/dports/editors/hexer/hexer-1.0.3/ |
H A D | map.c | 174 string_to_keys(int *kkeys, char *string) in string_to_keys() argument 180 *kkeys++ = (int)HXKEY_ESCAPE; in string_to_keys() 182 *kkeys++ = *string + (int)HXKEY_BIAS; in string_to_keys() 184 *kkeys++ = *string; in string_to_keys() 187 *kkeys = 0; in string_to_keys() 199 *kkeys++ = HXKEY_ESCAPE; in scan_keys() 201 *kkeys++ = *string + HXKEY_BIAS; in scan_keys() 206 *kkeys = 0; in scan_keys() 222 mungets(int *kkeys) in mungets() argument 226 for (i = 0; kkeys[i]; ++i); in mungets() [all …]
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 new Integer(kkeys[i].getVersionNumber())); in getEKeys()
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 kkeys[i].getVersionNumber()); in getEKeys()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/jgss/krb5/ |
H A D | ServiceCreds.java | 220 KerberosKey[] kkeys = getKKeys(new KerberosPrincipal(princ.getName())); in getEKeys() local 221 if (kkeys.length == 0) { in getEKeys() 228 kkeys = getKKeys(); in getEKeys() 230 EncryptionKey[] ekeys = new EncryptionKey[kkeys.length]; in getEKeys() 233 kkeys[i].getEncoded(), kkeys[i].getKeyType(), in getEKeys() 234 new Integer(kkeys[i].getVersionNumber())); in getEKeys()
|
/dports/games/kevedit/kevedit-0.5.1/docs/ |
H A D | index.hlp | 5 !-kkeys;Keystroke Quick Reference
|
H A D | Makefile.am | 7 …p item.hlp kadvance.hlp kbackbuf.hlp kbasics.hlp kbrdinfo.hlp kevedit.hlp kkeys.hlp knew.hlp kobje…
|
/dports/net/tinyfugue/tf-50b8/src/ |
H A D | tfdefs.h.in | 8 /* $Id: tfdefs.h.in,v 35004.8 2007/01/13 23:12:39 kkeys Exp $ */
|
H A D | vars.mak | 1 # $Id: vars.mak,v 1.58 2007/01/13 23:12:39 kkeys Exp $
|
/dports/print/ghostscript8-x11/ghostscript-8.71/imdi/ |
H A D | imdi_gen.h | 86 char kkeys[100]; /* Kernel keys */ member
|
/dports/print/ghostscript8-base/ghostscript-8.71/imdi/ |
H A D | imdi_gen.h | 86 char kkeys[100]; /* Kernel keys */ member
|
/dports/net/spoofer/spoofer-1.4.7/ |
H A D | THANKS | 28 $Id: THANKS,v 1.3 2015/12/05 00:58:31 kkeys Exp $
|
/dports/net/tinyfugue/tf-50b8/unix/ |
H A D | vars.mak.in | 1 # $Id: vars.mak.in,v 35004.13 2007/01/13 23:12:39 kkeys Exp $
|
/dports/net/tinyfugue-devel/tinyfugue-5.1.3/ |
H A D | CREDITS | 2 by Ken Keys ("Hawkeye"), who can be reached by email at kkeys@ucsd.edu.
|
/dports/net/tinyfugue-devel/tinyfugue-5.1.3/unix/ |
H A D | vars.mak.in | 1 # $Id: vars.mak.in,v 35004.13 2007/01/13 23:12:39 kkeys Exp $
|
/dports/net/tinyfugue/tf-50b8/ |
H A D | CREDITS | 2 by Ken Keys ("Hawkeye"), who can be reached by email at kkeys@ucsd.edu.
|
/dports/science/qmcpack/qmcpack-3.11.0/nexus/tests/unit/ |
H A D | test_rmg_input.py | 1129 kkeys = set(ki.keys()) 1131 skeys = mkeys & gkeys & kkeys 1148 for ri,rk,rr in [(mi,mkeys,mr),(gi,gkeys,gr),(ki,kkeys,kr)]:
|
/dports/graphics/argyllcms/Argyll_V1.9.2/imdi/ |
H A D | imdi_gen.h | 180 char kkeys[100]; /* Kernel keys */ member
|
/dports/net/tinyfugue-devel/tinyfugue-5.1.3/src/ |
H A D | vars.mak | 1 # $Id: vars.mak,v 1.58 2007/01/13 23:12:39 kkeys Exp $
|