netmagis-utils/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/net-mgmt/netmagis-database/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/net-mgmt/netmagis-common/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/net-mgmt/netmagis-servers/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/net-mgmt/netmagis-detecteq/netmagis-2.3.4/topo/rancid/ |
H A D | parsenet | 170 foreach my $kkey (sort keys %{$net_struct{$key}}) 172 if($kkey eq "vlanif" || $kkey eq "inet" || $kkey eq "inet6" || $kkey eq "trunk") 174 print "! \t$kkey -> \n"; 175 foreach my $kkkey (sort keys %{$net_struct{$key}{$kkey}}) 182 print "! \t$kkey -> $net_struct{$key}{$kkey}\n"; 238 foreach my $kkey (sort keys %{$net_struct{$key}{vlanif}}) 240 printiface($kkey,$bridge_group);
|
/dports/games/xkoules/koules1.4/os2dive/ |
H A D | input.c | 26 struct keyrec *kkey = firstkey; in findkey() local 28 while (kkey != NULL && kkey->scancode != sc) in findkey() 29 kkey = kkey->next; in findkey() 30 return (kkey); in findkey()
|
/dports/math/clblas/clBLAS-2.10/src/library/common/ |
H A D | kern_cache.c | 114 KcacheKey *kkey = (KcacheKey*)key; in knodeCmp() local 117 KernelKey *a = &(kkey->key); in knodeCmp() 129 return knode->extraCmp(knode->kern.extra, kkey->extra); in knodeCmp() 357 KcacheKey kkey; in findKernel() local 365 kkey.hash = kernHash(key->subdims, key->nrDims); in findKernel() 366 kkey.extra = extraKey; in findKernel() 368 kkey.key.device = key->device; in findKernel() 369 kkey.key.context = key->context; in findKernel() 370 kkey.key.nrDims = key->nrDims; in findKernel() 371 memset(kkey.key.subdims, 0, sizeof(kkey.key.subdims)); in findKernel() [all …]
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/s390/crypto/ |
H A D | pkey_api.c | 1280 u8 *kkey; in pkey_unlocked_ioctl() local 1289 kfree(kkey); in pkey_unlocked_ioctl() 1301 u8 *kkey; in pkey_unlocked_ioctl() local 1309 if (!kkey) { in pkey_unlocked_ioctl() 1335 kfree(kkey); in pkey_unlocked_ioctl() 1343 u8 *kkey; in pkey_unlocked_ioctl() local 1351 if (!kkey) { in pkey_unlocked_ioctl() 1378 kfree(kkey); in pkey_unlocked_ioctl() 1384 u8 *kkey; in pkey_unlocked_ioctl() local 1406 u8 *kkey; in pkey_unlocked_ioctl() local [all …]
|
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/s390/crypto/ |
H A D | pkey_api.c | 1280 u8 *kkey; in pkey_unlocked_ioctl() local 1289 kfree(kkey); in pkey_unlocked_ioctl() 1301 u8 *kkey; in pkey_unlocked_ioctl() local 1309 if (!kkey) { in pkey_unlocked_ioctl() 1335 kfree(kkey); in pkey_unlocked_ioctl() 1343 u8 *kkey; in pkey_unlocked_ioctl() local 1351 if (!kkey) { in pkey_unlocked_ioctl() 1378 kfree(kkey); in pkey_unlocked_ioctl() 1384 u8 *kkey; in pkey_unlocked_ioctl() local 1406 u8 *kkey; in pkey_unlocked_ioctl() local [all …]
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/s390/crypto/ |
H A D | pkey_api.c | 1280 u8 *kkey; in pkey_unlocked_ioctl() local 1289 kfree(kkey); in pkey_unlocked_ioctl() 1301 u8 *kkey; in pkey_unlocked_ioctl() local 1309 if (!kkey) { in pkey_unlocked_ioctl() 1335 kfree(kkey); in pkey_unlocked_ioctl() 1343 u8 *kkey; in pkey_unlocked_ioctl() local 1351 if (!kkey) { in pkey_unlocked_ioctl() 1378 kfree(kkey); in pkey_unlocked_ioctl() 1384 u8 *kkey; in pkey_unlocked_ioctl() local 1406 u8 *kkey; in pkey_unlocked_ioctl() local [all …]
|
/dports/devel/p5-JIRA-REST/JIRA-REST-0.021/examples/ |
H A D | edit_issue.pl | 34 if (my ($kkey, $attr) = ($key =~ /(.+?)\.(.+)/)) { 35 if (!$assignments{$kkey}) { 36 $assignments{$kkey} = {}; 38 $assignments{$kkey}{$attr} = $value;
|
/dports/devel/py-celery/celery-4.4.7/extra/bash-completion/ |
H A D | celery.bash | 6 local cur basep opts base kval kkey loglevels prevp in_opt controlargs 34 kkey="${cur%=*}" 38 kkey="$prevp" 43 case "${kkey}" in
|
/dports/dns/knot3-lib/knot-3.1.5/src/utils/keymgr/ |
H A D | functions.c | 416 knot_kasp_key_t *kkey = calloc(1, sizeof(*kkey)); in keymgr_import_bind() local 417 if (!kkey) { in keymgr_import_bind() 422 kkey->id = keyid; in keymgr_import_bind() 423 kkey->key = key; in keymgr_import_bind() 426 kkey->is_ksk = (dnssec_key_get_flags(kkey->key) == DNSKEY_FLAGS_KSK); in keymgr_import_bind() 427 kkey->is_zsk = !kkey->is_ksk; in keymgr_import_bind() 431 free(kkey); in keymgr_import_bind() 538 knot_kasp_key_t *kkey = calloc(1, sizeof(*kkey)); in import_key() local 543 kkey->id = keyid; in import_key() 544 kkey->key = key; in import_key() [all …]
|
/dports/dns/knot3/knot-3.1.5/src/utils/keymgr/ |
H A D | functions.c | 416 knot_kasp_key_t *kkey = calloc(1, sizeof(*kkey)); in keymgr_import_bind() local 417 if (!kkey) { in keymgr_import_bind() 422 kkey->id = keyid; in keymgr_import_bind() 423 kkey->key = key; in keymgr_import_bind() 426 kkey->is_ksk = (dnssec_key_get_flags(kkey->key) == DNSKEY_FLAGS_KSK); in keymgr_import_bind() 427 kkey->is_zsk = !kkey->is_ksk; in keymgr_import_bind() 431 free(kkey); in keymgr_import_bind() 538 knot_kasp_key_t *kkey = calloc(1, sizeof(*kkey)); in import_key() local 543 kkey->id = keyid; in import_key() 544 kkey->key = key; in import_key() [all …]
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/isccfg/ |
H A D | kaspconf.c | 173 dns_kasp_key_t *kkey; in cfg_nsec3param_fromconfig() local 188 for (kkey = ISC_LIST_HEAD(dns_kasp_keys(kasp)); kkey != NULL; in cfg_nsec3param_fromconfig() 189 kkey = ISC_LIST_NEXT(kkey, link)) in cfg_nsec3param_fromconfig() 191 unsigned int keysize = dns_kasp_key_size(kkey); in cfg_nsec3param_fromconfig() 192 uint32_t keyalg = dns_kasp_key_algorithm(kkey); in cfg_nsec3param_fromconfig()
|