Symbol: key
bin/pax/getoldopt.c
24
static char *key; /* Points to next keyletter */
bin/pax/getoldopt.c
31
if (key == NULL) { /* First time */
bin/pax/getoldopt.c
34
key = argv[1];
bin/pax/getoldopt.c
35
if (*key == '-')
bin/pax/getoldopt.c
44
c = *key++;
bin/pax/getoldopt.c
46
key--;
bin/pax/tables.c
1734
u_int key = 0;
bin/pax/tables.c
1767
key += val;
bin/pax/tables.c
1779
key += val;
bin/pax/tables.c
1785
return(key % tabsz);
bin/ps/keyword.c
259
VAR *v, key;
bin/ps/keyword.c
262
key.name = p;
bin/ps/keyword.c
269
key.name = p;
bin/ps/keyword.c
270
v = bsearch(&key, var, sizeof(var)/sizeof(VAR) - 1, sizeof(VAR), vcmp);
bin/stty/key.c
105
return (strcmp(((struct key *)a)->name, ((struct key *)b)->name));
bin/stty/key.c
112
struct key *kp, tmp;
bin/stty/key.c
122
if (!(kp = (struct key *)bsearch(&tmp, keys,
bin/stty/key.c
123
sizeof(keys)/sizeof(struct key), sizeof(struct key), c_key)))
games/sail/dr_1.c
130
fightitout(struct ship *from, struct ship *to, int key)
games/sail/dr_1.c
140
menfrom = mensent(from, to, crewfrom, &fromcap, &pcfrom, key);
games/sail/dr_1.c
146
if (key) {
games/sail/dr_1.c
188
if (key)
games/sail/dr_1.c
194
if (key) {
include/icdb.h
32
int icdb_lookup(struct icdb *db, int keynum, const void *key, void *entry,
include/rpc/auth.h
79
} key;
include/search.h
21
char *key;
lib/libc/crypt/bcrypt.c
118
key_len = (u_int8_t)(strlen(key) + 1);
lib/libc/crypt/bcrypt.c
125
key_len = strlen(key);
lib/libc/crypt/bcrypt.c
162
(u_int8_t *) key, key_len);
lib/libc/crypt/bcrypt.c
164
Blowfish_expand0state(&state, (u_int8_t *) key, key_len);
lib/libc/crypt/bcrypt.c
92
bcrypt_hashpass(const char *key, const char *salt, char *encrypted,
lib/libc/crypt/blowfish.c
411
Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes)
lib/libc/crypt/blowfish.c
423
temp = Blowfish_stream2word(key, keybytes, &j);
lib/libc/crypt/blowfish.c
451
const u_int8_t *key, u_int16_t keybytes)
lib/libc/crypt/blowfish.c
463
temp = Blowfish_stream2word(key, keybytes, &j);
lib/libc/crypt/blowfish.c
660
char key[] = "AAAAA";
lib/libc/crypt/blowfish.c
673
blf_key(&c, (u_int8_t *) key, 5);
lib/libc/crypt/crypt.c
13
return bcrypt(key, setting);
lib/libc/crypt/crypt.c
8
crypt(const char *key, const char *setting)
lib/libc/db/btree/bt_close.c
78
if (t->bt_cursor.key.data != NULL) {
lib/libc/db/btree/bt_close.c
79
free(t->bt_cursor.key.data);
lib/libc/db/btree/bt_close.c
80
t->bt_cursor.key.size = 0;
lib/libc/db/btree/bt_close.c
81
t->bt_cursor.key.data = NULL;
lib/libc/db/btree/bt_delete.c
152
if ((e = __bt_search(t, &c->key, &exact)) == NULL)
lib/libc/db/btree/bt_delete.c
211
if ((e = __bt_search(t, &c->key, &exact)) == NULL)
lib/libc/db/btree/bt_delete.c
279
__bt_bdelete(BTREE *t, const DBT *key)
lib/libc/db/btree/bt_delete.c
288
loop: if ((e = __bt_search(t, key, &exact)) == NULL)
lib/libc/db/btree/bt_delete.c
303
if (__bt_dleaf(t, key, h, e->index)) {
lib/libc/db/btree/bt_delete.c
316
} while (e->index < NEXTINDEX(h) && __bt_cmp(t, key, e) == 0);
lib/libc/db/btree/bt_delete.c
324
if (__bt_cmp(t, key, e) != 0)
lib/libc/db/btree/bt_delete.c
326
if (__bt_dleaf(t, key, h, e->index) == RET_ERROR) {
lib/libc/db/btree/bt_delete.c
458
__bt_dleaf(BTREE *t, const DBT *key, PAGE *h, u_int idx)
lib/libc/db/btree/bt_delete.c
470
__bt_curdel(t, key, h, idx))
lib/libc/db/btree/bt_delete.c
519
__bt_curdel(BTREE *t, const DBT *key, PAGE *h, u_int idx)
lib/libc/db/btree/bt_delete.c
540
if (key == NULL) {
lib/libc/db/btree/bt_delete.c
544
&c->key, &c->key, NULL, NULL, 1)) != RET_SUCCESS)
lib/libc/db/btree/bt_delete.c
547
key = &c->key;
lib/libc/db/btree/bt_delete.c
553
if (__bt_cmp(t, key, &e) == 0) {
lib/libc/db/btree/bt_delete.c
562
if (__bt_cmp(t, key, &e) == 0) {
lib/libc/db/btree/bt_delete.c
57
__bt_delete(const DB *dbp, const DBT *key, u_int flags)
lib/libc/db/btree/bt_delete.c
573
if (__bt_cmp(t, key, &e) == 0) {
lib/libc/db/btree/bt_delete.c
585
if (__bt_cmp(t, key, &e) == 0) {
lib/libc/db/btree/bt_delete.c
598
__bt_ret(t, &e, &c->key, &c->key, NULL, NULL, 1)) == RET_SUCCESS) {
lib/libc/db/btree/bt_delete.c
80
status = __bt_bdelete(t, key);
lib/libc/db/btree/bt_get.c
57
__bt_get(const DB *dbp, const DBT *key, DBT *data, u_int flags)
lib/libc/db/btree/bt_get.c
77
if ((e = __bt_search(t, key, &exact)) == NULL)
lib/libc/db/btree/bt_put.c
115
if (key->size + data->size > t->bt_ovflsize) {
lib/libc/db/btree/bt_put.c
116
if (key->size > t->bt_ovflsize) {
lib/libc/db/btree/bt_put.c
117
storekey: if (__ovfl_put(t, key, &pg) == RET_ERROR)
lib/libc/db/btree/bt_put.c
122
size32 = key->size;
lib/libc/db/btree/bt_put.c
126
key = &tkey;
lib/libc/db/btree/bt_put.c
128
if (key->size + data->size > t->bt_ovflsize) {
lib/libc/db/btree/bt_put.c
140
if (key->size + data->size > t->bt_ovflsize)
lib/libc/db/btree/bt_put.c
156
if (t->bt_order == NOT || (e = bt_fast(t, key, data, &exact)) == NULL)
lib/libc/db/btree/bt_put.c
157
if ((e = __bt_search(t, key, &exact)) == NULL)
lib/libc/db/btree/bt_put.c
182
delete: if (__bt_dleaf(t, key, h, idx) == RET_ERROR) {
lib/libc/db/btree/bt_put.c
195
nbytes = NBLEAFDBT(key->size, data->size);
lib/libc/db/btree/bt_put.c
197
if ((status = __bt_split(t, h, key,
lib/libc/db/btree/bt_put.c
210
WR_BLEAF(dest, key, data, dflags);
lib/libc/db/btree/bt_put.c
259
bt_fast(BTREE *t, const DBT *key, const DBT *data, int *exactp)
lib/libc/db/btree/bt_put.c
276
nbytes = NBLEAFDBT(key->size, data->size);
lib/libc/db/btree/bt_put.c
285
if ((cmp = __bt_cmp(t, key, &t->bt_cur)) < 0)
lib/libc/db/btree/bt_put.c
293
if ((cmp = __bt_cmp(t, key, &t->bt_cur)) > 0)
lib/libc/db/btree/bt_put.c
61
__bt_put(const DB *dbp, DBT *key, const DBT *data, u_int flags)
lib/libc/db/btree/bt_search.c
101
__bt_sprev(t, h, key, exactp))
lib/libc/db/btree/bt_search.c
105
__bt_snext(t, h, key, exactp))
lib/libc/db/btree/bt_search.c
142
__bt_snext(BTREE *t, PAGE *h, const DBT *key, int *exactp)
lib/libc/db/btree/bt_search.c
153
if (__bt_cmp(t, key, &e) == 0) {
lib/libc/db/btree/bt_search.c
177
__bt_sprev(BTREE *t, PAGE *h, const DBT *key, int *exactp)
lib/libc/db/btree/bt_search.c
188
if (__bt_cmp(t, key, &e) == 0) {
lib/libc/db/btree/bt_search.c
60
__bt_search(BTREE *t, const DBT *key, int *exactp)
lib/libc/db/btree/bt_search.c
76
if ((cmp = __bt_cmp(t, key, &t->bt_cur)) == 0) {
lib/libc/db/btree/bt_seq.c
101
status = __bt_seqset(t, &e, key, flags);
lib/libc/db/btree/bt_seq.c
112
__bt_ret(t, &e, key, &t->bt_rkey, data, &t->bt_rdata, 0);
lib/libc/db/btree/bt_seq.c
143
__bt_seqset(BTREE *t, EPG *ep, DBT *key, int flags)
lib/libc/db/btree/bt_seq.c
160
if (key->data == NULL || key->size == 0) {
lib/libc/db/btree/bt_seq.c
164
return (__bt_first(t, key, ep, &exact));
lib/libc/db/btree/bt_seq.c
250
return (__bt_first(t, &c->key, ep, &exact));
lib/libc/db/btree/bt_seq.c
326
__bt_first(BTREE *t, const DBT *key, EPG *erval, int *exactp)
lib/libc/db/btree/bt_seq.c
340
if ((ep = __bt_search(t, key, exactp)) == NULL)
lib/libc/db/btree/bt_seq.c
383
} while (__bt_cmp(t, key, ep) == 0);
lib/libc/db/btree/bt_seq.c
426
if (t->bt_cursor.key.data != NULL) {
lib/libc/db/btree/bt_seq.c
427
free(t->bt_cursor.key.data);
lib/libc/db/btree/bt_seq.c
428
t->bt_cursor.key.size = 0;
lib/libc/db/btree/bt_seq.c
429
t->bt_cursor.key.data = NULL;
lib/libc/db/btree/bt_seq.c
71
__bt_seq(const DB *dbp, DBT *key, DBT *data, u_int flags)
lib/libc/db/btree/bt_split.c
109
WR_BLEAF(dest, key, data, flags)
lib/libc/db/btree/bt_split.c
73
__bt_split(BTREE *t, PAGE *sp, const DBT *key, const DBT *data, int flags,
lib/libc/db/btree/bt_utils.c
61
__bt_ret(BTREE *t, EPG *e, DBT *key, DBT *rkey, DBT *data, DBT *rdata, int copy)
lib/libc/db/btree/bt_utils.c
73
if (key == NULL)
lib/libc/db/btree/bt_utils.c
78
&key->size, &rkey->data, &rkey->size))
lib/libc/db/btree/bt_utils.c
80
key->data = rkey->data;
lib/libc/db/btree/bt_utils.c
90
key->size = bl->ksize;
lib/libc/db/btree/bt_utils.c
91
key->data = rkey->data;
lib/libc/db/btree/bt_utils.c
93
key->size = bl->ksize;
lib/libc/db/btree/bt_utils.c
94
key->data = bl->bytes;
lib/libc/db/btree/btree.h
190
#define WR_BLEAF(p, key, data, flags) { \
lib/libc/db/btree/btree.h
191
*(u_int32_t *)p = key->size; \
lib/libc/db/btree/btree.h
197
memmove(p, key->data, key->size); \
lib/libc/db/btree/btree.h
198
p += key->size; \
lib/libc/db/btree/btree.h
275
DBT key; /* B: Saved key, or key.data == NULL. */
lib/libc/db/hash/hash.c
510
hash_get(const DB *dbp, const DBT *key, DBT *data, u_int32_t flag)
lib/libc/db/hash/hash.c
519
return (hash_access(hashp, HASH_GET, (DBT *)key, data));
lib/libc/db/hash/hash.c
523
hash_put(const DB *dbp, DBT *key, const DBT *data, u_int32_t flag)
lib/libc/db/hash/hash.c
537
HASH_PUTNEW : HASH_PUT, (DBT *)key, (DBT *)data));
lib/libc/db/hash/hash.c
541
hash_delete(const DB *dbp, const DBT *key,
lib/libc/db/hash/hash.c
555
return (hash_access(hashp, HASH_DELETE, (DBT *)key, NULL));
lib/libc/db/hash/hash.c
562
hash_access(HTAB *hashp, ACTION action, DBT *key, DBT *val)
lib/libc/db/hash/hash.c
576
size = key->size;
lib/libc/db/hash/hash.c
577
kp = (char *)key->data;
lib/libc/db/hash/hash.c
640
if (__addel(hashp, rbufp, key, val)) {
lib/libc/db/hash/hash.c
671
(__addel(hashp, rbufp, key, val))) {
lib/libc/db/hash/hash.c
688
hash_seq(const DB *dbp, DBT *key, DBT *data, u_int32_t flag)
lib/libc/db/hash/hash.c
759
if (__big_keydata(hashp, bufp, key, data, 1))
lib/libc/db/hash/hash.c
764
key->data = (u_char *)hashp->cpage->page + bp[ndx];
lib/libc/db/hash/hash.c
765
key->size = (ndx > 1 ? bp[ndx - 1] : hashp->BSIZE) - bp[ndx];
lib/libc/db/hash/hash_bigkey.c
268
__find_bigpair(HTAB *hashp, BUFHEAD *bufp, int ndx, char *key, int size)
lib/libc/db/hash/hash_bigkey.c
279
kkey = key;
lib/libc/db/hash/hash_bigkey.c
492
__big_keydata(HTAB *hashp, BUFHEAD *bufp, DBT *key, DBT *val, int set)
lib/libc/db/hash/hash_bigkey.c
494
key->size = (size_t)collect_key(hashp, bufp, 0, val, set);
lib/libc/db/hash/hash_bigkey.c
495
if (key->size == (size_t)-1)
lib/libc/db/hash/hash_bigkey.c
497
key->data = (u_char *)hashp->tmp_key;
lib/libc/db/hash/hash_bigkey.c
554
DBT key, val;
lib/libc/db/hash/hash_bigkey.c
561
if (__big_keydata(hashp, big_keyp, &key, &val, 0))
lib/libc/db/hash/hash_bigkey.c
563
change = (__call_hash(hashp, key.data, key.size) != obucket);
lib/libc/db/hash/hash_bigkey.c
82
__big_insert(HTAB *hashp, BUFHEAD *bufp, const DBT *key, const DBT *val)
lib/libc/db/hash/hash_bigkey.c
92
key_data = (char *)key->data;
lib/libc/db/hash/hash_bigkey.c
93
key_size = key->size;
lib/libc/db/hash/hash_func.c
41
__default_hash(const void *key, size_t len)
lib/libc/db/hash/hash_func.c
51
k = (u_int8_t *)key;
lib/libc/db/hash/hash_page.c
180
DBT key, val;
lib/libc/db/hash/hash_page.c
211
key.data = (u_char *)op + ino[n];
lib/libc/db/hash/hash_page.c
212
key.size = off - ino[n];
lib/libc/db/hash/hash_page.c
214
if (__call_hash(hashp, key.data, key.size) == obucket) {
lib/libc/db/hash/hash_page.c
230
putpair(np, &key, &val);
lib/libc/db/hash/hash_page.c
282
DBT key, val;
lib/libc/db/hash/hash_page.c
342
key.data = (u_char *)cino + ino[n];
lib/libc/db/hash/hash_page.c
343
key.size = off - ino[n];
lib/libc/db/hash/hash_page.c
348
if (__call_hash(hashp, key.data, key.size) == obucket) {
lib/libc/db/hash/hash_page.c
350
if (PAIRFITS(op, (&key), (&val)))
lib/libc/db/hash/hash_page.c
351
putpair((char *)op, &key, &val);
lib/libc/db/hash/hash_page.c
358
putpair((char *)op, &key, &val);
lib/libc/db/hash/hash_page.c
363
if (PAIRFITS(np, (&key), (&val)))
lib/libc/db/hash/hash_page.c
364
putpair((char *)np, &key, &val);
lib/libc/db/hash/hash_page.c
371
putpair((char *)np, &key, &val);
lib/libc/db/hash/hash_page.c
390
__addel(HTAB *hashp, BUFHEAD *bufp, const DBT *key, const DBT *val)
lib/libc/db/hash/hash_page.c
414
FREESPACE(bp) >= PAIRSIZE(key, val)) {
lib/libc/db/hash/hash_page.c
415
squeeze_key(bp, key, val);
lib/libc/db/hash/hash_page.c
425
if (PAIRFITS(bp, key, val))
lib/libc/db/hash/hash_page.c
426
putpair(bufp->page, key, val);
lib/libc/db/hash/hash_page.c
434
if (PAIRFITS(sop, key, val))
lib/libc/db/hash/hash_page.c
435
putpair((char *)sop, key, val);
lib/libc/db/hash/hash_page.c
437
if (__big_insert(hashp, bufp, key, val))
lib/libc/db/hash/hash_page.c
870
squeeze_key(u_int16_t *sp, const DBT *key, const DBT *val)
lib/libc/db/hash/hash_page.c
88
putpair(char *p, const DBT *key, const DBT *val)
lib/libc/db/hash/hash_page.c
881
off -= key->size;
lib/libc/db/hash/hash_page.c
883
memmove(p + off, key->data, key->size);
lib/libc/db/hash/hash_page.c
890
FREESPACE(sp) = free_space - PAIRSIZE(key, val);
lib/libc/db/hash/hash_page.c
97
off = OFFSET(bp) - key->size;
lib/libc/db/hash/hash_page.c
98
memmove(p + off, key->data, key->size);
lib/libc/db/hash/ndbm.c
114
dbm_fetch(DBM *db, datum key)
lib/libc/db/hash/ndbm.c
120
dbtkey.data = key.dptr;
lib/libc/db/hash/ndbm.c
121
dbtkey.size = key.dsize;
lib/libc/db/hash/ndbm.c
181
dbm_delete(DBM *db, datum key)
lib/libc/db/hash/ndbm.c
186
dbtkey.data = key.dptr;
lib/libc/db/hash/ndbm.c
187
dbtkey.size = key.dsize;
lib/libc/db/hash/ndbm.c
203
dbm_store(DBM *db, datum key, datum data, int flags)
lib/libc/db/hash/ndbm.c
207
dbtkey.data = key.dptr;
lib/libc/db/hash/ndbm.c
208
dbtkey.size = key.dsize;
lib/libc/db/mpool/mpool.c
55
mpool_open(void *key, int fd, pgno_t pagesize, pgno_t maxcache)
lib/libc/db/recno/rec_close.c
103
DBT data, key;
lib/libc/db/recno/rec_close.c
133
key.size = sizeof(recno_t);
lib/libc/db/recno/rec_close.c
134
key.data = &trec;
lib/libc/db/recno/rec_close.c
142
status = (dbp->seq)(dbp, &key, &data, R_FIRST);
lib/libc/db/recno/rec_close.c
146
status = (dbp->seq)(dbp, &key, &data, R_NEXT);
lib/libc/db/recno/rec_close.c
152
status = (dbp->seq)(dbp, &key, &data, R_FIRST);
lib/libc/db/recno/rec_close.c
158
status = (dbp->seq)(dbp, &key, &data, R_NEXT);
lib/libc/db/recno/rec_delete.c
58
__rec_delete(const DB *dbp, const DBT *key, u_int flags)
lib/libc/db/recno/rec_delete.c
74
if ((nrec = *(recno_t *)key->data) == 0)
lib/libc/db/recno/rec_get.c
57
__rec_get(const DB *dbp, const DBT *key, DBT *data, u_int flags)
lib/libc/db/recno/rec_get.c
73
if (flags || (nrec = *(recno_t *)key->data) == 0) {
lib/libc/db/recno/rec_put.c
105
if ((nrec = *(recno_t *)key->data) == 0)
lib/libc/db/recno/rec_put.c
109
if ((nrec = *(recno_t *)key->data) == 0) {
lib/libc/db/recno/rec_put.c
116
if ((nrec = *(recno_t *)key->data) == 0)
lib/libc/db/recno/rec_put.c
120
if ((nrec = *(recno_t *)key->data) == 0)
lib/libc/db/recno/rec_put.c
165
return (__rec_ret(t, NULL, nrec, key, NULL));
lib/libc/db/recno/rec_put.c
56
__rec_put(const DB *dbp, DBT *key, const DBT *data, u_int flags)
lib/libc/db/recno/rec_seq.c
116
status = __rec_ret(t, e, nrec, key, data);
lib/libc/db/recno/rec_seq.c
55
__rec_seq(const DB *dbp, DBT *key, DBT *data, u_int flags)
lib/libc/db/recno/rec_seq.c
72
if ((nrec = *(recno_t *)key->data) == 0)
lib/libc/db/recno/rec_utils.c
53
__rec_ret(BTREE *t, EPG *e, recno_t nrec, DBT *key, DBT *data)
lib/libc/db/recno/rec_utils.c
58
if (key == NULL)
lib/libc/db/recno/rec_utils.c
70
key->size = sizeof(recno_t);
lib/libc/db/recno/rec_utils.c
71
key->data = t->bt_rkey.data;
lib/libc/gen/devname.c
82
DBT data, key;
lib/libc/gen/devname.c
94
key.data = &bkey;
lib/libc/gen/devname.c
95
key.size = sizeof(bkey);
lib/libc/gen/devname.c
96
if ((db->get)(db, &key, &data, 0) == 0)
lib/libc/gen/getcap.c
556
DBT key, data;
lib/libc/gen/getcap.c
558
key.data = (void *)name;
lib/libc/gen/getcap.c
559
key.size = strlen(name);
lib/libc/gen/getcap.c
563
switch(capdbp->get(capdbp, &key, &data, 0)) {
lib/libc/gen/getcap.c
574
key.data = (char *)data.data + 1;
lib/libc/gen/getcap.c
575
key.size = data.size - 1;
lib/libc/gen/getgrent.c
291
char *key, *data;
lib/libc/gen/getgrent.c
311
&key, &keylen, &data, &datalen);
lib/libc/gen/getgrent.c
313
__ypcurrent = key;
lib/libc/gen/getgrouplist.c
112
_read_netid(const char *key, uid_t uid, gid_t *groups, int *ngroups,
lib/libc/gen/getgrouplist.c
141
if (strcmp(line, key))
lib/libc/gen/getgrouplist.c
205
char buf[MAXLINELENGTH], *ypdata = NULL, *key;
lib/libc/gen/getgrouplist.c
214
i = asprintf(&key, "unix.%u@%s", pwstore.pw_uid, __ypdomain);
lib/libc/gen/getgrouplist.c
219
if (_read_netid(key, pwstore.pw_uid, groups, &ngroups,
lib/libc/gen/getgrouplist.c
221
free(key);
lib/libc/gen/getgrouplist.c
226
if (!yp_match(__ypdomain, "netid.byname", key,
lib/libc/gen/getgrouplist.c
227
(int)strlen(key), &ypdata, &ypdatalen))
lib/libc/gen/getgrouplist.c
231
free(key);
lib/libc/gen/getnetgrent.c
254
DBT key, data;
lib/libc/gen/getnetgrent.c
263
key.data = (u_char *) ks;
lib/libc/gen/getnetgrent.c
264
key.size = len;
lib/libc/gen/getnetgrent.c
266
ret = (_ng_db->get)(_ng_db, &key, &data, 0);
lib/libc/gen/getnetgrent.c
534
in_lookup1(const char *ypdom, const char *key, const char *domain, int map)
lib/libc/gen/getnetgrent.c
541
len = (key ? strlen(key) : 1) + (domain ? strlen(domain) : 1) + 2;
lib/libc/gen/getnetgrent.c
542
ptr = _ng_makekey(key, domain, len);
lib/libc/gen/getnetgrent.c
555
in_lookup(const char *ypdom, const char *group, const char *key,
lib/libc/gen/getnetgrent.c
563
if ((line = in_lookup1(ypdom, key, domain, map)) == NULL)
lib/libc/gen/getnetgrent.c
573
if (((line = in_lookup1(ypdom, key, NULL, map)) == NULL) &&
lib/libc/gen/getpwent.c
313
DBT key;
lib/libc/gen/getpwent.c
333
char *key, *data = NULL;
lib/libc/gen/getpwent.c
342
&key, &keylen, &data, &datalen);
lib/libc/gen/getpwent.c
350
__ypcurrent = key;
lib/libc/gen/getpwent.c
425
key.data = (u_char *)bf;
lib/libc/gen/getpwent.c
426
key.size = 1 + sizeof(_pw_keynum);
lib/libc/gen/getpwent.c
427
if (__hashpw(&key, pwbuf, buflen, pw, &_pw_flags)) {
lib/libc/gen/getpwent.c
493
DBT key, data, pkey, pdata;
lib/libc/gen/getpwent.c
496
key.data = (u_char *)_PW_YPTOKEN;
lib/libc/gen/getpwent.c
497
key.size = strlen(_PW_YPTOKEN);
lib/libc/gen/getpwent.c
505
if ((_pw_db->get)(_pw_db, &key, &data, 0) &&
lib/libc/gen/getpwent.c
518
char *key, *result;
lib/libc/gen/getpwent.c
541
&key, &keylen, &result, &resultlen)) {
lib/libc/gen/getpwent.c
548
free(key);
lib/libc/gen/getpwent.c
565
DBT key;
lib/libc/gen/getpwent.c
570
key.data = (u_char *)bf;
lib/libc/gen/getpwent.c
571
key.size = 1 + sizeof(pw_keynum);
lib/libc/gen/getpwent.c
572
if (__hashpw(&key, buf, buflen, pw, flagsp) == 0)
lib/libc/gen/getpwent.c
705
DBT key;
lib/libc/gen/getpwent.c
713
key.data = (u_char *)bf;
lib/libc/gen/getpwent.c
714
key.size = 1 + MINIMUM(len, _PW_NAME_LEN);
lib/libc/gen/getpwent.c
715
r = __hashpw(&key, buf, buflen, pw, flagsp);
lib/libc/gen/getpwent.c
726
DBT key;
lib/libc/gen/getpwent.c
731
key.data = (u_char *)bf;
lib/libc/gen/getpwent.c
732
key.size = 1 + sizeof(uid);
lib/libc/gen/getpwent.c
733
r = __hashpw(&key, buf, buflen, pw, flagsp);
lib/libc/gen/getpwent.c
991
__hashpw(DBT *key, char *buf, size_t buflen, struct passwd *pw,
lib/libc/gen/getpwent.c
997
if ((_pw_db->get)(_pw_db, key, &data, 0))
lib/libc/gen/pwcache.c
100
key = (key << 8) | (key >> 24);
lib/libc/gen/pwcache.c
103
return key % tabsz;
lib/libc/gen/pwcache.c
94
u_int key = 0;
lib/libc/gen/pwcache.c
99
key += *name++;
lib/libc/gen/tree.c
444
_rb_find(const struct rb_type *t, struct rb_tree *rbt, const void *key)
lib/libc/gen/tree.c
452
comp = (*t->t_compare)(key, node);
lib/libc/gen/tree.c
467
_rb_nfind(const struct rb_type *t, struct rb_tree *rbt, const void *key)
lib/libc/gen/tree.c
476
comp = (*t->t_compare)(key, node);
lib/libc/gen/ttyname.c
71
DBT data, key;
lib/libc/gen/ttyname.c
94
key.data = &bkey;
lib/libc/gen/ttyname.c
95
key.size = sizeof(bkey);
lib/libc/gen/ttyname.c
96
if (!(db->get)(db, &key, &data, 0)) {
lib/libc/hash/siphash.c
142
SipHash(const SIPHASH_KEY *key, int rc, int rf, const void *src, size_t len)
lib/libc/hash/siphash.c
146
SipHash_Init(&ctx, key);
lib/libc/hash/siphash.c
55
SipHash_Init(SIPHASH_CTX *ctx, const SIPHASH_KEY *key)
lib/libc/hash/siphash.c
59
k0 = le64toh(key->k0);
lib/libc/hash/siphash.c
60
k1 = le64toh(key->k1);
lib/libc/stdlib/bsearch.c
50
bsearch(const void *key, const void *base0, size_t nmemb, size_t size,
lib/libc/stdlib/bsearch.c
60
cmp = (*compar)(key, p);
lib/libc/stdlib/hcreate.c
145
free(ie->ent.key);
lib/libc/stdlib/hcreate.c
162
_DIAGASSERT(item.key != NULL);
lib/libc/stdlib/hcreate.c
165
len = strlen(item.key);
lib/libc/stdlib/hcreate.c
166
hashval = __default_hash(item.key, len);
lib/libc/stdlib/hcreate.c
171
if (strcmp(ie->ent.key, item.key) == 0)
lib/libc/stdlib/hcreate.c
184
ie->ent.key = item.key;
lib/libc/stdlib/icdb.c
218
icdb_lookup(struct icdb *db, int keynum, const void *key, void *entry,
lib/libc/stdlib/icdb.c
233
hash = SipHash24(&info->siphashkey, key, info->keysize[keynum]);
lib/libc/stdlib/icdb.c
239
if (memcmp((uint8_t *)entry + info->keyoffset[keynum], key,
lib/libc/stdlib/lsearch.c
42
lsearch(const void *key, void *base, size_t *nelp, size_t width,
lib/libc/stdlib/lsearch.c
45
void *element = lfind(key, base, nelp, width, compar);
lib/libc/stdlib/lsearch.c
52
element = memmove((char *)base + *nelp * width, key, width);
lib/libc/stdlib/lsearch.c
59
lfind(const void *key, const void *base, size_t *nelp, size_t width,
lib/libc/stdlib/lsearch.c
66
if (!compar(key, element)) /* key found */
lib/libc/stdlib/malloc.c
2491
struct leaknode key, *p;
lib/libc/stdlib/malloc.c
2498
key.d.f = f;
lib/libc/stdlib/malloc.c
2499
p = RBT_FIND(leaktree, leaks, &key);
lib/libc/stdlib/tfind.c
17
char *key;
lib/libc/stdlib/tfind.c
26
char *key = (char *)vkey;
lib/libc/stdlib/tfind.c
33
if ((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */
lib/libc/stdlib/tsearch.c
18
char *key;
lib/libc/stdlib/tsearch.c
28
char *key = (char *)vkey;
lib/libc/stdlib/tsearch.c
36
if ((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */
lib/libc/stdlib/tsearch.c
45
q->key = key; /* initialize new node */
lib/libc/stdlib/tsearch.c
57
char *key = (char *)vkey;
lib/libc/stdlib/tsearch.c
65
while ((cmp = (*compar)(key, (*rootp)->key)) != 0) {
lib/libc/thread/rthread_tls.c
104
if (!rkeys[key].used) {
lib/libc/thread/rthread_tls.c
112
if (rs->keyid == key)
lib/libc/thread/rthread_tls.c
119
rs->keyid = key;
lib/libc/thread/rthread_tls.c
130
pthread_getspecific(pthread_key_t key)
lib/libc/thread/rthread_tls.c
134
if (key < 0 || key >= PTHREAD_KEYS_MAX)
lib/libc/thread/rthread_tls.c
137
rs = _rthread_findstorage(key);
lib/libc/thread/rthread_tls.c
146
pthread_setspecific(pthread_key_t key, const void *data)
lib/libc/thread/rthread_tls.c
150
if (key < 0 || key >= PTHREAD_KEYS_MAX)
lib/libc/thread/rthread_tls.c
153
rs = _rthread_findstorage(key);
lib/libc/thread/rthread_tls.c
38
pthread_key_create(pthread_key_t *key, void (*destructor)(void*))
lib/libc/thread/rthread_tls.c
58
*key = hint++;
lib/libc/thread/rthread_tls.c
68
pthread_key_delete(pthread_key_t key)
lib/libc/thread/rthread_tls.c
73
if (key < 0 || key >= PTHREAD_KEYS_MAX)
lib/libc/thread/rthread_tls.c
77
if (!rkeys[key].used) {
lib/libc/thread/rthread_tls.c
82
rkeys[key].used = 0;
lib/libc/thread/rthread_tls.c
83
rkeys[key].destructor = NULL;
lib/libc/thread/rthread_tls.c
85
_thread_cb.tc_thread_key_zero(key);
lib/libc/thread/rthread_tls.c
88
if (rs->keyid == key)
lib/libc/thread/rthread_tls.c
99
_rthread_findstorage(pthread_key_t key)
lib/libc/yp/xdr_ypreq_key.c
42
return xdr_keydat(xdrs, &objp->key);
lib/libc/yp/xdr_ypresp_key_val.c
42
return xdr_keydat(xdrs, &objp->key);
lib/libc/yp/yp_all.c
49
char *key, *val;
lib/libc/yp/yp_all.c
65
size = out.ypresp_all_u.val.key.keydat_len;
lib/libc/yp/yp_all.c
66
if ((key = malloc(size + 1)) == NULL) {
lib/libc/yp/yp_all.c
70
(void)memcpy(key, out.ypresp_all_u.val.key.keydat_val,
lib/libc/yp/yp_all.c
72
key[size] = '\0';
lib/libc/yp/yp_all.c
76
free(key);
lib/libc/yp/yp_all.c
84
done = (*ypresp_allfn)(status, key,
lib/libc/yp/yp_all.c
85
out.ypresp_all_u.val.key.keydat_len, val,
lib/libc/yp/yp_all.c
87
free(key);
lib/libc/yp/yp_first.c
76
*outkeylen = yprkv.key.keydat_len;
lib/libc/yp/yp_first.c
83
(void)memcpy(*outkey, yprkv.key.keydat_val, *outkeylen);
lib/libc/yp/ypmatch_cache.c
108
ypmatch_find(const char *map, const char *key, u_int keylen, char **val,
lib/libc/yp/ypmatch_cache.c
124
if (memcmp(ep->key, key, keylen))
lib/libc/yp/ypmatch_cache.c
180
yprk.key.keydat_val = (char *) inkey;
lib/libc/yp/ypmatch_cache.c
181
yprk.key.keydat_len = inkeylen;
lib/libc/yp/ypmatch_cache.c
242
yprk.key.keydat_val = (char *)inkey;
lib/libc/yp/ypmatch_cache.c
243
yprk.key.keydat_len = inkeylen;
lib/libc/yp/ypmatch_cache.c
255
*outkeylen = yprkv.key.keydat_len;
lib/libc/yp/ypmatch_cache.c
262
(void)memcpy(*outkey, yprkv.key.keydat_val, *outkeylen);
lib/libc/yp/ypmatch_cache.c
44
char *map, *key;
lib/libc/yp/ypmatch_cache.c
53
ypmatch_add(const char *map, const char *key, u_int keylen, char *val,
lib/libc/yp/ypmatch_cache.c
91
free(ep->key);
lib/libc/yp/ypmatch_cache.c
96
(void)memcpy(newkey, key, keylen);
lib/libc/yp/ypmatch_cache.c
99
ep->key = newkey;
lib/libcbor/src/cbor.c
251
cbor_item_t *key_copy = cbor_copy(it[i].key);
lib/libcbor/src/cbor.c
262
if (!cbor_map_add(res, (struct cbor_pair){.key = key_copy,
lib/libcbor/src/cbor.c
374
_cbor_nested_describe(cbor_map_handle(item)[i].key, out, indent + 4);
lib/libcbor/src/cbor/common.c
134
cbor_decref(&handle->key);
lib/libcbor/src/cbor/data.h
202
cbor_item_t *key, *value;
lib/libcbor/src/cbor/maps.c
108
if (!_cbor_map_add_key(item, pair.key)) return false;
lib/libcbor/src/cbor/maps.c
52
bool _cbor_map_add_key(cbor_item_t *item, cbor_item_t *key) {
lib/libcbor/src/cbor/maps.c
63
data[metadata->end_ptr].key = key;
lib/libcbor/src/cbor/maps.c
88
data[metadata->end_ptr].key = key;
lib/libcbor/src/cbor/maps.c
91
cbor_incref(key);
lib/libcbor/src/cbor/maps.h
74
cbor_item_t *key);
lib/libcbor/src/cbor/serialization.c
130
_cbor_safe_signaling_add(cbor_serialized_size(items[i].key),
lib/libcbor/src/cbor/serialization.c
317
cbor_serialize(handle->key, buffer + written, buffer_size - written);
lib/libcrypto/aes/aes.c
104
AES_set_decrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key)
lib/libcrypto/aes/aes.c
106
if (userKey == NULL || key == NULL)
lib/libcrypto/aes/aes.c
109
explicit_bzero(key->rd_key, sizeof(key->rd_key));
lib/libcrypto/aes/aes.c
111
if ((key->rounds = aes_rounds_for_key_length(bits)) <= 0)
lib/libcrypto/aes/aes.c
114
return aes_set_decrypt_key_internal(userKey, bits, key);
lib/libcrypto/aes/aes.c
119
AES_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key)
lib/libcrypto/aes/aes.c
121
aes_encrypt_internal(in, out, key);
lib/libcrypto/aes/aes.c
126
AES_decrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key)
lib/libcrypto/aes/aes.c
128
aes_decrypt_internal(in, out, key);
lib/libcrypto/aes/aes.c
133
aes_encrypt_block128(const unsigned char *in, unsigned char *out, const void *key)
lib/libcrypto/aes/aes.c
135
aes_encrypt_internal(in, out, key);
lib/libcrypto/aes/aes.c
139
aes_decrypt_block128(const unsigned char *in, unsigned char *out, const void *key)
lib/libcrypto/aes/aes.c
141
aes_decrypt_internal(in, out, key);
lib/libcrypto/aes/aes.c
146
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc);
lib/libcrypto/aes/aes.c
151
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc)
lib/libcrypto/aes/aes.c
154
CRYPTO_cbc128_encrypt(in, out, len, key, ivec,
lib/libcrypto/aes/aes.c
157
CRYPTO_cbc128_decrypt(in, out, len, key, ivec,
lib/libcrypto/aes/aes.c
164
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc)
lib/libcrypto/aes/aes.c
166
aes_cbc_encrypt_internal(in, out, len, key, ivec, enc);
lib/libcrypto/aes/aes.c
178
const AES_KEY *key, unsigned char *ivec, int *num, const int enc)
lib/libcrypto/aes/aes.c
180
CRYPTO_cfb128_encrypt(in, out, length, key, ivec, num, enc,
lib/libcrypto/aes/aes.c
188
const AES_KEY *key, unsigned char *ivec, int *num, const int enc)
lib/libcrypto/aes/aes.c
190
CRYPTO_cfb128_1_encrypt(in, out, length, key, ivec, num, enc,
lib/libcrypto/aes/aes.c
197
const AES_KEY *key, unsigned char *ivec, int *num, const int enc)
lib/libcrypto/aes/aes.c
199
CRYPTO_cfb128_8_encrypt(in, out, length, key, ivec, num, enc,
lib/libcrypto/aes/aes.c
206
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes.c
222
aes_encrypt_internal(iv, buf, key);
lib/libcrypto/aes/aes.c
230
aes_encrypt_internal(cmac, cmac, key);
lib/libcrypto/aes/aes.c
243
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes.c
249
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes.c
252
aes_ccm64_encrypt_generic(in, out, blocks, key, ivec, cmac, encrypt);
lib/libcrypto/aes/aes.c
258
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes.c
261
aes_ccm64_encrypt_internal(in, out, blocks, key, ivec, cmac, 1);
lib/libcrypto/aes/aes.c
266
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes.c
269
aes_ccm64_encrypt_internal(in, out, blocks, key, ivec, cmac, 0);
lib/libcrypto/aes/aes.c
274
size_t blocks, const AES_KEY *key, const unsigned char ivec[AES_BLOCK_SIZE])
lib/libcrypto/aes/aes.c
286
aes_encrypt_internal(iv, buf, key);
lib/libcrypto/aes/aes.c
303
size_t blocks, const AES_KEY *key, const unsigned char ivec[AES_BLOCK_SIZE]);
lib/libcrypto/aes/aes.c
308
size_t blocks, const AES_KEY *key, const unsigned char ivec[AES_BLOCK_SIZE])
lib/libcrypto/aes/aes.c
310
aes_ctr32_encrypt_generic(in, out, blocks, key, ivec);
lib/libcrypto/aes/aes.c
316
const void *key, const unsigned char ivec[AES_BLOCK_SIZE])
lib/libcrypto/aes/aes.c
318
aes_ctr32_encrypt_internal(in, out, blocks, key, ivec);
lib/libcrypto/aes/aes.c
323
size_t length, const AES_KEY *key, unsigned char ivec[AES_BLOCK_SIZE],
lib/libcrypto/aes/aes.c
326
CRYPTO_ctr128_encrypt_ctr32(in, out, length, key, ivec, ecount_buf,
lib/libcrypto/aes/aes.c
333
const AES_KEY *key, const int enc)
lib/libcrypto/aes/aes.c
336
AES_encrypt(in, out, key);
lib/libcrypto/aes/aes.c
338
AES_decrypt(in, out, key);
lib/libcrypto/aes/aes.c
345
size_t len, const AES_KEY *key, int encrypt)
lib/libcrypto/aes/aes.c
348
AES_ecb_encrypt(in, out, key, encrypt);
lib/libcrypto/aes/aes.c
363
const AES_KEY *key, unsigned char *ivec, const int enc)
lib/libcrypto/aes/aes.c
386
(unsigned char *)tmp2.data, key);
lib/libcrypto/aes/aes.c
403
(unsigned char *)tmp.data, key);
lib/libcrypto/aes/aes.c
421
const AES_KEY *key, unsigned char *ivec, int *num)
lib/libcrypto/aes/aes.c
423
CRYPTO_ofb128_encrypt(in, out, length, key, ivec, num,
lib/libcrypto/aes/aes.c
458
AES_wrap_key(AES_KEY *key, const unsigned char *iv, unsigned char *out,
lib/libcrypto/aes/aes.c
478
AES_encrypt(B, B, key);
lib/libcrypto/aes/aes.c
494
AES_unwrap_key(AES_KEY *key, const unsigned char *iv, unsigned char *out,
lib/libcrypto/aes/aes.c
517
AES_decrypt(B, B, key);
lib/libcrypto/aes/aes.c
67
AES_KEY *key);
lib/libcrypto/aes/aes.c
69
AES_KEY *key);
lib/libcrypto/aes/aes.c
71
const AES_KEY *key);
lib/libcrypto/aes/aes.c
73
const AES_KEY *key);
lib/libcrypto/aes/aes.c
89
AES_set_encrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key)
lib/libcrypto/aes/aes.c
91
if (userKey == NULL || key == NULL)
lib/libcrypto/aes/aes.c
94
explicit_bzero(key->rd_key, sizeof(key->rd_key));
lib/libcrypto/aes/aes.c
96
if ((key->rounds = aes_rounds_for_key_length(bits)) <= 0)
lib/libcrypto/aes/aes.c
99
return aes_set_encrypt_key_internal(userKey, bits, key);
lib/libcrypto/aes/aes.h
102
size_t length, const AES_KEY *key, unsigned char *ivec, int *num);
lib/libcrypto/aes/aes.h
104
size_t length, const AES_KEY *key, unsigned char ivec[AES_BLOCK_SIZE],
lib/libcrypto/aes/aes.h
108
size_t length, const AES_KEY *key, unsigned char *ivec, const int enc);
lib/libcrypto/aes/aes.h
110
int AES_wrap_key(AES_KEY *key, const unsigned char *iv, unsigned char *out,
lib/libcrypto/aes/aes.h
112
int AES_unwrap_key(AES_KEY *key, const unsigned char *iv, unsigned char *out,
lib/libcrypto/aes/aes.h
79
AES_KEY *key);
lib/libcrypto/aes/aes.h
81
AES_KEY *key);
lib/libcrypto/aes/aes.h
84
const AES_KEY *key);
lib/libcrypto/aes/aes.h
86
const AES_KEY *key);
lib/libcrypto/aes/aes.h
89
const AES_KEY *key, const int enc);
lib/libcrypto/aes/aes.h
91
size_t length, const AES_KEY *key, unsigned char *ivec, const int enc);
lib/libcrypto/aes/aes.h
93
size_t length, const AES_KEY *key, unsigned char *ivec, int *num,
lib/libcrypto/aes/aes.h
96
size_t length, const AES_KEY *key, unsigned char *ivec, int *num,
lib/libcrypto/aes/aes.h
99
size_t length, const AES_KEY *key, unsigned char *ivec, int *num,
lib/libcrypto/aes/aes_amd64.c
104
const AES_KEY *key)
lib/libcrypto/aes/aes_amd64.c
107
aesni_encrypt(in, out, key);
lib/libcrypto/aes/aes_amd64.c
111
aes_encrypt_generic(in, out, key);
lib/libcrypto/aes/aes_amd64.c
116
const AES_KEY *key)
lib/libcrypto/aes/aes_amd64.c
119
aesni_decrypt(in, out, key);
lib/libcrypto/aes/aes_amd64.c
123
aes_decrypt_generic(in, out, key);
lib/libcrypto/aes/aes_amd64.c
128
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc)
lib/libcrypto/aes/aes_amd64.c
131
aesni_cbc_encrypt(in, out, len, key, ivec, enc);
lib/libcrypto/aes/aes_amd64.c
135
aes_cbc_encrypt_generic(in, out, len, key, ivec, enc);
lib/libcrypto/aes/aes_amd64.c
140
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_amd64.c
145
aesni_ccm64_encrypt_blocks(in, out, blocks, key, ivec, cmac);
lib/libcrypto/aes/aes_amd64.c
147
aesni_ccm64_decrypt_blocks(in, out, blocks, key, ivec, cmac);
lib/libcrypto/aes/aes_amd64.c
151
aes_ccm64_encrypt_generic(in, out, blocks, key, ivec, cmac, encrypt);
lib/libcrypto/aes/aes_amd64.c
156
size_t blocks, const AES_KEY *key, const unsigned char ivec[AES_BLOCK_SIZE])
lib/libcrypto/aes/aes_amd64.c
159
aesni_ctr32_encrypt_blocks(in, out, blocks, key, ivec);
lib/libcrypto/aes/aes_amd64.c
163
aes_ctr32_encrypt_generic(in, out, blocks, key, ivec);
lib/libcrypto/aes/aes_amd64.c
168
size_t len, const AES_KEY *key, int encrypt)
lib/libcrypto/aes/aes_amd64.c
171
aesni_ecb_encrypt(in, out, len, key, encrypt);
lib/libcrypto/aes/aes_amd64.c
177
aes_encrypt_generic(in, out, key);
lib/libcrypto/aes/aes_amd64.c
179
aes_decrypt_generic(in, out, key);
lib/libcrypto/aes/aes_amd64.c
24
AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
26
AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
29
const AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
31
const AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
34
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc);
lib/libcrypto/aes/aes_amd64.c
37
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_amd64.c
41
size_t blocks, const AES_KEY *key, const unsigned char ivec[AES_BLOCK_SIZE]);
lib/libcrypto/aes/aes_amd64.c
48
AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
50
AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
53
const AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
55
const AES_KEY *key);
lib/libcrypto/aes/aes_amd64.c
58
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc);
lib/libcrypto/aes/aes_amd64.c
61
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_amd64.c
65
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_amd64.c
69
size_t blocks, const void *key, const unsigned char *ivec);
lib/libcrypto/aes/aes_amd64.c
72
size_t length, const AES_KEY *key, int enc);
lib/libcrypto/aes/aes_amd64.c
84
AES_KEY *key)
lib/libcrypto/aes/aes_amd64.c
87
return aesni_set_encrypt_key(userKey, bits, key);
lib/libcrypto/aes/aes_amd64.c
89
return aes_set_encrypt_key_generic(userKey, bits, key);
lib/libcrypto/aes/aes_amd64.c
94
AES_KEY *key)
lib/libcrypto/aes/aes_amd64.c
97
return aesni_set_decrypt_key(userKey, bits, key);
lib/libcrypto/aes/aes_amd64.c
99
return aes_set_decrypt_key_generic(userKey, bits, key);
lib/libcrypto/aes/aes_core.c
1002
const AES_KEY *key)
lib/libcrypto/aes/aes_core.c
1004
aes_encrypt_generic(in, out, key);
lib/libcrypto/aes/aes_core.c
1014
const AES_KEY *key)
lib/libcrypto/aes/aes_core.c
1022
rk = key->rd_key;
lib/libcrypto/aes/aes_core.c
1078
if (key->rounds > 10) {
lib/libcrypto/aes/aes_core.c
1089
if (key->rounds > 12) {
lib/libcrypto/aes/aes_core.c
1102
rk += key->rounds << 2;
lib/libcrypto/aes/aes_core.c
1107
r = key->rounds >> 1;
lib/libcrypto/aes/aes_core.c
1203
const AES_KEY *key)
lib/libcrypto/aes/aes_core.c
1205
aes_decrypt_generic(in, out, key);
lib/libcrypto/aes/aes_core.c
642
AES_KEY *key)
lib/libcrypto/aes/aes_core.c
648
rk = key->rd_key;
lib/libcrypto/aes/aes_core.c
731
AES_KEY *key)
lib/libcrypto/aes/aes_core.c
733
return aes_set_encrypt_key_generic(userKey, bits, key);
lib/libcrypto/aes/aes_core.c
743
AES_KEY *key)
lib/libcrypto/aes/aes_core.c
750
if ((ret = aes_set_encrypt_key_generic(userKey, bits, key)) < 0)
lib/libcrypto/aes/aes_core.c
753
rk = key->rd_key;
lib/libcrypto/aes/aes_core.c
756
for (i = 0, j = 4 * (key->rounds); i < j; i += 4, j -= 4) {
lib/libcrypto/aes/aes_core.c
771
for (i = 1; i < (key->rounds); i++) {
lib/libcrypto/aes/aes_core.c
801
AES_KEY *key)
lib/libcrypto/aes/aes_core.c
803
return aes_set_decrypt_key_generic(userKey, bits, key);
lib/libcrypto/aes/aes_core.c
813
const AES_KEY *key)
lib/libcrypto/aes/aes_core.c
821
rk = key->rd_key;
lib/libcrypto/aes/aes_core.c
877
if (key->rounds > 10) {
lib/libcrypto/aes/aes_core.c
888
if (key->rounds > 12) {
lib/libcrypto/aes/aes_core.c
901
rk += key->rounds << 2;
lib/libcrypto/aes/aes_core.c
906
r = key->rounds >> 1;
lib/libcrypto/aes/aes_i386.c
104
const AES_KEY *key)
lib/libcrypto/aes/aes_i386.c
107
aesni_encrypt(in, out, key);
lib/libcrypto/aes/aes_i386.c
111
aes_encrypt_generic(in, out, key);
lib/libcrypto/aes/aes_i386.c
116
const AES_KEY *key)
lib/libcrypto/aes/aes_i386.c
119
aesni_decrypt(in, out, key);
lib/libcrypto/aes/aes_i386.c
123
aes_decrypt_generic(in, out, key);
lib/libcrypto/aes/aes_i386.c
128
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc)
lib/libcrypto/aes/aes_i386.c
131
aesni_cbc_encrypt(in, out, len, key, ivec, enc);
lib/libcrypto/aes/aes_i386.c
135
aes_cbc_encrypt_generic(in, out, len, key, ivec, enc);
lib/libcrypto/aes/aes_i386.c
140
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_i386.c
145
aesni_ccm64_encrypt_blocks(in, out, blocks, key, ivec, cmac);
lib/libcrypto/aes/aes_i386.c
147
aesni_ccm64_decrypt_blocks(in, out, blocks, key, ivec, cmac);
lib/libcrypto/aes/aes_i386.c
151
aes_ccm64_encrypt_generic(in, out, blocks, key, ivec, cmac, encrypt);
lib/libcrypto/aes/aes_i386.c
156
size_t blocks, const AES_KEY *key, const unsigned char ivec[AES_BLOCK_SIZE])
lib/libcrypto/aes/aes_i386.c
159
aesni_ctr32_encrypt_blocks(in, out, blocks, key, ivec);
lib/libcrypto/aes/aes_i386.c
163
aes_ctr32_encrypt_generic(in, out, blocks, key, ivec);
lib/libcrypto/aes/aes_i386.c
168
size_t len, const AES_KEY *key, int encrypt)
lib/libcrypto/aes/aes_i386.c
171
aesni_ecb_encrypt(in, out, len, key, encrypt);
lib/libcrypto/aes/aes_i386.c
177
aes_encrypt_generic(in, out, key);
lib/libcrypto/aes/aes_i386.c
179
aes_decrypt_generic(in, out, key);
lib/libcrypto/aes/aes_i386.c
24
AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
26
AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
29
const AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
31
const AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
34
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc);
lib/libcrypto/aes/aes_i386.c
37
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_i386.c
41
size_t blocks, const AES_KEY *key, const unsigned char ivec[AES_BLOCK_SIZE]);
lib/libcrypto/aes/aes_i386.c
48
AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
50
AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
53
const AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
55
const AES_KEY *key);
lib/libcrypto/aes/aes_i386.c
58
size_t len, const AES_KEY *key, unsigned char *ivec, const int enc);
lib/libcrypto/aes/aes_i386.c
61
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_i386.c
65
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_i386.c
69
size_t blocks, const void *key, const unsigned char *ivec);
lib/libcrypto/aes/aes_i386.c
72
size_t length, const AES_KEY *key, int enc);
lib/libcrypto/aes/aes_i386.c
84
AES_KEY *key)
lib/libcrypto/aes/aes_i386.c
87
return aesni_set_encrypt_key(userKey, bits, key);
lib/libcrypto/aes/aes_i386.c
89
return aes_set_encrypt_key_generic(userKey, bits, key);
lib/libcrypto/aes/aes_i386.c
94
AES_KEY *key)
lib/libcrypto/aes/aes_i386.c
97
return aesni_set_decrypt_key(userKey, bits, key);
lib/libcrypto/aes/aes_i386.c
99
return aes_set_decrypt_key_generic(userKey, bits, key);
lib/libcrypto/aes/aes_local.h
67
const void *key);
lib/libcrypto/aes/aes_local.h
70
size_t blocks, const void *key, const unsigned char ivec[AES_BLOCK_SIZE]);
lib/libcrypto/aes/aes_local.h
73
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_local.h
77
size_t blocks, const void *key, const unsigned char ivec[16],
lib/libcrypto/aes/aes_local.h
81
size_t len, const AES_KEY *key, int encrypt);
lib/libcrypto/asn1/p8_pkey.c
73
PKCS8_PRIV_KEY_INFO *key = (PKCS8_PRIV_KEY_INFO *)*pval;
lib/libcrypto/asn1/p8_pkey.c
74
if (key->pkey != NULL)
lib/libcrypto/asn1/p8_pkey.c
75
explicit_bzero(key->pkey->data, key->pkey->length);
lib/libcrypto/asn1/t_x509.c
252
if (i2a_ASN1_OBJECT(bp, ci->key->algor->algorithm) <= 0)
lib/libcrypto/asn1/t_x509.c
326
if (!EVP_Digest(x->cert_info->key->public_key->data,
lib/libcrypto/asn1/t_x509.c
327
x->cert_info->key->public_key->length,
lib/libcrypto/asn1/x_pubkey.c
185
X509_PUBKEY_get0(X509_PUBKEY *key)
lib/libcrypto/asn1/x_pubkey.c
189
if (key == NULL)
lib/libcrypto/asn1/x_pubkey.c
192
if (key->pkey != NULL)
lib/libcrypto/asn1/x_pubkey.c
193
return key->pkey;
lib/libcrypto/asn1/x_pubkey.c
195
if (key->public_key == NULL)
lib/libcrypto/asn1/x_pubkey.c
203
if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm))) {
lib/libcrypto/asn1/x_pubkey.c
209
if (!ret->ameth->pub_decode(ret, key)) {
lib/libcrypto/asn1/x_pubkey.c
220
if (key->pkey) {
lib/libcrypto/asn1/x_pubkey.c
223
ret = key->pkey;
lib/libcrypto/asn1/x_pubkey.c
225
key->pkey = ret;
lib/libcrypto/asn1/x_pubkey.c
238
X509_PUBKEY_get(X509_PUBKEY *key)
lib/libcrypto/asn1/x_pubkey.c
242
if ((pkey = X509_PUBKEY_get0(key)) == NULL)
lib/libcrypto/asn1/x_pubkey.c
261
ASN1_VALUE *key = NULL;
lib/libcrypto/asn1/x_pubkey.c
272
key = (ASN1_VALUE *)pkey;
lib/libcrypto/asn1/x_pubkey.c
277
key = (ASN1_VALUE *)EVP_PKEY_get1_DSA(pkey);
lib/libcrypto/asn1/x_pubkey.c
281
key = (ASN1_VALUE *)EVP_PKEY_get1_RSA(pkey);
lib/libcrypto/asn1/x_pubkey.c
285
key = (ASN1_VALUE *)EVP_PKEY_get1_EC_KEY(pkey);
lib/libcrypto/asn1/x_pubkey.c
292
if (key == NULL)
lib/libcrypto/asn1/x_pubkey.c
297
*pval = key;
lib/libcrypto/asn1/x_x509.c
107
.offset = offsetof(X509_CINF, key),
lib/libcrypto/bf/blowfish.c
345
BF_encrypt(BF_LONG *data, const BF_KEY *key)
lib/libcrypto/bf/blowfish.c
350
p = key->P;
lib/libcrypto/bf/blowfish.c
351
s = &(key->S[0]);
lib/libcrypto/bf/blowfish.c
388
BF_decrypt(BF_LONG *data, const BF_KEY *key)
lib/libcrypto/bf/blowfish.c
393
p = key->P;
lib/libcrypto/bf/blowfish.c
394
s = &(key->S[0]);
lib/libcrypto/bf/blowfish.c
571
const BF_KEY *key, int encrypt)
lib/libcrypto/bf/blowfish.c
580
BF_encrypt(d, key);
lib/libcrypto/bf/blowfish.c
582
BF_decrypt(d, key);
lib/libcrypto/bf/blowfish.c
643
BF_set_key(BF_KEY *key, int len, const unsigned char *data)
lib/libcrypto/bf/blowfish.c
649
memcpy(key, &bf_init, sizeof(BF_KEY));
lib/libcrypto/bf/blowfish.c
650
p = key->P;
lib/libcrypto/bf/blowfish.c
683
BF_encrypt(in, key);
lib/libcrypto/bf/blowfish.c
688
p = key->S;
lib/libcrypto/bf/blowfish.c
690
BF_encrypt(in, key);
lib/libcrypto/bf/blowfish.h
88
void BF_set_key(BF_KEY *key, int len, const unsigned char *data);
lib/libcrypto/bf/blowfish.h
90
void BF_encrypt(BF_LONG *data, const BF_KEY *key);
lib/libcrypto/bf/blowfish.h
91
void BF_decrypt(BF_LONG *data, const BF_KEY *key);
lib/libcrypto/bf/blowfish.h
94
const BF_KEY *key, int enc);
lib/libcrypto/camellia/camellia.c
585
CAMELLIA_KEY *key)
lib/libcrypto/camellia/camellia.c
587
if (userKey == NULL || key == NULL)
lib/libcrypto/camellia/camellia.c
591
key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key);
lib/libcrypto/camellia/camellia.c
598
const CAMELLIA_KEY *key)
lib/libcrypto/camellia/camellia.c
600
Camellia_EncryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out);
lib/libcrypto/camellia/camellia.c
606
const CAMELLIA_KEY *key)
lib/libcrypto/camellia/camellia.c
608
Camellia_DecryptBlock_Rounds(key->grand_rounds, in, key->u.rd_key, out);
lib/libcrypto/camellia/camellia.c
614
const CAMELLIA_KEY *key, unsigned char *ivec, const int enc)
lib/libcrypto/camellia/camellia.c
617
CRYPTO_cbc128_encrypt(in, out, len, key, ivec,
lib/libcrypto/camellia/camellia.c
620
CRYPTO_cbc128_decrypt(in, out, len, key, ivec,
lib/libcrypto/camellia/camellia.c
633
size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num,
lib/libcrypto/camellia/camellia.c
636
CRYPTO_cfb128_encrypt(in, out, length, key, ivec, num, enc,
lib/libcrypto/camellia/camellia.c
644
size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num,
lib/libcrypto/camellia/camellia.c
647
CRYPTO_cfb128_1_encrypt(in, out, length, key, ivec, num, enc,
lib/libcrypto/camellia/camellia.c
654
size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num,
lib/libcrypto/camellia/camellia.c
657
CRYPTO_cfb128_8_encrypt(in, out, length, key, ivec, num, enc,
lib/libcrypto/camellia/camellia.c
664
size_t length, const CAMELLIA_KEY *key,
lib/libcrypto/camellia/camellia.c
668
CRYPTO_ctr128_encrypt(in, out, length, key, ivec, ecount_buf, num,
lib/libcrypto/camellia/camellia.c
675
const CAMELLIA_KEY *key, const int enc)
lib/libcrypto/camellia/camellia.c
678
Camellia_encrypt(in, out, key);
lib/libcrypto/camellia/camellia.c
680
Camellia_decrypt(in, out, key);
lib/libcrypto/camellia/camellia.c
691
size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num)
lib/libcrypto/camellia/camellia.c
693
CRYPTO_ofb128_encrypt(in, out, length, key, ivec, num,
lib/libcrypto/camellia/camellia.h
100
size_t length, const CAMELLIA_KEY *key,
lib/libcrypto/camellia/camellia.h
103
size_t length, const CAMELLIA_KEY *key,
lib/libcrypto/camellia/camellia.h
106
size_t length, const CAMELLIA_KEY *key,
lib/libcrypto/camellia/camellia.h
109
size_t length, const CAMELLIA_KEY *key,
lib/libcrypto/camellia/camellia.h
112
size_t length, const CAMELLIA_KEY *key,
lib/libcrypto/camellia/camellia.h
87
CAMELLIA_KEY *key);
lib/libcrypto/camellia/camellia.h
90
const CAMELLIA_KEY *key);
lib/libcrypto/camellia/camellia.h
92
const CAMELLIA_KEY *key);
lib/libcrypto/camellia/camellia.h
95
const CAMELLIA_KEY *key, const int enc);
lib/libcrypto/camellia/camellia.h
97
size_t length, const CAMELLIA_KEY *key,
lib/libcrypto/cast/cast.c
594
CAST_encrypt(CAST_LONG *data, const CAST_KEY *key)
lib/libcrypto/cast/cast.c
599
k = &(key->data[0]);
lib/libcrypto/cast/cast.c
615
if (!key->short_key) {
lib/libcrypto/cast/cast.c
628
CAST_decrypt(CAST_LONG *data, const CAST_KEY *key)
lib/libcrypto/cast/cast.c
633
k = &(key->data[0]);
lib/libcrypto/cast/cast.c
637
if (!key->short_key) {
lib/libcrypto/cast/cast.c
674
CAST_set_key(CAST_KEY *key, int len, const unsigned char *data)
lib/libcrypto/cast/cast.c
691
key->short_key = 1;
lib/libcrypto/cast/cast.c
693
key->short_key = 0;
lib/libcrypto/cast/cast.c
763
key->data[i*2] = k[i];
lib/libcrypto/cast/cast.c
764
key->data[i*2 + 1] = ((k[i + 16]) + 16)&0x1f;
lib/libcrypto/cast/cast.h
81
void CAST_set_key(CAST_KEY *key, int len, const unsigned char *data);
lib/libcrypto/cast/cast.h
82
void CAST_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAST_KEY *key,
lib/libcrypto/cast/cast.h
84
void CAST_encrypt(CAST_LONG *data, const CAST_KEY *key);
lib/libcrypto/cast/cast.h
85
void CAST_decrypt(CAST_LONG *data, const CAST_KEY *key);
lib/libcrypto/cast/cast_local.h
161
#define E_CAST(n,key,L,R,OP1,OP2,OP3) \
lib/libcrypto/cast/cast_local.h
164
t=(key[n*2] OP1 R)&0xffffffffL; \
lib/libcrypto/cast/cast_local.h
165
i=key[n*2+1]; \
lib/libcrypto/cast/cast_local.h
177
#define E_CAST(n,key,L,R,OP1,OP2,OP3) \
lib/libcrypto/cast/cast_local.h
181
w=(key[n*2] OP1 R)&0xffffffffL; \
lib/libcrypto/cast/cast_local.h
182
i=key[n*2+1]; \
lib/libcrypto/cast/cast_local.h
199
#define E_CAST(n,key,L,R,OP1,OP2,OP3) \
lib/libcrypto/cast/cast_local.h
202
t=(key[n*2] OP1 R)&0xffffffff; \
lib/libcrypto/cast/cast_local.h
203
t=ROTL(t,(key[n*2+1])); \
lib/libcrypto/chacha/chacha-merged.c
279
CRYPTO_hchacha_20(unsigned char subkey[32], const unsigned char key[32],
lib/libcrypto/chacha/chacha-merged.c
289
x[4] = U8TO32_LITTLE(key + 0);
lib/libcrypto/chacha/chacha-merged.c
290
x[5] = U8TO32_LITTLE(key + 4);
lib/libcrypto/chacha/chacha-merged.c
291
x[6] = U8TO32_LITTLE(key + 8);
lib/libcrypto/chacha/chacha-merged.c
292
x[7] = U8TO32_LITTLE(key + 12);
lib/libcrypto/chacha/chacha-merged.c
293
x[8] = U8TO32_LITTLE(key + 16);
lib/libcrypto/chacha/chacha-merged.c
294
x[9] = U8TO32_LITTLE(key + 20);
lib/libcrypto/chacha/chacha-merged.c
295
x[10] = U8TO32_LITTLE(key + 24);
lib/libcrypto/chacha/chacha-merged.c
296
x[11] = U8TO32_LITTLE(key + 28);
lib/libcrypto/chacha/chacha.c
105
const unsigned char key[32], const unsigned char iv[24])
lib/libcrypto/chacha/chacha.c
109
CRYPTO_hchacha_20(subkey, key, iv);
lib/libcrypto/chacha/chacha.c
25
ChaCha_set_key(ChaCha_ctx *ctx, const unsigned char *key, uint32_t keybits)
lib/libcrypto/chacha/chacha.c
27
chacha_keysetup((chacha_ctx *)ctx, key, keybits);
lib/libcrypto/chacha/chacha.c
73
const unsigned char key[32], const unsigned char iv[8], uint64_t counter)
lib/libcrypto/chacha/chacha.c
83
chacha_keysetup(&ctx, key, 256);
lib/libcrypto/chacha/chacha.h
36
void ChaCha_set_key(ChaCha_ctx *ctx, const unsigned char *key,
lib/libcrypto/chacha/chacha.h
44
const unsigned char key[32], const unsigned char iv[8], uint64_t counter);
lib/libcrypto/chacha/chacha.h
46
const unsigned char key[32], const unsigned char iv[24]);
lib/libcrypto/chacha/chacha.h
48
const unsigned char key[32], const unsigned char iv[16]);
lib/libcrypto/cmac/cm_pmeth.c
187
unsigned char *key;
lib/libcrypto/cmac/cm_pmeth.c
191
key = string_to_hex(value, &keylen);
lib/libcrypto/cmac/cm_pmeth.c
192
if (!key)
lib/libcrypto/cmac/cm_pmeth.c
194
r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
lib/libcrypto/cmac/cm_pmeth.c
195
free(key);
lib/libcrypto/cmac/cmac.c
182
CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
lib/libcrypto/cmac/cmac.c
189
if (key == NULL && cipher == NULL && keylen == 0) {
lib/libcrypto/cmac/cmac.c
214
if (key != NULL) {
lib/libcrypto/cmac/cmac.c
229
if (!EVP_EncryptInit_ex(ctx->cipher_ctx, NULL, NULL, key, zero_iv))
lib/libcrypto/cmac/cmac.h
73
int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
lib/libcrypto/cms/cms.h
177
int CMS_EncryptedData_decrypt(CMS_ContentInfo *cms, const unsigned char *key,
lib/libcrypto/cms/cms.h
181
const unsigned char *key, size_t keylen, unsigned int flags);
lib/libcrypto/cms/cms.h
184
const unsigned char *key, size_t keylen);
lib/libcrypto/cms/cms.h
201
int CMS_decrypt_set1_key(CMS_ContentInfo *cms, unsigned char *key,
lib/libcrypto/cms/cms.h
220
unsigned char *key, size_t keylen, unsigned char *id, size_t idlen,
lib/libcrypto/cms/cms.h
227
int CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, unsigned char *key,
lib/libcrypto/cms/cms_asn1.c
940
freezero(kekri->key, kekri->keylen);
lib/libcrypto/cms/cms_enc.c
103
if (ec->key)
lib/libcrypto/cms/cms_enc.c
134
if (!enc || !ec->key) {
lib/libcrypto/cms/cms_enc.c
144
if (!ec->key) {
lib/libcrypto/cms/cms_enc.c
145
ec->key = tkey;
lib/libcrypto/cms/cms_enc.c
167
freezero(ec->key, ec->keylen);
lib/libcrypto/cms/cms_enc.c
168
ec->key = tkey;
lib/libcrypto/cms/cms_enc.c
176
if (EVP_CipherInit_ex(ctx, NULL, NULL, ec->key, piv, enc) <= 0) {
lib/libcrypto/cms/cms_enc.c
200
freezero(ec->key, ec->keylen);
lib/libcrypto/cms/cms_enc.c
201
ec->key = NULL;
lib/libcrypto/cms/cms_enc.c
212
const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen)
lib/libcrypto/cms/cms_enc.c
215
if (key) {
lib/libcrypto/cms/cms_enc.c
216
if ((ec->key = malloc(keylen)) == NULL) {
lib/libcrypto/cms/cms_enc.c
220
memcpy(ec->key, key, keylen);
lib/libcrypto/cms/cms_enc.c
231
const unsigned char *key, size_t keylen)
lib/libcrypto/cms/cms_enc.c
235
if (!key || !keylen) {
lib/libcrypto/cms/cms_enc.c
253
return cms_EncryptedContent_init(ec, ciph, key, keylen);
lib/libcrypto/cms/cms_env.c
405
if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
lib/libcrypto/cms/cms_env.c
415
if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
lib/libcrypto/cms/cms_env.c
502
freezero(ec->key, ec->keylen);
lib/libcrypto/cms/cms_env.c
503
ec->key = ek;
lib/libcrypto/cms/cms_env.c
559
CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, unsigned char *key,
lib/libcrypto/cms/cms_env.c
631
kekri->key = key;
lib/libcrypto/cms/cms_env.c
692
CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, unsigned char *key,
lib/libcrypto/cms/cms_env.c
703
kekri->key = key;
lib/libcrypto/cms/cms_env.c
724
if (!kekri->key) {
lib/libcrypto/cms/cms_env.c
729
if (AES_set_encrypt_key(kekri->key, kekri->keylen << 3, &actx)) {
lib/libcrypto/cms/cms_env.c
740
wkeylen = AES_wrap_key(&actx, NULL, wkey, ec->key, ec->keylen);
lib/libcrypto/cms/cms_env.c
773
if (!kekri->key) {
lib/libcrypto/cms/cms_env.c
791
if (AES_set_decrypt_key(kekri->key, kekri->keylen << 3, &actx)) {
lib/libcrypto/cms/cms_env.c
810
freezero(ec->key, ec->keylen);
lib/libcrypto/cms/cms_env.c
811
ec->key = ukey;
lib/libcrypto/cms/cms_env.c
972
freezero(ec->key, ec->keylen);
lib/libcrypto/cms/cms_env.c
973
ec->key = NULL;
lib/libcrypto/cms/cms_kari.c
307
freezero(ec->key, ec->keylen);
lib/libcrypto/cms/cms_kari.c
308
ec->key = cek;
lib/libcrypto/cms/cms_kari.c
483
if (!cms_kek_cipher(&enckey, &enckeylen, ec->key, ec->keylen,
lib/libcrypto/cms/cms_local.h
171
unsigned char *key;
lib/libcrypto/cms/cms_local.h
257
unsigned char *key;
lib/libcrypto/cms/cms_local.h
435
const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen);
lib/libcrypto/cms/cms_pwri.c
339
unsigned char *key = NULL;
lib/libcrypto/cms/cms_pwri.c
401
if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, kekctx))
lib/libcrypto/cms/cms_pwri.c
404
key = malloc(keylen);
lib/libcrypto/cms/cms_pwri.c
405
if (key == NULL)
lib/libcrypto/cms/cms_pwri.c
408
if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, kekctx))
lib/libcrypto/cms/cms_pwri.c
410
pwri->encryptedKey->data = key;
lib/libcrypto/cms/cms_pwri.c
413
key = malloc(pwri->encryptedKey->length);
lib/libcrypto/cms/cms_pwri.c
414
if (key == NULL) {
lib/libcrypto/cms/cms_pwri.c
418
if (!kek_unwrap_key(key, &keylen, pwri->encryptedKey->data,
lib/libcrypto/cms/cms_pwri.c
424
freezero(ec->key, ec->keylen);
lib/libcrypto/cms/cms_pwri.c
425
ec->key = key;
lib/libcrypto/cms/cms_pwri.c
434
free(key);
lib/libcrypto/cms/cms_smime.c
250
CMS_EncryptedData_decrypt(CMS_ContentInfo *cms, const unsigned char *key,
lib/libcrypto/cms/cms_smime.c
264
if (CMS_EncryptedData_set1_key(cms, NULL, key, keylen) <= 0)
lib/libcrypto/cms/cms_smime.c
278
const unsigned char *key, size_t keylen, unsigned int flags)
lib/libcrypto/cms/cms_smime.c
290
if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen))
lib/libcrypto/cms/cms_smime.c
774
CMS_decrypt_set1_key(CMS_ContentInfo *cms, unsigned char *key, size_t keylen,
lib/libcrypto/cms/cms_smime.c
792
CMS_RecipientInfo_set0_key(ri, key, keylen);
lib/libcrypto/des/des.h
191
void DES_set_odd_parity(DES_cblock *key);
lib/libcrypto/des/des.h
192
int DES_check_key_parity(const_DES_cblock *key);
lib/libcrypto/des/des.h
193
int DES_is_weak_key(const_DES_cblock *key);
lib/libcrypto/des/des.h
197
int DES_set_key(const_DES_cblock *key, DES_key_schedule *schedule);
lib/libcrypto/des/des.h
198
int DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule);
lib/libcrypto/des/des.h
199
int DES_set_key_checked(const_DES_cblock *key, DES_key_schedule *schedule);
lib/libcrypto/des/des.h
200
void DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule);
lib/libcrypto/des/des.h
201
void DES_string_to_key(const char *str, DES_cblock *key);
lib/libcrypto/des/des_fcrypt.c
176
DES_cblock key;
lib/libcrypto/des/des_fcrypt.c
202
key[i] = (c << 1);
lib/libcrypto/des/des_fcrypt.c
205
key[i] = 0;
lib/libcrypto/des/des_fcrypt.c
207
DES_set_key_unchecked(&key, &ks);
lib/libcrypto/des/des_key.c
103
if ((*key)[i] != odd_parity[(*key)[i]])
lib/libcrypto/des/des_key.c
142
DES_is_weak_key(const_DES_cblock *key)
lib/libcrypto/des/des_key.c
147
if (memcmp(weak_keys[i], key, sizeof(DES_cblock)) == 0)
lib/libcrypto/des/des_key.c
312
DES_set_key(const_DES_cblock *key, DES_key_schedule *schedule)
lib/libcrypto/des/des_key.c
315
return DES_set_key_checked(key, schedule);
lib/libcrypto/des/des_key.c
317
DES_set_key_unchecked(key, schedule);
lib/libcrypto/des/des_key.c
328
DES_set_key_checked(const_DES_cblock *key, DES_key_schedule *schedule)
lib/libcrypto/des/des_key.c
330
if (!DES_check_key_parity(key))
lib/libcrypto/des/des_key.c
332
if (DES_is_weak_key(key))
lib/libcrypto/des/des_key.c
334
DES_set_key_unchecked(key, schedule);
lib/libcrypto/des/des_key.c
340
DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule)
lib/libcrypto/des/des_key.c
349
in = &(*key)[0];
lib/libcrypto/des/des_key.c
400
DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule)
lib/libcrypto/des/des_key.c
402
return (DES_set_key(key, schedule));
lib/libcrypto/des/des_key.c
418
DES_string_to_key(const char *str, DES_cblock *key)
lib/libcrypto/des/des_key.c
424
memset(key, 0, 8);
lib/libcrypto/des/des_key.c
428
(*key)[i % 8] ^= (str[i] << 1);
lib/libcrypto/des/des_key.c
433
(*key)[i % 8] ^= (j << 1);
lib/libcrypto/des/des_key.c
439
(*key)[7 - (i % 8)] ^= j;
lib/libcrypto/des/des_key.c
443
DES_set_odd_parity(key);
lib/libcrypto/des/des_key.c
445
if (DES_is_weak_key(key))
lib/libcrypto/des/des_key.c
446
(*key)[7] ^= 0xF0;
lib/libcrypto/des/des_key.c
447
DES_set_key(key, &ks);
lib/libcrypto/des/des_key.c
449
DES_set_key_unchecked(key, &ks);
lib/libcrypto/des/des_key.c
451
DES_cbc_cksum((const unsigned char *)str, key, length, &ks, key);
lib/libcrypto/des/des_key.c
453
DES_set_odd_parity(key);
lib/libcrypto/des/des_key.c
88
DES_set_odd_parity(DES_cblock *key)
lib/libcrypto/des/des_key.c
93
(*key)[i] = odd_parity[(*key)[i]];
lib/libcrypto/des/des_key.c
98
DES_check_key_parity(const_DES_cblock *key)
lib/libcrypto/dh/dh.h
172
int DH_compute_key(unsigned char *key,const BIGNUM *pub_key,DH *dh);
lib/libcrypto/dh/dh_ameth.c
109
p = key;
lib/libcrypto/dh/dh_ameth.c
141
unsigned char *params = NULL, *key = NULL;
lib/libcrypto/dh/dh_ameth.c
160
if ((key_len = i2d_ASN1_INTEGER(aint, &key)) <= 0) {
lib/libcrypto/dh/dh_ameth.c
168
if (!X509_PUBKEY_set0_param(pk, aobj, ptype, astr, key, key_len))
lib/libcrypto/dh/dh_ameth.c
171
key = NULL;
lib/libcrypto/dh/dh_ameth.c
180
freezero(key, key_len);
lib/libcrypto/dh/dh_ameth.c
198
const unsigned char *key, *params, *p;
lib/libcrypto/dh/dh_ameth.c
204
if (!PKCS8_pkey_get0(NULL, &key, &key_len, &algor, p8))
lib/libcrypto/dh/dh_ameth.c
222
p = key;
lib/libcrypto/dh/dh_ameth.c
256
unsigned char *params = NULL, *key = NULL;
lib/libcrypto/dh/dh_ameth.c
277
if ((key_len = i2d_ASN1_INTEGER(aint, &key)) <= 0) {
lib/libcrypto/dh/dh_ameth.c
285
if (!PKCS8_pkey_set0(p8, aobj, 0, ptype, astr, key, key_len))
lib/libcrypto/dh/dh_ameth.c
288
key = NULL;
lib/libcrypto/dh/dh_ameth.c
297
freezero(key, key_len);
lib/libcrypto/dh/dh_ameth.c
85
const unsigned char *key, *params, *p;
lib/libcrypto/dh/dh_ameth.c
91
if (!X509_PUBKEY_get0_param(NULL, &key, &key_len, &algor, pubkey))
lib/libcrypto/dh/dh_key.c
136
compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh)
lib/libcrypto/dh/dh_key.c
182
ret = BN_bn2bin(tmp, key);
lib/libcrypto/dh/dh_key.c
220
DH_compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh)
lib/libcrypto/dh/dh_key.c
222
return dh->meth->compute_key(key, pub_key, dh);
lib/libcrypto/dh/dh_local.h
68
int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh);
lib/libcrypto/dh/dh_pmeth.c
233
pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
lib/libcrypto/dh/dh_pmeth.c
241
ret = DH_compute_key(key, ctx->peerkey->pkey.dh->pub_key,
lib/libcrypto/dsa/dsa_ameth.c
113
p = key;
lib/libcrypto/dsa/dsa_ameth.c
151
unsigned char *params = NULL, *key = NULL;
lib/libcrypto/dsa/dsa_ameth.c
175
if ((key_len = i2d_ASN1_INTEGER(aint, &key)) <= 0) {
lib/libcrypto/dsa/dsa_ameth.c
183
if (!X509_PUBKEY_set0_param(pk, aobj, ptype, astr, key, key_len))
lib/libcrypto/dsa/dsa_ameth.c
186
key = NULL;
lib/libcrypto/dsa/dsa_ameth.c
195
freezero(key, key_len);
lib/libcrypto/dsa/dsa_ameth.c
211
const unsigned char *key, *params, *p;
lib/libcrypto/dsa/dsa_ameth.c
218
if (!PKCS8_pkey_get0(NULL, &key, &key_len, &algor, p8))
lib/libcrypto/dsa/dsa_ameth.c
236
p = key;
lib/libcrypto/dsa/dsa_ameth.c
293
unsigned char *params = NULL, *key = NULL;
lib/libcrypto/dsa/dsa_ameth.c
314
if ((key_len = i2d_ASN1_INTEGER(aint, &key)) <= 0) {
lib/libcrypto/dsa/dsa_ameth.c
322
if (!PKCS8_pkey_set0(p8, aobj, 0, ptype, astr, key, key_len))
lib/libcrypto/dsa/dsa_ameth.c
325
key = NULL;
lib/libcrypto/dsa/dsa_ameth.c
334
freezero(key, key_len);
lib/libcrypto/dsa/dsa_ameth.c
511
old_dsa_priv_decode(EVP_PKEY *pkey, const unsigned char **key, int key_len)
lib/libcrypto/dsa/dsa_ameth.c
518
if ((dsa = d2i_DSAPrivateKey(NULL, key, key_len)) == NULL) {
lib/libcrypto/dsa/dsa_ameth.c
585
old_dsa_priv_encode(const EVP_PKEY *pkey, unsigned char **key)
lib/libcrypto/dsa/dsa_ameth.c
587
return i2d_DSAPrivateKey(pkey->pkey.dsa, key);
lib/libcrypto/dsa/dsa_ameth.c
83
const unsigned char *key, *params, *p;
lib/libcrypto/dsa/dsa_ameth.c
89
if (!X509_PUBKEY_get0_param(NULL, &key, &key_len, &algor, pubkey))
lib/libcrypto/ec/ec.h
234
int EC_KEY_get_flags(const EC_KEY *key);
lib/libcrypto/ec/ec.h
235
void EC_KEY_set_flags(EC_KEY *key, int flags);
lib/libcrypto/ec/ec.h
236
void EC_KEY_clear_flags(EC_KEY *key, int flags);
lib/libcrypto/ec/ec.h
238
void EC_KEY_free(EC_KEY *key);
lib/libcrypto/ec/ec.h
241
int EC_KEY_up_ref(EC_KEY *key);
lib/libcrypto/ec/ec.h
243
const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key);
lib/libcrypto/ec/ec.h
244
int EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group);
lib/libcrypto/ec/ec.h
245
const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key);
lib/libcrypto/ec/ec.h
246
int EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *prv);
lib/libcrypto/ec/ec.h
247
const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key);
lib/libcrypto/ec/ec.h
248
int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub);
lib/libcrypto/ec/ec.h
250
unsigned EC_KEY_get_enc_flags(const EC_KEY *key);
lib/libcrypto/ec/ec.h
252
point_conversion_form_t EC_KEY_get_conv_form(const EC_KEY *key);
lib/libcrypto/ec/ec.h
256
int EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx);
lib/libcrypto/ec/ec.h
257
int EC_KEY_generate_key(EC_KEY *key);
lib/libcrypto/ec/ec.h
258
int EC_KEY_check_key(const EC_KEY *key);
lib/libcrypto/ec/ec.h
259
int EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM *y);
lib/libcrypto/ec/ec.h
261
EC_KEY *d2i_ECPrivateKey(EC_KEY **key, const unsigned char **in, long len);
lib/libcrypto/ec/ec.h
262
int i2d_ECPrivateKey(EC_KEY *key, unsigned char **out);
lib/libcrypto/ec/ec.h
263
EC_KEY *d2i_ECParameters(EC_KEY **key, const unsigned char **in, long len);
lib/libcrypto/ec/ec.h
264
int i2d_ECParameters(EC_KEY *key, unsigned char **out);
lib/libcrypto/ec/ec.h
266
EC_KEY *o2i_ECPublicKey(EC_KEY **key, const unsigned char **in, long len);
lib/libcrypto/ec/ec.h
267
int i2o_ECPublicKey(const EC_KEY *key, unsigned char **out);
lib/libcrypto/ec/ec.h
270
int ECParameters_print(BIO *bp, const EC_KEY *key);
lib/libcrypto/ec/ec.h
271
int EC_KEY_print(BIO *bp, const EC_KEY *key, int off);
lib/libcrypto/ec/ec.h
273
int ECParameters_print_fp(FILE *fp, const EC_KEY *key);
lib/libcrypto/ec/ec.h
274
int EC_KEY_print_fp(FILE *fp, const EC_KEY *key, int off);
lib/libcrypto/ec/ec.h
278
int EC_KEY_set_ex_data(EC_KEY *key, int idx, void *arg);
lib/libcrypto/ec/ec.h
279
void *EC_KEY_get_ex_data(const EC_KEY *key, int idx);
lib/libcrypto/ec/ec.h
284
const EC_KEY_METHOD *EC_KEY_get_method(const EC_KEY *key);
lib/libcrypto/ec/ec.h
285
int EC_KEY_set_method(EC_KEY *key, const EC_KEY_METHOD *meth);
lib/libcrypto/ec/ec.h
320
int (*init)(EC_KEY *key),
lib/libcrypto/ec/ec.h
321
void (*finish)(EC_KEY *key),
lib/libcrypto/ec/ec.h
323
int (*set_group)(EC_KEY *key, const EC_GROUP *grp),
lib/libcrypto/ec/ec.h
324
int (*set_private)(EC_KEY *key, const BIGNUM *priv_key),
lib/libcrypto/ec/ec.h
325
int (*set_public)(EC_KEY *key, const EC_POINT *pub_key));
lib/libcrypto/ec/ec.h
327
int (*keygen)(EC_KEY *key));
lib/libcrypto/ec/ec.h
344
int (**pinit)(EC_KEY *key),
lib/libcrypto/ec/ec.h
345
void (**pfinish)(EC_KEY *key),
lib/libcrypto/ec/ec.h
347
int (**pset_group)(EC_KEY *key, const EC_GROUP *grp),
lib/libcrypto/ec/ec.h
348
int (**pset_private)(EC_KEY *key, const BIGNUM *priv_key),
lib/libcrypto/ec/ec.h
349
int (**pset_public)(EC_KEY *key, const EC_POINT *pub_key));
lib/libcrypto/ec/ec.h
351
int (**pkeygen)(EC_KEY *key));
lib/libcrypto/ec/ec.h
368
EC_KEY *ECParameters_dup(EC_KEY *key);
lib/libcrypto/ec/ec_ameth.c
235
unsigned char *key = NULL;
lib/libcrypto/ec/ec_ameth.c
243
if ((key_len = i2o_ECPublicKey(eckey, &key)) <= 0) {
lib/libcrypto/ec/ec_ameth.c
249
if (!X509_PUBKEY_set0_param(pk, aobj, ptype, pval, key, key_len))
lib/libcrypto/ec/ec_ameth.c
252
key = NULL;
lib/libcrypto/ec/ec_ameth.c
259
freezero(key, key_len);
lib/libcrypto/ec/ec_ameth.c
388
unsigned char *key = NULL;
lib/libcrypto/ec/ec_ameth.c
403
if ((key_len = i2d_ECPrivateKey(eckey, &key)) <= 0) {
lib/libcrypto/ec/ec_ameth.c
410
if (!PKCS8_pkey_set0(p8, aobj, 0, ptype, pval, key, key_len))
lib/libcrypto/ec/ec_ameth.c
413
key = NULL;
lib/libcrypto/ec/ec_ameth.c
420
freezero(key, key_len);
lib/libcrypto/ec/ec_asn1.c
1376
ECParameters_dup(EC_KEY *key)
lib/libcrypto/ec/ec_asn1.c
1383
if (key == NULL)
lib/libcrypto/ec/ec_asn1.c
1386
if ((len = i2d_ECParameters(key, &der)) <= 0)
lib/libcrypto/ec/ec_key.c
355
EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM *y)
lib/libcrypto/ec/ec_key.c
362
if (key == NULL || key->group == NULL || x == NULL || y == NULL) {
lib/libcrypto/ec/ec_key.c
377
if ((point = EC_POINT_new(key->group)) == NULL)
lib/libcrypto/ec/ec_key.c
380
if (!EC_POINT_set_affine_coordinates(key->group, point, x, y, ctx))
lib/libcrypto/ec/ec_key.c
382
if (!EC_POINT_get_affine_coordinates(key->group, point, tx, ty, ctx))
lib/libcrypto/ec/ec_key.c
393
if (!EC_KEY_set_public_key(key, point))
lib/libcrypto/ec/ec_key.c
395
if (EC_KEY_check_key(key) == 0)
lib/libcrypto/ec/ec_key.c
410
EC_KEY_get0_group(const EC_KEY *key)
lib/libcrypto/ec/ec_key.c
412
return key->group;
lib/libcrypto/ec/ec_key.c
417
EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group)
lib/libcrypto/ec/ec_key.c
419
if (key->meth->set_group != NULL &&
lib/libcrypto/ec/ec_key.c
420
key->meth->set_group(key, group) == 0)
lib/libcrypto/ec/ec_key.c
422
EC_GROUP_free(key->group);
lib/libcrypto/ec/ec_key.c
423
key->group = EC_GROUP_dup(group);
lib/libcrypto/ec/ec_key.c
424
return (key->group == NULL) ? 0 : 1;
lib/libcrypto/ec/ec_key.c
429
EC_KEY_get0_private_key(const EC_KEY *key)
lib/libcrypto/ec/ec_key.c
431
return key->priv_key;
lib/libcrypto/ec/ec_key.c
436
EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *priv_key)
lib/libcrypto/ec/ec_key.c
438
if (key->meth->set_private != NULL &&
lib/libcrypto/ec/ec_key.c
439
key->meth->set_private(key, priv_key) == 0)
lib/libcrypto/ec/ec_key.c
442
BN_free(key->priv_key);
lib/libcrypto/ec/ec_key.c
443
if ((key->priv_key = BN_dup(priv_key)) == NULL)
lib/libcrypto/ec/ec_key.c
451
EC_KEY_get0_public_key(const EC_KEY *key)
lib/libcrypto/ec/ec_key.c
453
return key->pub_key;
lib/libcrypto/ec/ec_key.c
458
EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub_key)
lib/libcrypto/ec/ec_key.c
460
if (key->meth->set_public != NULL &&
lib/libcrypto/ec/ec_key.c
461
key->meth->set_public(key, pub_key) == 0)
lib/libcrypto/ec/ec_key.c
464
EC_POINT_free(key->pub_key);
lib/libcrypto/ec/ec_key.c
465
if ((key->pub_key = EC_POINT_dup(pub_key, key->group)) == NULL)
lib/libcrypto/ec/ec_key.c
473
EC_KEY_get_enc_flags(const EC_KEY *key)
lib/libcrypto/ec/ec_key.c
475
return key->enc_flag;
lib/libcrypto/ec/ec_key.c
480
EC_KEY_set_enc_flags(EC_KEY *key, unsigned int flags)
lib/libcrypto/ec/ec_key.c
482
key->enc_flag = flags;
lib/libcrypto/ec/ec_key.c
487
EC_KEY_get_conv_form(const EC_KEY *key)
lib/libcrypto/ec/ec_key.c
489
return key->conv_form;
lib/libcrypto/ec/ec_key.c
494
EC_KEY_set_conv_form(EC_KEY *key, point_conversion_form_t cform)
lib/libcrypto/ec/ec_key.c
496
key->conv_form = cform;
lib/libcrypto/ec/ec_key.c
497
if (key->group != NULL)
lib/libcrypto/ec/ec_key.c
498
EC_GROUP_set_point_conversion_form(key->group, cform);
lib/libcrypto/ec/ec_key.c
503
EC_KEY_set_asn1_flag(EC_KEY *key, int flag)
lib/libcrypto/ec/ec_key.c
505
if (key->group != NULL)
lib/libcrypto/ec/ec_key.c
506
EC_GROUP_set_asn1_flag(key->group, flag);
lib/libcrypto/ec/ec_key.c
511
EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx)
lib/libcrypto/ec/ec_key.c
513
if (key->group == NULL)
lib/libcrypto/ec/ec_key.c
520
EC_KEY_get_flags(const EC_KEY *key)
lib/libcrypto/ec/ec_key.c
522
return key->flags;
lib/libcrypto/ec/ec_key.c
527
EC_KEY_set_flags(EC_KEY *key, int flags)
lib/libcrypto/ec/ec_key.c
529
key->flags |= flags;
lib/libcrypto/ec/ec_key.c
534
EC_KEY_clear_flags(EC_KEY *key, int flags)
lib/libcrypto/ec/ec_key.c
536
key->flags &= ~flags;
lib/libcrypto/ec/ec_key.c
541
EC_KEY_get_method(const EC_KEY *key)
lib/libcrypto/ec/ec_key.c
543
return key->meth;
lib/libcrypto/ec/ec_key.c
548
EC_KEY_set_method(EC_KEY *key, const EC_KEY_METHOD *meth)
lib/libcrypto/ec/ec_key.c
550
void (*finish)(EC_KEY *key) = key->meth->finish;
lib/libcrypto/ec/ec_key.c
553
finish(key);
lib/libcrypto/ec/ec_key.c
555
key->meth = meth;
lib/libcrypto/ec/ec_key.c
557
return meth->init(key);
lib/libcrypto/ec/ec_key.c
622
int (*init)(EC_KEY *key),
lib/libcrypto/ec/ec_key.c
623
void (*finish)(EC_KEY *key),
lib/libcrypto/ec/ec_key.c
625
int (*set_group)(EC_KEY *key, const EC_GROUP *grp),
lib/libcrypto/ec/ec_key.c
626
int (*set_private)(EC_KEY *key, const BIGNUM *priv_key),
lib/libcrypto/ec/ec_key.c
627
int (*set_public)(EC_KEY *key, const EC_POINT *pub_key))
lib/libcrypto/ec/ec_key.c
639
EC_KEY_METHOD_set_keygen(EC_KEY_METHOD *meth, int (*keygen)(EC_KEY *key))
lib/libcrypto/ec/ec_key.c
686
int (**pinit)(EC_KEY *key),
lib/libcrypto/ec/ec_key.c
687
void (**pfinish)(EC_KEY *key),
lib/libcrypto/ec/ec_key.c
689
int (**pset_group)(EC_KEY *key, const EC_GROUP *grp),
lib/libcrypto/ec/ec_key.c
690
int (**pset_private)(EC_KEY *key, const BIGNUM *priv_key),
lib/libcrypto/ec/ec_key.c
691
int (**pset_public)(EC_KEY *key, const EC_POINT *pub_key))
lib/libcrypto/ec/ec_key.c
710
int (**pkeygen)(EC_KEY *key))
lib/libcrypto/ec/ec_local.h
216
int (*init)(EC_KEY *key);
lib/libcrypto/ec/ec_local.h
217
void (*finish)(EC_KEY *key);
lib/libcrypto/ec/ec_local.h
219
int (*set_group)(EC_KEY *key, const EC_GROUP *grp);
lib/libcrypto/ec/ec_local.h
220
int (*set_private)(EC_KEY *key, const BIGNUM *priv_key);
lib/libcrypto/ec/ec_local.h
221
int (*set_public)(EC_KEY *key, const EC_POINT *pub_key);
lib/libcrypto/ec/ec_local.h
222
int (*keygen)(EC_KEY *key);
lib/libcrypto/ec/ec_pmeth.c
210
pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
lib/libcrypto/ec/ec_pmeth.c
224
if (key == NULL) {
lib/libcrypto/ec/ec_pmeth.c
237
ret = ECDH_compute_key(key, outlen, pubkey, eckey, NULL);
lib/libcrypto/ec/ec_pmeth.c
247
pkey_ec_kdf_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
lib/libcrypto/ec/ec_pmeth.c
255
return pkey_ec_derive(ctx, key, keylen);
lib/libcrypto/ec/ec_pmeth.c
257
if (!key) {
lib/libcrypto/ec/ec_pmeth.c
272
if (!ecdh_KDF_X9_63(key, *keylen, ktmp, ktmplen, dctx->kdf_ukm,
lib/libcrypto/ecdsa/ecdsa.c
169
ECDSA_size(const EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
176
if (key == NULL)
lib/libcrypto/ecdsa/ecdsa.c
179
if ((group = EC_KEY_get0_group(key)) == NULL)
lib/libcrypto/ecdsa/ecdsa.c
202
const EC_KEY *key, BIGNUM *e)
lib/libcrypto/ecdsa/ecdsa.c
212
if ((group = EC_KEY_get0_group(key)) == NULL)
lib/libcrypto/ecdsa/ecdsa.c
226
const BIGNUM *r, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
237
if ((sig = ECDSA_do_sign(digest, digest_len, key)) == NULL)
lib/libcrypto/ecdsa/ecdsa.c
256
unsigned char *signature, unsigned int *signature_len, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
258
if (key->meth->sign == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
262
return key->meth->sign(type, digest, digest_len, signature,
lib/libcrypto/ecdsa/ecdsa.c
263
signature_len, NULL, NULL, key);
lib/libcrypto/ecdsa/ecdsa.c
273
ec_key_ecdsa_sign_setup(EC_KEY *key, BN_CTX *in_ctx, BIGNUM **out_kinv,
lib/libcrypto/ecdsa/ecdsa.c
291
if (key == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
295
if ((group = EC_KEY_get0_group(key)) == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
393
ECDSA_sign_setup(EC_KEY *key, BN_CTX *in_ctx, BIGNUM **out_kinv,
lib/libcrypto/ecdsa/ecdsa.c
396
if (key->meth->sign_setup == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
400
return key->meth->sign_setup(key, in_ctx, out_kinv, out_r);
lib/libcrypto/ecdsa/ecdsa.c
412
const BIGNUM *r, const EC_KEY *key, BN_CTX *ctx)
lib/libcrypto/ecdsa/ecdsa.c
424
if ((group = EC_KEY_get0_group(key)) == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
432
if ((priv_key = EC_KEY_get0_private_key(key)) == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
526
const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
550
if (!ecdsa_prepare_digest(digest, digest_len, key, e))
lib/libcrypto/ecdsa/ecdsa.c
555
if (!ECDSA_sign_setup(key, ctx, &kinv, &r)) {
lib/libcrypto/ecdsa/ecdsa.c
563
if (!ecdsa_compute_s(&s, e, kinv, r, key, ctx))
lib/libcrypto/ecdsa/ecdsa.c
597
ECDSA_do_sign(const unsigned char *digest, int digest_len, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
599
if (key->meth->sign_sig == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
603
return key->meth->sign_sig(digest, digest_len, NULL, NULL, key);
lib/libcrypto/ecdsa/ecdsa.c
609
const unsigned char *sigbuf, int sig_len, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
630
ret = ECDSA_do_verify(digest, digest_len, s, key);
lib/libcrypto/ecdsa/ecdsa.c
641
const unsigned char *sigbuf, int sig_len, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
643
if (key->meth->verify == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
647
return key->meth->verify(type, digest, digest_len, sigbuf, sig_len, key);
lib/libcrypto/ecdsa/ecdsa.c
658
const ECDSA_SIG *sig, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
668
if (key == NULL || sig == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
672
if ((group = EC_KEY_get0_group(key)) == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
676
if ((pub_key = EC_KEY_get0_public_key(key)) == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
717
if (!ecdsa_prepare_digest(digest, digest_len, key, e))
lib/libcrypto/ecdsa/ecdsa.c
771
const ECDSA_SIG *sig, EC_KEY *key)
lib/libcrypto/ecdsa/ecdsa.c
773
if (key->meth->verify_sig == NULL) {
lib/libcrypto/ecdsa/ecdsa.c
777
return key->meth->verify_sig(digest, digest_len, sig, key);
lib/libcrypto/evp/e_aes.c
103
aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_aes.c
1065
aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_aes.c
1070
if (key != NULL) {
lib/libcrypto/evp/e_aes.c
1073
AES_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1);
lib/libcrypto/evp/e_aes.c
1075
AES_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1);
lib/libcrypto/evp/e_aes.c
1077
AES_set_encrypt_key(key + ctx->key_len / 2, ctx->key_len * 4,
lib/libcrypto/evp/e_aes.c
108
if (AES_set_encrypt_key(key, ctx->key_len * 8, &eak->ks) < 0) {
lib/libcrypto/evp/e_aes.c
117
aes_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_aes.c
1208
if (cctx->ccm.key) {
lib/libcrypto/evp/e_aes.c
1209
if (cctx->ccm.key != &cctx->ks)
lib/libcrypto/evp/e_aes.c
1211
cctx_out->ccm.key = &cctx_out->ks;
lib/libcrypto/evp/e_aes.c
1222
aes_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_aes.c
1227
if (!iv && !key)
lib/libcrypto/evp/e_aes.c
1229
if (key) {
lib/libcrypto/evp/e_aes.c
123
if (AES_set_encrypt_key(key, ctx->key_len * 8, &eak->ks) < 0) {
lib/libcrypto/evp/e_aes.c
1230
AES_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks);
lib/libcrypto/evp/e_aes.c
128
if (AES_set_decrypt_key(key, ctx->key_len * 8, &eak->ks) < 0) {
lib/libcrypto/evp/e_aes.c
1380
aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len,
lib/libcrypto/evp/e_aes.c
1403
AES_set_encrypt_key(key, key_bits, &gcm_ctx->ks.ks);
lib/libcrypto/evp/e_aes.c
149
aes_ecb_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_aes.c
155
if (AES_set_encrypt_key(key, ctx->key_len * 8, &eak->ks) < 0) {
lib/libcrypto/evp/e_aes.c
1552
aes_wrap_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_aes.c
1557
if (iv == NULL && key == NULL)
lib/libcrypto/evp/e_aes.c
1560
if (key != NULL) {
lib/libcrypto/evp/e_aes.c
1562
AES_set_encrypt_key(key, 8 * ctx->key_len,
lib/libcrypto/evp/e_aes.c
1565
AES_set_decrypt_key(key, 8 * ctx->key_len,
lib/libcrypto/evp/e_aes.c
160
if (AES_set_decrypt_key(key, ctx->key_len * 8, &eak->ks) < 0) {
lib/libcrypto/evp/e_aes.c
789
if (gctx->gcm.key) {
lib/libcrypto/evp/e_aes.c
790
if (gctx->gcm.key != &gctx->ks)
lib/libcrypto/evp/e_aes.c
792
gctx_out->gcm.key = &gctx_out->ks;
lib/libcrypto/evp/e_aes.c
812
aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_aes.c
817
if (!iv && !key)
lib/libcrypto/evp/e_aes.c
819
if (key) {
lib/libcrypto/evp/e_aes.c
820
AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks);
lib/libcrypto/evp/e_bf.c
79
bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_bf.c
82
BF_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
lib/libcrypto/evp/e_camellia.c
76
camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_camellia.c
81
ret = Camellia_set_key(key, ctx->key_len * 8, ctx->cipher_data);
lib/libcrypto/evp/e_cast.c
79
cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_cast.c
82
CAST_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
lib/libcrypto/evp/e_chacha.c
29
chacha_init(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_chacha.c
32
if (key != NULL)
lib/libcrypto/evp/e_chacha.c
33
ChaCha_set_key((ChaCha_ctx *)ctx->cipher_data, key,
lib/libcrypto/evp/e_chacha20poly1305.c
153
sizeof(poly1305_key), c20_ctx->key, iv, ctr);
lib/libcrypto/evp/e_chacha20poly1305.c
157
CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, iv, ctr + 1);
lib/libcrypto/evp/e_chacha20poly1305.c
212
sizeof(poly1305_key), c20_ctx->key, iv, ctr);
lib/libcrypto/evp/e_chacha20poly1305.c
227
CRYPTO_chacha_20(out, in, plaintext_len, c20_ctx->key, iv, ctr + 1);
lib/libcrypto/evp/e_chacha20poly1305.c
253
CRYPTO_hchacha_20(subkey, c20_ctx->key, nonce);
lib/libcrypto/evp/e_chacha20poly1305.c
310
CRYPTO_hchacha_20(subkey, c20_ctx->key, nonce);
lib/libcrypto/evp/e_chacha20poly1305.c
377
unsigned char key[32];
lib/libcrypto/evp/e_chacha20poly1305.c
391
chacha20_poly1305_init(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_chacha20poly1305.c
401
if (key == NULL && iv == NULL)
lib/libcrypto/evp/e_chacha20poly1305.c
406
if (key != NULL)
lib/libcrypto/evp/e_chacha20poly1305.c
407
memcpy(cpx->key, key, sizeof(cpx->key));
lib/libcrypto/evp/e_chacha20poly1305.c
45
unsigned char key[32];
lib/libcrypto/evp/e_chacha20poly1305.c
458
ChaCha_set_key(&cpx->chacha, cpx->key, 8 * sizeof(cpx->key));
lib/libcrypto/evp/e_chacha20poly1305.c
50
aead_chacha20_poly1305_init(EVP_AEAD_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_chacha20poly1305.c
64
if (key_len != sizeof(c20_ctx->key))
lib/libcrypto/evp/e_chacha20poly1305.c
71
memcpy(&c20_ctx->key[0], key, key_len);
lib/libcrypto/evp/e_des.c
73
des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_des.c
76
DES_cblock *deskey = (DES_cblock *)key;
lib/libcrypto/evp/e_des3.c
82
des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_des3.c
85
DES_cblock *deskey = (DES_cblock *)key;
lib/libcrypto/evp/e_des3.c
95
des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_des3.c
98
DES_cblock *deskey = (DES_cblock *)key;
lib/libcrypto/evp/e_idea.c
78
idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_idea.c
88
idea_set_encrypt_key(key, ctx->cipher_data);
lib/libcrypto/evp/e_idea.c
92
idea_set_encrypt_key(key, &tmp);
lib/libcrypto/evp/e_null.c
67
static int null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_null.c
95
null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_rc2.c
299
rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_rc2.c
303
key, data(ctx)->key_bits);
lib/libcrypto/evp/e_rc2.c
73
static int rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_rc4.c
130
rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_rc4.c
133
RC4_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
lib/libcrypto/evp/e_rc4.c
80
static int rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_sm4.c
239
EVP_SM4_KEY *key = ((EVP_SM4_KEY *)(ctx)->cipher_data);
lib/libcrypto/evp/e_sm4.c
241
CRYPTO_ctr128_encrypt(in, out, len, &key->ks, ctx->iv, ctx->buf,
lib/libcrypto/evp/e_sm4.c
32
sm4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_sm4.c
35
SM4_set_key(key, ctx->cipher_data);
lib/libcrypto/evp/e_sm4.c
41
const SM4_KEY *key, unsigned char *ivec, const int enc)
lib/libcrypto/evp/e_sm4.c
44
CRYPTO_cbc128_encrypt(in, out, len, key, ivec,
lib/libcrypto/evp/e_sm4.c
47
CRYPTO_cbc128_decrypt(in, out, len, key, ivec,
lib/libcrypto/evp/e_sm4.c
53
const SM4_KEY *key, unsigned char *ivec, int *num, const int enc)
lib/libcrypto/evp/e_sm4.c
55
CRYPTO_cfb128_encrypt(in, out, length, key, ivec, num, enc,
lib/libcrypto/evp/e_sm4.c
60
sm4_ecb_encrypt(const unsigned char *in, unsigned char *out, const SM4_KEY *key,
lib/libcrypto/evp/e_sm4.c
64
SM4_encrypt(in, out, key);
lib/libcrypto/evp/e_sm4.c
66
SM4_decrypt(in, out, key);
lib/libcrypto/evp/e_sm4.c
71
const SM4_KEY *key, unsigned char *ivec, int *num)
lib/libcrypto/evp/e_sm4.c
73
CRYPTO_ofb128_encrypt(in, out, length, key, ivec, num,
lib/libcrypto/evp/e_xcbc_d.c
109
desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/e_xcbc_d.c
112
DES_cblock *deskey = (DES_cblock *)key;
lib/libcrypto/evp/e_xcbc_d.c
115
memcpy(&data(ctx)->inw[0], &key[8], 8);
lib/libcrypto/evp/e_xcbc_d.c
116
memcpy(&data(ctx)->outw[0], &key[16], 8);
lib/libcrypto/evp/e_xcbc_d.c
72
static int desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/evp.h
1051
const unsigned char *key, size_t key_len, size_t tag_len, ENGINE *impl);
lib/libcrypto/evp/evp.h
392
int (*init)(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/evp.h
470
unsigned char *key, unsigned char *iv);
lib/libcrypto/evp/evp.h
477
const unsigned char *key, const unsigned char *iv);
lib/libcrypto/evp/evp.h
479
ENGINE *impl, const unsigned char *key, const unsigned char *iv);
lib/libcrypto/evp/evp.h
486
const unsigned char *key, const unsigned char *iv);
lib/libcrypto/evp/evp.h
488
ENGINE *impl, const unsigned char *key, const unsigned char *iv);
lib/libcrypto/evp/evp.h
495
const unsigned char *key, const unsigned char *iv, int enc);
lib/libcrypto/evp/evp.h
497
ENGINE *impl, const unsigned char *key, const unsigned char *iv, int enc);
lib/libcrypto/evp/evp.h
555
int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key);
lib/libcrypto/evp/evp.h
766
int EVP_PKEY_encrypt_old(unsigned char *enc_key, const unsigned char *key,
lib/libcrypto/evp/evp.h
776
int EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key);
lib/libcrypto/evp/evp.h
783
int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key);
lib/libcrypto/evp/evp.h
788
int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key);
lib/libcrypto/evp/evp.h
793
int EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key);
lib/libcrypto/evp/evp.h
798
int EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key);
lib/libcrypto/evp/evp.h
941
EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, const unsigned char *key,
lib/libcrypto/evp/evp.h
973
int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
lib/libcrypto/evp/evp_aead.c
56
const unsigned char *key, size_t key_len, size_t tag_len, ENGINE *impl)
lib/libcrypto/evp/evp_aead.c
63
return aead->init(ctx, key, key_len, tag_len);
lib/libcrypto/evp/evp_cipher.c
1168
int (*init)(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/evp_cipher.c
126
const unsigned char *key, const unsigned char *iv, int enc)
lib/libcrypto/evp/evp_cipher.c
128
return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
lib/libcrypto/evp/evp_cipher.c
134
const unsigned char *key, const unsigned char *iv, int enc)
lib/libcrypto/evp/evp_cipher.c
236
if (key != NULL || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT) != 0) {
lib/libcrypto/evp/evp_cipher.c
237
if (!ctx->cipher->init(ctx, key, iv, enc))
lib/libcrypto/evp/evp_cipher.c
281
const unsigned char *key, const unsigned char *iv)
lib/libcrypto/evp/evp_cipher.c
283
return EVP_CipherInit(ctx, cipher, key, iv, 1);
lib/libcrypto/evp/evp_cipher.c
289
const unsigned char *key, const unsigned char *iv)
lib/libcrypto/evp/evp_cipher.c
291
return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, 1);
lib/libcrypto/evp/evp_cipher.c
470
const unsigned char *key, const unsigned char *iv)
lib/libcrypto/evp/evp_cipher.c
472
return EVP_CipherInit(ctx, cipher, key, iv, 0);
lib/libcrypto/evp/evp_cipher.c
478
const unsigned char *key, const unsigned char *iv)
lib/libcrypto/evp/evp_cipher.c
480
return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, 0);
lib/libcrypto/evp/evp_cipher.c
701
EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key)
lib/libcrypto/evp/evp_cipher.c
704
return EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_RAND_KEY, 0, key);
lib/libcrypto/evp/evp_cipher.c
705
arc4random_buf(key, ctx->key_len);
lib/libcrypto/evp/evp_key.c
140
int count, unsigned char *key, unsigned char *iv)
lib/libcrypto/evp/evp_key.c
195
if (key != NULL)
lib/libcrypto/evp/evp_key.c
196
*(key++) = md_buf[i];
lib/libcrypto/evp/evp_local.h
212
int (*init)(EVP_CIPHER_CTX *ctx, const unsigned char *key,
lib/libcrypto/evp/evp_local.h
312
int (*derive)(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
lib/libcrypto/evp/evp_local.h
332
int (*init)(struct evp_aead_ctx_st*, const unsigned char *key,
lib/libcrypto/evp/evp_local.h
78
void *key);
lib/libcrypto/evp/evp_local.h
81
void *key);
lib/libcrypto/evp/evp_pbe.c
239
unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
lib/libcrypto/evp/evp_pbe.c
303
memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
lib/libcrypto/evp/evp_pbe.c
310
if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))
lib/libcrypto/evp/evp_pbe.c
313
explicit_bzero(key, EVP_MAX_KEY_LENGTH);
lib/libcrypto/evp/evp_pbe.c
509
unsigned char *salt, key[EVP_MAX_KEY_LENGTH];
lib/libcrypto/evp/evp_pbe.c
523
if (keylen > sizeof key) {
lib/libcrypto/evp/evp_pbe.c
580
keylen, key))
lib/libcrypto/evp/evp_pbe.c
583
ret = EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, en_de);
lib/libcrypto/evp/evp_pbe.c
586
explicit_bzero(key, keylen);
lib/libcrypto/evp/evp_pbe.c
606
unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
lib/libcrypto/evp/evp_pbe.c
631
iter, EVP_CIPHER_key_length(cipher), key, md)) {
lib/libcrypto/evp/evp_pbe.c
643
ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
lib/libcrypto/evp/evp_pbe.c
644
explicit_bzero(key, EVP_MAX_KEY_LENGTH);
lib/libcrypto/evp/p_legacy.c
100
unsigned char *key = NULL;
lib/libcrypto/evp/p_legacy.c
122
key = malloc(size + 2);
lib/libcrypto/evp/p_legacy.c
123
if (key == NULL) {
lib/libcrypto/evp/p_legacy.c
129
i = EVP_PKEY_decrypt_old(key, ek, ekl, priv);
lib/libcrypto/evp/p_legacy.c
134
if (!EVP_DecryptInit_ex(ctx, NULL, NULL, key, iv))
lib/libcrypto/evp/p_legacy.c
141
freezero(key, size);
lib/libcrypto/evp/p_legacy.c
163
unsigned char key[EVP_MAX_KEY_LENGTH];
lib/libcrypto/evp/p_legacy.c
181
if (EVP_CIPHER_CTX_rand_key(ctx, key) <= 0)
lib/libcrypto/evp/p_legacy.c
189
if (!EVP_EncryptInit_ex(ctx, NULL, NULL, key, iv))
lib/libcrypto/evp/p_legacy.c
193
ekl[i] = EVP_PKEY_encrypt_old(ek[i], key,
lib/libcrypto/evp/p_legacy.c
203
explicit_bzero(key, sizeof(key));
lib/libcrypto/evp/p_lib.c
470
EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key)
lib/libcrypto/evp/p_lib.c
475
return (pkey->pkey.ptr = key) != NULL;
lib/libcrypto/evp/p_lib.c
656
EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key)
lib/libcrypto/evp/p_lib.c
658
int ret = EVP_PKEY_assign_RSA(pkey, key);
lib/libcrypto/evp/p_lib.c
660
RSA_up_ref(key);
lib/libcrypto/evp/p_lib.c
693
EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key)
lib/libcrypto/evp/p_lib.c
695
int ret = EVP_PKEY_assign_DSA(pkey, key);
lib/libcrypto/evp/p_lib.c
697
DSA_up_ref(key);
lib/libcrypto/evp/p_lib.c
718
EC_KEY *key;
lib/libcrypto/evp/p_lib.c
720
if ((key = EVP_PKEY_get0_EC_KEY(pkey)) == NULL)
lib/libcrypto/evp/p_lib.c
723
EC_KEY_up_ref(key);
lib/libcrypto/evp/p_lib.c
725
return key;
lib/libcrypto/evp/p_lib.c
730
EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key)
lib/libcrypto/evp/p_lib.c
732
int ret = EVP_PKEY_assign_EC_KEY(pkey, key);
lib/libcrypto/evp/p_lib.c
734
EC_KEY_up_ref(key);
lib/libcrypto/evp/p_lib.c
768
EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key)
lib/libcrypto/evp/p_lib.c
770
int ret = EVP_PKEY_assign_DH(pkey, key);
lib/libcrypto/evp/p_lib.c
772
DH_up_ref(key);
lib/libcrypto/evp/pmeth_fn.c
331
EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen)
lib/libcrypto/evp/pmeth_fn.c
341
M_check_autoarg(ctx, key, pkeylen, EVP_F_EVP_PKEY_DERIVE)
lib/libcrypto/evp/pmeth_fn.c
342
return ctx->pmeth->derive(ctx, key, pkeylen);
lib/libcrypto/evp/pmeth_gn.c
207
EVP_PKEY_new_mac_key(int type, ENGINE *e, const unsigned char *key, int keylen)
lib/libcrypto/evp/pmeth_gn.c
218
EVP_PKEY_CTRL_SET_MAC_KEY, keylen, (void *)key) <= 0)
lib/libcrypto/hmac/hm_pmeth.c
197
ASN1_OCTET_STRING *key;
lib/libcrypto/hmac/hm_pmeth.c
212
key = ctx->pkey->pkey.ptr;
lib/libcrypto/hmac/hm_pmeth.c
213
if (!HMAC_Init_ex(&hctx->ctx, key->data, key->length, hctx->md,
lib/libcrypto/hmac/hm_pmeth.c
234
unsigned char *key;
lib/libcrypto/hmac/hm_pmeth.c
237
key = string_to_hex(value, &keylen);
lib/libcrypto/hmac/hm_pmeth.c
238
if (!key)
lib/libcrypto/hmac/hm_pmeth.c
240
r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
lib/libcrypto/hmac/hm_pmeth.c
241
free(key);
lib/libcrypto/hmac/hmac.c
100
if (!EVP_DigestFinal_ex(&(ctx->md_ctx), ctx->key,
lib/libcrypto/hmac/hmac.c
104
if (len < 0 || (size_t)len > sizeof(ctx->key)) {
lib/libcrypto/hmac/hmac.c
108
memcpy(ctx->key, key, len);
lib/libcrypto/hmac/hmac.c
112
memset(&ctx->key[ctx->key_length], 0,
lib/libcrypto/hmac/hmac.c
118
pad[i] = 0x36 ^ ctx->key[i];
lib/libcrypto/hmac/hmac.c
125
pad[i] = 0x5c ^ ctx->key[i];
lib/libcrypto/hmac/hmac.c
218
memcpy(dctx->key, sctx->key, HMAC_MAX_MD_CBLOCK);
lib/libcrypto/hmac/hmac.c
253
HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d,
lib/libcrypto/hmac/hmac.c
259
if (key == NULL) {
lib/libcrypto/hmac/hmac.c
260
key = dummy_key;
lib/libcrypto/hmac/hmac.c
264
if (!HMAC_Init_ex(&c, key, key_len, evp_md, NULL))
lib/libcrypto/hmac/hmac.c
70
HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md,
lib/libcrypto/hmac/hmac.c
77
if (md != NULL && md != ctx->md && (key == NULL || len < 0))
lib/libcrypto/hmac/hmac.c
88
if (key != NULL) {
lib/libcrypto/hmac/hmac.c
91
if ((size_t)j > sizeof(ctx->key)) {
lib/libcrypto/hmac/hmac.c
98
if (!EVP_DigestUpdate(&ctx->md_ctx, key, len))
lib/libcrypto/hmac/hmac.h
81
int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md,
lib/libcrypto/hmac/hmac.h
87
unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
lib/libcrypto/hmac/hmac_local.h
75
unsigned char key[HMAC_MAX_MD_CBLOCK];
lib/libcrypto/idea/idea.c
142
idea_encrypt(unsigned long *d, IDEA_KEY_SCHEDULE *key)
lib/libcrypto/idea/idea.c
152
p = &(key->data[0][0]);
lib/libcrypto/idea/idea.c
346
idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks)
lib/libcrypto/idea/idea.c
352
n2s(key, kt[0]);
lib/libcrypto/idea/idea.c
353
n2s(key, kt[1]);
lib/libcrypto/idea/idea.c
354
n2s(key, kt[2]);
lib/libcrypto/idea/idea.c
355
n2s(key, kt[3]);
lib/libcrypto/idea/idea.c
356
n2s(key, kt[4]);
lib/libcrypto/idea/idea.c
357
n2s(key, kt[5]);
lib/libcrypto/idea/idea.c
358
n2s(key, kt[6]);
lib/libcrypto/idea/idea.c
359
n2s(key, kt[7]);
lib/libcrypto/idea/idea.h
85
void idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks);
lib/libcrypto/kdf/hkdf_evp.c
137
freezero(kctx->key, kctx->key_len);
lib/libcrypto/kdf/hkdf_evp.c
138
kctx->key = NULL;
lib/libcrypto/kdf/hkdf_evp.c
145
if ((kctx->key = malloc(p1)) == NULL)
lib/libcrypto/kdf/hkdf_evp.c
147
memcpy(kctx->key, p2, p1);
lib/libcrypto/kdf/hkdf_evp.c
222
freezero(kctx->key, kctx->key_len);
lib/libcrypto/kdf/hkdf_evp.c
230
pkey_hkdf_derive(EVP_PKEY_CTX *ctx, unsigned char *key,
lib/libcrypto/kdf/hkdf_evp.c
239
if (kctx->key == NULL) {
lib/libcrypto/kdf/hkdf_evp.c
246
return HKDF(key, *keylen, kctx->md, kctx->key, kctx->key_len,
lib/libcrypto/kdf/hkdf_evp.c
250
if (key == NULL) {
lib/libcrypto/kdf/hkdf_evp.c
254
return HKDF_extract(key, keylen, kctx->md, kctx->key,
lib/libcrypto/kdf/hkdf_evp.c
258
return HKDF_expand(key, *keylen, kctx->md, kctx->key,
lib/libcrypto/kdf/hkdf_evp.c
67
unsigned char *key;
lib/libcrypto/kdf/hkdf_evp.c
97
freezero(kctx->key, kctx->key_len);
lib/libcrypto/kdf/kdf.h
100
EVP_PKEY_CTRL_HKDF_KEY, keylen, (void *)(key))
lib/libcrypto/kdf/kdf.h
98
# define EVP_PKEY_CTX_set1_hkdf_key(pctx, key, keylen) \
lib/libcrypto/kdf/tls1_prf.c
295
pkey_tls1_prf_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *key_len)
lib/libcrypto/kdf/tls1_prf.c
313
kctx->seed, kctx->seed_len, key, *key_len);
lib/libcrypto/mlkem/mlkem.c
26
private_key_is_new(const MLKEM_private_key *key)
lib/libcrypto/mlkem/mlkem.c
28
return (key != NULL &&
lib/libcrypto/mlkem/mlkem.c
29
key->state == MLKEM_PRIVATE_KEY_UNINITIALIZED &&
lib/libcrypto/mlkem/mlkem.c
30
(key->rank == MLKEM768_RANK || key->rank == MLKEM1024_RANK));
lib/libcrypto/mlkem/mlkem.c
34
private_key_is_valid(const MLKEM_private_key *key)
lib/libcrypto/mlkem/mlkem.c
36
return (key != NULL &&
lib/libcrypto/mlkem/mlkem.c
37
key->state == MLKEM_PRIVATE_KEY_INITIALIZED &&
lib/libcrypto/mlkem/mlkem.c
38
(key->rank == MLKEM768_RANK || key->rank == MLKEM1024_RANK));
lib/libcrypto/mlkem/mlkem.c
42
public_key_is_new(const MLKEM_public_key *key)
lib/libcrypto/mlkem/mlkem.c
44
return (key != NULL &&
lib/libcrypto/mlkem/mlkem.c
45
key->state == MLKEM_PUBLIC_KEY_UNINITIALIZED &&
lib/libcrypto/mlkem/mlkem.c
46
(key->rank == MLKEM768_RANK || key->rank == MLKEM1024_RANK));
lib/libcrypto/mlkem/mlkem.c
50
public_key_is_valid(const MLKEM_public_key *key)
lib/libcrypto/mlkem/mlkem.c
52
return (key != NULL &&
lib/libcrypto/mlkem/mlkem.c
53
key->state == MLKEM_PUBLIC_KEY_INITIALIZED &&
lib/libcrypto/mlkem/mlkem.c
54
(key->rank == MLKEM768_RANK || key->rank == MLKEM1024_RANK));
lib/libcrypto/mlkem/mlkem.h
100
size_t MLKEM_public_key_ciphertext_length(const MLKEM_public_key *key);
lib/libcrypto/mlkem/mlkem.h
55
void MLKEM_private_key_free(MLKEM_private_key *key);
lib/libcrypto/mlkem/mlkem.h
63
size_t MLKEM_private_key_encoded_length(const MLKEM_private_key *key);
lib/libcrypto/mlkem/mlkem.h
70
size_t MLKEM_private_key_ciphertext_length(const MLKEM_private_key *key);
lib/libcrypto/mlkem/mlkem.h
85
void MLKEM_public_key_free(MLKEM_public_key *key);
lib/libcrypto/mlkem/mlkem.h
93
size_t MLKEM_public_key_encoded_length(const MLKEM_public_key *key);
lib/libcrypto/mlkem/mlkem_key.c
110
MLKEM_public_key *key = NULL;
lib/libcrypto/mlkem/mlkem_key.c
113
if ((key = calloc(1, sizeof(*key))) == NULL)
lib/libcrypto/mlkem/mlkem_key.c
118
if ((key->key_768 = calloc(1, sizeof(*key->key_768))) == NULL)
lib/libcrypto/mlkem/mlkem_key.c
122
if ((key->key_1024 = calloc(1, sizeof(*key->key_1024))) == NULL)
lib/libcrypto/mlkem/mlkem_key.c
129
key->rank = rank;
lib/libcrypto/mlkem/mlkem_key.c
130
key->state = MLKEM_PUBLIC_KEY_UNINITIALIZED;
lib/libcrypto/mlkem/mlkem_key.c
132
ret = key;
lib/libcrypto/mlkem/mlkem_key.c
133
key = NULL;
lib/libcrypto/mlkem/mlkem_key.c
136
MLKEM_public_key_free(key);
lib/libcrypto/mlkem/mlkem_key.c
143
MLKEM_public_key_free(MLKEM_public_key *key)
lib/libcrypto/mlkem/mlkem_key.c
145
if (key == NULL)
lib/libcrypto/mlkem/mlkem_key.c
148
freezero(key->key_768, sizeof(*key->key_768));
lib/libcrypto/mlkem/mlkem_key.c
149
freezero(key->key_1024, sizeof(*key->key_1024));
lib/libcrypto/mlkem/mlkem_key.c
150
freezero(key, sizeof(*key));
lib/libcrypto/mlkem/mlkem_key.c
155
MLKEM_public_key_encoded_length(const MLKEM_public_key *key)
lib/libcrypto/mlkem/mlkem_key.c
157
if (key == NULL)
lib/libcrypto/mlkem/mlkem_key.c
160
switch (key->rank) {
lib/libcrypto/mlkem/mlkem_key.c
173
MLKEM_public_key_ciphertext_length(const MLKEM_public_key *key)
lib/libcrypto/mlkem/mlkem_key.c
175
if (key == NULL)
lib/libcrypto/mlkem/mlkem_key.c
178
switch (key->rank) {
lib/libcrypto/mlkem/mlkem_key.c
28
MLKEM_private_key *key = NULL;
lib/libcrypto/mlkem/mlkem_key.c
31
if ((key = calloc(1, sizeof(*key))) == NULL)
lib/libcrypto/mlkem/mlkem_key.c
36
if ((key->key_768 = calloc(1, sizeof(*key->key_768))) == NULL)
lib/libcrypto/mlkem/mlkem_key.c
40
if ((key->key_1024 = calloc(1, sizeof(*key->key_1024))) == NULL)
lib/libcrypto/mlkem/mlkem_key.c
46
key->rank = rank;
lib/libcrypto/mlkem/mlkem_key.c
47
key->state = MLKEM_PRIVATE_KEY_UNINITIALIZED;
lib/libcrypto/mlkem/mlkem_key.c
49
ret = key;
lib/libcrypto/mlkem/mlkem_key.c
50
key = NULL;
lib/libcrypto/mlkem/mlkem_key.c
53
MLKEM_private_key_free(key);
lib/libcrypto/mlkem/mlkem_key.c
60
MLKEM_private_key_free(MLKEM_private_key *key)
lib/libcrypto/mlkem/mlkem_key.c
62
if (key == NULL)
lib/libcrypto/mlkem/mlkem_key.c
65
freezero(key->key_768, sizeof(*key->key_768));
lib/libcrypto/mlkem/mlkem_key.c
66
freezero(key->key_1024, sizeof(*key->key_1024));
lib/libcrypto/mlkem/mlkem_key.c
67
freezero(key, sizeof(*key));
lib/libcrypto/mlkem/mlkem_key.c
72
MLKEM_private_key_encoded_length(const MLKEM_private_key *key)
lib/libcrypto/mlkem/mlkem_key.c
74
if (key == NULL)
lib/libcrypto/mlkem/mlkem_key.c
77
switch (key->rank) {
lib/libcrypto/mlkem/mlkem_key.c
90
MLKEM_private_key_ciphertext_length(const MLKEM_private_key *key)
lib/libcrypto/mlkem/mlkem_key.c
92
if (key == NULL)
lib/libcrypto/mlkem/mlkem_key.c
95
switch (key->rank) {
lib/libcrypto/modes/cbc128.c
101
(*block)(out, out, key);
lib/libcrypto/modes/cbc128.c
115
size_t len, const void *key,
lib/libcrypto/modes/cbc128.c
131
(*block)(in, out, key);
lib/libcrypto/modes/cbc128.c
144
(*block)(in, out, key);
lib/libcrypto/modes/cbc128.c
160
(*block)(in, tmp.c, key);
lib/libcrypto/modes/cbc128.c
176
(*block)(in, tmp.c, key);
lib/libcrypto/modes/cbc128.c
190
(*block)(in, tmp.c, key);
lib/libcrypto/modes/cbc128.c
67
size_t len, const void *key,
lib/libcrypto/modes/cbc128.c
78
(*block)(out, out, key);
lib/libcrypto/modes/cbc128.c
89
(*block)(out, out, key);
lib/libcrypto/modes/ccm128.c
115
(*block)(ctx->nonce.c, ctx->cmac.c, ctx->key),
lib/libcrypto/modes/ccm128.c
148
(*block)(ctx->cmac.c, ctx->cmac.c, ctx->key),
lib/libcrypto/modes/ccm128.c
185
void *key = ctx->key;
lib/libcrypto/modes/ccm128.c
192
(*block)(ctx->nonce.c, ctx->cmac.c, key),
lib/libcrypto/modes/ccm128.c
225
(*block)(ctx->cmac.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
226
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
244
(*block)(ctx->cmac.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
245
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
253
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
272
void *key = ctx->key;
lib/libcrypto/modes/ccm128.c
279
(*block)(ctx->nonce.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
300
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
313
(*block)(ctx->cmac.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
321
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
324
(*block)(ctx->cmac.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
330
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
364
void *key = ctx->key;
lib/libcrypto/modes/ccm128.c
371
(*block)(ctx->nonce.c, ctx->cmac.c, key),
lib/libcrypto/modes/ccm128.c
391
(*stream)(inp, out, n, key, ctx->nonce.c, ctx->cmac.c);
lib/libcrypto/modes/ccm128.c
403
(*block)(ctx->cmac.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
404
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
412
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
431
void *key = ctx->key;
lib/libcrypto/modes/ccm128.c
438
(*block)(ctx->nonce.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
453
(*stream)(inp, out, n, key, ctx->nonce.c, ctx->cmac.c);
lib/libcrypto/modes/ccm128.c
463
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
466
(*block)(ctx->cmac.c, ctx->cmac.c, key);
lib/libcrypto/modes/ccm128.c
472
(*block)(ctx->nonce.c, scratch.c, key);
lib/libcrypto/modes/ccm128.c
61
unsigned int M, unsigned int L, void *key, block128_f block)
lib/libcrypto/modes/ccm128.c
67
ctx->key = key;
lib/libcrypto/modes/cfb128.c
111
(*block)(ivec, ivec, key);
lib/libcrypto/modes/cfb128.c
134
(*block)(ivec, ivec, key);
lib/libcrypto/modes/cfb128.c
147
(*block)(ivec, ivec, key);
lib/libcrypto/modes/cfb128.c
162
(*block)(ivec, ivec, key);
lib/libcrypto/modes/cfb128.c
178
int nbits, const void *key,
lib/libcrypto/modes/cfb128.c
191
(*block)(ivec, ivec, key);
lib/libcrypto/modes/cfb128.c
215
size_t bits, const void *key,
lib/libcrypto/modes/cfb128.c
225
cfbr_encrypt_block(c, d, 1, key, ivec, enc, block);
lib/libcrypto/modes/cfb128.c
234
size_t length, const void *key,
lib/libcrypto/modes/cfb128.c
241
cfbr_encrypt_block(&in[n], &out[n], 8, key, ivec, enc, block);
lib/libcrypto/modes/cfb128.c
64
size_t len, const void *key,
lib/libcrypto/modes/cfb128.c
87
(*block)(ivec, ivec, key);
lib/libcrypto/modes/cfb128.c
99
(*block)(ivec, ivec, key);
lib/libcrypto/modes/ctr128.c
114
size_t len, const void *key,
lib/libcrypto/modes/ctr128.c
137
(*block)(ivec, ecount_buf, key);
lib/libcrypto/modes/ctr128.c
149
(*block)(ivec, ecount_buf, key);
lib/libcrypto/modes/ctr128.c
162
(*block)(ivec, ecount_buf, key);
lib/libcrypto/modes/ctr128.c
193
size_t len, const void *key,
lib/libcrypto/modes/ctr128.c
231
(*func)(in, out, blocks, key, ivec);
lib/libcrypto/modes/ctr128.c
244
(*func)(ecount_buf, ecount_buf, 1, key, ivec);
lib/libcrypto/modes/gcm128.c
220
CRYPTO_gcm128_init(GCM128_CONTEXT *ctx, void *key, block128_f block)
lib/libcrypto/modes/gcm128.c
224
ctx->key = key;
lib/libcrypto/modes/gcm128.c
226
(*block)(ctx->H.c, ctx->H.c, key);
lib/libcrypto/modes/gcm128.c
237
CRYPTO_gcm128_new(void *key, block128_f block)
lib/libcrypto/modes/gcm128.c
244
CRYPTO_gcm128_init(ctx, key, block);
lib/libcrypto/modes/gcm128.c
299
(*ctx->block)(ctx->Yi.c, ctx->EK0.c, ctx->key);
lib/libcrypto/modes/gcm128.c
373
ctx->block(ctx->Yi.c, ctx->EKi.c, ctx->key);
lib/libcrypto/modes/gcm128.c
414
ctx->block(ctx->Yi.c, ctx->EKi.c, ctx->key);
lib/libcrypto/modes/gcm128.c
466
stream(in, out, j, ctx->key, ctx->Yi.c);
lib/libcrypto/modes/gcm128.c
475
ctx->block(ctx->Yi.c, ctx->EKi.c, ctx->key);
lib/libcrypto/modes/gcm128.c
528
stream(in, out, j, ctx->key, ctx->Yi.c);
lib/libcrypto/modes/gcm128.c
536
ctx->block(ctx->Yi.c, ctx->EKi.c, ctx->key);
lib/libcrypto/modes/modes.h
17
const void *key);
lib/libcrypto/modes/modes.h
20
size_t len, const void *key,
lib/libcrypto/modes/modes.h
24
size_t blocks, const void *key,
lib/libcrypto/modes/modes.h
28
size_t blocks, const void *key,
lib/libcrypto/modes/modes.h
32
size_t len, const void *key,
lib/libcrypto/modes/modes.h
35
size_t len, const void *key,
lib/libcrypto/modes/modes.h
39
size_t len, const void *key,
lib/libcrypto/modes/modes.h
44
size_t len, const void *key,
lib/libcrypto/modes/modes.h
49
size_t len, const void *key,
lib/libcrypto/modes/modes.h
54
size_t len, const void *key,
lib/libcrypto/modes/modes.h
58
size_t length, const void *key,
lib/libcrypto/modes/modes.h
62
size_t bits, const void *key,
lib/libcrypto/modes/modes.h
68
GCM128_CONTEXT *CRYPTO_gcm128_new(void *key, block128_f block);
lib/libcrypto/modes/modes.h
69
void CRYPTO_gcm128_init(GCM128_CONTEXT *ctx, void *key, block128_f block);
lib/libcrypto/modes/modes.h
94
unsigned int M, unsigned int L, void *key, block128_f block);
lib/libcrypto/modes/modes_local.h
48
void *key;
lib/libcrypto/modes/modes_local.h
63
void *key;
lib/libcrypto/modes/ofb128.c
109
(*block)(ivec, ivec, key);
lib/libcrypto/modes/ofb128.c
64
size_t len, const void *key,
lib/libcrypto/modes/ofb128.c
86
(*block)(ivec, ivec, key);
lib/libcrypto/modes/ofb128.c
97
(*block)(ivec, ivec, key);
lib/libcrypto/ocsp/ocsp.h
217
int OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key,
lib/libcrypto/ocsp/ocsp.h
267
int OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key,
lib/libcrypto/ocsp/ocsp_cl.c
156
OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key,
lib/libcrypto/ocsp/ocsp_cl.c
168
if (key) {
lib/libcrypto/ocsp/ocsp_cl.c
169
if (!X509_check_private_key(signer, key)) {
lib/libcrypto/ocsp/ocsp_cl.c
173
if (!OCSP_REQUEST_sign(req, key, dgst))
lib/libcrypto/ocsp/ocsp_srv.c
231
OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key,
lib/libcrypto/ocsp/ocsp_srv.c
237
if (!X509_check_private_key(signer, key)) {
lib/libcrypto/ocsp/ocsp_srv.c
277
if (!OCSP_BASICRESP_sign(brsp, key, dgst, 0))
lib/libcrypto/pem/pem.h
358
int PEM_def_callback(char *buf, int num, int w, void *key);
lib/libcrypto/pem/pem_all.c
133
static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
lib/libcrypto/pem/pem_all.c
136
static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
lib/libcrypto/pem/pem_all.c
140
static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey);
lib/libcrypto/pem/pem_all.c
267
pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
lib/libcrypto/pem/pem_all.c
271
if (!key)
lib/libcrypto/pem/pem_all.c
273
rtmp = EVP_PKEY_get1_RSA(key);
lib/libcrypto/pem/pem_all.c
274
EVP_PKEY_free(key);
lib/libcrypto/pem/pem_all.c
392
pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
lib/libcrypto/pem/pem_all.c
396
if (!key)
lib/libcrypto/pem/pem_all.c
398
dtmp = EVP_PKEY_get1_DSA(key);
lib/libcrypto/pem/pem_all.c
399
EVP_PKEY_free(key);
lib/libcrypto/pem/pem_all.c
517
pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey)
lib/libcrypto/pem/pem_all.c
521
if (!key)
lib/libcrypto/pem/pem_all.c
523
dtmp = EVP_PKEY_get1_EC_KEY(key);
lib/libcrypto/pem/pem_all.c
524
EVP_PKEY_free(key);
lib/libcrypto/pem/pem_all.c
586
PEM_read_bio_ECPrivateKey(BIO *bp, EC_KEY **key, pem_password_cb *cb, void *u)
lib/libcrypto/pem/pem_all.c
590
return pkey_get_eckey(pktmp, key); /* will free pktmp */
lib/libcrypto/pem/pem_lib.c
102
memcpy(buf, key, l);
lib/libcrypto/pem/pem_lib.c
353
unsigned char key[EVP_MAX_KEY_LENGTH];
lib/libcrypto/pem/pem_lib.c
399
key, NULL))
lib/libcrypto/pem/pem_lib.c
417
if (!EVP_EncryptInit_ex(&ctx, enc, NULL, key, iv) ||
lib/libcrypto/pem/pem_lib.c
433
explicit_bzero(key, sizeof(key));
lib/libcrypto/pem/pem_lib.c
449
unsigned char key[EVP_MAX_KEY_LENGTH];
lib/libcrypto/pem/pem_lib.c
465
(unsigned char *)buf, klen, 1, key, NULL))
lib/libcrypto/pem/pem_lib.c
470
o = EVP_DecryptInit_ex(&ctx, cipher->cipher, NULL, key,
lib/libcrypto/pem/pem_lib.c
478
explicit_bzero((char *)key, sizeof(key));
lib/libcrypto/pem/pem_lib.c
89
PEM_def_callback(char *buf, int num, int w, void *key)
lib/libcrypto/pem/pem_lib.c
98
if (key) {
lib/libcrypto/pem/pem_lib.c
99
l = strlen(key);
lib/libcrypto/pem/pvkfmt.c
710
derive_pvk_key(unsigned char *key, const unsigned char *salt,
lib/libcrypto/pem/pvkfmt.c
720
!EVP_DigestFinal_ex(&mctx, key, NULL))
lib/libcrypto/pkcs12/p12_crt.c
210
PKCS12_add_key(STACK_OF(PKCS12_SAFEBAG) **pbags, EVP_PKEY *key, int key_usage,
lib/libcrypto/pkcs12/p12_crt.c
217
if (!(p8 = EVP_PKEY2PKCS8(key)))
lib/libcrypto/pkcs12/p12_mutl.c
119
unsigned char key[EVP_MAX_MD_SIZE], *salt;
lib/libcrypto/pkcs12/p12_mutl.c
154
md_size, key, md_type)) {
lib/libcrypto/pkcs12/p12_mutl.c
161
if (!HMAC_Init_ex(hmac, key, md_size, md_type, NULL))
lib/libcrypto/pkcs12/p12_mutl.c
171
explicit_bzero(key, sizeof(key));
lib/libcrypto/pkcs12/pkcs12_local.h
123
PKCS12_SAFEBAG *PKCS12_add_key(STACK_OF(PKCS12_SAFEBAG) **pbags, EVP_PKEY *key,
lib/libcrypto/pkcs7/pk7_doit.c
145
pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, unsigned char *key, int keylen)
lib/libcrypto/pkcs7/pk7_doit.c
170
if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0)
lib/libcrypto/pkcs7/pk7_doit.c
180
if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
lib/libcrypto/pkcs7/pk7_doit.c
333
unsigned char key[EVP_MAX_KEY_LENGTH];
lib/libcrypto/pkcs7/pk7_doit.c
351
if (EVP_CIPHER_CTX_rand_key(ctx, key) <= 0)
lib/libcrypto/pkcs7/pk7_doit.c
353
if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, 1) <= 0)
lib/libcrypto/pkcs7/pk7_doit.c
369
if (pkcs7_encode_rinfo(ri, key, keylen) <= 0)
lib/libcrypto/pkcs7/pk7_doit.c
372
explicit_bzero(key, keylen);
lib/libcrypto/poly1305/poly1305-donna.c
11
const unsigned char key[32]);
lib/libcrypto/poly1305/poly1305-donna.c
55
poly1305_init(poly1305_context *ctx, const unsigned char key[32])
lib/libcrypto/poly1305/poly1305-donna.c
60
st->r[0] = (U8TO32(&key[0])) & 0x3ffffff;
lib/libcrypto/poly1305/poly1305-donna.c
61
st->r[1] = (U8TO32(&key[3]) >> 2) & 0x3ffff03;
lib/libcrypto/poly1305/poly1305-donna.c
62
st->r[2] = (U8TO32(&key[6]) >> 4) & 0x3ffc0ff;
lib/libcrypto/poly1305/poly1305-donna.c
63
st->r[3] = (U8TO32(&key[9]) >> 6) & 0x3f03fff;
lib/libcrypto/poly1305/poly1305-donna.c
64
st->r[4] = (U8TO32(&key[12]) >> 8) & 0x00fffff;
lib/libcrypto/poly1305/poly1305-donna.c
74
st->pad[0] = U8TO32(&key[16]);
lib/libcrypto/poly1305/poly1305-donna.c
75
st->pad[1] = U8TO32(&key[20]);
lib/libcrypto/poly1305/poly1305-donna.c
76
st->pad[2] = U8TO32(&key[24]);
lib/libcrypto/poly1305/poly1305-donna.c
77
st->pad[3] = U8TO32(&key[28]);
lib/libcrypto/poly1305/poly1305.c
22
CRYPTO_poly1305_init(poly1305_context *ctx, const unsigned char key[32])
lib/libcrypto/poly1305/poly1305.c
24
poly1305_init(ctx, key);
lib/libcrypto/poly1305/poly1305.h
36
void CRYPTO_poly1305_init(poly1305_context *ctx, const unsigned char key[32]);
lib/libcrypto/rc2/rc2.c
102
k = (unsigned char *)&(key->data[0]);
lib/libcrypto/rc2/rc2.c
138
ki = &(key->data[63]);
lib/libcrypto/rc2/rc2.c
145
RC2_encrypt(unsigned long *d, RC2_KEY *key)
lib/libcrypto/rc2/rc2.c
162
p0 = p1 = &(key->data[0]);
lib/libcrypto/rc2/rc2.c
193
RC2_decrypt(unsigned long *d, RC2_KEY *key)
lib/libcrypto/rc2/rc2.c
210
p0 = &(key->data[63]);
lib/libcrypto/rc2/rc2.c
211
p1 = &(key->data[0]);
lib/libcrypto/rc2/rc2.c
95
RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits)
lib/libcrypto/rc2/rc2.h
83
void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits);
lib/libcrypto/rc2/rc2.h
84
void RC2_ecb_encrypt(const unsigned char *in, unsigned char *out, RC2_KEY *key,
lib/libcrypto/rc2/rc2.h
86
void RC2_encrypt(unsigned long *data, RC2_KEY *key);
lib/libcrypto/rc2/rc2.h
87
void RC2_decrypt(unsigned long *data, RC2_KEY *key);
lib/libcrypto/rc4/rc4.c
113
rc4_internal(RC4_KEY *key, size_t len, const uint8_t *in, uint8_t *out)
lib/libcrypto/rc4/rc4.c
118
x = key->x;
lib/libcrypto/rc4/rc4.c
119
y = key->y;
lib/libcrypto/rc4/rc4.c
120
d = key->data;
lib/libcrypto/rc4/rc4.c
144
key->x = x;
lib/libcrypto/rc4/rc4.c
145
key->y = y;
lib/libcrypto/rc4/rc4.c
150
void rc4_set_key_internal(RC4_KEY *key, int len, const uint8_t *data);
lib/libcrypto/rc4/rc4.c
154
rc4_set_key_internal(RC4_KEY *key, int len, const uint8_t *data)
lib/libcrypto/rc4/rc4.c
160
d = key->data;
lib/libcrypto/rc4/rc4.c
161
key->x = 0;
lib/libcrypto/rc4/rc4.c
162
key->y = 0;
lib/libcrypto/rc4/rc4.c
182
RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
lib/libcrypto/rc4/rc4.c
185
rc4_internal(key, len, indata, outdata);
lib/libcrypto/rc4/rc4.c
190
RC4_set_key(RC4_KEY *key, int len, const unsigned char *data)
lib/libcrypto/rc4/rc4.c
192
rc4_set_key_internal(key, len, data);
lib/libcrypto/rc4/rc4.c
67
void rc4_internal(RC4_KEY *key, size_t len, const uint8_t *in,
lib/libcrypto/rc4/rc4.h
80
void RC4_set_key(RC4_KEY *key, int len, const unsigned char *data);
lib/libcrypto/rc4/rc4.h
81
void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
lib/libcrypto/rsa/rsa_chk.c
103
r = BN_is_prime_ex(key->q, BN_prime_checks, NULL, NULL);
lib/libcrypto/rsa/rsa_chk.c
112
r = BN_mul(i, key->p, key->q, ctx);
lib/libcrypto/rsa/rsa_chk.c
118
if (BN_cmp(i, key->n) != 0) {
lib/libcrypto/rsa/rsa_chk.c
125
r = BN_sub(i, key->p, BN_value_one());
lib/libcrypto/rsa/rsa_chk.c
130
r = BN_sub(j, key->q, BN_value_one());
lib/libcrypto/rsa/rsa_chk.c
153
r = BN_mod_mul(i, key->d, key->e, k, ctx);
lib/libcrypto/rsa/rsa_chk.c
164
if (key->dmp1 != NULL && key->dmq1 != NULL && key->iqmp != NULL) {
lib/libcrypto/rsa/rsa_chk.c
166
r = BN_sub(i, key->p, BN_value_one());
lib/libcrypto/rsa/rsa_chk.c
172
r = BN_mod_ct(j, key->d, i, ctx);
lib/libcrypto/rsa/rsa_chk.c
178
if (BN_cmp(j, key->dmp1) != 0) {
lib/libcrypto/rsa/rsa_chk.c
184
r = BN_sub(i, key->q, BN_value_one());
lib/libcrypto/rsa/rsa_chk.c
190
r = BN_mod_ct(j, key->d, i, ctx);
lib/libcrypto/rsa/rsa_chk.c
196
if (BN_cmp(j, key->dmq1) != 0) {
lib/libcrypto/rsa/rsa_chk.c
202
if (BN_mod_inverse_ct(i, key->q, key->p, ctx) == NULL) {
lib/libcrypto/rsa/rsa_chk.c
207
if (BN_cmp(i, key->iqmp) != 0) {
lib/libcrypto/rsa/rsa_chk.c
59
RSA_check_key(const RSA *key)
lib/libcrypto/rsa/rsa_chk.c
66
if (!key->p || !key->q || !key->n || !key->e || !key->d) {
lib/libcrypto/rsa/rsa_chk.c
84
if (BN_is_one(key->e)) {
lib/libcrypto/rsa/rsa_chk.c
88
if (!BN_is_odd(key->e)) {
lib/libcrypto/rsa/rsa_chk.c
94
r = BN_is_prime_ex(key->p, BN_prime_checks, NULL, NULL);
lib/libcrypto/sm2/sm2.h
44
int SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
lib/libcrypto/sm2/sm2.h
47
int SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
lib/libcrypto/sm2/sm2.h
50
int SM2_encrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *msg,
lib/libcrypto/sm2/sm2.h
53
int SM2_decrypt(const EC_KEY *key, const EVP_MD *digest,
lib/libcrypto/sm2/sm2_crypt.c
130
SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
lib/libcrypto/sm2/sm2_crypt.c
136
if ((field_size = ec_field_size(EC_KEY_get0_group(key))) == 0) {
lib/libcrypto/sm2/sm2_crypt.c
157
SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
lib/libcrypto/sm2/sm2_crypt.c
163
if ((field_size = ec_field_size(EC_KEY_get0_group(key))) == 0) {
lib/libcrypto/sm2/sm2_crypt.c
182
sm2_kdf(uint8_t *key, size_t key_len, uint8_t *secret, size_t secret_len,
lib/libcrypto/sm2/sm2_crypt.c
233
memcpy(key, hash_buf, hadd);
lib/libcrypto/sm2/sm2_crypt.c
236
key += hadd;
lib/libcrypto/sm2/sm2_crypt.c
247
SM2_encrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *msg,
lib/libcrypto/sm2/sm2_crypt.c
271
if ((group = EC_KEY_get0_group(key)) == NULL) {
lib/libcrypto/sm2/sm2_crypt.c
286
if ((P = EC_KEY_get0_public_key(key)) == NULL) {
lib/libcrypto/sm2/sm2_crypt.c
464
SM2_decrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *ciphertext,
lib/libcrypto/sm2/sm2_crypt.c
479
if ((group = EC_KEY_get0_group(key)) == NULL) {
lib/libcrypto/sm2/sm2_crypt.c
551
if (!EC_POINT_mul(group, C1, NULL, C1, EC_KEY_get0_private_key(key),
lib/libcrypto/sm2/sm2_local.h
26
const uint8_t *uid, size_t uid_len, const EC_KEY *key);
lib/libcrypto/sm2/sm2_local.h
32
ECDSA_SIG *sm2_do_sign(const EC_KEY *key, const EVP_MD *digest,
lib/libcrypto/sm2/sm2_local.h
35
int sm2_do_verify(const EC_KEY *key, const EVP_MD *digest,
lib/libcrypto/sm2/sm2_sign.c
104
if ((group = EC_KEY_get0_group(key)) == NULL) {
lib/libcrypto/sm2/sm2_sign.c
244
sm2_sig_verify(const EC_KEY *key, const ECDSA_SIG *sig, const BIGNUM *e)
lib/libcrypto/sm2/sm2_sign.c
253
if ((group = EC_KEY_get0_group(key)) == NULL) {
lib/libcrypto/sm2/sm2_sign.c
31
sm2_compute_msg_hash(const EVP_MD *digest, const EC_KEY *key,
lib/libcrypto/sm2/sm2_sign.c
326
if (!EC_POINT_mul(group, pt, s, EC_KEY_get0_public_key(key), t, ctx)) {
lib/libcrypto/sm2/sm2_sign.c
352
sm2_do_sign(const EC_KEY *key, const EVP_MD *digest, const uint8_t *uid,
lib/libcrypto/sm2/sm2_sign.c
358
e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len);
lib/libcrypto/sm2/sm2_sign.c
364
sig = sm2_sig_gen(key, e);
lib/libcrypto/sm2/sm2_sign.c
372
sm2_do_verify(const EC_KEY *key, const EVP_MD *digest, const ECDSA_SIG *sig,
lib/libcrypto/sm2/sm2_sign.c
378
e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len);
lib/libcrypto/sm2/sm2_sign.c
384
ret = sm2_sig_verify(key, sig, e);
lib/libcrypto/sm2/sm2_sign.c
54
if (!sm2_compute_userid_digest(za, digest, uid, uid_len, key)) {
lib/libcrypto/sm2/sm2_sign.c
89
sm2_sig_gen(const EC_KEY *key, const BIGNUM *e)
lib/libcrypto/sm2/sm2_sign.c
99
if ((dA = EC_KEY_get0_private_key(key)) == NULL) {
lib/libcrypto/sm2/sm2_za.c
130
EC_KEY_get0_public_key(key), xA, yA, ctx))
lib/libcrypto/sm2/sm2_za.c
27
size_t uid_len, const EC_KEY *key)
lib/libcrypto/sm2/sm2_za.c
39
if ((group = EC_KEY_get0_group(key)) == NULL)
lib/libcrypto/sm4/sm4.c
149
SM4_set_key(const uint8_t *key, SM4_KEY *k)
lib/libcrypto/sm4/sm4.c
155
K[0] = crypto_load_be32toh(&key[0 * 4]) ^ SM4_FK[0];
lib/libcrypto/sm4/sm4.c
156
K[1] = crypto_load_be32toh(&key[1 * 4]) ^ SM4_FK[1];
lib/libcrypto/sm4/sm4.c
157
K[2] = crypto_load_be32toh(&key[2 * 4]) ^ SM4_FK[2];
lib/libcrypto/sm4/sm4.c
158
K[3] = crypto_load_be32toh(&key[3 * 4]) ^ SM4_FK[3];
lib/libcrypto/sm4/sm4.h
39
int SM4_set_key(const uint8_t *key, SM4_KEY *ks);
lib/libcrypto/stack/stack.c
201
obj_bsearch_ex(const void *key, const void *base_, int num, int size,
lib/libcrypto/stack/stack.c
211
if ((c = cmp(key, &base[i * size])) == 0) {
lib/libcrypto/stack/stack.c
213
while (i > 0 && cmp(key, &base[(i - 1) * size]) == 0)
lib/libcrypto/ts/ts.h
368
int TS_RESP_CTX_set_signer_key(TS_RESP_CTX *ctx, EVP_PKEY *key);
lib/libcrypto/ts/ts.h
550
const char *key, const char *pass, TS_RESP_CTX *ctx);
lib/libcrypto/ts/ts_conf.c
150
BIO *key = NULL;
lib/libcrypto/ts/ts_conf.c
153
if (!(key = BIO_new_file(file, "r")))
lib/libcrypto/ts/ts_conf.c
155
pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, (char *) pass);
lib/libcrypto/ts/ts_conf.c
160
BIO_free(key);
lib/libcrypto/ts/ts_conf.c
263
TS_CONF_set_signer_key(CONF *conf, const char *section, const char *key,
lib/libcrypto/ts/ts_conf.c
269
if (!key)
lib/libcrypto/ts/ts_conf.c
270
key = NCONF_get_string(conf, section, ENV_SIGNER_KEY);
lib/libcrypto/ts/ts_conf.c
271
if (!key) {
lib/libcrypto/ts/ts_conf.c
275
if (!(key_obj = TS_CONF_load_key(key, pass)))
lib/libcrypto/ts/ts_rsp_sign.c
209
TS_RESP_CTX_set_signer_key(TS_RESP_CTX *ctx, EVP_PKEY *key)
lib/libcrypto/ts/ts_rsp_sign.c
212
ctx->signer_key = key;
lib/libcrypto/x509/x509.h
399
int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key);
lib/libcrypto/x509/x509.h
437
int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key);
lib/libcrypto/x509/x509.h
497
EVP_PKEY * X509_PUBKEY_get(X509_PUBKEY *key);
lib/libcrypto/x509/x509.h
498
EVP_PKEY * X509_PUBKEY_get0(X509_PUBKEY *key);
lib/libcrypto/x509/x509_addr.c
1065
uint8_t *key = NULL;
lib/libcrypto/x509/x509_addr.c
1084
if (!CBB_finish(&cbb, &key, &keylen))
lib/libcrypto/x509/x509_addr.c
1092
if (CBS_mem_equal(&cbs, key, keylen))
lib/libcrypto/x509/x509_addr.c
1098
if (!ASN1_OCTET_STRING_set(af->addressFamily, key, keylen))
lib/libcrypto/x509/x509_addr.c
1104
free(key);
lib/libcrypto/x509/x509_addr.c
1110
free(key);
lib/libcrypto/x509/x509_cmp.c
359
return (X509_PUBKEY_get(x->cert_info->key));
lib/libcrypto/x509/x509_cmp.c
368
return (X509_PUBKEY_get0(x->cert_info->key));
lib/libcrypto/x509/x509_cmp.c
377
return x->cert_info->key->public_key;
lib/libcrypto/x509/x509_local.h
176
X509_PUBKEY *key;
lib/libcrypto/x509/x509_set.c
241
return X509_PUBKEY_set(&x->cert_info->key, pkey);
lib/libcrypto/x509/x509_set.c
255
return x->cert_info->key;
lib/libcrypto/x509/x509_skey.c
150
pk = ctx->subject_cert->cert_info->key->public_key;
lib/libcrypto/x509/x_all.c
371
i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key)
lib/libcrypto/x509/x_all.c
376
p8inf = EVP_PKEY2PKCS8(key);
lib/libcrypto/x509/x_all.c
386
i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key)
lib/libcrypto/x509/x_all.c
390
p8inf = EVP_PKEY2PKCS8(key);
lib/libcrypto/x509/x_all.c
495
ASN1_BIT_STRING *key;
lib/libcrypto/x509/x_all.c
496
key = X509_get0_pubkey_bitstr(data);
lib/libcrypto/x509/x_all.c
497
if (!key)
lib/libcrypto/x509/x_all.c
499
return EVP_Digest(key->data, key->length, md, len, type, NULL);
lib/libcurses/tinfo/hashed_db.c
207
_nc_db_put(DB * db, DBT * key, DBT * data)
lib/libcurses/tinfo/hashed_db.c
212
(void) db->del(db, NULL, key, 0);
lib/libcurses/tinfo/hashed_db.c
213
result = db->put(db, NULL, key, data, DB_NOOVERWRITE);
lib/libcurses/tinfo/hashed_db.c
215
result = db->put(db, key, data, R_NOOVERWRITE);
lib/libcurses/tinfo/hashed_db.c
226
_nc_db_get(DB * db, DBT * key, DBT * data)
lib/libcurses/tinfo/hashed_db.c
232
result = db->get(db, NULL, key, data, 0);
lib/libcurses/tinfo/hashed_db.c
234
result = db->get(db, key, data, 0);
lib/libcurses/tinfo/hashed_db.c
245
_nc_db_first(DB * db, DBT * key, DBT * data)
lib/libcurses/tinfo/hashed_db.c
249
memset(key, 0, sizeof(*key));
lib/libcurses/tinfo/hashed_db.c
253
result = cursor->c_get(cursor, key, data, DB_FIRST);
lib/libcurses/tinfo/hashed_db.c
256
result = db->seq(db, key, data, 0);
lib/libcurses/tinfo/hashed_db.c
267
_nc_db_next(DB * db, DBT * key, DBT * data)
lib/libcurses/tinfo/hashed_db.c
274
result = cursor->c_get(cursor, key, data, DB_NEXT);
lib/libcurses/tinfo/hashed_db.c
279
result = db->seq(db, key, data, R_NEXT);
lib/libcurses/tinfo/hashed_db.c
289
_nc_db_have_index(DBT * key, DBT * data, char **buffer, int *size)
lib/libcurses/tinfo/hashed_db.c
295
(void) key;
lib/libcurses/tinfo/hashed_db.c
312
_nc_db_have_data(DBT * key, DBT * data, char **buffer, int *size)
lib/libcurses/tinfo/hashed_db.c
319
if (data->size > key->size
lib/libcurses/tinfo/lib_win32con.c
1062
int key = MapKey(vk);
lib/libcurses/tinfo/lib_win32con.c
1063
if (key < 0)
lib/libcurses/tinfo/lib_win32con.c
1066
*buf = key;
lib/libcurses/tinfo/lib_win32con.c
63
#define GenMap(vKey,key) MAKELONG(key, vKey)
lib/libcurses/tinfo/lib_win32con.c
735
LONG key = GenMap(vKey, 0);
lib/libcurses/tinfo/lib_win32con.c
737
res = bsearch(&key,
lib/libcurses/tinfo/lib_win32con.c
743
key = *((LONG *) res);
lib/libcurses/tinfo/lib_win32con.c
744
nKey = LOWORD(key);
lib/libcurses/tinfo/lib_win32con.c
761
LONG key = GenMap(vKey, 0);
lib/libcurses/tinfo/lib_win32con.c
763
res = bsearch(&key,
lib/libcurses/tinfo/lib_win32con.c
769
key = *((LONG *) res);
lib/libcurses/tinfo/lib_win32con.c
770
nKey = LOWORD(key);
lib/libcurses/tinfo/lib_win32con.c
786
LONG key = GenMap(0, (WORD) keycode);
lib/libcurses/tinfo/lib_win32con.c
790
res = bsearch(&key,
lib/libcurses/tinfo/lib_win32con.c
796
key = *((LONG *) res);
lib/libcurses/tinfo/lib_win32con.c
797
vKey = HIWORD(key);
lib/libcurses/tinfo/lib_win32con.c
798
nKey = (LOWORD(key)) & 0x7fff;
lib/libcurses/tinfo/lib_win32con.c
812
LONG key = GenMap(0, (WORD) keycode);
lib/libcurses/tinfo/lib_win32con.c
815
res = bsearch(&key,
lib/libcurses/tinfo/lib_win32con.c
821
key = *((LONG *) res);
lib/libcurses/tinfo/lib_win32con.c
822
nKey = LOWORD(key);
lib/libcurses/tinfo/read_entry.c
804
DBT key, data;
lib/libcurses/tinfo/read_entry.c
811
memset(&key, 0, sizeof(key));
lib/libcurses/tinfo/read_entry.c
812
key.data = save;
lib/libcurses/tinfo/read_entry.c
813
key.size = strlen(save);
lib/libcurses/tinfo/read_entry.c
830
while (_nc_db_get(capdbp, &key, &data) == 0) {
lib/libcurses/tinfo/read_entry.c
835
if (data.size > key.size
lib/libcurses/tinfo/read_entry.c
855
key.data = have;
lib/libcurses/tinfo/read_entry.c
856
key.size = used;
lib/libcurses/tinfo/tinfo_driver.c
1442
drv_kyExist(TERMINAL_CONTROL_BLOCK * TCB, int key)
lib/libcurses/tinfo/tinfo_driver.c
1448
res = TINFO_HAS_KEY(TCB->csp, key) == 0 ? FALSE : TRUE;
lib/libcurses/tinfo/write_entry.c
364
DBT key, data;
lib/libcurses/tinfo/write_entry.c
369
memset(&key, 0, sizeof(key));
lib/libcurses/tinfo/write_entry.c
370
key.data = term_names;
lib/libcurses/tinfo/write_entry.c
371
key.size = name_size;
lib/libcurses/tinfo/write_entry.c
377
_nc_db_put(capdb, &key, &data);
lib/libcurses/tinfo/write_entry.c
381
key.data = name_list;
lib/libcurses/tinfo/write_entry.c
382
key.size = strlen(name_list);
lib/libcurses/tinfo/write_entry.c
391
_nc_db_put(capdb, &key, &data);
lib/libcurses/tinfo/write_entry.c
402
key.data = ptr;
lib/libcurses/tinfo/write_entry.c
403
key.size = strlen(ptr);
lib/libcurses/tinfo/write_entry.c
407
_nc_db_put(capdb, &key, &data);
lib/libedit/chared.c
337
el->el_map.current = el->el_map.key;
lib/libedit/chared.c
427
el->el_map.current = el->el_map.key;
lib/libedit/chared.c
455
el->el_map.current = el->el_map.key;
lib/libedit/common.c
804
el->el_map.current = el->el_map.key;
lib/libedit/keymacro.c
187
keymacro_add(EditLine *el, const wchar_t *key, keymacro_value_t *val,
lib/libedit/keymacro.c
191
if (key[0] == '\0') {
lib/libedit/keymacro.c
203
el->el_keymacro.map = node__get(key[0]);
lib/libedit/keymacro.c
207
(void) node__try(el, el->el_keymacro.map, key, val, ntype);
lib/libedit/keymacro.c
221
((map == el->el_map.key &&
lib/libedit/keymacro.c
224
el->el_map.key[(unsigned char)*in] != ED_SEQUENCE_LEAD_IN)))
lib/libedit/keymacro.c
234
keymacro_delete(EditLine *el, const wchar_t *key)
lib/libedit/keymacro.c
237
if (key[0] == '\0') {
lib/libedit/keymacro.c
245
(void) node__delete(el, &el->el_keymacro.map, key);
lib/libedit/keymacro.c
255
keymacro_print(EditLine *el, const wchar_t *key)
lib/libedit/keymacro.c
259
if (el->el_keymacro.map == NULL && *key == 0)
lib/libedit/keymacro.c
263
if (node_lookup(el, key, el->el_keymacro.map, 1) <= -1)
lib/libedit/keymacro.c
266
"\"\n", key);
lib/libedit/keymacro.c
576
keymacro_kprint(EditLine *el, const wchar_t *key, keymacro_value_t *val,
lib/libedit/keymacro.c
590
ct_encode_string(key, &el->el_scratch), unparsbuf);
lib/libedit/keymacro.c
598
ct_encode_string(key, &el->el_scratch), unparsbuf);
lib/libedit/keymacro.c
613
(void) fprintf(el->el_outfile, fmt, ct_encode_string(key,
lib/libedit/map.c
1026
el_action_t *key = el->el_map.key;
lib/libedit/map.c
1032
el->el_map.current = el->el_map.key;
lib/libedit/map.c
1037
key[i] = vii[i];
lib/libedit/map.c
1057
el_action_t *key = el->el_map.key;
lib/libedit/map.c
1062
el->el_map.current = el->el_map.key;
lib/libedit/map.c
1066
key[i] = emacs[i];
lib/libedit/map.c
1190
if (map == el->el_map.key) {
lib/libedit/map.c
1196
first, el->el_map.key[first]);
lib/libedit/map.c
1221
if (el->el_map.key[prev] == el->el_map.key[i])
lib/libedit/map.c
1223
map_print_some_keys(el, el->el_map.key, prev, i - 1);
lib/libedit/map.c
1226
map_print_some_keys(el, el->el_map.key, prev, i - 1);
lib/libedit/map.c
1260
int key;
lib/libedit/map.c
1265
map = el->el_map.key;
lib/libedit/map.c
1267
key = rem = 0;
lib/libedit/map.c
1279
key = 1;
lib/libedit/map.c
1313
if (key)
lib/libedit/map.c
1322
if (key) {
lib/libedit/map.c
1335
if (key)
lib/libedit/map.c
1355
if (key)
lib/libedit/map.c
1369
if (key)
lib/libedit/map.c
913
el->el_map.key = reallocarray(NULL, N_KEYS, sizeof(el_action_t));
lib/libedit/map.c
914
if (el->el_map.key == NULL)
lib/libedit/map.c
950
free(el->el_map.key);
lib/libedit/map.c
951
el->el_map.key = NULL;
lib/libedit/map.c
970
el_action_t *map = el->el_map.key;
lib/libedit/map.c
986
el_action_t *map = el->el_map.key;
lib/libedit/map.h
54
el_action_t *key; /* The current normal key map */
lib/libedit/read.c
481
el->el_map.current == el->el_map.key &&
lib/libedit/readline.c
1844
e->el_map.key[c] = ED_INSERT;
lib/libedit/readline.c
2008
rl_get_previous_history(int count, int key)
lib/libedit/readline.c
2011
a[0] = key;
lib/libedit/readline.c
2266
rl_bind_key_in_map(int key, rl_command_func_t *fun, Keymap k)
lib/libedit/terminal.c
1001
arrow[A_K_DN].key = T_kd;
lib/libedit/terminal.c
1006
arrow[A_K_UP].key = T_ku;
lib/libedit/terminal.c
1011
arrow[A_K_LT].key = T_kl;
lib/libedit/terminal.c
1016
arrow[A_K_RT].key = T_kr;
lib/libedit/terminal.c
1021
arrow[A_K_HO].key = T_kh;
lib/libedit/terminal.c
1026
arrow[A_K_EN].key = T_at7;
lib/libedit/terminal.c
1150
if (el->el_terminal.t_buf == NULL || el->el_map.key == NULL)
lib/libedit/terminal.c
1153
map = el->el_map.type == MAP_VI ? el->el_map.alt : el->el_map.key;
lib/libedit/terminal.c
1163
p = el->el_terminal.t_str[arrow[i].key];
lib/libedit/terminal.h
46
int key; /* Index in termcap table */
lib/libedit/tty.c
900
map = el->el_map.key;
lib/libedit/vi.c
1088
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
295
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
311
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
326
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
342
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
359
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
376
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
389
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
404
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
427
el->el_map.current = el->el_map.key;
lib/libedit/vi.c
80
el->el_map.current = el->el_map.key;
lib/libevent/event.h
232
char *key;
lib/libexpat/lib/siphash.h
147
sip_tokey(struct sipkey *key, const void *src) {
lib/libexpat/lib/siphash.h
148
key->k[0] = SIP_U8TO64_LE((const unsigned char *)src);
lib/libexpat/lib/siphash.h
149
key->k[1] = SIP_U8TO64_LE((const unsigned char *)src + 8);
lib/libexpat/lib/siphash.h
150
return key;
lib/libexpat/lib/siphash.h
191
sip24_init(struct siphash *H, const struct sipkey *key) {
lib/libexpat/lib/siphash.h
192
H->v0 = SIP_ULL(0x736f6d65U, 0x70736575U) ^ key->k[0];
lib/libexpat/lib/siphash.h
193
H->v1 = SIP_ULL(0x646f7261U, 0x6e646f6dU) ^ key->k[1];
lib/libexpat/lib/siphash.h
194
H->v2 = SIP_ULL(0x6c796765U, 0x6e657261U) ^ key->k[0];
lib/libexpat/lib/siphash.h
195
H->v3 = SIP_ULL(0x74656462U, 0x79746573U) ^ key->k[1];
lib/libexpat/lib/siphash.h
270
siphash24(const void *src, size_t len, const struct sipkey *key) {
lib/libexpat/lib/siphash.h
272
return sip24_final(sip24_update(sip24_init(&state, key), src, len));
lib/libexpat/lib/xmlparse.c
239
static void copy_salt_to_sipkey(XML_Parser parser, struct sipkey *key);
lib/libexpat/lib/xmlparse.c
7844
copy_salt_to_sipkey(XML_Parser parser, struct sipkey *key) {
lib/libexpat/lib/xmlparse.c
7845
key->k[0] = 0;
lib/libexpat/lib/xmlparse.c
7846
key->k[1] = get_hash_secret_salt(parser);
lib/libexpat/lib/xmlparse.c
7852
struct sipkey key;
lib/libexpat/lib/xmlparse.c
7854
copy_salt_to_sipkey(parser, &key);
lib/libexpat/lib/xmlparse.c
7855
sip24_init(&state, &key);
lib/libexpat/tests/basic_tests.c
114
struct sipkey key;
lib/libexpat/tests/basic_tests.c
116
sip_tokey(&key, "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09"
lib/libexpat/tests/basic_tests.c
118
sip24_init(&state, &key);
lib/libexpat/tests/basic_tests.c
131
if (siphash24(message, len, &key) != expected)
lib/libfido2/src/aes256.c
10
aes256_cbc(const fido_blob_t *key, const u_char *iv, const fido_blob_t *in,
lib/libfido2/src/aes256.c
114
aes256_gcm(const fido_blob_t *key, const fido_blob_t *nonce,
lib/libfido2/src/aes256.c
125
if (nonce->len != 12 || key->len != 32 || aad->len > UINT_MAX) {
lib/libfido2/src/aes256.c
127
nonce->len, key->len, aad->len);
lib/libfido2/src/aes256.c
145
if (EVP_CipherInit(ctx, cipher, key->ptr, nonce->ptr, encrypt) == 0) {
lib/libfido2/src/aes256.c
19
if (key->len != 32) {
lib/libfido2/src/aes256.c
20
fido_log_debug("%s: invalid key len %zu", __func__, key->len);
lib/libfido2/src/aes256.c
204
aes256_gcm_enc(const fido_blob_t *key, const fido_blob_t *nonce,
lib/libfido2/src/aes256.c
207
return aes256_gcm(key, nonce, aad, in, out, 1);
lib/libfido2/src/aes256.c
211
aes256_gcm_dec(const fido_blob_t *key, const fido_blob_t *nonce,
lib/libfido2/src/aes256.c
214
return aes256_gcm(key, nonce, aad, in, out, 0);
lib/libfido2/src/aes256.c
37
if (EVP_CipherInit(ctx, cipher, key->ptr, iv, encrypt) == 0 ||
lib/libfido2/src/aes256.c
54
aes256_cbc_proto1(const fido_blob_t *key, const fido_blob_t *in,
lib/libfido2/src/aes256.c
61
return aes256_cbc(key, iv, in, out, encrypt);
lib/libfido2/src/aes256.c
68
fido_blob_t key, cin, cout;
lib/libfido2/src/aes256.c
93
key.ptr = secret->ptr + 32;
lib/libfido2/src/aes256.c
94
key.len = secret->len - 32;
lib/libfido2/src/aes256.c
95
if (aes256_cbc(&key, iv, &cin, &cout, encrypt) < 0)
lib/libfido2/src/assert.c
15
adjust_assert_count(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/assert.c
21
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/assert.c
22
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/assert.c
23
cbor_get_uint8(key) != 5) {
lib/libfido2/src/assert.c
266
const fido_blob_t *key)
lib/libfido2/src/assert.c
271
if (aes256_cbc_dec(dev, key,
lib/libfido2/src/assert.c
51
parse_assert_reply(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/assert.c
55
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/assert.c
56
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/assert.c
61
switch (cbor_get_uint8(key)) {
lib/libfido2/src/authkey.c
10
parse_authkey(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/authkey.c
14
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/authkey.c
15
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/authkey.c
16
cbor_get_uint8(key) != 1) {
lib/libfido2/src/bio.c
149
decode_template(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/bio.c
153
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/bio.c
154
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/bio.c
159
switch (cbor_get_uint8(key)) {
lib/libfido2/src/bio.c
196
bio_parse_template_array(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/bio.c
201
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/bio.c
202
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/bio.c
203
cbor_get_uint8(key) != 7) {
lib/libfido2/src/bio.c
334
bio_parse_enroll_status(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/bio.c
340
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/bio.c
341
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/bio.c
346
switch (cbor_get_uint8(key)) {
lib/libfido2/src/bio.c
369
bio_parse_template_id(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/bio.c
374
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/bio.c
375
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/bio.c
376
cbor_get_uint8(key) != 4) {
lib/libfido2/src/bio.c
621
bio_parse_info(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/bio.c
626
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/bio.c
627
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/bio.c
632
switch (cbor_get_uint8(key)) {
lib/libfido2/src/cbor.c
1030
cbor_decode_pubkey(const cbor_item_t *item, int *type, void *key)
lib/libfido2/src/cbor.c
1039
if (es256_pk_decode(item, key) < 0) {
lib/libfido2/src/cbor.c
1045
if (rs256_pk_decode(item, key) < 0) {
lib/libfido2/src/cbor.c
1051
if (eddsa_pk_decode(item, key) < 0) {
lib/libfido2/src/cbor.c
1125
decode_cred_extension(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/cbor.c
1131
if (cbor_string_copy(key, &type) < 0) {
lib/libfido2/src/cbor.c
1216
decode_assert_extension(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/cbor.c
1223
if (cbor_string_copy(key, &type) < 0) {
lib/libfido2/src/cbor.c
1391
decode_attstmt_entry(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/cbor.c
1397
if (cbor_string_copy(key, &name) < 0) {
lib/libfido2/src/cbor.c
1483
decode_cred_id_entry(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/cbor.c
1489
if (cbor_string_copy(key, &name) < 0) {
lib/libfido2/src/cbor.c
1522
decode_user_entry(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/cbor.c
1528
if (cbor_string_copy(key, &name) < 0) {
lib/libfido2/src/cbor.c
1577
decode_rp_entity_entry(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/cbor.c
1584
if (cbor_string_copy(key, &name) < 0) {
lib/libfido2/src/cbor.c
226
cbor_add_bytestring(cbor_item_t *item, const char *key,
lib/libfido2/src/cbor.c
234
if ((pair.key = cbor_build_string(key)) == NULL ||
lib/libfido2/src/cbor.c
247
if (pair.key)
lib/libfido2/src/cbor.c
248
cbor_decref(&pair.key);
lib/libfido2/src/cbor.c
256
cbor_add_string(cbor_item_t *item, const char *key, const char *value)
lib/libfido2/src/cbor.c
263
if ((pair.key = cbor_build_string(key)) == NULL ||
lib/libfido2/src/cbor.c
276
if (pair.key)
lib/libfido2/src/cbor.c
277
cbor_decref(&pair.key);
lib/libfido2/src/cbor.c
285
cbor_add_bool(cbor_item_t *item, const char *key, fido_opt_t value)
lib/libfido2/src/cbor.c
292
if ((pair.key = cbor_build_string(key)) == NULL ||
lib/libfido2/src/cbor.c
305
if (pair.key)
lib/libfido2/src/cbor.c
306
cbor_decref(&pair.key);
lib/libfido2/src/cbor.c
314
cbor_add_uint8(cbor_item_t *item, const char *key, uint8_t value)
lib/libfido2/src/cbor.c
321
if ((pair.key = cbor_build_string(key)) == NULL ||
lib/libfido2/src/cbor.c
334
if (pair.key)
lib/libfido2/src/cbor.c
335
cbor_decref(&pair.key);
lib/libfido2/src/cbor.c
353
if ((pair.key = cbor_build_uint8(n)) == NULL) {
lib/libfido2/src/cbor.c
367
if (pair.key)
lib/libfido2/src/cbor.c
368
cbor_decref(&pair.key);
lib/libfido2/src/cbor.c
485
alg.key = cbor_build_string("alg");
lib/libfido2/src/cbor.c
492
if (alg.key == NULL || alg.value == NULL) {
lib/libfido2/src/cbor.c
513
if (alg.key != NULL)
lib/libfido2/src/cbor.c
514
cbor_decref(&alg.key);
lib/libfido2/src/cbor.c
541
cbor_item_t *key = NULL;
lib/libfido2/src/cbor.c
547
if ((key = cbor_encode_pubkey(&list->ptr[i])) == NULL ||
lib/libfido2/src/cbor.c
548
cbor_array_push(array, key) == false)
lib/libfido2/src/cbor.c
550
cbor_decref(&key);
lib/libfido2/src/cbor.c
555
if (key != NULL)
lib/libfido2/src/cbor.c
556
cbor_decref(&key);
lib/libfido2/src/cbor.c
697
fido_blob_t key;
lib/libfido2/src/cbor.c
699
key.ptr = secret->ptr;
lib/libfido2/src/cbor.c
700
key.len = secret->len;
lib/libfido2/src/cbor.c
708
if (prot == CTAP_PIN_PROTOCOL2 && key.len > 32)
lib/libfido2/src/cbor.c
709
key.len = 32;
lib/libfido2/src/cbor.c
711
if ((md = EVP_sha256()) == NULL || HMAC(md, key.ptr,
lib/libfido2/src/cbor.c
712
(int)key.len, data->ptr, data->len, dgst,
lib/libfido2/src/cbor.c
743
fido_blob_t key;
lib/libfido2/src/cbor.c
747
key.ptr = secret->ptr;
lib/libfido2/src/cbor.c
748
key.len = secret->len;
lib/libfido2/src/cbor.c
755
if (prot == CTAP_PIN_PROTOCOL2 && key.len > 32)
lib/libfido2/src/cbor.c
756
key.len = 32;
lib/libfido2/src/cbor.c
76
if (v[i].key == NULL || v[i].value == NULL) {
lib/libfido2/src/cbor.c
760
HMAC_Init_ex(ctx, key.ptr, (int)key.len, md, NULL) == 0 ||
lib/libfido2/src/cbor.c
78
__func__, (void *)v[i].key, (void *)v[i].value, i);
lib/libfido2/src/cbor.c
81
if (i && ctap_check_cbor(v[i - 1].key, v[i].key) < 0) {
lib/libfido2/src/cbor.c
839
if ((pair.key = cbor_build_string("hmac-secret")) == NULL) {
lib/libfido2/src/cbor.c
85
if (f(v[i].key, v[i].value, arg) < 0) {
lib/libfido2/src/cbor.c
860
if (pair.key != NULL)
lib/libfido2/src/cbor.c
861
cbor_decref(&pair.key);
lib/libfido2/src/cbor.c
936
find_cose_alg(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/cbor.c
940
if (cbor_isa_uint(key) == true &&
lib/libfido2/src/cbor.c
941
cbor_int_get_width(key) == CBOR_INT_8) {
lib/libfido2/src/cbor.c
942
switch (cbor_get_uint8(key)) {
lib/libfido2/src/cbor.c
964
} else if (cbor_isa_negint(key) == true &&
lib/libfido2/src/cbor.c
965
cbor_int_get_width(key) == CBOR_INT_8) {
lib/libfido2/src/cbor.c
966
if (cbor_get_uint8(key) == 0) {
lib/libfido2/src/cred.c
18
parse_makecred_reply(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/cred.c
22
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/cred.c
23
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/cred.c
28
switch (cbor_get_uint8(key)) {
lib/libfido2/src/credman.c
178
credman_parse_metadata(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/credman.c
183
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/credman.c
184
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/credman.c
189
switch (cbor_get_uint8(key)) {
lib/libfido2/src/credman.c
248
credman_parse_rk(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/credman.c
253
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/credman.c
254
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/credman.c
259
switch (cbor_get_uint8(key)) {
lib/libfido2/src/credman.c
297
credman_parse_rk_count(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/credman.c
304
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/credman.c
305
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/credman.c
306
cbor_get_uint8(key) != 9) {
lib/libfido2/src/credman.c
468
credman_parse_rp(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/credman.c
472
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/credman.c
473
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/credman.c
478
switch (cbor_get_uint8(key)) {
lib/libfido2/src/credman.c
506
credman_parse_rp_count(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/credman.c
513
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/credman.c
514
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/credman.c
515
cbor_get_uint8(key) != 5) {
lib/libfido2/src/ecdh.c
100
hkdf_sha256(key->ptr + SHA256_DIGEST_LENGTH, aes_info,
lib/libfido2/src/ecdh.c
20
hkdf_sha256(uint8_t *key, const char *info, const fido_blob_t *secret)
lib/libfido2/src/ecdh.c
27
HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt,
lib/libfido2/src/ecdh.c
35
hkdf_sha256(uint8_t *key, char *info, fido_blob_t *secret)
lib/libfido2/src/ecdh.c
63
if (EVP_PKEY_derive(ctx, key, &keylen) < 1) {
lib/libfido2/src/ecdh.c
80
kdf(uint8_t prot, fido_blob_t *key, /* const */ fido_blob_t *secret)
lib/libfido2/src/ecdh.c
88
key->len = SHA256_DIGEST_LENGTH;
lib/libfido2/src/ecdh.c
89
if ((key->ptr = calloc(1, key->len)) == NULL ||
lib/libfido2/src/ecdh.c
90
SHA256(secret->ptr, secret->len, key->ptr) != key->ptr) {
lib/libfido2/src/ecdh.c
97
key->len = 2 * SHA256_DIGEST_LENGTH;
lib/libfido2/src/ecdh.c
98
if ((key->ptr = calloc(1, key->len)) == NULL ||
lib/libfido2/src/ecdh.c
99
hkdf_sha256(key->ptr, hmac_info, secret) < 0 ||
lib/libfido2/src/eddsa.c
15
EVP_PKEY_new_raw_public_key(int type, ENGINE *e, const unsigned char *key,
lib/libfido2/src/eddsa.c
20
(void)key;
lib/libfido2/src/eddsa.c
75
decode_pubkey_point(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/eddsa.c
79
if (cbor_isa_negint(key) == false ||
lib/libfido2/src/eddsa.c
80
cbor_int_get_width(key) != CBOR_INT_8)
lib/libfido2/src/eddsa.c
83
switch (cbor_get_uint8(key)) {
lib/libfido2/src/es256.c
100
if ((argv[1].key = cbor_build_uint8(3)) == NULL ||
lib/libfido2/src/es256.c
106
if ((argv[2].key = cbor_build_negint8(0)) == NULL ||
lib/libfido2/src/es256.c
112
if ((argv[3].key = cbor_build_negint8(1)) == NULL ||
lib/libfido2/src/es256.c
118
if ((argv[4].key = cbor_build_negint8(2)) == NULL ||
lib/libfido2/src/es256.c
133
if (argv[i].key)
lib/libfido2/src/es256.c
134
cbor_decref(&argv[i].key);
lib/libfido2/src/es256.c
220
es256_sk_create(es256_sk_t *key)
lib/libfido2/src/es256.c
247
(n = BN_num_bytes(d)) < 0 || (size_t)n > sizeof(key->d) ||
lib/libfido2/src/es256.c
248
(n = BN_bn2bin(d, key->d)) < 0 || (size_t)n > sizeof(key->d)) {
lib/libfido2/src/es256.c
38
decode_pubkey_point(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/es256.c
42
if (cbor_isa_negint(key) == false ||
lib/libfido2/src/es256.c
43
cbor_int_get_width(key) != CBOR_INT_8)
lib/libfido2/src/es256.c
46
switch (cbor_get_uint8(key)) {
lib/libfido2/src/es256.c
83
if ((argv[0].key = cbor_build_uint8(1)) == NULL ||
lib/libfido2/src/hid.c
10
get_key_len(uint8_t tag, uint8_t *key, size_t *key_len)
lib/libfido2/src/hid.c
103
if (key == 0x94) {
lib/libfido2/src/hid.c
105
} else if (key == 0x80) {
lib/libfido2/src/hid.c
107
} else if (key == 0x90) {
lib/libfido2/src/hid.c
12
*key = tag & 0xfc;
lib/libfido2/src/hid.c
13
if ((*key & 0xf0) == 0xf0) {
lib/libfido2/src/hid.c
14
fido_log_debug("%s: *key=0x%02x", __func__, *key);
lib/libfido2/src/hid.c
61
uint8_t key;
lib/libfido2/src/hid.c
65
if (get_key_len(tag, &key, &key_len) < 0 || key_len > len ||
lib/libfido2/src/hid.c
70
if (key == 0x4) {
lib/libfido2/src/hid.c
94
uint8_t key;
lib/libfido2/src/hid.c
98
if (get_key_len(tag, &key, &key_len) < 0 || key_len > len ||
lib/libfido2/src/info.c
155
decode_algorithm_entry(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/info.c
162
if (cbor_string_copy(key, &name) < 0) {
lib/libfido2/src/info.c
240
parse_reply_element(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/info.c
244
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/info.c
245
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/info.c
250
switch (cbor_get_uint8(key)) {
lib/libfido2/src/info.c
66
decode_option(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/info.c
78
if (cbor_string_copy(key, &o->name[i]) < 0) {
lib/libfido2/src/largeblob.c
118
const fido_blob_t *key)
lib/libfido2/src/largeblob.c
140
if (aes256_gcm_enc(key, &blob->nonce, aad, plaintext,
lib/libfido2/src/largeblob.c
187
parse_largeblob_reply(const cbor_item_t *key, const cbor_item_t *val,
lib/libfido2/src/largeblob.c
190
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/largeblob.c
191
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/largeblob.c
192
cbor_get_uint8(key) != 1) {
lib/libfido2/src/largeblob.c
265
largeblob_do_decode(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/largeblob.c
270
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/largeblob.c
271
cbor_int_get_width(key) != CBOR_INT_8) {
lib/libfido2/src/largeblob.c
276
switch (cbor_get_uint8(key)) {
lib/libfido2/src/largeblob.c
320
largeblob_encode(const fido_blob_t *body, const fido_blob_t *key)
lib/libfido2/src/largeblob.c
327
largeblob_seal(blob, body, key) < 0) {
lib/libfido2/src/largeblob.c
347
const fido_blob_t *key)
lib/libfido2/src/largeblob.c
361
(plaintext = largeblob_decrypt(&blob, key)) == NULL) {
lib/libfido2/src/largeblob.c
637
largeblob_add(fido_dev_t *dev, const fido_blob_t *key, cbor_item_t *item,
lib/libfido2/src/largeblob.c
64
largeblob_decrypt(const largeblob_t *blob, const fido_blob_t *key)
lib/libfido2/src/largeblob.c
649
switch (r = largeblob_array_lookup(NULL, &idx, array, key)) {
lib/libfido2/src/largeblob.c
681
largeblob_drop(fido_dev_t *dev, const fido_blob_t *key, const char *pin,
lib/libfido2/src/largeblob.c
692
if ((r = largeblob_array_lookup(NULL, &idx, array, key)) != FIDO_OK) {
lib/libfido2/src/largeblob.c
719
fido_blob_t key, body;
lib/libfido2/src/largeblob.c
723
memset(&key, 0, sizeof(key));
lib/libfido2/src/largeblob.c
737
if (fido_blob_set(&key, key_ptr, key_len) < 0) {
lib/libfido2/src/largeblob.c
745
if ((r = largeblob_array_lookup(&body, NULL, item, &key)) != FIDO_OK)
lib/libfido2/src/largeblob.c
755
fido_blob_reset(&key);
lib/libfido2/src/largeblob.c
766
fido_blob_t key, body;
lib/libfido2/src/largeblob.c
770
memset(&key, 0, sizeof(key));
lib/libfido2/src/largeblob.c
78
if (aes256_gcm_dec(key, &blob->nonce, aad, &blob->ciphertext,
lib/libfido2/src/largeblob.c
782
if (fido_blob_set(&key, key_ptr, key_len) < 0 ||
lib/libfido2/src/largeblob.c
788
if ((item = largeblob_encode(&body, &key)) == NULL) {
lib/libfido2/src/largeblob.c
793
if ((r = largeblob_add(dev, &key, item, pin, &ms)) != FIDO_OK)
lib/libfido2/src/largeblob.c
799
fido_blob_reset(&key);
lib/libfido2/src/largeblob.c
809
fido_blob_t key;
lib/libfido2/src/largeblob.c
813
memset(&key, 0, sizeof(key));
lib/libfido2/src/largeblob.c
819
if (fido_blob_set(&key, key_ptr, key_len) < 0) {
lib/libfido2/src/largeblob.c
823
if ((r = largeblob_drop(dev, &key, pin, &ms)) != FIDO_OK)
lib/libfido2/src/largeblob.c
826
fido_blob_reset(&key);
lib/libfido2/src/pin.c
268
parse_uv_token(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/pin.c
272
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/pin.c
273
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/pin.c
274
cbor_get_uint8(key) != 2) {
lib/libfido2/src/pin.c
513
parse_retry_count(const uint8_t keyval, const cbor_item_t *key,
lib/libfido2/src/pin.c
519
if (cbor_isa_uint(key) == false ||
lib/libfido2/src/pin.c
520
cbor_int_get_width(key) != CBOR_INT_8 ||
lib/libfido2/src/pin.c
521
cbor_get_uint8(key) != keyval) {
lib/libfido2/src/pin.c
537
parse_pin_retry_count(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/pin.c
539
return (parse_retry_count(3, key, val, arg));
lib/libfido2/src/pin.c
543
parse_uv_retry_count(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/pin.c
545
return (parse_retry_count(5, key, val, arg));
lib/libfido2/src/rs256.c
47
decode_rsa_pubkey(const cbor_item_t *key, const cbor_item_t *val, void *arg)
lib/libfido2/src/rs256.c
51
if (cbor_isa_negint(key) == false ||
lib/libfido2/src/rs256.c
52
cbor_int_get_width(key) != CBOR_INT_8)
lib/libfido2/src/rs256.c
55
switch (cbor_get_uint8(key)) {
lib/libfido2/src/tpm.c
131
tpm_rs256_key_t key;
lib/libfido2/src/tpm.c
195
x->key.size = htobe16(x->key.size);
lib/libfido2/src/tpm.c
249
expected.key.size = sizeof(expected.key.body);
lib/libfido2/src/tpm.c
250
memcpy(&expected.key.body, &pk->n, sizeof(expected.key.body));
lib/libfido2/src/u2f.c
433
if ((kv[0].key = cbor_build_string("alg")) == NULL ||
lib/libfido2/src/u2f.c
440
if ((kv[1].key = cbor_build_string("sig")) == NULL ||
lib/libfido2/src/u2f.c
447
if ((kv[2].key = cbor_build_string("x5c")) == NULL ||
lib/libfido2/src/u2f.c
470
if (kv[i].key)
lib/libfido2/src/u2f.c
471
cbor_decref(&kv[i].key);
lib/libfuse/dict.c
103
return strcmp(a->key, b->key);
lib/libfuse/dict.c
29
char key[MAX_DICTKEY_SIZE + 1];
lib/libfuse/dict.c
40
struct dictentry key;
lib/libfuse/dict.c
42
if (strlcpy(key.key, k, sizeof key.key) >= sizeof key.key)
lib/libfuse/dict.c
45
return (SPLAY_FIND(dict, d, &key) != NULL);
lib/libfuse/dict.c
51
struct dictentry *entry, key;
lib/libfuse/dict.c
53
if (strlcpy(key.key, k, sizeof key.key) >= sizeof key.key)
lib/libfuse/dict.c
55
if ((entry = SPLAY_FIND(dict, d, &key)) == NULL) {
lib/libfuse/dict.c
60
strlcpy(entry->key, k, sizeof entry->key);
lib/libfuse/dict.c
72
struct dictentry key, *entry;
lib/libfuse/dict.c
74
if (strlcpy(key.key, k, sizeof key.key) >= sizeof key.key)
lib/libfuse/dict.c
76
if ((entry = SPLAY_FIND(dict, d, &key)) == NULL)
lib/libfuse/dict.c
85
struct dictentry key, *entry;
lib/libfuse/dict.c
88
if (strlcpy(key.key, k, sizeof key.key) >= sizeof key.key)
lib/libfuse/dict.c
90
if ((entry = SPLAY_FIND(dict, d, &key)) == NULL)
lib/libfuse/fuse.c
234
ifuse_lib_opt_proc(void *data, const char *arg, int key,
lib/libfuse/fuse.c
237
switch (key) {
lib/libfuse/fuse.c
411
ifuse_process_opt(void *data, const char *arg, int key,
lib/libfuse/fuse.c
418
switch (key) {
lib/libfuse/fuse_lowlevel.c
61
ifuse_ll_opt_proc(void *data, const char *arg, int key,
lib/libfuse/fuse_lowlevel.c
64
switch (key) {
lib/libfuse/tree.c
37
struct treeentry key;
lib/libfuse/tree.c
39
key.id = id;
lib/libfuse/tree.c
40
return (SPLAY_FIND(tree, t, &key) != NULL);
lib/libfuse/tree.c
46
struct treeentry *entry, key;
lib/libfuse/tree.c
48
key.id = id;
lib/libfuse/tree.c
49
if ((entry = SPLAY_FIND(tree, t, &key)) == NULL) {
lib/libfuse/tree.c
65
struct treeentry key, *entry;
lib/libfuse/tree.c
67
key.id = id;
lib/libfuse/tree.c
68
if ((entry = SPLAY_FIND(tree, t, &key)) == NULL) {
lib/libfuse/tree.c
79
struct treeentry key, *entry;
lib/libfuse/tree.c
82
key.id = id;
lib/libfuse/tree.c
83
if ((entry = SPLAY_FIND(tree, t, &key)) == NULL)
lib/libkeynote/auxil.c
101
kl2 = keynote_keylist_find(keynote_current_assertion->as_keylist, key);
lib/libkeynote/auxil.c
110
s = key;
lib/libkeynote/auxil.c
134
keynote_keylist_add(struct keylist **keylist, char *key)
lib/libkeynote/auxil.c
152
if (kn_decode_key(&dc, key, KEYNOTE_PUBLIC_KEY) != 0)
lib/libkeynote/auxil.c
160
kl->key_stringkey = key;
lib/libkeynote/auxil.c
170
kn_remove_authorizer(int sessid, char *key)
lib/libkeynote/auxil.c
197
if (!strcmp(kl->key_stringkey, key))
lib/libkeynote/auxil.c
206
if (!strcmp(kl->key_next->key_stringkey, key))
lib/libkeynote/auxil.c
223
kn_add_authorizer(int sessid, char *key)
lib/libkeynote/auxil.c
239
stringkey = strdup(key);
lib/libkeynote/auxil.c
42
keynote_keyhash(void *key, int alg)
lib/libkeynote/auxil.c
49
if (key == NULL)
lib/libkeynote/auxil.c
55
dsa = (DSA *) key;
lib/libkeynote/auxil.c
63
rsa = (RSA *) key;
lib/libkeynote/auxil.c
69
rsa = (RSA *) key;
lib/libkeynote/auxil.c
75
bn = (struct keynote_binary *) key;
lib/libkeynote/auxil.c
82
return keynote_stringhash(key, HASHTABLESIZE);
lib/libkeynote/auxil.c
93
keynote_in_action_authorizers(void *key, int algorithm)
lib/libkeynote/keynote-keygen.c
68
print_key(FILE *fp, char *algname, char *key, int start, int length)
lib/libkeynote/keynote-keygen.c
75
for (i = 0, k = strlen(algname) + 2; i < strlen(key); i++, k++)
lib/libkeynote/keynote-keygen.c
79
if (i == strlen(key))
lib/libkeynote/keynote-keygen.c
91
fprintf(fp, "%c", key[i]);
lib/libkeynote/keynote.y
137
keylist: key
lib/libkeynote/keynote.y
145
| key COMMA keylist
lib/libkeynote/keynote.y
154
key: str {
lib/libkeynote/keynote.y
29
%type <intval> notemptykeypredicate prog key keyexp keylist
lib/libkeynote/keynote.y
655
void *key = (void *) s;
lib/libkeynote/keynote.y
663
key = kl->key_key;
lib/libkeynote/keynote.y
668
as = keynote_find_assertion(key, i, alg);
lib/libkeynote/keynote.y
76
| SIGNERKEY { keynote_exceptionflag = keynote_donteval = 0; } key
lib/libkeynote/keynote.y
78
key
lib/libkeynote/keynote.y
97
notemptykeypredicate: key { $$ = $1; }
lib/libkeynote/signature.c
1054
kn_sign_assertion(char *buf, int buflen, char *key, char *sigalg, int vflag)
lib/libkeynote/signature.c
1064
if (sigalg == NULL || buf == NULL || key == NULL)
lib/libkeynote/signature.c
1082
s = keynote_get_private_key(key);
lib/libkeynote/signature.c
1096
dc.dec_key = key;
lib/libkeynote/signature.c
135
keynote_free_key(void *key, int type)
lib/libkeynote/signature.c
137
if (key == NULL)
lib/libkeynote/signature.c
143
DSA_free(key);
lib/libkeynote/signature.c
150
RSA_free(key);
lib/libkeynote/signature.c
157
RSA_free(key); /* RSA-specific */
lib/libkeynote/signature.c
164
free(((struct keynote_binary *) key)->bn_key);
lib/libkeynote/signature.c
165
free(key);
lib/libkeynote/signature.c
171
free(key);
lib/libkeynote/signature.c
265
keynote_get_key_algorithm(char *key, int *encoding, int *internalencoding)
lib/libkeynote/signature.c
267
if (!strncasecmp(DSA_HEX, key, DSA_HEX_LEN))
lib/libkeynote/signature.c
274
if (!strncasecmp(DSA_BASE64, key, DSA_BASE64_LEN))
lib/libkeynote/signature.c
281
if (!strncasecmp(RSA_PKCS1_HEX, key, RSA_PKCS1_HEX_LEN))
lib/libkeynote/signature.c
288
if (!strncasecmp(RSA_PKCS1_BASE64, key, RSA_PKCS1_BASE64_LEN))
lib/libkeynote/signature.c
295
if (!strncasecmp(X509_BASE64, key, X509_BASE64_LEN))
lib/libkeynote/signature.c
302
if (!strncasecmp(X509_HEX, key, X509_HEX_LEN))
lib/libkeynote/signature.c
309
if (!strncasecmp(BINARY_HEX, key, BINARY_HEX_LEN))
lib/libkeynote/signature.c
316
if (!strncasecmp(BINARY_BASE64, key, BINARY_BASE64_LEN))
lib/libkeynote/signature.c
333
keynote_get_private_key_algorithm(char *key, int *encoding,
lib/libkeynote/signature.c
336
if (strncasecmp(KEYNOTE_PRIVATE_KEY_PREFIX, key,
lib/libkeynote/signature.c
344
return keynote_get_key_algorithm(key + KEYNOTE_PRIVATE_KEY_PREFIX_LEN,
lib/libkeynote/signature.c
352
kn_decode_key(struct keynote_deckey *dc, char *key, int keytype)
lib/libkeynote/signature.c
362
dc->dec_algorithm = keynote_get_private_key_algorithm(key, &encoding,
lib/libkeynote/signature.c
365
dc->dec_algorithm = keynote_get_key_algorithm(key, &encoding,
lib/libkeynote/signature.c
369
if ((dc->dec_key = strdup(key)) == NULL) {
lib/libkeynote/signature.c
377
key = strchr(key, ':'); /* Move forward, to the Encoding. We're guaranteed
lib/libkeynote/signature.c
379
key++;
lib/libkeynote/signature.c
388
len = strlen(key) / 2;
lib/libkeynote/signature.c
389
if (kn_decode_hex(key, (char **) &decoded) != 0)
lib/libkeynote/signature.c
395
len = strlen(key);
lib/libkeynote/signature.c
410
if ((len = kn_decode_base64(key, decoded, len)) == -1)
lib/libkeynote/signature.c
415
decoded = strdup(key);
lib/libkeynote/signature.c
420
len = strlen(key);
lib/libkeynote/signature.c
786
keynote_sign_assertion(struct assertion *as, char *sigalg, void *key,
lib/libkeynote/signature.c
804
key == NULL ||
lib/libkeynote/signature.c
868
dsa = (DSA *) key;
lib/libkeynote/signature.c
890
rsa = (RSA *) key;
lib/libkeynote/signature.c
917
if (BIO_write(biokey, key, strlen(key) + 1) <= 0)
lib/librthread/rthread.c
183
_thread_key_zero(int key)
lib/librthread/rthread.c
190
if (rs->keyid == key)
lib/libskey/skeylogin.c
251
char key[SKEY_BINKEY_SIZE], fkey[SKEY_BINKEY_SIZE];
lib/libskey/skeylogin.c
268
if (etob(key, response) != 1 && atob8(key, response) != 0)
lib/libskey/skeylogin.c
272
(void)memcpy(fkey, key, sizeof(key));
lib/libskey/skeylogin.c
303
btoa8(mp->val,key);
lib/libssl/s3_lib.c
1433
_SSL_get_peer_tmp_key(SSL *s, EVP_PKEY **key)
lib/libssl/s3_lib.c
1438
*key = NULL;
lib/libssl/s3_lib.c
1448
*key = pkey;
lib/libssl/s3_lib.c
1681
if (ssl->cert->key != NULL)
lib/libssl/s3_lib.c
1682
*out_chain = ssl->cert->key->chain;
lib/libssl/s3_lib.c
2082
if (ctx->cert->key != NULL)
lib/libssl/s3_lib.c
2083
*out_chain = ctx->cert->key->chain;
lib/libssl/s3_lib.c
2114
*certs = ctx->cert->key->chain;
lib/libssl/ssl_cert.c
172
ret->key = &(ret->pkeys[SSL_PKEY_RSA]);
lib/libssl/ssl_cert.c
196
ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
lib/libssl/ssl_cert.c
319
if ((cpk = ssl_cert->key) == NULL)
lib/libssl/ssl_cert.c
363
if ((cpk = ssl_cert->key) == NULL)
lib/libssl/ssl_clnt.c
1858
uint8_t *key = NULL;
lib/libssl/ssl_clnt.c
1873
if (!tls_key_share_derive(s->s3->hs.key_share, &key, &key_len))
lib/libssl/ssl_clnt.c
1882
if (!tls12_derive_master_secret(s, key, key_len))
lib/libssl/ssl_clnt.c
1888
freezero(key, key_len);
lib/libssl/ssl_clnt.c
1896
uint8_t *key = NULL;
lib/libssl/ssl_clnt.c
1918
if (!tls_key_share_derive(s->s3->hs.key_share, &key, &key_len))
lib/libssl/ssl_clnt.c
1921
if (!tls12_derive_master_secret(s, key, key_len))
lib/libssl/ssl_clnt.c
1927
freezero(key, key_len);
lib/libssl/ssl_clnt.c
2122
pkey = s->cert->key->privatekey;
lib/libssl/ssl_clnt.c
2175
if (s->cert->key->x509 == NULL ||
lib/libssl/ssl_clnt.c
2176
s->cert->key->privatekey == NULL)
lib/libssl/ssl_clnt.c
2223
(s->s3->hs.tls12.cert_request == 2) ? NULL : s->cert->key))
lib/libssl/ssl_kex.c
243
uint8_t *key = NULL;
lib/libssl/ssl_kex.c
249
if ((key = calloc(1, key_len)) == NULL)
lib/libssl/ssl_kex.c
252
if ((key_len = DH_compute_key(key, DH_get0_pub_key(dh_peer), dh)) <= 0)
lib/libssl/ssl_kex.c
255
*shared_key = key;
lib/libssl/ssl_kex.c
257
key = NULL;
lib/libssl/ssl_kex.c
262
freezero(key, key_len);
lib/libssl/ssl_kex.c
392
uint8_t *key = NULL;
lib/libssl/ssl_kex.c
406
if ((key = calloc(1, key_len)) == NULL)
lib/libssl/ssl_kex.c
409
if (ECDH_compute_key(key, key_len, point, ecdh, NULL) <= 0)
lib/libssl/ssl_kex.c
412
*shared_key = key;
lib/libssl/ssl_kex.c
414
key = NULL;
lib/libssl/ssl_kex.c
419
freezero(key, key_len);
lib/libssl/ssl_lib.c
1003
return (X509_check_private_key(ctx->cert->key->x509,
lib/libssl/ssl_lib.c
1004
ctx->cert->key->privatekey));
lib/libssl/ssl_lib.c
1020
if (ssl->cert->key->x509 == NULL) {
lib/libssl/ssl_lib.c
1024
if (ssl->cert->key->privatekey == NULL) {
lib/libssl/ssl_lib.c
1028
return (X509_check_private_key(ssl->cert->key->x509,
lib/libssl/ssl_lib.c
1029
ssl->cert->key->privatekey));
lib/libssl/ssl_lib.c
3070
return (s->cert->key->x509);
lib/libssl/ssl_lib.c
3078
return (s->cert->key->privatekey);
lib/libssl/ssl_lib.c
3431
return ctx->cert->key->x509;
lib/libssl/ssl_lib.c
3441
return ctx->cert->key->privatekey;
lib/libssl/ssl_lib.c
995
(ctx->cert->key->x509 == NULL)) {
lib/libssl/ssl_lib.c
999
if (ctx->cert->key->privatekey == NULL) {
lib/libssl/ssl_local.h
306
SSL_CERT_PKEY *key;
lib/libssl/ssl_local.h
612
CBS *key, CBS *iv);
lib/libssl/ssl_local.h
614
CBS *key, CBS *iv);
lib/libssl/ssl_local.h
647
CBS *mac_key, CBS *key, CBS *iv);
lib/libssl/ssl_local.h
649
CBS *mac_key, CBS *key, CBS *iv);
lib/libssl/ssl_rsa.c
225
c->key = &(c->pkeys[i]);
lib/libssl/ssl_rsa.c
445
c->key = &(c->pkeys[i]);
lib/libssl/ssl_srvr.c
1743
uint8_t *key = NULL;
lib/libssl/ssl_srvr.c
1768
if (!tls_key_share_derive(s->s3->hs.key_share, &key, &key_len))
lib/libssl/ssl_srvr.c
1771
if (!tls12_derive_master_secret(s, key, key_len))
lib/libssl/ssl_srvr.c
1777
freezero(key, key_len);
lib/libssl/ssl_srvr.c
1785
uint8_t *key = NULL;
lib/libssl/ssl_srvr.c
1811
if (!tls_key_share_derive(s->s3->hs.key_share, &key, &key_len))
lib/libssl/ssl_srvr.c
1814
if (!tls12_derive_master_secret(s, key, key_len))
lib/libssl/ssl_srvr.c
1820
freezero(key, key_len);
lib/libssl/t1_enc.c
302
CBS mac_key, key, iv;
lib/libssl/t1_enc.c
307
&mac_key, &key, &iv);
lib/libssl/t1_enc.c
310
&mac_key, &key, &iv);
lib/libssl/t1_enc.c
315
&mac_key, &key, &iv))
lib/libssl/t1_enc.c
321
&mac_key, &key, &iv))
lib/libssl/t1_lib.c
811
s->cert->key = certpkey;
lib/libssl/tls12_key_schedule.c
72
CBS *key, CBS *iv)
lib/libssl/tls12_key_schedule.c
75
CBS_dup(&kb->client_write_key, key);
lib/libssl/tls12_key_schedule.c
81
CBS *key, CBS *iv)
lib/libssl/tls12_key_schedule.c
84
CBS_dup(&kb->server_write_key, key);
lib/libssl/tls12_record_layer.c
416
struct tls12_record_protection *rp, int is_write, CBS *mac_key, CBS *key,
lib/libssl/tls12_record_layer.c
458
if (!EVP_AEAD_CTX_init(rp->aead_ctx, rl->aead, CBS_data(key),
lib/libssl/tls12_record_layer.c
459
CBS_len(key), EVP_AEAD_DEFAULT_TAG_LENGTH, NULL))
lib/libssl/tls12_record_layer.c
467
struct tls12_record_protection *rp, int is_write, CBS *mac_key, CBS *key,
lib/libssl/tls12_record_layer.c
480
if (CBS_len(iv) > INT_MAX || CBS_len(key) > INT_MAX)
lib/libssl/tls12_record_layer.c
484
if (EVP_CIPHER_key_length(rl->cipher) != CBS_len(key))
lib/libssl/tls12_record_layer.c
503
if (!EVP_CipherInit_ex(rp->cipher_ctx, rl->cipher, NULL, CBS_data(key),
lib/libssl/tls12_record_layer.c
521
struct tls12_record_protection *rp, int is_write, CBS *mac_key, CBS *key,
lib/libssl/tls12_record_layer.c
526
key, iv);
lib/libssl/tls12_record_layer.c
529
key, iv);
lib/libssl/tls12_record_layer.c
534
CBS *mac_key, CBS *key, CBS *iv)
lib/libssl/tls12_record_layer.c
549
mac_key, key, iv))
lib/libssl/tls12_record_layer.c
566
CBS *mac_key, CBS *key, CBS *iv)
lib/libssl/tls12_record_layer.c
581
mac_key, key, iv))
lib/libssl/tls13_client.c
731
uint8_t key[EVP_MAX_MD_SIZE];
lib/libssl/tls13_client.c
739
finished_key.data = key;
lib/libssl/tls13_record_layer.c
471
struct tls13_secret key = { .data = NULL, .len = 0 };
lib/libssl/tls13_record_layer.c
483
if (!tls13_secret_init(&key, EVP_AEAD_key_length(aead)))
lib/libssl/tls13_record_layer.c
488
if (!tls13_hkdf_expand_label(&key, hash, traffic_key, "key", &context))
lib/libssl/tls13_record_layer.c
491
if (!EVP_AEAD_CTX_init(rp->aead_ctx, aead, key.data, key.len,
lib/libssl/tls13_record_layer.c
498
tls13_secret_cleanup(&key);
lib/libssl/tls13_server.c
1027
uint8_t key[EVP_MAX_MD_SIZE];
lib/libssl/tls13_server.c
1035
finished_key.data = key;
lib/libssl/tls_internal.h
52
typedef int (*tls_traffic_key_cb)(struct tls13_secret *key,
lib/libtls/tls_config.c
389
size_t cert_len, const uint8_t *key, size_t key_len,
lib/libtls/tls_config.c
398
if (key != NULL &&
lib/libtls/tls_config.c
399
tls_keypair_set_key_mem(keypair, &config->error, key, key_len) != 0)
lib/libtls/tls_config.c
417
size_t cert_len, const uint8_t *key, size_t key_len)
lib/libtls/tls_config.c
419
return tls_config_add_keypair_mem_internal(config, cert, cert_len, key,
lib/libtls/tls_config.c
433
size_t cert_len, const uint8_t *key, size_t key_len, const uint8_t *staple,
lib/libtls/tls_config.c
436
return tls_config_add_keypair_mem_internal(config, cert, cert_len, key,
lib/libtls/tls_config.c
641
tls_config_set_key_mem(struct tls_config *config, const uint8_t *key,
lib/libtls/tls_config.c
645
key, len);
lib/libtls/tls_config.c
665
size_t cert_len, const uint8_t *key, size_t key_len,
lib/libtls/tls_config.c
670
if (tls_config_set_key_mem(config, key, key_len) != 0)
lib/libtls/tls_config.c
689
size_t cert_len, const uint8_t *key, size_t key_len)
lib/libtls/tls_config.c
692
key, key_len, NULL, 0);
lib/libtls/tls_config.c
705
size_t cert_len, const uint8_t *key, size_t key_len,
lib/libtls/tls_config.c
709
key, key_len, staple, staple_len);
lib/libtls/tls_config.c
898
unsigned char *key, size_t keylen)
lib/libtls/tls_config.c
913
memcpy(newkey.aes_key, key, sizeof(newkey.aes_key));
lib/libtls/tls_config.c
914
memcpy(newkey.hmac_key, key + sizeof(newkey.aes_key),
lib/libtls/tls_config.c
946
unsigned char key[TLS_TICKET_KEY_SIZE];
lib/libtls/tls_config.c
949
arc4random_buf(key, sizeof(key));
lib/libtls/tls_config.c
950
rv = tls_config_add_ticket_key(config, config->ticket_keyrev++, key,
lib/libtls/tls_config.c
951
sizeof(key));
lib/libtls/tls_keypair.c
100
return tls_set_mem(&keypair->key_mem, &keypair->key_len, key, len);
lib/libtls/tls_keypair.c
97
const uint8_t *key, size_t len)
lib/libtls/tls_server.c
145
struct tls_ticket_key *key = NULL;
lib/libtls/tls_server.c
163
key = tk;
lib/libtls/tls_server.c
167
return (key);
lib/libtls/tls_server.c
174
struct tls_ticket_key *key;
lib/libtls/tls_server.c
182
key = tls_server_ticket_key(tls_ctx->config, NULL);
lib/libtls/tls_server.c
183
if (key == NULL) {
lib/libtls/tls_server.c
189
memcpy(keyname, key->key_name, sizeof(key->key_name));
lib/libtls/tls_server.c
192
key->aes_key, iv)) {
lib/libtls/tls_server.c
197
if (!HMAC_Init_ex(hctx, key->hmac_key, sizeof(key->hmac_key),
lib/libtls/tls_server.c
206
key = tls_server_ticket_key(tls_ctx->config, keyname);
lib/libtls/tls_server.c
207
if (key == NULL)
lib/libtls/tls_server.c
211
key->aes_key, iv)) {
lib/libtls/tls_server.c
216
if (!HMAC_Init_ex(hctx, key->hmac_key, sizeof(key->hmac_key),
lib/libtls/tls_server.c
224
if (key != &tls_ctx->config->ticket_keys[0])
lib/libtls/tls_signer.c
127
if ((bio = BIO_new_mem_buf(key, key_len)) == NULL) {
lib/libtls/tls_signer.c
173
char *cert = NULL, *key = NULL;
lib/libtls/tls_signer.c
181
if (tls_config_load_file(&signer->error, "key", key_file, &key,
lib/libtls/tls_signer.c
185
rv = tls_signer_add_keypair_mem(signer, cert, cert_len, key, key_len);
lib/libtls/tls_signer.c
189
free(key);
lib/libtls/tls_signer.c
91
size_t cert_len, const uint8_t *key, size_t key_len)
lib/libtls/tls_util.c
154
EVP_PKEY *key = NULL;
lib/libtls/tls_util.c
189
key = PEM_read_PrivateKey(fp, NULL, tls_password_cb, password);
lib/libtls/tls_util.c
191
if (key == NULL)
lib/libtls/tls_util.c
197
if (!PEM_write_bio_PrivateKey(bio, key, NULL, NULL, 0, NULL, NULL))
lib/libtls/tls_util.c
206
EVP_PKEY_free(key);
lib/libtls/tls_util.c
217
EVP_PKEY_free(key);
lib/libutil/bcrypt_pbkdf.c
159
key[dest] = out[i];
lib/libutil/bcrypt_pbkdf.c
173
arc4random_buf(key, keylen);
lib/libutil/bcrypt_pbkdf.c
99
uint8_t *key, size_t keylen, unsigned int rounds)
lib/libutil/pkcs5_pbkdf2.c
111
memcpy(key, obuf, r);
lib/libutil/pkcs5_pbkdf2.c
112
key += r;
lib/libutil/pkcs5_pbkdf2.c
124
arc4random_buf(key, key_len);
lib/libutil/pkcs5_pbkdf2.c
34
hmac_sha1(const u_int8_t *text, size_t text_len, const u_int8_t *key,
lib/libutil/pkcs5_pbkdf2.c
44
SHA1Update(&ctx, key, key_len);
lib/libutil/pkcs5_pbkdf2.c
47
key = tk;
lib/libutil/pkcs5_pbkdf2.c
52
bcopy(key, k_pad, key_len);
lib/libutil/pkcs5_pbkdf2.c
62
bcopy(key, k_pad, key_len);
lib/libutil/pkcs5_pbkdf2.c
78
size_t salt_len, uint8_t *key, size_t key_len, unsigned int rounds)
libexec/ld.so/hppa/rtld_machine.c
82
hppa_plabel_t key, *p;
libexec/ld.so/hppa/rtld_machine.c
84
key.pc = pc;
libexec/ld.so/hppa/rtld_machine.c
85
key.sl = sl;
libexec/ld.so/hppa/rtld_machine.c
86
p = SPLAY_FIND(_dl_md_plabels, &_dl_md_plabel_root, &key);
libexec/login_ldap/aldap.c
584
char *key;
libexec/login_ldap/aldap.c
591
&key, &b) != 0)
libexec/login_ldap/aldap.c
600
(*outkey) = utoa(key);
libexec/login_ldap/aldap.c
614
char *key;
libexec/login_ldap/aldap.c
625
if (ober_scanf_elements(msg->body.search.iter, "{s(e)}", &key, &a) != 0)
libexec/login_ldap/aldap.c
634
(*outkey) = utoa(key);
libexec/login_ldap/util.c
177
char *buf = NULL, *key, *value, *tail;
libexec/login_ldap/util.c
212
for (key = buf; key[0] != '\0' && isspace(key[0]); key++)
libexec/login_ldap/util.c
215
if (key[0] == '#' || key[0] == '\0')
libexec/login_ldap/util.c
217
if ((tail = value = strchr(key, '=')) == NULL) {
libexec/login_ldap/util.c
218
dlog(0, "Missing value for option '%s'", key);
libexec/login_ldap/util.c
226
if (strcmp(key, "host") == 0) {
libexec/login_ldap/util.c
237
} else if (strcmp(key, "basedn") == 0) {
libexec/login_ldap/util.c
243
} else if (strcmp(key, "binddn") == 0) {
libexec/login_ldap/util.c
247
} else if (strcmp(key, "bindpw") == 0) {
libexec/login_ldap/util.c
253
} else if (strcmp(key, "timeout") == 0) {
libexec/login_ldap/util.c
259
} else if (strcmp(key, "filter") == 0) {
libexec/login_ldap/util.c
263
} else if (strcmp(key, "scope") == 0) {
libexec/login_ldap/util.c
266
} else if (strcmp(key, "cacert") == 0) {
libexec/login_ldap/util.c
272
} else if (strcmp(key, "cacertdir") == 0) {
libexec/login_ldap/util.c
278
} else if (strcmp(key, "gbasedn") == 0) {
libexec/login_ldap/util.c
284
} else if (strcmp(key, "gfilter") == 0) {
libexec/login_ldap/util.c
290
} else if (strcmp(key, "gscope") == 0) {
libexec/login_ldap/util.c
294
dlog(0, "Unknown option '%s'", key);
libexec/login_token/tokendb.c
107
DBT key;
libexec/login_token/tokendb.c
111
key.data = username;
libexec/login_token/tokendb.c
112
key.size = strlen(username) + 1;
libexec/login_token/tokendb.c
124
status = (tokendb->put)(tokendb, &key, &data, 0);
libexec/login_token/tokendb.c
137
DBT key;
libexec/login_token/tokendb.c
140
key.data = username;
libexec/login_token/tokendb.c
141
key.size = strlen(username) + 1;
libexec/login_token/tokendb.c
148
status = (tokendb->del)(tokendb, &key, 0);
libexec/login_token/tokendb.c
253
DBT key;
libexec/login_token/tokendb.c
260
status = (tokendb->seq)(tokendb, &key, &data,
libexec/login_token/tokendb.c
286
DBT key;
libexec/login_token/tokendb.c
292
status = (tokendb->seq)(tokendb, &key, &data,
libexec/login_token/tokendb.c
317
DBT key;
libexec/login_token/tokendb.c
321
key.data = username;
libexec/login_token/tokendb.c
322
key.size = strlen(username) + 1;
libexec/login_token/tokendb.c
332
switch ((tokendb->get)(tokendb, &key, &data, 0)) {
libexec/login_token/tokendb.c
351
status = (tokendb->put)(tokendb, &key, &data, 0);
libexec/login_token/tokendb.c
73
DBT key;
libexec/login_token/tokendb.c
77
key.data = username;
libexec/login_token/tokendb.c
78
key.size = strlen(username) + 1;
libexec/login_token/tokendb.c
84
status = (tokendb->get)(tokendb, &key, &data, 0);
libexec/login_yubikey/login_yubikey.c
188
char hexkey[33], key[YUBIKEY_KEY_SIZE];
libexec/login_yubikey/login_yubikey.c
231
yubikey_hex_decode(key, hexkey, YUBIKEY_KEY_SIZE);
libexec/login_yubikey/login_yubikey.c
241
r = yubikey_parse((uint8_t *)password, (uint8_t *)key, &tok, i++);
libexec/login_yubikey/login_yubikey.c
246
explicit_bzero(key, sizeof(key));
libexec/login_yubikey/login_yubikey.c
267
explicit_bzero(key, sizeof(key));
libexec/login_yubikey/login_yubikey.c
272
explicit_bzero(key, sizeof(key));
libexec/login_yubikey/login_yubikey.c
278
explicit_bzero(key, sizeof(key));
libexec/login_yubikey/yubikey.c
127
yubikey_aes_decrypt(uint8_t *state, const uint8_t *key)
libexec/login_yubikey/yubikey.c
134
memcpy(round_key, key, sizeof(round_key));
libexec/login_yubikey/yubikey.c
327
yubikey_parse(const uint8_t *password, const uint8_t key[YUBIKEY_KEY_SIZE],
libexec/login_yubikey/yubikey.c
367
yubikey_aes_decrypt((void *)out, key);
libexec/login_yubikey/yubikey.h
65
const uint8_t key[YUBIKEY_KEY_SIZE], yubikey_token_t out, int index);
libexec/login_yubikey/yubikey.h
74
extern void yubikey_aes_decrypt(uint8_t *state, const uint8_t *key);
libexec/spamd/grey.c
412
queue_change(char *key, char *data, size_t dsiz, int act)
libexec/spamd/grey.c
420
if ((dbc->key = strdup(key)) == NULL) {
libexec/spamd/grey.c
427
free(dbc->key);
libexec/spamd/grey.c
436
dbc->key);
libexec/spamd/grey.c
453
dbk.size = strlen(dbc->key);
libexec/spamd/grey.c
454
dbk.data = dbc->key;
libexec/spamd/grey.c
461
"can't add %s to spamd db (%m)", dbc->key);
libexec/spamd/grey.c
468
dbk.size = strlen(dbc->key);
libexec/spamd/grey.c
469
dbk.data = dbc->key;
libexec/spamd/grey.c
473
dbc->key);
libexec/spamd/grey.c
481
free(dbc->key);
libexec/spamd/grey.c
482
dbc->key = NULL;
libexec/spamd/grey.c
496
db_addrstate(DB *db, char *key)
libexec/spamd/grey.c
502
dbk.size = strlen(key);
libexec/spamd/grey.c
503
dbk.data = key;
libexec/spamd/grey.c
764
char *key = NULL;
libexec/spamd/grey.c
777
if (asprintf(&key, "%s\n%s\n%s\n%s", ip, helo, from, to) == -1)
libexec/spamd/grey.c
784
lookup = key;
libexec/spamd/grey.c
793
key);
libexec/spamd/grey.c
821
ip, low_prio_mx_ip, key);
libexec/spamd/grey.c
87
char * key;
libexec/spamd/grey.c
870
free(key);
libexec/spamd/grey.c
871
key = NULL;
libexec/spamd/grey.c
887
free(key);
libexec/spamd/grey.c
888
key = NULL;
regress/lib/libc/asr/bin/common.c
163
for(i = 0; kv_rcode[i].key; i++)
regress/lib/libc/asr/bin/common.c
165
return (kv_rcode[i].key);
regress/lib/libc/asr/bin/common.c
178
for(i = 0; kv_type[i].key; i++)
regress/lib/libc/asr/bin/common.c
180
return (kv_type[i].key);
regress/lib/libc/asr/bin/common.c
193
for(i = 0; kv_class[i].key; i++)
regress/lib/libc/asr/bin/common.c
195
return (kv_class[i].key);
regress/lib/libc/asr/bin/common.c
207
for(i = 0; kv_type[i].key; i++)
regress/lib/libc/asr/bin/common.c
208
if (!strcasecmp(kv_type[i].key, name))
regress/lib/libc/asr/bin/common.c
219
for(i = 0; kv_class[i].key; i++)
regress/lib/libc/asr/bin/common.c
220
if (!strcasecmp(kv_class[i].key, name))
regress/lib/libc/asr/bin/common.c
231
for(i = 0; kv_resopt[i].key; i++)
regress/lib/libc/asr/bin/common.c
232
if (!strcasecmp(kv_resopt[i].key, name))
regress/lib/libc/asr/bin/common.c
89
const char *key;
regress/lib/libc/db/dbtest.c
204
rem(dbp, &key);
regress/lib/libc/db/dbtest.c
226
seq(dbp, &key);
regress/lib/libc/db/dbtest.c
246
put(dbp, &key, &data);
regress/lib/libc/db/dbtest.c
253
free(key.data);
regress/lib/libc/db/dbtest.c
263
key.data = rfile(p + 1, &key.size);
regress/lib/libc/db/dbtest.c
271
key.data = &recno;
regress/lib/libc/db/dbtest.c
272
key.size = sizeof(recno);
regress/lib/libc/db/dbtest.c
274
key.data = xmalloc(p + 1, len - 1);
regress/lib/libc/db/dbtest.c
275
key.size = len - 1;
regress/lib/libc/db/dbtest.c
279
getdata(dbp, &key, &keydata);
regress/lib/libc/db/dbtest.c
283
get(dbp, &key);
regress/lib/libc/db/dbtest.c
285
free(key.data);
regress/lib/libc/db/dbtest.c
292
rem(dbp, &key);
regress/lib/libc/db/dbtest.c
294
free(key.data);
regress/lib/libc/db/dbtest.c
298
seq(dbp, &key);
regress/lib/libc/db/dbtest.c
300
free(key.data);
regress/lib/libc/db/dbtest.c
489
DBT key, data;
regress/lib/libc/db/dbtest.c
500
switch (dbp->seq(dbp, &key, &data, flags)) {
regress/lib/libc/db/dbtest.c
82
DBT data, key, keydata;
regress/lib/libc/hsearch/hsearchtest.c
101
TEST(strcmp(ep->key, ch) == 0);
regress/lib/libc/hsearch/hsearchtest.c
115
TEST(strcmp(ep->key, "a") == 0 && (long)ep->data == 0);
regress/lib/libc/hsearch/hsearchtest.c
117
TEST(strcmp(ep2->key, "b") == 0 && (long)ep2->data == 1);
regress/lib/libc/hsearch/hsearchtest.c
75
e.key = strdup(ch); /* ptr to provided key is kept! */
regress/lib/libc/hsearch/hsearchtest.c
76
TEST(e.key != NULL);
regress/lib/libc/hsearch/hsearchtest.c
80
TEST(strcmp(ep->key, ch) == 0);
regress/lib/libc/hsearch/hsearchtest.c
85
e.key = ch;
regress/lib/libc/hsearch/hsearchtest.c
92
TEST(strcmp(ep->key, ch) == 0);
regress/lib/libcrypto/aes/aes_test.c
118
.key = {
regress/lib/libcrypto/aes/aes_test.c
144
.key = {
regress/lib/libcrypto/aes/aes_test.c
174
.key = {
regress/lib/libcrypto/aes/aes_test.c
210
.key = {
regress/lib/libcrypto/aes/aes_test.c
244
.key = {
regress/lib/libcrypto/aes/aes_test.c
26
const uint8_t key[64];
regress/lib/libcrypto/aes/aes_test.c
279
.key = {
regress/lib/libcrypto/aes/aes_test.c
317
.key = {
regress/lib/libcrypto/aes/aes_test.c
351
.key = {
regress/lib/libcrypto/aes/aes_test.c
386
.key = {
regress/lib/libcrypto/aes/aes_test.c
40
.key = {
regress/lib/libcrypto/aes/aes_test.c
424
.key = {
regress/lib/libcrypto/aes/aes_test.c
458
.key = {
regress/lib/libcrypto/aes/aes_test.c
493
.key = {
regress/lib/libcrypto/aes/aes_test.c
532
.key = {
regress/lib/libcrypto/aes/aes_test.c
557
.key = {
regress/lib/libcrypto/aes/aes_test.c
57
.key = {
regress/lib/libcrypto/aes/aes_test.c
586
.key = {
regress/lib/libcrypto/aes/aes_test.c
615
.key = {
regress/lib/libcrypto/aes/aes_test.c
648
.key= {
regress/lib/libcrypto/aes/aes_test.c
690
AES_KEY key;
regress/lib/libcrypto/aes/aes_test.c
700
if (AES_set_encrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
704
AES_ecb_encrypt(at->in, out, &key, 1);
regress/lib/libcrypto/aes/aes_test.c
714
if (AES_set_decrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
718
AES_ecb_encrypt(at->out, out, &key, 0);
regress/lib/libcrypto/aes/aes_test.c
734
AES_KEY key;
regress/lib/libcrypto/aes/aes_test.c
746
if (AES_set_encrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
75
.key = {
regress/lib/libcrypto/aes/aes_test.c
750
AES_cbc_encrypt(at->in, out, at->in_len, &key, iv, 1);
regress/lib/libcrypto/aes/aes_test.c
761
if (AES_set_decrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
765
AES_cbc_encrypt(at->out, out, at->out_len, &key, iv, 0);
regress/lib/libcrypto/aes/aes_test.c
780
AES_KEY key;
regress/lib/libcrypto/aes/aes_test.c
790
if (AES_set_encrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
794
AES_cfb128_encrypt(at->in, out, at->in_len, &key, iv, &num, AES_ENCRYPT);
regress/lib/libcrypto/aes/aes_test.c
806
if (AES_set_encrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
810
AES_cfb128_encrypt(at->out, out, at->out_len, &key, iv, &num, AES_DECRYPT);
regress/lib/libcrypto/aes/aes_test.c
825
AES_KEY key;
regress/lib/libcrypto/aes/aes_test.c
835
if (AES_set_encrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
839
AES_ofb128_encrypt(at->in, out, at->in_len, &key, iv, &num);
regress/lib/libcrypto/aes/aes_test.c
851
if (AES_set_encrypt_key(at->key, key_bits, &key) != 0) {
regress/lib/libcrypto/aes/aes_test.c
855
AES_ofb128_encrypt(at->out, out, at->out_len, &key, iv, &num);
regress/lib/libcrypto/aes/aes_test.c
898
if (!EVP_EncryptInit(ctx, NULL, at->key, at->iv)) {
regress/lib/libcrypto/aes/aes_test.c
96
.key = {
regress/lib/libcrypto/aes/aes_test.c
968
if (!EVP_DecryptInit(ctx, NULL, at->key, at->iv)) {
regress/lib/libcrypto/aeswrap/aes_wrap.c
113
static const unsigned char key[] = {
regress/lib/libcrypto/aeswrap/aes_wrap.c
161
ret = AES_wrap_unwrap_test(kek, 128, NULL, e1, key, 16);
regress/lib/libcrypto/aeswrap/aes_wrap.c
165
ret = AES_wrap_unwrap_test(kek, 192, NULL, e2, key, 16);
regress/lib/libcrypto/aeswrap/aes_wrap.c
169
ret = AES_wrap_unwrap_test(kek, 256, NULL, e3, key, 16);
regress/lib/libcrypto/aeswrap/aes_wrap.c
173
ret = AES_wrap_unwrap_test(kek, 192, NULL, e4, key, 24);
regress/lib/libcrypto/aeswrap/aes_wrap.c
177
ret = AES_wrap_unwrap_test(kek, 256, NULL, e5, key, 24);
regress/lib/libcrypto/aeswrap/aes_wrap.c
181
ret = AES_wrap_unwrap_test(kek, 256, NULL, e6, key, 32);
regress/lib/libcrypto/aeswrap/aes_wrap.c
66
const unsigned char *key, int keylen)
regress/lib/libcrypto/aeswrap/aes_wrap.c
78
r = AES_wrap_key(&wctx, iv, otmp, key, keylen);
regress/lib/libcrypto/aeswrap/aes_wrap.c
91
if (memcmp(key, ptmp, keylen))
regress/lib/libcrypto/bf/bf_test.c
1005
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
1006
BF_ecb_encrypt(bt->out, out, &key, 0);
regress/lib/libcrypto/bf/bf_test.c
1020
BF_KEY key;
regress/lib/libcrypto/bf/bf_test.c
1032
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
1033
BF_cbc_encrypt(bt->in, out, bt->in_len, &key, iv, 1);
regress/lib/libcrypto/bf/bf_test.c
104
.key = {
regress/lib/libcrypto/bf/bf_test.c
1044
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
1045
BF_cbc_encrypt(bt->out, out, bt->out_len, &key, iv, 0);
regress/lib/libcrypto/bf/bf_test.c
1059
BF_KEY key;
regress/lib/libcrypto/bf/bf_test.c
1072
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
1073
BF_cfb64_encrypt(bt->in, out, bt->in_len * 8, &key, iv, &remainder, 1);
regress/lib/libcrypto/bf/bf_test.c
1085
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
1086
BF_cfb64_encrypt(bt->out, out, bt->out_len, &key, iv, &remainder, 0);
regress/lib/libcrypto/bf/bf_test.c
1100
BF_KEY key;
regress/lib/libcrypto/bf/bf_test.c
1113
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
1114
BF_ofb64_encrypt(bt->in, out, bt->in_len, &key, iv, &remainder);
regress/lib/libcrypto/bf/bf_test.c
1126
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
1127
BF_ofb64_encrypt(bt->out, out, bt->out_len, &key, iv, &remainder);
regress/lib/libcrypto/bf/bf_test.c
1177
if (!EVP_EncryptInit(ctx, NULL, bt->key, bt->iv)) {
regress/lib/libcrypto/bf/bf_test.c
119
.key = {
regress/lib/libcrypto/bf/bf_test.c
1250
if (!EVP_DecryptInit(ctx, NULL, bt->key, bt->iv)) {
regress/lib/libcrypto/bf/bf_test.c
134
.key = {
regress/lib/libcrypto/bf/bf_test.c
149
.key = {
regress/lib/libcrypto/bf/bf_test.c
164
.key = {
regress/lib/libcrypto/bf/bf_test.c
179
.key = {
regress/lib/libcrypto/bf/bf_test.c
194
.key = {
regress/lib/libcrypto/bf/bf_test.c
209
.key = {
regress/lib/libcrypto/bf/bf_test.c
224
.key = {
regress/lib/libcrypto/bf/bf_test.c
239
.key = {
regress/lib/libcrypto/bf/bf_test.c
254
.key = {
regress/lib/libcrypto/bf/bf_test.c
26
const uint8_t key[64];
regress/lib/libcrypto/bf/bf_test.c
269
.key = {
regress/lib/libcrypto/bf/bf_test.c
284
.key = {
regress/lib/libcrypto/bf/bf_test.c
299
.key = {
regress/lib/libcrypto/bf/bf_test.c
314
.key = {
regress/lib/libcrypto/bf/bf_test.c
329
.key = {
regress/lib/libcrypto/bf/bf_test.c
344
.key = {
regress/lib/libcrypto/bf/bf_test.c
359
.key = {
regress/lib/libcrypto/bf/bf_test.c
374
.key = {
regress/lib/libcrypto/bf/bf_test.c
389
.key = {
regress/lib/libcrypto/bf/bf_test.c
404
.key = {
regress/lib/libcrypto/bf/bf_test.c
419
.key = {
regress/lib/libcrypto/bf/bf_test.c
434
.key = {
regress/lib/libcrypto/bf/bf_test.c
44
.key = {
regress/lib/libcrypto/bf/bf_test.c
449
.key = {
regress/lib/libcrypto/bf/bf_test.c
464
.key = {
regress/lib/libcrypto/bf/bf_test.c
479
.key = {
regress/lib/libcrypto/bf/bf_test.c
494
.key = {
regress/lib/libcrypto/bf/bf_test.c
509
.key = {
regress/lib/libcrypto/bf/bf_test.c
524
.key = {
regress/lib/libcrypto/bf/bf_test.c
544
.key = {
regress/lib/libcrypto/bf/bf_test.c
573
.key = {
regress/lib/libcrypto/bf/bf_test.c
59
.key = {
regress/lib/libcrypto/bf/bf_test.c
594
.key = {
regress/lib/libcrypto/bf/bf_test.c
616
.key = {
regress/lib/libcrypto/bf/bf_test.c
638
.key = {
regress/lib/libcrypto/bf/bf_test.c
664
.key = {
regress/lib/libcrypto/bf/bf_test.c
687
.key = {
regress/lib/libcrypto/bf/bf_test.c
711
.key = {
regress/lib/libcrypto/bf/bf_test.c
732
.key = {
regress/lib/libcrypto/bf/bf_test.c
74
.key = {
regress/lib/libcrypto/bf/bf_test.c
754
.key = {
regress/lib/libcrypto/bf/bf_test.c
776
.key = {
regress/lib/libcrypto/bf/bf_test.c
802
.key = {
regress/lib/libcrypto/bf/bf_test.c
823
.key = {
regress/lib/libcrypto/bf/bf_test.c
846
.key = {
regress/lib/libcrypto/bf/bf_test.c
867
.key = {
regress/lib/libcrypto/bf/bf_test.c
889
.key = {
regress/lib/libcrypto/bf/bf_test.c
89
.key = {
regress/lib/libcrypto/bf/bf_test.c
911
.key = {
regress/lib/libcrypto/bf/bf_test.c
937
.key = {
regress/lib/libcrypto/bf/bf_test.c
958
.key = {
regress/lib/libcrypto/bf/bf_test.c
984
BF_KEY key;
regress/lib/libcrypto/bf/bf_test.c
994
BF_set_key(&key, bt->key_len, bt->key);
regress/lib/libcrypto/bf/bf_test.c
995
BF_ecb_encrypt(bt->in, out, &key, 1);
regress/lib/libcrypto/bn/bn_mont.c
38
unsigned char *key = NULL;
regress/lib/libcrypto/bn/bn_mont.c
63
key = malloc(DH_size(dh));
regress/lib/libcrypto/bn/bn_mont.c
64
if (key == NULL)
regress/lib/libcrypto/bn/bn_mont.c
66
if (DH_compute_key(key, DH_get0_pub_key(dh), dh) == -1)
regress/lib/libcrypto/bn/bn_mont.c
69
free(key);
regress/lib/libcrypto/bn/bn_mont.c
70
key = NULL;
regress/lib/libcrypto/bn/bn_mont.c
79
free(key);
regress/lib/libcrypto/cast/casttest.c
106
CAST_KEY key;
regress/lib/libcrypto/cast/casttest.c
109
CAST_set_key(&key, k_len[z], k);
regress/lib/libcrypto/cast/casttest.c
111
CAST_ecb_encrypt(in, out, &key, CAST_ENCRYPT);
regress/lib/libcrypto/cast/casttest.c
126
CAST_ecb_encrypt(out, out, &key, CAST_DECRYPT);
regress/lib/libcrypto/cast/casttest.c
160
CAST_set_key(&key, 16, out_a);
regress/lib/libcrypto/cast/casttest.c
161
CAST_ecb_encrypt(&(out_b[0]), &(out_b[0]), &key,
regress/lib/libcrypto/cast/casttest.c
163
CAST_ecb_encrypt(&(out_b[8]), &(out_b[8]), &key,
regress/lib/libcrypto/chacha/chachatest.c
231
CRYPTO_chacha_20(out, in, tv->len, tv->key, tv->iv, 0);
regress/lib/libcrypto/chacha/chachatest.c
241
ChaCha_set_key(&ctx, tv->key, 256);
regress/lib/libcrypto/chacha/chachatest.c
254
ChaCha_set_key(&ctx, tv->key, 256);
regress/lib/libcrypto/chacha/chachatest.c
27
const unsigned char key[32];
regress/lib/libcrypto/chacha/chachatest.c
275
ChaCha_set_key(&ctx, tv->key, 256);
regress/lib/libcrypto/chacha/chachatest.c
299
static const unsigned char key[32] = {
regress/lib/libcrypto/chacha/chachatest.c
319
CRYPTO_hchacha_20(out, key, nonce);
regress/lib/libcrypto/chacha/chachatest.c
343
static const unsigned char key[32] = {
regress/lib/libcrypto/chacha/chachatest.c
438
CRYPTO_xchacha_20(out, plain, sizeof(out), key, iv);
regress/lib/libcrypto/ec/ec_asn1_test.c
2034
ec_key_check_sanity(const struct ec_private_key *key)
regress/lib/libcrypto/ec/ec_asn1_test.c
2043
p = key->der;
regress/lib/libcrypto/ec/ec_asn1_test.c
2044
if ((ec_key = d2i_ECPrivateKey(NULL, &p, key->der_len)) == NULL) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2045
fprintf(stderr, "FAIL: d2i_ECPrivateKey for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2051
flags, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2062
fprintf(stderr, "FAIL: EC_KEY_check_key() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2069
fprintf(stderr, "FAIL: i2d_ECPrivateKey() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2074
if (compare_data(key->name, der, der_len, key->der, key->der_len) == -1)
regress/lib/libcrypto/ec/ec_asn1_test.c
2090
ec_key_test_point_encoding(const struct ec_private_key *key, const EC_KEY *ec_key)
regress/lib/libcrypto/ec/ec_asn1_test.c
2100
fprintf(stderr, "FAIL: EC_KEY_get0_group() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2104
fprintf(stderr, "FAIL: EC_KEY_get0_public_key() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2110
fprintf(stderr, "FAIL: EC_POINT_point2hex() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2114
if ((hex_len = strlen(hex)) != 2 * key->oct_len) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2116
hex_len, key->oct_len, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2120
if (compare_data(key->name, hex, hex_len, key->hex, hex_len) == -1) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2122
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2127
fprintf(stderr, "FAIL: i2o_ECPublicKey for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2131
if (compare_data(key->name, ostr, ostr_len, key->oct, key->oct_len) == -1) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2133
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2147
ec_key_test_point_versus_bn(const struct ec_private_key *key, const EC_KEY *ec_key)
regress/lib/libcrypto/ec/ec_asn1_test.c
2157
fprintf(stderr, "FAIL: EC_KEY_get0_group() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2161
fprintf(stderr, "FAIL: EC_KEY_get0_public_key() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2173
fprintf(stderr, "FAIL: EC_POINT_point2bn() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2177
if (BN_hex2bn(&hex_bn, key->hex) == 0) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2178
fprintf(stderr, "FAIL: BN_hex2bn() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2184
"hex point and curve point for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2192
if ((point = EC_POINT_hex2point(group, key->hex, NULL, NULL)) == NULL) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2194
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2200
rv, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2211
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2216
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2221
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2226
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2233
rv, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2237
if (EC_POINT_hex2point(group, key->hex, point, NULL) == NULL) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2239
key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2246
rv, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2261
ec_key_test_i2o_and_o2i(const struct ec_private_key *key, const EC_KEY *ec_key_orig)
regress/lib/libcrypto/ec/ec_asn1_test.c
2272
fprintf(stderr, "FAIL: EC_KEY_dup failed for %s", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2280
fprintf(stderr, "FAIL: i2o_ECPublicKey for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2288
fprintf(stderr, "FAIL: EC_KEY_set_group() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2294
"got %02x, want %02x\n", key->name, form, POINT_CONVERSION_UNCOMPRESSED);
regress/lib/libcrypto/ec/ec_asn1_test.c
2301
fprintf(stderr, "FAIL: o2i_ECPublicKey() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2307
"got %02x, want %02x\n", key->name, form, POINT_CONVERSION_COMPRESSED);
regress/lib/libcrypto/ec/ec_asn1_test.c
2315
rv, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2330
ec_key_test_hybrid_roundtrip(const struct ec_private_key *key,
regress/lib/libcrypto/ec/ec_asn1_test.c
2346
fprintf(stderr, "FAIL: failed to kopy EC_KEY for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2354
fprintf(stderr, "FAIL: i2d_ECPrivateKey(2) for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2362
fprintf(stderr, "FAIL: EC_KEY_set_group() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2370
flags, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2376
fprintf(stderr, "FAIL: d2i_ECPrivateKey for public %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2383
" got %x, want %x\n", key->name, flags, EC_PKEY_NO_PUBKEY);
regress/lib/libcrypto/ec/ec_asn1_test.c
2390
"got %02x, want %02x\n", key->name, form, POINT_CONVERSION_COMPRESSED);
regress/lib/libcrypto/ec/ec_asn1_test.c
2398
"after DER roundtrip\n", rv, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2413
ec_key_test_parameter_roundtrip(const struct ec_private_key *key,
regress/lib/libcrypto/ec/ec_asn1_test.c
2425
der_len, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2435
fprintf(stderr, "FAIL: d2i_ECParameters for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2442
rv, key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2456
ec_group_check_private_key(const struct ec_private_key *key)
regress/lib/libcrypto/ec/ec_asn1_test.c
2461
if ((ec_key = ec_key_check_sanity(key)) == NULL) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2462
fprintf(stderr, "FAIL: ec_key_check_sanity() for %s\n", key->name);
regress/lib/libcrypto/ec/ec_asn1_test.c
2467
failed |= ec_key_test_point_encoding(key, ec_key);
regress/lib/libcrypto/ec/ec_asn1_test.c
2468
failed |= ec_key_test_point_versus_bn(key, ec_key);
regress/lib/libcrypto/ec/ec_asn1_test.c
2469
failed |= ec_key_test_i2o_and_o2i(key, ec_key);
regress/lib/libcrypto/ec/ec_asn1_test.c
2470
failed |= ec_key_test_hybrid_roundtrip(key, ec_key);
regress/lib/libcrypto/ec/ec_asn1_test.c
2471
failed |= ec_key_test_parameter_roundtrip(key, ec_key);
regress/lib/libcrypto/ecdh/ecc_cdh.c
2167
EC_KEY *key = NULL;
regress/lib/libcrypto/ecdh/ecc_cdh.c
2199
if ((key = EC_KEY_new_by_curve_name(test->nid)) == NULL)
regress/lib/libcrypto/ecdh/ecc_cdh.c
2207
if ((group = EC_KEY_get0_group(key)) == NULL)
regress/lib/libcrypto/ecdh/ecc_cdh.c
2223
if (!EC_KEY_set_private_key(key, priv))
regress/lib/libcrypto/ecdh/ecc_cdh.c
2225
if (!EC_KEY_set_public_key_affine_coordinates(key, pub_x, pub_y))
regress/lib/libcrypto/ecdh/ecc_cdh.c
2228
EC_KEY_set_flags(key, EC_FLAG_COFACTOR_ECDH);
regress/lib/libcrypto/ecdh/ecc_cdh.c
2230
out_len = ECDH_size(key);
regress/lib/libcrypto/ecdh/ecc_cdh.c
2234
if (ECDH_compute_key(out, out_len, peer_pub, key, NULL) != out_len)
regress/lib/libcrypto/ecdh/ecc_cdh.c
2260
EC_KEY_free(key);
regress/lib/libcrypto/ecdh/ecdhtest.c
288
EC_KEY *key = NULL;
regress/lib/libcrypto/ecdh/ecdhtest.c
294
if ((key = EC_KEY_new_by_curve_name(nid)) == NULL)
regress/lib/libcrypto/ecdh/ecdhtest.c
298
if (!EC_KEY_set_private_key(key, priv))
regress/lib/libcrypto/ecdh/ecdhtest.c
300
if ((group = EC_KEY_get0_group(key)) == NULL)
regress/lib/libcrypto/ecdh/ecdhtest.c
306
if (!EC_KEY_set_public_key(key, pub))
regress/lib/libcrypto/ecdh/ecdhtest.c
309
ret = key;
regress/lib/libcrypto/ecdh/ecdhtest.c
310
key = NULL;
regress/lib/libcrypto/ecdh/ecdhtest.c
313
EC_KEY_free(key);
regress/lib/libcrypto/evp/evptest.c
134
test1(const EVP_CIPHER *c, const unsigned char *key, int kn,
regress/lib/libcrypto/evp/evptest.c
146
hexdump(stdout, "Key",key,kn);
regress/lib/libcrypto/evp/evptest.c
168
if (!EVP_EncryptInit_ex(ctx, c, NULL, key, eiv)) {
regress/lib/libcrypto/evp/evptest.c
204
if (!EVP_DecryptInit_ex(ctx, c,NULL, key, eiv)) {
regress/lib/libcrypto/evp/evptest.c
243
test_cipher(const char *cipher, const unsigned char *key, int kn,
regress/lib/libcrypto/evp/evptest.c
253
test1(c, key, kn, iv, in, plaintext, pn, ciphertext, cn, encdec);
regress/lib/libcrypto/evp/evptest.c
349
unsigned char *iv, *key, *plaintext, *ciphertext;
regress/lib/libcrypto/evp/evptest.c
359
key=ustrsep(&p, ":");
regress/lib/libcrypto/evp/evptest.c
371
kn = convert(key);
regress/lib/libcrypto/evp/evptest.c
376
if (!test_cipher(cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, encdec) &&
regress/lib/libcrypto/gcm128/gcm128test.c
855
AES_KEY key;
regress/lib/libcrypto/gcm128/gcm128test.c
867
AES_set_encrypt_key(tv->K, tv->K_len * 8, &key);
regress/lib/libcrypto/gcm128/gcm128test.c
872
if ((ctx = CRYPTO_gcm128_new(&key, (block128_f)AES_encrypt)) == NULL)
regress/lib/libcrypto/hmac/hmactest.c
155
test[i].key, test[i].key_len,
regress/lib/libcrypto/hmac/hmactest.c
196
if (HMAC_Init_ex(ctx, test[4].key, test[4].key_len, NULL, NULL)) {
regress/lib/libcrypto/hmac/hmactest.c
206
if (HMAC_Init_ex(ctx, test[4].key, -1, EVP_sha1(), NULL)) {
regress/lib/libcrypto/hmac/hmactest.c
211
if (!HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) {
regress/lib/libcrypto/hmac/hmactest.c
238
if (!HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha256(), NULL)) {
regress/lib/libcrypto/hmac/hmactest.c
260
if (!HMAC_Init_ex(ctx, test[6].key, test[6].key_len, NULL, NULL)) {
regress/lib/libcrypto/hmac/hmactest.c
285
if (!HMAC_Init_ex(ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) {
regress/lib/libcrypto/hmac/hmactest.c
70
unsigned char key[16];
regress/lib/libcrypto/idea/ideatest.c
104
IDEA_KEY_SCHEDULE key,dkey;
regress/lib/libcrypto/idea/ideatest.c
107
idea_set_encrypt_key(k,&key);
regress/lib/libcrypto/idea/ideatest.c
108
idea_ecb_encrypt(in,out,&key);
regress/lib/libcrypto/idea/ideatest.c
123
idea_set_decrypt_key(&key,&dkey);
regress/lib/libcrypto/idea/ideatest.c
142
idea_cbc_encrypt((unsigned char *)text,out,strlen(text)+1,&key,iv,1);
regress/lib/libcrypto/ige/igetest.c
130
AES_KEY key;
regress/lib/libcrypto/ige/igetest.c
137
AES_set_encrypt_key(v->key, 8*sizeof v->key, &key);
regress/lib/libcrypto/ige/igetest.c
139
AES_set_decrypt_key(v->key, 8*sizeof v->key, &key);
regress/lib/libcrypto/ige/igetest.c
141
AES_ige_encrypt(v->in, buf, v->length, &key, iv, v->encrypt);
regress/lib/libcrypto/ige/igetest.c
146
hexdump(stdout, "key", v->key, sizeof v->key);
regress/lib/libcrypto/ige/igetest.c
158
AES_ige_encrypt(buf, buf, v->length, &key, iv, v->encrypt);
regress/lib/libcrypto/ige/igetest.c
163
hexdump(stdout, "key", v->key, sizeof v->key);
regress/lib/libcrypto/ige/igetest.c
180
AES_KEY key;
regress/lib/libcrypto/ige/igetest.c
201
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
202
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv,
regress/lib/libcrypto/ige/igetest.c
205
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
207
AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv,
regress/lib/libcrypto/ige/igetest.c
219
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
221
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
regress/lib/libcrypto/ige/igetest.c
225
&key, iv, AES_ENCRYPT);
regress/lib/libcrypto/ige/igetest.c
227
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
229
AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv,
regress/lib/libcrypto/ige/igetest.c
241
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
243
AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv,
regress/lib/libcrypto/ige/igetest.c
247
&key, iv, AES_ENCRYPT);
regress/lib/libcrypto/ige/igetest.c
249
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
251
AES_ige_encrypt(ciphertext, checktext, TEST_SIZE/2, &key, iv,
regress/lib/libcrypto/ige/igetest.c
254
checktext+TEST_SIZE/2, TEST_SIZE/2, &key, iv,
regress/lib/libcrypto/ige/igetest.c
266
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
268
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
273
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
275
AES_ige_encrypt(ciphertext, checktext, sizeof checktext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
296
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
298
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
303
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
305
AES_ige_encrypt(ciphertext, checktext, sizeof checktext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
320
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
322
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
327
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
329
AES_ige_encrypt(ciphertext, checktext, sizeof checktext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
344
AES_set_encrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
346
AES_ige_encrypt(plaintext, ciphertext, sizeof plaintext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
351
AES_set_decrypt_key(rkey, 8*sizeof rkey, &key);
regress/lib/libcrypto/ige/igetest.c
353
AES_ige_encrypt(ciphertext, checktext, sizeof checktext, &key, iv,
regress/lib/libcrypto/ige/igetest.c
80
const unsigned char key[16];
regress/lib/libcrypto/poly1305/poly1305test.c
13
const unsigned char key[32]);
regress/lib/libcrypto/poly1305/poly1305test.c
20
const unsigned char key[32]) {
regress/lib/libcrypto/poly1305/poly1305test.c
22
CRYPTO_poly1305_init(&ctx, key);
regress/lib/libcrypto/rc2/rc2_test.c
106
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
122
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
139
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
156
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
178
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
195
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
212
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
229
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
248
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
26
const uint8_t key[64];
regress/lib/libcrypto/rc2/rc2_test.c
270
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
293
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
316
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
345
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
367
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
390
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
413
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
42
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
442
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
464
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
487
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
510
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
542
RC2_KEY key;
regress/lib/libcrypto/rc2/rc2_test.c
547
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
548
RC2_ecb_encrypt(rt->in, out, &key, 1);
regress/lib/libcrypto/rc2/rc2_test.c
558
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
559
RC2_ecb_encrypt(rt->out, out, &key, 0);
regress/lib/libcrypto/rc2/rc2_test.c
573
RC2_KEY key;
regress/lib/libcrypto/rc2/rc2_test.c
58
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
580
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
581
RC2_cbc_encrypt(rt->in, out, rt->in_len, &key, iv, 1);
regress/lib/libcrypto/rc2/rc2_test.c
592
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
593
RC2_cbc_encrypt(rt->out, out, rt->out_len, &key, iv, 0);
regress/lib/libcrypto/rc2/rc2_test.c
607
RC2_KEY key;
regress/lib/libcrypto/rc2/rc2_test.c
615
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
616
RC2_cfb64_encrypt(rt->in, out, rt->in_len * 8, &key, iv, &remainder, 1);
regress/lib/libcrypto/rc2/rc2_test.c
627
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
628
RC2_cfb64_encrypt(rt->out, out, rt->out_len, &key, iv, &remainder, 0);
regress/lib/libcrypto/rc2/rc2_test.c
642
RC2_KEY key;
regress/lib/libcrypto/rc2/rc2_test.c
650
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
651
RC2_ofb64_encrypt(rt->in, out, rt->in_len, &key, iv, &remainder);
regress/lib/libcrypto/rc2/rc2_test.c
662
RC2_set_key(&key, rt->key_len, rt->key, rt->key_bits);
regress/lib/libcrypto/rc2/rc2_test.c
663
RC2_ofb64_encrypt(rt->out, out, rt->out_len, &key, iv, &remainder);
regress/lib/libcrypto/rc2/rc2_test.c
720
if (!EVP_EncryptInit(ctx, NULL, rt->key, rt->iv)) {
regress/lib/libcrypto/rc2/rc2_test.c
74
.key = {
regress/lib/libcrypto/rc2/rc2_test.c
800
if (!EVP_DecryptInit(ctx, NULL, rt->key, rt->iv)) {
regress/lib/libcrypto/rc2/rc2_test.c
90
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
122
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
135
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
148
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
161
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
176
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
25
const uint8_t key[32];
regress/lib/libcrypto/rc4/rc4_test.c
322
RC4_KEY key;
regress/lib/libcrypto/rc4/rc4_test.c
341
RC4_set_key(&key, rt->key_len, rt->key);
regress/lib/libcrypto/rc4/rc4_test.c
342
RC4(&key, rt->len, rt->in, out);
regress/lib/libcrypto/rc4/rc4_test.c
351
RC4_set_key(&key, rt->key_len, rt->key);
regress/lib/libcrypto/rc4/rc4_test.c
352
RC4(&key, rt->len, rt->out, out);
regress/lib/libcrypto/rc4/rc4_test.c
374
if (!EVP_EncryptInit(ctx, cipher, rt->key, NULL)) {
regress/lib/libcrypto/rc4/rc4_test.c
39
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
420
if (!EVP_DecryptInit(ctx, cipher, rt->key, NULL)) {
regress/lib/libcrypto/rc4/rc4_test.c
58
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
77
.key = {
regress/lib/libcrypto/rc4/rc4_test.c
97
.key = {
regress/lib/libcrypto/rsa/rsa_test.c
106
if (!RSA_set0_crt_params(key, bn_dmp1, bn_dmq1, bn_iqmp))
regress/lib/libcrypto/rsa/rsa_test.c
129
key2(RSA *key, unsigned char *c)
regress/lib/libcrypto/rsa/rsa_test.c
180
if (!RSA_set0_key(key, bn_n, bn_e, bn_d))
regress/lib/libcrypto/rsa/rsa_test.c
190
if (!RSA_set0_factors(key, bn_p, bn_q))
regress/lib/libcrypto/rsa/rsa_test.c
200
if (!RSA_set0_crt_params(key, bn_dmp1, bn_dmq1, bn_iqmp))
regress/lib/libcrypto/rsa/rsa_test.c
223
key3(RSA *key, unsigned char *c)
regress/lib/libcrypto/rsa/rsa_test.c
301
if (!RSA_set0_key(key, bn_n, bn_e, bn_d))
regress/lib/libcrypto/rsa/rsa_test.c
31
key1(RSA *key, unsigned char *c)
regress/lib/libcrypto/rsa/rsa_test.c
311
if (!RSA_set0_factors(key, bn_p, bn_q))
regress/lib/libcrypto/rsa/rsa_test.c
321
if (!RSA_set0_crt_params(key, bn_dmp1, bn_dmq1, bn_iqmp))
regress/lib/libcrypto/rsa/rsa_test.c
359
RSA *key;
regress/lib/libcrypto/rsa/rsa_test.c
372
key = RSA_new();
regress/lib/libcrypto/rsa/rsa_test.c
375
clen = key1(key, ctext_ex);
regress/lib/libcrypto/rsa/rsa_test.c
378
clen = key2(key, ctext_ex);
regress/lib/libcrypto/rsa/rsa_test.c
381
clen = key3(key, ctext_ex);
regress/lib/libcrypto/rsa/rsa_test.c
391
num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
regress/lib/libcrypto/rsa/rsa_test.c
399
num = RSA_private_decrypt(num, ctext, ptext, key,
regress/lib/libcrypto/rsa/rsa_test.c
409
num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
regress/lib/libcrypto/rsa/rsa_test.c
421
num = RSA_private_decrypt(num, ctext, ptext, key,
regress/lib/libcrypto/rsa/rsa_test.c
434
num = RSA_private_decrypt(clen, ctext_ex, ptext, key,
regress/lib/libcrypto/rsa/rsa_test.c
445
num = RSA_private_decrypt(clen, ctext, ptext, key,
regress/lib/libcrypto/rsa/rsa_test.c
457
num = RSA_private_decrypt(n, ctext, ptext, key,
regress/lib/libcrypto/rsa/rsa_test.c
467
RSA_free(key);
regress/lib/libcrypto/rsa/rsa_test.c
86
if (!RSA_set0_key(key, bn_n, bn_e, bn_d))
regress/lib/libcrypto/rsa/rsa_test.c
96
if (!RSA_set0_factors(key, bn_p, bn_q))
regress/lib/libcrypto/sm2/sm2crypttest.c
100
EC_KEY *key = NULL;
regress/lib/libcrypto/sm2/sm2crypttest.c
110
key = EC_KEY_new();
regress/lib/libcrypto/sm2/sm2crypttest.c
111
EC_KEY_set_group(key, group);
regress/lib/libcrypto/sm2/sm2crypttest.c
112
EC_KEY_set_private_key(key, priv);
regress/lib/libcrypto/sm2/sm2crypttest.c
117
EC_KEY_set_public_key(key, pt);
regress/lib/libcrypto/sm2/sm2crypttest.c
121
if (!SM2_ciphertext_size(key, digest, msg_len, &ctext_len))
regress/lib/libcrypto/sm2/sm2crypttest.c
127
rc = SM2_encrypt(key, digest, (const uint8_t *)message, msg_len, ctext, &ctext_len);
regress/lib/libcrypto/sm2/sm2crypttest.c
135
rc = SM2_decrypt(key, digest, ctext, ctext_len, recovered, &recovered_len);
regress/lib/libcrypto/sm2/sm2crypttest.c
149
EC_KEY_free(key);
regress/lib/libcrypto/sm2/sm2sigtest.c
103
EC_KEY *key = NULL;
regress/lib/libcrypto/sm2/sm2sigtest.c
110
key = EC_KEY_new();
regress/lib/libcrypto/sm2/sm2sigtest.c
111
EC_KEY_set_group(key, group);
regress/lib/libcrypto/sm2/sm2sigtest.c
112
EC_KEY_set_private_key(key, priv);
regress/lib/libcrypto/sm2/sm2sigtest.c
116
EC_KEY_set_public_key(key, pt);
regress/lib/libcrypto/sm2/sm2sigtest.c
118
sig = sm2_do_sign(key, EVP_sm3(), userid, strlen(userid),
regress/lib/libcrypto/sm2/sm2sigtest.c
126
ok = sm2_do_verify(key, EVP_sm3(), sig, userid, strlen(userid),
regress/lib/libcrypto/sm2/sm2sigtest.c
131
EC_KEY_free(key);
regress/lib/libcrypto/sm4/sm4test.c
41
SM4_KEY key;
regress/lib/libcrypto/sm4/sm4test.c
73
if (!SM4_set_key(k, &key))
regress/lib/libcrypto/sm4/sm4test.c
78
SM4_encrypt(block, block, &key);
regress/lib/libcrypto/sm4/sm4test.c
88
SM4_encrypt(block, block, &key);
regress/lib/libcrypto/sm4/sm4test.c
98
SM4_decrypt(block, block, &key);
regress/lib/libedit/read/test_getcmd.c
51
if ((el.el_map.key = calloc(N_KEYS, sizeof(el_action_t))) == NULL)
regress/lib/libedit/read/test_getcmd.c
53
el.el_map.key[(unsigned char)'c'] = ED_SEQUENCE_LEAD_IN;
regress/lib/libedit/read/test_getcmd.c
54
el.el_map.key[(unsigned char)'i'] = ED_INSERT;
regress/lib/libedit/read/test_getcmd.c
55
el.el_map.key[(unsigned char)'s'] = ED_SEQUENCE_LEAD_IN;
regress/lib/libedit/read/test_getcmd.c
56
el.el_map.current = el.el_map.key;
regress/lib/libfuse/fuse-opt-parse.c
71
proc(void *data, const char *arg, int key, struct fuse_args *args)
regress/lib/libfuse/fuse-opt-parse.c
78
switch (key)
regress/lib/libpthread/pthread_specific/pthread_specific.c
39
pthread_key_t key;
regress/lib/libpthread/pthread_specific/pthread_specific.c
51
p = pthread_getspecific(key);
regress/lib/libpthread/pthread_specific/pthread_specific.c
53
CHECKr(pthread_setspecific(key, pthread_self()));
regress/lib/libpthread/pthread_specific/pthread_specific.c
80
CHECKr(pthread_key_create(&key, destroy_key));
regress/lib/libpthread/pthread_specific/pthread_specific.c
89
CHECKr(pthread_key_delete(key));
regress/lib/libssl/interop/client.c
110
if ((crt == NULL && key != NULL) || (crt != NULL && key == NULL))
regress/lib/libssl/interop/client.c
162
if (SSL_CTX_use_PrivateKey_file(ctx, key,
regress/lib/libssl/interop/client.c
53
char *ca = NULL, *crt = NULL, *key = NULL, *ciphers = NULL;
regress/lib/libssl/interop/client.c
65
key = optarg;
regress/lib/libssl/interop/server.c
113
if ((crt == NULL && key != NULL) || (crt != NULL && key == NULL))
regress/lib/libssl/interop/server.c
117
if (key == NULL && asprintf(&key, "%s.key", host) == -1)
regress/lib/libssl/interop/server.c
188
if (SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM) <= 0)
regress/lib/libssl/interop/server.c
54
char *ca = NULL, *crt = NULL, *key = NULL, *ciphers = NULL;
regress/lib/libssl/interop/server.c
66
key = optarg;
regress/lib/libssl/verify/verify.c
112
.key = "server-common-wildcard.pem",
regress/lib/libssl/verify/verify.c
129
.key = "server-subca-chainS.pem",
regress/lib/libssl/verify/verify.c
156
if (config->key != NULL && !SSL_CTX_use_PrivateKey_file(ctx,
regress/lib/libssl/verify/verify.c
157
config->key, SSL_FILETYPE_PEM)) {
regress/lib/libssl/verify/verify.c
35
const char *key;
regress/lib/libssl/verify/verify.c
59
.key = "server-unusual-wildcard.pem",
regress/lib/libssl/verify/verify.c
77
.key = "server-unusual-wildcard.pem",
regress/lib/libssl/verify/verify.c
94
.key = "server-common-wildcard.pem",
regress/lib/libtls/keypair/keypairtest.c
121
if (compare_mem("key", key, key_len, kp->key_mem, kp->cert_len) == -1)
regress/lib/libtls/keypair/keypairtest.c
144
if (tls_keypair_set_key_mem(kp, &err, key, key_len) == -1) {
regress/lib/libtls/keypair/keypairtest.c
156
if (compare_mem("key", key, key_len, kp->key_mem, kp->cert_len) == -1)
regress/lib/libtls/keypair/keypairtest.c
187
free((uint8_t *)key);
regress/lib/libtls/keypair/keypairtest.c
88
const uint8_t *cert, *key, *ocsp_staple;
regress/lib/libtls/keypair/keypairtest.c
95
load_file(key_file, &key, &key_len);
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
111
printkey(const uint8_t *key, size_t keylen)
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
116
printf("\\x%.2x", key[k]);
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
126
uint8_t key[1024];
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
134
memset(key, 0, 1024);
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
135
bcrypt_pbkdf("password", 8, "salt", 4, key, 88, 4);
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
136
if (key[88] || key[89] || key[90]) {
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
144
key, t->keylen, t->rounds);
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
145
if (memcmp(key, t->key, t->keylen) != 0) {
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
148
printkey(t->key, t->keylen);
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
150
printkey(key, t->keylen);
regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c
31
const uint8_t *key;
regress/sbin/isakmpd/crypto/cryptotest.c
78
u_int8_t key[16], cipher[32], iv[8];
regress/sbin/isakmpd/crypto/cryptotest.c
84
asc2bin (key, akey, strlen (akey));
regress/sbin/isakmpd/crypto/cryptotest.c
91
ks = crypto_init (xf, key, 16, &err);
regress/sbin/isakmpd/hmac/hmactest.c
46
char key[100];
regress/sbin/isakmpd/hmac/hmactest.c
48
memset(key, 11, 20);
regress/sbin/isakmpd/hmac/hmactest.c
50
key, 16, "Hi There", 8, "9294727a3638bb1c13f48ef8158bfc9d");
regress/sbin/isakmpd/hmac/hmactest.c
56
key, 20, "Hi There", 8,
regress/sbin/isakmpd/hmac/hmactest.c
66
test_hmac(char *test, struct hash *hash, char *key, int klen,
regress/sbin/isakmpd/hmac/hmactest.c
74
hash->HMACInit(hash, key, klen);
regress/sbin/isakmpd/prf/prftest.c
53
char key[100];
regress/sbin/isakmpd/prf/prftest.c
55
memset (key, 11, 20);
regress/sbin/isakmpd/prf/prftest.c
57
key, 16, "Hi There", 8, "9294727a3638bb1c13f48ef8158bfc9d");
regress/sbin/isakmpd/prf/prftest.c
63
key, 20, "Hi There", 8,
regress/sbin/isakmpd/prf/prftest.c
78
test_prf (char *test, enum hashes hash, char *key, int klen,
regress/sbin/isakmpd/prf/prftest.c
88
prf = prf_alloc (PRF_HMAC, hash, key, klen);
regress/sys/crypto/aes/aestest.c
141
do_tests(const char *filename, int test_num, u_char *key, u_int keylen,
regress/sys/crypto/aes/aestest.c
148
if (docrypt(key, keylen, plaintext, result, textlen, 1) < 0) {
regress/sys/crypto/aes/aestest.c
157
if (docrypt(key, keylen, ciphertext, result, textlen, 0) < 0) {
regress/sys/crypto/aes/aestest.c
175
u_char *key, *plaintext, *ciphertext;
regress/sys/crypto/aes/aestest.c
183
key = ciphertext = plaintext = NULL;
regress/sys/crypto/aes/aestest.c
240
if (key != NULL)
regress/sys/crypto/aes/aestest.c
241
free(key);
regress/sys/crypto/aes/aestest.c
242
parsehex(cp, &key, &keylen);
regress/sys/crypto/aes/aestest.c
248
key == NULL || blocksize == -1 || keysize == -1) {
regress/sys/crypto/aes/aestest.c
255
fail += do_tests(filename, test, key, keylen,
regress/sys/crypto/aes/aestest.c
43
docrypt(const unsigned char *key, size_t klen, const unsigned char *in,
regress/sys/crypto/aes/aestest.c
50
error = AES_Setkey(&ctx, key, klen);
regress/sys/crypto/aesctr/aesctr.c
164
docrypt(const unsigned char *key, size_t klen, const unsigned char *iv,
regress/sys/crypto/aesctr/aesctr.c
172
error = aes_ctr_setkey(&ctx, (u_int8_t *)key, klen);
regress/sys/crypto/aesxts/aes_xts.c
1749
do_aes_xts(u_int8_t *key, int klen, u_int64_t seqno,
regress/sys/crypto/aesxts/aes_xts.c
1756
if (aes_xts_setkey(&ctx, key, klen) < 0)
regress/sys/crypto/aesxts/aes_xts.c
1787
if (do_aes_xts(tv->key, tv->key_len, tv->seqno, tv->plaintext,
regress/sys/crypto/aesxts/aes_xts.c
1800
if (do_aes_xts(tv->key, tv->key_len, tv->seqno, tv->ciphertext,
regress/sys/crypto/aesxts/aes_xts.c
53
u_int8_t key[64];
regress/sys/crypto/chachapoly/chachapoly_test.c
286
dochacha(unsigned char *key, size_t klen, unsigned char *iv,
regress/sys/crypto/chachapoly/chachapoly_test.c
295
if (chacha20_setkey(&ctx, key, CHACHA20_KEYSIZE + CHACHA20_SALT))
regress/sys/crypto/chachapoly/chachapoly_test.c
315
dopoly(const unsigned char *key, size_t klen,
regress/sys/crypto/chachapoly/chachapoly_test.c
327
Chacha20_Poly1305_Setkey(&ctx, key, klen);
regress/sys/crypto/cmac/cmac_test.c
106
AES_CMAC_SetKey(&ctx, key);
regress/sys/crypto/cmac/cmac_test.c
115
AES_CMAC_SetKey(&ctx, key);
regress/sys/crypto/cmac/cmac_test.c
61
unsigned char key[16] = {
regress/sys/crypto/cmac/cmac_test.c
68
printf("K "); print128(key); printf("\n");
regress/sys/crypto/cmac/cmac_test.c
73
AES_CMAC_SetKey(&ctx, key);
regress/sys/crypto/cmac/cmac_test.c
82
AES_CMAC_SetKey(&ctx, key);
regress/sys/crypto/cmac/cmac_test.c
90
AES_CMAC_SetKey(&ctx, key);
regress/sys/crypto/cmac/cmac_test.c
98
AES_CMAC_SetKey(&ctx, key);
regress/sys/crypto/enc/des3.c
117
unsigned char iv0[8], iv[8], key[24] = "012345670123456701234567";
regress/sys/crypto/enc/des3.c
138
DES_set_key((void *) key, &ks1);
regress/sys/crypto/enc/des3.c
139
DES_set_key((void *) (key+8), &ks2);
regress/sys/crypto/enc/des3.c
140
DES_set_key((void *) (key+16), &ks3);
regress/sys/crypto/enc/des3.c
147
if (docrypt(key, sizeof(key), iv, b2, b2, sizeof(b1), 0) < 0) {
regress/sys/crypto/enc/des3.c
159
if (docrypt(key, sizeof(key), iv, b1, b2, sizeof(b1), 1) < 0) {
regress/sys/crypto/enc/des3.c
57
docrypt(const unsigned char *key, size_t klen, const unsigned char *iv0,
regress/sys/crypto/enc/des3.c
66
error = des3_setkey(ctx, key, klen);
regress/sys/crypto/gmac/gmac_test.c
637
dogmac(const unsigned char *key, size_t klen,
regress/sys/crypto/gmac/gmac_test.c
649
AES_GMAC_Setkey(&ctx, key, klen);
regress/sys/sys/tree/rb-linux/rb-linux.c
106
tmp->key = arc4random_uniform(MAX - MIN);
regress/sys/sys/tree/rb-linux/rb-linux.c
107
tmp->key += MIN;
regress/sys/sys/tree/rb-linux/rb-linux.c
110
max = min = tmp->key;
regress/sys/sys/tree/rb-linux/rb-linux.c
112
if (tmp->key > max)
regress/sys/sys/tree/rb-linux/rb-linux.c
113
max = tmp->key;
regress/sys/sys/tree/rb-linux/rb-linux.c
114
if (tmp->key < min)
regress/sys/sys/tree/rb-linux/rb-linux.c
115
min = tmp->key;
regress/sys/sys/tree/rb-linux/rb-linux.c
123
if (ins->key != min)
regress/sys/sys/tree/rb-linux/rb-linux.c
128
if (ins->key != max)
regress/sys/sys/tree/rb-linux/rb-linux.c
40
int key;
regress/sys/sys/tree/rb-linux/rb-linux.c
52
if (elm->key < n->key)
regress/sys/sys/tree/rb-linux/rb-linux.c
54
else if (elm->key > n->key)
regress/sys/sys/tree/rb-linux/rb-linux.c
72
if (elm->key < n->key)
regress/sys/sys/tree/rb-linux/rb-linux.c
74
else if (elm->key > n->key)
regress/sys/sys/tree/rb/rb-test.c
112
int key;
regress/sys/sys/tree/rb/rb-test.c
217
assert(0 == ins->key);
regress/sys/sys/tree/rb/rb-test.c
226
assert(ITER + 5 == ins->key);
regress/sys/sys/tree/rb/rb-test.c
313
tmp->key = i;
regress/sys/sys/tree/rb/rb-test.c
357
tmp->key = perm[i];
regress/sys/sys/tree/rb/rb-test.c
403
tmp->key = i;
regress/sys/sys/tree/rb/rb-test.c
443
tmp->key = ITER + 6;
regress/sys/sys/tree/rb/rb-test.c
482
assert(tmp->key == 0);
regress/sys/sys/tree/rb/rb-test.c
486
assert(tmp->key == i);
regress/sys/sys/tree/rb/rb-test.c
497
assert(tmp->key == ITER + 5);
regress/sys/sys/tree/rb/rb-test.c
501
assert(tmp->key == ITER - 1 - i);
regress/sys/sys/tree/rb/rb-test.c
548
assert(ins->key == i);
regress/sys/sys/tree/rb/rb-test.c
550
assert(ins->key == ITER + 5);
regress/sys/sys/tree/rb/rb-test.c
564
assert(ins->key == i);
regress/sys/sys/tree/rb/rb-test.c
609
assert(ins->key == i);
regress/sys/sys/tree/rb/rb-test.c
611
assert(ins->key == ITER + 5);
regress/sys/sys/tree/rb/rb-test.c
634
assert(ins->key == i);
regress/sys/sys/tree/rb/rb-test.c
660
tmp->key = 0;
regress/sys/sys/tree/rb/rb-test.c
668
tmp->key = i;
regress/sys/sys/tree/rb/rb-test.c
709
tmp->key = ITER;
regress/sys/sys/tree/rb/rb-test.c
717
tmp->key = i;
regress/sys/sys/tree/rb/rb-test.c
875
return a->key - b->key;
regress/sys/sys/tree/rb/rb-test.c
885
indent, "", n->key, n->size, RB_RANK(tree, n),
regress/sys/sys/tree/rb/rb-test.c
939
tmp->key = perm[i];
regress/sys/sys/tree/rb/rb-test.c
958
tmp->key = ITER + 5;
regress/sys/sys/tree/rb/rb-test.c
964
it.key = perm[i];
regress/sys/sys/tree/rb/rb-test.c
966
if ((ins == NULL) || ins->key != it.key)
regress/sys/sys/tree/rb/rb-test.c
970
it.key = perm[i];
regress/sys/sys/tree/rb/rb-test.c
972
if (ins->key < it.key)
regress/sys/sys/tree/rb/rbt-test.c
111
int key;
regress/sys/sys/tree/rb/rbt-test.c
216
assert(0 == ins->key);
regress/sys/sys/tree/rb/rbt-test.c
225
assert(ITER + 5 == ins->key);
regress/sys/sys/tree/rb/rbt-test.c
312
tmp->key = i;
regress/sys/sys/tree/rb/rbt-test.c
356
tmp->key = perm[i];
regress/sys/sys/tree/rb/rbt-test.c
402
tmp->key = i;
regress/sys/sys/tree/rb/rbt-test.c
442
tmp->key = ITER + 6;
regress/sys/sys/tree/rb/rbt-test.c
481
assert(tmp->key == 0);
regress/sys/sys/tree/rb/rbt-test.c
485
assert(tmp->key == i);
regress/sys/sys/tree/rb/rbt-test.c
496
assert(tmp->key == ITER + 5);
regress/sys/sys/tree/rb/rbt-test.c
500
assert(tmp->key == ITER - 1 - i);
regress/sys/sys/tree/rb/rbt-test.c
547
assert(ins->key == i);
regress/sys/sys/tree/rb/rbt-test.c
549
assert(ins->key == ITER + 5);
regress/sys/sys/tree/rb/rbt-test.c
563
assert(ins->key == i);
regress/sys/sys/tree/rb/rbt-test.c
608
assert(ins->key == i);
regress/sys/sys/tree/rb/rbt-test.c
610
assert(ins->key == ITER + 5);
regress/sys/sys/tree/rb/rbt-test.c
633
assert(ins->key == i);
regress/sys/sys/tree/rb/rbt-test.c
659
tmp->key = 0;
regress/sys/sys/tree/rb/rbt-test.c
667
tmp->key = i;
regress/sys/sys/tree/rb/rbt-test.c
708
tmp->key = ITER;
regress/sys/sys/tree/rb/rbt-test.c
716
tmp->key = i;
regress/sys/sys/tree/rb/rbt-test.c
874
return a->key - b->key;
regress/sys/sys/tree/rb/rbt-test.c
884
indent, "", n->key, n->size, RBT_RANK(tree, n),
regress/sys/sys/tree/rb/rbt-test.c
938
tmp->key = perm[i];
regress/sys/sys/tree/rb/rbt-test.c
957
tmp->key = ITER + 5;
regress/sys/sys/tree/rb/rbt-test.c
963
it.key = perm[i];
regress/sys/sys/tree/rb/rbt-test.c
965
if ((ins == NULL) || ins->key != it.key)
regress/sys/sys/tree/rb/rbt-test.c
969
it.key = perm[i];
regress/sys/sys/tree/rb/rbt-test.c
971
if (ins->key < it.key)
regress/sys/sys/tree/splay/splay-test.c
37
int key;
regress/sys/sys/tree/splay/splay-test.c
45
if (a->key < b->key) return (-1);
regress/sys/sys/tree/splay/splay-test.c
46
else if (a->key > b->key) return (1);
regress/sys/sys/tree/splay/splay-test.c
70
tmp->key = arc4random_uniform(MAX-MIN);
regress/sys/sys/tree/splay/splay-test.c
71
tmp->key += MIN;
regress/sys/sys/tree/splay/splay-test.c
74
max = min = tmp->key;
regress/sys/sys/tree/splay/splay-test.c
76
if (tmp->key > max)
regress/sys/sys/tree/splay/splay-test.c
77
max = tmp->key;
regress/sys/sys/tree/splay/splay-test.c
78
if (tmp->key < min)
regress/sys/sys/tree/splay/splay-test.c
79
min = tmp->key;
regress/sys/sys/tree/splay/splay-test.c
86
if (ins->key != min)
regress/sys/sys/tree/splay/splay-test.c
90
if (ins->key != max)
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
100
EC_KEY_set_asn1_flag(key, OPENSSL_EC_NAMED_CURVE);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
102
(g = EC_KEY_get0_group(key)) == NULL ||
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
103
(q = EC_KEY_get0_public_key(key)) == NULL) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
124
if (!PEM_write_bio_ECPrivateKey(bio, key, NULL, NULL, 0, NULL, NULL)) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
156
EC_KEY_free(key);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
79
EC_KEY *key = NULL;
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
92
if ((key = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1)) == NULL) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
96
if (EC_KEY_generate_key(key) != 1) {
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
200
struct sshkey *key = NULL;
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
207
if ((key = sshkey_new(KEY_ECDSA_SK)) == NULL) {
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
212
key->ecdsa_nid = NID_X9_62_prime256v1;
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
213
if ((key->pkey = EVP_PKEY_new()) == NULL ||
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
214
(ec = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL ||
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
240
if (EVP_PKEY_set1_EC_KEY(key->pkey, ec) != 1) {
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
246
key->sk_application = xstrdup(k->sk_application); /* XXX */
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
247
if (!sshkey_equal_public(key, k)) {
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
256
sshkey_free(key);
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
266
struct sshkey *key = NULL;
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
280
if ((key = sshkey_new(KEY_ED25519_SK)) == NULL) {
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
285
if ((key->ed25519_pk = malloc(ED25519_PK_SZ)) == NULL) {
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
290
memcpy(key->ed25519_pk, ptr, ED25519_PK_SZ);
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
291
key->sk_application = xstrdup(k->sk_application); /* XXX */
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
292
if (!sshkey_equal_public(key, k)) {
regress/usr.bin/ssh/misc/ssh-verify-attestation/ssh-verify-attestation.c
299
sshkey_free(key);
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
115
if (expected->l.key == NULL)
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
116
ASSERT_PTR_EQ(l->key, NULL);
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
117
if (expected->l.key != NULL) {
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
118
ASSERT_PTR_NE(l->key, NULL);
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
119
ASSERT_INT_EQ(sshkey_equal(l->key, expected->l.key), 1);
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
137
test_data_file(expected[i].key_file), &expected[i].l.key,
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
148
sshkey_free(expected[i].l.key);
regress/usr.bin/ssh/unittests/hostkeys/test_iterate.c
149
expected[i].l.key = NULL;
regress/usr.bin/ssh/unittests/kex/test_kex.c
181
if (key == NULL)
regress/usr.bin/ssh/unittests/kex/test_kex.c
193
struct sshkey *key = NULL;
regress/usr.bin/ssh/unittests/kex/test_kex.c
199
ASSERT_INT_EQ(sshkey_generate(KEY_ED25519, 0, &key), 0);
regress/usr.bin/ssh/unittests/kex/test_kex.c
207
do_kex_with_key(kex, "aes128-ctr", "hmac-sha2-256", key,
regress/usr.bin/ssh/unittests/kex/test_kex.c
210
sshkey_free(key);
regress/usr.bin/ssh/unittests/kex/test_kex.c
77
struct sshkey *key, int keytype, int bits)
regress/usr.bin/ssh/unittests/kex/test_kex.c
86
if (key != NULL) {
regress/usr.bin/ssh/unittests/kex/test_kex.c
87
private = key;
regress/usr.bin/ssh/unittests/kex/test_kex.c
88
keytype = key->type;
sbin/bioctl/bioctl.c
1315
derive_key(u_int32_t type, int rounds, u_int8_t *key, size_t keysz,
sbin/bioctl/bioctl.c
1324
if (!key)
sbin/bioctl/bioctl.c
1399
key, keysz, rounds) != 0)
sbin/bioctl/bioctl.c
1406
key, keysz, rounds) != 0)
sbin/dump/dump.h
151
struct fstab *fstabsearch(char *key); /* search fs_file and fs_spec */
sbin/dump/optr.c
335
fstabsearch(char *key)
sbin/dump/optr.c
343
if (strcmp(fs->fs_file, key) == 0 ||
sbin/dump/optr.c
344
strcmp(fs->fs_spec, key) == 0)
sbin/dump/optr.c
347
if (rn != NULL && strcmp(rn, key) == 0)
sbin/dump/optr.c
350
if (uid != NULL && strcmp(uid, key) == 0) {
sbin/dump/optr.c
355
if (key[0] != '/') {
sbin/dump/optr.c
357
strcmp(fs->fs_spec + 1, key) == 0)
sbin/dump/optr.c
360
strcmp(fs->fs_file + 1, key) == 0)
sbin/ifconfig/ifconfig.c
5980
char key[WG_BASE64_KEY_LEN + 1];
sbin/ifconfig/ifconfig.c
6006
key, sizeof(key));
sbin/ifconfig/ifconfig.c
6007
printf("\twgpubkey %s\n", key);
sbin/ifconfig/ifconfig.c
6014
key, sizeof(key));
sbin/ifconfig/ifconfig.c
6015
printf("\twgpeer %s\n", key);
sbin/iked/ca.c
1436
ca_pubkey_serialize(EVP_PKEY *key, struct iked_id *id)
sbin/iked/ca.c
1444
switch (EVP_PKEY_id(key)) {
sbin/iked/ca.c
1451
if ((rsa = EVP_PKEY_get0_RSA(key)) == NULL)
sbin/iked/ca.c
1473
if ((ec = EVP_PKEY_get0_EC_KEY(key)) == NULL)
sbin/iked/ca.c
148
ca_getkey(struct privsep *ps, struct iked_id *key, enum imsg_type type)
sbin/iked/ca.c
1491
EVP_PKEY_id(key));
sbin/iked/ca.c
1505
ca_privkey_serialize(EVP_PKEY *key, struct iked_id *id)
sbin/iked/ca.c
1513
switch (EVP_PKEY_id(key)) {
sbin/iked/ca.c
1520
if ((rsa = EVP_PKEY_get0_RSA(key)) == NULL)
sbin/iked/ca.c
1542
if ((ec = EVP_PKEY_get0_EC_KEY(key)) == NULL)
sbin/iked/ca.c
1560
EVP_PKEY_id(key));
sbin/iked/ca.c
162
store->ca_privkey_method = ca_privkey_to_method(key);
sbin/iked/ca.c
172
name, print_map(key->id_type, ikev2_cert_map),
sbin/iked/ca.c
173
ibuf_length(key->id_buf));
sbin/iked/ca.c
177
memcpy(id, key, sizeof(*id));
sbin/iked/ca.c
617
struct iked_id key;
sbin/iked/ca.c
634
bzero(&key, sizeof(key));
sbin/iked/ca.c
647
ret = ca_pubkey_serialize(certkey, &key);
sbin/iked/ca.c
649
ptr = ibuf_data(key.id_buf);
sbin/iked/ca.c
650
len = ibuf_size(key.id_buf);
sbin/iked/ca.c
651
type = key.id_type;
sbin/iked/ca.c
678
ret = ca_validate_pubkey(env, &id, NULL, 0, &key);
sbin/iked/ca.c
680
ptr = ibuf_data(key.id_buf);
sbin/iked/ca.c
681
len = ibuf_size(key.id_buf);
sbin/iked/ca.c
682
type = key.id_type;
sbin/iked/ca.c
704
ibuf_free(key.id_buf);
sbin/iked/chap_ms.c
100
des_key[2] = get7bits(key, 14);
sbin/iked/chap_ms.c
101
des_key[3] = get7bits(key, 21);
sbin/iked/chap_ms.c
102
des_key[4] = get7bits(key, 28);
sbin/iked/chap_ms.c
103
des_key[5] = get7bits(key, 35);
sbin/iked/chap_ms.c
104
des_key[6] = get7bits(key, 42);
sbin/iked/chap_ms.c
105
des_key[7] = get7bits(key, 49);
sbin/iked/chap_ms.c
111
mschap_des_encrypt(uint8_t *clear, uint8_t *key, uint8_t *cipher)
sbin/iked/chap_ms.c
116
mschap_des_addparity(key, des_key);
sbin/iked/chap_ms.c
96
mschap_des_addparity(uint8_t *key, uint8_t *des_key)
sbin/iked/chap_ms.c
98
des_key[0] = get7bits(key, 0);
sbin/iked/chap_ms.c
99
des_key[1] = get7bits(key, 7);
sbin/iked/config.c
1063
EVP_PKEY *key = NULL;
sbin/iked/config.c
1078
if ((key = PEM_read_PrivateKey(fp, NULL, NULL, NULL)) == NULL) {
sbin/iked/config.c
1083
if (ca_privkey_serialize(key, &privkey) != 0) {
sbin/iked/config.c
1087
if (ca_pubkey_serialize(key, &pubkey) != 0) {
sbin/iked/config.c
1119
EVP_PKEY_free(key);
sbin/iked/crypto.c
307
hash_setkey(struct iked_hash *hash, void *key, size_t keylen)
sbin/iked/crypto.c
310
if ((hash->hash_key = ibuf_new(key, keylen)) == NULL) {
sbin/iked/crypto.c
488
cipher_setkey(struct iked_cipher *encr, const void *key, size_t keylen)
sbin/iked/crypto.c
491
if ((encr->encr_key = ibuf_new(key, keylen)) == NULL) {
sbin/iked/crypto.c
775
dsa_setkey(struct iked_dsa *dsa, void *key, size_t keylen, uint8_t type)
sbin/iked/crypto.c
784
if ((dsa->dsa_keydata = ibuf_new(key, keylen)) == NULL) {
sbin/iked/crypto.c
789
if ((rawcert = BIO_new_mem_buf(key, keylen)) == NULL)
sbin/iked/ikev2.c
5731
ikev2_sa_keys(struct iked *env, struct iked_sa *sa, struct ibuf *key)
sbin/iked/ikev2.c
5806
if (!key) {
sbin/iked/ikev2.c
5816
key = ninr;
sbin/iked/ikev2.c
5829
if ((hash_setkey(prf, ibuf_data(key), ibuf_size(key))) == NULL) {
sbin/iked/ikev2.c
5961
ikev2_prfplus(struct iked_hash *prf, struct ibuf *key, struct ibuf *seed,
sbin/iked/ikev2.c
5977
if ((hash_setkey(prf, ibuf_data(key), ibuf_size(key))) == NULL) {
sbin/iked/ikev2.c
6869
struct iked_childsa *csa, key;
sbin/iked/ikev2.c
6872
key.csa_spi = *rekey;
sbin/iked/ikev2.c
6873
csa = RB_FIND(iked_activesas, &env->sc_activesas, &key);
sbin/iked/ikev2.c
6912
struct iked_childsa *csa, key;
sbin/iked/ikev2.c
6917
key.csa_spi = *drop;
sbin/iked/ikev2.c
6918
csa = RB_FIND(iked_activesas, &env->sc_activesas, &key);
sbin/iked/ikev2.c
7162
struct iked_sa key;
sbin/iked/ikev2.c
7252
key.sa_addrpool = &addr;
sbin/iked/ikev2.c
7260
&key)) {
sbin/iked/ikev2.c
7282
key.sa_addrpool = &addr;
sbin/iked/ikev2.c
7298
key.sa_addrpool6 = &addr;
sbin/iked/ikev2.c
7334
!RB_FIND(iked_addrpool, &env->sc_addrpool, &key)) ||
sbin/iked/ikev2.c
7336
!RB_FIND(iked_addrpool6, &env->sc_addrpool6, &key)))
sbin/iked/ikev2.c
7352
if (!key.sa_addrpool)
sbin/iked/ikev2.c
7360
if (!key.sa_addrpool6)
sbin/iked/ikev2_msg.c
1006
uint8_t *key, *psk = NULL;
sbin/iked/ikev2_msg.c
1034
key = psk;
sbin/iked/ikev2_msg.c
1042
key = ibuf_data(id->id_buf);
sbin/iked/ikev2_msg.c
1052
if (dsa_setkey(dsa, key, keylen, keytype) == NULL ||
sbin/iked/ikev2_msg.c
1079
uint8_t *key, *psk = NULL;
sbin/iked/ikev2_msg.c
1109
key = psk;
sbin/iked/ikev2_msg.c
1117
key = ibuf_data(id->id_buf);
sbin/iked/ikev2_msg.c
1123
if (dsa_setkey(dsa, key, keylen, keytype) == NULL ||
sbin/iked/policy.c
227
policy_test(struct iked *env, struct iked_policy *key)
sbin/iked/policy.c
235
else if (key->pol_af && p->pol_af &&
sbin/iked/policy.c
236
key->pol_af != p->pol_af)
sbin/iked/policy.c
238
else if (sockaddr_cmp((struct sockaddr *)&key->pol_peer.addr,
sbin/iked/policy.c
242
else if (sockaddr_cmp((struct sockaddr *)&key->pol_local.addr,
sbin/iked/policy.c
251
if (key->pol_nflows && policy_test_flows(key, p)) {
sbin/iked/policy.c
256
if (key->pol_peerid.id_type &&
sbin/iked/policy.c
258
(key->pol_peerid.id_type != p->pol_peerid.id_type ||
sbin/iked/policy.c
259
memcmp(key->pol_peerid.id_data,
sbin/iked/policy.c
261
sizeof(key->pol_peerid.id_data)) != 0)) {
sbin/iked/policy.c
267
if (key->pol_localid.id_type &&
sbin/iked/policy.c
269
(key->pol_localid.id_type != p->pol_localid.id_type ||
sbin/iked/policy.c
270
memcmp(key->pol_localid.id_data,
sbin/iked/policy.c
272
sizeof(key->pol_localid.id_data)) != 0)) {
sbin/iked/policy.c
279
if ((key->pol_flags & IKED_POLICY_TRANSPORT) &&
sbin/iked/policy.c
286
if (TAILQ_FIRST(&key->pol_proposals) &&
sbin/iked/policy.c
288
&key->pol_proposals, 0, -1) == -1) {
sbin/iked/policy.c
308
policy_test_flows(struct iked_policy *key, struct iked_policy *p)
sbin/iked/policy.c
312
for (f = RB_MIN(iked_flows, &key->pol_flows); f != NULL;
sbin/iked/policy.c
313
f = RB_NEXT(iked_flows, &key->pol_flows, f))
sbin/iked/policy.c
825
struct iked_sa *sa, key;
sbin/iked/policy.c
827
key.sa_hdr.sh_ispi = ispi;
sbin/iked/policy.c
828
key.sa_hdr.sh_initiator = initiator;
sbin/iked/policy.c
830
if ((sa = RB_FIND(iked_sas, &env->sc_sas, &key)) != NULL) {
sbin/iked/policy.c
874
sa_dstid_lookup(struct iked *env, struct iked_sa *key)
sbin/iked/policy.c
878
if (sa_dstid_checked(key) == NULL)
sbin/iked/policy.c
879
fatalx("%s: no id for key %p", __func__, key);
sbin/iked/policy.c
880
sa = RB_FIND(iked_dstid_sas, &env->sc_dstid_sas, key);
sbin/iked/policy.c
882
fatalx("%s: sa %p not estab (key %p)", __func__, sa, key);
sbin/iked/policy.c
972
struct iked_user key;
sbin/iked/policy.c
974
if (strlcpy(key.usr_name, user,
sbin/iked/policy.c
975
sizeof(key.usr_name)) >= sizeof(key.usr_name))
sbin/iked/policy.c
978
return (RB_FIND(iked_users, &env->sc_users, &key));
sbin/ipsecctl/ipsecctl.c
431
ipsecctl_print_key(struct ipsec_key *key)
sbin/ipsecctl/ipsecctl.c
435
for (i = 0; i < (int)key->len; i++)
sbin/ipsecctl/ipsecctl.c
436
printf("%02x", key->data[i]);
sbin/ipsecctl/parse.y
1589
struct ipsec_key *key;
sbin/ipsecctl/parse.y
1592
key = calloc(1, sizeof(struct ipsec_key));
sbin/ipsecctl/parse.y
1593
if (key == NULL)
sbin/ipsecctl/parse.y
1596
key->len = len / 2;
sbin/ipsecctl/parse.y
1597
key->data = calloc(key->len, sizeof(u_int8_t));
sbin/ipsecctl/parse.y
1598
if (key->data == NULL)
sbin/ipsecctl/parse.y
1601
for (i = 0; i < (int)key->len; i++)
sbin/ipsecctl/parse.y
1602
key->data[i] = x2i(hexkey + 2 * i);
sbin/ipsecctl/parse.y
1604
return (key);
sbin/ipsecctl/parse.y
2206
copykey(struct ipsec_key *key)
sbin/ipsecctl/parse.y
2210
if (key == NULL)
sbin/ipsecctl/parse.y
2215
if ((newkey->data = calloc(key->len, sizeof(u_int8_t))) == NULL)
sbin/ipsecctl/parse.y
2217
memcpy(newkey->data, key->data, key->len);
sbin/ipsecctl/parse.y
2218
newkey->len = key->len;
sbin/ipsecctl/pfkdump.c
347
struct sadb_key *key = (struct sadb_key *)ext;
sbin/ipsecctl/pfkdump.c
351
printf("bits %u: ", key->sadb_key_bits);
sbin/ipsecctl/pfkdump.c
352
data = (u_int8_t *)(key + 1);
sbin/ipsecctl/pfkdump.c
353
for (i = 0; i < key->sadb_key_bits / 8; i++) {
sbin/ipsecctl/pfkdump.c
671
struct sadb_key *key = (struct sadb_key *)ext;
sbin/ipsecctl/pfkdump.c
674
if (key == NULL)
sbin/ipsecctl/pfkdump.c
676
data = (u_int8_t *)(key + 1);
sbin/ipsecctl/pfkdump.c
678
ikey->len = key->sadb_key_bits / 8;
sbin/isakmpd/crypto.c
116
blf_init(struct keystate *ks, u_int8_t *key, u_int16_t len)
sbin/isakmpd/crypto.c
118
blf_key(&ks->ks_blf, key, len);
sbin/isakmpd/crypto.c
169
cast_init(struct keystate *ks, u_int8_t *key, u_int16_t len)
sbin/isakmpd/crypto.c
171
CAST_set_key(&ks->ks_cast, len, key);
sbin/isakmpd/crypto.c
189
aes_init(struct keystate *ks, u_int8_t *key, u_int16_t len)
sbin/isakmpd/crypto.c
191
AES_set_encrypt_key(key, len << 3, &ks->ks_aes[0]);
sbin/isakmpd/crypto.c
192
AES_set_decrypt_key(key, len << 3, &ks->ks_aes[1]);
sbin/isakmpd/crypto.c
227
crypto_init(struct crypto_xf *xf, u_int8_t *key, u_int16_t len,
sbin/isakmpd/crypto.c
251
LOG_DBG_BUF((LOG_CRYPTO, 40, "crypto_init: key", key, len));
sbin/isakmpd/crypto.c
253
*err = xf->init(ks, key, len);
sbin/isakmpd/crypto.c
81
des3_init(struct keystate *ks, u_int8_t *key, u_int16_t len)
sbin/isakmpd/crypto.c
83
DES_set_odd_parity((void *)key);
sbin/isakmpd/crypto.c
84
DES_set_odd_parity((void *)(key + 8));
sbin/isakmpd/crypto.c
85
DES_set_odd_parity((void *)(key + 16));
sbin/isakmpd/crypto.c
88
DES_set_key((void *)key, &ks->ks_des[0]);
sbin/isakmpd/crypto.c
89
DES_set_key((void *)(key + 8), &ks->ks_des[1]);
sbin/isakmpd/crypto.c
90
DES_set_key((void *)(key + 16), &ks->ks_des[2]);
sbin/isakmpd/dnssec.c
237
dns_RSA_dns_to_x509(u_int8_t *key, int keylen, RSA **rsa_key)
sbin/isakmpd/dnssec.c
243
if (!key || keylen <= 0) {
sbin/isakmpd/dnssec.c
253
e_len = *key;
sbin/isakmpd/dnssec.c
262
e_len = *(key + key_offset++) << 8;
sbin/isakmpd/dnssec.c
263
e_len += *(key + key_offset++);
sbin/isakmpd/dnssec.c
270
rsa->e = BN_bin2bn(key + key_offset, e_len, NULL);
sbin/isakmpd/dnssec.c
275
rsa->n = BN_bin2bn(key + key_offset, keylen - key_offset, NULL);
sbin/isakmpd/dnssec.c
286
dns_RSA_x509_to_dns(RSA *rsa_key, u_int8_t *key, int *keylen)
sbin/isakmpd/hash.c
216
unsigned char key[128];
sbin/isakmpd/hash.c
218
bzero(key, sizeof(key));
sbin/isakmpd/hash.c
223
hash->Final(key, hash->ctx);
sbin/isakmpd/hash.c
225
memcpy(key, okey, len);
sbin/isakmpd/hash.c
230
key[i] ^= HMAC_IPAD_VAL;
sbin/isakmpd/hash.c
233
hash->Update(hash->ctx, key, hash->blocklen);
sbin/isakmpd/hash.c
236
key[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL);
sbin/isakmpd/hash.c
239
hash->Update(hash->ctx2, key, hash->blocklen);
sbin/isakmpd/hash.c
241
explicit_bzero(key, sizeof(key));
sbin/isakmpd/ike_auth.c
136
char *key, *buf;
sbin/isakmpd/ike_auth.c
146
key = conf_get_str(id, "Authentication");
sbin/isakmpd/ike_auth.c
147
if (!key && local_id)
sbin/isakmpd/ike_auth.c
148
key = conf_get_str(local_id, "Authentication");
sbin/isakmpd/ike_auth.c
150
if (!key) {
sbin/isakmpd/ike_auth.c
157
if (strncasecmp(key, "0x", 2) == 0) {
sbin/isakmpd/ike_auth.c
158
*keylen = (strlen(key) - 1) / 2;
sbin/isakmpd/ike_auth.c
165
if (hex2raw(key + 2, (unsigned char *)buf, *keylen)) {
sbin/isakmpd/ike_auth.c
168
"%s", key);
sbin/isakmpd/ike_auth.c
171
key = buf;
sbin/isakmpd/ike_auth.c
173
buf = key;
sbin/isakmpd/ike_auth.c
174
key = strdup(buf);
sbin/isakmpd/ike_auth.c
175
if (!key) {
sbin/isakmpd/ike_auth.c
179
*keylen = strlen(key);
sbin/isakmpd/ike_auth.c
334
return key;
sbin/isakmpd/ike_auth.c
343
unsigned char *key;
sbin/isakmpd/ike_auth.c
391
key = ike_auth_get_key(IKE_AUTH_PRE_SHARED, exchange->name,
sbin/isakmpd/ike_auth.c
396
if (!key)
sbin/isakmpd/ike_auth.c
405
free(key);
sbin/isakmpd/ike_auth.c
408
memcpy(exchange->recv_key, key, keylen);
sbin/isakmpd/ike_auth.c
410
free(key);
sbin/isakmpd/ike_auth.c
440
unsigned char *key;
sbin/isakmpd/ike_auth.c
442
key = malloc(exchange->nonce_i_len + exchange->nonce_r_len);
sbin/isakmpd/ike_auth.c
443
if (!key)
sbin/isakmpd/ike_auth.c
445
memcpy(key, exchange->nonce_i, exchange->nonce_i_len);
sbin/isakmpd/ike_auth.c
446
memcpy(key + exchange->nonce_i_len, exchange->nonce_r,
sbin/isakmpd/ike_auth.c
453
(u_int8_t *)key, exchange->nonce_i_len + exchange->nonce_r_len));
sbin/isakmpd/ike_auth.c
455
prf = prf_alloc(ie->prf_type, ie->hash->type, key,
sbin/isakmpd/ike_auth.c
457
free(key);
sbin/isakmpd/ike_auth.c
567
RSA *key = 0;
sbin/isakmpd/ike_auth.c
620
if (!handler->cert_get_key(cert, &key)) {
sbin/isakmpd/ike_auth.c
702
if (!handler->cert_get_key(cert, &key)) {
sbin/isakmpd/ike_auth.c
719
dc.dec_key = key;
sbin/isakmpd/ike_auth.c
750
if (dns_RSA_dns_to_x509(rawkey, rawkeylen, &key) == 0)
sbin/isakmpd/ike_auth.c
762
if (get_raw_key_from_file(IKE_AUTH_RSA_SIG, id, id_len, &key)
sbin/isakmpd/ike_auth.c
773
RSA_free(key);
sbin/isakmpd/ike_auth.c
778
if (len != RSA_size(key)) {
sbin/isakmpd/ike_auth.c
779
RSA_free(key);
sbin/isakmpd/ike_auth.c
786
RSA_free(key);
sbin/isakmpd/ike_auth.c
790
len = RSA_public_decrypt(len, p->p + ISAKMP_SIG_DATA_OFF, *hash_p, key,
sbin/isakmpd/ike_auth.c
793
RSA_free(key);
sbin/isakmpd/ike_auth.c
798
exchange->recv_key = key;
sbin/isakmpd/ike_phase_1.c
704
u_int8_t *key, *p;
sbin/isakmpd/ike_phase_1.c
717
key = malloc(keylen);
sbin/isakmpd/ike_phase_1.c
718
if (!key) {
sbin/isakmpd/ike_phase_1.c
727
prf->Final(key, prf->prfctx);
sbin/isakmpd/ike_phase_1.c
729
for (len = prf->blocksize, p = key; len < exchange->key_length;
sbin/isakmpd/ike_phase_1.c
738
exchange->keystate = crypto_init(exchange->crypto, key,
sbin/isakmpd/ike_phase_1.c
741
free(key);
sbin/isakmpd/key.c
145
key_from_printable(int type, int private, char *key, u_int8_t **data,
sbin/isakmpd/key.c
152
*datalenp = strlen(key);
sbin/isakmpd/key.c
153
*data = (u_int8_t *) strdup(key);
sbin/isakmpd/key.c
157
datalen = (strlen(key) + 1) / 2; /* Round up, just in case */
sbin/isakmpd/key.c
165
if (hex2raw(key, *data, datalen)) {
sbin/isakmpd/key.c
34
key_free(int type, int private, void *key)
sbin/isakmpd/key.c
38
free(key);
sbin/isakmpd/key.c
41
RSA_free(key);
sbin/isakmpd/key.c
52
key_serialize(int type, int private, void *key, u_int8_t **data,
sbin/isakmpd/key.c
60
*datalenp = strlen((char *)key);
sbin/isakmpd/key.c
61
*data = (u_int8_t *)strdup((char *)key);
sbin/isakmpd/key.c
66
datalen = i2d_RSAPublicKey((RSA *)key, NULL);
sbin/isakmpd/key.c
73
*datalenp = i2d_RSAPublicKey((RSA *) key, &p);
sbin/isakmpd/key.c
77
datalen = i2d_RSAPrivateKey((RSA *)key, NULL);
sbin/isakmpd/key.c
84
*datalenp = i2d_RSAPrivateKey((RSA *)key, &p);
sbin/isakmpd/pf_key_v2.c
1191
len = sizeof *key + PF_KEY_V2_ROUND(hashlen);
sbin/isakmpd/pf_key_v2.c
1192
key = malloc(len);
sbin/isakmpd/pf_key_v2.c
1193
if (!key)
sbin/isakmpd/pf_key_v2.c
1195
key->sadb_key_exttype = SADB_EXT_KEY_AUTH;
sbin/isakmpd/pf_key_v2.c
1196
key->sadb_key_len = len / PF_KEY_V2_CHUNK;
sbin/isakmpd/pf_key_v2.c
1197
key->sadb_key_bits = hashlen * 8;
sbin/isakmpd/pf_key_v2.c
1198
key->sadb_key_reserved = 0;
sbin/isakmpd/pf_key_v2.c
1199
memcpy(key + 1,
sbin/isakmpd/pf_key_v2.c
1204
if (pf_key_v2_msg_add(update, (struct sadb_ext *) key,
sbin/isakmpd/pf_key_v2.c
1207
key = 0;
sbin/isakmpd/pf_key_v2.c
1210
len = sizeof *key + PF_KEY_V2_ROUND(keylen);
sbin/isakmpd/pf_key_v2.c
1211
key = malloc(len);
sbin/isakmpd/pf_key_v2.c
1212
if (!key)
sbin/isakmpd/pf_key_v2.c
1214
key->sadb_key_exttype = SADB_EXT_KEY_ENCRYPT;
sbin/isakmpd/pf_key_v2.c
1215
key->sadb_key_len = len / PF_KEY_V2_CHUNK;
sbin/isakmpd/pf_key_v2.c
1216
key->sadb_key_bits = keylen * 8;
sbin/isakmpd/pf_key_v2.c
1217
key->sadb_key_reserved = 0;
sbin/isakmpd/pf_key_v2.c
1218
memcpy(key + 1, iproto->keymat[incoming], keylen);
sbin/isakmpd/pf_key_v2.c
1219
if (pf_key_v2_msg_add(update, (struct sadb_ext *) key,
sbin/isakmpd/pf_key_v2.c
1222
key = 0;
sbin/isakmpd/pf_key_v2.c
1453
free(key);
sbin/isakmpd/pf_key_v2.c
880
struct sadb_key *key = 0;
sbin/isakmpd/x509.c
115
RSA *key = NULL;
sbin/isakmpd/x509.c
1280
EVP_PKEY *key;
sbin/isakmpd/x509.c
1282
key = X509_get_pubkey(cert);
sbin/isakmpd/x509.c
1285
if (EVP_PKEY_id(key) != EVP_PKEY_RSA) {
sbin/isakmpd/x509.c
1290
*(RSA **)keyp = RSAPublicKey_dup(EVP_PKEY_get0_RSA(key));
sbin/isakmpd/x509.c
133
if (!x509_cert_get_key(cert, &key)) {
sbin/isakmpd/x509.c
139
dc.dec_key = key;
sbin/isakmpd/x509.c
155
RSA_free(key);
sbin/isakmpd/x509.c
156
key = NULL;
sbin/isakmpd/x509.c
195
if (!x509_cert_get_key(icert, &key)) {
sbin/isakmpd/x509.c
204
dc.dec_key = key;
sbin/isakmpd/x509.c
220
RSA_free(key);
sbin/isakmpd/x509.c
221
key = NULL;
sbin/isakmpd/x509.c
477
if (key)
sbin/isakmpd/x509.c
478
RSA_free(key);
sbin/isakmpd/x509.c
852
EVP_PKEY *key;
sbin/isakmpd/x509.c
903
key = X509_get_pubkey(cert);
sbin/isakmpd/x509.c
904
if (!key) {
sbin/isakmpd/x509.c
909
if (X509_verify(cert, key) == -1) {
sbin/mount_vnd/mount_vnd.c
107
key = getpass("Encryption key: ");
sbin/mount_vnd/mount_vnd.c
108
if (key == NULL || (keylen = strlen(key)) == 0)
sbin/mount_vnd/mount_vnd.c
111
key = get_pkcs_key(rounds, saltopt);
sbin/mount_vnd/mount_vnd.c
114
rv = config(argv[1], argv[0], dp, key, keylen);
sbin/mount_vnd/mount_vnd.c
124
char *key = NULL;
sbin/mount_vnd/mount_vnd.c
176
if ((key = calloc(1, BLF_MAXUTILIZED)) == NULL)
sbin/mount_vnd/mount_vnd.c
179
sizeof (saltbuf), key, BLF_MAXUTILIZED, rounds))
sbin/mount_vnd/mount_vnd.c
183
return (key);
sbin/mount_vnd/mount_vnd.c
187
config(char *dev, char *file, struct disklabel *dp, char *key, size_t keylen)
sbin/mount_vnd/mount_vnd.c
202
vndio.vnd_key = (u_char *)key;
sbin/mount_vnd/mount_vnd.c
215
if (key)
sbin/mount_vnd/mount_vnd.c
216
explicit_bzero(key, keylen);
sbin/mount_vnd/mount_vnd.c
64
char *key = NULL, *mntopts = NULL, *rounds = NULL, *saltopt = NULL;
sbin/ncheck_ffs/ncheck_ffs.c
130
matchino(const void *key, const void *val)
sbin/ncheck_ffs/ncheck_ffs.c
132
ufsino_t k = *(ufsino_t *)key;
sbin/ncheck_ffs/ncheck_ffs.c
146
matchcache(const void *key, const void *val)
sbin/ncheck_ffs/ncheck_ffs.c
148
ufsino_t ino = *(ufsino_t *)key;
sbin/pfctl/parse.y
218
struct pf_poolhashkey *key;
sbin/pfctl/parse.y
4171
pool_opts.key = $2;
sbin/pfctl/parse.y
5091
if (rs->pool_opts.key != NULL)
sbin/pfctl/parse.y
5092
memcpy(&rpool->key, rs->pool_opts.key,
sbin/pfctl/pf_print_state.c
209
int afto = (s->key[PF_SK_STACK].af != s->key[PF_SK_WIRE].af);
sbin/pfctl/pf_print_state.c
215
sk = &s->key[PF_SK_STACK];
sbin/pfctl/pf_print_state.c
216
nk = &s->key[PF_SK_WIRE];
sbin/pfctl/pf_print_state.c
222
sk = &s->key[PF_SK_WIRE];
sbin/pfctl/pf_print_state.c
223
nk = &s->key[PF_SK_STACK];
sbin/pfctl/pfctl.c
1018
sr.key = e;
sbin/pfctl/pfctl.c
1070
sr.key = e;
sbin/pfctl/pfctl.c
3594
struct pfctl_statelim key;
sbin/pfctl/pfctl.c
3596
key.ioc.id = id;
sbin/pfctl/pfctl.c
3598
return (RBT_FIND(pfctl_statelim_ids, &pf->statelim_ids, &key));
sbin/pfctl/pfctl.c
3604
struct pfctl_statelim key;
sbin/pfctl/pfctl.c
3606
if (strlcpy(key.ioc.name, name, sizeof(key.ioc.name)) >=
sbin/pfctl/pfctl.c
3607
sizeof(key.ioc.name))
sbin/pfctl/pfctl.c
3610
return (RBT_FIND(pfctl_statelim_nms, &pf->statelim_nms, &key));
sbin/pfctl/pfctl.c
3663
struct pfctl_sourcelim key;
sbin/pfctl/pfctl.c
3665
key.ioc.id = id;
sbin/pfctl/pfctl.c
3667
return (RBT_FIND(pfctl_sourcelim_ids, &pf->sourcelim_ids, &key));
sbin/pfctl/pfctl.c
3673
struct pfctl_sourcelim key;
sbin/pfctl/pfctl.c
3675
if (strlcpy(key.ioc.name, name, sizeof(key.ioc.name)) >=
sbin/pfctl/pfctl.c
3676
sizeof(key.ioc.name))
sbin/pfctl/pfctl.c
3679
return (RBT_FIND(pfctl_sourcelim_nms, &pf->sourcelim_nms, &key));
sbin/pfctl/pfctl_parser.c
503
pool->key.key32[0], pool->key.key32[1],
sbin/pfctl/pfctl_parser.c
504
pool->key.key32[2], pool->key.key32[3]);
sbin/ping/ping.c
1796
map_tos(char *key, int *val)
sbin/ping/ping.c
1835
if (strcmp(key, t->keyword) == 0) {
sbin/restore/restore.c
185
int key = 0;
sbin/restore/restore.c
201
key |= ONTAPE;
sbin/restore/restore.c
207
key |= NAMEFND;
sbin/restore/restore.c
220
key |= INOFND;
sbin/restore/restore.c
241
if (((key & (INOFND|NAMEFND)) == (INOFND|NAMEFND)) && ip != np) {
sbin/restore/restore.c
251
key &= ~NAMEFND;
sbin/restore/restore.c
253
if ((key & ONTAPE) &&
sbin/restore/restore.c
254
(((key & INOFND) && ip->e_type != type) ||
sbin/restore/restore.c
255
((key & NAMEFND) && np->e_type != type)))
sbin/restore/restore.c
256
key |= MODECHG;
sbin/restore/restore.c
264
switch (key) {
sbin/restore/restore.c
274
Dprintf(stdout, "[%s] %s: %s\n", keyval(key), name,
sbin/restore/restore.c
310
Dprintf(stdout, "[%s] %s: %s\n", keyval(key), name,
sbin/restore/restore.c
334
Dprintf(stdout, "[%s] %s: %s\n", keyval(key), name,
sbin/restore/restore.c
347
Dprintf(stdout, "[%s] %s: %s|LINK\n", keyval(key), name,
sbin/restore/restore.c
364
Dprintf(stdout, "[%s] %s: %s|LINK\n", keyval(key), name,
sbin/restore/restore.c
371
Dprintf(stdout, "[%s] %s: %s\n", keyval(key), name,
sbin/restore/restore.c
414
Dprintf(stdout, "[%s] %s: %s\n", keyval(key), name,
sbin/restore/restore.c
423
Dprintf(stdout, "[%s] %s: Extraneous name\n", keyval(key),
sbin/restore/restore.c
447
fprintf(stderr, "[%s] %s: inconsistent state\n", keyval(key),
sbin/restore/restore.c
457
panic("[%s] %s: impossible state\n", keyval(key), name);
sbin/restore/restore.c
467
keyval(int key)
sbin/restore/restore.c
473
if (key & ONTAPE)
sbin/restore/restore.c
475
if (key & INOFND)
sbin/restore/restore.c
477
if (key & NAMEFND)
sbin/restore/restore.c
479
if (key & MODECHG)
sbin/route/route.c
2035
keycmp(const void *key, const void *kt)
sbin/route/route.c
2037
return (strcmp(key, ((struct keytab *)kt)->kt_cp));
sbin/route/route.c
441
set_metric(char *value, int key)
sbin/route/route.c
447
switch (key) {
sbin/route/route.c
486
int af = AF_UNSPEC, ret = 0, key;
sbin/route/route.c
496
switch (key = keyword(1 + *argv)) {
sbin/route/route.c
577
int key;
sbin/route/route.c
589
switch (key = keyword(1 + *argv)) {
sbin/route/route.c
751
set_metric(*++argv, key);
sbin/unwind/dns64_synth.c
173
dk->entry.key = dk;
sbin/unwind/libunbound/dns64/dns64.c
805
dk->entry.key = dk;
sbin/unwind/libunbound/iterator/iter_delegpt.c
566
struct delegpt_ns* ns = delegpt_find_ns(dp, msg->key.qname,
sbin/unwind/libunbound/iterator/iter_delegpt.c
567
msg->key.qname_len);
sbin/unwind/libunbound/iterator/iter_delegpt.c
568
delegpt_mark_neg(ns, msg->key.qtype);
sbin/unwind/libunbound/iterator/iter_fwd.c
120
node->node.key = node;
sbin/unwind/libunbound/iterator/iter_fwd.c
145
struct iter_forward_zone key;
sbin/unwind/libunbound/iterator/iter_fwd.c
146
key.node.key = &key;
sbin/unwind/libunbound/iterator/iter_fwd.c
147
key.dclass = c;
sbin/unwind/libunbound/iterator/iter_fwd.c
148
key.name = nm;
sbin/unwind/libunbound/iterator/iter_fwd.c
149
key.namelabs = dname_count_size_labels(nm, &key.namelen);
sbin/unwind/libunbound/iterator/iter_fwd.c
150
return (struct iter_forward_zone*)rbtree_search(fwd->tree, &key);
sbin/unwind/libunbound/iterator/iter_fwd.c
312
struct iter_forward_zone key;
sbin/unwind/libunbound/iterator/iter_fwd.c
313
key.node.key = &key;
sbin/unwind/libunbound/iterator/iter_fwd.c
314
key.dclass = c;
sbin/unwind/libunbound/iterator/iter_fwd.c
315
key.name = nm;
sbin/unwind/libunbound/iterator/iter_fwd.c
316
key.namelabs = dname_count_size_labels(key.name, &key.namelen);
sbin/unwind/libunbound/iterator/iter_fwd.c
317
return forwards_insert_data(fwd, key.dclass, key.name,
sbin/unwind/libunbound/iterator/iter_fwd.c
318
key.namelen, key.namelabs, NULL);
sbin/unwind/libunbound/iterator/iter_fwd.c
421
struct iter_forward_zone key;
sbin/unwind/libunbound/iterator/iter_fwd.c
423
key.node.key = &key;
sbin/unwind/libunbound/iterator/iter_fwd.c
424
key.dclass = qclass;
sbin/unwind/libunbound/iterator/iter_fwd.c
425
key.name = qname;
sbin/unwind/libunbound/iterator/iter_fwd.c
426
key.namelabs = dname_count_size_labels(qname, &key.namelen);
sbin/unwind/libunbound/iterator/iter_fwd.c
429
res = (struct iter_forward_zone*)rbtree_search(fwd->tree, &key);
sbin/unwind/libunbound/iterator/iter_fwd.c
442
struct iter_forward_zone key;
sbin/unwind/libunbound/iterator/iter_fwd.c
444
key.node.key = &key;
sbin/unwind/libunbound/iterator/iter_fwd.c
445
key.dclass = qclass;
sbin/unwind/libunbound/iterator/iter_fwd.c
446
key.name = qname;
sbin/unwind/libunbound/iterator/iter_fwd.c
447
key.namelabs = dname_count_size_labels(qname, &key.namelen);
sbin/unwind/libunbound/iterator/iter_fwd.c
450
if(rbtree_find_less_equal(fwd->tree, &key, &res)) {
sbin/unwind/libunbound/iterator/iter_fwd.c
462
(void)dname_lab_cmp(result->name, result->namelabs, key.name,
sbin/unwind/libunbound/iterator/iter_fwd.c
463
key.namelabs, &m);
sbin/unwind/libunbound/iterator/iter_fwd.c
487
struct iter_forward_zone key;
sbin/unwind/libunbound/iterator/iter_fwd.c
507
key.node.key = &key;
sbin/unwind/libunbound/iterator/iter_fwd.c
508
key.name = (uint8_t*)"\000";
sbin/unwind/libunbound/iterator/iter_fwd.c
509
key.namelen = 1;
sbin/unwind/libunbound/iterator/iter_fwd.c
510
key.namelabs = 0;
sbin/unwind/libunbound/iterator/iter_fwd.c
511
key.dclass = *dclass;
sbin/unwind/libunbound/iterator/iter_fwd.c
513
if(rbtree_find_less_equal(fwd->tree, &key, &n)) {
sbin/unwind/libunbound/iterator/iter_scrub.c
801
ref.key = k;
sbin/unwind/libunbound/iterator/iter_utils.c
1179
ref.key = rrset;
sbin/unwind/libunbound/iterator/iter_utils.c
1230
neg->entry.key = neg;
sbin/unwind/libunbound/iterator/iter_utils.c
164
n->node.key = n;
sbin/unwind/libunbound/libunbound/context.c
169
q->node.key = &q->querynum;
sbin/unwind/libunbound/libunbound/context.c
273
q->node.key = &q->querynum;
sbin/unwind/libunbound/libunbound/libunbound.c
639
(void)rbtree_delete(&ctx->queries, q->node.key);
sbin/unwind/libunbound/libunbound/libunbound.c
773
(void)rbtree_delete(&ctx->queries, q->node.key);
sbin/unwind/libunbound/libunbound/libunbound.c
785
(void)rbtree_delete(&ctx->queries, q->node.key);
sbin/unwind/libunbound/libunbound/libunbound.c
875
(void)rbtree_delete(&ctx->queries, q->node.key);
sbin/unwind/libunbound/libunbound/libunbound.c
914
(void)rbtree_delete(&ctx->queries, q->node.key);
sbin/unwind/libunbound/libunbound/libworker.c
670
(void)rbtree_delete(&ctx->queries, q->node.key);
sbin/unwind/libunbound/libunbound/libworker.c
769
(void)rbtree_delete(&w->ctx->queries, q->node.key);
sbin/unwind/libunbound/libunbound/libworker.c
795
(void)rbtree_delete(&ctx->queries, q->node.key);
sbin/unwind/libunbound/respip/respip.c
238
rrset->entry.key = rrset;
sbin/unwind/libunbound/respip/respip.c
495
respip_copy_rrset(const struct ub_packed_rrset_key* key, struct regional* region)
sbin/unwind/libunbound/respip/respip.c
500
struct packed_rrset_data* data = key->entry.data;
sbin/unwind/libunbound/respip/respip.c
508
ck->id = key->id;
sbin/unwind/libunbound/respip/respip.c
510
ck->entry.hash = key->entry.hash;
sbin/unwind/libunbound/respip/respip.c
511
ck->entry.key = ck;
sbin/unwind/libunbound/respip/respip.c
512
ck->rk = key->rk;
sbin/unwind/libunbound/respip/respip.c
513
if(key->rk.dname) {
sbin/unwind/libunbound/respip/respip.c
514
ck->rk.dname = regional_alloc_init(region, key->rk.dname,
sbin/unwind/libunbound/respip/respip.c
515
key->rk.dname_len);
sbin/unwind/libunbound/respip/respip.c
518
ck->rk.dname_len = key->rk.dname_len;
sbin/unwind/libunbound/respip/respip.c
77
struct resp_addr* r = (struct resp_addr*)n->key;
sbin/unwind/libunbound/respip/respip.h
313
respip_copy_rrset(const struct ub_packed_rrset_key* key, struct regional* region);
sbin/unwind/libunbound/services/authzone.c
176
struct ub_packed_rrset_key key;
sbin/unwind/libunbound/services/authzone.c
177
memset(&key, 0, sizeof(key));
sbin/unwind/libunbound/services/authzone.c
178
key.entry.key = &key;
sbin/unwind/libunbound/services/authzone.c
179
key.entry.data = rrset->data;
sbin/unwind/libunbound/services/authzone.c
180
key.rk.dname = node->name;
sbin/unwind/libunbound/services/authzone.c
181
key.rk.dname_len = node->namelen;
sbin/unwind/libunbound/services/authzone.c
182
key.rk.type = htons(rrset->type);
sbin/unwind/libunbound/services/authzone.c
183
key.rk.rrset_class = htons(z->dclass);
sbin/unwind/libunbound/services/authzone.c
184
key.entry.hash = rrset_key_hash(&key.rk);
sbin/unwind/libunbound/services/authzone.c
185
return packed_rrset_copy_region(&key, region, adjust);
sbin/unwind/libunbound/services/authzone.c
2353
struct auth_zone* z = (struct auth_zone*)n->key;
sbin/unwind/libunbound/services/authzone.c
2361
struct auth_xfer* z = (struct auth_xfer*)n->key;
sbin/unwind/libunbound/services/authzone.c
2692
(*cname)->entry.key = (*cname);
sbin/unwind/libunbound/services/authzone.c
385
struct auth_data* z = (struct auth_data*)n->key;
sbin/unwind/libunbound/services/authzone.c
423
z->node.key = z;
sbin/unwind/libunbound/services/authzone.c
452
struct auth_zone key;
sbin/unwind/libunbound/services/authzone.c
453
key.node.key = &key;
sbin/unwind/libunbound/services/authzone.c
454
key.dclass = dclass;
sbin/unwind/libunbound/services/authzone.c
455
key.name = nm;
sbin/unwind/libunbound/services/authzone.c
456
key.namelen = nmlen;
sbin/unwind/libunbound/services/authzone.c
457
key.namelabs = dname_count_labels(nm);
sbin/unwind/libunbound/services/authzone.c
458
return (struct auth_zone*)rbtree_search(&az->ztree, &key);
sbin/unwind/libunbound/services/authzone.c
465
struct auth_xfer key;
sbin/unwind/libunbound/services/authzone.c
466
key.node.key = &key;
sbin/unwind/libunbound/services/authzone.c
467
key.dclass = dclass;
sbin/unwind/libunbound/services/authzone.c
468
key.name = nm;
sbin/unwind/libunbound/services/authzone.c
469
key.namelen = nmlen;
sbin/unwind/libunbound/services/authzone.c
470
key.namelabs = dname_count_labels(nm);
sbin/unwind/libunbound/services/authzone.c
471
return (struct auth_xfer*)rbtree_search(&az->xtree, &key);
sbin/unwind/libunbound/services/authzone.c
479
struct auth_zone key;
sbin/unwind/libunbound/services/authzone.c
480
key.node.key = &key;
sbin/unwind/libunbound/services/authzone.c
481
key.dclass = dclass;
sbin/unwind/libunbound/services/authzone.c
482
key.name = nm;
sbin/unwind/libunbound/services/authzone.c
483
key.namelen = nmlen;
sbin/unwind/libunbound/services/authzone.c
484
key.namelabs = dname_count_labels(nm);
sbin/unwind/libunbound/services/authzone.c
485
return rbtree_find_less_equal(&az->ztree, &key, (rbnode_type**)z);
sbin/unwind/libunbound/services/authzone.c
595
n->node.key = n;
sbin/unwind/libunbound/services/authzone.c
616
struct auth_zone key;
sbin/unwind/libunbound/services/authzone.c
617
key.node.key = &key;
sbin/unwind/libunbound/services/authzone.c
618
key.name = nm;
sbin/unwind/libunbound/services/authzone.c
619
key.namelen = nmlen;
sbin/unwind/libunbound/services/authzone.c
620
key.namelabs = dname_count_labels(nm);
sbin/unwind/libunbound/services/authzone.c
621
return (struct auth_data*)rbtree_search(&z->data, &key);
sbin/unwind/libunbound/services/authzone.c
629
struct auth_zone key;
sbin/unwind/libunbound/services/authzone.c
630
key.node.key = &key;
sbin/unwind/libunbound/services/authzone.c
631
key.name = qinfo->qname;
sbin/unwind/libunbound/services/authzone.c
632
key.namelen = qinfo->qname_len;
sbin/unwind/libunbound/services/authzone.c
633
key.namelabs = dname_count_labels(key.name);
sbin/unwind/libunbound/services/authzone.c
634
*node_exact = rbtree_find_less_equal(&z->data, &key,
sbin/unwind/libunbound/services/authzone.c
7089
xfr->node.key = xfr;
sbin/unwind/libunbound/services/authzone.c
7492
struct ub_packed_rrset_key key;
sbin/unwind/libunbound/services/authzone.c
7493
memset(&key, 0, sizeof(key));
sbin/unwind/libunbound/services/authzone.c
7494
key.entry.key = &key;
sbin/unwind/libunbound/services/authzone.c
7495
key.entry.data = rrset->data;
sbin/unwind/libunbound/services/authzone.c
7496
key.rk.dname = node->name;
sbin/unwind/libunbound/services/authzone.c
7497
key.rk.dname_len = node->namelen;
sbin/unwind/libunbound/services/authzone.c
7498
key.rk.type = htons(rrset->type);
sbin/unwind/libunbound/services/authzone.c
7499
key.rk.rrset_class = htons(z->dclass);
sbin/unwind/libunbound/services/authzone.c
7500
if(!rrset_canonicalize_to_buffer(region, buf, &key)) {
sbin/unwind/libunbound/services/authzone.c
7634
struct ub_packed_rrset_key key;
sbin/unwind/libunbound/services/authzone.c
7636
memset(&key, 0, sizeof(key));
sbin/unwind/libunbound/services/authzone.c
7638
key.entry.key = &key;
sbin/unwind/libunbound/services/authzone.c
7639
key.entry.data = &data;
sbin/unwind/libunbound/services/authzone.c
7640
key.rk.dname = node->name;
sbin/unwind/libunbound/services/authzone.c
7641
key.rk.dname_len = node->namelen;
sbin/unwind/libunbound/services/authzone.c
7642
key.rk.type = htons(LDNS_RR_TYPE_RRSIG);
sbin/unwind/libunbound/services/authzone.c
7643
key.rk.rrset_class = htons(z->dclass);
sbin/unwind/libunbound/services/authzone.c
7656
if(!rrset_canonicalize_to_buffer(region, buf, &key)) {
sbin/unwind/libunbound/services/authzone.c
7841
pk.entry.key = &pk;
sbin/unwind/libunbound/services/authzone.c
8195
keystorage->entry.key = keystorage;
sbin/unwind/libunbound/services/authzone.c
8257
keystorage->entry.key = keystorage;
sbin/unwind/libunbound/services/authzone.c
8571
struct auth_zone key;
sbin/unwind/libunbound/services/authzone.c
8575
key.node.key = &key;
sbin/unwind/libunbound/services/authzone.c
8583
key.dclass = z->dclass;
sbin/unwind/libunbound/services/authzone.c
8584
key.namelabs = z->namelabs;
sbin/unwind/libunbound/services/authzone.c
8599
key.namelen = savezname_len;
sbin/unwind/libunbound/services/authzone.c
8600
key.name = savezname;
sbin/unwind/libunbound/services/authzone.c
8601
z = (struct auth_zone*)rbtree_search(&az->ztree, &key);
sbin/unwind/libunbound/services/cache/dns.c
100
rep->ref[i].id != rep->ref[i].key->id)
sbin/unwind/libunbound/services/cache/dns.c
103
rep->ref[i].key, region, now);
sbin/unwind/libunbound/services/cache/dns.c
104
lock_rw_unlock(&rep->ref[i].key->entry.lock);
sbin/unwind/libunbound/services/cache/dns.c
1143
ref.key = rep->rrsets[i];
sbin/unwind/libunbound/services/cache/dns.c
1149
((ntohs(ref.key->rk.type)==LDNS_RR_TYPE_NS
sbin/unwind/libunbound/services/cache/dns.c
116
rep->rrsets[i] = rep->ref[i].key;
sbin/unwind/libunbound/services/cache/dns.c
119
lock_rw_rdlock(&rep->ref[i].key->entry.lock);
sbin/unwind/libunbound/services/cache/dns.c
121
if(rep->ref[i].key->id != 0 &&
sbin/unwind/libunbound/services/cache/dns.c
122
rep->ref[i].id == rep->ref[i].key->id) {
sbin/unwind/libunbound/services/cache/dns.c
127
lock_rw_unlock(&rep->ref[i].key->entry.lock);
sbin/unwind/libunbound/services/cache/dns.c
166
rep->ref[i].key = rep->rrsets[i];
sbin/unwind/libunbound/services/cache/dns.c
302
return (struct msgreply_entry*)e->key;
sbin/unwind/libunbound/services/cache/dns.c
788
ck->entry.key = ck;
sbin/unwind/libunbound/services/cache/dns.c
86
rep->ref[i].key = rep->rrsets[i];
sbin/unwind/libunbound/services/cache/dns.c
90
env->alloc, ((ntohs(rep->ref[i].key->rk.type)==
sbin/unwind/libunbound/services/cache/dns.c
910
struct msgreply_entry* key = (struct msgreply_entry*)e->key;
sbin/unwind/libunbound/services/cache/dns.c
912
struct dns_msg* msg = tomsg(env, &key->key, data, region, now, 0,
sbin/unwind/libunbound/services/cache/dns.c
97
lock_rw_rdlock(&rep->ref[i].key->entry.lock);
sbin/unwind/libunbound/services/cache/dns.c
99
if(rep->ref[i].key->id == 0 ||
sbin/unwind/libunbound/services/cache/infra.c
1011
k->entry.key = k;
sbin/unwind/libunbound/services/cache/infra.c
1035
k->entry.key = k;
sbin/unwind/libunbound/services/cache/infra.c
108
struct infra_key* key = (struct infra_key*)k;
sbin/unwind/libunbound/services/cache/infra.c
109
if(!key)
sbin/unwind/libunbound/services/cache/infra.c
111
lock_rw_destroy(&key->entry.lock);
sbin/unwind/libunbound/services/cache/infra.c
112
free(key->zonename);
sbin/unwind/libunbound/services/cache/infra.c
113
free(key);
sbin/unwind/libunbound/services/cache/infra.c
126
struct rate_key* key = (struct rate_key*)k;
sbin/unwind/libunbound/services/cache/infra.c
127
return sizeof(*key) + sizeof(struct rate_data) + key->namelen
sbin/unwind/libunbound/services/cache/infra.c
128
+ lock_get_mem(&key->entry.lock);
sbin/unwind/libunbound/services/cache/infra.c
147
struct rate_key* key = (struct rate_key*)k;
sbin/unwind/libunbound/services/cache/infra.c
148
if(!key)
sbin/unwind/libunbound/services/cache/infra.c
150
lock_rw_destroy(&key->entry.lock);
sbin/unwind/libunbound/services/cache/infra.c
151
free(key->name);
sbin/unwind/libunbound/services/cache/infra.c
152
free(key);
sbin/unwind/libunbound/services/cache/infra.c
193
d->node.node.key = &d->node;
sbin/unwind/libunbound/services/cache/infra.c
521
k.entry.key = (void*)&k;
sbin/unwind/libunbound/services/cache/infra.c
561
struct infra_key* key = (struct infra_key*)malloc(sizeof(*key));
sbin/unwind/libunbound/services/cache/infra.c
562
if(!key)
sbin/unwind/libunbound/services/cache/infra.c
566
free(key);
sbin/unwind/libunbound/services/cache/infra.c
569
key->zonename = memdup(name, namelen);
sbin/unwind/libunbound/services/cache/infra.c
570
if(!key->zonename) {
sbin/unwind/libunbound/services/cache/infra.c
571
free(key);
sbin/unwind/libunbound/services/cache/infra.c
575
key->namelen = namelen;
sbin/unwind/libunbound/services/cache/infra.c
576
lock_rw_init(&key->entry.lock);
sbin/unwind/libunbound/services/cache/infra.c
577
key->entry.hash = hash_infra(addr, addrlen, name);
sbin/unwind/libunbound/services/cache/infra.c
578
key->entry.key = (void*)key;
sbin/unwind/libunbound/services/cache/infra.c
579
key->entry.data = (void*)data;
sbin/unwind/libunbound/services/cache/infra.c
580
key->addrlen = addrlen;
sbin/unwind/libunbound/services/cache/infra.c
581
memcpy(&key->addr, addr, addrlen);
sbin/unwind/libunbound/services/cache/infra.c
582
data_entry_init(infra, &key->entry, tm);
sbin/unwind/libunbound/services/cache/infra.c
583
return &key->entry;
sbin/unwind/libunbound/services/cache/infra.c
84
struct infra_key* key = (struct infra_key*)k;
sbin/unwind/libunbound/services/cache/infra.c
85
return sizeof(*key) + sizeof(struct infra_data) + key->namelen
sbin/unwind/libunbound/services/cache/infra.c
86
+ lock_get_mem(&key->entry.lock);
sbin/unwind/libunbound/services/cache/infra.c
942
struct ip_rate_key* key = (struct ip_rate_key*)k;
sbin/unwind/libunbound/services/cache/infra.c
943
return sizeof(*key) + sizeof(struct ip_rate_data)
sbin/unwind/libunbound/services/cache/infra.c
944
+ lock_get_mem(&key->entry.lock);
sbin/unwind/libunbound/services/cache/infra.c
957
struct ip_rate_key* key = (struct ip_rate_key*)k;
sbin/unwind/libunbound/services/cache/infra.c
958
if(!key)
sbin/unwind/libunbound/services/cache/infra.c
960
lock_rw_destroy(&key->entry.lock);
sbin/unwind/libunbound/services/cache/infra.c
961
free(key);
sbin/unwind/libunbound/services/cache/infra.c
968
struct rate_key key;
sbin/unwind/libunbound/services/cache/infra.c
970
memset(&key, 0, sizeof(key));
sbin/unwind/libunbound/services/cache/infra.c
971
key.name = name;
sbin/unwind/libunbound/services/cache/infra.c
972
key.namelen = namelen;
sbin/unwind/libunbound/services/cache/infra.c
973
key.entry.hash = h;
sbin/unwind/libunbound/services/cache/infra.c
974
return slabhash_lookup(infra->domain_rates, h, &key, wr);
sbin/unwind/libunbound/services/cache/infra.c
981
struct ip_rate_key key;
sbin/unwind/libunbound/services/cache/infra.c
983
memset(&key, 0, sizeof(key));
sbin/unwind/libunbound/services/cache/infra.c
984
key.addr = *addr;
sbin/unwind/libunbound/services/cache/infra.c
985
key.addrlen = addrlen;
sbin/unwind/libunbound/services/cache/infra.c
986
key.entry.hash = h;
sbin/unwind/libunbound/services/cache/infra.c
987
return slabhash_lookup(infra->client_ip_rates, h, &key, wr);
sbin/unwind/libunbound/services/cache/rrset.c
119
lock_rw_rdlock(&key->entry.lock);
sbin/unwind/libunbound/services/cache/rrset.c
120
if(key->id == id && key->entry.hash == hash) {
sbin/unwind/libunbound/services/cache/rrset.c
121
lru_touch(table, &key->entry);
sbin/unwind/libunbound/services/cache/rrset.c
123
lock_rw_unlock(&key->entry.lock);
sbin/unwind/libunbound/services/cache/rrset.c
182
lock_rw_wrlock(&ref->key->entry.lock);
sbin/unwind/libunbound/services/cache/rrset.c
184
if(ref->key->id == ref->id) {
sbin/unwind/libunbound/services/cache/rrset.c
185
ref->key->id = newid;
sbin/unwind/libunbound/services/cache/rrset.c
188
lock_rw_unlock(&ref->key->entry.lock);
sbin/unwind/libunbound/services/cache/rrset.c
196
struct ub_packed_rrset_key* k = ref->key;
sbin/unwind/libunbound/services/cache/rrset.c
211
ref->key = (struct ub_packed_rrset_key*)e->key;
sbin/unwind/libunbound/services/cache/rrset.c
212
ref->id = ref->key->id;
sbin/unwind/libunbound/services/cache/rrset.c
232
log_assert(ref->key->id != 0);
sbin/unwind/libunbound/services/cache/rrset.c
275
ref.key = rrset;
sbin/unwind/libunbound/services/cache/rrset.c
287
struct ub_packed_rrset_key key;
sbin/unwind/libunbound/services/cache/rrset.c
289
key.entry.key = &key;
sbin/unwind/libunbound/services/cache/rrset.c
290
key.entry.data = NULL;
sbin/unwind/libunbound/services/cache/rrset.c
291
key.rk.dname = qname;
sbin/unwind/libunbound/services/cache/rrset.c
292
key.rk.dname_len = qnamelen;
sbin/unwind/libunbound/services/cache/rrset.c
293
key.rk.type = htons(qtype);
sbin/unwind/libunbound/services/cache/rrset.c
294
key.rk.rrset_class = htons(qclass);
sbin/unwind/libunbound/services/cache/rrset.c
295
key.rk.flags = flags;
sbin/unwind/libunbound/services/cache/rrset.c
297
key.entry.hash = rrset_key_hash(&key.rk);
sbin/unwind/libunbound/services/cache/rrset.c
299
if((e = slabhash_lookup(&r->table, key.entry.hash, &key, wr))) {
sbin/unwind/libunbound/services/cache/rrset.c
308
return (struct ub_packed_rrset_key*)e->key;
sbin/unwind/libunbound/services/cache/rrset.c
318
if(i>0 && ref[i].key == ref[i-1].key)
sbin/unwind/libunbound/services/cache/rrset.c
320
lock_rw_rdlock(&ref[i].key->entry.lock);
sbin/unwind/libunbound/services/cache/rrset.c
321
if(ref[i].id != ref[i].key->id || timenow >
sbin/unwind/libunbound/services/cache/rrset.c
322
((struct packed_rrset_data*)(ref[i].key->entry.data))
sbin/unwind/libunbound/services/cache/rrset.c
337
if(i>0 && ref[i].key == ref[i-1].key)
sbin/unwind/libunbound/services/cache/rrset.c
339
lock_rw_unlock(&ref[i].key->entry.lock);
sbin/unwind/libunbound/services/cache/rrset.c
355
h[i] = ref[i].key->entry.hash;
sbin/unwind/libunbound/services/cache/rrset.c
358
if(i>0 && ref[i].key == ref[i-1].key)
sbin/unwind/libunbound/services/cache/rrset.c
360
lock_rw_unlock(&ref[i].key->entry.lock);
sbin/unwind/libunbound/services/cache/rrset.c
365
if(i>0 && ref[i].key == ref[i-1].key)
sbin/unwind/libunbound/services/cache/rrset.c
367
rrset_cache_touch(r, ref[i].key, h[i], ref[i].id);
sbin/unwind/libunbound/services/cache/rrset.c
535
struct ub_packed_rrset_key key;
sbin/unwind/libunbound/services/cache/rrset.c
536
key.entry.key = &key;
sbin/unwind/libunbound/services/cache/rrset.c
537
key.rk.dname = nm;
sbin/unwind/libunbound/services/cache/rrset.c
538
key.rk.dname_len = nmlen;
sbin/unwind/libunbound/services/cache/rrset.c
539
key.rk.rrset_class = htons(dclass);
sbin/unwind/libunbound/services/cache/rrset.c
540
key.rk.type = htons(type);
sbin/unwind/libunbound/services/cache/rrset.c
541
key.rk.flags = flags;
sbin/unwind/libunbound/services/cache/rrset.c
542
key.entry.hash = rrset_key_hash(&key.rk);
sbin/unwind/libunbound/services/cache/rrset.c
543
slabhash_remove(&r->table, key.entry.hash, &key);
sbin/unwind/libunbound/services/cache/rrset.c
55
rrset_markdel(void* key)
sbin/unwind/libunbound/services/cache/rrset.c
57
struct ub_packed_rrset_key* r = (struct ub_packed_rrset_key*)key;
sbin/unwind/libunbound/services/cache/rrset.c
98
rrset_cache_touch(struct rrset_cache* r, struct ub_packed_rrset_key* key,
sbin/unwind/libunbound/services/cache/rrset.h
104
void rrset_cache_touch(struct rrset_cache* r, struct ub_packed_rrset_key* key,
sbin/unwind/libunbound/services/cache/rrset.h
278
void rrset_markdel(void* key);
sbin/unwind/libunbound/services/listen_dnsport.c
3359
conn = (struct doq_conn*)node->key;
sbin/unwind/libunbound/services/listen_dnsport.c
3368
doq_table_quic_size_subtract(table, sizeof(*conn)+conn->key.dcidlen);
sbin/unwind/libunbound/services/listen_dnsport.c
3378
doq_conid_delete((struct doq_conid*)node->key);
sbin/unwind/libunbound/services/listen_dnsport.c
3414
struct doq_timer key;
sbin/unwind/libunbound/services/listen_dnsport.c
3416
memset(&key, 0, sizeof(key));
sbin/unwind/libunbound/services/listen_dnsport.c
3417
key.time.tv_sec = tv->tv_sec;
sbin/unwind/libunbound/services/listen_dnsport.c
3418
key.time.tv_usec = tv->tv_usec;
sbin/unwind/libunbound/services/listen_dnsport.c
3419
node = rbtree_search(table->timer_tree, &key);
sbin/unwind/libunbound/services/listen_dnsport.c
3421
return (struct doq_timer*)node->key;
sbin/unwind/libunbound/services/listen_dnsport.c
3446
rb_timer->node.key = rb_timer;
sbin/unwind/libunbound/services/listen_dnsport.c
3518
addr_to_str((void*)&timer->conn->key.paddr.addr,
sbin/unwind/libunbound/services/listen_dnsport.c
3519
timer->conn->key.paddr.addrlen, a, sizeof(a));
sbin/unwind/libunbound/services/listen_dnsport.c
3542
timer->node.key = timer;
sbin/unwind/libunbound/services/listen_dnsport.c
3558
conn->node.key = conn;
sbin/unwind/libunbound/services/listen_dnsport.c
3561
memmove(&conn->key.paddr.addr, &paddr->addr, paddr->addrlen);
sbin/unwind/libunbound/services/listen_dnsport.c
3562
conn->key.paddr.addrlen = paddr->addrlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3563
memmove(&conn->key.paddr.localaddr, &paddr->localaddr,
sbin/unwind/libunbound/services/listen_dnsport.c
3565
conn->key.paddr.localaddrlen = paddr->localaddrlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3566
conn->key.paddr.ifindex = paddr->ifindex;
sbin/unwind/libunbound/services/listen_dnsport.c
3567
conn->key.dcid = memdup((void*)dcid, dcidlen);
sbin/unwind/libunbound/services/listen_dnsport.c
3568
if(!conn->key.dcid) {
sbin/unwind/libunbound/services/listen_dnsport.c
3572
conn->key.dcidlen = dcidlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3582
lock_protect(&conn->lock, &conn->key, sizeof(conn->key));
sbin/unwind/libunbound/services/listen_dnsport.c
3641
free(conn->key.dcid);
sbin/unwind/libunbound/services/listen_dnsport.c
3665
if(c->key.paddr.addrlen != d->key.paddr.addrlen) {
sbin/unwind/libunbound/services/listen_dnsport.c
3666
if(c->key.paddr.addrlen < d->key.paddr.addrlen)
sbin/unwind/libunbound/services/listen_dnsport.c
3670
if((r=memcmp(&c->key.paddr.addr, &d->key.paddr.addr,
sbin/unwind/libunbound/services/listen_dnsport.c
3671
c->key.paddr.addrlen))!=0)
sbin/unwind/libunbound/services/listen_dnsport.c
3673
if(c->key.paddr.localaddrlen != d->key.paddr.localaddrlen) {
sbin/unwind/libunbound/services/listen_dnsport.c
3674
if(c->key.paddr.localaddrlen < d->key.paddr.localaddrlen)
sbin/unwind/libunbound/services/listen_dnsport.c
3678
if((r=memcmp(&c->key.paddr.localaddr, &d->key.paddr.localaddr,
sbin/unwind/libunbound/services/listen_dnsport.c
3679
c->key.paddr.localaddrlen))!=0)
sbin/unwind/libunbound/services/listen_dnsport.c
3681
if(c->key.paddr.ifindex != d->key.paddr.ifindex) {
sbin/unwind/libunbound/services/listen_dnsport.c
3682
if(c->key.paddr.ifindex < d->key.paddr.ifindex)
sbin/unwind/libunbound/services/listen_dnsport.c
3686
if(c->key.dcidlen != d->key.dcidlen) {
sbin/unwind/libunbound/services/listen_dnsport.c
3687
if(c->key.dcidlen < d->key.dcidlen)
sbin/unwind/libunbound/services/listen_dnsport.c
3691
if((r=memcmp(c->key.dcid, d->key.dcid, c->key.dcidlen))!=0)
sbin/unwind/libunbound/services/listen_dnsport.c
3805
doq_conn_key_store_repinfo(struct doq_conn_key* key,
sbin/unwind/libunbound/services/listen_dnsport.c
3809
repinfo->doq_ifindex = key->paddr.ifindex;
sbin/unwind/libunbound/services/listen_dnsport.c
3810
repinfo->remote_addrlen = key->paddr.addrlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3811
memmove(&repinfo->remote_addr, &key->paddr.addr,
sbin/unwind/libunbound/services/listen_dnsport.c
3813
repinfo->client_addrlen = key->paddr.addrlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3814
memmove(&repinfo->client_addr, &key->paddr.addr,
sbin/unwind/libunbound/services/listen_dnsport.c
3816
doq_repinfo_store_localaddr(repinfo, &key->paddr.localaddr,
sbin/unwind/libunbound/services/listen_dnsport.c
3817
key->paddr.localaddrlen);
sbin/unwind/libunbound/services/listen_dnsport.c
3818
if(key->dcidlen > sizeof(repinfo->doq_dcid))
sbin/unwind/libunbound/services/listen_dnsport.c
3820
repinfo->doq_dcidlen = key->dcidlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3821
memmove(repinfo->doq_dcid, key->dcid, key->dcidlen);
sbin/unwind/libunbound/services/listen_dnsport.c
3826
doq_conn_key_from_repinfo(struct doq_conn_key* key, struct comm_reply* repinfo)
sbin/unwind/libunbound/services/listen_dnsport.c
3828
key->paddr.ifindex = repinfo->doq_ifindex;
sbin/unwind/libunbound/services/listen_dnsport.c
3829
key->paddr.addrlen = repinfo->remote_addrlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3830
memmove(&key->paddr.addr, &repinfo->remote_addr,
sbin/unwind/libunbound/services/listen_dnsport.c
3832
doq_repinfo_retrieve_localaddr(repinfo, &key->paddr.localaddr,
sbin/unwind/libunbound/services/listen_dnsport.c
3833
&key->paddr.localaddrlen);
sbin/unwind/libunbound/services/listen_dnsport.c
3834
key->dcidlen = repinfo->doq_dcidlen;
sbin/unwind/libunbound/services/listen_dnsport.c
3835
key->dcid = repinfo->doq_dcid;
sbin/unwind/libunbound/services/listen_dnsport.c
3859
stream->node.key = stream;
sbin/unwind/libunbound/services/listen_dnsport.c
3877
struct doq_stream key;
sbin/unwind/libunbound/services/listen_dnsport.c
3878
key.node.key = &key;
sbin/unwind/libunbound/services/listen_dnsport.c
3879
key.stream_id = stream_id;
sbin/unwind/libunbound/services/listen_dnsport.c
3880
node = rbtree_search(&conn->stream_tree, &key);
sbin/unwind/libunbound/services/listen_dnsport.c
3882
return (struct doq_stream*)node->key;
sbin/unwind/libunbound/services/listen_dnsport.c
4053
addr_to_str((void*)&conn->key.paddr.addr,
sbin/unwind/libunbound/services/listen_dnsport.c
4054
conn->key.paddr.addrlen, a, sizeof(a));
sbin/unwind/libunbound/services/listen_dnsport.c
4073
if(!doq_conn_key_store_repinfo(&conn->key, &c->repinfo)) {
sbin/unwind/libunbound/services/listen_dnsport.c
4641
void* quic_sslctx_create(char* key, char* pem, char* verifypem)
sbin/unwind/libunbound/services/listen_dnsport.c
4653
if(!key || key[0] == 0) {
sbin/unwind/libunbound/services/listen_dnsport.c
4682
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
sbin/unwind/libunbound/services/listen_dnsport.c
4683
log_err("doq: error for private key file: %s", key);
sbin/unwind/libunbound/services/listen_dnsport.c
4689
log_err("doq: error for key file: %s", key);
sbin/unwind/libunbound/services/listen_dnsport.c
4737
(void)key; (void)pem; (void)verifypem;
sbin/unwind/libunbound/services/listen_dnsport.c
4810
ngtcp2_cid_init(&dcid, conn->key.dcid, conn->key.dcidlen);
sbin/unwind/libunbound/services/listen_dnsport.c
4812
path.remote.addr = (struct sockaddr*)&conn->key.paddr.addr;
sbin/unwind/libunbound/services/listen_dnsport.c
4813
path.remote.addrlen = conn->key.paddr.addrlen;
sbin/unwind/libunbound/services/listen_dnsport.c
4814
path.local.addr = (struct sockaddr*)&conn->key.paddr.localaddr;
sbin/unwind/libunbound/services/listen_dnsport.c
4815
path.local.addrlen = conn->key.paddr.localaddrlen;
sbin/unwind/libunbound/services/listen_dnsport.c
4869
ngtcp2_cid_init(&params.retry_scid, conn->key.dcid,
sbin/unwind/libunbound/services/listen_dnsport.c
4870
conn->key.dcidlen);
sbin/unwind/libunbound/services/listen_dnsport.c
4873
ngtcp2_cid_init(&params.original_dcid, conn->key.dcid,
sbin/unwind/libunbound/services/listen_dnsport.c
4874
conn->key.dcidlen);
sbin/unwind/libunbound/services/listen_dnsport.c
4921
struct doq_conid key;
sbin/unwind/libunbound/services/listen_dnsport.c
4922
key.node.key = &key;
sbin/unwind/libunbound/services/listen_dnsport.c
4923
key.cid = (void*)data;
sbin/unwind/libunbound/services/listen_dnsport.c
4924
key.cidlen = datalen;
sbin/unwind/libunbound/services/listen_dnsport.c
4925
node = rbtree_search(table->conid_tree, &key);
sbin/unwind/libunbound/services/listen_dnsport.c
4927
return (struct doq_conid*)node->key;
sbin/unwind/libunbound/services/listen_dnsport.c
4955
doq_conid_create(uint8_t* data, size_t datalen, struct doq_conn_key* key)
sbin/unwind/libunbound/services/listen_dnsport.c
4967
conid->node.key = conid;
sbin/unwind/libunbound/services/listen_dnsport.c
4968
conid->key = *key;
sbin/unwind/libunbound/services/listen_dnsport.c
4969
conid->key.dcid = memdup(key->dcid, key->dcidlen);
sbin/unwind/libunbound/services/listen_dnsport.c
4970
if(!conid->key.dcid) {
sbin/unwind/libunbound/services/listen_dnsport.c
4983
free(conid->key.dcid);
sbin/unwind/libunbound/services/listen_dnsport.c
4992
if(conid->key.dcidlen == conn->key.dcidlen &&
sbin/unwind/libunbound/services/listen_dnsport.c
4993
memcmp(conid->key.dcid, conn->key.dcid, conid->key.dcidlen)==0
sbin/unwind/libunbound/services/listen_dnsport.c
4994
&& conid->key.paddr.addrlen == conn->key.paddr.addrlen &&
sbin/unwind/libunbound/services/listen_dnsport.c
4995
memcmp(&conid->key.paddr.addr, &conn->key.paddr.addr,
sbin/unwind/libunbound/services/listen_dnsport.c
4996
conid->key.paddr.addrlen) == 0 &&
sbin/unwind/libunbound/services/listen_dnsport.c
4997
conid->key.paddr.localaddrlen == conn->key.paddr.localaddrlen &&
sbin/unwind/libunbound/services/listen_dnsport.c
4998
memcmp(&conid->key.paddr.localaddr, &conn->key.paddr.localaddr,
sbin/unwind/libunbound/services/listen_dnsport.c
4999
conid->key.paddr.localaddrlen) == 0 &&
sbin/unwind/libunbound/services/listen_dnsport.c
5000
conid->key.paddr.ifindex == conn->key.paddr.ifindex)
sbin/unwind/libunbound/services/listen_dnsport.c
5023
conid = doq_conid_create(data, datalen, &conn->key);
sbin/unwind/libunbound/services/listen_dnsport.c
5041
conid->node.key);
sbin/unwind/libunbound/services/listen_dnsport.c
5059
if(!doq_conn_associate_conid(conn, conn->key.dcid, conn->key.dcidlen))
sbin/unwind/libunbound/services/listen_dnsport.c
5103
(void)rbtree_delete(conn->table->conid_tree, p->node.key);
sbin/unwind/libunbound/services/listen_dnsport.c
5209
doq_send_pkt(c, &conn->key.paddr, conn->close_ecn);
sbin/unwind/libunbound/services/listen_dnsport.c
5480
doq_send_pkt(c, &conn->key.paddr, pi.ecn);
sbin/unwind/libunbound/services/listen_dnsport.c
5602
addr_to_str((void*)&conn->key.paddr.addr, conn->key.paddr.addrlen,
sbin/unwind/libunbound/services/listen_dnsport.c
5604
addr_to_str((void*)&conn->key.paddr.localaddr,
sbin/unwind/libunbound/services/listen_dnsport.c
5605
conn->key.paddr.localaddrlen, localstr, sizeof(localstr));
sbin/unwind/libunbound/services/listen_dnsport.h
526
void* quic_sslctx_create(char* key, char* pem, char* verifypem);
sbin/unwind/libunbound/services/listen_dnsport.h
586
struct doq_conn_key key;
sbin/unwind/libunbound/services/listen_dnsport.h
655
struct doq_conn_key key;
sbin/unwind/libunbound/services/listen_dnsport.h
781
void doq_conn_key_from_repinfo(struct doq_conn_key* key,
sbin/unwind/libunbound/services/localzone.c
115
struct local_zone* z = (struct local_zone*)n->key;
sbin/unwind/libunbound/services/localzone.c
1247
struct local_zone key;
sbin/unwind/libunbound/services/localzone.c
1254
key.node.key = &key;
sbin/unwind/libunbound/services/localzone.c
1255
key.dclass = dclass;
sbin/unwind/libunbound/services/localzone.c
1256
key.name = name;
sbin/unwind/libunbound/services/localzone.c
1257
key.namelen = len;
sbin/unwind/libunbound/services/localzone.c
1258
key.namelabs = labs;
sbin/unwind/libunbound/services/localzone.c
1259
rbtree_find_less_equal(&zones->ztree, &key, &res);
sbin/unwind/libunbound/services/localzone.c
1265
(void)dname_lab_cmp(result->name, result->namelabs, key.name,
sbin/unwind/libunbound/services/localzone.c
1266
key.namelabs, &m);
sbin/unwind/libunbound/services/localzone.c
1282
struct local_zone key;
sbin/unwind/libunbound/services/localzone.c
1283
key.node.key = &key;
sbin/unwind/libunbound/services/localzone.c
1284
key.dclass = dclass;
sbin/unwind/libunbound/services/localzone.c
1285
key.name = name;
sbin/unwind/libunbound/services/localzone.c
1286
key.namelen = len;
sbin/unwind/libunbound/services/localzone.c
1287
key.namelabs = labs;
sbin/unwind/libunbound/services/localzone.c
1289
return (struct local_zone*)rbtree_search(&zones->ztree, &key);
sbin/unwind/libunbound/services/localzone.c
1297
struct local_zone key;
sbin/unwind/libunbound/services/localzone.c
1299
key.node.key = &key;
sbin/unwind/libunbound/services/localzone.c
1300
key.dclass = dclass;
sbin/unwind/libunbound/services/localzone.c
1301
key.name = name;
sbin/unwind/libunbound/services/localzone.c
1302
key.namelen = len;
sbin/unwind/libunbound/services/localzone.c
1303
key.namelabs = labs;
sbin/unwind/libunbound/services/localzone.c
1304
*exact = rbtree_find_less_equal(&zones->ztree, &key, &node);
sbin/unwind/libunbound/services/localzone.c
1400
r->entry.key = r;
sbin/unwind/libunbound/services/localzone.c
1488
struct local_data key;
sbin/unwind/libunbound/services/localzone.c
1491
key.node.key = &key;
sbin/unwind/libunbound/services/localzone.c
1492
key.name = qinfo->qname;
sbin/unwind/libunbound/services/localzone.c
1493
key.namelen = qinfo->qname_len;
sbin/unwind/libunbound/services/localzone.c
1494
key.namelabs = labs;
sbin/unwind/libunbound/services/localzone.c
1497
key.name = z->name;
sbin/unwind/libunbound/services/localzone.c
1498
key.namelen = z->namelen;
sbin/unwind/libunbound/services/localzone.c
1499
key.namelabs = z->namelabs;
sbin/unwind/libunbound/services/localzone.c
1518
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
sbin/unwind/libunbound/services/localzone.c
1568
qinfo->local_alias->rrset->entry.key =
sbin/unwind/libunbound/services/localzone.c
1621
struct local_data key;
sbin/unwind/libunbound/services/localzone.c
1630
key.node.key = &key;
sbin/unwind/libunbound/services/localzone.c
1631
key.name = qinfo->qname;
sbin/unwind/libunbound/services/localzone.c
1632
key.namelen = qinfo->qname_len;
sbin/unwind/libunbound/services/localzone.c
1633
key.namelabs = labs;
sbin/unwind/libunbound/services/localzone.c
1634
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
sbin/unwind/libunbound/services/localzone.c
191
z->node.key = z;
sbin/unwind/libunbound/services/localzone.c
379
rrset->rrset->entry.key = rrset->rrset;
sbin/unwind/libunbound/services/localzone.c
462
struct local_data key;
sbin/unwind/libunbound/services/localzone.c
463
key.node.key = &key;
sbin/unwind/libunbound/services/localzone.c
464
key.name = nm;
sbin/unwind/libunbound/services/localzone.c
465
key.namelen = nmlen;
sbin/unwind/libunbound/services/localzone.c
466
key.namelabs = nmlabs;
sbin/unwind/libunbound/services/localzone.c
467
return (struct local_data*)rbtree_search(&z->data, &key.node);
sbin/unwind/libunbound/services/localzone.c
484
ld->node.key = ld;
sbin/unwind/libunbound/services/localzone.c
526
rrset_negative->entry.key = rrset_negative;
sbin/unwind/libunbound/services/localzone.c
809
z.node.key = &z;
sbin/unwind/libunbound/services/mesh.c
1125
ref.node.key = &ref;
sbin/unwind/libunbound/services/mesh.c
1172
lookup.node.key = &lookup;
sbin/unwind/libunbound/services/mesh.c
1274
superref->node.key = superref;
sbin/unwind/libunbound/services/mesh.c
1276
subref->node.key = subref;
sbin/unwind/libunbound/services/mesh.c
1874
struct mesh_state key;
sbin/unwind/libunbound/services/mesh.c
1877
key.node.key = &key;
sbin/unwind/libunbound/services/mesh.c
1878
key.s.is_priming = prime;
sbin/unwind/libunbound/services/mesh.c
1879
key.s.is_valrec = valrec;
sbin/unwind/libunbound/services/mesh.c
1880
key.s.qinfo = *qinfo;
sbin/unwind/libunbound/services/mesh.c
1881
key.s.query_flags = qflags;
sbin/unwind/libunbound/services/mesh.c
1885
key.unique = NULL;
sbin/unwind/libunbound/services/mesh.c
1886
key.s.client_info = cinfo;
sbin/unwind/libunbound/services/mesh.c
1888
result = (struct mesh_state*)rbtree_search(&mesh->all, &key);
sbin/unwind/libunbound/services/mesh.c
2197
mstate = (struct mesh_state*)mesh->run.root->key;
sbin/unwind/libunbound/services/mesh.c
250
struct mesh_state* mstate = (struct mesh_state*)n->key;
sbin/unwind/libunbound/services/mesh.c
339
struct msgreply_entry* key;
sbin/unwind/libunbound/services/mesh.c
349
key = (struct msgreply_entry*)e->key;
sbin/unwind/libunbound/services/mesh.c
352
msg = tomsg(qstate->env, &key->key, data, qstate->region, timenow,
sbin/unwind/libunbound/services/mesh.c
981
mstate->node.key = mstate;
sbin/unwind/libunbound/services/mesh.c
982
mstate->run_node.key = mstate;
sbin/unwind/libunbound/services/outside_network.c
1041
log_assert(w->id_node.key != NULL);
sbin/unwind/libunbound/services/outside_network.c
1049
w->id_node.key = NULL;
sbin/unwind/libunbound/services/outside_network.c
1112
if(reuse->node.key) {
sbin/unwind/libunbound/services/outside_network.c
1121
reuse->node.key = NULL;
sbin/unwind/libunbound/services/outside_network.c
1171
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
sbin/unwind/libunbound/services/outside_network.c
1197
if(pend->reuse.node.key) {
sbin/unwind/libunbound/services/outside_network.c
1230
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
sbin/unwind/libunbound/services/outside_network.c
1240
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
sbin/unwind/libunbound/services/outside_network.c
1301
log_assert(pend->reuse.item_on_lru_list && pend->reuse.node.key);
sbin/unwind/libunbound/services/outside_network.c
1327
log_assert(pend->query->id_node.key);
sbin/unwind/libunbound/services/outside_network.c
1399
if(error == NETEVENT_NOERROR && pend->reuse.node.key) {
sbin/unwind/libunbound/services/outside_network.c
1484
struct pending key;
sbin/unwind/libunbound/services/outside_network.c
1499
key.id = (unsigned)LDNS_ID_WIRE(sldns_buffer_begin(c->buffer));
sbin/unwind/libunbound/services/outside_network.c
1500
memcpy(&key.addr, &reply_info->remote_addr, reply_info->remote_addrlen);
sbin/unwind/libunbound/services/outside_network.c
1501
key.addrlen = reply_info->remote_addrlen;
sbin/unwind/libunbound/services/outside_network.c
1502
verbose(VERB_ALGO, "Incoming reply id = %4.4x", key.id);
sbin/unwind/libunbound/services/outside_network.c
1508
p = (struct pending*)rbtree_search(outnet->pending, &key);
sbin/unwind/libunbound/services/outside_network.c
1549
(void)rbtree_delete(outnet->pending, p->node.key);
sbin/unwind/libunbound/services/outside_network.c
1978
(void)rbtree_delete(outnet->pending, p->node.key);
sbin/unwind/libunbound/services/outside_network.c
2052
pend->node.key = pend;
sbin/unwind/libunbound/services/outside_network.c
2285
pend->node.key = pend;
sbin/unwind/libunbound/services/outside_network.c
2494
w->id_node.key = NULL;
sbin/unwind/libunbound/services/outside_network.c
2587
struct serviced_query key;
sbin/unwind/libunbound/services/outside_network.c
2588
key.node.key = &key;
sbin/unwind/libunbound/services/outside_network.c
2589
key.qbuf = sldns_buffer_begin(buff);
sbin/unwind/libunbound/services/outside_network.c
2590
key.qbuflen = sldns_buffer_limit(buff);
sbin/unwind/libunbound/services/outside_network.c
2591
key.dnssec = dnssec;
sbin/unwind/libunbound/services/outside_network.c
2592
memcpy(&key.addr, addr, addrlen);
sbin/unwind/libunbound/services/outside_network.c
2593
key.addrlen = addrlen;
sbin/unwind/libunbound/services/outside_network.c
2594
key.outnet = outnet;
sbin/unwind/libunbound/services/outside_network.c
2595
key.opt_list = opt_list;
sbin/unwind/libunbound/services/outside_network.c
2596
return (struct serviced_query*)rbtree_search(outnet->serviced, &key);
sbin/unwind/libunbound/services/outside_network.c
2643
sq->node.key = sq;
sbin/unwind/libunbound/services/outside_network.c
2726
if(pend_tcp->reuse.node.key) {
sbin/unwind/libunbound/services/outside_network.c
455
log_assert(w->id_node.key == NULL);
sbin/unwind/libunbound/services/outside_network.c
456
w->id_node.key = w;
sbin/unwind/libunbound/services/outside_network.c
473
key_w.id_node.key = &key_w;
sbin/unwind/libunbound/services/outside_network.c
477
return (struct waiting_tcp*)n->key;
sbin/unwind/libunbound/services/outside_network.c
484
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
sbin/unwind/libunbound/services/outside_network.c
494
if(!pend_tcp->reuse.node.key)
sbin/unwind/libunbound/services/outside_network.c
499
pend_tcp->reuse.node.key = &pend_tcp->reuse;
sbin/unwind/libunbound/services/outside_network.c
547
key_p.reuse.node.key = &key_p.reuse;
sbin/unwind/libunbound/services/outside_network.c
584
if (reuse_cmp_addrportssl(result->key, &key_p.reuse) < 0) {
sbin/unwind/libunbound/services/outside_network.c
597
reuse_cmp_addrportssl(prev->key, &key_p.reuse) == 0) {
sbin/unwind/libunbound/services/outside_network.c
604
reuse_cmp_addrportssl(result->key, &key_p.reuse) == 0) {
sbin/unwind/libunbound/services/outside_network.c
778
if(pend->reuse.node.key)
sbin/unwind/libunbound/services/rpz.c
1507
rbtree_delete(&set->entries, node->node.node.key);
sbin/unwind/libunbound/services/rpz.c
1828
csoa.entry.key = &csoa;
sbin/unwind/libunbound/services/rpz.c
2110
struct local_data key;
sbin/unwind/libunbound/services/rpz.c
2116
key.node.key = &key;
sbin/unwind/libunbound/services/rpz.c
2117
key.name = match->dname;
sbin/unwind/libunbound/services/rpz.c
2118
key.namelen = match->dname_len;
sbin/unwind/libunbound/services/rpz.c
2119
key.namelabs = dname_count_labels(match->dname);
sbin/unwind/libunbound/services/rpz.c
2121
rpz_log_dname("nsdname local data", key.name, key.namelen);
sbin/unwind/libunbound/services/rpz.c
2123
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
sbin/unwind/libunbound/services/rpz.c
2125
key.name = z->name;
sbin/unwind/libunbound/services/rpz.c
2126
key.namelen = z->namelen;
sbin/unwind/libunbound/services/rpz.c
2127
key.namelabs = z->namelabs;
sbin/unwind/libunbound/services/rpz.c
2128
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
sbin/unwind/libunbound/services/rpz.c
2152
struct local_data key;
sbin/unwind/libunbound/services/rpz.c
2155
key.node.key = &key;
sbin/unwind/libunbound/services/rpz.c
2156
key.name = qinfo->qname;
sbin/unwind/libunbound/services/rpz.c
2157
key.namelen = qinfo->qname_len;
sbin/unwind/libunbound/services/rpz.c
2158
key.namelabs = dname_count_labels(qinfo->qname);
sbin/unwind/libunbound/services/rpz.c
2159
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
sbin/unwind/libunbound/services/rpz.c
2161
key.name = z->name;
sbin/unwind/libunbound/services/rpz.c
2162
key.namelen = z->namelen;
sbin/unwind/libunbound/services/rpz.c
2163
key.namelabs = z->namelabs;
sbin/unwind/libunbound/services/rpz.c
2164
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
sbin/unwind/libunbound/services/rpz.c
363
struct clientip_synthesized_rr* r = (struct clientip_synthesized_rr*)n->key;
sbin/unwind/libunbound/services/rpz.c
460
rrset->entry.key = rrset;
sbin/unwind/libunbound/services/rpz.c
924
rrset->rrset->entry.key = rrset->rrset;
sbin/unwind/libunbound/services/view.c
106
v->node.key = v;
sbin/unwind/libunbound/services/view.c
224
struct view key;
sbin/unwind/libunbound/services/view.c
225
key.node.key = &v;
sbin/unwind/libunbound/services/view.c
226
key.name = (char *)name;
sbin/unwind/libunbound/services/view.c
228
if(!(v = (struct view*)rbtree_search(&vs->vtree, &key.node))) {
sbin/unwind/libunbound/sldns/keyraw.c
110
uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize)
sbin/unwind/libunbound/sldns/keyraw.c
116
if (key[3] == LDNS_RSAMD5) {
sbin/unwind/libunbound/sldns/keyraw.c
119
memmove(&ac16, key + keysize - 3, 2);
sbin/unwind/libunbound/sldns/keyraw.c
127
ac32 += ((i & 1)) ? key[i] : key[i] << 8;
sbin/unwind/libunbound/sldns/keyraw.c
201
sldns_key_dsa_buf_bignum(unsigned char* key, size_t len, BIGNUM** p,
sbin/unwind/libunbound/sldns/keyraw.c
210
T = (uint8_t)key[0];
sbin/unwind/libunbound/sldns/keyraw.c
220
*q = BN_bin2bn(key+offset, SHA_DIGEST_LENGTH, NULL);
sbin/unwind/libunbound/sldns/keyraw.c
223
*p = BN_bin2bn(key+offset, (int)length, NULL);
sbin/unwind/libunbound/sldns/keyraw.c
226
*g = BN_bin2bn(key+offset, (int)length, NULL);
sbin/unwind/libunbound/sldns/keyraw.c
229
*y = BN_bin2bn(key+offset, (int)length, NULL);
sbin/unwind/libunbound/sldns/keyraw.c
243
sldns_key_buf2dsa_raw(unsigned char* key, size_t len)
sbin/unwind/libunbound/sldns/keyraw.c
247
if(!sldns_key_dsa_buf_bignum(key, len, &P, &Q, &G, &Y)) {
sbin/unwind/libunbound/sldns/keyraw.c
286
EVP_PKEY *sldns_key_dsa2pkey_raw(unsigned char* key, size_t len)
sbin/unwind/libunbound/sldns/keyraw.c
294
if(!sldns_key_dsa_buf_bignum(key, len, &p, &q, &g, &y)) {
sbin/unwind/libunbound/sldns/keyraw.c
361
dsa = sldns_key_buf2dsa_raw(key, len);
sbin/unwind/libunbound/sldns/keyraw.c
378
sldns_key_rsa_buf_bignum(unsigned char* key, size_t len, BIGNUM** n,
sbin/unwind/libunbound/sldns/keyraw.c
387
if (key[0] == 0) {
sbin/unwind/libunbound/sldns/keyraw.c
390
memmove(&int16, key+1, 2);
sbin/unwind/libunbound/sldns/keyraw.c
394
exp = key[0];
sbin/unwind/libunbound/sldns/keyraw.c
405
(void) BN_bin2bn(key+offset, (int)exp, *e);
sbin/unwind/libunbound/sldns/keyraw.c
415
(void) BN_bin2bn(key+offset, (int)(len - offset), *n);
sbin/unwind/libunbound/sldns/keyraw.c
421
sldns_key_buf2rsa_raw(unsigned char* key, size_t len)
sbin/unwind/libunbound/sldns/keyraw.c
426
if(!sldns_key_rsa_buf_bignum(key, len, &modulus, &exponent))
sbin/unwind/libunbound/sldns/keyraw.c
454
EVP_PKEY* sldns_key_rsa2pkey_raw(unsigned char* key, size_t len)
sbin/unwind/libunbound/sldns/keyraw.c
463
if(!sldns_key_rsa_buf_bignum(key, len, &n, &e)) {
sbin/unwind/libunbound/sldns/keyraw.c
521
rsa = sldns_key_buf2rsa_raw(key, len);
sbin/unwind/libunbound/sldns/keyraw.c
537
sldns_gost2pkey_raw(unsigned char* key, size_t keylen)
sbin/unwind/libunbound/sldns/keyraw.c
553
memmove(encoded+37, key, 64);
sbin/unwind/libunbound/sldns/keyraw.c
562
sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo)
sbin/unwind/libunbound/sldns/keyraw.c
587
memmove(buf+1, key, keylen);
sbin/unwind/libunbound/sldns/keyraw.c
640
memmove(buf+1, key, keylen);
sbin/unwind/libunbound/sldns/keyraw.c
662
sldns_ed255192pkey_raw(const unsigned char* key, size_t keylen)
sbin/unwind/libunbound/sldns/keyraw.c
675
memmove(buf+pre_len, key, keylen);
sbin/unwind/libunbound/sldns/keyraw.c
683
sldns_ed4482pkey_raw(const unsigned char* key, size_t keylen)
sbin/unwind/libunbound/sldns/keyraw.c
696
memmove(buf+pre_len, key, keylen);
sbin/unwind/libunbound/sldns/keyraw.h
104
RSA *sldns_key_buf2rsa_raw(unsigned char* key, size_t len);
sbin/unwind/libunbound/sldns/keyraw.h
113
EVP_PKEY* sldns_key_rsa2pkey_raw(unsigned char* key, size_t len);
sbin/unwind/libunbound/sldns/keyraw.h
122
EVP_PKEY* sldns_ed255192pkey_raw(const unsigned char* key, size_t len);
sbin/unwind/libunbound/sldns/keyraw.h
131
EVP_PKEY* sldns_ed4482pkey_raw(const unsigned char* key, size_t len);
sbin/unwind/libunbound/sldns/keyraw.h
47
uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
sbin/unwind/libunbound/sldns/keyraw.h
67
DSA *sldns_key_buf2dsa_raw(unsigned char* key, size_t len);
sbin/unwind/libunbound/sldns/keyraw.h
76
EVP_PKEY *sldns_key_dsa2pkey_raw(unsigned char* key, size_t len);
sbin/unwind/libunbound/sldns/keyraw.h
85
EVP_PKEY* sldns_gost2pkey_raw(unsigned char* key, size_t keylen);
sbin/unwind/libunbound/sldns/keyraw.h
95
EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
sbin/unwind/libunbound/sldns/str2wire.c
1110
sldns_str2wire_svcparam_key_lookup(const char *key, size_t key_len)
sbin/unwind/libunbound/sldns/str2wire.c
1116
if (key_len >= 4 && key_len <= 8 && !strncmp(key, "key", 3)) {
sbin/unwind/libunbound/sldns/str2wire.c
1117
memcpy(buf, key + 3, key_len - 3);
sbin/unwind/libunbound/sldns/str2wire.c
1128
if (!strncmp(key, "ech", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1133
if (!strncmp(key, "alpn", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1135
if (!strncmp(key, "port", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1140
if (!strncmp(key, "dohpath", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1145
if (!strncmp(key, "ipv4hint", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1147
if (!strncmp(key, "ipv6hint", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1152
if (!strncmp(key, "mandatory", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1154
if (!strncmp(key, "echconfig", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1159
if (!strncmp(key, "no-default-alpn", key_len))
sbin/unwind/libunbound/sldns/str2wire.c
1390
uint16_t key = sldns_read_uint16(current_pos);
sbin/unwind/libunbound/sldns/str2wire.c
1392
if (key == sldns_read_uint16(current_pos + 2)) {
sbin/unwind/libunbound/sldns/str2wire.c
1551
sldns_str2wire_svcparam_value(const char *key, size_t key_len,
sbin/unwind/libunbound/sldns/str2wire.c
1555
int svcparamkey = sldns_str2wire_svcparam_key_lookup(key, key_len);
sbin/unwind/libunbound/sldns/str2wire.c
695
uint16_t key = sldns_read_uint16(svcparams[i]);
sbin/unwind/libunbound/sldns/str2wire.c
696
if(i + 1 < nparams && key == sldns_read_uint16(svcparams[i+1]))
sbin/unwind/libunbound/sldns/str2wire.c
698
if(key == SVCB_KEY_MANDATORY)
sbin/unwind/libunbound/util/alloc.c
59
t->entry.key = t;
sbin/unwind/libunbound/util/config_file.c
2788
w_lookup_reg_str(const char* key, const char* name)
sbin/unwind/libunbound/util/config_file.c
2796
ret = RegOpenKeyEx(HKEY_LOCAL_MACHINE, key, 0, KEY_READ, &hk);
sbin/unwind/libunbound/util/config_file.h
1420
char* w_lookup_reg_str(const char* key, const char* name);
sbin/unwind/libunbound/util/data/msgencode.c
291
compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
sbin/unwind/libunbound/util/data/msgencode.c
301
(p = compress_tree_lookup(tree, key->rk.dname,
sbin/unwind/libunbound/util/data/msgencode.c
307
if(!write_compressed_dname(pkt, key->rk.dname,
sbin/unwind/libunbound/util/data/msgencode.c
316
if(sldns_buffer_remaining(pkt) < key->rk.dname_len+4+4+2)
sbin/unwind/libunbound/util/data/msgencode.c
318
sldns_buffer_write(pkt, key->rk.dname,
sbin/unwind/libunbound/util/data/msgencode.c
319
key->rk.dname_len);
sbin/unwind/libunbound/util/data/msgencode.c
324
!compress_tree_store(key->rk.dname, owner_labs,
sbin/unwind/libunbound/util/data/msgencode.c
368
type_rdata_compressible(struct ub_packed_rrset_key* key)
sbin/unwind/libunbound/util/data/msgencode.c
370
uint16_t t = ntohs(key->rk.type);
sbin/unwind/libunbound/util/data/msgencode.c
461
packed_rrset_encode(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
sbin/unwind/libunbound/util/data/msgencode.c
472
key->entry.data;
sbin/unwind/libunbound/util/data/msgencode.c
475
if(!rrset_belongs_in_reply(s, ntohs(key->rk.type), qtype, dnssec))
sbin/unwind/libunbound/util/data/msgencode.c
478
owner_labs = dname_count_labels(key->rk.dname);
sbin/unwind/libunbound/util/data/msgencode.c
483
if((key->rk.flags & PACKED_RRSET_FIXEDTTL) != 0)
sbin/unwind/libunbound/util/data/msgencode.c
489
const sldns_rr_descriptor* c = type_rdata_compressible(key);
sbin/unwind/libunbound/util/data/msgencode.c
493
if((r=compress_owner(key, pkt, region, tree,
sbin/unwind/libunbound/util/data/msgencode.c
497
sldns_buffer_write(pkt, &key->rk.type, 2);
sbin/unwind/libunbound/util/data/msgencode.c
498
sldns_buffer_write(pkt, &key->rk.rrset_class, 2);
sbin/unwind/libunbound/util/data/msgencode.c
526
if((r=compress_any_dname(key->rk.dname,
sbin/unwind/libunbound/util/data/msgencode.c
535
sldns_buffer_write(pkt, &key->rk.rrset_class, 2);
sbin/unwind/libunbound/util/data/msgreply.c
167
rep->rrsets[i]->entry.key = rep->rrsets[i];
sbin/unwind/libunbound/util/data/msgreply.c
481
pk->entry.key = (void*)pk;
sbin/unwind/libunbound/util/data/msgreply.c
585
if(x->key < y->key) return -1;
sbin/unwind/libunbound/util/data/msgreply.c
586
if(x->key > y->key) return 1;
sbin/unwind/libunbound/util/data/msgreply.c
609
rep->ref[i].key->entry.data;
sbin/unwind/libunbound/util/data/msgreply.c
610
if(i>0 && rep->ref[i].key == rep->ref[i-1].key)
sbin/unwind/libunbound/util/data/msgreply.c
695
+ q->key.qname_len + lock_get_mem(&q->entry.lock)
sbin/unwind/libunbound/util/data/msgreply.c
707
query_info_clear(&q->key);
sbin/unwind/libunbound/util/data/msgreply.c
741
memcpy(&e->key, q, sizeof(*q));
sbin/unwind/libunbound/util/data/msgreply.c
743
e->entry.key = e;
sbin/unwind/libunbound/util/data/msgreply.c
746
lock_protect(&e->entry.lock, &e->key.qname, sizeof(e->key.qname));
sbin/unwind/libunbound/util/data/msgreply.c
747
lock_protect(&e->entry.lock, &e->key.qname_len, sizeof(e->key.qname_len));
sbin/unwind/libunbound/util/data/msgreply.c
748
lock_protect(&e->entry.lock, &e->key.qtype, sizeof(e->key.qtype));
sbin/unwind/libunbound/util/data/msgreply.c
749
lock_protect(&e->entry.lock, &e->key.qclass, sizeof(e->key.qclass));
sbin/unwind/libunbound/util/data/msgreply.c
750
lock_protect(&e->entry.lock, &e->key.local_alias, sizeof(e->key.local_alias));
sbin/unwind/libunbound/util/data/msgreply.c
752
lock_protect(&e->entry.lock, &e->entry.key, sizeof(e->entry.key));
sbin/unwind/libunbound/util/data/msgreply.c
754
lock_protect(&e->entry.lock, e->key.qname, e->key.qname_len);
sbin/unwind/libunbound/util/data/msgreply.h
108
struct ub_packed_rrset_key* key;
sbin/unwind/libunbound/util/data/msgreply.h
246
struct query_info key;
sbin/unwind/libunbound/util/data/packed_rrset.c
128
ub_rrset_key_delete(void* key, void* userdata)
sbin/unwind/libunbound/util/data/packed_rrset.c
130
struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)key;
sbin/unwind/libunbound/util/data/packed_rrset.c
163
rrset_key_hash(struct packed_rrset_key* key)
sbin/unwind/libunbound/util/data/packed_rrset.c
166
uint16_t t = ntohs(key->type);
sbin/unwind/libunbound/util/data/packed_rrset.c
170
h = dname_query_hash(key->dname, h);
sbin/unwind/libunbound/util/data/packed_rrset.c
172
h = hashlittle(&key->rrset_class, sizeof(uint16_t), h);
sbin/unwind/libunbound/util/data/packed_rrset.c
173
h = hashlittle(&key->flags, sizeof(uint32_t), h);
sbin/unwind/libunbound/util/data/packed_rrset.c
325
ub_packed_rrset_ttl(struct ub_packed_rrset_key* key)
sbin/unwind/libunbound/util/data/packed_rrset.c
327
struct packed_rrset_data* d = (struct packed_rrset_data*)key->
sbin/unwind/libunbound/util/data/packed_rrset.c
333
packed_rrset_copy_region(struct ub_packed_rrset_key* key,
sbin/unwind/libunbound/util/data/packed_rrset.c
340
key->entry.data;
sbin/unwind/libunbound/util/data/packed_rrset.c
345
ck->id = key->id;
sbin/unwind/libunbound/util/data/packed_rrset.c
347
ck->entry.hash = key->entry.hash;
sbin/unwind/libunbound/util/data/packed_rrset.c
348
ck->entry.key = ck;
sbin/unwind/libunbound/util/data/packed_rrset.c
349
ck->rk = key->rk;
sbin/unwind/libunbound/util/data/packed_rrset.c
350
ck->rk.dname = regional_alloc_init(region, key->rk.dname,
sbin/unwind/libunbound/util/data/packed_rrset.c
351
key->rk.dname_len);
sbin/unwind/libunbound/util/data/packed_rrset.c
375
packed_rrset_copy_alloc(struct ub_packed_rrset_key* key,
sbin/unwind/libunbound/util/data/packed_rrset.c
381
fd = (struct packed_rrset_data*)key->entry.data;
sbin/unwind/libunbound/util/data/packed_rrset.c
382
dk->entry.hash = key->entry.hash;
sbin/unwind/libunbound/util/data/packed_rrset.c
383
dk->rk = key->rk;
sbin/unwind/libunbound/util/data/packed_rrset.c
384
dk->rk.dname = (uint8_t*)memdup(key->rk.dname, key->rk.dname_len);
sbin/unwind/libunbound/util/data/packed_rrset.c
70
ub_rrset_sizefunc(void* key, void* data)
sbin/unwind/libunbound/util/data/packed_rrset.c
72
struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)key;
sbin/unwind/libunbound/util/data/packed_rrset.h
318
time_t ub_packed_rrset_ttl(struct ub_packed_rrset_key* key);
sbin/unwind/libunbound/util/data/packed_rrset.h
326
size_t ub_rrset_sizefunc(void* key, void* data);
sbin/unwind/libunbound/util/data/packed_rrset.h
352
void ub_rrset_key_delete(void* key, void* userdata);
sbin/unwind/libunbound/util/data/packed_rrset.h
366
hashvalue_type rrset_key_hash(struct packed_rrset_key* key);
sbin/unwind/libunbound/util/data/packed_rrset.h
449
struct ub_packed_rrset_key* key, struct regional* region,
sbin/unwind/libunbound/util/data/packed_rrset.h
460
struct ub_packed_rrset_key* key, struct alloc_cache* alloc,
sbin/unwind/libunbound/util/locks.c
146
void* ub_thread_key_get(ub_thread_key_type key)
sbin/unwind/libunbound/util/locks.c
149
LOCKRET(thr_getspecific(key, &ret));
sbin/unwind/libunbound/util/locks.c
200
void ub_thread_key_create(ub_thread_key_type* key, void* f)
sbin/unwind/libunbound/util/locks.c
202
*key = TlsAlloc();
sbin/unwind/libunbound/util/locks.c
203
if(*key == TLS_OUT_OF_INDEXES) {
sbin/unwind/libunbound/util/locks.c
204
*key = 0;
sbin/unwind/libunbound/util/locks.c
207
else ub_thread_key_set(*key, f);
sbin/unwind/libunbound/util/locks.c
210
void ub_thread_key_set(ub_thread_key_type key, void* v)
sbin/unwind/libunbound/util/locks.c
212
if(!TlsSetValue(key, v)) {
sbin/unwind/libunbound/util/locks.c
217
void* ub_thread_key_get(ub_thread_key_type key)
sbin/unwind/libunbound/util/locks.c
219
void* ret = (void*)TlsGetValue(key);
sbin/unwind/libunbound/util/locks.h
177
#define ub_thread_key_create(key, f) LOCKRET(pthread_key_create(key, f))
sbin/unwind/libunbound/util/locks.h
178
#define ub_thread_key_set(key, v) LOCKRET(pthread_setspecific(key, v))
sbin/unwind/libunbound/util/locks.h
179
#define ub_thread_key_get(key) pthread_getspecific(key)
sbin/unwind/libunbound/util/locks.h
215
#define ub_thread_key_create(key, f) LOCKRET(thr_keycreate(key, f))
sbin/unwind/libunbound/util/locks.h
216
#define ub_thread_key_set(key, v) LOCKRET(thr_setspecific(key, v))
sbin/unwind/libunbound/util/locks.h
217
void* ub_thread_key_get(ub_thread_key_type key);
sbin/unwind/libunbound/util/locks.h
253
void ub_thread_key_create(ub_thread_key_type* key, void* f);
sbin/unwind/libunbound/util/locks.h
254
void ub_thread_key_set(ub_thread_key_type key, void* v);
sbin/unwind/libunbound/util/locks.h
255
void* ub_thread_key_get(ub_thread_key_type key);
sbin/unwind/libunbound/util/locks.h
294
#define ub_thread_key_create(key, f) (*(key)) = NULL
sbin/unwind/libunbound/util/locks.h
295
#define ub_thread_key_set(key, v) (key) = (v)
sbin/unwind/libunbound/util/locks.h
296
#define ub_thread_key_get(key) (key)
sbin/unwind/libunbound/util/mini_event.c
274
ev->node.key = ev;
sbin/unwind/libunbound/util/net_help.c
1341
void* listen_sslctx_create(const char* key, const char* pem,
sbin/unwind/libunbound/util/net_help.c
1352
if(!key || key[0] == 0) {
sbin/unwind/libunbound/util/net_help.c
1372
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
sbin/unwind/libunbound/util/net_help.c
1373
log_err("error for private key file: %s", key);
sbin/unwind/libunbound/util/net_help.c
1379
log_err("error for key file: %s", key);
sbin/unwind/libunbound/util/net_help.c
1436
(void)key; (void)pem; (void)verifypem;
sbin/unwind/libunbound/util/net_help.c
1535
void* connect_sslctx_create(char* key, char* pem, char* verifypem, int wincert)
sbin/unwind/libunbound/util/net_help.c
1577
if(key && key[0]) {
sbin/unwind/libunbound/util/net_help.c
1584
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
sbin/unwind/libunbound/util/net_help.c
1585
log_err("error in client private key %s", key);
sbin/unwind/libunbound/util/net_help.c
1591
log_err("error in client key %s", key);
sbin/unwind/libunbound/util/net_help.c
1626
(void)key; (void)pem; (void)verifypem; (void)wincert;
sbin/unwind/libunbound/util/net_help.c
1910
struct tls_session_ticket_key *key;
sbin/unwind/libunbound/util/net_help.c
1912
for(key = ticket_keys; key->key_name != NULL; key++) {
sbin/unwind/libunbound/util/net_help.c
1913
if (!memcmp(key_name, key->key_name, 16)) {
sbin/unwind/libunbound/util/net_help.c
1918
if(key->key_name == NULL) {
sbin/unwind/libunbound/util/net_help.c
1925
key->hmac_key, 32);
sbin/unwind/libunbound/util/net_help.c
1935
if (HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL) != 1) {
sbin/unwind/libunbound/util/net_help.c
1940
HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL);
sbin/unwind/libunbound/util/net_help.c
1942
if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) {
sbin/unwind/libunbound/util/net_help.c
1947
return (key == ticket_keys) ? 1 : 2;
sbin/unwind/libunbound/util/net_help.c
1965
struct tls_session_ticket_key *key;
sbin/unwind/libunbound/util/net_help.c
1967
for(key = ticket_keys; key->key_name != NULL; key++) {
sbin/unwind/libunbound/util/net_help.c
1970
explicit_bzero(key->key_name, 80);
sbin/unwind/libunbound/util/net_help.c
1972
memset(key->key_name, 0xdd, 80);
sbin/unwind/libunbound/util/net_help.c
1974
free(key->key_name);
sbin/unwind/libunbound/util/net_help.h
504
void* listen_sslctx_create(const char* key, const char* pem,
sbin/unwind/libunbound/util/net_help.h
518
void* connect_sslctx_create(char* key, char* pem, char* verifypem, int wincert);
sbin/unwind/libunbound/util/netevent.c
1646
struct doq_conn key;
sbin/unwind/libunbound/util/netevent.c
1647
memset(&key.node, 0, sizeof(key.node));
sbin/unwind/libunbound/util/netevent.c
1648
key.node.key = &key;
sbin/unwind/libunbound/util/netevent.c
1649
memmove(&key.key.paddr.addr, addr, addrlen);
sbin/unwind/libunbound/util/netevent.c
1650
key.key.paddr.addrlen = addrlen;
sbin/unwind/libunbound/util/netevent.c
1651
memmove(&key.key.paddr.localaddr, localaddr, localaddrlen);
sbin/unwind/libunbound/util/netevent.c
1652
key.key.paddr.localaddrlen = localaddrlen;
sbin/unwind/libunbound/util/netevent.c
1653
key.key.paddr.ifindex = ifindex;
sbin/unwind/libunbound/util/netevent.c
1654
key.key.dcid = (void*)dcid;
sbin/unwind/libunbound/util/netevent.c
1655
key.key.dcidlen = dcidlen;
sbin/unwind/libunbound/util/netevent.c
1656
node = rbtree_search(table->conn_tree, &key);
sbin/unwind/libunbound/util/netevent.c
1658
return (struct doq_conn*)node->key;
sbin/unwind/libunbound/util/netevent.c
1673
struct doq_conn_key key = conid->key;
sbin/unwind/libunbound/util/netevent.c
1675
log_assert(conid->key.dcidlen <= NGTCP2_MAX_CIDLEN);
sbin/unwind/libunbound/util/netevent.c
1676
memcpy(cid, conid->key.dcid, conid->key.dcidlen);
sbin/unwind/libunbound/util/netevent.c
1677
key.dcid = cid;
sbin/unwind/libunbound/util/netevent.c
1682
conn = doq_conn_find(table, &key.paddr.addr,
sbin/unwind/libunbound/util/netevent.c
1683
key.paddr.addrlen, &key.paddr.localaddr,
sbin/unwind/libunbound/util/netevent.c
1684
key.paddr.localaddrlen, key.paddr.ifindex, key.dcid,
sbin/unwind/libunbound/util/netevent.c
1685
key.dcidlen);
sbin/unwind/libunbound/util/netevent.c
1968
copy.key = conn->key;
sbin/unwind/libunbound/util/netevent.c
1969
log_assert(conn->key.dcidlen <= NGTCP2_MAX_CIDLEN);
sbin/unwind/libunbound/util/netevent.c
1970
memcpy(cid, conn->key.dcid, conn->key.dcidlen);
sbin/unwind/libunbound/util/netevent.c
1971
copy.key.dcid = cid;
sbin/unwind/libunbound/util/netevent.c
1972
copy.node.key = &copy;
sbin/unwind/libunbound/util/netevent.c
1977
node = rbtree_delete(c->doq_socket->table->conn_tree, copy.node.key);
sbin/unwind/libunbound/util/netevent.c
1979
conn = (struct doq_conn*)node->key;
sbin/unwind/libunbound/util/netevent.c
1998
sizeof(*conn)+conn->key.dcidlen);
sbin/unwind/libunbound/util/netevent.c
2039
sizeof(*conn)+conn->key.dcidlen);
sbin/unwind/libunbound/util/netevent.c
2237
copy.key = conn->key;
sbin/unwind/libunbound/util/netevent.c
2238
log_assert(conn->key.dcidlen <= NGTCP2_MAX_CIDLEN);
sbin/unwind/libunbound/util/netevent.c
2239
memcpy(cid, conn->key.dcid, conn->key.dcidlen);
sbin/unwind/libunbound/util/netevent.c
2240
copy.key.dcid = cid;
sbin/unwind/libunbound/util/netevent.c
2241
copy.node.key = &copy;
sbin/unwind/libunbound/util/netevent.c
2245
node = rbtree_search(c->doq_socket->table->conn_tree, copy.node.key);
sbin/unwind/libunbound/util/netevent.c
2251
conn = (struct doq_conn*)node->key;
sbin/unwind/libunbound/util/netevent.c
2296
copy.key = conn->key;
sbin/unwind/libunbound/util/netevent.c
2297
log_assert(conn->key.dcidlen <= NGTCP2_MAX_CIDLEN);
sbin/unwind/libunbound/util/netevent.c
2298
memcpy(cid, conn->key.dcid, conn->key.dcidlen);
sbin/unwind/libunbound/util/netevent.c
2299
copy.key.dcid = cid;
sbin/unwind/libunbound/util/netevent.c
2300
copy.node.key = &copy;
sbin/unwind/libunbound/util/netevent.c
2304
node = rbtree_search(c->doq_socket->table->conn_tree, copy.node.key);
sbin/unwind/libunbound/util/netevent.c
2310
conn = (struct doq_conn*)node->key;
sbin/unwind/libunbound/util/netevent.c
2499
addr_to_str((void*)&conn->key.paddr.addr,
sbin/unwind/libunbound/util/netevent.c
2500
conn->key.paddr.addrlen, remotestr,
sbin/unwind/libunbound/util/netevent.c
2582
addr_to_str((void*)&conn->key.paddr.addr,
sbin/unwind/libunbound/util/netevent.c
2583
conn->key.paddr.addrlen, remotestr,
sbin/unwind/libunbound/util/netevent.c
2587
&conn->key.paddr.addr));
sbin/unwind/libunbound/util/netevent.c
2806
struct doq_conn_key key;
sbin/unwind/libunbound/util/netevent.c
2807
doq_conn_key_from_repinfo(&key, repinfo);
sbin/unwind/libunbound/util/netevent.c
2809
conn = doq_conn_find(table, &key.paddr.addr,
sbin/unwind/libunbound/util/netevent.c
2810
key.paddr.addrlen, &key.paddr.localaddr,
sbin/unwind/libunbound/util/netevent.c
2811
key.paddr.localaddrlen, key.paddr.ifindex, key.dcid,
sbin/unwind/libunbound/util/netevent.c
2812
key.dcidlen);
sbin/unwind/libunbound/util/rbtree.c
241
if ((r = rbtree->cmp(data->key, node->key)) == 0) {
sbin/unwind/libunbound/util/rbtree.c
281
rbtree_search (rbtree_type *rbtree, const void *key)
sbin/unwind/libunbound/util/rbtree.c
285
if (rbtree_find_less_equal(rbtree, key, &node)) {
sbin/unwind/libunbound/util/rbtree.c
329
rbtree_delete(rbtree_type *rbtree, const void *key)
sbin/unwind/libunbound/util/rbtree.c
333
if((to_delete = rbtree_search(rbtree, key)) == 0) return 0;
sbin/unwind/libunbound/util/rbtree.c
511
rbtree_find_less_equal(rbtree_type *rbtree, const void *key,
sbin/unwind/libunbound/util/rbtree.c
527
r = rbtree->cmp(key, node->key);
sbin/unwind/libunbound/util/rbtree.h
119
rbnode_type *rbtree_delete(rbtree_type *rbtree, const void *key);
sbin/unwind/libunbound/util/rbtree.h
127
rbnode_type *rbtree_search(rbtree_type *rbtree, const void *key);
sbin/unwind/libunbound/util/rbtree.h
138
int rbtree_find_less_equal(rbtree_type *rbtree, const void *key,
sbin/unwind/libunbound/util/rbtree.h
63
const void *key;
sbin/unwind/libunbound/util/storage/dnstree.c
100
node->node.key = node;
sbin/unwind/libunbound/util/storage/dnstree.c
112
node->node.key = node;
sbin/unwind/libunbound/util/storage/dnstree.c
182
struct name_tree_node key;
sbin/unwind/libunbound/util/storage/dnstree.c
183
key.node.key = &key;
sbin/unwind/libunbound/util/storage/dnstree.c
184
key.name = name;
sbin/unwind/libunbound/util/storage/dnstree.c
185
key.len = len;
sbin/unwind/libunbound/util/storage/dnstree.c
186
key.labs = labs;
sbin/unwind/libunbound/util/storage/dnstree.c
187
key.dclass = dclass;
sbin/unwind/libunbound/util/storage/dnstree.c
188
return (struct name_tree_node*)rbtree_search(tree, &key);
sbin/unwind/libunbound/util/storage/dnstree.c
196
struct name_tree_node key;
sbin/unwind/libunbound/util/storage/dnstree.c
197
key.node.key = &key;
sbin/unwind/libunbound/util/storage/dnstree.c
198
key.name = name;
sbin/unwind/libunbound/util/storage/dnstree.c
199
key.len = len;
sbin/unwind/libunbound/util/storage/dnstree.c
200
key.labs = labs;
sbin/unwind/libunbound/util/storage/dnstree.c
201
key.dclass = dclass;
sbin/unwind/libunbound/util/storage/dnstree.c
202
if(rbtree_find_less_equal(tree, &key, &res)) {
sbin/unwind/libunbound/util/storage/dnstree.c
212
(void)dname_lab_cmp(result->name, result->labs, key.name,
sbin/unwind/libunbound/util/storage/dnstree.c
213
key.labs, &m);
sbin/unwind/libunbound/util/storage/dnstree.c
228
struct addr_tree_node key;
sbin/unwind/libunbound/util/storage/dnstree.c
229
key.node.key = &key;
sbin/unwind/libunbound/util/storage/dnstree.c
230
memcpy(&key.addr, addr, addrlen);
sbin/unwind/libunbound/util/storage/dnstree.c
231
key.addrlen = addrlen;
sbin/unwind/libunbound/util/storage/dnstree.c
232
key.net = (addr_is_ip6(addr, addrlen)?128:32);
sbin/unwind/libunbound/util/storage/dnstree.c
233
if(rbtree_find_less_equal(tree, &key, &res)) {
sbin/unwind/libunbound/util/storage/dnstree.c
244
key.net, addrlen);
sbin/unwind/libunbound/util/storage/dnstree.c
258
struct addr_tree_node key;
sbin/unwind/libunbound/util/storage/dnstree.c
259
key.node.key = &key;
sbin/unwind/libunbound/util/storage/dnstree.c
260
memcpy(&key.addr, addr, addrlen);
sbin/unwind/libunbound/util/storage/dnstree.c
261
key.addrlen = addrlen;
sbin/unwind/libunbound/util/storage/dnstree.c
262
key.net = net;
sbin/unwind/libunbound/util/storage/dnstree.c
263
res = rbtree_search(tree, &key);
sbin/unwind/libunbound/util/storage/dnstree.c
270
struct name_tree_node key;
sbin/unwind/libunbound/util/storage/dnstree.c
290
key.node.key = &key;
sbin/unwind/libunbound/util/storage/dnstree.c
291
key.name = (uint8_t*)"\000";
sbin/unwind/libunbound/util/storage/dnstree.c
292
key.len = 1;
sbin/unwind/libunbound/util/storage/dnstree.c
293
key.labs = 0;
sbin/unwind/libunbound/util/storage/dnstree.c
294
key.dclass = *dclass;
sbin/unwind/libunbound/util/storage/dnstree.c
296
if(rbtree_find_less_equal(tree, &key, &n)) {
sbin/unwind/libunbound/util/storage/lookup3.c
356
uint32_t hashlittle( const void *key, size_t length, uint32_t initval)
sbin/unwind/libunbound/util/storage/lookup3.c
364
u.ptr = key;
sbin/unwind/libunbound/util/storage/lookup3.c
366
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
sbin/unwind/libunbound/util/storage/lookup3.c
450
const uint16_t *k = (const uint16_t *)key; /* read 16-bit chunks */
sbin/unwind/libunbound/util/storage/lookup3.c
507
const uint8_t *k = (const uint8_t *)key;
sbin/unwind/libunbound/util/storage/lookup3.c
588
const void *key, /* the key to hash */
sbin/unwind/libunbound/util/storage/lookup3.c
600
u.ptr = key;
sbin/unwind/libunbound/util/storage/lookup3.c
602
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
sbin/unwind/libunbound/util/storage/lookup3.c
686
const uint16_t *k = (const uint16_t *)key; /* read 16-bit chunks */
sbin/unwind/libunbound/util/storage/lookup3.c
743
const uint8_t *k = (const uint8_t *)key;
sbin/unwind/libunbound/util/storage/lookup3.c
821
uint32_t hashbig( const void *key, size_t length, uint32_t initval)
sbin/unwind/libunbound/util/storage/lookup3.c
829
u.ptr = key;
sbin/unwind/libunbound/util/storage/lookup3.c
831
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
sbin/unwind/libunbound/util/storage/lookup3.c
915
const uint8_t *k = (const uint8_t *)key;
sbin/unwind/libunbound/util/storage/lruhash.c
111
(*table->delkeyfunc)(p->key, table->cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.c
210
table->space_used -= table->sizefunc(d->key, d->data);
sbin/unwind/libunbound/util/storage/lruhash.c
212
(*table->markdelfunc)(d->key);
sbin/unwind/libunbound/util/storage/lruhash.c
220
struct lruhash_bin* bin, hashvalue_type hash, void* key, size_t* collisions)
sbin/unwind/libunbound/util/storage/lruhash.c
225
if(p->hash == hash && table->compfunc(p->key, key) == 0)
sbin/unwind/libunbound/util/storage/lruhash.c
317
need_size = table->sizefunc(entry->key, data);
sbin/unwind/libunbound/util/storage/lruhash.c
326
if(!(found=bin_find_entry(table, bin, hash, entry->key, &collisions))) {
sbin/unwind/libunbound/util/storage/lruhash.c
338
(*table->sizefunc)(found->key, found->data);
sbin/unwind/libunbound/util/storage/lruhash.c
339
(*table->delkeyfunc)(entry->key, cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.c
357
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.c
364
lruhash_lookup(struct lruhash* table, hashvalue_type hash, void* key, int wr)
sbin/unwind/libunbound/util/storage/lruhash.c
373
if((entry=bin_find_entry(table, bin, hash, key, NULL)))
sbin/unwind/libunbound/util/storage/lruhash.c
386
lruhash_remove(struct lruhash* table, hashvalue_type hash, void* key)
sbin/unwind/libunbound/util/storage/lruhash.c
400
if((entry=bin_find_entry(table, bin, hash, key, NULL))) {
sbin/unwind/libunbound/util/storage/lruhash.c
409
table->space_used -= (*table->sizefunc)(entry->key, entry->data);
sbin/unwind/libunbound/util/storage/lruhash.c
412
(*table->markdelfunc)(entry->key);
sbin/unwind/libunbound/util/storage/lruhash.c
418
(*table->delkeyfunc)(entry->key, table->cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.c
435
(*table->markdelfunc)(p->key);
sbin/unwind/libunbound/util/storage/lruhash.c
437
(*table->delkeyfunc)(p->key, table->cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.c
559
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.c
589
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.c
660
need_size = table->sizefunc(entry->key, data);
sbin/unwind/libunbound/util/storage/lruhash.c
669
if ((found = bin_find_entry(table, bin, hash, entry->key, &collisions)) != NULL) {
sbin/unwind/libunbound/util/storage/lruhash.c
698
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
sbin/unwind/libunbound/util/storage/lruhash.h
222
void* key;
sbin/unwind/libunbound/util/storage/lruhash.h
291
hashvalue_type hash, void* key, int wr);
sbin/unwind/libunbound/util/storage/lruhash.h
369
void lruhash_remove(struct lruhash* table, hashvalue_type hash, void* key);
sbin/unwind/libunbound/util/storage/lruhash.h
387
struct lruhash_bin* bin, hashvalue_type hash, void* key, size_t* collisions);
sbin/unwind/libunbound/util/storage/slabhash.c
123
hashvalue_type hash, void* key, int wr)
sbin/unwind/libunbound/util/storage/slabhash.c
125
return lruhash_lookup(sl->array[slab_idx(sl, hash)], hash, key, wr);
sbin/unwind/libunbound/util/storage/slabhash.c
128
void slabhash_remove(struct slabhash* sl, hashvalue_type hash, void* key)
sbin/unwind/libunbound/util/storage/slabhash.c
130
lruhash_remove(sl->array[slab_idx(sl, hash)], hash, key);
sbin/unwind/libunbound/util/storage/slabhash.c
198
size_t test_slabhash_sizefunc(void* ATTR_UNUSED(key), void* ATTR_UNUSED(data))
sbin/unwind/libunbound/util/storage/slabhash.c
215
void test_slabhash_delkey(void* key, void* ATTR_UNUSED(arg))
sbin/unwind/libunbound/util/storage/slabhash.c
217
delkey((struct slabhash_testkey*)key);
sbin/unwind/libunbound/util/storage/slabhash.h
129
hashvalue_type hash, void* key, int wr);
sbin/unwind/libunbound/util/storage/slabhash.h
138
void slabhash_remove(struct slabhash* table, hashvalue_type hash, void* key);
sbin/unwind/libunbound/util/winsock_event.c
472
ev->node.key = ev;
sbin/unwind/libunbound/validator/autotrust.c
2038
return ((struct trust_anchor*)t->key)->autr->next_probe_time;
sbin/unwind/libunbound/validator/autotrust.c
2081
struct trust_anchor key, *tp2;
sbin/unwind/libunbound/validator/autotrust.c
2084
key.node.key = &key;
sbin/unwind/libunbound/validator/autotrust.c
2085
key.name = dnskey_rrset->rk.dname;
sbin/unwind/libunbound/validator/autotrust.c
2086
key.namelen = dnskey_rrset->rk.dname_len;
sbin/unwind/libunbound/validator/autotrust.c
2087
key.namelabs = dname_count_labels(key.name);
sbin/unwind/libunbound/validator/autotrust.c
2088
key.dclass = tp->dclass;
sbin/unwind/libunbound/validator/autotrust.c
2093
tp2 = (struct trust_anchor*)rbtree_search(env->anchors->tree, &key);
sbin/unwind/libunbound/validator/autotrust.c
2125
struct trust_anchor key;
sbin/unwind/libunbound/validator/autotrust.c
2134
memset(&key, 0, sizeof(key));
sbin/unwind/libunbound/validator/autotrust.c
2136
key.autr = &pd;
sbin/unwind/libunbound/validator/autotrust.c
2137
key.node.key = &key;
sbin/unwind/libunbound/validator/autotrust.c
2138
pd.pnode.key = &key;
sbin/unwind/libunbound/validator/autotrust.c
2140
key.name = dnskey_rrset->rk.dname;
sbin/unwind/libunbound/validator/autotrust.c
2141
key.namelen = tp->namelen;
sbin/unwind/libunbound/validator/autotrust.c
2142
key.namelabs = tp->namelabs;
sbin/unwind/libunbound/validator/autotrust.c
2143
key.dclass = tp->dclass;
sbin/unwind/libunbound/validator/autotrust.c
2150
del_tp = (struct trust_anchor*)rbtree_delete(env->anchors->tree, &key);
sbin/unwind/libunbound/validator/autotrust.c
2152
(void)rbtree_delete(&env->anchors->autr->probe, &key);
sbin/unwind/libunbound/validator/autotrust.c
2443
tp = (struct trust_anchor*)el->key;
sbin/unwind/libunbound/validator/autotrust.c
344
tp->node.key = tp;
sbin/unwind/libunbound/validator/autotrust.c
352
tp->autr->pnode.key = tp;
sbin/unwind/libunbound/validator/val_anchor.c
1140
struct trust_anchor key;
sbin/unwind/libunbound/validator/val_anchor.c
1143
key.node.key = &key;
sbin/unwind/libunbound/validator/val_anchor.c
1144
key.name = qname;
sbin/unwind/libunbound/validator/val_anchor.c
1145
key.namelabs = dname_count_labels(qname);
sbin/unwind/libunbound/validator/val_anchor.c
1146
key.namelen = qname_len;
sbin/unwind/libunbound/validator/val_anchor.c
1147
key.dclass = qclass;
sbin/unwind/libunbound/validator/val_anchor.c
1149
if(rbtree_find_less_equal(anchors->tree, &key, &res)) {
sbin/unwind/libunbound/validator/val_anchor.c
1161
(void)dname_lab_cmp(result->name, result->namelabs, key.name,
sbin/unwind/libunbound/validator/val_anchor.c
1162
key.namelabs, &m);
sbin/unwind/libunbound/validator/val_anchor.c
1229
struct trust_anchor key;
sbin/unwind/libunbound/validator/val_anchor.c
1230
key.node.key = &key;
sbin/unwind/libunbound/validator/val_anchor.c
1231
key.name = nm;
sbin/unwind/libunbound/validator/val_anchor.c
1232
key.namelabs = dname_count_size_labels(nm, &key.namelen);
sbin/unwind/libunbound/validator/val_anchor.c
1233
key.dclass = c;
sbin/unwind/libunbound/validator/val_anchor.c
1235
if(rbtree_search(anchors->tree, &key)) {
sbin/unwind/libunbound/validator/val_anchor.c
1240
if(!anchor_new_ta(anchors, nm, key.namelabs, key.namelen, c, 0)) {
sbin/unwind/libunbound/validator/val_anchor.c
1255
struct trust_anchor key;
sbin/unwind/libunbound/validator/val_anchor.c
1257
key.node.key = &key;
sbin/unwind/libunbound/validator/val_anchor.c
1258
key.name = nm;
sbin/unwind/libunbound/validator/val_anchor.c
1259
key.namelabs = dname_count_size_labels(nm, &key.namelen);
sbin/unwind/libunbound/validator/val_anchor.c
1260
key.dclass = c;
sbin/unwind/libunbound/validator/val_anchor.c
1262
if(!(ta=(struct trust_anchor*)rbtree_search(anchors->tree, &key))) {
sbin/unwind/libunbound/validator/val_anchor.c
200
struct trust_anchor key;
sbin/unwind/libunbound/validator/val_anchor.c
203
key.node.key = &key;
sbin/unwind/libunbound/validator/val_anchor.c
204
key.name = name;
sbin/unwind/libunbound/validator/val_anchor.c
205
key.namelabs = namelabs;
sbin/unwind/libunbound/validator/val_anchor.c
206
key.namelen = namelen;
sbin/unwind/libunbound/validator/val_anchor.c
207
key.dclass = dclass;
sbin/unwind/libunbound/validator/val_anchor.c
209
n = rbtree_search(anchors->tree, &key);
sbin/unwind/libunbound/validator/val_anchor.c
211
lock_basic_lock(&((struct trust_anchor*)n->key)->lock);
sbin/unwind/libunbound/validator/val_anchor.c
216
return (struct trust_anchor*)n->key;
sbin/unwind/libunbound/validator/val_anchor.c
232
ta->node.key = ta;
sbin/unwind/libunbound/validator/val_kcache.c
111
lookfor.entry.key = &lookfor;
sbin/unwind/libunbound/validator/val_kcache.c
119
return (struct key_entry_key*)e->key;
sbin/unwind/libunbound/validator/val_kcache.c
161
lookfor.entry.key = &lookfor;
sbin/unwind/libunbound/validator/val_kentry.c
120
newk->entry.key = newk;
sbin/unwind/libunbound/validator/val_kentry.c
169
newk->entry.key = newk;
sbin/unwind/libunbound/validator/val_kentry.c
267
(*k)->entry.key = *k;
sbin/unwind/libunbound/validator/val_kentry.c
375
rrk->entry.key = rrk;
sbin/unwind/libunbound/validator/val_kentry.c
52
key_entry_sizefunc(void* key, void* data)
sbin/unwind/libunbound/validator/val_kentry.c
54
struct key_entry_key* kk = (struct key_entry_key*)key;
sbin/unwind/libunbound/validator/val_kentry.c
81
key_entry_delkeyfunc(void* key, void* ATTR_UNUSED(userarg))
sbin/unwind/libunbound/validator/val_kentry.c
83
struct key_entry_key* kk = (struct key_entry_key*)key;
sbin/unwind/libunbound/validator/val_kentry.c
84
if(!key)
sbin/unwind/libunbound/validator/val_kentry.h
101
void key_entry_delkeyfunc(void* key, void* userarg);
sbin/unwind/libunbound/validator/val_kentry.h
95
size_t key_entry_sizefunc(void* key, void* data);
sbin/unwind/libunbound/validator/val_neg.c
285
lookfor.node.key = &lookfor;
sbin/unwind/libunbound/validator/val_neg.c
292
rbtree_search(&neg->tree, lookfor.node.key);
sbin/unwind/libunbound/validator/val_neg.c
309
lookfor.node.key = &lookfor;
sbin/unwind/libunbound/validator/val_neg.c
315
rbtree_search(&zone->tree, lookfor.node.key);
sbin/unwind/libunbound/validator/val_neg.c
373
struct val_neg_zone key;
sbin/unwind/libunbound/validator/val_neg.c
376
key.node.key = &key;
sbin/unwind/libunbound/validator/val_neg.c
377
key.name = nm;
sbin/unwind/libunbound/validator/val_neg.c
378
key.len = nm_len;
sbin/unwind/libunbound/validator/val_neg.c
379
key.labs = labs;
sbin/unwind/libunbound/validator/val_neg.c
380
key.dclass = qclass;
sbin/unwind/libunbound/validator/val_neg.c
381
if(rbtree_find_less_equal(&neg->tree, &key, &res)) {
sbin/unwind/libunbound/validator/val_neg.c
391
(void)dname_lab_cmp(result->name, result->labs, key.name,
sbin/unwind/libunbound/validator/val_neg.c
392
key.labs, &m);
sbin/unwind/libunbound/validator/val_neg.c
413
struct val_neg_data key;
sbin/unwind/libunbound/validator/val_neg.c
416
key.node.key = &key;
sbin/unwind/libunbound/validator/val_neg.c
417
key.name = nm;
sbin/unwind/libunbound/validator/val_neg.c
418
key.len = nm_len;
sbin/unwind/libunbound/validator/val_neg.c
419
key.labs = labs;
sbin/unwind/libunbound/validator/val_neg.c
420
if(rbtree_find_less_equal(&zone->tree, &key, &res)) {
sbin/unwind/libunbound/validator/val_neg.c
430
(void)dname_lab_cmp(result->name, result->labs, key.name,
sbin/unwind/libunbound/validator/val_neg.c
431
key.labs, &m);
sbin/unwind/libunbound/validator/val_neg.c
457
zone->node.key = zone;
sbin/unwind/libunbound/validator/val_neg.c
610
el->node.key = el;
sbin/unwind/libunbound/validator/val_neg.c
952
struct val_neg_data key;
sbin/unwind/libunbound/validator/val_neg.c
954
key.node.key = &key;
sbin/unwind/libunbound/validator/val_neg.c
955
key.name = qname;
sbin/unwind/libunbound/validator/val_neg.c
956
key.len = len;
sbin/unwind/libunbound/validator/val_neg.c
957
key.labs = labs;
sbin/unwind/libunbound/validator/val_neg.c
958
if(rbtree_find_less_equal(&zone->tree, &key, &r)) {
sbin/unwind/libunbound/validator/val_nsec3.c
666
looki.node.key = &looki;
sbin/unwind/libunbound/validator/val_nsec3.c
680
c->node.key = c;
sbin/unwind/libunbound/validator/val_secalgo.c
1043
SECKEYPublicKey* key;
sbin/unwind/libunbound/validator/val_secalgo.c
1049
key = PORT_ArenaZNew(arena, SECKEYPublicKey);
sbin/unwind/libunbound/validator/val_secalgo.c
1050
if(!key) {
sbin/unwind/libunbound/validator/val_secalgo.c
1055
key->arena = arena;
sbin/unwind/libunbound/validator/val_secalgo.c
1056
key->keyType = ktype;
sbin/unwind/libunbound/validator/val_secalgo.c
1057
key->pkcs11Slot = NULL;
sbin/unwind/libunbound/validator/val_secalgo.c
1058
key->pkcs11ID = CK_INVALID_HANDLE;
sbin/unwind/libunbound/validator/val_secalgo.c
1059
return key;
sbin/unwind/libunbound/validator/val_secalgo.c
1062
static SECKEYPublicKey* nss_buf2ecdsa(unsigned char* key, size_t len, int algo)
sbin/unwind/libunbound/validator/val_secalgo.c
1089
memmove(buf+1, key, len);
sbin/unwind/libunbound/validator/val_secalgo.c
1117
static SECKEYPublicKey* nss_buf2dsa(unsigned char* key, size_t len)
sbin/unwind/libunbound/validator/val_secalgo.c
1130
T = (uint8_t)key[0];
sbin/unwind/libunbound/validator/val_secalgo.c
1140
Q.data = key+offset;
sbin/unwind/libunbound/validator/val_secalgo.c
1144
P.data = key+offset;
sbin/unwind/libunbound/validator/val_secalgo.c
1148
G.data = key+offset;
sbin/unwind/libunbound/validator/val_secalgo.c
1152
Y.data = key+offset;
sbin/unwind/libunbound/validator/val_secalgo.c
1179
static SECKEYPublicKey* nss_buf2rsa(unsigned char* key, size_t len)
sbin/unwind/libunbound/validator/val_secalgo.c
1189
if(key[0] == 0) {
sbin/unwind/libunbound/validator/val_secalgo.c
1193
memmove(&int16, key+1, 2);
sbin/unwind/libunbound/validator/val_secalgo.c
1197
exp = key[0];
sbin/unwind/libunbound/validator/val_secalgo.c
1205
exponent.data = key+offset;
sbin/unwind/libunbound/validator/val_secalgo.c
1208
modulus.data = key+offset;
sbin/unwind/libunbound/validator/val_secalgo.c
1239
unsigned char* key, size_t keylen, unsigned char** prefix,
sbin/unwind/libunbound/validator/val_secalgo.c
1267
*pubkey = nss_buf2dsa(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
1286
*pubkey = nss_buf2rsa(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
1323
*pubkey = nss_buf2rsa(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
1335
*pubkey = nss_buf2ecdsa(key, keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
1345
*pubkey = nss_buf2ecdsa(key, keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
1379
unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
1395
if(!nss_setup_key_digest(algo, &pubkey, &htype, key, keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
1756
unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
sbin/unwind/libunbound/validator/val_secalgo.c
1770
if(key[0] != sigblock[0])
sbin/unwind/libunbound/validator/val_secalgo.c
1798
key_t_value = key[0];
sbin/unwind/libunbound/validator/val_secalgo.c
1820
nettle_mpz_set_str_256_u(pubkey.q, 20, key+offset);
sbin/unwind/libunbound/validator/val_secalgo.c
1822
nettle_mpz_set_str_256_u(pubkey.p, (64 + key_t_value*8), key+offset);
sbin/unwind/libunbound/validator/val_secalgo.c
1824
nettle_mpz_set_str_256_u(pubkey.g, (64 + key_t_value*8), key+offset);
sbin/unwind/libunbound/validator/val_secalgo.c
1826
nettle_mpz_set_str_256_u(pubkey.y, (64 + key_t_value*8), key+offset);
sbin/unwind/libunbound/validator/val_secalgo.c
1845
unsigned int sigblock_len, uint8_t* key, unsigned int keylen)
sbin/unwind/libunbound/validator/val_secalgo.c
1857
if (key[0] != 0) {
sbin/unwind/libunbound/validator/val_secalgo.c
1859
exp_len = key[0];
sbin/unwind/libunbound/validator/val_secalgo.c
1866
exp_len = READ_UINT16(key+1);
sbin/unwind/libunbound/validator/val_secalgo.c
1878
nettle_mpz_set_str_256_u(pubkey.e, exp_len, &key[exp_offset]);
sbin/unwind/libunbound/validator/val_secalgo.c
1879
nettle_mpz_set_str_256_u(pubkey.n, pubkey.size, &key[mod_offset]);
sbin/unwind/libunbound/validator/val_secalgo.c
1925
unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
sbin/unwind/libunbound/validator/val_secalgo.c
1944
nettle_mpz_init_set_str_256_u(x, SHA256_DIGEST_SIZE, key);
sbin/unwind/libunbound/validator/val_secalgo.c
1945
nettle_mpz_init_set_str_256_u(y, SHA256_DIGEST_SIZE, key+SHA256_DIGEST_SIZE);
sbin/unwind/libunbound/validator/val_secalgo.c
1962
nettle_mpz_init_set_str_256_u(x, SHA384_DIGEST_SIZE, key);
sbin/unwind/libunbound/validator/val_secalgo.c
1963
nettle_mpz_init_set_str_256_u(y, SHA384_DIGEST_SIZE, key+SHA384_DIGEST_SIZE);
sbin/unwind/libunbound/validator/val_secalgo.c
1991
unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
sbin/unwind/libunbound/validator/val_secalgo.c
2002
res = ed25519_sha512_verify((uint8_t*)key, sldns_buffer_limit(buf),
sbin/unwind/libunbound/validator/val_secalgo.c
2027
unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
2050
*reason = _verify_nettle_dsa(buf, sigblock, sigblock_len, key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
2076
sigblock_len, key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
2090
sigblock_len, key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
2099
key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
549
unsigned char* key, size_t keylen)
sbin/unwind/libunbound/validator/val_secalgo.c
555
*evp_key = sldns_key_dsa2pkey_raw(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
580
*evp_key = sldns_key_rsa2pkey_raw(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
606
*evp_key = sldns_key_rsa2pkey_raw(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
616
*evp_key = sldns_gost2pkey_raw(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
632
*evp_key = sldns_ecdsa2pkey_raw(key, keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
646
*evp_key = sldns_ecdsa2pkey_raw(key, keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
662
*evp_key = sldns_ed255192pkey_raw(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
673
*evp_key = sldns_ed4482pkey_raw(key, keylen);
sbin/unwind/libunbound/validator/val_secalgo.c
736
unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
sbin/unwind/libunbound/validator/val_secalgo.c
753
if(!setup_key_digest(algo, &evp_key, &digest_type, key, keylen)) {
sbin/unwind/libunbound/validator/val_secalgo.h
148
unsigned char* key, unsigned int keylen, char** reason);
sbin/unwind/libunbound/validator/val_sigcrypt.c
1037
rrs[i].node.key = &rrs[i];
sbin/unwind/libunbound/validator/val_sigcrypt.c
1554
unsigned char* key; /* public key rdata field */
sbin/unwind/libunbound/validator/val_sigcrypt.c
1672
dnskey_get_pubkey(dnskey, dnskey_idx, &key, &keylen);
sbin/unwind/libunbound/validator/val_sigcrypt.c
1673
if(!key) {
sbin/unwind/libunbound/validator/val_sigcrypt.c
1680
sigblock, sigblock_len, key, keylen, reason);
sbin/unwind/libunbound/validator/val_utils.c
480
dnskey.entry.key = &dnskey;
sbin/vnconfig/vnconfig.c
140
key = getpass("Encryption key: ");
sbin/vnconfig/vnconfig.c
141
if (key == NULL || (keylen = strlen(key)) == 0)
sbin/vnconfig/vnconfig.c
144
key = get_pkcs_key(rounds, saltopt);
sbin/vnconfig/vnconfig.c
147
rv = config(file, vnd, dp, key, keylen);
sbin/vnconfig/vnconfig.c
163
char *key = NULL;
sbin/vnconfig/vnconfig.c
215
if ((key = calloc(1, BLF_MAXUTILIZED)) == NULL)
sbin/vnconfig/vnconfig.c
218
sizeof (saltbuf), key, BLF_MAXUTILIZED, rounds))
sbin/vnconfig/vnconfig.c
222
return (key);
sbin/vnconfig/vnconfig.c
281
config(char *file, char *dev, struct disklabel *dp, char *key, size_t keylen)
sbin/vnconfig/vnconfig.c
306
vndio.vnd_key = (u_char *)key;
sbin/vnconfig/vnconfig.c
326
if (key)
sbin/vnconfig/vnconfig.c
327
explicit_bzero(key, keylen);
sbin/vnconfig/vnconfig.c
73
char *key = NULL, *rounds = NULL, *saltopt = NULL;
sbin/wsconsctl/keysym.c
124
struct ksym key;
sbin/wsconsctl/keysym.c
129
key.value = k;
sbin/wsconsctl/keysym.c
130
key.enc = encoding;
sbin/wsconsctl/keysym.c
131
r = bsearch(&key, ksym_tab_by_ksym,
sbin/wsconsctl/keysym.c
135
key.enc = KEYSYM_ENC_ISO;
sbin/wsconsctl/keysym.c
136
r = bsearch(&key, ksym_tab_by_ksym,
sbin/wsconsctl/keysym.c
153
struct ksym key;
sbin/wsconsctl/keysym.c
158
key.name = n;
sbin/wsconsctl/keysym.c
159
r = bsearch(&key, ksym_tab_by_name,
sbin/wsconsctl/mousecfg.c
153
param->key = k;
sbin/wsconsctl/mousecfg.c
175
index_of(enum wsmousecfg key)
sbin/wsconsctl/mousecfg.c
180
if (key <= range[i][1] && key >= range[i][0]) {
sbin/wsconsctl/mousecfg.c
181
return (key - range[i][0] + n);
sbin/wsconsctl/mousecfg.c
197
if ((n = index_of(field->params[i].key)) >= 0)
sbin/wsconsctl/mousecfg.c
212
if ((n = index_of(field->params[i].key)) < 0)
sbin/wsconsctl/mousecfg.c
226
n = index_of(field->params[i].key);
sbin/wsconsctl/mousecfg.c
234
get_value(struct wsmouse_parameters *field, enum wsmousecfg key)
sbin/wsconsctl/mousecfg.c
238
for (i = 0; i < field->nparams && key != field->params[i].key; i++) {}
sbin/wsconsctl/mousecfg.c
244
set_value(struct wsmouse_parameters *field, enum wsmousecfg key, int value)
sbin/wsconsctl/mousecfg.c
248
for (i = 0; i < field->nparams && key != field->params[i].key; i++) {}
sbin/wsconsctl/mousecfg.c
254
get_percent(struct wsmouse_parameters *field, enum wsmousecfg key)
sbin/wsconsctl/mousecfg.c
256
return ((float) get_value(field, key) * 100 / 4096);
sbin/wsconsctl/mousecfg.c
260
set_percent(struct wsmouse_parameters *field, enum wsmousecfg key, float f)
sbin/wsconsctl/mousecfg.c
262
set_value(field, key, (int) ((f * 4096 + 50) / 100));
sbin/wsconsctl/mousecfg.c
315
&field->params[0].key, &field->params[0].value,
sbin/wsconsctl/mousecfg.c
316
&field->params[1].key, &field->params[1].value,
sbin/wsconsctl/mousecfg.c
317
&field->params[2].key, &field->params[2].value,
sbin/wsconsctl/mousecfg.c
318
&field->params[3].key, &field->params[3].value);
sbin/wsconsctl/mousecfg.c
322
if (index_of(field->params[i].key) < 0)
sbin/wsconsctl/mousecfg.c
329
&field->params[0].key, &field->params[1].key,
sbin/wsconsctl/mousecfg.c
330
&field->params[2].key, &field->params[3].key);
sbin/wsconsctl/mousecfg.c
333
if ((j = index_of(field->params[i].key)) < 0)
sbin/wsconsctl/mousecfg.c
352
field->params[i].key,
sys/arch/alpha/pci/pci_6600.c
56
#define pci_6600() { Generate ctags(1) key. }
sys/arch/alpha/pci/tsc.c
167
#define tsp() { Generate ctags(1) key. }
sys/arch/alpha/pci/tsc.c
54
#define tsc() { Generate ctags(1) key. }
sys/arch/alpha/pci/tsp_bus_mem.c
50
#define tsp_bus_mem() { Generate ctags(1) key. }
sys/arch/alpha/pci/tsp_dma.c
85
#define tsp_dma() { Generate ctags(1) key. }
sys/arch/alpha/pci/tsp_pci.c
51
#define tsp_pci() { Generate ctags(1) key. }
sys/arch/alpha/pci/tsreg.h
39
#define tsreg() { Generate ctags(1) key. }
sys/arch/alpha/pci/tsvar.h
38
#define tsvar() { Generate ctags(1) key. }
sys/arch/amd64/amd64/aesni.c
78
extern void aesni_set_key(struct aesni_session *ses, uint8_t *key, size_t len);
sys/arch/amd64/amd64/via.c
304
viac3_cbc(void *cw, void *src, void *dst, void *key, int rep,
sys/arch/amd64/amd64/via.c
310
: "b" (key), "a" (iv), "c" (rep), "d" (cw), "S" (src), "D" (dst)
sys/arch/amd64/amd64/via.c
332
u_int32_t *key;
sys/arch/amd64/amd64/via.c
344
key = ses->ses_ekey;
sys/arch/amd64/amd64/via.c
365
key = ses->ses_dkey;
sys/arch/amd64/amd64/via.c
391
viac3_cbc(&sc->op_cw, sc->op_buf, sc->op_buf, key,
sys/arch/amd64/stand/efiboot/efiboot.c
538
EFI_INPUT_KEY key;
sys/arch/amd64/stand/efiboot/efiboot.c
550
status = conin->ReadKeyStroke(conin, &key);
sys/arch/amd64/stand/efiboot/efiboot.c
551
while (status == EFI_NOT_READY || key.UnicodeChar == 0) {
sys/arch/amd64/stand/efiboot/efiboot.c
555
status = conin->ReadKeyStroke(conin, &key);
sys/arch/amd64/stand/efiboot/efiboot.c
559
lastchar = key.UnicodeChar;
sys/arch/amd64/stand/efiboot/efiboot.c
561
return (key.UnicodeChar);
sys/arch/arm64/arm64/cryptox.c
70
struct cryptox_aes_key *key);
sys/arch/arm64/arm64/cryptox.c
72
struct cryptox_aes_key *key);
sys/arch/arm64/arm64/cryptox.c
74
const struct cryptox_aes_key *key);
sys/arch/arm64/arm64/cryptox.c
76
const struct cryptox_aes_key *key);
sys/arch/arm64/arm64/cryptox.c
78
const struct cryptox_aes_key *key, uint8_t *ivec, const int enc);
sys/arch/arm64/arm64/cryptox.c
80
size_t len, const struct cryptox_aes_key *key,
sys/arch/arm64/dev/aplsmc.c
328
SMC_KEY(aplsmc_sensors[i].key), 0);
sys/arch/arm64/dev/aplsmc.c
504
aplsmc_send_cmd(struct aplsmc_softc *sc, uint16_t cmd, uint32_t key,
sys/arch/arm64/dev/aplsmc.c
511
data |= (uint64_t)key << 32;
sys/arch/arm64/dev/aplsmc.c
539
aplsmc_read_key(struct aplsmc_softc *sc, uint32_t key, void *data, size_t len)
sys/arch/arm64/dev/aplsmc.c
543
aplsmc_send_cmd(sc, SMC_READ_KEY, key, len);
sys/arch/arm64/dev/aplsmc.c
571
aplsmc_write_key(struct aplsmc_softc *sc, uint32_t key, void *data, size_t len)
sys/arch/arm64/dev/aplsmc.c
576
aplsmc_send_cmd(sc, SMC_WRITE_KEY, key, len);
sys/arch/arm64/dev/aplsmc.c
609
uint32_t key;
sys/arch/arm64/dev/aplsmc.c
614
key = SMC_KEY(sensor->key);
sys/arch/arm64/dev/aplsmc.c
619
error = aplsmc_read_key(sc, key, &ui8, sizeof(ui8));
sys/arch/arm64/dev/aplsmc.c
624
error = aplsmc_read_key(sc, key, &ui16, sizeof(ui16));
sys/arch/arm64/dev/aplsmc.c
631
error = aplsmc_read_key(sc, key, &flt, sizeof(flt));
sys/arch/arm64/dev/aplsmc.c
648
if (strcmp(sensor->key, "ACDI") == 0)
sys/arch/arm64/dev/aplsmc.c
675
if (strcmp(sensor->key, "ACDI") == 0) {
sys/arch/arm64/dev/aplsmc.c
678
} else if (strcmp(sensor->key, "B0RM") == 0)
sys/arch/arm64/dev/aplsmc.c
680
else if (strcmp(sensor->key, "B0FC") == 0)
sys/arch/arm64/dev/aplsmc.c
682
else if ((strcmp(sensor->key, "B0TE") == 0) &&
sys/arch/arm64/dev/aplsmc.c
685
else if ((strcmp(sensor->key, "B0TF") == 0) &&
sys/arch/arm64/dev/aplsmc.c
718
uint32_t key = SMC_KEY("gP\0\0");
sys/arch/arm64/dev/aplsmc.c
723
key |= (digits[(pin >> 0) & 0xf] << 0);
sys/arch/arm64/dev/aplsmc.c
724
key |= (digits[(pin >> 4) & 0xf] << 8);
sys/arch/arm64/dev/aplsmc.c
730
aplsmc_write_key(sc, key, &data, sizeof(data));
sys/arch/arm64/dev/aplsmc.c
795
uint32_t key = SMC_KEY("MBSE");
sys/arch/arm64/dev/aplsmc.c
800
aplsmc_write_key(sc, key, &rest, sizeof(rest));
sys/arch/arm64/dev/aplsmc.c
803
aplsmc_write_key(sc, key, &phra, sizeof(phra));
sys/arch/arm64/dev/aplsmc.c
810
uint32_t key = SMC_KEY("MBSE");
sys/arch/arm64/dev/aplsmc.c
816
aplsmc_write_key(sc, key, &offw, sizeof(offw));
sys/arch/arm64/dev/aplsmc.c
821
aplsmc_write_key(sc, key, &off1, sizeof(off1));
sys/arch/arm64/dev/aplsmc.c
90
const char *key;
sys/arch/arm64/stand/efiboot/efiboot.c
163
EFI_INPUT_KEY key;
sys/arch/arm64/stand/efiboot/efiboot.c
177
status = conin->ReadKeyStroke(conin, &key);
sys/arch/arm64/stand/efiboot/efiboot.c
178
while (status == EFI_NOT_READY || key.UnicodeChar == 0) {
sys/arch/arm64/stand/efiboot/efiboot.c
188
status = conin->ReadKeyStroke(conin, &key);
sys/arch/arm64/stand/efiboot/efiboot.c
192
lastchar = key.UnicodeChar;
sys/arch/arm64/stand/efiboot/efiboot.c
194
return (key.UnicodeChar);
sys/arch/armv7/exynos/crosec_kbd.c
212
int key;
sys/arch/armv7/exynos/crosec_kbd.c
215
while ((key = cros_ec_get_keystate(sc)) == -1) {
sys/arch/armv7/exynos/crosec_kbd.c
220
*data = key;
sys/arch/armv7/exynos/crosec_kbd.c
221
*type = sc->keyboard.state[key] ? WSCONS_EVENT_KEY_UP : WSCONS_EVENT_KEY_DOWN;
sys/arch/armv7/stand/efiboot/efiboot.c
146
EFI_INPUT_KEY key;
sys/arch/armv7/stand/efiboot/efiboot.c
160
status = conin->ReadKeyStroke(conin, &key);
sys/arch/armv7/stand/efiboot/efiboot.c
161
while (status == EFI_NOT_READY || key.UnicodeChar == 0) {
sys/arch/armv7/stand/efiboot/efiboot.c
171
status = conin->ReadKeyStroke(conin, &key);
sys/arch/armv7/stand/efiboot/efiboot.c
175
lastchar = key.UnicodeChar;
sys/arch/armv7/stand/efiboot/efiboot.c
177
return (key.UnicodeChar);
sys/arch/i386/i386/via.c
305
viac3_cbc(void *cw, void *src, void *dst, void *key, int rep,
sys/arch/i386/i386/via.c
316
: "a" (iv), "b" (key), "c" (rep), "d" (cw), "S" (src), "D" (dst)
sys/arch/i386/i386/via.c
340
u_int32_t *key;
sys/arch/i386/i386/via.c
352
key = ses->ses_ekey;
sys/arch/i386/i386/via.c
373
key = ses->ses_dkey;
sys/arch/i386/i386/via.c
399
viac3_cbc(&sc->op_cw, sc->op_buf, sc->op_buf, key,
sys/arch/i386/pci/glxsb.c
552
uint32_t pdst, void *key, int len, void *iv)
sys/arch/i386/pci/glxsb.c
580
bus_space_write_region_4(sc->sc_iot, sc->sc_ioh, SB_WKEY, key, 4);
sys/arch/luna88k/dev/lunaws.c
308
int key;
sys/arch/luna88k/dev/lunaws.c
310
omkbd_decode(v, data, &type, &key);
sys/arch/luna88k/dev/lunaws.c
317
c = omkbd_raw[key];
sys/arch/luna88k/dev/lunaws.c
333
wskbd_input(sc->sc_wskbddev, type, key);
sys/arch/luna88k/stand/boot/scsireg.h
242
key: 4;
sys/arch/luna88k/stand/boot/sd.c
148
if (sp->class == 7 && sp->key == 6)
sys/arch/macppc/dev/akbd_machdep.c
77
int key, press, val;
sys/arch/macppc/dev/akbd_machdep.c
92
key = adb_polledkey;
sys/arch/macppc/dev/akbd_machdep.c
93
press = ADBK_PRESS(key);
sys/arch/macppc/dev/akbd_machdep.c
94
val = ADBK_KEYVAL(key);
sys/arch/macppc/dev/dbdma.h
118
#define DBDMA_BUILD_CMD(d, cmd, key, interrupt, wait, branch) { \
sys/arch/macppc/dev/dbdma.h
120
((cmd) << 12) | ((key) << 8) | \
sys/arch/macppc/dev/dbdma.h
125
#define DBDMA_BUILD(d, cmd, key, count, address, interrupt, wait, branch) { \
sys/arch/macppc/dev/dbdma.h
132
((cmd) << 12) | ((key) << 8) | \
sys/arch/riscv64/stand/efiboot/efiboot.c
150
EFI_INPUT_KEY key;
sys/arch/riscv64/stand/efiboot/efiboot.c
164
status = conin->ReadKeyStroke(conin, &key);
sys/arch/riscv64/stand/efiboot/efiboot.c
165
while (status == EFI_NOT_READY || key.UnicodeChar == 0) {
sys/arch/riscv64/stand/efiboot/efiboot.c
175
status = conin->ReadKeyStroke(conin, &key);
sys/arch/riscv64/stand/efiboot/efiboot.c
179
lastchar = key.UnicodeChar;
sys/arch/riscv64/stand/efiboot/efiboot.c
181
return (key.UnicodeChar);
sys/crypto/aes.c
334
aes_keysched_base(uint32_t *skey, const void *key, size_t key_len)
sys/crypto/aes.c
356
tmp = dec32le((const unsigned char *)key + (i << 2));
sys/crypto/aes.c
384
aes_ct_keysched(uint32_t *comp_skey, const void *key, size_t key_len)
sys/crypto/aes.c
389
num_rounds = aes_keysched_base(skey, key, key_len);
sys/crypto/aes.c
661
AES_Setkey(AES_CTX *ctx, const uint8_t *key, int len)
sys/crypto/aes.c
663
ctx->num_rounds = aes_ct_keysched(ctx->sk, key, len);
sys/crypto/aes.c
769
AES_KeySetup_Encrypt(uint32_t *skey, const uint8_t *key, int len)
sys/crypto/aes.c
774
r = aes_keysched_base(tkey, key, len);
sys/crypto/aes.c
840
AES_KeySetup_Decrypt(uint32_t *skey, const uint8_t *key, int len)
sys/crypto/aes.c
849
r = AES_KeySetup_Encrypt(tkey, key, len);
sys/crypto/arc4.c
30
rc4_keysetup(struct rc4_ctx *ctx, u_char *key, u_int32_t klen)
sys/crypto/arc4.c
39
y = (key[x] + ctx->state[i] + y) & (RC4STATE - 1);
sys/crypto/blake2s.c
202
void blake2s_hmac(uint8_t *out, const uint8_t *in, const uint8_t *key, const size_t outlen,
sys/crypto/blake2s.c
212
blake2s_update(&state, key, keylen);
sys/crypto/blake2s.c
215
memcpy(x_key, key, keylen);
sys/crypto/blake2s.c
82
const void *key, const size_t keylen)
sys/crypto/blake2s.c
87
!key || !keylen || keylen > BLAKE2S_KEY_SIZE));
sys/crypto/blake2s.c
91
memcpy(block, key, keylen);
sys/crypto/blake2s.h
41
const void *key, const size_t keylen);
sys/crypto/blake2s.h
46
uint8_t *out, const uint8_t *in, const uint8_t *key,
sys/crypto/blake2s.h
53
(key != NULL || keylen == 0) && keylen <= BLAKE2S_KEY_SIZE);
sys/crypto/blake2s.h
56
blake2s_init_key(&state, outlen, key, keylen);
sys/crypto/blake2s.h
64
void blake2s_hmac(uint8_t *out, const uint8_t *in, const uint8_t *key,
sys/crypto/blf.c
406
Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes)
sys/crypto/blf.c
417
temp = Blowfish_stream2word(key, keybytes, &j);
sys/crypto/blf.c
444
const u_int8_t *key, u_int16_t keybytes)
sys/crypto/blf.c
455
temp = Blowfish_stream2word(key, keybytes, &j);
sys/crypto/cast.c
134
cast_setkey(cast_key *key, u_int8_t *rawkey, int keybytes)
sys/crypto/cast.c
140
key->rounds = (keybytes <= 10 ? 12 : 16);
sys/crypto/cast.c
201
key->xkey[i+0] = cast_sbox5[U_INT8_Ta(t[2])] ^
sys/crypto/cast.c
205
key->xkey[i+1] = cast_sbox5[U_INT8_Tc(t[2])] ^
sys/crypto/cast.c
209
key->xkey[i+2] = cast_sbox5[U_INT8_Ta(t[3])] ^
sys/crypto/cast.c
213
key->xkey[i+3] = cast_sbox5[U_INT8_Tc(t[3])] ^
sys/crypto/cast.c
220
key->xkey[i+0] = cast_sbox5[U_INT8_Td(t[0])] ^
sys/crypto/cast.c
224
key->xkey[i+1] = cast_sbox5[U_INT8_Tb(t[0])] ^
sys/crypto/cast.c
228
key->xkey[i+2] = cast_sbox5[U_INT8_Td(t[1])] ^
sys/crypto/cast.c
232
key->xkey[i+3] = cast_sbox5[U_INT8_Tb(t[1])] ^
sys/crypto/cast.c
240
key->xkey[i+0] ^= cast_sbox5[U_INT8_Tc(z[0])];
sys/crypto/cast.c
241
key->xkey[i+1] ^= cast_sbox6[U_INT8_Tc(z[1])];
sys/crypto/cast.c
242
key->xkey[i+2] ^= cast_sbox7[U_INT8_Tb(z[2])];
sys/crypto/cast.c
243
key->xkey[i+3] ^= cast_sbox8[U_INT8_Ta(z[3])];
sys/crypto/cast.c
246
key->xkey[i+0] ^= cast_sbox5[U_INT8_Ta(x[2])];
sys/crypto/cast.c
247
key->xkey[i+1] ^= cast_sbox6[U_INT8_Tb(x[3])];
sys/crypto/cast.c
248
key->xkey[i+2] ^= cast_sbox7[U_INT8_Td(x[0])];
sys/crypto/cast.c
249
key->xkey[i+3] ^= cast_sbox8[U_INT8_Td(x[1])];
sys/crypto/cast.c
252
key->xkey[i+0] ^= cast_sbox5[U_INT8_Tb(z[2])];
sys/crypto/cast.c
253
key->xkey[i+1] ^= cast_sbox6[U_INT8_Ta(z[3])];
sys/crypto/cast.c
254
key->xkey[i+2] ^= cast_sbox7[U_INT8_Tc(z[0])];
sys/crypto/cast.c
255
key->xkey[i+3] ^= cast_sbox8[U_INT8_Tc(z[1])];
sys/crypto/cast.c
258
key->xkey[i+0] ^= cast_sbox5[U_INT8_Td(x[0])];
sys/crypto/cast.c
259
key->xkey[i+1] ^= cast_sbox6[U_INT8_Td(x[1])];
sys/crypto/cast.c
26
t = ROL(key->xkey[i] + r, key->xkey[i+16]); \
sys/crypto/cast.c
260
key->xkey[i+2] ^= cast_sbox7[U_INT8_Ta(x[2])];
sys/crypto/cast.c
261
key->xkey[i+3] ^= cast_sbox8[U_INT8_Tb(x[3])];
sys/crypto/cast.c
265
key->xkey[i+0] &= 31;
sys/crypto/cast.c
266
key->xkey[i+1] &= 31;
sys/crypto/cast.c
267
key->xkey[i+2] &= 31;
sys/crypto/cast.c
268
key->xkey[i+3] &= 31;
sys/crypto/cast.c
30
t = ROL(key->xkey[i] ^ r, key->xkey[i+16]); \
sys/crypto/cast.c
34
t = ROL(key->xkey[i] - r, key->xkey[i+16]); \
sys/crypto/cast.c
42
cast_encrypt(cast_key *key, u_int8_t *inblock, u_int8_t *outblock)
sys/crypto/cast.c
65
if (key->rounds > 12) {
sys/crypto/cast.c
88
cast_decrypt(cast_key *key, u_int8_t *inblock, u_int8_t *outblock)
sys/crypto/cast.c
99
if (key->rounds > 12) {
sys/crypto/cast.h
18
void cast_setkey(cast_key * key, u_int8_t * rawkey, int keybytes);
sys/crypto/cast.h
19
void cast_encrypt(cast_key * key, u_int8_t * inblock, u_int8_t * outblock);
sys/crypto/cast.h
20
void cast_decrypt(cast_key * key, u_int8_t * inblock, u_int8_t * outblock);
sys/crypto/chacha_private.h
56
hchacha20(u32 derived_key[8], const u8 nonce[16], const u8 key[32])
sys/crypto/chacha_private.h
64
U8TO32_LITTLE(key + 0),
sys/crypto/chacha_private.h
65
U8TO32_LITTLE(key + 4),
sys/crypto/chacha_private.h
66
U8TO32_LITTLE(key + 8),
sys/crypto/chacha_private.h
67
U8TO32_LITTLE(key + 12),
sys/crypto/chacha_private.h
68
U8TO32_LITTLE(key + 16),
sys/crypto/chacha_private.h
69
U8TO32_LITTLE(key + 20),
sys/crypto/chacha_private.h
70
U8TO32_LITTLE(key + 24),
sys/crypto/chacha_private.h
71
U8TO32_LITTLE(key + 28),
sys/crypto/chachapoly.c
126
const uint8_t key[CHACHA20POLY1305_KEY_SIZE]
sys/crypto/chachapoly.c
136
chacha_keysetup(&chacha_ctx, key, CHACHA20POLY1305_KEY_SIZE * 8);
sys/crypto/chachapoly.c
167
const uint8_t key[CHACHA20POLY1305_KEY_SIZE]
sys/crypto/chachapoly.c
183
chacha_keysetup(&chacha_ctx, key, CHACHA20POLY1305_KEY_SIZE * 8);
sys/crypto/chachapoly.c
219
const uint8_t key[CHACHA20POLY1305_KEY_SIZE]
sys/crypto/chachapoly.c
227
hchacha20(derived_key, nonce, key);
sys/crypto/chachapoly.c
245
const uint8_t key[CHACHA20POLY1305_KEY_SIZE]
sys/crypto/chachapoly.c
253
hchacha20(derived_key, nonce, key);
sys/crypto/chachapoly.c
27
chacha20_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/chachapoly.c
36
memcpy(ctx->nonce + CHACHA20_CTR, key + CHACHA20_KEYSIZE,
sys/crypto/chachapoly.c
38
chacha_keysetup((chacha_ctx *)&ctx->block, key, CHACHA20_KEYSIZE * 8);
sys/crypto/chachapoly.c
43
chacha20_reinit(caddr_t key, u_int8_t *iv)
sys/crypto/chachapoly.c
45
struct chacha20_ctx *ctx = (struct chacha20_ctx *)key;
sys/crypto/chachapoly.c
51
chacha20_crypt(caddr_t key, u_int8_t *data)
sys/crypto/chachapoly.c
53
struct chacha20_ctx *ctx = (struct chacha20_ctx *)key;
sys/crypto/chachapoly.c
68
Chacha20_Poly1305_Setkey(void *xctx, const uint8_t *key, uint16_t klen)
sys/crypto/chachapoly.c
73
memcpy(ctx->nonce + CHACHA20_CTR, key + CHACHA20_KEYSIZE,
sys/crypto/chachapoly.c
75
chacha_keysetup((chacha_ctx *)&ctx->chacha, key, CHACHA20_KEYSIZE * 8);
sys/crypto/chachapoly.c
85
chacha_encrypt_bytes((chacha_ctx *)&ctx->chacha, ctx->key, ctx->key,
sys/crypto/chachapoly.c
87
poly1305_init((poly1305_state *)&ctx->poly, ctx->key);
sys/crypto/chachapoly.h
50
uint8_t key[POLY1305_KEYLEN];
sys/crypto/cmac.c
51
AES_CMAC_SetKey(AES_CMAC_CTX *ctx, const u_int8_t key[AES_CMAC_KEY_LENGTH])
sys/crypto/cmac.c
53
AES_Setkey(&ctx->aesctx, key, 16);
sys/crypto/gmac.c
113
AES_GMAC_Setkey(void *xctx, const uint8_t *key, uint16_t klen)
sys/crypto/gmac.c
117
AES_Setkey(&ctx->K, key, klen - AESCTR_NONCESIZE);
sys/crypto/gmac.c
119
bcopy(key + klen - AESCTR_NONCESIZE, ctx->J, AESCTR_NONCESIZE);
sys/crypto/hmac.c
103
memcpy(k_ipad, ctx->key, ctx->key_len);
sys/crypto/hmac.c
128
memcpy(k_opad, ctx->key, ctx->key_len);
sys/crypto/hmac.c
141
HMAC_SHA256_Init(HMAC_SHA256_CTX *ctx, const u_int8_t *key, u_int key_len)
sys/crypto/hmac.c
148
SHA256Update(&ctx->ctx, key, key_len);
sys/crypto/hmac.c
149
SHA256Final(ctx->key, &ctx->ctx);
sys/crypto/hmac.c
152
bcopy(key, ctx->key, key_len);
sys/crypto/hmac.c
157
memcpy(k_ipad, ctx->key, ctx->key_len);
sys/crypto/hmac.c
182
memcpy(k_opad, ctx->key, ctx->key_len);
sys/crypto/hmac.c
33
HMAC_MD5_Init(HMAC_MD5_CTX *ctx, const u_int8_t *key, u_int key_len)
sys/crypto/hmac.c
40
MD5Update(&ctx->ctx, key, key_len);
sys/crypto/hmac.c
41
MD5Final(ctx->key, &ctx->ctx);
sys/crypto/hmac.c
44
bcopy(key, ctx->key, key_len);
sys/crypto/hmac.c
49
memcpy(k_ipad, ctx->key, ctx->key_len);
sys/crypto/hmac.c
74
memcpy(k_opad, ctx->key, ctx->key_len);
sys/crypto/hmac.c
87
HMAC_SHA1_Init(HMAC_SHA1_CTX *ctx, const u_int8_t *key, u_int key_len)
sys/crypto/hmac.c
94
SHA1Update(&ctx->ctx, key, key_len);
sys/crypto/hmac.c
95
SHA1Final(ctx->key, &ctx->ctx);
sys/crypto/hmac.c
98
bcopy(key, ctx->key, key_len);
sys/crypto/hmac.h
24
u_int8_t key[MD5_BLOCK_LENGTH];
sys/crypto/hmac.h
30
u_int8_t key[SHA1_BLOCK_LENGTH];
sys/crypto/hmac.h
36
u_int8_t key[SHA256_BLOCK_LENGTH];
sys/crypto/idgen.c
67
idgen32_g(u_int8_t *key, int k, u_int16_t w)
sys/crypto/idgen.c
75
g3 = idgen32_ftable[g2 ^ key[o++ & (IDGEN32_KEYLEN - 1)]] ^ g1;
sys/crypto/idgen.c
76
g4 = idgen32_ftable[g3 ^ key[o++ & (IDGEN32_KEYLEN - 1)]] ^ g2;
sys/crypto/idgen.c
77
g5 = idgen32_ftable[g4 ^ key[o++ & (IDGEN32_KEYLEN - 1)]] ^ g3;
sys/crypto/idgen.c
78
g6 = idgen32_ftable[g5 ^ key[o++ & (IDGEN32_KEYLEN - 1)]] ^ g4;
sys/crypto/michael.c
92
michael_key(const u_int8_t *key, MICHAEL_CTX *ctx)
sys/crypto/michael.c
95
GETLE32(key);
sys/crypto/michael.c
97
GETLE32(key + MICHAEL_RAW_BLOCK_LENGTH);
sys/crypto/poly1305.c
39
poly1305_init(poly1305_state *st, const unsigned char key[32])
sys/crypto/poly1305.c
42
st->r[0] = (U8TO32(&key[0])) & 0x3ffffff;
sys/crypto/poly1305.c
43
st->r[1] = (U8TO32(&key[3]) >> 2) & 0x3ffff03;
sys/crypto/poly1305.c
44
st->r[2] = (U8TO32(&key[6]) >> 4) & 0x3ffc0ff;
sys/crypto/poly1305.c
45
st->r[3] = (U8TO32(&key[9]) >> 6) & 0x3f03fff;
sys/crypto/poly1305.c
46
st->r[4] = (U8TO32(&key[12]) >> 8) & 0x00fffff;
sys/crypto/poly1305.c
56
st->pad[0] = U8TO32(&key[16]);
sys/crypto/poly1305.c
57
st->pad[1] = U8TO32(&key[20]);
sys/crypto/poly1305.c
58
st->pad[2] = U8TO32(&key[24]);
sys/crypto/poly1305.c
59
st->pad[3] = U8TO32(&key[28]);
sys/crypto/rijndael.c
1125
rijndael_set_key_enc_only(rijndael_ctx *ctx, const u_char *key, int bits)
sys/crypto/rijndael.c
1129
rounds = rijndaelKeySetupEnc(ctx->ek, key, bits);
sys/crypto/rijndael.c
1141
rijndael_set_key(rijndael_ctx *ctx, const u_char *key, int bits)
sys/crypto/rijndael.c
1145
rounds = rijndaelKeySetupEnc(ctx->ek, key, bits);
sys/crypto/rijndael.c
1148
if (rijndaelKeySetupDec(ctx->dk, key, bits) != rounds)
sys/crypto/set_key.c
108
des_is_weak_key(des_cblock (*key))
sys/crypto/set_key.c
117
if (bcmp(weak_keys[i], key, sizeof(des_cblock)) == 0)
sys/crypto/set_key.c
140
des_set_key(des_cblock (*key), des_key_schedule schedule)
sys/crypto/set_key.c
148
if (!check_parity(key))
sys/crypto/set_key.c
151
if (des_is_weak_key(key))
sys/crypto/set_key.c
156
in = (unsigned char *) key;
sys/crypto/set_key.c
61
static int check_parity(des_cblock (*key));
sys/crypto/set_key.c
66
check_parity(des_cblock (*key))
sys/crypto/set_key.c
71
if ((*key)[i] != odd_parity[(*key)[i]])
sys/crypto/siphash.c
138
SipHash(const SIPHASH_KEY *key, int rc, int rf, const void *src, size_t len)
sys/crypto/siphash.c
142
SipHash_Init(&ctx, key);
sys/crypto/siphash.c
55
SipHash_Init(SIPHASH_CTX *ctx, const SIPHASH_KEY *key)
sys/crypto/siphash.c
59
k0 = lemtoh64(&key->k0);
sys/crypto/siphash.c
60
k1 = lemtoh64(&key->k1);
sys/crypto/xform.c
312
des3_encrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
314
des_ecb3_encrypt(blk, blk, key, key + 128, key + 256, 1);
sys/crypto/xform.c
318
des3_decrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
320
des_ecb3_encrypt(blk, blk, key + 256, key + 128, key, 0);
sys/crypto/xform.c
324
des3_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/xform.c
326
if (des_set_key(key, sched) < 0 || des_set_key(key + 8, sched + 128)
sys/crypto/xform.c
327
< 0 || des_set_key(key + 16, sched + 256) < 0)
sys/crypto/xform.c
334
blf_encrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
336
blf_ecb_encrypt((blf_ctx *) key, blk, 8);
sys/crypto/xform.c
340
blf_decrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
342
blf_ecb_decrypt((blf_ctx *) key, blk, 8);
sys/crypto/xform.c
346
blf_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/xform.c
348
blf_key((blf_ctx *)sched, key, len);
sys/crypto/xform.c
354
null_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/xform.c
360
null_encrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
365
null_decrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
370
cast5_encrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
372
cast_encrypt((cast_key *) key, blk, blk);
sys/crypto/xform.c
376
cast5_decrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
378
cast_decrypt((cast_key *) key, blk, blk);
sys/crypto/xform.c
382
cast5_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/xform.c
384
cast_setkey((cast_key *)sched, key, len);
sys/crypto/xform.c
390
aes_encrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
392
AES_Encrypt((AES_CTX *)key, blk, blk);
sys/crypto/xform.c
396
aes_decrypt(caddr_t key, u_int8_t *blk)
sys/crypto/xform.c
398
AES_Decrypt((AES_CTX *)key, blk, blk);
sys/crypto/xform.c
402
aes_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/xform.c
404
return AES_Setkey((AES_CTX *)sched, key, len);
sys/crypto/xform.c
408
aes_ctr_reinit(caddr_t key, u_int8_t *iv)
sys/crypto/xform.c
412
ctx = (struct aes_ctr_ctx *)key;
sys/crypto/xform.c
420
aes_gcm_reinit(caddr_t key, u_int8_t *iv)
sys/crypto/xform.c
424
ctx = (struct aes_ctr_ctx *)key;
sys/crypto/xform.c
433
aes_ctr_crypt(caddr_t key, u_int8_t *data)
sys/crypto/xform.c
439
ctx = (struct aes_ctr_ctx *)key;
sys/crypto/xform.c
452
aes_ctr_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/xform.c
460
if (AES_Setkey(&ctx->ac_key, key, len - AESCTR_NONCESIZE) != 0)
sys/crypto/xform.c
462
bcopy(key + len - AESCTR_NONCESIZE, ctx->ac_block, AESCTR_NONCESIZE);
sys/crypto/xform.c
467
aes_xts_reinit(caddr_t key, u_int8_t *iv)
sys/crypto/xform.c
469
struct aes_xts_ctx *ctx = (struct aes_xts_ctx *)key;
sys/crypto/xform.c
517
aes_xts_encrypt(caddr_t key, u_int8_t *data)
sys/crypto/xform.c
519
aes_xts_crypt((struct aes_xts_ctx *)key, data, 1);
sys/crypto/xform.c
523
aes_xts_decrypt(caddr_t key, u_int8_t *data)
sys/crypto/xform.c
525
aes_xts_crypt((struct aes_xts_ctx *)key, data, 0);
sys/crypto/xform.c
529
aes_xts_setkey(void *sched, u_int8_t *key, int len)
sys/crypto/xform.c
538
rijndael_set_key(&ctx->key1, key, len * 4);
sys/crypto/xform.c
539
rijndael_set_key(&ctx->key2, key + (len / 2), len * 4);
sys/dev/acpi/acpisony.c
136
int val, key = 0;
sys/dev/acpi/acpisony.c
144
key = 0x100;
sys/dev/acpi/acpisony.c
148
key = 0x127;
sys/dev/acpi/acpisony.c
151
if (key) {
sys/dev/acpi/acpisony.c
152
val = acpisony_set_hotkey(sc, key, 0x200);
sys/dev/acpi/acpisony.c
159
DPRINTF(("Treat %X events, notify %X\n", key, notify));
sys/dev/acpi/acpisony.c
246
acpisony_find_offset(struct acpisony_softc *sc, int key)
sys/dev/acpi/acpisony.c
258
if (val == key) {
sys/dev/acpi/acpisony.c
268
acpisony_set_hotkey(struct acpisony_softc *sc, int key, int val)
sys/dev/acpi/acpisony.c
276
off = acpisony_find_offset(sc, key);
sys/dev/acpi/asmc.c
475
asmc_command(struct asmc_softc *sc, int cmd, const char *key, uint8_t *buf,
sys/dev/acpi/asmc.c
485
if (asmc_write(sc, ASMC_DATA, key[i]))
sys/dev/acpi/asmc.c
503
asmc_try(struct asmc_softc *sc, int cmd, const char *key, uint8_t *buf,
sys/dev/acpi/asmc.c
511
if (!(r = asmc_command(sc, cmd, key, buf, len)))
sys/dev/acpi/asmc.c
587
char key[5];
sys/dev/acpi/asmc.c
591
snprintf(key, sizeof(key), "F%dAc", idx);
sys/dev/acpi/asmc.c
592
if ((r = asmc_try(sc, ASMC_READ, key, buf, 2)))
sys/dev/acpi/asmc.c
600
snprintf(key, sizeof(key), "F%dID", idx);
sys/dev/acpi/asmc.c
601
if ((r = asmc_try(sc, ASMC_READ, key, buf, 16)))
sys/dev/acpi/asmc.c
624
char key[5];
sys/dev/acpi/asmc.c
628
snprintf(key, sizeof(key), "ALV%d", idx);
sys/dev/acpi/asmc.c
630
if ((r = asmc_try(sc, ASMC_INFO, key, buf, 6)))
sys/dev/acpi/asmc.c
635
if ((r = asmc_try(sc, ASMC_READ, key, buf, sc->sc_lightlen)))
sys/dev/acpi/asmc.c
657
char key[5];
sys/dev/acpi/asmc.c
661
snprintf(key, sizeof(key), "MO_%c", 88 + idx); /* X, Y, Z */
sys/dev/acpi/asmc.c
662
if ((r = asmc_try(sc, ASMC_READ, key, buf, 2)))
sys/dev/adb/akbd.c
504
akbd_capslockwrapper(struct akbd_softc *sc, int key)
sys/dev/adb/akbd.c
506
if (ADBK_KEYVAL(key) == ADBK_CAPSLOCK)
sys/dev/adb/akbd.c
509
if (key != 0xff)
sys/dev/adb/akbd.c
510
akbd_input(sc, key);
sys/dev/adb/akbd.c
528
akbd_input(struct akbd_softc *sc, int key)
sys/dev/adb/akbd.c
533
press = ADBK_PRESS(key);
sys/dev/adb/akbd.c
534
val = ADBK_KEYVAL(key);
sys/dev/adb/akbd.c
542
adb_polledkey = key;
sys/dev/adb/keyboard.h
40
#define ADBK_KEYVAL(key) ((key) & 0x7f)
sys/dev/adb/keyboard.h
41
#define ADBK_PRESS(key) (((key) & 0x80) == 0)
sys/dev/adb/keyboard.h
42
#define ADBK_KEYDOWN(key) (key)
sys/dev/adb/keyboard.h
43
#define ADBK_KEYUP(key) ((key) | 0x80)
sys/dev/bio.c
168
struct bio_mapping key = { .bm_cookie = (uintptr_t)cookie };
sys/dev/bio.c
170
return (RBT_FIND(bio_mappings, &bios, &key));
sys/dev/fdt/gpiokeys.c
110
struct gpiokeys_key *key;
sys/dev/fdt/gpiokeys.c
136
key = malloc(sizeof(*key), M_DEVBUF, M_WAITOK | M_ZERO);
sys/dev/fdt/gpiokeys.c
137
key->key_input_type = OF_getpropint(node, "linux,input-type",
sys/dev/fdt/gpiokeys.c
139
key->key_code = code;
sys/dev/fdt/gpiokeys.c
140
key->key_pin = malloc(gpios_len, M_DEVBUF, M_WAITOK);
sys/dev/fdt/gpiokeys.c
141
OF_getpropintarray(node, "gpios", key->key_pin, gpios_len);
sys/dev/fdt/gpiokeys.c
142
gpio_controller_config_pin(key->key_pin, GPIO_CONFIG_INPUT);
sys/dev/fdt/gpiokeys.c
144
switch (key->key_input_type) {
sys/dev/fdt/gpiokeys.c
146
switch (key->key_code) {
sys/dev/fdt/gpiokeys.c
148
strlcpy(key->key_sensor.desc, "lid open",
sys/dev/fdt/gpiokeys.c
149
sizeof(key->key_sensor.desc));
sys/dev/fdt/gpiokeys.c
150
key->key_sensor.type = SENSOR_INDICATOR;
sys/dev/fdt/gpiokeys.c
152
&key->key_sensor);
sys/dev/fdt/gpiokeys.c
153
key->key_func = gpiokeys_update_key;
sys/dev/fdt/gpiokeys.c
154
key->key_wakeup = 1;
sys/dev/fdt/gpiokeys.c
160
switch (key->key_code) {
sys/dev/fdt/gpiokeys.c
162
key->key_func = gpiokeys_power_button;
sys/dev/fdt/gpiokeys.c
174
SLIST_INSERT_HEAD(&sc->sc_keys, key, key_next);
sys/dev/fdt/gpiokeys.c
177
SLIST_FOREACH(key, &sc->sc_keys, key_next) {
sys/dev/fdt/gpiokeys.c
178
if (!key->key_func)
sys/dev/fdt/gpiokeys.c
182
int wakeup = key->key_wakeup ? IPL_WAKEUP : 0;
sys/dev/fdt/gpiokeys.c
183
key->key_ih =
sys/dev/fdt/gpiokeys.c
184
gpio_controller_intr_establish(key->key_pin,
sys/dev/fdt/gpiokeys.c
185
IPL_BIO | wakeup, NULL, gpiokeys_intr, key,
sys/dev/fdt/gpiokeys.c
189
if (key->key_wakeup && key->key_ih)
sys/dev/fdt/gpiokeys.c
192
if (key->key_ih == NULL)
sys/dev/fdt/gpiokeys.c
193
sensor_task_register(key, gpiokeys_update_key, 1);
sys/dev/fdt/gpiokeys.c
195
gpiokeys_update_key(key);
sys/dev/fdt/gpiokeys.c
212
struct gpiokeys_key *key = arg;
sys/dev/fdt/gpiokeys.c
215
val = gpio_controller_get_pin(key->key_pin);
sys/dev/fdt/gpiokeys.c
217
switch (key->key_input_type) {
sys/dev/fdt/gpiokeys.c
219
switch (key->key_code) {
sys/dev/fdt/gpiokeys.c
238
key->key_sensor.value = !val;
sys/dev/fdt/gpiokeys.c
264
struct gpiokeys_key *key = arg;
sys/dev/fdt/gpiokeys.c
267
state = gpio_controller_get_pin(key->key_pin);
sys/dev/fdt/gpiokeys.c
269
if (state != key->key_state) {
sys/dev/fdt/gpiokeys.c
273
key->key_state = state;
sys/dev/fdt/gpiokeys.c
280
struct gpiokeys_key *key = arg;
sys/dev/fdt/gpiokeys.c
282
key->key_func(key);
sys/dev/hid/hidcc.c
117
#define Y(usage, name, key, raw) { name, usage, key, raw },
sys/dev/hid/hidcc.c
119
#define Y(usage, name, key, raw) { usage, key, raw },
sys/dev/hid/hidcc.c
121
#define N(usage, name, key, raw)
sys/dev/hid/hidkbd.c
473
int key;
sys/dev/hid/hidkbd.c
509
ADDKEY(kbd->sc_var[i].key |
sys/dev/hid/hidkbd.c
517
key = kbd->sc_odata.keycode[i];
sys/dev/hid/hidkbd.c
518
if (key == 0)
sys/dev/hid/hidkbd.c
521
if (key == ud->keycode[j])
sys/dev/hid/hidkbd.c
523
DPRINTFN(3,("hidkbd_decode: relse key=0x%02x\n", key));
sys/dev/hid/hidkbd.c
524
ADDKEY(key | RELEASE);
sys/dev/hid/hidkbd.c
531
key = ud->keycode[i];
sys/dev/hid/hidkbd.c
532
if (key == 0)
sys/dev/hid/hidkbd.c
535
if (key == kbd->sc_odata.keycode[j])
sys/dev/hid/hidkbd.c
537
DPRINTFN(2,("hidkbd_decode: press key=0x%02x\n", key));
sys/dev/hid/hidkbd.c
538
ADDKEY(key | PRESS);
sys/dev/hid/hidkbd.c
564
key = ibuf[i];
sys/dev/hid/hidkbd.c
565
c = hidkbd_trtab[key & CODEMASK];
sys/dev/hid/hidkbd.c
571
if (key & RELEASE)
sys/dev/hid/hidkbd.c
585
key = ibuf[i];
sys/dev/hid/hidkbd.c
586
switch (key & CODEMASK) {
sys/dev/hid/hidkbd.c
597
key & RELEASE ? WSCONS_EVENT_KEY_UP :
sys/dev/hid/hidkbd.c
598
WSCONS_EVENT_KEY_DOWN, key & CODEMASK);
sys/dev/hid/hidkbd.c
610
key = ibuf[i];
sys/dev/hid/hidkbd.c
612
key&RELEASE ? WSCONS_EVENT_KEY_UP : WSCONS_EVENT_KEY_DOWN,
sys/dev/hid/hidkbd.c
613
key&CODEMASK);
sys/dev/hid/hidkbd.c
762
kbd->sc_var[i].key = HID_GET_USAGE(h.usage);
sys/dev/hid/hidkbdsc.h
45
u_int8_t key;
sys/dev/hil/hilkbd.c
376
int kbdtype, key;
sys/dev/hil/hilkbd.c
401
hilkbd_decode(sc, *buf++, &type, &key, kbdtype);
sys/dev/hil/hilkbd.c
402
c = hilkbd_raw[key];
sys/dev/hil/hilkbd.c
422
hilkbd_decode(sc, *buf++, &type, &key, kbdtype);
sys/dev/hil/hilkbd.c
424
wskbd_input(sc->sc_wskbddev, type, key);
sys/dev/hil/hilkbd.c
431
hilkbd_decode(struct hilkbd_softc *sc, u_int8_t data, u_int *type, int *key,
sys/dev/hil/hilkbd.c
442
*key = data >> 1;
sys/dev/ic/acx100.c
195
uint8_t key[ACX100_WEPKEY_LEN];
sys/dev/ic/acx100.c
703
bcopy(k->k_key, conf_wk.key, k->k_len);
sys/dev/ic/acx111.c
207
uint8_t key[ACX111_WEPKEY_LEN];
sys/dev/ic/athn.c
1021
const uint8_t *key, *addr;
sys/dev/ic/athn.c
1047
key = k->k_key;
sys/dev/ic/athn.c
1049
AR_WRITE(sc, AR_KEYTABLE_KEY0(entry), LE_READ_4(&key[ 0]));
sys/dev/ic/athn.c
1050
AR_WRITE(sc, AR_KEYTABLE_KEY1(entry), LE_READ_2(&key[ 4]));
sys/dev/ic/athn.c
1052
AR_WRITE(sc, AR_KEYTABLE_KEY2(entry), LE_READ_4(&key[ 6]));
sys/dev/ic/athn.c
1053
AR_WRITE(sc, AR_KEYTABLE_KEY3(entry), LE_READ_2(&key[10]));
sys/dev/ic/athn.c
1055
AR_WRITE(sc, AR_KEYTABLE_KEY4(entry), LE_READ_4(&key[12]));
sys/dev/ic/bwfm.c
2854
struct bwfm_wsec_key key;
sys/dev/ic/bwfm.c
2865
memset(&key, 0, sizeof(key));
sys/dev/ic/bwfm.c
2867
memcpy(key.ea, ni->ni_macaddr, sizeof(key.ea));
sys/dev/ic/bwfm.c
2868
key.index = htole32(k->k_id);
sys/dev/ic/bwfm.c
2869
key.len = htole32(k->k_len);
sys/dev/ic/bwfm.c
2870
memcpy(key.data, k->k_key, sizeof(key.data));
sys/dev/ic/bwfm.c
2872
key.flags = htole32(BWFM_WSEC_PRIMARY_KEY);
sys/dev/ic/bwfm.c
2876
key.algo = htole32(BWFM_CRYPTO_ALGO_WEP1);
sys/dev/ic/bwfm.c
2880
key.algo = htole32(BWFM_CRYPTO_ALGO_WEP128);
sys/dev/ic/bwfm.c
2884
key.algo = htole32(BWFM_CRYPTO_ALGO_TKIP);
sys/dev/ic/bwfm.c
2888
key.algo = htole32(BWFM_CRYPTO_ALGO_AES_CCM);
sys/dev/ic/bwfm.c
2900
bwfm_fwvar_var_set_data(sc, "wsec_key", &key, sizeof(key));
sys/dev/ic/bwfm.c
2932
struct bwfm_wsec_key key;
sys/dev/ic/bwfm.c
2934
memset(&key, 0, sizeof(key));
sys/dev/ic/bwfm.c
2935
key.index = htole32(k->k_id);
sys/dev/ic/bwfm.c
2936
key.flags = htole32(BWFM_WSEC_PRIMARY_KEY);
sys/dev/ic/bwfm.c
2937
bwfm_fwvar_var_set_data(sc, "wsec_key", &key, sizeof(key));
sys/dev/ic/bwfmreg.h
654
uint8_t key[2 * BWFM_WSEC_MAX_PSK_LEN + 1];
sys/dev/ic/if_wi.c
2209
u_int8_t key[RC4KEYLEN];
sys/dev/ic/if_wi.c
2227
bzero(key, sizeof(key));
sys/dev/ic/if_wi.c
2228
key[0] = sc->wi_icv >> 16;
sys/dev/ic/if_wi.c
2229
key[1] = sc->wi_icv >> 8;
sys/dev/ic/if_wi.c
2230
key[2] = sc->wi_icv;
sys/dev/ic/if_wi.c
2234
key + IEEE80211_WEP_IVLEN, klen);
sys/dev/ic/if_wi.c
2238
rc4_keysetup(&ctx, key, klen);
sys/dev/ic/if_wi.c
2242
dat[0] = key[0];
sys/dev/ic/if_wi.c
2243
dat[1] = key[1];
sys/dev/ic/if_wi.c
2244
dat[2] = key[2];
sys/dev/ic/if_wi.c
2265
u_int8_t key[RC4KEYLEN];
sys/dev/ic/if_wi.c
2277
bzero(key, sizeof(key));
sys/dev/ic/if_wi.c
2278
key[0] = dat[0];
sys/dev/ic/if_wi.c
2279
key[1] = dat[1];
sys/dev/ic/if_wi.c
2280
key[2] = dat[2];
sys/dev/ic/if_wi.c
2286
key + IEEE80211_WEP_IVLEN, klen);
sys/dev/ic/if_wi.c
2290
rc4_keysetup(&ctx, key, klen);
sys/dev/ic/qwx.c
781
key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT;
sys/dev/ic/qwx.c
805
key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV |
sys/dev/ic/qwz.c
642
key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT;
sys/dev/ic/qwz.c
666
key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV |
sys/dev/ic/rt2560reg.h
224
uint8_t key[IEEE80211_KEYBUF_SIZE];
sys/dev/ic/rt2560reg.h
251
uint8_t key[IEEE80211_KEYBUF_SIZE];
sys/dev/kstat.c
304
struct kstat *ks, key;
sys/dev/kstat.c
311
key.ks_id = ksreq->ks_id;
sys/dev/kstat.c
313
ks = RBT_FIND(kstat_id_tree, &kstat_id_tree, &key);
sys/dev/kstat.c
321
struct kstat *ks, key;
sys/dev/kstat.c
328
key.ks_id = ksreq->ks_id;
sys/dev/kstat.c
330
ks = RBT_NFIND(kstat_id_tree, &kstat_id_tree, &key);
sys/dev/kstat.c
338
struct kstat *ks, key;
sys/dev/kstat.c
345
key.ks_provider = ksreq->ks_provider;
sys/dev/kstat.c
346
key.ks_instance = ksreq->ks_instance;
sys/dev/kstat.c
347
key.ks_name = ksreq->ks_name;
sys/dev/kstat.c
348
key.ks_unit = ksreq->ks_unit;
sys/dev/kstat.c
350
ks = RBT_FIND(kstat_pv_tree, &kstat_pv_tree, &key);
sys/dev/kstat.c
358
struct kstat *ks, key;
sys/dev/kstat.c
365
key.ks_provider = ksreq->ks_provider;
sys/dev/kstat.c
366
key.ks_instance = ksreq->ks_instance;
sys/dev/kstat.c
367
key.ks_name = ksreq->ks_name;
sys/dev/kstat.c
368
key.ks_unit = ksreq->ks_unit;
sys/dev/kstat.c
370
ks = RBT_NFIND(kstat_pv_tree, &kstat_pv_tree, &key);
sys/dev/kstat.c
378
struct kstat *ks, key;
sys/dev/kstat.c
385
key.ks_name = ksreq->ks_name;
sys/dev/kstat.c
386
key.ks_unit = ksreq->ks_unit;
sys/dev/kstat.c
387
key.ks_provider = ksreq->ks_provider;
sys/dev/kstat.c
388
key.ks_instance = ksreq->ks_instance;
sys/dev/kstat.c
390
ks = RBT_FIND(kstat_nm_tree, &kstat_nm_tree, &key);
sys/dev/kstat.c
398
struct kstat *ks, key;
sys/dev/kstat.c
405
key.ks_name = ksreq->ks_name;
sys/dev/kstat.c
406
key.ks_unit = ksreq->ks_unit;
sys/dev/kstat.c
407
key.ks_provider = ksreq->ks_provider;
sys/dev/kstat.c
408
key.ks_instance = ksreq->ks_instance;
sys/dev/kstat.c
410
ks = RBT_NFIND(kstat_nm_tree, &kstat_nm_tree, &key);
sys/dev/microcode/aic7xxx/aicasm_symbol.c
149
DBT key;
sys/dev/microcode/aic7xxx/aicasm_symbol.c
152
while (symtable->seq(symtable, &key, &data, R_FIRST) == 0) {
sys/dev/microcode/aic7xxx/aicasm_symbol.c
170
DBT key;
sys/dev/microcode/aic7xxx/aicasm_symbol.c
174
key.data = (void *)name;
sys/dev/microcode/aic7xxx/aicasm_symbol.c
175
key.size = strlen(name);
sys/dev/microcode/aic7xxx/aicasm_symbol.c
177
if ((retval = symtable->get(symtable, &key, &data, /*flags*/0)) != 0) {
sys/dev/microcode/aic7xxx/aicasm_symbol.c
189
if (symtable->put(symtable, &key, &data,
sys/dev/microcode/aic7xxx/aicasm_symbol.c
473
DBT key;
sys/dev/microcode/aic7xxx/aicasm_symbol.c
488
while (symtable->seq(symtable, &key, &data, flag) == 0) {
sys/dev/microcode/aic7xxx/aicasm_symbol.c
88
DBT key;
sys/dev/microcode/aic7xxx/aicasm_symbol.c
90
key.data = symbol->name;
sys/dev/microcode/aic7xxx/aicasm_symbol.c
91
key.size = strlen(symbol->name);
sys/dev/microcode/aic7xxx/aicasm_symbol.c
92
symtable->del(symtable, &key, /*flags*/0);
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.c
422
uint64_t stamp, key = amdgpu_gmc_fault_key(addr, pasid);
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.c
437
hash = hash_64(key, AMDGPU_GMC_FAULT_HASH_ORDER);
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.c
442
if (atomic64_read(&fault->key) == key) {
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.c
468
atomic64_set(&fault->key, key);
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.c
491
uint64_t key = amdgpu_gmc_fault_key(addr, pasid);
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.c
515
hash = hash_64(key, AMDGPU_GMC_FAULT_HASH_ORDER);
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.c
518
if (atomic64_read(&fault->key) == key) {
sys/dev/pci/drm/amd/amdgpu/amdgpu_gmc.h
95
atomic64_t key;
sys/dev/pci/drm/amd/amdgpu/amdgpu_virt.c
254
unsigned int key,
sys/dev/pci/drm/amd/amdgpu/amdgpu_virt.c
257
unsigned int ret = key;
sys/dev/pci/drm/amd/amdgpu/amdgv_sriovmsg.h
430
unsigned int amd_sriov_msg_checksum(void *obj, unsigned long obj_size, unsigned int key,
sys/dev/pci/drm/amd/pm/powerplay/hwmgr/pp_overdriver.c
1265
int pp_override_get_default_fuse_value(uint64_t key,
sys/dev/pci/drm/amd/pm/powerplay/hwmgr/pp_overdriver.c
1271
for (i = 0; list[i].key != 0; i++) {
sys/dev/pci/drm/amd/pm/powerplay/hwmgr/pp_overdriver.c
1272
if (key == list[i].key) {
sys/dev/pci/drm/amd/pm/powerplay/hwmgr/pp_overdriver.c
1273
result->key = list[i].key;
sys/dev/pci/drm/amd/pm/powerplay/hwmgr/pp_overdriver.h
31
uint64_t key;
sys/dev/pci/drm/amd/pm/powerplay/hwmgr/pp_overdriver.h
43
extern int pp_override_get_default_fuse_value(uint64_t key,
sys/dev/pci/drm/apple/iomfb.h
289
char key[0x40];
sys/dev/pci/drm/apple/iomfb.h
303
char key[0x40];
sys/dev/pci/drm/apple/iomfb.h
311
char key[0x40];
sys/dev/pci/drm/apple/iomfb.h
334
char key[0x40];
sys/dev/pci/drm/apple/iomfb.h
352
char key[0x40];
sys/dev/pci/drm/apple/iomfb_template.c
224
if (strncmp(req->key, "Temperature", sizeof(req->key)) == 0) {
sys/dev/pci/drm/apple/iomfb_template.c
241
if (strncmp(req->key, "Brightness_Scale", sizeof(req->key)) == 0) {
sys/dev/pci/drm/apple/iomfb_template.c
560
if (!strcmp(req->key, "TimingElements")) {
sys/dev/pci/drm/apple/iomfb_template.c
573
} else if (!strcmp(req->key, "DisplayAttributes")) {
sys/dev/pci/drm/apple/parser.c
1011
char *key = parse_string(it.handle);
sys/dev/pci/drm/apple/parser.c
1012
if (IS_ERR(key)) {
sys/dev/pci/drm/apple/parser.c
1013
ret = PTR_ERR(key);
sys/dev/pci/drm/apple/parser.c
1014
} else if (!strcmp(key, "mNits")) {
sys/dev/pci/drm/apple/parser.c
1016
} else if (!strcmp(key, "iDAC")) {
sys/dev/pci/drm/apple/parser.c
1018
} else if (!strcmp(key, "logEvent")) {
sys/dev/pci/drm/apple/parser.c
1024
} else if (!strcmp(key, "timestamp")) {
sys/dev/pci/drm/apple/parser.c
1030
if (!IS_ERR_OR_NULL(key))
sys/dev/pci/drm/apple/parser.c
1031
kfree(key);
sys/dev/pci/drm/apple/parser.c
136
const char *key;
sys/dev/pci/drm/apple/parser.c
142
key = ctx->blob + ctx->pos + sizeof(*tag);
sys/dev/pci/drm/apple/parser.c
148
strncmp(key, specimen, tag->size))
sys/dev/pci/drm/apple/parser.c
279
char *key = parse_string(it.handle);
sys/dev/pci/drm/apple/parser.c
281
if (IS_ERR(key))
sys/dev/pci/drm/apple/parser.c
282
ret = PTR_ERR(key);
sys/dev/pci/drm/apple/parser.c
283
else if (!strcmp(key, "Active"))
sys/dev/pci/drm/apple/parser.c
285
else if (!strcmp(key, "Total"))
sys/dev/pci/drm/apple/parser.c
287
else if (!strcmp(key, "FrontPorch"))
sys/dev/pci/drm/apple/parser.c
289
else if (!strcmp(key, "SyncWidth"))
sys/dev/pci/drm/apple/parser.c
291
else if (!strcmp(key, "PreciseSyncRate"))
sys/dev/pci/drm/apple/parser.c
296
if (!IS_ERR_OR_NULL(key))
sys/dev/pci/drm/apple/parser.c
297
kfree(key);
sys/dev/pci/drm/apple/parser.c
359
char *key = parse_string(it.handle);
sys/dev/pci/drm/apple/parser.c
361
if (IS_ERR(key))
sys/dev/pci/drm/apple/parser.c
362
ret = PTR_ERR(key);
sys/dev/pci/drm/apple/parser.c
363
else if (!strcmp(key, "Colorimetry"))
sys/dev/pci/drm/apple/parser.c
365
else if (!strcmp(key, "Depth"))
sys/dev/pci/drm/apple/parser.c
367
else if (!strcmp(key, "DynamicRange"))
sys/dev/pci/drm/apple/parser.c
369
else if (!strcmp(key, "EOTF"))
sys/dev/pci/drm/apple/parser.c
371
else if (!strcmp(key, "ID"))
sys/dev/pci/drm/apple/parser.c
373
else if (!strcmp(key, "IsVirtual"))
sys/dev/pci/drm/apple/parser.c
375
else if (!strcmp(key, "PixelEncoding"))
sys/dev/pci/drm/apple/parser.c
377
else if (!strcmp(key, "Score"))
sys/dev/pci/drm/apple/parser.c
382
if (!IS_ERR_OR_NULL(key))
sys/dev/pci/drm/apple/parser.c
383
kfree(key);
sys/dev/pci/drm/apple/parser.c
440
char *key = parse_string(it.handle);
sys/dev/pci/drm/apple/parser.c
442
if (IS_ERR(key))
sys/dev/pci/drm/apple/parser.c
443
ret = PTR_ERR(key);
sys/dev/pci/drm/apple/parser.c
446
else if (!strcmp(key, "HorizontalAttributes"))
sys/dev/pci/drm/apple/parser.c
448
else if (!strcmp(key, "VerticalAttributes"))
sys/dev/pci/drm/apple/parser.c
450
else if (!strcmp(key, "ColorModes"))
sys/dev/pci/drm/apple/parser.c
452
else if (!strcmp(key, "ID"))
sys/dev/pci/drm/apple/parser.c
454
else if (!strcmp(key, "IsVirtual"))
sys/dev/pci/drm/apple/parser.c
456
else if (!strcmp(key, "Score"))
sys/dev/pci/drm/apple/parser.c
461
if (!IS_ERR_OR_NULL(key))
sys/dev/pci/drm/apple/parser.c
462
kfree(key);
sys/dev/pci/drm/apple/parser.c
610
char *key = parse_string(it.handle);
sys/dev/pci/drm/apple/parser.c
612
if (IS_ERR(key))
sys/dev/pci/drm/apple/parser.c
613
ret = PTR_ERR(key);
sys/dev/pci/drm/apple/parser.c
614
else if (!strcmp(key, "MaxHorizontalImageSize"))
sys/dev/pci/drm/apple/parser.c
616
else if (!strcmp(key, "MaxVerticalImageSize"))
sys/dev/pci/drm/apple/parser.c
621
if (!IS_ERR_OR_NULL(key))
sys/dev/pci/drm/apple/parser.c
622
kfree(key);
sys/dev/pci/drm/apple/parser.c
648
char *key = parse_string(it.handle);
sys/dev/pci/drm/apple/parser.c
650
if (IS_ERR(key)) {
sys/dev/pci/drm/apple/parser.c
651
ret = PTR_ERR(key);
sys/dev/pci/drm/apple/parser.c
655
if (!strcmp(key, "EPICName")) {
sys/dev/pci/drm/apple/parser.c
661
} else if (!strcmp(key, "EPICProviderClass")) {
sys/dev/pci/drm/apple/parser.c
667
} else if (!strcmp(key, "EPICUnit")) {
sys/dev/pci/drm/apple/parser.c
675
kfree(key);
sys/dev/pci/drm/drm_drv.c
1774
struct drm_file key;
sys/dev/pci/drm/drm_drv.c
1776
key.fminor = minor;
sys/dev/pci/drm/drm_drv.c
1777
return (SPLAY_FIND(drm_file_tree, &dev->files, &key));
sys/dev/pci/drm/drm_linux.c
179
int sync, void *key)
sys/dev/pci/drm/drm_linux.c
189
int sync, void *key)
sys/dev/pci/drm/i915/display/intel_display_rps.c
25
unsigned mode, int sync, void *key)
sys/dev/pci/drm/i915/display/intel_overlay.c
689
u32 key = overlay->color_key;
sys/dev/pci/drm/i915/display/intel_overlay.c
701
key = RGB8I_TO_COLORKEY(key);
sys/dev/pci/drm/i915/display/intel_overlay.c
705
key = RGB15_TO_COLORKEY(key);
sys/dev/pci/drm/i915/display/intel_overlay.c
709
key = RGB16_TO_COLORKEY(key);
sys/dev/pci/drm/i915/display/intel_overlay.c
714
key = RGB30_TO_COLORKEY(key);
sys/dev/pci/drm/i915/display/intel_overlay.c
722
iowrite32(key, &regs->DCLRKV);
sys/dev/pci/drm/i915/display/intel_sprite.c
1016
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/intel_sprite.c
1072
if (key->flags & I915_SET_COLORKEY_DESTINATION)
sys/dev/pci/drm/i915/display/intel_sprite.c
1074
else if (key->flags & I915_SET_COLORKEY_SOURCE)
sys/dev/pci/drm/i915/display/intel_sprite.c
1174
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/intel_sprite.c
1181
if (key->flags) {
sys/dev/pci/drm/i915/display/intel_sprite.c
1182
intel_de_write_fw(display, DVSKEYVAL(pipe), key->min_value);
sys/dev/pci/drm/i915/display/intel_sprite.c
1184
key->channel_mask);
sys/dev/pci/drm/i915/display/intel_sprite.c
1185
intel_de_write_fw(display, DVSKEYMAX(pipe), key->max_value);
sys/dev/pci/drm/i915/display/intel_sprite.c
271
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/intel_sprite.c
336
if (key->flags & I915_SET_COLORKEY_SOURCE)
sys/dev/pci/drm/i915/display/intel_sprite.c
396
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/intel_sprite.c
406
if (key->flags) {
sys/dev/pci/drm/i915/display/intel_sprite.c
408
key->min_value);
sys/dev/pci/drm/i915/display/intel_sprite.c
410
key->channel_mask);
sys/dev/pci/drm/i915/display/intel_sprite.c
412
key->max_value);
sys/dev/pci/drm/i915/display/intel_sprite.c
667
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/intel_sprite.c
726
if (key->flags & I915_SET_COLORKEY_DESTINATION)
sys/dev/pci/drm/i915/display/intel_sprite.c
728
else if (key->flags & I915_SET_COLORKEY_SOURCE)
sys/dev/pci/drm/i915/display/intel_sprite.c
827
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/intel_sprite.c
834
if (key->flags) {
sys/dev/pci/drm/i915/display/intel_sprite.c
835
intel_de_write_fw(display, SPRKEYVAL(pipe), key->min_value);
sys/dev/pci/drm/i915/display/intel_sprite.c
837
key->channel_mask);
sys/dev/pci/drm/i915/display/intel_sprite.c
838
intel_de_write_fw(display, SPRKEYMAX(pipe), key->max_value);
sys/dev/pci/drm/i915/display/intel_sprite_uapi.c
21
struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/intel_sprite_uapi.c
23
*key = *set;
sys/dev/pci/drm/i915/display/intel_sprite_uapi.c
31
key->flags = 0;
sys/dev/pci/drm/i915/display/intel_sprite_uapi.c
39
key->flags = 0;
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1176
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1200
if (key->flags & I915_SET_COLORKEY_DESTINATION)
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1202
else if (key->flags & I915_SET_COLORKEY_SOURCE)
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1325
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1327
return key->min_value;
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1332
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1335
return (key->max_value & 0xffffff) | PLANE_KEYMAX_ALPHA(alpha);
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1340
const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
sys/dev/pci/drm/i915/display/skl_universal_plane.c
1344
keymsk = key->channel_mask & 0x7ffffff;
sys/dev/pci/drm/i915/gem/i915_gem_object.c
104
struct lock_class_key *key, unsigned flags)
sys/dev/pci/drm/i915/gem/i915_gem_object.h
49
struct lock_class_key *key,
sys/dev/pci/drm/i915/gt/intel_engine.h
284
struct lock_class_key *key,
sys/dev/pci/drm/i915/gt/intel_engine_cs.c
1357
struct lock_class_key *key,
sys/dev/pci/drm/i915/gt/intel_engine_cs.c
1389
lockdep_set_class_and_name(&ce->timeline->mutex, key, name);
sys/dev/pci/drm/i915/gt/intel_migrate.c
247
static struct lock_class_key key;
sys/dev/pci/drm/i915/gt/intel_migrate.c
262
&key, "migrate");
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
858
static int __guc_action_self_cfg(struct intel_guc *guc, u16 key, u16 len, u64 value)
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
864
FIELD_PREP(HOST2GUC_SELF_CFG_REQUEST_MSG_1_KLV_KEY, key) |
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
887
static int __guc_self_cfg(struct intel_guc *guc, u16 key, u16 len, u64 value)
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
889
int err = __guc_action_self_cfg(guc, key, len, value);
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
893
ERR_PTR(err), key, value);
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
897
int intel_guc_self_cfg32(struct intel_guc *guc, u16 key, u32 value)
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
899
return __guc_self_cfg(guc, key, 1, value);
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
902
int intel_guc_self_cfg64(struct intel_guc *guc, u16 key, u64 value)
sys/dev/pci/drm/i915/gt/uc/intel_guc.c
904
return __guc_self_cfg(guc, key, 2, value);
sys/dev/pci/drm/i915/gt/uc/intel_guc.h
444
int intel_guc_self_cfg32(struct intel_guc *guc, u16 key, u32 value);
sys/dev/pci/drm/i915/gt/uc/intel_guc.h
445
int intel_guc_self_cfg64(struct intel_guc *guc, u16 key, u64 value);
sys/dev/pci/drm/i915/i915_active.c
648
barrier_wake(wait_queue_entry_t *wq, unsigned int mode, int flags, void *key)
sys/dev/pci/drm/i915/i915_sw_fence.c
242
struct lock_class_key *key)
sys/dev/pci/drm/i915/i915_sw_fence.c
244
__init_waitqueue_head(&fence->wait, name, key);
sys/dev/pci/drm/i915/i915_sw_fence.c
269
static int i915_sw_fence_wake(wait_queue_entry_t *wq, unsigned mode, int flags, void *key)
sys/dev/pci/drm/i915/i915_sw_fence.c
274
__i915_sw_fence_complete(wq->private, key);
sys/dev/pci/drm/i915/i915_sw_fence.h
45
struct lock_class_key *key);
sys/dev/pci/drm/i915/intel_uncore.c
1192
static int mmio_range_cmp(u32 key, const struct i915_range *range)
sys/dev/pci/drm/i915/intel_uncore.c
1194
if (key < range->start)
sys/dev/pci/drm/i915/intel_uncore.c
1196
else if (key > range->end)
sys/dev/pci/drm/i915/intel_uncore.c
966
#define BSEARCH(key, base, num, cmp) ({ \
sys/dev/pci/drm/i915/intel_uncore.c
971
int ret__ = (cmp)((key), (base) + mid__); \
sys/dev/pci/drm/i915/intel_wakeref.c
102
struct intel_wakeref_lockclass *key,
sys/dev/pci/drm/i915/intel_wakeref.c
109
__mutex_init(&wf->mutex, "wakeref.mutex", &key->mutex);
sys/dev/pci/drm/i915/intel_wakeref.c
118
"wakeref.work", &key->work, 0);
sys/dev/pci/drm/i915/intel_wakeref.h
64
struct intel_wakeref_lockclass *key,
sys/dev/pci/drm/i915/selftests/lib_sw_fence.c
37
struct lock_class_key *key)
sys/dev/pci/drm/i915/selftests/lib_sw_fence.c
41
__init_waitqueue_head(&fence->wait, name, key);
sys/dev/pci/drm/include/linux/bsearch.h
53
bsearch(const void *key, const void *base0, size_t nmemb, size_t size,
sys/dev/pci/drm/include/linux/bsearch.h
63
cmp = (*compar)(key, p);
sys/dev/pci/drm/include/linux/hashtable.h
49
#define __hash(table, key) &table[key % (nitems(table) - 1)]
sys/dev/pci/drm/include/linux/hashtable.h
52
#define hash_add(table, node, key) \
sys/dev/pci/drm/include/linux/hashtable.h
53
hlist_add_head(node, __hash(table, key))
sys/dev/pci/drm/include/linux/hashtable.h
56
#define hash_for_each_possible(table, obj, member, key) \
sys/dev/pci/drm/include/linux/hashtable.h
57
hlist_for_each_entry(obj, __hash(table, key), member)
sys/dev/pci/drm/include/linux/seqlock.h
20
struct lock_class_key *key)
sys/dev/pci/drm/include/linux/wait.h
58
#define __init_waitqueue_head(wqh, name, key) init_waitqueue_head(wqh)
sys/dev/pci/drm/radeon/radeon_fence.c
166
unsigned int mode, int flags, void *key)
sys/dev/pci/if_bnxtreg.h
73708
uint32_t key;
sys/dev/pci/if_bnxtreg.h
73886
uint32_t key;
sys/dev/pci/if_iavf.c
1347
stoeplitz_to_key(&rss_key->key, key_len);
sys/dev/pci/if_iavf.c
1349
rss_key->key[key_len] = 0;
sys/dev/pci/if_iavf.c
335
uint8_t key[1];
sys/dev/pci/if_ice.c
18424
uint8_t nvr_mtch, uint8_t *key, uint8_t *key_inv)
sys/dev/pci/if_ice.c
18426
uint8_t in_key = *key, in_key_inv = *key_inv;
sys/dev/pci/if_ice.c
18433
*key = 0;
sys/dev/pci/if_ice.c
18438
*key >>= 1;
sys/dev/pci/if_ice.c
18442
*key |= (in_key & 0x1) << 7;
sys/dev/pci/if_ice.c
18445
*key |= ICE_DC_KEY << 7;
sys/dev/pci/if_ice.c
18448
*key |= ICE_NM_KEY << 7;
sys/dev/pci/if_ice.c
18451
*key |= ICE_1_KEY << 7;
sys/dev/pci/if_ice.c
18454
*key |= ICE_0_KEY << 7;
sys/dev/pci/if_ice.c
18526
ice_set_key(uint8_t *key, uint16_t size, uint8_t *val, uint8_t *upd,
sys/dev/pci/if_ice.c
18551
key + off + i, key + half_size + off + i))
sys/dev/pci/if_ice.c
18576
uint8_t key[ICE_TCAM_KEY_SZ])
sys/dev/pci/if_ice.c
18611
return ice_set_key(key, ICE_TCAM_KEY_SZ, (uint8_t *)&inkey,
sys/dev/pci/if_ice.c
18640
dc_msk, nm_msk, hw->blk[blk].prof.t[idx].key);
sys/dev/pci/if_ice.c
19726
memcpy(p->entry[0].key,
sys/dev/pci/if_ice.c
19727
&hw->blk[blk].prof.t[tmp->tcam_idx].key,
sys/dev/pci/if_ice.c
19728
sizeof(hw->blk[blk].prof.t->key));
sys/dev/pci/if_ice.c
24168
struct ice_aqc_get_set_rss_keys *key, bool set)
sys/dev/pci/if_ice.c
24171
uint16_t key_size = sizeof(*key);
sys/dev/pci/if_ice.c
24188
return ice_aq_send_cmd(hw, &desc, key, key_size, NULL);
sys/dev/pci/if_icevar.h
3489
struct ice_boost_key_value key;
sys/dev/pci/if_icevar.h
3498
struct ice_boost_key key;
sys/dev/pci/if_icevar.h
3734
uint8_t key[ICE_TCAM_KEY_SZ];
sys/dev/pci/if_ipwreg.h
151
uint8_t key[IEEE80211_KEYBUF_SIZE];
sys/dev/pci/if_ipwreg.h
212
uint8_t key[13];
sys/dev/pci/if_iwireg.h
417
uint8_t key[16];
sys/dev/pci/if_iwireg.h
429
uint8_t key[16];
sys/dev/pci/if_iwm.c
6912
memcpy(tx->key, k->k_key, MIN(sizeof(tx->key), k->k_len));
sys/dev/pci/if_iwm.c
9130
memcpy(cmd.common.key, k->k_key, MIN(sizeof(cmd.common.key), k->k_len));
sys/dev/pci/if_iwm.c
9165
memcpy(cmd.common.key, k->k_key, MIN(sizeof(cmd.common.key), k->k_len));
sys/dev/pci/if_iwm.c
9188
memcpy(cmd.common.key, k->k_key, MIN(sizeof(cmd.common.key), k->k_len));
sys/dev/pci/if_iwm.c
9221
memcpy(cmd.common.key, k->k_key, MIN(sizeof(cmd.common.key), k->k_len));
sys/dev/pci/if_iwmreg.h
4927
uint8_t key[16];
sys/dev/pci/if_iwmreg.h
6221
uint8_t key[16];
sys/dev/pci/if_iwmreg.h
6393
uint8_t key[32];
sys/dev/pci/if_iwmreg.h
6475
uint8_t key[16];
sys/dev/pci/if_iwmreg.h
6553
uint32_t key;
sys/dev/pci/if_iwn.c
3577
memcpy(tx->key, k->k_key, k->k_len);
sys/dev/pci/if_iwn.c
5678
memcpy(node.key, k->k_key, k->k_len);
sys/dev/pci/if_iwnreg.h
633
uint8_t key[16];
sys/dev/pci/if_iwnreg.h
670
uint8_t key[16];
sys/dev/pci/if_iwnreg.h
722
uint8_t key[16];
sys/dev/pci/if_iwx.c
9259
memcpy(cmd.u.add.key, k->k_key, k->k_len);
sys/dev/pci/if_iwx.c
9312
memcpy(cmd.common.key, k->k_key, MIN(sizeof(cmd.common.key), k->k_len));
sys/dev/pci/if_iwx.c
9512
memcpy(cmd.common.key, k->k_key, MIN(sizeof(cmd.common.key), k->k_len));
sys/dev/pci/if_iwxreg.h
6360
uint8_t key[32];
sys/dev/pci/if_iwxreg.h
8384
uint8_t key[16];
sys/dev/pci/if_iwxreg.h
8497
uint8_t key[32];
sys/dev/pci/if_iwxreg.h
8597
uint8_t key[16];
sys/dev/pci/if_iwxreg.h
8659
uint32_t key;
sys/dev/pci/if_ixl.c
1124
uint32_t key[13];
sys/dev/pci/if_ixl.c
5128
for (i = 0; i < nitems(rsskey->key); i++)
sys/dev/pci/if_ixl.c
5129
ixl_wr_ctl(sc, I40E_PFQF_HKEY(i), rsskey->key[i]);
sys/dev/pci/if_mwx.c
4623
if (key && multicast && ieee80211_is_robust_mgmt_frame(skb) &&
sys/dev/pci/if_mwx.c
4624
key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
sys/dev/pci/if_mwx.c
4762
if (key)
sys/dev/pci/if_wpi.c
1808
memcpy(tx->key, k->k_key, k->k_len);
sys/dev/pci/if_wpi.c
2756
memcpy(node.key, k->k_key, k->k_len);
sys/dev/pci/if_wpireg.h
370
uint8_t key[16];
sys/dev/pci/if_wpireg.h
410
uint8_t key[IEEE80211_KEYBUF_SIZE];
sys/dev/pckbc/pckbd.c
1048
int key;
sys/dev/pckbc/pckbd.c
1082
key = datain | id->t_extended;
sys/dev/pckbc/pckbd.c
1091
if (key == id->t_lastchar)
sys/dev/pckbc/pckbd.c
1093
id->t_lastchar = key;
sys/dev/pckbc/pckbd.c
1097
*dataout = key;
sys/dev/pckbc/pckbd.c
1150
int rc, type, key;
sys/dev/pckbc/pckbd.c
1156
rc = pckbd_decode(sc->id, data, &type, &key);
sys/dev/pckbc/pckbd.c
1171
if (rc == 0 || (key != 160 && key != 174 && key != 176))
sys/dev/pckbc/pckbd.c
1176
wskbd_input(sc->sc_wskbddev, type, key);
sys/dev/pcmcia/if_malo.c
1158
struct ieee80211_key *key = &ic->ic_nw_keys[i];
sys/dev/pcmcia/if_malo.c
1160
if (!key->k_len)
sys/dev/pcmcia/if_malo.c
1166
cmalo_cmd_set_wep(sc, i, key);
sys/dev/pcmcia/if_malo.c
1471
struct ieee80211_key *key)
sys/dev/pcmcia/if_malo.c
1490
if (key->k_len > 5)
sys/dev/pcmcia/if_malo.c
1494
bcopy(key->k_key, body->key_value_1, key->k_len);
sys/dev/pcmcia/if_malo.c
1497
if (key->k_len > 5)
sys/dev/pcmcia/if_malo.c
1501
bcopy(key->k_key, body->key_value_2, key->k_len);
sys/dev/pcmcia/if_malo.c
1504
if (key->k_len > 5)
sys/dev/pcmcia/if_malo.c
1508
bcopy(key->k_key, body->key_value_3, key->k_len);
sys/dev/pcmcia/if_malo.c
1511
if (key->k_len > 5)
sys/dev/pcmcia/if_malo.c
1515
bcopy(key->k_key, body->key_value_4, key->k_len);
sys/dev/pv/hypervic.c
1106
kvp_poolname(char **key)
sys/dev/pv/hypervic.c
1111
if ((p = strrchr(*key, '/')) == NULL)
sys/dev/pv/hypervic.c
1115
if (strncasecmp(*key, kvp_pools[i].poolname,
sys/dev/pv/hypervic.c
1122
*key = ++p;
sys/dev/pv/hypervic.c
1127
hv_kvop(void *arg, int op, char *key, char *val, size_t vallen)
sys/dev/pv/hypervic.c
1136
pool = kvp_poolname(&key);
sys/dev/pv/hypervic.c
1141
if (strlen(key) == 0) {
sys/dev/pv/hypervic.c
1159
error = kvp_pool_update(kvpl, key, val, vallen,
sys/dev/pv/hypervic.c
1162
error = kvp_pool_insert(kvpl, key, val, vallen,
sys/dev/pv/hypervic.c
1167
error = kvp_pool_extract(kvpl, key, val, vallen);
sys/dev/pv/hypervic.c
521
keycmp_utf16le(const uint8_t *key, const uint8_t *ukey, size_t ukeylen)
sys/dev/pv/hypervic.c
526
if (key[j] != ukey[i])
sys/dev/pv/hypervic.c
527
return (key[j] > ukey[i] ?
sys/dev/pv/hypervic.c
528
key[j] - ukey[i] :
sys/dev/pv/hypervic.c
529
ukey[i] - key[j]);
sys/dev/pv/hypervic.c
543
kvp_pool_insert(struct kvp_pool *kvpl, const char *key, const char *val,
sys/dev/pv/hypervic.c
547
int keylen = strlen(key);
sys/dev/pv/hypervic.c
555
if (strcmp(kpe->kpe_key, key) == 0) {
sys/dev/pv/hypervic.c
567
strlcpy(kpe->kpe_key, key, HV_KVP_MAX_KEY_SIZE / 2);
sys/dev/pv/hypervic.c
584
kvp_pool_update(struct kvp_pool *kvpl, const char *key, const char *val,
sys/dev/pv/hypervic.c
588
int keylen = strlen(key);
sys/dev/pv/hypervic.c
596
if (strcmp(kpe->kpe_key, key) == 0)
sys/dev/pv/hypervic.c
615
kvp_pool_import(struct kvp_pool *kvpl, const char *key, uint32_t keylen,
sys/dev/pv/hypervic.c
627
if (keycmp_utf16le(kpe->kpe_key, key, keylen) == 0)
sys/dev/pv/hypervic.c
637
copyin_utf16le(kpe->kpe_key, key, HV_KVP_MAX_KEY_SIZE / 2,
sys/dev/pv/hypervic.c
654
kvp_pool_export(struct kvp_pool *kvpl, uint32_t index, char *key,
sys/dev/pv/hypervic.c
670
*keylen = copyout_utf16le(key, kpe->kpe_key, HV_KVP_MAX_KEY_SIZE,
sys/dev/pv/hypervic.c
682
kvp_pool_remove(struct kvp_pool *kvpl, const char *key, uint32_t keylen)
sys/dev/pv/hypervic.c
689
if (keycmp_utf16le(kpe->kpe_key, key, keylen) == 0)
sys/dev/pv/hypervic.c
707
kvp_pool_extract(struct kvp_pool *kvpl, const char *key, char *val,
sys/dev/pv/hypervic.c
718
if (strcmp(kpe->kpe_key, key) == 0)
sys/dev/pv/hypervic.c
746
kvp_pool_keys(struct kvp_pool *kvpl, int next, char *key, size_t *keylen)
sys/dev/pv/hypervic.c
757
strlcpy(key, kpe->kpe_key, *keylen);
sys/dev/pv/pvbus.c
398
char *value = NULL, *key = NULL;
sys/dev/pv/pvbus.c
440
if ((error = pvbusgetstr(keylen, pvr->pvr_key, &key)) != 0)
sys/dev/pv/pvbus.c
449
key, value, valuelen)) != 0)
sys/dev/pv/pvbus.c
461
free(key, M_TEMP, keylen + 1);
sys/dev/pv/vmt.c
486
vmt_kvop(void *arg, int op, char *key, char *value, size_t valuelen)
sys/dev/pv/vmt.c
502
key, value) >= bufsz) {
sys/dev/pv/vmt.c
510
key) >= bufsz) {
sys/dev/pv/xenstore.c
1000
ret = snprintf(key, sizeof(key), "%s", property);
sys/dev/pv/xenstore.c
1001
if (ret == -1 || ret >= sizeof(key))
sys/dev/pv/xenstore.c
1008
error = xs_cmd(&xst, XS_WRITE, key, &iovp, &iov_cnt);
sys/dev/pv/xenstore.c
1020
char key[256];
sys/dev/pv/xenstore.c
1031
ret = snprintf(key, sizeof(key), "%s/%s", path, property);
sys/dev/pv/xenstore.c
1033
ret = snprintf(key, sizeof(key), "%s", property);
sys/dev/pv/xenstore.c
1034
if (ret == -1 || ret >= sizeof(key))
sys/dev/pv/xenstore.c
1037
if ((error = xs_cmd(&xst, XS_READ, key, &iovp, &iov_cnt)) != 0)
sys/dev/pv/xenstore.c
1067
xs_kvop(void *xsc, int op, char *key, char *value, size_t valuelen)
sys/dev/pv/xenstore.c
1095
if ((error = xs_cmd(&xst, cmd, key, &iovp, &iov_cnt)) != 0)
sys/dev/pv/xenstore.c
1112
return (xs_kvop(xsc, PVBUS_KVLS, key, value, valuelen));
sys/dev/pv/xenstore.c
828
char key[256];
sys/dev/pv/xenstore.c
846
ret = snprintf(key, sizeof(key), "%s/%s", path, property);
sys/dev/pv/xenstore.c
848
ret = snprintf(key, sizeof(key), "%s", property);
sys/dev/pv/xenstore.c
849
if (ret == -1 || ret >= sizeof(key)) {
sys/dev/pv/xenstore.c
866
if ((error = xs_cmd(&xst, XS_WATCH, key, &iovp, &iov_cnt)) != 0) {
sys/dev/pv/xenstore.c
952
char key[256];
sys/dev/pv/xenstore.c
963
ret = snprintf(key, sizeof(key), "%s/%s", path, property);
sys/dev/pv/xenstore.c
965
ret = snprintf(key, sizeof(key), "%s", property);
sys/dev/pv/xenstore.c
966
if (ret == -1 || ret >= sizeof(key))
sys/dev/pv/xenstore.c
969
if ((error = xs_cmd(&xst, XS_READ, key, &iovp, &iov_cnt)) != 0)
sys/dev/pv/xenstore.c
987
char key[256];
sys/dev/pv/xenstore.c
998
ret = snprintf(key, sizeof(key), "%s/%s", path, property);
sys/dev/softraid_crypto.c
390
sr_crypto_encrypt(u_char *p, u_char *c, u_char *key, size_t size, int alg)
sys/dev/softraid_crypto.c
397
if (rijndael_set_key_enc_only(&ctx, key, 256) != 0)
sys/dev/softraid_crypto.c
416
sr_crypto_decrypt(u_char *c, u_char *p, u_char *key, size_t size, int alg)
sys/dev/softraid_crypto.c
423
if (rijndael_set_key(&ctx, key, 256) != 0)
sys/dev/softraid_crypto.c
443
u_int8_t *key, int key_size, u_char *check_digest)
sys/dev/softraid_crypto.c
460
HMAC_SHA1_Update(&hmacctx, key, key_size);
sys/dev/usb/if_athn_usb.c
1650
cmd.key = k;
sys/dev/usb/if_athn_usb.c
1667
athn_set_key(ic, cmd->ni, cmd->key);
sys/dev/usb/if_athn_usb.c
1697
cmd.key = k;
sys/dev/usb/if_athn_usb.c
1709
athn_delete_key(ic, cmd->ni, cmd->key);
sys/dev/usb/if_athn_usb.h
418
struct ieee80211_key *key;
sys/dev/usb/if_mtw.c
1776
cmd.key = *k;
sys/dev/usb/if_mtw.c
1788
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_mtw.c
1907
cmd.key = *k;
sys/dev/usb/if_mtw.c
1916
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_mtwvar.h
116
struct ieee80211_key key;
sys/dev/usb/if_otus.c
2049
cmd.key = *k;
sys/dev/usb/if_otus.c
2060
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_otus.c
2061
struct ar_cmd_ekey key;
sys/dev/usb/if_otus.c
2067
memset(&key, 0, sizeof key);
sys/dev/usb/if_otus.c
2069
key.uid = htole16(k->k_id);
sys/dev/usb/if_otus.c
2070
IEEE80211_ADDR_COPY(key.macaddr, sc->sc_ic.ic_myaddr);
sys/dev/usb/if_otus.c
2071
key.macaddr[0] |= 0x80;
sys/dev/usb/if_otus.c
2073
key.uid = htole16(OTUS_UID(cmd->associd));
sys/dev/usb/if_otus.c
2074
IEEE80211_ADDR_COPY(key.macaddr, ni->ni_macaddr);
sys/dev/usb/if_otus.c
2076
key.kix = htole16(0);
sys/dev/usb/if_otus.c
2097
key.cipher = htole16(cipher);
sys/dev/usb/if_otus.c
2098
memcpy(key.key, k->k_key, MIN(k->k_len, 16));
sys/dev/usb/if_otus.c
2099
error = otus_cmd(sc, AR_CMD_EKEY, &key, sizeof key, NULL);
sys/dev/usb/if_otus.c
2108
key.kix = htole16(1);
sys/dev/usb/if_otus.c
2109
memcpy(key.key, k->k_key + 16, 16);
sys/dev/usb/if_otus.c
2110
(void)otus_cmd(sc, AR_CMD_EKEY, &key, sizeof key, NULL);
sys/dev/usb/if_otus.c
2132
cmd.key = *k;
sys/dev/usb/if_otus.c
2141
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_otusreg.h
285
uint8_t key[16];
sys/dev/usb/if_otusreg.h
925
struct ieee80211_key key;
sys/dev/usb/if_rsu.c
896
cmd.key = *k;
sys/dev/usb/if_rsu.c
908
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_rsu.c
909
struct r92s_fw_cmd_set_key key;
sys/dev/usb/if_rsu.c
913
memset(&key, 0, sizeof(key));
sys/dev/usb/if_rsu.c
917
key.algo = R92S_KEY_ALGO_WEP40;
sys/dev/usb/if_rsu.c
920
key.algo = R92S_KEY_ALGO_WEP104;
sys/dev/usb/if_rsu.c
923
key.algo = R92S_KEY_ALGO_TKIP;
sys/dev/usb/if_rsu.c
926
key.algo = R92S_KEY_ALGO_AES;
sys/dev/usb/if_rsu.c
934
key.id = k->k_id;
sys/dev/usb/if_rsu.c
935
key.grpkey = (k->k_flags & IEEE80211_KEY_GROUP) != 0;
sys/dev/usb/if_rsu.c
936
memcpy(key.key, k->k_key, MIN(k->k_len, sizeof(key.key)));
sys/dev/usb/if_rsu.c
937
(void)rsu_fw_cmd(sc, R92S_CMD_SET_KEY, &key, sizeof(key));
sys/dev/usb/if_rsu.c
959
cmd.key = *k;
sys/dev/usb/if_rsu.c
967
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_rsu.c
968
struct r92s_fw_cmd_set_key key;
sys/dev/usb/if_rsu.c
970
memset(&key, 0, sizeof(key));
sys/dev/usb/if_rsu.c
971
key.id = k->k_id;
sys/dev/usb/if_rsu.c
972
(void)rsu_fw_cmd(sc, R92S_CMD_SET_KEY, &key, sizeof(key));
sys/dev/usb/if_rsureg.h
383
uint8_t key[16];
sys/dev/usb/if_rsureg.h
706
struct ieee80211_key key;
sys/dev/usb/if_run.c
1923
cmd.key = *k;
sys/dev/usb/if_run.c
1936
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_run.c
2039
cmd.key = *k;
sys/dev/usb/if_run.c
2048
struct ieee80211_key *k = &cmd->key;
sys/dev/usb/if_runvar.h
114
struct ieee80211_key key;
sys/dev/usb/if_uath.c
1715
crypto.key[i] = k->k_key[i] ^ 0xaa;
sys/dev/usb/if_uathreg.h
176
uint8_t key[68];
sys/dev/usb/if_urtwn.c
1051
cmd.key = *k;
sys/dev/usb/if_urtwn.c
1067
if (rtwn_set_key(ic, cmd->ni, &cmd->key) == 0) {
sys/dev/usb/if_urtwn.c
1101
cmd.key = *k;
sys/dev/usb/if_urtwn.c
1112
rtwn_delete_key(ic, cmd->ni, &cmd->key);
sys/dev/usb/if_urtwn.c
165
struct ieee80211_key key;
sys/dev/vnd.c
420
char name[VNDNLEN], key[BLF_MAXUTILIZED];
sys/dev/vnd.c
442
if (vio->vnd_keylen > sizeof(key))
sys/dev/vnd.c
443
vio->vnd_keylen = sizeof(key);
sys/dev/vnd.c
445
if ((error = copyin(vio->vnd_key, key,
sys/dev/vnd.c
523
blf_key(sc->sc_keyctx, key, vio->vnd_keylen);
sys/dev/vnd.c
524
explicit_bzero(key, vio->vnd_keylen);
sys/dev/wscons/wsconsio.h
374
enum wsmousecfg key;
sys/dev/wscons/wsmouse.c
1449
int i, key, error = 0;
sys/dev/wscons/wsmouse.c
1452
key = params[i].key;
sys/dev/wscons/wsmouse.c
1453
switch (key) {
sys/dev/wscons/wsmouse.c
1510
error = wstpad_get_param(input, key, &params[i].value);
sys/dev/wscons/wsmouse.c
1525
int i, val, key, needreset = 0, error = 0;
sys/dev/wscons/wsmouse.c
1528
key = params[i].key;
sys/dev/wscons/wsmouse.c
1530
switch (params[i].key) {
sys/dev/wscons/wsmouse.c
1601
error = wstpad_set_param(input, key, val);
sys/dev/wscons/wstpad.c
1744
wstpad_set_param(struct wsmouseinput *input, int key, int val)
sys/dev/wscons/wstpad.c
1752
switch (key) {
sys/dev/wscons/wstpad.c
1754
switch (key) {
sys/dev/wscons/wstpad.c
1845
wstpad_get_param(struct wsmouseinput *input, int key, int *pval)
sys/dev/wscons/wstpad.c
1853
switch (key) {
sys/dev/wscons/wstpad.c
1855
switch (key) {
sys/kern/subr_pool.c
303
struct pool_page_header *ph, key;
sys/kern/subr_pool.c
313
key.ph_page = v;
sys/kern/subr_pool.c
314
ph = RBT_NFIND(phtree, &pp->pr_phtree, &key);
sys/kern/subr_tree.c
442
_rb_find(const struct rb_type *t, struct rb_tree *rbt, const void *key)
sys/kern/subr_tree.c
450
comp = (*t->t_compare)(key, node);
sys/kern/subr_tree.c
464
_rb_nfind(const struct rb_type *t, struct rb_tree *rbt, const void *key)
sys/kern/subr_tree.c
473
comp = (*t->t_compare)(key, node);
sys/kern/subr_witness.c
2374
witness_hash_djb2(const uint8_t *key, uint32_t size)
sys/kern/subr_witness.c
2382
hash = ((hash << 5) + hash) + (unsigned int)key[i];
sys/kern/subr_witness.c
2384
for (i = 0; key[i] != 0; i++)
sys/kern/subr_witness.c
2385
hash = ((hash << 5) + hash) + (unsigned int)key[i];
sys/kern/subr_witness.c
2470
struct witness_lock_order_key key;
sys/kern/subr_witness.c
2474
key.from = parent->w_index;
sys/kern/subr_witness.c
2475
key.to = child->w_index;
sys/kern/subr_witness.c
2476
WITNESS_INDEX_ASSERT(key.from);
sys/kern/subr_witness.c
2477
WITNESS_INDEX_ASSERT(key.to);
sys/kern/subr_witness.c
2482
hash = witness_hash_djb2((const char*)&key,
sys/kern/subr_witness.c
2483
sizeof(key)) % w_lohash.wloh_size;
sys/kern/subr_witness.c
2486
if (witness_lock_order_key_equal(&data->wlod_key, &key))
sys/kern/subr_witness.c
2518
struct witness_lock_order_key key;
sys/kern/subr_witness.c
2522
key.from = parent->w_index;
sys/kern/subr_witness.c
2523
key.to = child->w_index;
sys/kern/subr_witness.c
2524
WITNESS_INDEX_ASSERT(key.from);
sys/kern/subr_witness.c
2525
WITNESS_INDEX_ASSERT(key.to);
sys/kern/subr_witness.c
2530
hash = witness_hash_djb2((const char*)&key,
sys/kern/subr_witness.c
2531
sizeof(key)) % w_lohash.wloh_size;
sys/kern/subr_witness.c
2543
data->wlod_key = key;
sys/kern/subr_witness.c
353
static uint32_t witness_hash_djb2(const uint8_t *key, uint32_t size);
sys/kern/sys_futex.c
212
uint32_t key = f->ft_off >> 3; /* watevs */
sys/kern/sys_futex.c
213
key ^= key >> FUTEX_SLPQUES_BITS;
sys/kern/sys_futex.c
215
return (&futex_slpques[key & FUTEX_SLPQUES_MASK]);
sys/kern/sys_futex.c
452
struct futex key;
sys/kern/sys_futex.c
462
futex_addrs(p, &key, uaddr, flags);
sys/kern/sys_futex.c
463
fsq = futex_get_slpque(&key);
sys/kern/sys_futex.c
471
if (!futex_is_eq(f, &key))
sys/kern/sysv_msg.c
185
syscallarg(key_t) key;
sys/kern/sysv_msg.c
190
key_t key = SCARG(uap, key);
sys/kern/sysv_msg.c
195
if (key != IPC_PRIVATE) {
sys/kern/sysv_msg.c
196
que = que_key_lookup(key);
sys/kern/sysv_msg.c
208
if (key != IPC_PRIVATE && !(msgflg & IPC_CREAT))
sys/kern/sysv_msg.c
219
if ((que = que_create(key, cred, msgflg & 0777)) == NULL)
sys/kern/sysv_msg.c
378
que_create(key_t key, struct ucred *cred, int mode)
sys/kern/sysv_msg.c
386
if (que_key_lookup(key)) {
sys/kern/sysv_msg.c
399
que->msqid_ds.msg_perm.key = key;
sys/kern/sysv_msg.c
438
que_key_lookup(key_t key)
sys/kern/sysv_msg.c
442
if (key == IPC_PRIVATE)
sys/kern/sysv_msg.c
446
if (que->msqid_ds.msg_perm.key == key)
sys/kern/sysv_sem.c
411
syscallarg(key_t) key;
sys/kern/sysv_sem.c
416
int key = SCARG(uap, key);
sys/kern/sysv_sem.c
422
DPRINTF(("semget(0x%x, %d, 0%o)\n", key, nsems, semflg));
sys/kern/sysv_sem.c
429
if (key == IPC_PRIVATE || (semflg & IPC_CREAT)) {
sys/kern/sysv_sem.c
449
if (key != IPC_PRIVATE) {
sys/kern/sysv_sem.c
452
semaptr->sem_perm.key == key) {
sys/kern/sysv_sem.c
478
if (key == IPC_PRIVATE || (semflg & IPC_CREAT)) {
sys/kern/sysv_sem.c
489
semaptr_new->sem_perm.key = key;
sys/kern/sysv_shm.c
116
shm_find_segment_by_key(key_t key)
sys/kern/sysv_shm.c
123
if (shmseg != NULL && shmseg->shm_perm.key == key)
sys/kern/sysv_shm.c
342
shmseg->shm_perm.key = IPC_PRIVATE;
sys/kern/sysv_shm.c
393
key_t key;
sys/kern/sysv_shm.c
416
key = SCARG(uap, key);
sys/kern/sysv_shm.c
417
shmseg = pool_get(&shm_pool, key == IPC_PRIVATE ? PR_WAITOK :
sys/kern/sysv_shm.c
421
if (shm_find_segment_by_key(key) != -1) {
sys/kern/sysv_shm.c
450
shmseg->shm_perm.key = key;
sys/kern/sysv_shm.c
466
syscallarg(key_t) key;
sys/kern/sysv_shm.c
474
if (SCARG(uap, key) != IPC_PRIVATE) {
sys/kern/sysv_shm.c
476
segnum = shm_find_segment_by_key(SCARG(uap, key));
sys/lib/libsa/aes_xts.c
87
aes_xts_setkey(struct aes_xts_ctx *ctx, u_int8_t *key, int len)
sys/lib/libsa/aes_xts.c
92
rijndael_set_key(&ctx->key1, key, len * 4);
sys/lib/libsa/aes_xts.c
93
rijndael_set_key(&ctx->key2, key + (len / 2), len * 4);
sys/lib/libsa/arc4.c
30
rc4_keysetup(struct rc4_ctx *ctx, u_char *key, u_int32_t klen)
sys/lib/libsa/arc4.c
39
y = (key[x] + ctx->state[i] + y) & (RC4STATE - 1);
sys/lib/libsa/bcrypt_pbkdf.c
157
key[dest] = out[i];
sys/lib/libsa/bcrypt_pbkdf.c
97
uint8_t *key, size_t keylen, unsigned int rounds)
sys/lib/libsa/blowfish.c
408
Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes)
sys/lib/libsa/blowfish.c
420
temp = Blowfish_stream2word(key, keybytes, &j);
sys/lib/libsa/blowfish.c
446
const u_int8_t *key, u_int16_t keybytes)
sys/lib/libsa/blowfish.c
458
temp = Blowfish_stream2word(key, keybytes, &j);
sys/lib/libsa/blowfish.c
647
char key[] = "AAAAA";
sys/lib/libsa/blowfish.c
660
blf_key(&c, (u_int8_t *) key, 5);
sys/lib/libsa/bootparam.c
223
bp_getfile(int sockfd, char *key, struct in_addr *serv_addr, char *pathname)
sys/lib/libsa/bootparam.c
258
if (xdr_string_encode(&send_tail, key, strlen(key))) {
sys/lib/libsa/bootparam.h
4
int bp_getfile(int sock, char *key, struct in_addr *addrp, char *path);
sys/lib/libsa/hmac_sha1.c
29
hmac_sha1(const u_int8_t *text, size_t text_len, const u_int8_t *key,
sys/lib/libsa/hmac_sha1.c
39
SHA1Update(&ctx, key, key_len);
sys/lib/libsa/hmac_sha1.c
42
key = tk;
sys/lib/libsa/hmac_sha1.c
47
bcopy(key, k_pad, key_len);
sys/lib/libsa/hmac_sha1.c
57
bcopy(key, k_pad, key_len);
sys/lib/libsa/pkcs5_pbkdf2.c
32
size_t salt_len, u_int8_t *key, size_t key_len, u_int rounds)
sys/lib/libsa/pkcs5_pbkdf2.c
65
memcpy(key, obuf, r);
sys/lib/libsa/pkcs5_pbkdf2.c
66
key += r;
sys/lib/libsa/rijndael.c
1223
rijndael_set_key_enc_only(rijndael_ctx *ctx, const u_char *key, int bits)
sys/lib/libsa/rijndael.c
1227
rounds = rijndaelKeySetupEnc(ctx->ek, key, bits);
sys/lib/libsa/rijndael.c
1239
rijndael_set_key(rijndael_ctx *ctx, const u_char *key, int bits)
sys/lib/libsa/rijndael.c
1243
rounds = rijndaelKeySetupEnc(ctx->ek, key, bits);
sys/lib/libsa/rijndael.c
1246
if (rijndaelKeySetupDec(ctx->dk, key, bits) != rounds)
sys/lib/libsa/softraid.c
104
hmac_sha1(key, key_size, check_key, sizeof(check_key), check_digest);
sys/lib/libsa/softraid.c
90
u_int8_t *key, int key_size, u_char *check_digest)
sys/net/if_etherbridge.c
474
const struct eb_entry key = {
sys/net/if_etherbridge.c
482
oebe = ebt_find(eb, &key);
sys/net/if_etherip.c
593
struct etherip_tunnel key;
sys/net/if_etherip.c
598
key.t_af = AF_INET;
sys/net/if_etherip.c
599
key.t_src4 = ip->ip_dst;
sys/net/if_etherip.c
600
key.t_dst4 = ip->ip_src;
sys/net/if_etherip.c
602
return (etherip_input(&key, m, ip->ip_tos, *offp, ns));
sys/net/if_etherip.c
606
etherip_find(const struct etherip_tunnel *key)
sys/net/if_etherip.c
612
if (etherip_cmp(key, t) != 0)
sys/net/if_etherip.c
626
etherip_input(struct etherip_tunnel *key, struct mbuf *m, uint8_t tos,
sys/net/if_etherip.c
640
key->t_rtableid = m->m_pkthdr.ph_rtableid;
sys/net/if_etherip.c
643
sc = etherip_find(key);
sys/net/if_etherip.c
773
struct etherip_tunnel key;
sys/net/if_etherip.c
779
key.t_af = AF_INET6;
sys/net/if_etherip.c
780
key.t_src6 = ip6->ip6_dst;
sys/net/if_etherip.c
781
key.t_dst6 = ip6->ip6_src;
sys/net/if_etherip.c
785
return (etherip_input(&key, m, flow >> 20, *offp, ns));
sys/net/if_gif.c
718
struct gif_tunnel key;
sys/net/if_gif.c
724
key.t_af = AF_INET;
sys/net/if_gif.c
725
key.t_src4 = ip->ip_dst;
sys/net/if_gif.c
726
key.t_dst4 = ip->ip_src;
sys/net/if_gif.c
728
rv = gif_input(&key, mp, offp, proto, af, ip->ip_tos, ns);
sys/net/if_gif.c
741
struct gif_tunnel key;
sys/net/if_gif.c
748
key.t_af = AF_INET6;
sys/net/if_gif.c
749
key.t_src6 = ip6->ip6_dst;
sys/net/if_gif.c
750
key.t_dst6 = ip6->ip6_src;
sys/net/if_gif.c
754
rv = gif_input(&key, mp, offp, proto, af, flow >> 20, ns);
sys/net/if_gif.c
763
gif_find(const struct gif_tunnel *key)
sys/net/if_gif.c
769
if (gif_cmp(key, t) != 0)
sys/net/if_gif.c
783
gif_input(struct gif_tunnel *key, struct mbuf **mp, int *offp, int proto,
sys/net/if_gif.c
798
key->t_rtableid = m->m_pkthdr.ph_rtableid;
sys/net/if_gif.c
800
sc = gif_find(key);
sys/net/if_gif.c
802
memset(&key->t_dst, 0, sizeof(key->t_dst));
sys/net/if_gif.c
803
sc = gif_find(key);
sys/net/if_gre.c
1000
key.t_dst6 = ip6->ip6_src;
sys/net/if_gre.c
1004
if (gre_input_key(mp, offp, type, af, flow >> 20, &key, ns) == -1)
sys/net/if_gre.c
1012
gre_find(const struct gre_tunnel *key)
sys/net/if_gre.c
1017
if (gre_cmp(key, &sc->sc_tunnel) != 0)
sys/net/if_gre.c
1030
mgre_find(const struct gre_tunnel *key)
sys/net/if_gre.c
1035
sc = RBT_FIND(mgre_tree, &mgre_tree, (const struct mgre_softc *)key);
sys/net/if_gre.c
1043
gre_input_1(struct gre_tunnel *key, struct mbuf *m,
sys/net/if_gre.c
1066
return (eoip_input(key, m, gh, otos, iphlen, ns));
sys/net/if_gre.c
1075
struct gre_tunnel *key, struct netstack *ns)
sys/net/if_gre.c
1092
key->t_rtableid = m->m_pkthdr.ph_rtableid;
sys/net/if_gre.c
1111
m = gre_input_1(key, m, gh, otos, iphlen, ns);
sys/net/if_gre.c
1124
m = erspan_input(key, m, iphlen, gh, otos, ns);
sys/net/if_gre.c
1148
key->t_key_mask = GRE_KEY_MASK;
sys/net/if_gre.c
1149
key->t_key = gkh->gre_key;
sys/net/if_gre.c
1151
key->t_key_mask = GRE_KEY_NONE;
sys/net/if_gre.c
1154
if (egre_input(key, m, hlen, otos, ns) == -1 &&
sys/net/if_gre.c
1155
nvgre_input(key, m, hlen, otos, ns) == -1)
sys/net/if_gre.c
1161
ifp = gre_find(key);
sys/net/if_gre.c
1163
ifp = mgre_find(key);
sys/net/if_gre.c
1246
bemtoh32(&key->t_key) & ~GRE_KEY_ENTROPY;
sys/net/if_gre.c
1375
egre_input(const struct gre_tunnel *key, struct mbuf *m, int hlen,
sys/net/if_gre.c
1381
sc = RBT_FIND(egre_tree, &egre_tree, (const struct egre_softc *)key);
sys/net/if_gre.c
1393
bemtoh32(&key->t_key) & ~GRE_KEY_ENTROPY;
sys/net/if_gre.c
1406
nvgre_mcast_find(const struct gre_tunnel *key, unsigned int if0idx)
sys/net/if_gre.c
1420
rv = nvgre_cmp_mcast(key, &key->t_src, if0idx,
sys/net/if_gre.c
1434
nvgre_ucast_find(const struct gre_tunnel *key)
sys/net/if_gre.c
1438
(struct nvgre_softc *)key));
sys/net/if_gre.c
1442
nvgre_input(const struct gre_tunnel *key, struct mbuf *m, int hlen,
sys/net/if_gre.c
1449
sc = nvgre_mcast_find(key, m->m_pkthdr.ph_ifidx);
sys/net/if_gre.c
1451
sc = nvgre_ucast_find(key);
sys/net/if_gre.c
1462
etherbridge_map_ea(&sc->sc_eb, (void *)&key->t_dst,
sys/net/if_gre.c
1466
m->m_pkthdr.ph_flowid = bemtoh32(&key->t_key) & ~GRE_KEY_ENTROPY;
sys/net/if_gre.c
3300
uint32_t key;
sys/net/if_gre.c
3316
key = htonl(ifr->ifr_vnetid << shift);
sys/net/if_gre.c
3320
tunnel->t_key = key;
sys/net/if_gre.c
3357
uint32_t mask, key;
sys/net/if_gre.c
3368
key = ntohl(tunnel->t_key);
sys/net/if_gre.c
3370
if (key > GRE_KEY_ENTROPY_MAX)
sys/net/if_gre.c
3373
key = htonl(key << GRE_KEY_ENTROPY_SHIFT);
sys/net/if_gre.c
3375
key = htonl(key >> GRE_KEY_ENTROPY_SHIFT);
sys/net/if_gre.c
3379
tunnel->t_key = key;
sys/net/if_gre.c
4071
eoip_input(struct gre_tunnel *key, struct mbuf *m,
sys/net/if_gre.c
4094
key->t_key = eoiph->eoip_tunnel_id;
sys/net/if_gre.c
4097
sc = RBT_FIND(eoip_tree, &eoip_tree, (const struct eoip_softc *)key);
sys/net/if_gre.c
4934
erspan_input(struct gre_tunnel *key, struct mbuf *m, int iphlen,
sys/net/if_gre.c
4969
key->t_key = (hdr >> ERSPAN_II_SESSION_ID_SHIFT) &
sys/net/if_gre.c
4974
(const struct erspan_softc *)key);
sys/net/if_gre.c
4978
.t_af = key->t_af,
sys/net/if_gre.c
4979
.t_rtableid = key->t_rtableid,
sys/net/if_gre.c
4980
.t_src = key->t_src,
sys/net/if_gre.c
4981
.t_key = key->t_key,
sys/net/if_gre.c
5004
if (bpf_mtap_af(if_bpf, key->t_af, m, BPF_DIRECTION_IN))
sys/net/if_gre.c
968
struct gre_tunnel key;
sys/net/if_gre.c
975
key.t_af = AF_INET;
sys/net/if_gre.c
976
key.t_src4 = ip->ip_dst;
sys/net/if_gre.c
977
key.t_dst4 = ip->ip_src;
sys/net/if_gre.c
979
if (gre_input_key(mp, offp, type, af, ip->ip_tos, &key, ns) == -1)
sys/net/if_gre.c
990
struct gre_tunnel key;
sys/net/if_gre.c
998
key.t_af = AF_INET6;
sys/net/if_gre.c
999
key.t_src6 = ip6->ip6_dst;
sys/net/if_pflow.c
948
sk = st->key[st->direction == PF_IN ? PF_SK_WIRE : PF_SK_STACK];
sys/net/if_pflow.c
949
skw = st->key[st->direction == PF_OUT ? PF_SK_WIRE : PF_SK_STACK];
sys/net/if_pfsync.c
1262
unsigned int idx = st->key[0]->hash % nitems(sc->sc_slices);
sys/net/if_pfsync.c
1750
if (st->key[PF_SK_WIRE]->proto == IPPROTO_TCP) {
sys/net/if_pfsync.c
2068
if (pf_setup_pdesc(&pdesc, st->key[PF_SK_WIRE]->af,
sys/net/if_pfsync.c
2071
switch (st->key[PF_SK_WIRE]->af) {
sys/net/if_pfsync.c
2081
unhandled_af(st->key[PF_SK_WIRE]->af);
sys/net/if_pfsync.c
2085
switch (st->key[PF_SK_WIRE]->af) {
sys/net/if_pfsync.c
2095
unhandled_af(st->key[PF_SK_WIRE]->af);
sys/net/if_pfsync.c
2812
af1 = sp->key[0].af;
sys/net/if_pfsync.c
2813
af2 = sp->key[1].af;
sys/net/if_pfsync.c
2936
if (st->key[PF_SK_WIRE]->proto == IPPROTO_TCP)
sys/net/if_pppx.c
585
struct pppx_if_key key;
sys/net/if_pppx.c
588
memset(&key, 0, sizeof(key));
sys/net/if_pppx.c
589
key.pxik_session_id = session_id;
sys/net/if_pppx.c
590
key.pxik_protocol = protocol;
sys/net/if_pppx.c
592
pxi = RBT_FIND(pppx_ifs, &pppx_ifs, (struct pppx_if *)&key);
sys/net/if_trunk.c
982
trunk_hashmbuf(struct mbuf *m, SIPHASH_KEY *key)
sys/net/if_trunk.c
999
SipHash24_Init(&ctx, key);
sys/net/if_veb.c
2382
struct veb_pvlan key;
sys/net/if_veb.c
2408
key.v_primary = ifbrpv->ifbrpv_primary;
sys/net/if_veb.c
2409
key.v_secondary = ifbrpv->ifbrpv_secondary;
sys/net/if_veb.c
2410
key.v_type = ifbrpv->ifbrpv_type;
sys/net/if_veb.c
2422
vp = RBT_FIND(veb_pvlan_vp, &sc->sc_pvlans_vp, &key);
sys/net/if_veb.c
2429
vs = RBT_NFIND(veb_pvlan_vs, &sc->sc_pvlans_vs, &key);
sys/net/if_veb.c
2449
vs = RBT_FIND(veb_pvlan_vs, &sc->sc_pvlans_vs, &key);
sys/net/if_veb.c
2450
if (vs == NULL || vs->v_type != key.v_type) {
sys/net/if_veb.c
2498
struct veb_pvlan key;
sys/net/if_veb.c
2505
key.v_primary = ifbrpv->ifbrpv_primary;
sys/net/if_veb.c
2511
vp = RBT_NFIND(veb_pvlan_vp, &sc->sc_pvlans_vp, &key);
sys/net/if_veb.c
2529
struct veb_pvlan key;
sys/net/if_veb.c
2540
key.v_primary = ifbrpv->ifbrpv_primary;
sys/net/if_veb.c
2541
key.v_secondary = ifbrpv->ifbrpv_secondary;
sys/net/if_veb.c
2542
key.v_type = ifbrpv->ifbrpv_type;
sys/net/if_veb.c
2548
vs = RBT_NFIND(veb_pvlan_vs, &sc->sc_pvlans_vs, &key);
sys/net/if_vxlan.c
609
struct vxlan_peer key, *p;
sys/net/if_vxlan.c
650
memset(&key, 0, sizeof(key));
sys/net/if_vxlan.c
651
key.p_addr = addr;
sys/net/if_vxlan.c
652
key.p_header.vxlan_flags = vh->vxlan_flags & htonl(VXLAN_F_I);
sys/net/if_vxlan.c
653
key.p_header.vxlan_id = vh->vxlan_id & htonl(VXLAN_VNI_MASK);
sys/net/if_vxlan.c
656
p = RBT_FIND(vxlan_peers, &vt->vt_peers, &key);
sys/net/if_vxlan.c
658
memset(&key.p_addr, 0, sizeof(key.p_addr));
sys/net/if_vxlan.c
659
p = RBT_FIND(vxlan_peers, &vt->vt_peers, &key);
sys/net/if_wg.c
2015
uint32_t key;
sys/net/if_wg.c
2030
key = index->i_key = arc4random();
sys/net/if_wg.c
2031
key &= sc->sc_index_mask;
sys/net/if_wg.c
2032
LIST_FOREACH(iter, &sc->sc_index[key], i_entry)
sys/net/if_wg.c
2036
LIST_INSERT_HEAD(&sc->sc_index[key], index, i_entry);
sys/net/if_wg.c
2050
uint32_t key = key0 & sc->sc_index_mask;
sys/net/if_wg.c
2053
LIST_FOREACH(iter, &sc->sc_index[key], i_entry)
sys/net/if_wg.c
2068
uint32_t key = key0 & sc->sc_index_mask;
sys/net/if_wg.c
2071
LIST_FOREACH(iter, &sc->sc_index[key], i_entry)
sys/net/pf.c
1020
KASSERT(st->key[idx] == NULL);
sys/net/pf.c
1029
((sist->key[PF_SK_WIRE]->af == sk->af &&
sys/net/pf.c
1031
(sist->key[PF_SK_WIRE]->af !=
sys/net/pf.c
1032
sist->key[PF_SK_STACK]->af &&
sys/net/pf.c
1033
sk->af == sist->key[PF_SK_STACK]->af &&
sys/net/pf.c
1085
st->key[idx] = pf_state_key_ref(sk); /* give a ref to state */
sys/net/pf.c
1104
KASSERT(st->key[PF_SK_WIRE] != NULL);
sys/net/pf.c
1107
KASSERT(st->key[PF_SK_STACK] != NULL);
sys/net/pf.c
1108
if (st->key[PF_SK_STACK] != st->key[PF_SK_WIRE])
sys/net/pf.c
1120
sk = st->key[idx];
sys/net/pf.c
1164
struct pf_state_key_cmp *key = arg;
sys/net/pf.c
1184
key->addr[didx].addr32[0] = 0;
sys/net/pf.c
1185
key->addr[didx].addr32[1] = 0;
sys/net/pf.c
1186
key->addr[didx].addr32[2] = 0;
sys/net/pf.c
1187
key->addr[didx].addr32[3] = 0;
sys/net/pf.c
1193
key->addr[sidx].addr32[0] = __IPV6_ADDR_INT32_MLL;
sys/net/pf.c
1194
key->addr[sidx].addr32[1] = 0;
sys/net/pf.c
1195
key->addr[sidx].addr32[2] = 0;
sys/net/pf.c
1196
key->addr[sidx].addr32[3] = __IPV6_ADDR_INT32_ONE;
sys/net/pf.c
1203
pf_addrcpy(&key->addr[sidx], saddr, af);
sys/net/pf.c
1205
pf_addrcpy(&key->addr[didx], daddr, af);
sys/net/pf.c
1323
st->key[PF_SK_STACK] = sks;
sys/net/pf.c
1362
pf_find_state_byid(struct pf_state_cmp *key)
sys/net/pf.c
1366
return (RBT_FIND(pf_state_tree_id, &tree_id, (struct pf_state *)key));
sys/net/pf.c
1404
pf_find_state(struct pf_pdesc *pd, struct pf_state_key_cmp *key,
sys/net/pf.c
1416
pf_print_state_parts(NULL, (struct pf_state_key *)key, NULL);
sys/net/pf.c
1462
(struct pf_state_key *)key)) == NULL)
sys/net/pf.c
1486
if (sist->key[PF_SK_WIRE]->af == sist->key[PF_SK_STACK]->af) {
sys/net/pf.c
1487
if (sk != sist->key[didx])
sys/net/pf.c
1526
pf_find_state_all(struct pf_state_key_cmp *key, u_int dir, int *more)
sys/net/pf.c
1533
sk = RBT_FIND(pf_state_tree, &pf_statetbl, (struct pf_state_key *)key);
sys/net/pf.c
1539
(sk == (dir == PF_IN ? sist->key[PF_SK_WIRE] :
sys/net/pf.c
1540
sist->key[PF_SK_STACK]))) {
sys/net/pf.c
1600
sp->key[PF_SK_WIRE].addr[0] = st->key[PF_SK_WIRE]->addr[0];
sys/net/pf.c
1601
sp->key[PF_SK_WIRE].addr[1] = st->key[PF_SK_WIRE]->addr[1];
sys/net/pf.c
1602
sp->key[PF_SK_WIRE].port[0] = st->key[PF_SK_WIRE]->port[0];
sys/net/pf.c
1603
sp->key[PF_SK_WIRE].port[1] = st->key[PF_SK_WIRE]->port[1];
sys/net/pf.c
1604
sp->key[PF_SK_WIRE].rdomain = htons(st->key[PF_SK_WIRE]->rdomain);
sys/net/pf.c
1605
sp->key[PF_SK_WIRE].af = st->key[PF_SK_WIRE]->af;
sys/net/pf.c
1606
sp->key[PF_SK_STACK].addr[0] = st->key[PF_SK_STACK]->addr[0];
sys/net/pf.c
1607
sp->key[PF_SK_STACK].addr[1] = st->key[PF_SK_STACK]->addr[1];
sys/net/pf.c
1608
sp->key[PF_SK_STACK].port[0] = st->key[PF_SK_STACK]->port[0];
sys/net/pf.c
1609
sp->key[PF_SK_STACK].port[1] = st->key[PF_SK_STACK]->port[1];
sys/net/pf.c
1610
sp->key[PF_SK_STACK].rdomain = htons(st->key[PF_SK_STACK]->rdomain);
sys/net/pf.c
1611
sp->key[PF_SK_STACK].af = st->key[PF_SK_STACK]->af;
sys/net/pf.c
1614
sp->proto = st->key[PF_SK_WIRE]->proto;
sys/net/pf.c
1615
sp->af = st->key[PF_SK_WIRE]->af;
sys/net/pf.c
1734
if ((sp->key[PF_SK_WIRE].af &&
sys/net/pf.c
1735
(sp->key[PF_SK_WIRE].af != sp->key[PF_SK_STACK].af)) ||
sys/net/pf.c
1736
PF_ANEQ(&sp->key[PF_SK_WIRE].addr[0],
sys/net/pf.c
1737
&sp->key[PF_SK_STACK].addr[0], sp->af) ||
sys/net/pf.c
1738
PF_ANEQ(&sp->key[PF_SK_WIRE].addr[1],
sys/net/pf.c
1739
&sp->key[PF_SK_STACK].addr[1], sp->af) ||
sys/net/pf.c
1740
sp->key[PF_SK_WIRE].port[0] != sp->key[PF_SK_STACK].port[0] ||
sys/net/pf.c
1741
sp->key[PF_SK_WIRE].port[1] != sp->key[PF_SK_STACK].port[1] ||
sys/net/pf.c
1742
sp->key[PF_SK_WIRE].rdomain != sp->key[PF_SK_STACK].rdomain) {
sys/net/pf.c
1754
skw->addr[0] = sp->key[PF_SK_WIRE].addr[0];
sys/net/pf.c
1755
skw->addr[1] = sp->key[PF_SK_WIRE].addr[1];
sys/net/pf.c
1756
skw->port[0] = sp->key[PF_SK_WIRE].port[0];
sys/net/pf.c
1757
skw->port[1] = sp->key[PF_SK_WIRE].port[1];
sys/net/pf.c
1758
skw->rdomain = ntohs(sp->key[PF_SK_WIRE].rdomain);
sys/net/pf.c
1760
if (!(skw->af = sp->key[PF_SK_WIRE].af))
sys/net/pf.c
1766
sks->addr[0] = sp->key[PF_SK_STACK].addr[0];
sys/net/pf.c
1767
sks->addr[1] = sp->key[PF_SK_STACK].addr[1];
sys/net/pf.c
1768
sks->port[0] = sp->key[PF_SK_STACK].port[0];
sys/net/pf.c
1769
sks->port[1] = sp->key[PF_SK_STACK].port[1];
sys/net/pf.c
1770
sks->rdomain = ntohs(sp->key[PF_SK_STACK].rdomain);
sys/net/pf.c
1771
if (!(sks->af = sp->key[PF_SK_STACK].af))
sys/net/pf.c
2088
pf_send_tcp(st->rule.ptr, st->key[PF_SK_WIRE]->af,
sys/net/pf.c
2089
&st->key[PF_SK_WIRE]->addr[1],
sys/net/pf.c
2090
&st->key[PF_SK_WIRE]->addr[0],
sys/net/pf.c
2091
st->key[PF_SK_WIRE]->port[1],
sys/net/pf.c
2092
st->key[PF_SK_WIRE]->port[0],
sys/net/pf.c
2095
st->key[PF_SK_WIRE]->rdomain, NULL);
sys/net/pf.c
2097
if (st->key[PF_SK_STACK]->proto == IPPROTO_TCP)
sys/net/pf.c
2124
struct pf_source key, *sr;
sys/net/pf.c
2131
pf_source_key(srlim, &key,
sys/net/pf.c
2132
st->key[PF_SK_WIRE]->af,
sys/net/pf.c
2133
st->key[PF_SK_WIRE]->rdomain,
sys/net/pf.c
2134
&st->key[PF_SK_WIRE]->addr[0 /* XXX or 1? */]);
sys/net/pf.c
2136
sr = pf_source_find(srlim, &key);
sys/net/pf.c
2192
if (sk == sist->key[PF_SK_STACK] && sist->rule.ptr &&
sys/net/pf.c
2195
if (sist->key[PF_SK_STACK]->proto == IPPROTO_TCP &&
sys/net/pf.c
2196
sist->key[PF_SK_WIRE] != sist->key[PF_SK_STACK]) {
sys/net/pf.c
2458
skw = skwp ? skwp : (st ? st->key[PF_SK_WIRE] : NULL);
sys/net/pf.c
2459
sks = sksp ? sksp : (st ? st->key[PF_SK_STACK] : NULL);
sys/net/pf.c
427
struct pf_statelim key;
sys/net/pf.c
430
key.pfstlim_id = id;
sys/net/pf.c
433
&pf_statelim_id_tree_active, &key));
sys/net/pf.c
439
struct pf_sourcelim key;
sys/net/pf.c
442
key.pfsrlim_id = id;
sys/net/pf.c
445
&pf_sourcelim_id_tree_active, &key));
sys/net/pf.c
4657
struct pf_source key;
sys/net/pf.c
4669
pf_source_key(srlim, &key,
sys/net/pf.c
4671
sr = pf_source_find(srlim, &key);
sys/net/pf.c
544
pf_source_key(struct pf_sourcelim *srlim, struct pf_source *key,
sys/net/pf.c
550
key->pfsr_af = af;
sys/net/pf.c
551
key->pfsr_rdomain = rdomain;
sys/net/pf.c
554
key->pfsr_addr.addr32[0] =
sys/net/pf.c
558
for (i = 1; i < nitems(key->pfsr_addr.addr32); i++)
sys/net/pf.c
559
key->pfsr_addr.addr32[i] = htonl(0);
sys/net/pf.c
563
for (i = 0; i < nitems(key->pfsr_addr.addr32); i++) {
sys/net/pf.c
564
key->pfsr_addr.addr32[i] =
sys/net/pf.c
577
pf_source_find(struct pf_sourcelim *srlim, const struct pf_source *key)
sys/net/pf.c
579
return (RBT_FIND(pf_source_tree, &srlim->pfsrlim_sources, key));
sys/net/pf.c
5970
struct pf_state_key *sk = (*stp)->key[pd->didx];
sys/net/pf.c
6156
PF_REVERSED_KEY((*stp)->key, pd->af)) == PF_DROP)
sys/net/pf.c
6193
if ((*stp)->key[PF_SK_WIRE] != (*stp)->key[PF_SK_STACK]) {
sys/net/pf.c
6197
if (PF_REVERSED_KEY((*stp)->key, pd->af))
sys/net/pf.c
6198
nk = (*stp)->key[pd->sidx];
sys/net/pf.c
6200
nk = (*stp)->key[pd->didx];
sys/net/pf.c
6243
pf_icmp_state_lookup(struct pf_pdesc *pd, struct pf_state_key_cmp *key,
sys/net/pf.c
6249
key->af = pd->af;
sys/net/pf.c
6250
key->proto = pd->proto;
sys/net/pf.c
6251
key->rdomain = pd->rdomain;
sys/net/pf.c
6254
key->port[pd->sidx] = icmpid;
sys/net/pf.c
6255
key->port[pd->didx] = type;
sys/net/pf.c
6258
key->port[pd->sidx] = type;
sys/net/pf.c
6259
key->port[pd->didx] = icmpid;
sys/net/pf.c
6262
if (pf_state_key_addr_setup(pd, key, pd->sidx, pd->src, pd->didx,
sys/net/pf.c
6266
key->hash = pf_pkt_hash(key->af, key->proto,
sys/net/pf.c
6267
&key->addr[0], &key->addr[1], 0, 0);
sys/net/pf.c
6269
action = pf_find_state(pd, key, stp);
sys/net/pf.c
6277
if ((*stp)->key[PF_SK_WIRE]->af != (*stp)->key[PF_SK_STACK]->af)
sys/net/pf.c
6278
direction = (pd->af == (*stp)->key[PF_SK_WIRE]->af) ?
sys/net/pf.c
6305
struct pf_state_key_cmp key;
sys/net/pf.c
6328
ret = pf_icmp_state_lookup(pd, &key, stp,
sys/net/pf.c
6333
ret = pf_icmp_state_lookup(pd, &key, stp, virtual_id,
sys/net/pf.c
6342
if ((*stp)->key[PF_SK_WIRE] != (*stp)->key[PF_SK_STACK]) {
sys/net/pf.c
6346
if (PF_REVERSED_KEY((*stp)->key, pd->af))
sys/net/pf.c
6347
nk = (*stp)->key[pd->sidx];
sys/net/pf.c
6349
nk = (*stp)->key[pd->didx];
sys/net/pf.c
6533
key.af = pd2.af;
sys/net/pf.c
6534
key.proto = IPPROTO_TCP;
sys/net/pf.c
6535
key.rdomain = pd2.rdomain;
sys/net/pf.c
6536
pf_addrcpy(&key.addr[pd2.sidx], pd2.src, key.af);
sys/net/pf.c
6537
pf_addrcpy(&key.addr[pd2.didx], pd2.dst, key.af);
sys/net/pf.c
6538
key.port[pd2.sidx] = th->th_sport;
sys/net/pf.c
6539
key.port[pd2.didx] = th->th_dport;
sys/net/pf.c
6540
key.hash = pf_pkt_hash(pd2.af, pd2.proto,
sys/net/pf.c
6543
action = pf_find_state(&pd2, &key, stp);
sys/net/pf.c
6548
if (PF_REVERSED_KEY((*stp)->key, pd->af)) {
sys/net/pf.c
655
st->key[PF_SK_STACK]->proto == IPPROTO_TCP &&
sys/net/pf.c
6556
if (PF_REVERSED_KEY((*stp)->key, pd->af)) {
sys/net/pf.c
6608
if ((*stp)->key[PF_SK_WIRE] !=
sys/net/pf.c
6609
(*stp)->key[PF_SK_STACK]) {
sys/net/pf.c
6613
if (PF_REVERSED_KEY((*stp)->key, pd->af))
sys/net/pf.c
6614
nk = (*stp)->key[pd->sidx];
sys/net/pf.c
6616
nk = (*stp)->key[pd->didx];
sys/net/pf.c
6723
key.af = pd2.af;
sys/net/pf.c
6724
key.proto = IPPROTO_UDP;
sys/net/pf.c
6725
key.rdomain = pd2.rdomain;
sys/net/pf.c
6726
pf_addrcpy(&key.addr[pd2.sidx], pd2.src, key.af);
sys/net/pf.c
6727
pf_addrcpy(&key.addr[pd2.didx], pd2.dst, key.af);
sys/net/pf.c
6728
key.port[pd2.sidx] = uh->uh_sport;
sys/net/pf.c
6729
key.port[pd2.didx] = uh->uh_dport;
sys/net/pf.c
6730
key.hash = pf_pkt_hash(pd2.af, pd2.proto,
sys/net/pf.c
6733
action = pf_find_state(&pd2, &key, stp);
sys/net/pf.c
6738
if ((*stp)->key[PF_SK_WIRE] !=
sys/net/pf.c
6739
(*stp)->key[PF_SK_STACK]) {
sys/net/pf.c
6743
if (PF_REVERSED_KEY((*stp)->key, pd->af))
sys/net/pf.c
6744
nk = (*stp)->key[pd->sidx];
sys/net/pf.c
6746
nk = (*stp)->key[pd->didx];
sys/net/pf.c
6864
ret = pf_icmp_state_lookup(&pd2, &key, stp,
sys/net/pf.c
6870
if ((*stp)->key[PF_SK_WIRE] !=
sys/net/pf.c
6871
(*stp)->key[PF_SK_STACK]) {
sys/net/pf.c
6875
if (PF_REVERSED_KEY((*stp)->key, pd->af))
sys/net/pf.c
6876
nk = (*stp)->key[pd->sidx];
sys/net/pf.c
6878
nk = (*stp)->key[pd->didx];
sys/net/pf.c
6977
ret = pf_icmp_state_lookup(&pd2, &key, stp,
sys/net/pf.c
6982
ret = pf_icmp_state_lookup(&pd2, &key, stp,
sys/net/pf.c
6989
if ((*stp)->key[PF_SK_WIRE] !=
sys/net/pf.c
6990
(*stp)->key[PF_SK_STACK]) {
sys/net/pf.c
6994
if (PF_REVERSED_KEY((*stp)->key, pd->af))
sys/net/pf.c
6995
nk = (*stp)->key[pd->sidx];
sys/net/pf.c
6997
nk = (*stp)->key[pd->didx];
sys/net/pf.c
7078
key.af = pd2.af;
sys/net/pf.c
7079
key.proto = pd2.proto;
sys/net/pf.c
7080
key.rdomain = pd2.rdomain;
sys/net/pf.c
7081
pf_addrcpy(&key.addr[pd2.sidx], pd2.src, key.af);
sys/net/pf.c
7082
pf_addrcpy(&key.addr[pd2.didx], pd2.dst, key.af);
sys/net/pf.c
7083
key.port[0] = key.port[1] = 0;
sys/net/pf.c
7084
key.hash = pf_pkt_hash(pd2.af, pd2.proto,
sys/net/pf.c
7087
action = pf_find_state(&pd2, &key, stp);
sys/net/pf.c
7092
if ((*stp)->key[PF_SK_WIRE] !=
sys/net/pf.c
7093
(*stp)->key[PF_SK_STACK]) {
sys/net/pf.c
7095
(*stp)->key[pd->didx];
sys/net/pf.c
791
(*stp)->key[PF_SK_WIRE]->af);
sys/net/pf.c
795
p.pfra_af = (*stp)->key[PF_SK_WIRE]->af;
sys/net/pf.c
796
switch ((*stp)->key[PF_SK_WIRE]->af) {
sys/net/pf.c
819
sk = st->key[PF_SK_WIRE];
sys/net/pf.c
8250
&st->key[(st->direction == PF_IN)]->
sys/net/pf.c
8255
&st->key[(st->direction == PF_IN)]->
sys/net/pf.c
826
(*stp)->key[PF_SK_WIRE]->af &&
sys/net/pf.c
8263
&st->key[(st->direction == PF_IN)]->
sys/net/pf.c
8269
&st->key[(st->direction == PF_IN)]->
sys/net/pf.c
8282
struct pf_state_key_cmp key;
sys/net/pf.c
8483
key.af = pd.af;
sys/net/pf.c
8484
key.proto = pd.virtual_proto;
sys/net/pf.c
8485
key.rdomain = pd.rdomain;
sys/net/pf.c
8486
pf_addrcpy(&key.addr[pd.sidx], pd.src, key.af);
sys/net/pf.c
8487
pf_addrcpy(&key.addr[pd.didx], pd.dst, key.af);
sys/net/pf.c
8488
key.port[pd.sidx] = pd.osport;
sys/net/pf.c
8489
key.port[pd.didx] = pd.odport;
sys/net/pf.c
8490
key.hash = pd.hash;
sys/net/pf.c
8493
action = pf_find_state(&pd, &key, &st);
sys/net/pf.c
8511
action = pf_find_state(&pd, &key, &st);
sys/net/pf.c
8623
pf_mbuf_link_state_key(m, st->key[PF_SK_STACK]);
sys/net/pf.c
8625
pf_state_key_link_inpcb(st->key[PF_SK_STACK], inp);
sys/net/pf.c
8628
m->m_pkthdr.ph_flowid = st->key[PF_SK_WIRE]->hash;
sys/net/pf.c
9077
pf_state_key_unref(st->key[PF_SK_WIRE]);
sys/net/pf.c
9078
pf_state_key_unref(st->key[PF_SK_STACK]);
sys/net/pf_if.c
727
struct pfi_kif_cmp key;
sys/net/pf_if.c
741
strlcpy(key.pfik_name, name, sizeof(key.pfik_name));
sys/net/pf_if.c
742
p = RB_FIND(pfi_ifhead, &pfi_ifs, (struct pfi_kif *)&key);
sys/net/pf_ioctl.c
1095
struct pf_statelim key = { .pfstlim_id = id };
sys/net/pf_ioctl.c
1107
&key);
sys/net/pf_ioctl.c
1405
const struct pf_statelim *key)
sys/net/pf_ioctl.c
1407
return (RBT_FIND(pf_statelim_id_tree, tree, key));
sys/net/pf_ioctl.c
1412
const struct pf_statelim *key)
sys/net/pf_ioctl.c
1414
return (RBT_NFIND(pf_statelim_id_tree, tree, key));
sys/net/pf_ioctl.c
1422
struct pf_statelim key = { .pfstlim_id = ioc->id };
sys/net/pf_ioctl.c
1429
pfstlim = (*rbt_op)(&pf_statelim_id_tree_active, &key);
sys/net/pf_ioctl.c
1624
const struct pf_sourcelim *key)
sys/net/pf_ioctl.c
1626
return (RBT_FIND(pf_sourcelim_id_tree, tree, key));
sys/net/pf_ioctl.c
1631
const struct pf_sourcelim *key)
sys/net/pf_ioctl.c
1633
return (RBT_NFIND(pf_sourcelim_id_tree, tree, key));
sys/net/pf_ioctl.c
1641
struct pf_sourcelim key = { .pfsrlim_id = ioc->id };
sys/net/pf_ioctl.c
1648
pfsrlim = (*rbt_op)(&pf_sourcelim_id_tree_active, &key);
sys/net/pf_ioctl.c
1693
const struct pf_source *key)
sys/net/pf_ioctl.c
1695
return (RBT_FIND(pf_source_ioc_tree, tree, key));
sys/net/pf_ioctl.c
1700
const struct pf_source *key)
sys/net/pf_ioctl.c
1702
return (RBT_NFIND(pf_source_ioc_tree, tree, key));
sys/net/pf_ioctl.c
1712
struct pf_source key;
sys/net/pf_ioctl.c
1723
error = copyin(ioc->key, &e, sizeof(e));
sys/net/pf_ioctl.c
1736
key.pfsr_af = e.af;
sys/net/pf_ioctl.c
1737
key.pfsr_rdomain = e.rdomain;
sys/net/pf_ioctl.c
1738
key.pfsr_addr = e.addr;
sys/net/pf_ioctl.c
1739
pfsr = (*rbt_op)(&pfsrlim->pfsrlim_ioc_sources, &key);
sys/net/pf_ioctl.c
2729
struct pf_state_key *sk, key;
sys/net/pf_ioctl.c
2757
key.af = psk->psk_af;
sys/net/pf_ioctl.c
2758
key.proto = psk->psk_proto;
sys/net/pf_ioctl.c
2759
key.rdomain = psk->psk_rdomain;
sys/net/pf_ioctl.c
2772
pf_addrcpy(&key.addr[sidx],
sys/net/pf_ioctl.c
2773
&psk->psk_src.addr.v.a.addr, key.af);
sys/net/pf_ioctl.c
2774
pf_addrcpy(&key.addr[didx],
sys/net/pf_ioctl.c
2775
&psk->psk_dst.addr.v.a.addr, key.af);
sys/net/pf_ioctl.c
2776
key.port[sidx] = psk->psk_src.port[0];
sys/net/pf_ioctl.c
2777
key.port[didx] = psk->psk_dst.port[0];
sys/net/pf_ioctl.c
2780
&key);
sys/net/pf_ioctl.c
2787
if (((sist->key[PF_SK_WIRE]->af ==
sys/net/pf_ioctl.c
2788
sist->key[PF_SK_STACK]->af &&
sys/net/pf_ioctl.c
2790
sist->key[PF_SK_WIRE] :
sys/net/pf_ioctl.c
2791
sist->key[PF_SK_STACK])) ||
sys/net/pf_ioctl.c
2792
(sist->key[PF_SK_WIRE]->af !=
sys/net/pf_ioctl.c
2793
sist->key[PF_SK_STACK]->af &&
sys/net/pf_ioctl.c
2795
(sk == sist->key[PF_SK_STACK] ||
sys/net/pf_ioctl.c
2796
sk == sist->key[PF_SK_WIRE]))) &&
sys/net/pf_ioctl.c
2819
sk = st->key[PF_SK_STACK];
sys/net/pf_ioctl.c
2825
sk = st->key[PF_SK_WIRE];
sys/net/pf_ioctl.c
2964
struct pf_state_key_cmp key;
sys/net/pf_ioctl.c
2993
key.af = pnl->af;
sys/net/pf_ioctl.c
2994
key.proto = pnl->proto;
sys/net/pf_ioctl.c
2995
key.rdomain = pnl->rdomain;
sys/net/pf_ioctl.c
2996
pf_addrcpy(&key.addr[sidx], &pnl->saddr, pnl->af);
sys/net/pf_ioctl.c
2997
key.port[sidx] = pnl->sport;
sys/net/pf_ioctl.c
2998
pf_addrcpy(&key.addr[didx], &pnl->daddr, pnl->af);
sys/net/pf_ioctl.c
2999
key.port[didx] = pnl->dport;
sys/net/pf_ioctl.c
3003
st = pf_find_state_all(&key, direction, &m);
sys/net/pf_ioctl.c
3011
sk = st->key[sidx];
sys/net/pf_lb.c
103
res = SipHash24((SIPHASH_KEY *)key, &inaddr->addr32[0],
sys/net/pf_lb.c
127
struct pf_state_key_cmp key;
sys/net/pf_lb.c
157
key.af = pd->naf;
sys/net/pf_lb.c
158
key.proto = pd->proto;
sys/net/pf_lb.c
159
key.rdomain = pd->rdomain;
sys/net/pf_lb.c
160
pf_addrcpy(&key.addr[didx], &pd->ndaddr, key.af);
sys/net/pf_lb.c
161
pf_addrcpy(&key.addr[sidx], naddr, key.af);
sys/net/pf_lb.c
162
key.port[didx] = pd->ndport;
sys/net/pf_lb.c
172
key.port[sidx] = pd->nsport;
sys/net/pf_lb.c
173
key.hash = pf_pkt_hash(key.af, key.proto, &key.addr[0],
sys/net/pf_lb.c
174
&key.addr[1], key.port[0], key.port[1]);
sys/net/pf_lb.c
175
if (pf_find_state_all(&key, dir, NULL) == NULL) {
sys/net/pf_lb.c
180
key.port[sidx] = pd->nsport;
sys/net/pf_lb.c
181
key.hash = pf_pkt_hash(key.af, key.proto, &key.addr[0],
sys/net/pf_lb.c
182
&key.addr[1], key.port[0], key.port[1]);
sys/net/pf_lb.c
183
if (pf_find_state_all(&key, dir, NULL) == NULL) {
sys/net/pf_lb.c
188
key.port[sidx] = htons(low);
sys/net/pf_lb.c
189
key.hash = pf_pkt_hash(key.af, key.proto, &key.addr[0],
sys/net/pf_lb.c
190
&key.addr[1], key.port[0], key.port[1]);
sys/net/pf_lb.c
191
if (pf_find_state_all(&key, dir, NULL) == NULL) {
sys/net/pf_lb.c
207
key.port[sidx] = htons(tmp);
sys/net/pf_lb.c
208
key.hash = pf_pkt_hash(key.af, key.proto,
sys/net/pf_lb.c
209
&key.addr[0], &key.addr[1], key.port[0],
sys/net/pf_lb.c
210
key.port[1]);
sys/net/pf_lb.c
211
if (pf_find_state_all(&key, dir, NULL) ==
sys/net/pf_lb.c
219
key.port[sidx] = htons(tmp);
sys/net/pf_lb.c
220
key.hash = pf_pkt_hash(key.af, key.proto,
sys/net/pf_lb.c
221
&key.addr[0], &key.addr[1], key.port[0],
sys/net/pf_lb.c
222
key.port[1]);
sys/net/pf_lb.c
223
if (pf_find_state_all(&key, dir, NULL) ==
sys/net/pf_lb.c
463
hashidx = pf_hash(saddr, &hash, &rpool->key, af);
sys/net/pf_lb.c
85
struct pf_poolhashkey *key, sa_family_t af)
sys/net/pf_lb.c
927
sks = cur->key[PF_SK_STACK];
sys/net/pf_lb.c
930
sks = cur->key[PF_SK_WIRE];
sys/net/pf_lb.c
940
sks = cur->key[PF_SK_STACK];
sys/net/pf_lb.c
943
sks = cur->key[PF_SK_WIRE];
sys/net/pf_lb.c
954
sks = cur->key[(cur->direction == PF_IN)
sys/net/pf_lb.c
97
res = SipHash24((SIPHASH_KEY *)key,
sys/net/pf_norm.c
270
pf_find_fragment(struct pf_frnode *key, u_int32_t id)
sys/net/pf_norm.c
276
frnode = RB_FIND(pf_frnode_tree, &pf_frnode_tree, key);
sys/net/pf_norm.c
513
pf_fillup_fragment(struct pf_frnode *key, u_int32_t id,
sys/net/pf_norm.c
541
DPFPRINTF(LOG_INFO, key->fn_af == AF_INET ?
sys/net/pf_norm.c
546
frag = pf_find_fragment(key, id);
sys/net/pf_norm.c
559
frnode = RB_FIND(pf_frnode_tree, &pf_frnode_tree, key);
sys/net/pf_norm.c
571
*frnode = *key;
sys/net/pf_norm.c
767
struct pf_frnode key;
sys/net/pf_norm.c
781
key.fn_src.v4 = ip->ip_src;
sys/net/pf_norm.c
782
key.fn_dst.v4 = ip->ip_dst;
sys/net/pf_norm.c
783
key.fn_af = AF_INET;
sys/net/pf_norm.c
784
key.fn_proto = ip->ip_p;
sys/net/pf_norm.c
785
key.fn_direction = dir;
sys/net/pf_norm.c
787
if ((frag = pf_fillup_fragment(&key, ip->ip_id, frent, reason))
sys/net/pf_norm.c
837
struct pf_frnode key;
sys/net/pf_norm.c
853
key.fn_src.v6 = ip6->ip6_src;
sys/net/pf_norm.c
854
key.fn_dst.v6 = ip6->ip6_dst;
sys/net/pf_norm.c
855
key.fn_af = AF_INET6;
sys/net/pf_norm.c
857
key.fn_proto = 0;
sys/net/pf_norm.c
858
key.fn_direction = dir;
sys/net/pf_norm.c
860
if ((frag = pf_fillup_fragment(&key, fraghdr->ip6f_ident, frent,
sys/net/pf_ruleset.c
106
struct pf_anchor *key, *found;
sys/net/pf_ruleset.c
108
key = rs_malloc(sizeof(*key));
sys/net/pf_ruleset.c
109
if (key == NULL)
sys/net/pf_ruleset.c
111
strlcpy(key->path, path, sizeof(key->path));
sys/net/pf_ruleset.c
112
found = RB_FIND(pf_anchor_global, &pf_anchors, key);
sys/net/pf_ruleset.c
113
rs_free(key, sizeof(*key));
sys/net/pf_syncookies.c
100
SIPHASH_KEY key[2];
sys/net/pf_syncookies.c
241
memset(&pf_syncookie_status.key[0], 0,
sys/net/pf_syncookies.c
243
memset(&pf_syncookie_status.key[1], 0,
sys/net/pf_syncookies.c
257
arc4random_buf(&pf_syncookie_status.key[pf_syncookie_status.oddeven],
sys/net/pf_syncookies.c
289
SipHash24_Init(&ctx, &pf_syncookie_status.key[cookie.flags.oddeven]);
sys/net/pf_table.c
1517
struct pfr_ktable *p, *q, *r, *n, *w, key;
sys/net/pf_table.c
1528
if (COPYIN(tbl+i, &key.pfrkt_t, sizeof(key.pfrkt_t), flags))
sys/net/pf_table.c
1530
if (pfr_validate_table(&key.pfrkt_t, PFR_TFLAG_USRMASK,
sys/net/pf_table.c
1533
key.pfrkt_flags |= PFR_TFLAG_ACTIVE;
sys/net/pf_table.c
1534
p = pfr_create_ktable(&key.pfrkt_t, tzero, 0,
sys/net/pf_table.c
1543
key.pfrkt_flags = 0;
sys/net/pf_table.c
1544
memset(key.pfrkt_anchor, 0, sizeof(key.pfrkt_anchor));
sys/net/pf_table.c
1545
p->pfrkt_root = pfr_create_ktable(&key.pfrkt_t, 0, 0,
sys/net/pf_table.c
1685
struct pfr_ktable *p, *q, key;
sys/net/pf_table.c
1692
if (COPYIN(tbl+i, &key.pfrkt_t, sizeof(key.pfrkt_t), flags))
sys/net/pf_table.c
1694
if (pfr_validate_table(&key.pfrkt_t, 0,
sys/net/pf_table.c
1697
p = RB_FIND(pfr_ktablehead, &pfr_ktables, &key);
sys/net/pf_table.c
1798
struct pfr_ktable *p, key;
sys/net/pf_table.c
1806
if (COPYIN(tbl+i, &key.pfrkt_t, sizeof(key.pfrkt_t), flags))
sys/net/pf_table.c
1808
if (pfr_validate_table(&key.pfrkt_t, 0, 0))
sys/net/pf_table.c
1810
p = RB_FIND(pfr_ktablehead, &pfr_ktables, &key);
sys/net/pf_table.c
1829
struct pfr_ktable *p, *q, key;
sys/net/pf_table.c
1840
if (COPYIN(tbl+i, &key.pfrkt_t, sizeof(key.pfrkt_t), flags))
sys/net/pf_table.c
1842
if (pfr_validate_table(&key.pfrkt_t, 0,
sys/net/pf_table.c
1845
p = RB_FIND(pfr_ktablehead, &pfr_ktables, &key);
sys/net/pf_table.c
1914
struct pfr_ktable *kt, *rt, *shadow, key;
sys/net/pf_table.c
1943
bzero(&key, sizeof(key));
sys/net/pf_table.c
1944
strlcpy(key.pfrkt_name, tbl->pfrt_name, sizeof(key.pfrkt_name));
sys/net/pf_table.c
1945
rt = RB_FIND(pfr_ktablehead, &pfr_ktables, &key);
sys/net/pf_table.c
1950
rt = pfr_create_ktable(&key.pfrkt_t, 0, 1,
sys/net/pf_table.c
912
pfr_lookup_kentry(struct pfr_ktable *kt, struct pfr_kentry *key, int exact)
sys/net/pf_table.c
918
switch (key->pfrke_af) {
sys/net/pf_table.c
928
unhandled_af(key->pfrke_af);
sys/net/pf_table.c
930
if (KENTRY_NETWORK(key)) {
sys/net/pf_table.c
931
pfr_prepare_network(&mask, key->pfrke_af, key->pfrke_net);
sys/net/pf_table.c
932
ke = (struct pfr_kentry *)rn_lookup(&key->pfrke_sa, &mask,
sys/net/pf_table.c
935
ke = (struct pfr_kentry *)rn_match(&key->pfrke_sa, head);
sys/net/pfvar.h
1632
struct pfioc_source_entry *key;
sys/net/pfvar.h
343
struct pf_poolhashkey key;
sys/net/pfvar.h
784
struct pfsync_state_key key[2];
sys/net/pfvar_priv.h
126
#define PF_REVERSED_KEY(key, family) \
sys/net/pfvar_priv.h
127
((key[PF_SK_WIRE]->af != key[PF_SK_STACK]->af) && \
sys/net/pfvar_priv.h
128
(key[PF_SK_WIRE]->af != (family)))
sys/net/pfvar_priv.h
161
struct pf_state_key *key[2]; /* [I] stack and wire */
sys/net/pipex_local.h
324
#define PIPEX_ID_HASHTABLE(key) \
sys/net/pipex_local.h
325
(&pipex_id_hashtable[(key) & PIPEX_HASH_MASK])
sys/net/pipex_local.h
326
#define PIPEX_PEER_ADDR_HASHTABLE(key) \
sys/net/pipex_local.h
327
(&pipex_peer_addr_hashtable[(key) & PIPEX_HASH_MASK])
sys/net/toeplitz.c
198
stoeplitz_to_key(void *key, size_t klen)
sys/net/toeplitz.c
200
uint8_t *k = key;
sys/net/trunklacp.c
1003
key = 0;
sys/net/trunklacp.c
1005
key = 1;
sys/net/trunklacp.c
1007
key = 2;
sys/net/trunklacp.c
1009
key = 3;
sys/net/trunklacp.c
1011
key = 4;
sys/net/trunklacp.c
1013
key = 5;
sys/net/trunklacp.c
1015
key = 6;
sys/net/trunklacp.c
1017
key = 7;
sys/net/trunklacp.c
1020
key |= sc->tr_ac.ac_if.if_index << 3;
sys/net/trunklacp.c
1024
key |= 0x4000;
sys/net/trunklacp.c
1026
key &= ~0x4000;
sys/net/trunklacp.c
1029
key &= ~0x8000;
sys/net/trunklacp.c
1031
return (htons(key));
sys/net/trunklacp.c
991
u_int16_t key;
sys/net/trunklacp.c
995
key = lp->lp_ifp->if_index;
sys/net/trunklacp.c
998
key |= 0x8000;
sys/net/wg_cookie.c
208
cookie_precompute_key(uint8_t *key, const uint8_t input[COOKIE_INPUT_SIZE],
sys/net/wg_cookie.c
216
blake2s_final(&blake, key);
sys/net/wg_cookie.c
221
const uint8_t key[COOKIE_KEY_SIZE])
sys/net/wg_cookie.c
224
blake2s_init_key(&state, COOKIE_MAC_SIZE, key, COOKIE_KEY_SIZE);
sys/net/wg_cookie.c
231
const uint8_t key[COOKIE_COOKIE_SIZE])
sys/net/wg_cookie.c
234
blake2s_init_key(&state, COOKIE_MAC_SIZE, key, COOKIE_COOKIE_SIZE);
sys/net/wg_cookie.c
351
uint64_t key, tokens;
sys/net/wg_cookie.c
357
key = SipHash24(&rl->rl_secret, &satosin(sa)->sin_addr,
sys/net/wg_cookie.c
361
key = SipHash24(&rl->rl_secret, &satosin6(sa)->sin6_addr,
sys/net/wg_cookie.c
369
LIST_FOREACH(r, &rl->rl_table[key & rl->rl_table_mask], r_entry) {
sys/net/wg_cookie.c
422
LIST_INSERT_HEAD(&rl->rl_table[key & rl->rl_table_mask], r, r_entry);
sys/net/wg_cookie.c
47
cookie_maker_init(struct cookie_maker *cp, uint8_t key[COOKIE_INPUT_SIZE])
sys/net/wg_cookie.c
50
cookie_precompute_key(cp->cp_mac1_key, key, COOKIE_MAC1_KEY_LABEL);
sys/net/wg_cookie.c
51
cookie_precompute_key(cp->cp_cookie_key, key, COOKIE_COOKIE_KEY_LABEL);
sys/net/wg_cookie.c
77
uint8_t key[COOKIE_INPUT_SIZE])
sys/net/wg_cookie.c
80
if (key) {
sys/net/wg_cookie.c
81
cookie_precompute_key(cc->cc_mac1_key, key, COOKIE_MAC1_KEY_LABEL);
sys/net/wg_cookie.c
82
cookie_precompute_key(cc->cc_cookie_key, key, COOKIE_COOKIE_KEY_LABEL);
sys/net/wg_noise.c
216
uint8_t key[NOISE_SYMMETRIC_KEY_LEN];
sys/net/wg_noise.c
232
if (noise_mix_dh(hs->hs_ck, key, hs->hs_e, r->r_public) != 0)
sys/net/wg_noise.c
237
NOISE_PUBLIC_KEY_LEN, key, hs->hs_hash);
sys/net/wg_noise.c
240
if (noise_mix_ss(hs->hs_ck, key, r->r_ss) != 0)
sys/net/wg_noise.c
246
NOISE_TIMESTAMP_LEN, key, hs->hs_hash);
sys/net/wg_noise.c
256
explicit_bzero(key, NOISE_SYMMETRIC_KEY_LEN);
sys/net/wg_noise.c
268
uint8_t key[NOISE_SYMMETRIC_KEY_LEN];
sys/net/wg_noise.c
282
if (noise_mix_dh(hs.hs_ck, key, l->l_private, ue) != 0)
sys/net/wg_noise.c
287
NOISE_PUBLIC_KEY_LEN + NOISE_AUTHTAG_LEN, key, hs.hs_hash) != 0)
sys/net/wg_noise.c
295
if (noise_mix_ss(hs.hs_ck, key, r->r_ss) != 0)
sys/net/wg_noise.c
300
NOISE_TIMESTAMP_LEN + NOISE_AUTHTAG_LEN, key, hs.hs_hash) != 0)
sys/net/wg_noise.c
332
explicit_bzero(key, NOISE_SYMMETRIC_KEY_LEN);
sys/net/wg_noise.c
342
uint8_t key[NOISE_SYMMETRIC_KEY_LEN];
sys/net/wg_noise.c
367
noise_mix_psk(hs->hs_ck, hs->hs_hash, key, r->r_psk);
sys/net/wg_noise.c
370
noise_msg_encrypt(en, NULL, 0, key, hs->hs_hash);
sys/net/wg_noise.c
379
explicit_bzero(key, NOISE_SYMMETRIC_KEY_LEN);
sys/net/wg_noise.c
390
uint8_t key[NOISE_SYMMETRIC_KEY_LEN];
sys/net/wg_noise.c
419
noise_mix_psk(hs.hs_ck, hs.hs_hash, key, preshared_key);
sys/net/wg_noise.c
423
0 + NOISE_AUTHTAG_LEN, key, hs.hs_hash) != 0)
sys/net/wg_noise.c
439
explicit_bzero(key, NOISE_SYMMETRIC_KEY_LEN);
sys/net/wg_noise.c
54
uint8_t key[NOISE_SYMMETRIC_KEY_LEN],
sys/net/wg_noise.c
831
noise_mix_dh(uint8_t ck[NOISE_HASH_LEN], uint8_t key[NOISE_SYMMETRIC_KEY_LEN],
sys/net/wg_noise.c
839
noise_kdf(ck, key, NULL, dh,
sys/net/wg_noise.c
846
noise_mix_ss(uint8_t ck[NOISE_HASH_LEN], uint8_t key[NOISE_SYMMETRIC_KEY_LEN],
sys/net/wg_noise.c
852
noise_kdf(ck, key, NULL, ss,
sys/net/wg_noise.c
871
uint8_t key[NOISE_SYMMETRIC_KEY_LEN],
sys/net/wg_noise.c
876
noise_kdf(ck, tmp, key, psk,
sys/net/wg_noise.c
902
uint8_t key[NOISE_SYMMETRIC_KEY_LEN], uint8_t hash[NOISE_HASH_LEN])
sys/net/wg_noise.c
906
hash, NOISE_HASH_LEN, 0, key);
sys/net/wg_noise.c
912
uint8_t key[NOISE_SYMMETRIC_KEY_LEN], uint8_t hash[NOISE_HASH_LEN])
sys/net/wg_noise.c
916
hash, NOISE_HASH_LEN, 0, key))
sys/net80211/ieee80211_crypto.c
326
ieee80211_prf(const u_int8_t *key, size_t key_len, const u_int8_t *label,
sys/net80211/ieee80211_crypto.c
335
HMAC_SHA1_Init(&ctx, key, key_len);
sys/net80211/ieee80211_crypto.c
355
ieee80211_kdf(const u_int8_t *key, size_t key_len, const u_int8_t *label,
sys/net80211/ieee80211_crypto.c
365
HMAC_SHA256_Init(&ctx, key, key_len);
sys/net80211/ieee80211_crypto.c
474
ieee80211_eapol_key_mic(struct ieee80211_eapol_key *key, const u_int8_t *kck)
sys/net80211/ieee80211_crypto.c
480
len = BE_READ_2(key->len) + 4;
sys/net80211/ieee80211_crypto.c
482
switch (BE_READ_2(key->info) & EAPOL_KEY_VERSION_MASK) {
sys/net80211/ieee80211_crypto.c
485
HMAC_MD5_Update(&ctx.md5, (u_int8_t *)key, len);
sys/net80211/ieee80211_crypto.c
486
HMAC_MD5_Final(key->mic, &ctx.md5);
sys/net80211/ieee80211_crypto.c
490
HMAC_SHA1_Update(&ctx.sha1, (u_int8_t *)key, len);
sys/net80211/ieee80211_crypto.c
493
memcpy(key->mic, digest, EAPOL_KEY_MIC_LEN);
sys/net80211/ieee80211_crypto.c
498
AES_CMAC_Update(&ctx.cmac, (u_int8_t *)key, len);
sys/net80211/ieee80211_crypto.c
499
AES_CMAC_Final(key->mic, &ctx.cmac);
sys/net80211/ieee80211_crypto.c
509
ieee80211_eapol_key_check_mic(struct ieee80211_eapol_key *key,
sys/net80211/ieee80211_crypto.c
514
memcpy(mic, key->mic, EAPOL_KEY_MIC_LEN);
sys/net80211/ieee80211_crypto.c
515
memset(key->mic, 0, EAPOL_KEY_MIC_LEN);
sys/net80211/ieee80211_crypto.c
516
ieee80211_eapol_key_mic(key, kck);
sys/net80211/ieee80211_crypto.c
518
return timingsafe_bcmp(key->mic, mic, EAPOL_KEY_MIC_LEN) != 0;
sys/net80211/ieee80211_crypto.c
529
struct ieee80211_eapol_key *key, const u_int8_t *kek)
sys/net80211/ieee80211_crypto.c
540
len = BE_READ_2(key->paylen);
sys/net80211/ieee80211_crypto.c
541
info = BE_READ_2(key->info);
sys/net80211/ieee80211_crypto.c
542
data = (u_int8_t *)(key + 1);
sys/net80211/ieee80211_crypto.c
547
memcpy(key->iv, ic->ic_globalcnt + 16, 16);
sys/net80211/ieee80211_crypto.c
553
memcpy(keybuf, key->iv, EAPOL_KEY_IV_LEN);
sys/net80211/ieee80211_crypto.c
574
BE_WRITE_2(key->paylen, len);
sys/net80211/ieee80211_crypto.c
576
BE_WRITE_2(key->len, sizeof(*key) + len - 4);
sys/net80211/ieee80211_crypto.c
588
ieee80211_eapol_key_decrypt(struct ieee80211_eapol_key *key,
sys/net80211/ieee80211_crypto.c
599
len = BE_READ_2(key->paylen);
sys/net80211/ieee80211_crypto.c
600
info = BE_READ_2(key->info);
sys/net80211/ieee80211_crypto.c
601
data = (u_int8_t *)(key + 1);
sys/net80211/ieee80211_crypto.c
606
memcpy(keybuf, key->iv, EAPOL_KEY_IV_LEN);
sys/net80211/ieee80211_crypto.c
632
const u_int8_t *macaddr, const u_int8_t *key, u_int32_t lifetime)
sys/net80211/ieee80211_crypto.c
650
memcpy(pmk->pmk_key, key, IEEE80211_PMK_LEN);
sys/net80211/ieee80211_crypto_tkip.c
119
ieee80211_tkip_mic(struct mbuf *m0, int off, const u_int8_t *key,
sys/net80211/ieee80211_crypto_tkip.c
159
michael_key(key, &ctx);
sys/net80211/ieee80211_pae_input.c
1005
if (BE_READ_8(key->replaycnt) <= ni->ni_replaycnt) {
sys/net80211/ieee80211_pae_input.c
101
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_input.c
1010
if (ieee80211_eapol_key_check_mic(key, ni->ni_ptk.kck) != 0) {
sys/net80211/ieee80211_pae_input.c
1019
if (ieee80211_eapol_key_decrypt(key, ni->ni_ptk.kek) != 0) {
sys/net80211/ieee80211_pae_input.c
1026
if (BE_READ_2(key->keylen) != keylen)
sys/net80211/ieee80211_pae_input.c
103
if (key->type != EAPOL_KEY)
sys/net80211/ieee80211_pae_input.c
1030
if (BE_READ_2(key->paylen) < keylen)
sys/net80211/ieee80211_pae_input.c
1033
info = BE_READ_2(key->info);
sys/net80211/ieee80211_pae_input.c
1038
gtk = (const uint8_t *)&key[1]; /* key data field contains the GTK */
sys/net80211/ieee80211_pae_input.c
1046
k->k_rsc[0] = LE_READ_6(key->rsc);
sys/net80211/ieee80211_pae_input.c
1075
ni->ni_replaycnt = BE_READ_8(key->replaycnt);
sys/net80211/ieee80211_pae_input.c
108
key->desc != EAPOL_KEY_DESC_IEEE80211) ||
sys/net80211/ieee80211_pae_input.c
1092
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_input.c
110
key->desc != EAPOL_KEY_DESC_WPA))
sys/net80211/ieee80211_pae_input.c
1105
if (BE_READ_8(key->replaycnt) != ni->ni_replaycnt) {
sys/net80211/ieee80211_pae_input.c
1110
if (ieee80211_eapol_key_check_mic(key, ni->ni_ptk.kck) != 0) {
sys/net80211/ieee80211_pae_input.c
114
bodylen = BE_READ_2(key->len);
sys/net80211/ieee80211_pae_input.c
1145
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_input.c
1160
BE_READ_8(key->replaycnt) <= ni->ni_reqreplaycnt) {
sys/net80211/ieee80211_pae_input.c
1164
info = BE_READ_2(key->info);
sys/net80211/ieee80211_pae_input.c
1167
ieee80211_eapol_key_check_mic(key, ni->ni_ptk.kck) != 0) {
sys/net80211/ieee80211_pae_input.c
1173
ni->ni_reqreplaycnt = BE_READ_8(key->replaycnt);
sys/net80211/ieee80211_pae_input.c
1185
ieee80211_michael_mic_failure(ic, LE_READ_6(key->rsc));
sys/net80211/ieee80211_pae_input.c
120
paylen = BE_READ_2(key->paylen);
sys/net80211/ieee80211_pae_input.c
121
if (paylen > totlen - sizeof(*key))
sys/net80211/ieee80211_pae_input.c
124
info = BE_READ_2(key->info);
sys/net80211/ieee80211_pae_input.c
145
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_input.c
151
ieee80211_recv_eapol_key_req(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
157
ieee80211_recv_4way_msg3(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
160
ieee80211_recv_4way_msg2or4(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
163
ieee80211_recv_4way_msg1(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
169
if (key->desc == EAPOL_KEY_DESC_WPA)
sys/net80211/ieee80211_pae_input.c
170
ieee80211_recv_wpa_group_msg1(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
172
ieee80211_recv_rsn_group_msg1(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
176
ieee80211_recv_group_msg2(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
188
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_input.c
210
BE_READ_8(key->replaycnt) <= ni->ni_replaycnt) {
sys/net80211/ieee80211_pae_input.c
216
frm = (const u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_input.c
217
efrm = frm + BE_READ_2(key->paylen);
sys/net80211/ieee80211_pae_input.c
257
memcpy(ni->ni_nonce, key->nonce, EAPOL_KEY_NONCE_LEN);
sys/net80211/ieee80211_pae_input.c
275
(void)ieee80211_send_4way_msg2(ic, ni, key->replaycnt, &tptk);
sys/net80211/ieee80211_pae_input.c
284
struct ieee80211_eapol_key *key, struct ieee80211_node *ni,
sys/net80211/ieee80211_pae_input.c
305
ni->ni_macaddr, ni->ni_nonce, key->nonce, &tptk);
sys/net80211/ieee80211_pae_input.c
308
if (ieee80211_eapol_key_check_mic(key, tptk.kck) != 0) {
sys/net80211/ieee80211_pae_input.c
362
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_input.c
384
BE_READ_8(key->replaycnt) <= ni->ni_replaycnt) {
sys/net80211/ieee80211_pae_input.c
395
if (memcmp(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN) != 0) {
sys/net80211/ieee80211_pae_input.c
401
ic->ic_myaddr, key->nonce, ic->ic_nonce, &tptk);
sys/net80211/ieee80211_pae_input.c
403
info = BE_READ_2(key->info);
sys/net80211/ieee80211_pae_input.c
406
if (ieee80211_eapol_key_check_mic(key, tptk.kck) != 0) {
sys/net80211/ieee80211_pae_input.c
416
ieee80211_eapol_key_decrypt(key, ni->ni_ptk.kek) != 0) {
sys/net80211/ieee80211_pae_input.c
422
frm = (const u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_input.c
423
efrm = frm + BE_READ_2(key->paylen);
sys/net80211/ieee80211_pae_input.c
525
ni->ni_replaycnt = BE_READ_8(key->replaycnt);
sys/net80211/ieee80211_pae_input.c
554
if (BE_READ_2(key->keylen) != keylen) {
sys/net80211/ieee80211_pae_input.c
558
prsc = (gtk == NULL) ? LE_READ_6(key->rsc) : 0;
sys/net80211/ieee80211_pae_input.c
604
k->k_rsc[0] = LE_READ_6(key->rsc);
sys/net80211/ieee80211_pae_input.c
696
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_input.c
711
if (ieee80211_eapol_key_check_mic(key, ni->ni_ptk.kck) != 0) {
sys/net80211/ieee80211_pae_input.c
768
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_input.c
773
if (BE_READ_8(key->replaycnt) != ni->ni_replaycnt) {
sys/net80211/ieee80211_pae_input.c
779
frm = (const u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_input.c
780
efrm = frm + BE_READ_2(key->paylen);
sys/net80211/ieee80211_pae_input.c
804
ieee80211_recv_4way_msg2(ic, key, ni, rsnie);
sys/net80211/ieee80211_pae_input.c
806
ieee80211_recv_4way_msg4(ic, key, ni);
sys/net80211/ieee80211_pae_input.c
81
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_input.c
815
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_input.c
834
if (BE_READ_8(key->replaycnt) <= ni->ni_replaycnt) {
sys/net80211/ieee80211_pae_input.c
839
if (ieee80211_eapol_key_check_mic(key, ni->ni_ptk.kck) != 0) {
sys/net80211/ieee80211_pae_input.c
844
info = BE_READ_2(key->info);
sys/net80211/ieee80211_pae_input.c
848
ieee80211_eapol_key_decrypt(key, ni->ni_ptk.kek) != 0) {
sys/net80211/ieee80211_pae_input.c
854
frm = (const u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_input.c
855
efrm = frm + BE_READ_2(key->paylen);
sys/net80211/ieee80211_pae_input.c
901
k->k_rsc[0] = LE_READ_6(key->rsc);
sys/net80211/ieee80211_pae_input.c
94
if (m->m_pkthdr.len < sizeof(*key))
sys/net80211/ieee80211_pae_input.c
96
if (m->m_len < sizeof(*key) &&
sys/net80211/ieee80211_pae_input.c
966
ni->ni_replaycnt = BE_READ_8(key->replaycnt);
sys/net80211/ieee80211_pae_input.c
97
(m = m_pullup(m, sizeof(*key))) == NULL) {
sys/net80211/ieee80211_pae_input.c
986
struct ieee80211_eapol_key *key, struct ieee80211_node *ni)
sys/net80211/ieee80211_pae_output.c
100
BE_WRITE_2(key->len, len - 4);
sys/net80211/ieee80211_pae_output.c
107
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
109
ieee80211_eapol_key_encrypt(ic, key, ptk->kek);
sys/net80211/ieee80211_pae_output.c
114
sizeof(*eh) + 4 + BE_READ_2(key->len);
sys/net80211/ieee80211_pae_output.c
119
ieee80211_eapol_key_mic(key, ptk->kck);
sys/net80211/ieee80211_pae_output.c
258
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
274
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_output.c
275
memset(key, 0, sizeof(*key));
sys/net80211/ieee80211_pae_output.c
278
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
281
memcpy(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN);
sys/net80211/ieee80211_pae_output.c
284
BE_WRITE_2(key->keylen, keylen);
sys/net80211/ieee80211_pae_output.c
286
frm = (u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_output.c
292
m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
sys/net80211/ieee80211_pae_output.c
300
BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
sys/net80211/ieee80211_pae_output.c
313
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
325
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_output.c
326
memset(key, 0, sizeof(*key));
sys/net80211/ieee80211_pae_output.c
329
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
332
memcpy(key->replaycnt, replaycnt, 8);
sys/net80211/ieee80211_pae_output.c
335
memcpy(key->nonce, ic->ic_nonce, EAPOL_KEY_NONCE_LEN);
sys/net80211/ieee80211_pae_output.c
337
frm = (u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_output.c
344
BE_WRITE_2(key->keylen, keylen);
sys/net80211/ieee80211_pae_output.c
348
m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
sys/net80211/ieee80211_pae_output.c
365
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
390
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_output.c
391
memset(key, 0, sizeof(*key));
sys/net80211/ieee80211_pae_output.c
398
memcpy(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN);
sys/net80211/ieee80211_pae_output.c
401
BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
sys/net80211/ieee80211_pae_output.c
404
BE_WRITE_2(key->keylen, keylen);
sys/net80211/ieee80211_pae_output.c
406
frm = (u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_output.c
412
LE_WRITE_6(key->rsc, k->k_tsc);
sys/net80211/ieee80211_pae_output.c
424
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
426
m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
sys/net80211/ieee80211_pae_output.c
443
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
451
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_output.c
452
memset(key, 0, sizeof(*key));
sys/net80211/ieee80211_pae_output.c
457
BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
sys/net80211/ieee80211_pae_output.c
463
BE_WRITE_2(key->keylen, keylen);
sys/net80211/ieee80211_pae_output.c
468
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
471
m->m_pkthdr.len = m->m_len = sizeof(*key);
sys/net80211/ieee80211_pae_output.c
488
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
515
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_output.c
516
memset(key, 0, sizeof(*key));
sys/net80211/ieee80211_pae_output.c
522
BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
sys/net80211/ieee80211_pae_output.c
524
frm = (u_int8_t *)&key[1];
sys/net80211/ieee80211_pae_output.c
527
BE_WRITE_2(key->keylen, k->k_len);
sys/net80211/ieee80211_pae_output.c
545
LE_WRITE_6(key->rsc, k->k_tsc);
sys/net80211/ieee80211_pae_output.c
548
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
550
m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
sys/net80211/ieee80211_pae_output.c
568
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
575
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_output.c
576
memset(key, 0, sizeof(*key));
sys/net80211/ieee80211_pae_output.c
581
BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
sys/net80211/ieee80211_pae_output.c
585
BE_WRITE_2(key->keylen, k->k_len);
sys/net80211/ieee80211_pae_output.c
590
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
593
m->m_pkthdr.len = m->m_len = sizeof(*key);
sys/net80211/ieee80211_pae_output.c
612
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
618
key = mtod(m, struct ieee80211_eapol_key *);
sys/net80211/ieee80211_pae_output.c
619
memset(key, 0, sizeof(*key));
sys/net80211/ieee80211_pae_output.c
622
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
626
LE_WRITE_6(key->rsc, tsc);
sys/net80211/ieee80211_pae_output.c
629
BE_WRITE_8(key->replaycnt, ni->ni_reqreplaycnt);
sys/net80211/ieee80211_pae_output.c
633
m->m_pkthdr.len = m->m_len = sizeof(*key);
sys/net80211/ieee80211_pae_output.c
67
struct ieee80211_eapol_key *key;
sys/net80211/ieee80211_pae_output.c
80
key = (struct ieee80211_eapol_key *)&eh[1];
sys/net80211/ieee80211_pae_output.c
81
key->version = EAPOL_VERSION;
sys/net80211/ieee80211_pae_output.c
82
key->type = EAPOL_KEY;
sys/net80211/ieee80211_pae_output.c
83
key->desc = (ni->ni_rsnprotos == IEEE80211_PROTO_RSN) ?
sys/net80211/ieee80211_pae_output.c
86
info = BE_READ_2(key->info);
sys/net80211/ieee80211_pae_output.c
96
BE_WRITE_2(key->info, info);
sys/net80211/ieee80211_pae_output.c
99
BE_WRITE_2(key->paylen, len - sizeof(*key));
sys/net80211/ieee80211_regdomain.c
100
if ((value = bsearch(&key, &ieee80211_r_ctry,
sys/net80211/ieee80211_regdomain.c
112
struct ieee80211_regdomainname key;
sys/net80211/ieee80211_regdomain.c
114
key.rn_domain = DMN_DEFAULT;
sys/net80211/ieee80211_regdomain.c
115
key.rn_name = name;
sys/net80211/ieee80211_regdomain.c
117
if ((value = bsearch(&key, &ieee80211_r_names,
sys/net80211/ieee80211_regdomain.c
60
bsearch(const void *key, const void *base0, size_t nmemb, size_t size,
sys/net80211/ieee80211_regdomain.c
69
cmp = (*compar)(key, p);
sys/net80211/ieee80211_regdomain.c
98
const struct ieee80211_countryname key = { CTRY_DEFAULT, name }, *value;
sys/netinet/ip_ipsp.c
1281
struct ipsec_ids key;
sys/netinet/ip_ipsp.c
1284
key.id_flow = ipsecflowinfo;
sys/netinet/ip_ipsp.c
1287
ids = RBT_FIND(ipsec_ids_flows, &ipsec_ids_flows, &key);
sys/netinet/raw_ip.c
136
struct in_addr *key;
sys/netinet/raw_ip.c
146
key = &ip->ip_dst;
sys/netinet/raw_ip.c
155
key = &divert->addr.v4;
sys/netinet/raw_ip.c
185
inp->inp_laddr.s_addr != key->s_addr)
sys/netinet6/raw_ip6.c
136
struct in6_addr *key;
sys/netinet6/raw_ip6.c
158
key = &ip6->ip6_dst;
sys/netinet6/raw_ip6.c
167
key = &divert->addr.v6;
sys/netinet6/raw_ip6.c
198
!IN6_ARE_ADDR_EQUAL(&inp->inp_laddr6, key))
sys/nfs/nfs_boot.c
223
nfs_boot_getfh(struct sockaddr_in *bpsin, char *key,
sys/nfs/nfs_boot.c
262
error = bp_getfile(bpsin, key, sin, ndmntp->ndm_host, pathname,
sys/nfs/nfs_boot.c
265
printf("nfs_boot: bootparam get %s: %d\n", key, error);
sys/nfs/nfs_boot.c
275
printf("nfs_boot: mountd %s, error=%d\n", key, error);
sys/nfs/nfs_boot.c
422
bp_getfile(struct sockaddr_in *bpsin, char *key, struct sockaddr_in *md_sin,
sys/nfs/nfs_boot.c
440
m->m_next = xdr_string_encode(key, strlen(key));
sys/nfs/nfs_boot.c
67
nfs_boot_getfh(struct sockaddr_in *bpsin, char *key,
sys/nfs/nfs_boot.c
99
static int bp_getfile(struct sockaddr_in *bpsin, char *key,
sys/nfs/nfsdiskless.h
66
int nfs_boot_getfh(struct sockaddr_in *bpsin, char *key,
sys/scsi/cd.c
1699
dvd_copy_key(a->lsk.key, &buf[4]);
sys/scsi/cd.c
1756
dvd_copy_key(&buf[4], a->hsk.key);
sys/sys/cdio.h
371
u_int8_t key[DVD_KEY_SIZE];
sys/sys/ipc.h
60
key_t key; /* user specified msg/sem/shm key */
sys/sys/syscallargs.h
1016
syscallarg(key_t) key;
sys/sys/syscallargs.h
902
syscallarg(key_t) key;
sys/sys/syscallargs.h
908
syscallarg(key_t) key;
sys/sys/tree.h
843
_name##_RBT_FIND(struct _name *head, const struct _type *key) \
sys/sys/tree.h
845
return _rb_find(_name##_RBT_TYPE, &head->rbh_root, key); \
sys/sys/tree.h
849
_name##_RBT_NFIND(struct _name *head, const struct _type *key) \
sys/sys/tree.h
851
return _rb_nfind(_name##_RBT_TYPE, &head->rbh_root, key); \
sys/uvm/uvm_swap.c
1584
struct swap_key *key;
sys/uvm/uvm_swap.c
1586
key = SWD_KEY(sdp, startslot + i);
sys/uvm/uvm_swap.c
1587
if (key->refcount != 0)
sys/uvm/uvm_swap.c
1588
swap_key_put(key);
sys/uvm/uvm_swap.c
1780
struct swap_key *key;
sys/uvm/uvm_swap.c
1783
key = SWD_KEY(sdp, startslot + i);
sys/uvm/uvm_swap.c
1784
swap_key_get(key); /* add reference */
sys/uvm/uvm_swap.c
1786
swap_encrypt(key, src, dst, block, PAGE_SIZE);
sys/uvm/uvm_swap.c
1884
struct swap_key *key;
sys/uvm/uvm_swap.c
1889
key = SWD_KEY(sdp, startslot + i);
sys/uvm/uvm_swap.c
1890
if (key->refcount == 0) {
sys/uvm/uvm_swap.c
1894
swap_decrypt(key, data, dst, block, PAGE_SIZE);
sys/uvm/uvm_swap.c
410
struct swap_key *key;
sys/uvm/uvm_swap.c
419
key = sdp->swd_keys + (SWD_KEY_SIZE(nkeys) - 1);
sys/uvm/uvm_swap.c
421
if (key->refcount != 0)
sys/uvm/uvm_swap.c
422
swap_key_delete(key);
sys/uvm/uvm_swap.c
423
} while (key-- != sdp->swd_keys);
sys/uvm/uvm_swap_encrypt.c
102
swap_key_cleanup(key);
sys/uvm/uvm_swap_encrypt.c
104
explicit_bzero(key, sizeof(*key));
sys/uvm/uvm_swap_encrypt.c
114
swap_encrypt(struct swap_key *key, caddr_t src, caddr_t dst, u_int64_t block,
sys/uvm/uvm_swap_encrypt.c
125
swap_key_prepare(key, 1);
sys/uvm/uvm_swap_encrypt.c
159
swap_decrypt(struct swap_key *key, caddr_t src, caddr_t dst, u_int64_t block,
sys/uvm/uvm_swap_encrypt.c
170
swap_key_prepare(key, 0);
sys/uvm/uvm_swap_encrypt.c
200
swap_key_prepare(struct swap_key *key, int encrypt)
sys/uvm/uvm_swap_encrypt.c
207
if (kcur == key && (encrypt || !swap_ctxt.enc_only))
sys/uvm/uvm_swap_encrypt.c
211
rijndael_set_key_enc_only(&swap_ctxt, (u_char *)key->key,
sys/uvm/uvm_swap_encrypt.c
212
sizeof(key->key) * 8);
sys/uvm/uvm_swap_encrypt.c
214
rijndael_set_key(&swap_ctxt, (u_char *)key->key,
sys/uvm/uvm_swap_encrypt.c
215
sizeof(key->key) * 8);
sys/uvm/uvm_swap_encrypt.c
217
kcur = key;
sys/uvm/uvm_swap_encrypt.c
225
swap_key_cleanup(struct swap_key *key)
sys/uvm/uvm_swap_encrypt.c
228
if (kcur == NULL || kcur != key)
sys/uvm/uvm_swap_encrypt.c
92
swap_key_create(struct swap_key *key)
sys/uvm/uvm_swap_encrypt.c
94
arc4random_buf(key->key, sizeof(key->key));
sys/uvm/uvm_swap_encrypt.c
99
swap_key_delete(struct swap_key *key)
sys/uvm/uvm_swap_encrypt.h
50
u_int32_t key[SWAP_KEY_SIZE]; /* secret key for swap range */
sys/uvm/uvm_swap_encrypt.h
67
swap_key_get(struct swap_key *key)
sys/uvm/uvm_swap_encrypt.h
69
if (key->refcount == 0)
sys/uvm/uvm_swap_encrypt.h
70
swap_key_create(key);
sys/uvm/uvm_swap_encrypt.h
71
key->refcount++;
sys/uvm/uvm_swap_encrypt.h
75
swap_key_put(struct swap_key *key)
sys/uvm/uvm_swap_encrypt.h
77
key->refcount--;
sys/uvm/uvm_swap_encrypt.h
78
if (key->refcount == 0)
sys/uvm/uvm_swap_encrypt.h
79
swap_key_delete(key);
usr.bin/awk/b.c
632
gtte key;
usr.bin/awk/b.c
635
key.ch = ch;
usr.bin/awk/b.c
636
key.state = 0; /* irrelevant */
usr.bin/awk/b.c
637
item = (gtte *) bsearch(& key, f->gototab[state].entries,
usr.bin/awk/b.c
676
gtte key;
usr.bin/awk/b.c
679
key.ch = ch;
usr.bin/awk/b.c
680
key.state = 0; /* irrelevant */
usr.bin/awk/b.c
681
item = (gtte *) bsearch(& key, f->gototab[state].entries,
usr.bin/banner/banner.c
65
scnline(int key, char *p, int c)
usr.bin/banner/banner.c
77
key <<= 1;
usr.bin/banner/banner.c
78
*p++ = key & 0200 ? c : BACKGND;
usr.bin/bc/bc.y
867
entry.key = str;
usr.bin/bc/bc.y
882
entry.key = strdup(str);
usr.bin/bc/bc.y
883
if (entry.key == NULL)
usr.bin/cap_mkdb/cap_mkdb.c
144
DBT key, data;
usr.bin/cap_mkdb/cap_mkdb.c
153
key.data = NULL;
usr.bin/cap_mkdb/cap_mkdb.c
216
key.data = bp;
usr.bin/cap_mkdb/cap_mkdb.c
217
key.size = p - bp;
usr.bin/cap_mkdb/cap_mkdb.c
219
switch(capdbp->put(capdbp, &key, &data, R_NOOVERWRITE)) {
usr.bin/cap_mkdb/cap_mkdb.c
225
(int)key.size, (char *)key.data);
usr.bin/cap_mkdb/cap_mkdb.c
236
(void) memmove(&((u_char *)(data.data))[1], key.data, key.size);
usr.bin/cap_mkdb/cap_mkdb.c
237
data.size = key.size + 1;
usr.bin/cap_mkdb/cap_mkdb.c
242
key.size = p - t;
usr.bin/cap_mkdb/cap_mkdb.c
243
key.data = t;
usr.bin/cap_mkdb/cap_mkdb.c
251
memchr(key.data, ' ', key.size) != NULL)
usr.bin/cap_mkdb/cap_mkdb.c
255
&key, &data, R_NOOVERWRITE)) {
usr.bin/cap_mkdb/cap_mkdb.c
261
(int)key.size, (char *)key.data);
usr.bin/cdio/cddb.c
122
char *key;
usr.bin/cdio/cddb.c
125
key = strchr(line, ' ');
usr.bin/cdio/cddb.c
126
if (!key)
usr.bin/cdio/cddb.c
128
*key++ = 0;
usr.bin/cdio/cddb.c
129
title = strchr(key, ' ');
usr.bin/cdio/cddb.c
137
fprintf(cout, "CDDB READ %s %s\r\n", line, key);
usr.bin/chpass/getpwent.c
128
DBT key;
usr.bin/chpass/getpwent.c
140
key.data = (u_char *)bf;
usr.bin/chpass/getpwent.c
141
key.size = 1 + sizeof(_pw_keynum);
usr.bin/chpass/getpwent.c
142
if (__hashpw(&key, pwbuf, buflen, pw, &_pw_flags)) {
usr.bin/chpass/getpwent.c
156
DBT key;
usr.bin/chpass/getpwent.c
164
key.data = (u_char *)bf;
usr.bin/chpass/getpwent.c
165
key.size = 1 + MINIMUM(len, _PW_NAME_LEN);
usr.bin/chpass/getpwent.c
166
r = __hashpw(&key, buf, buflen, pw, flagsp);
usr.bin/chpass/getpwent.c
177
DBT key;
usr.bin/chpass/getpwent.c
182
key.data = (u_char *)bf;
usr.bin/chpass/getpwent.c
183
key.size = 1 + sizeof(uid);
usr.bin/chpass/getpwent.c
184
r = __hashpw(&key, buf, buflen, pw, flagsp);
usr.bin/chpass/getpwent.c
391
__hashpw(DBT *key, char *buf, size_t buflen, struct passwd *pw,
usr.bin/chpass/getpwent.c
397
if ((_pw_db->get)(_pw_db, key, &data, 0))
usr.bin/ctags/C.c
518
skip_string(int key)
usr.bin/ctags/C.c
532
if (c == key && !skip)
usr.bin/ctags/C.c
543
skip_key(int key)
usr.bin/ctags/C.c
580
if (c == key && !skip)
usr.bin/ctfconv/hash.c
120
const char *key)
usr.bin/ctfconv/hash.c
122
p->hkey = key;
usr.bin/cvs/hash.c
71
hash_table_find(struct hash_table *htable, const char *key, size_t len)
usr.bin/cvs/hash.c
77
hashv = hash4(key, len);
usr.bin/cvs/hash.c
81
if (!strcmp(entry->h_data.h_key, key))
usr.bin/cvs/hash_func.c
42
hash4(const char *key, size_t len)
usr.bin/cvs/hash_func.c
50
k = key;
usr.bin/dig/dighost.c
914
dst_key_setbits(tsigkey->key, digestbits);
usr.bin/dig/lib/dns/dst_api.c
130
dst_context_create3(dst_key_t *key,
usr.bin/dig/lib/dns/dst_api.c
144
dst_key_attach(key, &dctx->key);
usr.bin/dig/lib/dns/dst_api.c
150
result = key->func->createctx(key, dctx);
usr.bin/dig/lib/dns/dst_api.c
152
if (dctx->key != NULL)
usr.bin/dig/lib/dns/dst_api.c
153
dst_key_free(&dctx->key);
usr.bin/dig/lib/dns/dst_api.c
168
dctx->key->func->destroyctx(dctx);
usr.bin/dig/lib/dns/dst_api.c
169
if (dctx->key != NULL)
usr.bin/dig/lib/dns/dst_api.c
170
dst_key_free(&dctx->key);
usr.bin/dig/lib/dns/dst_api.c
178
return (dctx->key->func->adddata(dctx, data));
usr.bin/dig/lib/dns/dst_api.c
183
dst_key_t *key;
usr.bin/dig/lib/dns/dst_api.c
187
key = dctx->key;
usr.bin/dig/lib/dns/dst_api.c
188
CHECKALG(key->key_alg);
usr.bin/dig/lib/dns/dst_api.c
190
return (key->func->sign(dctx, sig));
usr.bin/dig/lib/dns/dst_api.c
197
CHECKALG(dctx->key->key_alg);
usr.bin/dig/lib/dns/dst_api.c
199
return (dctx->key->func->verify(dctx, sig));
usr.bin/dig/lib/dns/dst_api.c
203
dst_key_todns(const dst_key_t *key, isc_buffer_t *target) {
usr.bin/dig/lib/dns/dst_api.c
207
CHECKALG(key->key_alg);
usr.bin/dig/lib/dns/dst_api.c
211
isc_buffer_putuint16(target, (uint16_t)(key->key_flags & 0xffff));
usr.bin/dig/lib/dns/dst_api.c
212
isc_buffer_putuint8(target, (uint8_t)key->key_proto);
usr.bin/dig/lib/dns/dst_api.c
213
isc_buffer_putuint8(target, (uint8_t)key->key_alg);
usr.bin/dig/lib/dns/dst_api.c
215
if (key->key_flags & DNS_KEYFLAG_EXTENDED) {
usr.bin/dig/lib/dns/dst_api.c
219
(uint16_t)((key->key_flags >> 16)
usr.bin/dig/lib/dns/dst_api.c
223
return (key->func->todns(key, target));
usr.bin/dig/lib/dns/dst_api.c
230
dst_key_t *key = NULL;
usr.bin/dig/lib/dns/dst_api.c
235
result = frombuffer(alg, flags, protocol, source, &key);
usr.bin/dig/lib/dns/dst_api.c
239
result = computeid(key);
usr.bin/dig/lib/dns/dst_api.c
241
dst_key_free(&key);
usr.bin/dig/lib/dns/dst_api.c
245
*keyp = key;
usr.bin/dig/lib/dns/dst_api.c
261
dst_key_t *key;
usr.bin/dig/lib/dns/dst_api.c
267
key = *keyp;
usr.bin/dig/lib/dns/dst_api.c
269
isc_refcount_decrement(&key->refs, &refs);
usr.bin/dig/lib/dns/dst_api.c
273
isc_refcount_destroy(&key->refs);
usr.bin/dig/lib/dns/dst_api.c
274
key->func->destroy(key);
usr.bin/dig/lib/dns/dst_api.c
275
freezero(key, sizeof(*key));
usr.bin/dig/lib/dns/dst_api.c
280
dst_key_sigsize(const dst_key_t *key, unsigned int *n) {
usr.bin/dig/lib/dns/dst_api.c
285
switch (key->key_alg) {
usr.bin/dig/lib/dns/dst_api.c
319
dst_key_t *key;
usr.bin/dig/lib/dns/dst_api.c
322
key = (dst_key_t *) malloc(sizeof(dst_key_t));
usr.bin/dig/lib/dns/dst_api.c
323
if (key == NULL)
usr.bin/dig/lib/dns/dst_api.c
326
memset(key, 0, sizeof(dst_key_t));
usr.bin/dig/lib/dns/dst_api.c
328
result = isc_refcount_init(&key->refs, 1);
usr.bin/dig/lib/dns/dst_api.c
330
free(key);
usr.bin/dig/lib/dns/dst_api.c
333
key->key_alg = alg;
usr.bin/dig/lib/dns/dst_api.c
334
key->key_flags = flags;
usr.bin/dig/lib/dns/dst_api.c
335
key->key_proto = protocol;
usr.bin/dig/lib/dns/dst_api.c
336
key->key_size = bits;
usr.bin/dig/lib/dns/dst_api.c
337
key->func = dst_t_func[alg];
usr.bin/dig/lib/dns/dst_api.c
338
return (key);
usr.bin/dig/lib/dns/dst_api.c
342
computeid(dst_key_t *key) {
usr.bin/dig/lib/dns/dst_api.c
349
ret = dst_key_todns(key, &dnsbuf);
usr.bin/dig/lib/dns/dst_api.c
361
dst_key_t *key;
usr.bin/dig/lib/dns/dst_api.c
367
key = get_key_struct(alg, flags, protocol, 0);
usr.bin/dig/lib/dns/dst_api.c
368
if (key == NULL)
usr.bin/dig/lib/dns/dst_api.c
374
dst_key_free(&key);
usr.bin/dig/lib/dns/dst_api.c
378
ret = key->func->fromdns(key, source);
usr.bin/dig/lib/dns/dst_api.c
380
dst_key_free(&key);
usr.bin/dig/lib/dns/dst_api.c
385
*keyp = key;
usr.bin/dig/lib/dns/dst_api.c
63
static isc_result_t computeid(dst_key_t *key);
usr.bin/dig/lib/dns/dst_internal.h
108
isc_result_t (*createctx)(dst_key_t *key, dst_context_t *dctx);
usr.bin/dig/lib/dns/dst_internal.h
117
void (*destroy)(dst_key_t *key);
usr.bin/dig/lib/dns/dst_internal.h
120
isc_result_t (*todns)(const dst_key_t *key, isc_buffer_t *data);
usr.bin/dig/lib/dns/dst_internal.h
121
isc_result_t (*fromdns)(dst_key_t *key, isc_buffer_t *data);
usr.bin/dig/lib/dns/dst_internal.h
93
dst_key_t *key;
usr.bin/dig/lib/dns/hmac_link.c
116
hmacsha1_destroy(dst_key_t *key) {
usr.bin/dig/lib/dns/hmac_link.c
117
dst_hmacsha1_key_t *hkey = key->keydata.hmacsha1;
usr.bin/dig/lib/dns/hmac_link.c
120
key->keydata.hmacsha1 = NULL;
usr.bin/dig/lib/dns/hmac_link.c
124
hmacsha1_todns(const dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
128
REQUIRE(key->keydata.hmacsha1 != NULL);
usr.bin/dig/lib/dns/hmac_link.c
130
hkey = key->keydata.hmacsha1;
usr.bin/dig/lib/dns/hmac_link.c
132
bytes = (key->key_size + 7) / 8;
usr.bin/dig/lib/dns/hmac_link.c
135
isc_buffer_putmem(data, hkey->key, bytes);
usr.bin/dig/lib/dns/hmac_link.c
141
hmacsha1_fromdns(dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
155
memset(hkey->key, 0, sizeof(hkey->key));
usr.bin/dig/lib/dns/hmac_link.c
160
isc_sha1_final(&sha1ctx, hkey->key);
usr.bin/dig/lib/dns/hmac_link.c
163
memmove(hkey->key, r.base, r.length);
usr.bin/dig/lib/dns/hmac_link.c
167
key->key_size = keylen * 8;
usr.bin/dig/lib/dns/hmac_link.c
168
key->keydata.hmacsha1 = hkey;
usr.bin/dig/lib/dns/hmac_link.c
194
static isc_result_t hmacsha224_fromdns(dst_key_t *key, isc_buffer_t *data);
usr.bin/dig/lib/dns/hmac_link.c
197
unsigned char key[ISC_SHA224_BLOCK_LENGTH];
usr.bin/dig/lib/dns/hmac_link.c
201
hmacsha224_createctx(dst_key_t *key, dst_context_t *dctx) {
usr.bin/dig/lib/dns/hmac_link.c
203
dst_hmacsha224_key_t *hkey = key->keydata.hmacsha224;
usr.bin/dig/lib/dns/hmac_link.c
208
isc_hmacsha224_init(hmacsha224ctx, hkey->key, ISC_SHA224_BLOCK_LENGTH);
usr.bin/dig/lib/dns/hmac_link.c
260
hmacsha224_destroy(dst_key_t *key) {
usr.bin/dig/lib/dns/hmac_link.c
261
dst_hmacsha224_key_t *hkey = key->keydata.hmacsha224;
usr.bin/dig/lib/dns/hmac_link.c
264
key->keydata.hmacsha224 = NULL;
usr.bin/dig/lib/dns/hmac_link.c
268
hmacsha224_todns(const dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
272
REQUIRE(key->keydata.hmacsha224 != NULL);
usr.bin/dig/lib/dns/hmac_link.c
274
hkey = key->keydata.hmacsha224;
usr.bin/dig/lib/dns/hmac_link.c
276
bytes = (key->key_size + 7) / 8;
usr.bin/dig/lib/dns/hmac_link.c
279
isc_buffer_putmem(data, hkey->key, bytes);
usr.bin/dig/lib/dns/hmac_link.c
285
hmacsha224_fromdns(dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
299
memset(hkey->key, 0, sizeof(hkey->key));
usr.bin/dig/lib/dns/hmac_link.c
304
isc_sha224_final(hkey->key, &sha224ctx);
usr.bin/dig/lib/dns/hmac_link.c
307
memmove(hkey->key, r.base, r.length);
usr.bin/dig/lib/dns/hmac_link.c
311
key->key_size = keylen * 8;
usr.bin/dig/lib/dns/hmac_link.c
312
key->keydata.hmacsha224 = hkey;
usr.bin/dig/lib/dns/hmac_link.c
338
static isc_result_t hmacsha256_fromdns(dst_key_t *key, isc_buffer_t *data);
usr.bin/dig/lib/dns/hmac_link.c
341
unsigned char key[ISC_SHA256_BLOCK_LENGTH];
usr.bin/dig/lib/dns/hmac_link.c
345
hmacsha256_createctx(dst_key_t *key, dst_context_t *dctx) {
usr.bin/dig/lib/dns/hmac_link.c
347
dst_hmacsha256_key_t *hkey = key->keydata.hmacsha256;
usr.bin/dig/lib/dns/hmac_link.c
352
isc_hmacsha256_init(hmacsha256ctx, hkey->key, ISC_SHA256_BLOCK_LENGTH);
usr.bin/dig/lib/dns/hmac_link.c
404
hmacsha256_destroy(dst_key_t *key) {
usr.bin/dig/lib/dns/hmac_link.c
405
dst_hmacsha256_key_t *hkey = key->keydata.hmacsha256;
usr.bin/dig/lib/dns/hmac_link.c
408
key->keydata.hmacsha256 = NULL;
usr.bin/dig/lib/dns/hmac_link.c
412
hmacsha256_todns(const dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
416
REQUIRE(key->keydata.hmacsha256 != NULL);
usr.bin/dig/lib/dns/hmac_link.c
418
hkey = key->keydata.hmacsha256;
usr.bin/dig/lib/dns/hmac_link.c
420
bytes = (key->key_size + 7) / 8;
usr.bin/dig/lib/dns/hmac_link.c
423
isc_buffer_putmem(data, hkey->key, bytes);
usr.bin/dig/lib/dns/hmac_link.c
429
hmacsha256_fromdns(dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
443
memset(hkey->key, 0, sizeof(hkey->key));
usr.bin/dig/lib/dns/hmac_link.c
448
isc_sha256_final(hkey->key, &sha256ctx);
usr.bin/dig/lib/dns/hmac_link.c
451
memmove(hkey->key, r.base, r.length);
usr.bin/dig/lib/dns/hmac_link.c
455
key->key_size = keylen * 8;
usr.bin/dig/lib/dns/hmac_link.c
456
key->keydata.hmacsha256 = hkey;
usr.bin/dig/lib/dns/hmac_link.c
482
static isc_result_t hmacsha384_fromdns(dst_key_t *key, isc_buffer_t *data);
usr.bin/dig/lib/dns/hmac_link.c
485
unsigned char key[ISC_SHA384_BLOCK_LENGTH];
usr.bin/dig/lib/dns/hmac_link.c
489
hmacsha384_createctx(dst_key_t *key, dst_context_t *dctx) {
usr.bin/dig/lib/dns/hmac_link.c
491
dst_hmacsha384_key_t *hkey = key->keydata.hmacsha384;
usr.bin/dig/lib/dns/hmac_link.c
496
isc_hmacsha384_init(hmacsha384ctx, hkey->key, ISC_SHA384_BLOCK_LENGTH);
usr.bin/dig/lib/dns/hmac_link.c
50
static isc_result_t hmacsha1_fromdns(dst_key_t *key, isc_buffer_t *data);
usr.bin/dig/lib/dns/hmac_link.c
53
unsigned char key[ISC_SHA1_BLOCK_LENGTH];
usr.bin/dig/lib/dns/hmac_link.c
548
hmacsha384_destroy(dst_key_t *key) {
usr.bin/dig/lib/dns/hmac_link.c
549
dst_hmacsha384_key_t *hkey = key->keydata.hmacsha384;
usr.bin/dig/lib/dns/hmac_link.c
552
key->keydata.hmacsha384 = NULL;
usr.bin/dig/lib/dns/hmac_link.c
556
hmacsha384_todns(const dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
560
REQUIRE(key->keydata.hmacsha384 != NULL);
usr.bin/dig/lib/dns/hmac_link.c
562
hkey = key->keydata.hmacsha384;
usr.bin/dig/lib/dns/hmac_link.c
564
bytes = (key->key_size + 7) / 8;
usr.bin/dig/lib/dns/hmac_link.c
567
isc_buffer_putmem(data, hkey->key, bytes);
usr.bin/dig/lib/dns/hmac_link.c
57
hmacsha1_createctx(dst_key_t *key, dst_context_t *dctx) {
usr.bin/dig/lib/dns/hmac_link.c
573
hmacsha384_fromdns(dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
587
memset(hkey->key, 0, sizeof(hkey->key));
usr.bin/dig/lib/dns/hmac_link.c
59
dst_hmacsha1_key_t *hkey = key->keydata.hmacsha1;
usr.bin/dig/lib/dns/hmac_link.c
592
isc_sha384_final(hkey->key, &sha384ctx);
usr.bin/dig/lib/dns/hmac_link.c
595
memmove(hkey->key, r.base, r.length);
usr.bin/dig/lib/dns/hmac_link.c
599
key->key_size = keylen * 8;
usr.bin/dig/lib/dns/hmac_link.c
600
key->keydata.hmacsha384 = hkey;
usr.bin/dig/lib/dns/hmac_link.c
626
static isc_result_t hmacsha512_fromdns(dst_key_t *key, isc_buffer_t *data);
usr.bin/dig/lib/dns/hmac_link.c
629
unsigned char key[ISC_SHA512_BLOCK_LENGTH];
usr.bin/dig/lib/dns/hmac_link.c
633
hmacsha512_createctx(dst_key_t *key, dst_context_t *dctx) {
usr.bin/dig/lib/dns/hmac_link.c
635
dst_hmacsha512_key_t *hkey = key->keydata.hmacsha512;
usr.bin/dig/lib/dns/hmac_link.c
64
isc_hmacsha1_init(hmacsha1ctx, hkey->key, ISC_SHA1_BLOCK_LENGTH);
usr.bin/dig/lib/dns/hmac_link.c
640
isc_hmacsha512_init(hmacsha512ctx, hkey->key, ISC_SHA512_BLOCK_LENGTH);
usr.bin/dig/lib/dns/hmac_link.c
692
hmacsha512_destroy(dst_key_t *key) {
usr.bin/dig/lib/dns/hmac_link.c
693
dst_hmacsha512_key_t *hkey = key->keydata.hmacsha512;
usr.bin/dig/lib/dns/hmac_link.c
696
key->keydata.hmacsha512 = NULL;
usr.bin/dig/lib/dns/hmac_link.c
700
hmacsha512_todns(const dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
704
REQUIRE(key->keydata.hmacsha512 != NULL);
usr.bin/dig/lib/dns/hmac_link.c
706
hkey = key->keydata.hmacsha512;
usr.bin/dig/lib/dns/hmac_link.c
708
bytes = (key->key_size + 7) / 8;
usr.bin/dig/lib/dns/hmac_link.c
711
isc_buffer_putmem(data, hkey->key, bytes);
usr.bin/dig/lib/dns/hmac_link.c
717
hmacsha512_fromdns(dst_key_t *key, isc_buffer_t *data) {
usr.bin/dig/lib/dns/hmac_link.c
731
memset(hkey->key, 0, sizeof(hkey->key));
usr.bin/dig/lib/dns/hmac_link.c
736
isc_sha512_final(hkey->key, &sha512ctx);
usr.bin/dig/lib/dns/hmac_link.c
739
memmove(hkey->key, r.base, r.length);
usr.bin/dig/lib/dns/hmac_link.c
743
key->key_size = keylen * 8;
usr.bin/dig/lib/dns/hmac_link.c
744
key->keydata.hmacsha512 = hkey;
usr.bin/dig/lib/dns/include/dns/message.h
883
dns_message_settsigkey(dns_message_t *msg, dns_tsigkey_t *key);
usr.bin/dig/lib/dns/include/dns/tsig.h
52
dst_key_t *key; /*%< Key */
usr.bin/dig/lib/dns/include/dns/tsig.h
73
dns_tsigkey_t **key);
usr.bin/dig/lib/dns/include/dns/tsig.h
80
dns_tsigkey_t **key);
usr.bin/dig/lib/dns/include/dst/dst.h
144
dst_context_create3(dst_key_t *key,
usr.bin/dig/lib/dns/include/dst/dst.h
213
dst_key_todns(const dst_key_t *key, isc_buffer_t *target);
usr.bin/dig/lib/dns/include/dst/dst.h
282
dst_key_size(const dst_key_t *key);
usr.bin/dig/lib/dns/include/dst/dst.h
285
dst_key_alg(const dst_key_t *key);
usr.bin/dig/lib/dns/include/dst/dst.h
288
dst_key_sigsize(const dst_key_t *key, unsigned int *n);
usr.bin/dig/lib/dns/include/dst/dst.h
318
dst_key_getbits(const dst_key_t *key);
usr.bin/dig/lib/dns/include/dst/dst.h
327
dst_key_setbits(dst_key_t *key, uint16_t bits);
usr.bin/dig/lib/dns/key.c
55
dst_key_size(const dst_key_t *key) {
usr.bin/dig/lib/dns/key.c
56
return (key->key_size);
usr.bin/dig/lib/dns/key.c
60
dst_key_alg(const dst_key_t *key) {
usr.bin/dig/lib/dns/key.c
61
return (key->key_alg);
usr.bin/dig/lib/dns/key.c
65
dst_key_setbits(dst_key_t *key, uint16_t bits) {
usr.bin/dig/lib/dns/key.c
68
RUNTIME_CHECK(dst_key_sigsize(key, &maxbits) == ISC_R_SUCCESS);
usr.bin/dig/lib/dns/key.c
72
key->key_bits = bits;
usr.bin/dig/lib/dns/key.c
76
dst_key_getbits(const dst_key_t *key) {
usr.bin/dig/lib/dns/key.c
77
return (key->key_bits);
usr.bin/dig/lib/dns/message.c
2150
dns_message_settsigkey(dns_message_t *msg, dns_tsigkey_t *key) {
usr.bin/dig/lib/dns/message.c
2159
if (key == NULL && msg->tsigkey != NULL) {
usr.bin/dig/lib/dns/message.c
2166
if (key != NULL) {
usr.bin/dig/lib/dns/message.c
2168
dns_tsigkey_attach(key, &msg->tsigkey);
usr.bin/dig/lib/dns/message.c
569
spacefortsig(dns_tsigkey_t *key, int otherlen) {
usr.bin/dig/lib/dns/message.c
595
dns_name_toregion(&key->name, &r1);
usr.bin/dig/lib/dns/message.c
596
dns_name_toregion(key->algorithm, &r2);
usr.bin/dig/lib/dns/message.c
597
if (key->key == NULL)
usr.bin/dig/lib/dns/message.c
600
result = dst_key_sigsize(key->key, &x);
usr.bin/dig/lib/dns/rdata/in_1/svcb_64.c
35
svc_param_key_to_text(uint16_t key)
usr.bin/dig/lib/dns/rdata/in_1/svcb_64.c
39
switch (key) {
usr.bin/dig/lib/dns/rdata/in_1/svcb_64.c
57
snprintf(buf, sizeof buf, "key%u", key);
usr.bin/dig/lib/dns/rdataset.c
190
int key;
usr.bin/dig/lib/dns/rdataset.c
280
out[i].key = 0; /* Unused */
usr.bin/dig/lib/dns/tsig.c
100
if (key != NULL) {
usr.bin/dig/lib/dns/tsig.c
101
dns_name_format(&key->name, namestr, sizeof(namestr));
usr.bin/dig/lib/dns/tsig.c
1050
dst_key_t *key = NULL;
usr.bin/dig/lib/dns/tsig.c
106
if (key != NULL && key->generated && key->creator) {
usr.bin/dig/lib/dns/tsig.c
107
dns_name_format(key->creator, creatorstr, sizeof(creatorstr));
usr.bin/dig/lib/dns/tsig.c
1070
key = tsigkey->key;
usr.bin/dig/lib/dns/tsig.c
1115
alg = dst_key_alg(key);
usr.bin/dig/lib/dns/tsig.c
1116
ret = dst_key_sigsize(key, &siglen);
usr.bin/dig/lib/dns/tsig.c
1145
ret = dst_context_create3(key,
usr.bin/dig/lib/dns/tsig.c
115
if (key != NULL && key->generated) {
usr.bin/dig/lib/dns/tsig.c
1291
alg = dst_key_alg(key);
usr.bin/dig/lib/dns/tsig.c
1292
ret = dst_key_sigsize(key, &siglen);
usr.bin/dig/lib/dns/tsig.c
1302
uint16_t digestbits = dst_key_getbits(key);
usr.bin/dig/lib/dns/tsig.c
132
dns_tsigkey_t **key)
usr.bin/dig/lib/dns/tsig.c
138
REQUIRE(key == NULL || *key == NULL);
usr.bin/dig/lib/dns/tsig.c
141
REQUIRE(key != NULL);
usr.bin/dig/lib/dns/tsig.c
220
tkey->key = NULL;
usr.bin/dig/lib/dns/tsig.c
222
dst_key_attach(dstkey, &tkey->key);
usr.bin/dig/lib/dns/tsig.c
224
if (key != NULL)
usr.bin/dig/lib/dns/tsig.c
248
if (key != NULL)
usr.bin/dig/lib/dns/tsig.c
249
*key = tkey;
usr.bin/dig/lib/dns/tsig.c
254
if (tkey->key != NULL)
usr.bin/dig/lib/dns/tsig.c
255
dst_key_free(&tkey->key);
usr.bin/dig/lib/dns/tsig.c
279
dns_tsigkey_t **key)
usr.bin/dig/lib/dns/tsig.c
358
inception, expire, key);
usr.bin/dig/lib/dns/tsig.c
373
tsigkey_free(dns_tsigkey_t *key) {
usr.bin/dig/lib/dns/tsig.c
374
dns_name_free(&key->name);
usr.bin/dig/lib/dns/tsig.c
375
if (algname_is_allocated(key->algorithm)) {
usr.bin/dig/lib/dns/tsig.c
376
dns_name_free(key->algorithm);
usr.bin/dig/lib/dns/tsig.c
377
free(key->algorithm);
usr.bin/dig/lib/dns/tsig.c
379
if (key->key != NULL)
usr.bin/dig/lib/dns/tsig.c
380
dst_key_free(&key->key);
usr.bin/dig/lib/dns/tsig.c
381
if (key->creator != NULL) {
usr.bin/dig/lib/dns/tsig.c
382
dns_name_free(key->creator);
usr.bin/dig/lib/dns/tsig.c
383
free(key->creator);
usr.bin/dig/lib/dns/tsig.c
385
isc_refcount_destroy(&key->refs);
usr.bin/dig/lib/dns/tsig.c
386
free(key);
usr.bin/dig/lib/dns/tsig.c
391
dns_tsigkey_t *key;
usr.bin/dig/lib/dns/tsig.c
396
key = *keyp;
usr.bin/dig/lib/dns/tsig.c
397
isc_refcount_decrement(&key->refs, &refs);
usr.bin/dig/lib/dns/tsig.c
400
tsigkey_free(key);
usr.bin/dig/lib/dns/tsig.c
407
dns_tsigkey_t *key;
usr.bin/dig/lib/dns/tsig.c
425
key = dns_message_gettsigkey(msg);
usr.bin/dig/lib/dns/tsig.c
440
dns_name_clone(key->algorithm, &tsig.algorithm);
usr.bin/dig/lib/dns/tsig.c
467
if ((key->key != NULL) &&
usr.bin/dig/lib/dns/tsig.c
480
ret = dst_context_create3(key->key,
usr.bin/dig/lib/dns/tsig.c
539
dns_name_toregion(&key->name, &r);
usr.bin/dig/lib/dns/tsig.c
596
ret = dst_key_sigsize(key->key, &sigsize);
usr.bin/dig/lib/dns/tsig.c
610
digestbits = dst_key_getbits(key->key);
usr.bin/dig/lib/dns/tsig.c
659
ret = dns_name_dup(&key->name, owner);
usr.bin/dig/lib/dns/tsig.c
714
dst_key_t *key = NULL;
usr.bin/dig/lib/dns/tsig.c
808
key = tsigkey->key;
usr.bin/dig/lib/dns/tsig.c
813
alg = dst_key_alg(key);
usr.bin/dig/lib/dns/tsig.c
814
ret = dst_key_sigsize(key, &siglen);
usr.bin/dig/lib/dns/tsig.c
841
ret = dst_context_create3(key,
usr.bin/dig/lib/dns/tsig.c
85
tsig_log(dns_tsigkey_t *key, int level, const char *fmt, ...)
usr.bin/dig/lib/dns/tsig.c
89
tsigkey_free(dns_tsigkey_t *key);
usr.bin/dig/lib/dns/tsig.c
92
tsig_log(dns_tsigkey_t *key, int level, const char *fmt, ...) {
usr.bin/dig/lib/dns/tsig.c
989
uint16_t digestbits = dst_key_getbits(key);
usr.bin/dig/lib/isc/hmacsha.c
109
isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/hmacsha.c
114
RUNTIME_CHECK(HMAC_Init_ex(ctx->ctx, (const void *) key,
usr.bin/dig/lib/isc/hmacsha.c
147
isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/hmacsha.c
152
RUNTIME_CHECK(HMAC_Init_ex(ctx->ctx, (const void *) key,
usr.bin/dig/lib/isc/hmacsha.c
185
isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/hmacsha.c
190
RUNTIME_CHECK(HMAC_Init_ex(ctx->ctx, (const void *) key,
usr.bin/dig/lib/isc/hmacsha.c
33
isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/hmacsha.c
38
RUNTIME_CHECK(HMAC_Init_ex(ctx->ctx, (const void *) key,
usr.bin/dig/lib/isc/hmacsha.c
71
isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/hmacsha.c
76
RUNTIME_CHECK(HMAC_Init_ex(ctx->ctx, (const void *) key,
usr.bin/dig/lib/isc/include/isc/hmacsha.h
100
isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/include/isc/hmacsha.h
117
isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/include/isc/hmacsha.h
49
isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/include/isc/hmacsha.h
66
isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/include/isc/hmacsha.h
83
isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key,
usr.bin/dig/lib/isc/include/isc/symtab.h
100
typedef void (*isc_symtabaction_t)(char *key, unsigned int type,
usr.bin/dig/lib/isc/include/isc/symtab.h
121
isc_symtab_lookup(isc_symtab_t *symtab, const char *key, unsigned int type,
usr.bin/dig/lib/isc/include/isc/symtab.h
126
isc_symtab_define(isc_symtab_t *symtab, const char *key, unsigned int type,
usr.bin/dig/lib/isc/symtab.c
107
hash(const char *key, int case_sensitive) {
usr.bin/dig/lib/isc/symtab.c
118
for (s = key; *s != '\0'; s++) {
usr.bin/dig/lib/isc/symtab.c
122
for (s = key; *s != '\0'; s++) {
usr.bin/dig/lib/isc/symtab.c
137
strcmp(e->key, (k)) == 0) \
usr.bin/dig/lib/isc/symtab.c
143
strcasecmp(e->key, (k)) == 0) \
usr.bin/dig/lib/isc/symtab.c
149
isc_symtab_lookup(isc_symtab_t *symtab, const char *key, unsigned int type,
usr.bin/dig/lib/isc/symtab.c
155
REQUIRE(key != NULL);
usr.bin/dig/lib/isc/symtab.c
157
FIND(symtab, key, type, bucket, elt);
usr.bin/dig/lib/isc/symtab.c
195
hv = hash(elt->key, symtab->case_sensitive);
usr.bin/dig/lib/isc/symtab.c
208
isc_symtab_define(isc_symtab_t *symtab, const char *key, unsigned int type,
usr.bin/dig/lib/isc/symtab.c
214
REQUIRE(key != NULL);
usr.bin/dig/lib/isc/symtab.c
217
FIND(symtab, key, type, bucket, elt);
usr.bin/dig/lib/isc/symtab.c
225
(symtab->undefine_action)(elt->key, elt->type,
usr.bin/dig/lib/isc/symtab.c
243
DE_CONST(key, elt->key);
usr.bin/dig/lib/isc/symtab.c
28
char * key;
usr.bin/dig/lib/isc/symtab.c
94
(symtab->undefine_action)(elt->key,
usr.bin/dig/lib/isccfg/parser.c
1136
map_symtabitem_destroy(char *key, unsigned int type,
usr.bin/dig/lib/isccfg/parser.c
1142
UNUSED(key);
usr.bin/doas/env.c
157
if (asprintf(&envp[i], "%s=%s", node->key, node->value) == -1)
usr.bin/doas/env.c
168
struct envnode *node, key;
usr.bin/doas/env.c
189
key.key = name;
usr.bin/doas/env.c
191
key.key = name + 1;
usr.bin/doas/env.c
192
if ((node = RB_FIND(envtree, &env->root, &key))) {
usr.bin/doas/env.c
35
const char *key;
usr.bin/doas/env.c
49
return strcmp(a->key, b->key);
usr.bin/doas/env.c
54
createnode(const char *key, const char *value)
usr.bin/doas/env.c
61
node->key = strdup(key);
usr.bin/doas/env.c
63
if (!node->key || !node->value)
usr.bin/doas/env.c
71
free((char *)node->key);
usr.bin/doas/env.c
77
addnode(struct env *env, const char *key, const char *value)
usr.bin/doas/env.c
81
node = createnode(key, value);
usr.bin/fstat/fstat.c
603
if (asprintf(&entry.key, "%c%llx", type, hideroot ? 0 : ptr) == -1)
usr.bin/fstat/fstat.c
620
entry.key = buf;
usr.bin/ftp/cookie.c
139
ck->key = strdup(param);
usr.bin/ftp/cookie.c
140
if (ck->key == NULL)
usr.bin/ftp/cookie.c
158
free(ck->key);
usr.bin/ftp/cookie.c
195
len += strlen(ck->key) + strlen(ck->val) +
usr.bin/ftp/cookie.c
213
(ck == TAILQ_FIRST(&tempjar))? "" : ";", ck->key, ck->val);
usr.bin/ftp/cookie.c
45
char *key;
usr.bin/indent/lexi.c
568
addkey(char *key, int val)
usr.bin/indent/lexi.c
575
if (p->rwd[0] == key[0] && strcmp(p->rwd, key) == 0)
usr.bin/indent/lexi.c
601
p->rwd = key;
usr.bin/ipcrm/ipcrm.c
71
msgrm(key_t key, int id)
usr.bin/ipcrm/ipcrm.c
73
if (key) {
usr.bin/ipcrm/ipcrm.c
74
id = msgget(key, 0);
usr.bin/ipcrm/ipcrm.c
82
shmrm(key_t key, int id)
usr.bin/ipcrm/ipcrm.c
84
if (key) {
usr.bin/ipcrm/ipcrm.c
85
id = shmget(key, 0, 0);
usr.bin/ipcrm/ipcrm.c
93
semrm(key_t key, int id)
usr.bin/ipcrm/ipcrm.c
97
if (key) {
usr.bin/ipcrm/ipcrm.c
98
id = semget(key, 0, 0);
usr.bin/ipcs/ipcs.c
305
show_msginfo(time_t stime, time_t rtime, time_t ctime, int ipcid, key_t key,
usr.bin/ipcs/ipcs.c
318
printf("q %8d %10ld %s %8s %8s", ipcid, key, fmt_perm(mode),
usr.bin/ipcs/ipcs.c
360
show_shminfo(time_t atime, time_t dtime, time_t ctime, int ipcid, key_t key,
usr.bin/ipcs/ipcs.c
372
printf("m %8d %10ld %s %8s %8s", ipcid, key, fmt_perm(mode),
usr.bin/ipcs/ipcs.c
413
show_seminfo(time_t otime, time_t ctime, int ipcid, key_t key, mode_t mode,
usr.bin/ipcs/ipcs.c
423
printf("s %8d %10ld %s %8s %8s", ipcid, key, fmt_perm(mode),
usr.bin/ipcs/ipcs.c
494
msqptr->msg_perm.key,
usr.bin/ipcs/ipcs.c
566
shmptr->shm_perm.key,
usr.bin/ipcs/ipcs.c
637
semaptr->sem_perm.key,
usr.bin/ipcs/ipcs.c
739
msqptr->msg_perm.key,
usr.bin/ipcs/ipcs.c
796
shmseg.shm_perm.key,
usr.bin/ipcs/ipcs.c
849
sem.sem_perm.key,
usr.bin/ldap/aldap.c
584
char *key;
usr.bin/ldap/aldap.c
591
&key, &b) != 0)
usr.bin/ldap/aldap.c
600
(*outkey) = utoa(key);
usr.bin/ldap/aldap.c
614
char *key;
usr.bin/ldap/aldap.c
625
if (ober_scanf_elements(msg->body.search.iter, "{s(e)}", &key, &a) != 0)
usr.bin/ldap/aldap.c
634
(*outkey) = utoa(key);
usr.bin/ldap/ldapclient.c
389
ldapc_printattr(struct ldapc *ldap, const char *key,
usr.bin/ldap/ldapclient.c
399
if (strcasecmp("userPassword", key) == 0)
usr.bin/ldap/ldapclient.c
425
if (asprintf(&p, "%s: %s", key,
usr.bin/ldap/ldapclient.c
442
if (asprintf(&p, "%s:: %s", key, out) == -1) {
usr.bin/ldap/ldapclient.c
480
printf("%s: %s\n", key, p);
usr.bin/less/screen.c
213
special_key_str(int key)
usr.bin/less/screen.c
221
switch (key) {
usr.bin/mandoc/cgi.c
204
char *key, *val;
usr.bin/mandoc/cgi.c
214
key = val = NULL;
usr.bin/mandoc/cgi.c
220
key = mandoc_strndup(qs, keysz);
usr.bin/mandoc/cgi.c
233
if ( ! (http_decode(key) && http_decode(val)))
usr.bin/mandoc/cgi.c
238
if ( ! strcmp(key, "query"))
usr.bin/mandoc/cgi.c
241
else if ( ! strcmp(key, "apropos"))
usr.bin/mandoc/cgi.c
244
else if ( ! strcmp(key, "manpath")) {
usr.bin/mandoc/cgi.c
255
else if ( ! (strcmp(key, "sec")
usr.bin/mandoc/cgi.c
257
&& strcmp(key, "sektion")
usr.bin/mandoc/cgi.c
265
else if ( ! strcmp(key, "arch")) {
usr.bin/mandoc/cgi.c
277
free(key);
usr.bin/mandoc/cgi.c
278
key = NULL;
usr.bin/mandoc/eqn.c
1127
free(p->defs[i].key);
usr.bin/mandoc/eqn.c
288
char *key;
usr.bin/mandoc/eqn.c
347
if (ep->defs[i].keysz && STRNEQ(ep->defs[i].key,
usr.bin/mandoc/eqn.c
604
free(def->key);
usr.bin/mandoc/eqn.c
606
def->key = def->val = NULL;
usr.bin/mandoc/eqn.c
636
ep->defs[i].key = ep->defs[i].val = NULL;
usr.bin/mandoc/eqn.c
640
free(def->key);
usr.bin/mandoc/eqn.c
641
def->key = mandoc_strndup(ep->start, ep->toksz);
usr.bin/mandoc/eqn.c
647
ep->node->line, ep->node->pos, "define %s", def->key);
usr.bin/mandoc/eqn.c
648
free(def->key);
usr.bin/mandoc/eqn.c
650
def->key = def->val = NULL;
usr.bin/mandoc/mandocdb.c
1148
mandoc_ohash_init(&names, 4, offsetof(struct str, key));
usr.bin/mandoc/mandocdb.c
1149
mandoc_ohash_init(&strings, 6, offsetof(struct str, key));
usr.bin/mandoc/mandocdb.c
1873
memcpy(s->key, cp, sz);
usr.bin/mandoc/mandocdb.c
2074
struct str *key;
usr.bin/mandoc/mandocdb.c
2084
for (key = ohash_first(&names, &slot); NULL != key;
usr.bin/mandoc/mandocdb.c
2085
key = ohash_next(&names, &slot))
usr.bin/mandoc/mandocdb.c
2086
free(key);
usr.bin/mandoc/mandocdb.c
2087
for (key = ohash_first(&strings, &slot); NULL != key;
usr.bin/mandoc/mandocdb.c
2088
key = ohash_next(&strings, &slot))
usr.bin/mandoc/mandocdb.c
2089
free(key);
usr.bin/mandoc/mandocdb.c
2133
for (key = ohash_first(&names, &slot); NULL != key;
usr.bin/mandoc/mandocdb.c
2134
key = ohash_next(&names, &slot)) {
usr.bin/mandoc/mandocdb.c
2135
assert(key->mpage == mpage);
usr.bin/mandoc/mandocdb.c
2136
dba_page_alias(mpage->dba, key->key, key->mask);
usr.bin/mandoc/mandocdb.c
2137
free(key);
usr.bin/mandoc/mandocdb.c
2139
for (key = ohash_first(&strings, &slot); NULL != key;
usr.bin/mandoc/mandocdb.c
2140
key = ohash_next(&strings, &slot)) {
usr.bin/mandoc/mandocdb.c
2141
assert(key->mpage == mpage);
usr.bin/mandoc/mandocdb.c
2144
if (key->mask & mask)
usr.bin/mandoc/mandocdb.c
2146
key->key, mpage->dba);
usr.bin/mandoc/mandocdb.c
2149
free(key);
usr.bin/mandoc/mandocdb.c
65
char key[]; /* rendered text */
usr.bin/mandoc/mansearch.c
720
char *key, *val;
usr.bin/mandoc/mansearch.c
812
while (NULL != (key = strsep(&argv[*argi], ","))) {
usr.bin/mandoc/mansearch.c
813
if ('\0' == *key)
usr.bin/mandoc/mansearch.c
816
if (0 == strcasecmp(key, mansearch_keynames[i])) {
usr.bin/mandoc/mansearch.c
822
if (strcasecmp(key, "any"))
usr.bin/mandoc/mansearch.c
824
"\"%s\" as \"any\"", key);
usr.bin/mandoc/roff.c
3019
while (reg != NULL && (reg->key.sz != len ||
usr.bin/mandoc/roff.c
3020
strncmp(reg->key.p, name, len) != 0))
usr.bin/mandoc/roff.c
3026
reg->key.p = mandoc_strndup(name, len);
usr.bin/mandoc/roff.c
3027
reg->key.sz = len;
usr.bin/mandoc/roff.c
3095
if (len == reg->key.sz &&
usr.bin/mandoc/roff.c
3096
0 == strncmp(name, reg->key.p, len)) {
usr.bin/mandoc/roff.c
3128
if (len == reg->key.sz &&
usr.bin/mandoc/roff.c
3129
0 == strncmp(name, reg->key.p, len))
usr.bin/mandoc/roff.c
3141
free(reg->key.p);
usr.bin/mandoc/roff.c
3151
char *key, *val, *step;
usr.bin/mandoc/roff.c
3156
key = val = buf->buf + pos;
usr.bin/mandoc/roff.c
3157
if (*key == '\0')
usr.bin/mandoc/roff.c
3161
if (key[keysz] == '\\' || key[keysz] == '\t')
usr.bin/mandoc/roff.c
3178
roff_setregn(r, key, keysz, iv, sign, is);
usr.bin/mandoc/roff.c
3198
if (reg == NULL || !strcmp(name, reg->key.p))
usr.bin/mandoc/roff.c
3204
free(reg->key.p);
usr.bin/mandoc/roff.c
4124
while (n && (namesz != n->key.sz ||
usr.bin/mandoc/roff.c
4125
strncmp(n->key.p, name, namesz)))
usr.bin/mandoc/roff.c
4131
n->key.p = mandoc_strndup(name, namesz);
usr.bin/mandoc/roff.c
4132
n->key.sz = namesz;
usr.bin/mandoc/roff.c
4194
if (strncmp(name, n->key.p, len) != 0 ||
usr.bin/mandoc/roff.c
4195
n->key.p[len] != '\0' || n->val.p == NULL)
usr.bin/mandoc/roff.c
4206
if (strncmp(name, n->key.p, len) != 0 ||
usr.bin/mandoc/roff.c
4207
n->key.p[len] != '\0' || n->val.p == NULL)
usr.bin/mandoc/roff.c
4284
free(n->key.p);
usr.bin/mandoc/roff.c
4340
if (0 == strncmp(p, cp->key.p, cp->key.sz))
usr.bin/mandoc/roff.c
4353
p += (int)cp->key.sz;
usr.bin/mandoc/roff.c
67
struct roffstr key;
usr.bin/mandoc/roff.c
76
struct roffstr key;
usr.bin/mandoc/tbl_layout.c
249
c = keys[i].key;
usr.bin/mandoc/tbl_layout.c
36
enum tbl_cellt key;
usr.bin/mandoc/tbl_opts.c
105
"%s", keys[key].name);
usr.bin/mandoc/tbl_opts.c
108
"%s want %d have %d", keys[key].name, want, len);
usr.bin/mandoc/tbl_opts.c
166
if (keys[i].key)
usr.bin/mandoc/tbl_opts.c
167
tbl->opts.opts |= keys[i].key;
usr.bin/mandoc/tbl_opts.c
37
int key;
usr.bin/mandoc/tbl_opts.c
64
arg(struct tbl_node *tbl, int ln, const char *p, int *pos, int key)
usr.bin/mandoc/tbl_opts.c
80
switch (key) {
usr.bin/mg/echo.c
874
for (cp = kname, c = 0; c < key.k_count; c++) {
usr.bin/mg/echo.c
878
(cp - kname) - 1, key.k_chars[c]);
usr.bin/mg/extend.c
426
key.k_chars[i] = CCHR(toupper((unsigned char)*++str));
usr.bin/mg/extend.c
430
key.k_chars[i] = '^';
usr.bin/mg/extend.c
434
key.k_chars[i] = '\t';
usr.bin/mg/extend.c
438
key.k_chars[i] = *curbp->b_nlchr;
usr.bin/mg/extend.c
442
key.k_chars[i] = '\r';
usr.bin/mg/extend.c
446
key.k_chars[i] = CCHR('[');
usr.bin/mg/extend.c
449
key.k_chars[i] = '\\';
usr.bin/mg/extend.c
453
key.k_chars[i] = *str;
usr.bin/mg/extend.c
456
key.k_count = i;
usr.bin/mg/extend.c
457
return (bindkey(&map, func, key.k_chars, key.k_count));
usr.bin/mg/extend.c
768
key.k_count = 0;
usr.bin/mg/extend.c
836
key.k_chars[key.k_count++] = c;
usr.bin/mg/extend.c
873
status = bindkey(&curmap, lp->l_text, key.k_chars,
usr.bin/mg/extend.c
874
key.k_count);
usr.bin/mg/extend.c
876
status = bindkey(&curmap, NULL, key.k_chars,
usr.bin/mg/extend.c
877
key.k_count);
usr.bin/mg/help.c
43
key.k_count = 0;
usr.bin/mg/help.c
51
key.k_chars[key.k_count++] = c = getkey(FALSE));
usr.bin/mg/help.c
59
if (ISUPPER(key.k_chars[key.k_count - 1])) {
usr.bin/mg/help.c
61
TOLOWER(key.k_chars[key.k_count - 1]), &curmap);
usr.bin/mg/help.c
74
for (i = 0; i < key.k_count; i++) {
usr.bin/mg/help.c
75
funct = doscan(curmap, key.k_chars[i], &curmap);
usr.bin/mg/help.c
77
if (i == key.k_count - 1 && funct != rescan)
usr.bin/mg/kbd.c
154
key.k_count = 0;
usr.bin/mg/kbd.c
155
while ((funct = doscan(curmap, (key.k_chars[key.k_count++] =
usr.bin/mg/kbd.c
180
if (ISUPPER(key.k_chars[key.k_count - 1])) {
usr.bin/mg/kbd.c
181
c = TOLOWER(key.k_chars[key.k_count - 1]);
usr.bin/mg/kbd.c
183
for (i = 0; i < key.k_count - 1; i++) {
usr.bin/mg/kbd.c
184
if ((fp = doscan(curmap, (key.k_chars[i]),
usr.bin/mg/kbd.c
191
key.k_chars[key.k_count++] =
usr.bin/mg/kbd.c
206
for (i = 0; i < key.k_count; i++) {
usr.bin/mg/kbd.c
207
if ((fp = doscan(curmap, (key.k_chars[i]), &curmap)) != NULL)
usr.bin/mg/kbd.c
211
while ((fp = doscan(curmap, key.k_chars[i++] =
usr.bin/mg/kbd.c
214
key.k_count = i;
usr.bin/mg/kbd.c
216
if (fp != rescan && i >= key.k_count - 1) {
usr.bin/mg/kbd.c
234
key.k_chars[0] = c = getkey(TRUE);
usr.bin/mg/kbd.c
235
key.k_count = 1;
usr.bin/mg/kbd.c
242
key.k_chars[key.k_count++] = c = getkey(TRUE);
usr.bin/mg/kbd.c
264
nn = key.k_chars[key.k_count - 1] - '0';
usr.bin/mg/kbd.c
272
key.k_chars[0] = c;
usr.bin/mg/kbd.c
273
key.k_count = 1;
usr.bin/mg/kbd.c
276
key.k_chars[key.k_count++] = c = getkey(TRUE);
usr.bin/mg/kbd.c
308
key.k_chars[0] = c;
usr.bin/mg/kbd.c
309
key.k_count = 1;
usr.bin/mg/kbd.c
312
key.k_chars[key.k_count++] = c = getkey(TRUE);
usr.bin/mg/kbd.c
34
struct key key;
usr.bin/mg/kbd.c
340
c = key.k_chars[key.k_count - 1];
usr.bin/mg/kbd.c
407
key.k_chars[0] = *c;
usr.bin/mg/kbd.c
408
key.k_chars[1] = '\0';
usr.bin/mg/kbd.c
409
key.k_count = 1;
usr.bin/mg/kbd.c
422
key.k_count = 1;
usr.bin/mg/kbd.c
423
if ((key.k_chars[0] = getkey(TRUE)) >= '0' && key.k_chars[0] <= '7') {
usr.bin/mg/kbd.c
424
key.k_chars[0] -= '0';
usr.bin/mg/kbd.c
426
key.k_chars[0] <<= 3;
usr.bin/mg/kbd.c
427
key.k_chars[0] += c - '0';
usr.bin/mg/kbd.c
429
key.k_chars[0] <<= 3;
usr.bin/mg/kbd.c
430
key.k_chars[0] += c - '0';
usr.bin/mg/key.h
14
extern struct key key;
usr.bin/mg/log.c
102
if (ISWORD(*key.k_chars)) {
usr.bin/mg/log.c
103
fprintf(fd_key, "k_count:%d k_chars:%hd\tchr:%c\t", key.k_count,
usr.bin/mg/log.c
104
*key.k_chars, CHARMASK(*key.k_chars));
usr.bin/mg/log.c
106
fprintf(fd_key, "k_count:%d k_chars:%hd\t\t", key.k_count,
usr.bin/mg/log.c
107
*key.k_chars);
usr.bin/mg/match.c
74
rbal = key.k_chars[key.k_count - 1];
usr.bin/openssl/apps.c
563
BIO *key = NULL;
usr.bin/openssl/apps.c
574
key = BIO_new(BIO_s_file());
usr.bin/openssl/apps.c
575
if (key == NULL) {
usr.bin/openssl/apps.c
581
BIO_set_fp(key, stdin, BIO_NOCLOSE);
usr.bin/openssl/apps.c
582
} else if (BIO_read_filename(key, file) <= 0) {
usr.bin/openssl/apps.c
589
pkey = d2i_PrivateKey_bio(key, NULL);
usr.bin/openssl/apps.c
591
pkey = PEM_read_bio_PrivateKey(key, NULL, password_callback, &cb_data);
usr.bin/openssl/apps.c
594
if (!load_pkcs12(err, key, key_descrip, password_callback, &cb_data,
usr.bin/openssl/apps.c
600
pkey = b2i_PrivateKey_bio(key);
usr.bin/openssl/apps.c
602
pkey = b2i_PVK_bio(key, password_callback,
usr.bin/openssl/apps.c
610
BIO_free(key);
usr.bin/openssl/apps.c
622
BIO *key = NULL;
usr.bin/openssl/apps.c
633
key = BIO_new(BIO_s_file());
usr.bin/openssl/apps.c
634
if (key == NULL) {
usr.bin/openssl/apps.c
640
BIO_set_fp(key, stdin, BIO_NOCLOSE);
usr.bin/openssl/apps.c
641
} else if (BIO_read_filename(key, file) <= 0) {
usr.bin/openssl/apps.c
647
pkey = d2i_PUBKEY_bio(key, NULL);
usr.bin/openssl/apps.c
651
rsa = d2i_RSAPublicKey_bio(key, NULL);
usr.bin/openssl/apps.c
661
rsa = PEM_read_bio_RSAPublicKey(key, NULL, password_callback, &cb_data);
usr.bin/openssl/apps.c
671
pkey = PEM_read_bio_PUBKEY(key, NULL, password_callback, &cb_data);
usr.bin/openssl/apps.c
675
pkey = b2i_PublicKey_bio(key);
usr.bin/openssl/apps.c
683
BIO_free(key);
usr.bin/openssl/apps.h
381
int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
usr.bin/openssl/ca.c
1507
free(cfg.key);
usr.bin/openssl/ca.c
179
char *key;
usr.bin/openssl/ca.c
429
.opt.arg = &cfg.key,
usr.bin/openssl/ca.c
780
if (cfg.key == NULL) {
usr.bin/openssl/ca.c
783
&cfg.key, NULL)) {
usr.bin/openssl/ca.c
789
cfg.key, "CA private key");
usr.bin/openssl/ca.c
790
if (cfg.key != NULL)
usr.bin/openssl/ca.c
791
explicit_bzero(cfg.key, strlen(cfg.key));
usr.bin/openssl/cms.c
1169
EVP_PKEY *key = NULL;
usr.bin/openssl/cms.c
1360
key = load_key(bio_err, cfg.keyfile, cfg.keyform,
usr.bin/openssl/cms.c
1362
if (key == NULL)
usr.bin/openssl/cms.c
1542
srcms = CMS_sign_receipt(si, signer, key, other,
usr.bin/openssl/cms.c
1597
key = load_key(bio_err, cfg.keyfile,
usr.bin/openssl/cms.c
1599
if (key == NULL)
usr.bin/openssl/cms.c
1608
si = CMS_add1_signer(cms, signer, key,
usr.bin/openssl/cms.c
1624
EVP_PKEY_free(key);
usr.bin/openssl/cms.c
1625
key = NULL;
usr.bin/openssl/cms.c
1653
if (key != NULL) {
usr.bin/openssl/cms.c
1654
if (!CMS_decrypt_set1_pkey(cms, key, recip)) {
usr.bin/openssl/cms.c
1794
EVP_PKEY_free(key);
usr.bin/openssl/dgst.c
597
EVP_PKEY * key, unsigned char *sigin, int siglen,
usr.bin/openssl/dgst.c
630
if (key) {
usr.bin/openssl/dgst.c
77
EVP_PKEY * key, unsigned char *sigin, int siglen,
usr.bin/openssl/enc.c
337
unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
usr.bin/openssl/enc.c
618
memcpy(key, tmpkeyiv, iklen);
usr.bin/openssl/enc.c
624
strlen(cfg.keystr), 1, key, iv);
usr.bin/openssl/enc.c
652
if (cfg.hkey != NULL && !set_hex(cfg.hkey, key, sizeof key)) {
usr.bin/openssl/enc.c
676
if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, cfg.enc)) {
usr.bin/openssl/enc.c
699
printf("%02X", key[i]);
usr.bin/openssl/ocsp.c
1095
EVP_PKEY_free(key);
usr.bin/openssl/ocsp.c
793
EVP_PKEY *key = NULL, *rkey = NULL;
usr.bin/openssl/ocsp.c
936
key = load_key(bio_err, cfg.keyfile, FORMAT_PEM, 0,
usr.bin/openssl/ocsp.c
938
if (!key)
usr.bin/openssl/ocsp.c
941
if (!OCSP_request_sign(cfg.req, signer, key, NULL,
usr.bin/openssl/pkcs12.c
597
EVP_PKEY *key = NULL;
usr.bin/openssl/pkcs12.c
613
key = load_key(bio_err, cfg.keyname ?
usr.bin/openssl/pkcs12.c
616
if (!key)
usr.bin/openssl/pkcs12.c
627
if (key != NULL) {
usr.bin/openssl/pkcs12.c
631
if (X509_check_private_key(x, key)) {
usr.bin/openssl/pkcs12.c
733
p12 = PKCS12_create(cpass, cfg.name, key, ucert,
usr.bin/openssl/pkcs12.c
758
EVP_PKEY_free(key);
usr.bin/openssl/s_cb.c
230
set_cert_key_stuff(SSL_CTX * ctx, X509 * cert, EVP_PKEY * key)
usr.bin/openssl/s_cb.c
239
if (SSL_CTX_use_PrivateKey(ctx, key) <= 0) {
usr.bin/openssl/s_client.c
1031
if (!set_cert_key_stuff(ctx, cert, key))
usr.bin/openssl/s_client.c
1643
EVP_PKEY_free(key);
usr.bin/openssl/s_client.c
875
EVP_PKEY *key = NULL;
usr.bin/openssl/s_client.c
946
key = load_key(bio_err, cfg.key_file,
usr.bin/openssl/s_client.c
949
if (!key) {
usr.bin/openssl/smime.c
1071
EVP_PKEY_free(key);
usr.bin/openssl/smime.c
718
EVP_PKEY *key = NULL;
usr.bin/openssl/smime.c
869
key = load_key(bio_err, cfg.keyfile,
usr.bin/openssl/smime.c
871
if (key == NULL)
usr.bin/openssl/smime.c
971
key = load_key(bio_err, cfg.keyfile,
usr.bin/openssl/smime.c
974
if (key == NULL)
usr.bin/openssl/smime.c
976
if (PKCS7_sign_add_signer(p7, signer, key,
usr.bin/openssl/smime.c
981
EVP_PKEY_free(key);
usr.bin/openssl/smime.c
982
key = NULL;
usr.bin/openssl/smime.c
998
if (!PKCS7_decrypt(p7, key, recip, out, cfg.flags)) {
usr.bin/openssl/speed.c
1044
static DES_cblock key = {0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0};
usr.bin/openssl/speed.c
1578
DES_set_key_unchecked(&key, &sch);
usr.bin/pkgconf/cli/main.c
180
printf("%s\n", tuple->key);
usr.bin/pkgconf/cli/main.c
553
if (want_variable != NULL && strcmp(want_variable, tuple->key))
usr.bin/pkgconf/cli/main.c
556
snprintf(havebuf, sizeof havebuf, "%s_%s", env_prefix, tuple->key);
usr.bin/pkgconf/libpkgconf/cache.c
37
const char *key = a;
usr.bin/pkgconf/libpkgconf/cache.c
40
return strcmp(key, pkg->id);
usr.bin/pkgconf/libpkgconf/libpkgconf.h
124
char *key;
usr.bin/pkgconf/libpkgconf/libpkgconf.h
312
typedef void (*pkgconf_parser_operand_func_t)(void *data, const size_t lineno, const char *key, const char *value);
usr.bin/pkgconf/libpkgconf/libpkgconf.h
390
PKGCONF_API pkgconf_tuple_t *pkgconf_tuple_add(const pkgconf_client_t *client, pkgconf_list_t *parent, const char *key, const char *value, bool parse, unsigned int flags);
usr.bin/pkgconf/libpkgconf/libpkgconf.h
391
PKGCONF_API char *pkgconf_tuple_find(const pkgconf_client_t *client, pkgconf_list_t *list, const char *key);
usr.bin/pkgconf/libpkgconf/libpkgconf.h
395
PKGCONF_API void pkgconf_tuple_add_global(pkgconf_client_t *client, const char *key, const char *value);
usr.bin/pkgconf/libpkgconf/libpkgconf.h
396
PKGCONF_API char *pkgconf_tuple_find_global(const pkgconf_client_t *client, const char *key);
usr.bin/pkgconf/libpkgconf/parser.c
109
ops[(unsigned char) op](data, lineno, key, value);
usr.bin/pkgconf/libpkgconf/parser.c
42
char op, *p, *key, *value;
usr.bin/pkgconf/libpkgconf/parser.c
59
key = p;
usr.bin/pkgconf/libpkgconf/parser.c
63
if (!isalpha((unsigned char)*key) &&
usr.bin/pkgconf/libpkgconf/personality.c
211
personality_keyword_pair_cmp(const void *key, const void *ptr)
usr.bin/pkgconf/libpkgconf/personality.c
214
return strcasecmp(key, pair->keyword);
usr.bin/pkgconf/libpkgconf/pkg.c
1051
.key = "pc_system_libdirs",
usr.bin/pkgconf/libpkgconf/pkg.c
1056
.key = "pc_system_includedirs",
usr.bin/pkgconf/libpkgconf/pkg.c
1061
.key = "pc_path",
usr.bin/pkgconf/libpkgconf/pkg.c
1082
.key = "pc_system_libdirs",
usr.bin/pkgconf/libpkgconf/pkg.c
1087
.key = "pc_system_includedirs",
usr.bin/pkgconf/libpkgconf/pkg.c
1092
.key = "pc_path",
usr.bin/pkgconf/libpkgconf/pkg.c
1111
static int pkgconf_builtin_pkg_pair_cmp(const void *key, const void *ptr)
usr.bin/pkgconf/libpkgconf/pkg.c
1114
return strcasecmp(key, pair->name);
usr.bin/pkgconf/libpkgconf/pkg.c
1155
static int pkgconf_pkg_comparator_pair_namecmp(const void *key, const void *ptr)
usr.bin/pkgconf/libpkgconf/pkg.c
1158
return strcmp(key, pair->name);
usr.bin/pkgconf/libpkgconf/pkg.c
150
static int pkgconf_pkg_parser_keyword_pair_cmp(const void *key, const void *ptr)
usr.bin/pkgconf/libpkgconf/pkg.c
153
return strcasecmp(key, pair->keyword);
usr.bin/pkgconf/libpkgconf/pkg.c
796
HKEY key;
usr.bin/pkgconf/libpkgconf/pkg.c
802
0, KEY_READ, &key) != ERROR_SUCCESS)
usr.bin/pkgconf/libpkgconf/pkg.c
805
while (RegEnumValue(key, i++, buf, &bufsize, NULL, NULL, NULL, NULL)
usr.bin/pkgconf/libpkgconf/pkg.c
812
if (RegQueryValueEx(key, buf, NULL, &type, (LPBYTE) pathbuf, &pathbuflen)
usr.bin/pkgconf/libpkgconf/pkg.c
823
RegCloseKey(key);
usr.bin/pkgconf/libpkgconf/tuple.c
140
pkgconf_tuple_find_delete(pkgconf_list_t *list, const char *key)
usr.bin/pkgconf/libpkgconf/tuple.c
148
if (!strcmp(tuple->key, key))
usr.bin/pkgconf/libpkgconf/tuple.c
236
pkgconf_tuple_add(const pkgconf_client_t *client, pkgconf_list_t *list, const char *key, const char *value, bool parse, unsigned int flags)
usr.bin/pkgconf/libpkgconf/tuple.c
241
pkgconf_tuple_find_delete(list, key);
usr.bin/pkgconf/libpkgconf/tuple.c
245
tuple->key = strdup(key);
usr.bin/pkgconf/libpkgconf/tuple.c
251
PKGCONF_TRACE(client, "adding tuple to @%p: %s => %s (parsed? %d)", list, key, tuple->value, parse);
usr.bin/pkgconf/libpkgconf/tuple.c
274
pkgconf_tuple_find(const pkgconf_client_t *client, pkgconf_list_t *list, const char *key)
usr.bin/pkgconf/libpkgconf/tuple.c
279
global_tuple = lookup_global_tuple(client, key);
usr.bin/pkgconf/libpkgconf/tuple.c
287
if (!strcmp(tuple->key, key))
usr.bin/pkgconf/libpkgconf/tuple.c
452
free(tuple->key);
usr.bin/pkgconf/libpkgconf/tuple.c
46
pkgconf_tuple_add_global(pkgconf_client_t *client, const char *key, const char *value)
usr.bin/pkgconf/libpkgconf/tuple.c
48
pkgconf_tuple_add(client, &client->global_vars, key, value, false, 0);
usr.bin/pkgconf/libpkgconf/tuple.c
52
lookup_global_tuple(const pkgconf_client_t *client, const char *key)
usr.bin/pkgconf/libpkgconf/tuple.c
60
if (!strcmp(tuple->key, key))
usr.bin/pkgconf/libpkgconf/tuple.c
80
pkgconf_tuple_find_global(const pkgconf_client_t *client, const char *key)
usr.bin/pkgconf/libpkgconf/tuple.c
84
tuple = lookup_global_tuple(client, key);
usr.bin/rsync/flist.c
1259
if ((hent.key = strdup(wfl[i].wpath)) == NULL) {
usr.bin/rsync/flist.c
1266
} else if (hentp->key != hent.key) {
usr.bin/rsync/flist.c
1268
free(hent.key);
usr.bin/rsync/flist.c
1333
hent.key = ent->fts_path + stripdir;
usr.bin/signify/signify.c
255
uint8_t *key, size_t keylen)
usr.bin/signify/signify.c
262
memset(key, 0, keylen);
usr.bin/signify/signify.c
281
if (!errstr && bcrypt_pbkdf(pass, strlen(pass), salt, saltlen, key,
usr.bin/skey/skey.c
126
if (keycrunch(key, seed, passwd) != 0) {
usr.bin/skey/skey.c
135
f(key);
usr.bin/skey/skey.c
136
(void)puts(hexmode ? put8(buf, key) : btoe(buf, key));
usr.bin/skey/skey.c
139
f(key);
usr.bin/skey/skey.c
142
(void)printf("%d: %s\n", i, put8(buf, key));
usr.bin/skey/skey.c
144
(void)printf("%d: %-29s\n", i, btoe(buf, key));
usr.bin/skey/skey.c
145
f(key);
usr.bin/skey/skey.c
42
char passwd[SKEY_MAX_PW_LEN+1], key[SKEY_BINKEY_SIZE];
usr.bin/skeyaudit/skeyaudit.c
121
(void)memset(&key, 0, sizeof(key));
usr.bin/skeyaudit/skeyaudit.c
125
while ((ch = skeygetnext(&key)) == 0) {
usr.bin/skeyaudit/skeyaudit.c
126
left = key.n - 1;
usr.bin/skeyaudit/skeyaudit.c
127
if ((pw = getpwnam(key.logname)) == NULL)
usr.bin/skeyaudit/skeyaudit.c
131
(void)fclose(key.keyfile);
usr.bin/skeyaudit/skeyaudit.c
132
key.keyfile = NULL;
usr.bin/skeyaudit/skeyaudit.c
144
switch (skeylookup(&key, name)) {
usr.bin/skeyaudit/skeyaudit.c
146
left = key.n - 1;
usr.bin/skeyaudit/skeyaudit.c
156
(void)fclose(key.keyfile);
usr.bin/skeyaudit/skeyaudit.c
70
struct skey key;
usr.bin/skeyinfo/skeyinfo.c
41
struct skey key;
usr.bin/skeyinfo/skeyinfo.c
79
error = skeylookup(&key, name);
usr.bin/skeyinfo/skeyinfo.c
84
(void)printf("%d %s\n", key.n - 1, key.seed);
usr.bin/skeyinfo/skeyinfo.c
93
(void)fclose(key.keyfile);
usr.bin/skeyinit/skeyinit.c
299
secure_mode(&n, key, seed, sizeof seed, buf, sizeof(buf));
usr.bin/skeyinit/skeyinit.c
301
normal_mode(pp->pw_name, n, key, seed);
usr.bin/skeyinit/skeyinit.c
307
btoa8(skey.val, key);
usr.bin/skeyinit/skeyinit.c
317
hexmode ? put8(buf, key) : btoe(buf, key));
usr.bin/skeyinit/skeyinit.c
322
secure_mode(int *count, char *key, char *seed, size_t seedlen,
usr.bin/skeyinit/skeyinit.c
400
if (etob(key, buf) == 1 || atob8(key, buf) == 0)
usr.bin/skeyinit/skeyinit.c
408
normal_mode(char *username, int n, char *key, char *seed)
usr.bin/skeyinit/skeyinit.c
445
nn = keycrunch(key, seed, passwd);
usr.bin/skeyinit/skeyinit.c
460
if (memcmp(key, key2, sizeof(key2)) == 0)
usr.bin/skeyinit/skeyinit.c
468
f(key);
usr.bin/skeyinit/skeyinit.c
50
char buf[256], key[SKEY_BINKEY_SIZE], filename[PATH_MAX], *ht;
usr.bin/snmp/smi.c
551
struct oid *value, key;
usr.bin/snmp/smi.c
555
bzero(&key, sizeof(key));
usr.bin/snmp/smi.c
556
bcopy(o, &key.o_id, sizeof(struct ber_oid));
usr.bin/snmp/smi.c
559
key.o_oidlen = i + 1;
usr.bin/snmp/smi.c
561
(value = RB_FIND(oidtree, &smi_oidtree, &key)) != NULL) {
usr.bin/snmp/smi.c
564
key.o_oidlen = i + 2;
usr.bin/snmp/smi.c
565
if (RB_FIND(oidtree, &smi_oidtree, &key) != NULL)
usr.bin/snmp/smi.c
569
snprintf(str, sizeof(str), "%u", key.o_oid[i]);
usr.bin/snmp/usm.c
252
usm_crypt(const EVP_CIPHER *cipher, int do_enc, char *key,
usr.bin/snmp/usm.c
267
iv[i] = salt[i] ^ key[USM_SALTOFFSET + i];
usr.bin/snmp/usm.c
285
if (!EVP_CipherInit(ctx, cipher, key, iv, do_enc)) {
usr.bin/snmp/usm.c
500
usm_setauth(struct snmp_sec *sec, const EVP_MD *digest, const char *key,
usr.bin/snmp/usm.c
513
if ((usm->authkey = usm_passwd2mkey(digest, key)) == NULL)
usr.bin/snmp/usm.c
524
memcpy(lkey, key, keylen);
usr.bin/snmp/usm.c
533
usm_setpriv(struct snmp_sec *sec, const EVP_CIPHER *cipher, const char *key,
usr.bin/snmp/usm.c
550
if ((usm->privkey = usm_passwd2mkey(usm->digest, key)) == NULL)
usr.bin/snmp/usm.c
561
memcpy(lkey, key, keylen);
usr.bin/snmp/usm.c
631
char *key;
usr.bin/snmp/usm.c
659
if ((key = malloc(dlen)) == NULL)
usr.bin/snmp/usm.c
661
memcpy(key, keybuf, dlen);
usr.bin/snmp/usm.c
662
return key;
usr.bin/sort/coll.c
100
if (ka->key[i].k && ka->key[i].k != s)
usr.bin/sort/coll.c
101
bwsfree(ka->key[i].k);
usr.bin/sort/coll.c
115
kv = &(ka->key[ind]);
usr.bin/sort/coll.c
150
kv = &(si->ka.key[i]);
usr.bin/sort/coll.c
382
struct bwstring *key;
usr.bin/sort/coll.c
387
key = cut_field(s, kspecs);
usr.bin/sort/coll.c
391
key = dictionary_order(key);
usr.bin/sort/coll.c
393
key = ignore_nonprinting(key);
usr.bin/sort/coll.c
395
key = ignore_case(key);
usr.bin/sort/coll.c
397
set_key_on_keys_array(ka, key, i);
usr.bin/sort/coll.c
469
res = sm->func(&(ps2->key[i]), &(ps1->key[i]), offset);
usr.bin/sort/coll.c
471
res = sm->func(&(ps1->key[i]), &(ps2->key[i]), offset);
usr.bin/sort/coll.h
94
struct key_value key[0];
usr.bin/sort/radixsort.c
154
bws = sli->ka.key[0].k;
usr.bin/ssh/auth.c
205
const struct sshkey *key = authctxt->auth_method_key;
usr.bin/ssh/auth.c
209
if (key == NULL)
usr.bin/ssh/auth.c
212
if (sshkey_is_cert(key)) {
usr.bin/ssh/auth.c
213
fp = sshkey_fingerprint(key,
usr.bin/ssh/auth.c
215
cafp = sshkey_fingerprint(key->cert->signature_key,
usr.bin/ssh/auth.c
218
sshkey_type(key), fp == NULL ? "(null)" : fp,
usr.bin/ssh/auth.c
219
key->cert->key_id,
usr.bin/ssh/auth.c
220
(unsigned long long)key->cert->serial,
usr.bin/ssh/auth.c
221
sshkey_type(key->cert->signature_key),
usr.bin/ssh/auth.c
228
fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/auth.c
230
xasprintf(&ret, "%s %s%s%s", sshkey_type(key),
usr.bin/ssh/auth.c
369
check_key_in_hostfiles(struct passwd *pw, struct sshkey *key, const char *host,
usr.bin/ssh/auth.c
398
host_status = check_key_in_hostkeys(hostkeys, key, &found);
usr.bin/ssh/auth.c
458
auth_key_is_revoked(struct sshkey *key)
usr.bin/ssh/auth.c
466
if ((fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/auth.c
474
r = sshkey_check_revoked(key, options.revoked_keys_files[i]);
usr.bin/ssh/auth.c
480
sshkey_type(key), fp,
usr.bin/ssh/auth.c
485
"revoked keys file %s", sshkey_type(key), fp,
usr.bin/ssh/auth2-hostbased.c
101
"(received %s, expected %s)", sshkey_ssh_name(key), pkalg);
usr.bin/ssh/auth2-hostbased.c
109
if ((r = sshkey_check_cert_sigtype(key,
usr.bin/ssh/auth2-hostbased.c
112
(key->cert == NULL || key->cert->signature_type == NULL) ?
usr.bin/ssh/auth2-hostbased.c
113
"(null)" : key->cert->signature_type);
usr.bin/ssh/auth2-hostbased.c
116
if ((r = sshkey_check_rsa_length(key,
usr.bin/ssh/auth2-hostbased.c
118
logit_r(r, "refusing %s key", sshkey_type(key));
usr.bin/ssh/auth2-hostbased.c
150
chost, key) &&
usr.bin/ssh/auth2-hostbased.c
151
mm_sshkey_verify(key, sig, slen,
usr.bin/ssh/auth2-hostbased.c
155
auth2_record_key(authctxt, authenticated, key);
usr.bin/ssh/auth2-hostbased.c
159
sshkey_free(key);
usr.bin/ssh/auth2-hostbased.c
171
const char *cuser, char *chost, struct sshkey *key)
usr.bin/ssh/auth2-hostbased.c
178
if (auth_key_is_revoked(key))
usr.bin/ssh/auth2-hostbased.c
214
if (sshkey_is_cert(key) && sshkey_cert_check_host(key, lookup,
usr.bin/ssh/auth2-hostbased.c
216
if ((fp = sshkey_fingerprint(key->cert->signature_key,
usr.bin/ssh/auth2-hostbased.c
220
"%s CA %s: %s", key->cert->key_id,
usr.bin/ssh/auth2-hostbased.c
221
(unsigned long long)key->cert->serial,
usr.bin/ssh/auth2-hostbased.c
222
sshkey_type(key->cert->signature_key), fp, reason);
usr.bin/ssh/auth2-hostbased.c
224
key->cert->key_id, (unsigned long long)key->cert->serial,
usr.bin/ssh/auth2-hostbased.c
230
host_status = check_key_in_hostfiles(pw, key, lookup,
usr.bin/ssh/auth2-hostbased.c
236
host_status = check_key_in_hostfiles(pw, key, lookup,
usr.bin/ssh/auth2-hostbased.c
243
if (sshkey_is_cert(key)) {
usr.bin/ssh/auth2-hostbased.c
244
if ((fp = sshkey_fingerprint(key->cert->signature_key,
usr.bin/ssh/auth2-hostbased.c
248
"%s CA %s from %s@%s", key->cert->key_id,
usr.bin/ssh/auth2-hostbased.c
249
sshkey_type(key->cert->signature_key), fp,
usr.bin/ssh/auth2-hostbased.c
252
if ((fp = sshkey_fingerprint(key,
usr.bin/ssh/auth2-hostbased.c
256
sshkey_type(key), fp, cuser, lookup);
usr.bin/ssh/auth2-hostbased.c
63
struct sshkey *key = NULL;
usr.bin/ssh/auth2-hostbased.c
90
if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) {
usr.bin/ssh/auth2-hostbased.c
94
if (key == NULL) {
usr.bin/ssh/auth2-hostbased.c
98
if (key->type != pktype || (sshkey_type_plain(pktype) == KEY_ECDSA &&
usr.bin/ssh/auth2-hostbased.c
99
sshkey_ecdsa_nid_from_name(pkalg) != key->ecdsa_nid)) {
usr.bin/ssh/auth2-pubkey.c
142
if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) {
usr.bin/ssh/auth2-pubkey.c
146
if (key == NULL) {
usr.bin/ssh/auth2-pubkey.c
150
if (key->type != pktype || (sshkey_type_plain(pktype) == KEY_ECDSA &&
usr.bin/ssh/auth2-pubkey.c
151
sshkey_ecdsa_nid_from_name(pkalg) != key->ecdsa_nid)) {
usr.bin/ssh/auth2-pubkey.c
153
"(received %s, expected %s)", sshkey_ssh_name(key), pkalg);
usr.bin/ssh/auth2-pubkey.c
156
if (auth2_key_already_used(authctxt, key)) {
usr.bin/ssh/auth2-pubkey.c
157
logit("refusing previously-used %s key", sshkey_type(key));
usr.bin/ssh/auth2-pubkey.c
165
if ((r = sshkey_check_cert_sigtype(key,
usr.bin/ssh/auth2-pubkey.c
168
(key->cert == NULL || key->cert->signature_type == NULL) ?
usr.bin/ssh/auth2-pubkey.c
169
"(null)" : key->cert->signature_type);
usr.bin/ssh/auth2-pubkey.c
172
if ((r = sshkey_check_rsa_length(key,
usr.bin/ssh/auth2-pubkey.c
174
logit_r(r, "refusing %s key", sshkey_type(key));
usr.bin/ssh/auth2-pubkey.c
177
key_s = format_key(key);
usr.bin/ssh/auth2-pubkey.c
178
if (sshkey_is_cert(key))
usr.bin/ssh/auth2-pubkey.c
179
ca_s = format_key(key->cert->signature_key);
usr.bin/ssh/auth2-pubkey.c
222
if (mm_user_key_allowed(ssh, pw, key, 1, &authopts) &&
usr.bin/ssh/auth2-pubkey.c
223
mm_sshkey_verify(key, sig, slen,
usr.bin/ssh/auth2-pubkey.c
264
auth2_record_key(authctxt, authenticated, key);
usr.bin/ssh/auth2-pubkey.c
284
if (mm_user_key_allowed(ssh, pw, key, 0, NULL)) {
usr.bin/ssh/auth2-pubkey.c
304
sshkey_free(key);
usr.bin/ssh/auth2-pubkey.c
374
match_principals_command(struct passwd *user_pw, const struct sshkey *key,
usr.bin/ssh/auth2-pubkey.c
378
const struct sshkey_cert *cert = key->cert;
usr.bin/ssh/auth2-pubkey.c
431
if ((key_fp = sshkey_fingerprint(key,
usr.bin/ssh/auth2-pubkey.c
440
if ((r = sshkey_to_base64(key, &keytext)) != 0) {
usr.bin/ssh/auth2-pubkey.c
455
"t", sshkey_ssh_name(key),
usr.bin/ssh/auth2-pubkey.c
511
user_cert_trusted_ca(struct passwd *pw, struct sshkey *key,
usr.bin/ssh/auth2-pubkey.c
524
if (!sshkey_is_cert(key) || options.trusted_user_ca_keys == NULL)
usr.bin/ssh/auth2-pubkey.c
527
if ((ca_fp = sshkey_fingerprint(key->cert->signature_key,
usr.bin/ssh/auth2-pubkey.c
531
if ((r = sshkey_in_file(key->cert->signature_key,
usr.bin/ssh/auth2-pubkey.c
534
sshkey_type(key->cert->signature_key), ca_fp,
usr.bin/ssh/auth2-pubkey.c
545
key->cert, &principals_opts))
usr.bin/ssh/auth2-pubkey.c
549
if (!found_principal && match_principals_command(pw, key,
usr.bin/ssh/auth2-pubkey.c
561
if (sshkey_cert_check_authority_now(key, 0, 0,
usr.bin/ssh/auth2-pubkey.c
566
if ((cert_opts = sshauthopt_from_cert(key)) == NULL) {
usr.bin/ssh/auth2-pubkey.c
588
"signed by %s CA %s: %s", key->cert->key_id,
usr.bin/ssh/auth2-pubkey.c
589
(unsigned long long)key->cert->serial,
usr.bin/ssh/auth2-pubkey.c
590
sshkey_type(key->cert->signature_key), ca_fp,
usr.bin/ssh/auth2-pubkey.c
593
"serial=%llu: %s", key->cert->key_id,
usr.bin/ssh/auth2-pubkey.c
594
(unsigned long long)key->cert->serial, reason);
usr.bin/ssh/auth2-pubkey.c
601
"%s CA %s via %s", key->cert->key_id,
usr.bin/ssh/auth2-pubkey.c
602
(unsigned long long)key->cert->serial,
usr.bin/ssh/auth2-pubkey.c
603
sshkey_type(key->cert->signature_key), ca_fp,
usr.bin/ssh/auth2-pubkey.c
624
user_key_allowed2(struct passwd *pw, struct sshkey *key,
usr.bin/ssh/auth2-pubkey.c
640
key, remote_ip, remote_host, authoptsp);
usr.bin/ssh/auth2-pubkey.c
653
user_key_command_allowed2(struct passwd *user_pw, struct sshkey *key,
usr.bin/ssh/auth2-pubkey.c
692
if ((key_fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/auth2-pubkey.c
697
if ((r = sshkey_to_base64(key, &keytext)) != 0) {
usr.bin/ssh/auth2-pubkey.c
722
"t", sshkey_ssh_name(key),
usr.bin/ssh/auth2-pubkey.c
758
options.authorized_keys_command, key, remote_ip,
usr.bin/ssh/auth2-pubkey.c
76
format_key(const struct sshkey *key)
usr.bin/ssh/auth2-pubkey.c
78
char *ret, *fp = sshkey_fingerprint(key,
usr.bin/ssh/auth2-pubkey.c
789
user_key_allowed(struct ssh *ssh, struct passwd *pw, struct sshkey *key,
usr.bin/ssh/auth2-pubkey.c
800
if (auth_key_is_revoked(key))
usr.bin/ssh/auth2-pubkey.c
802
if (sshkey_is_cert(key) &&
usr.bin/ssh/auth2-pubkey.c
803
auth_key_is_revoked(key->cert->signature_key))
usr.bin/ssh/auth2-pubkey.c
81
xasprintf(&ret, "%s %s", sshkey_type(key), fp);
usr.bin/ssh/auth2-pubkey.c
839
success = user_key_allowed2(pw, key, gl.gl_pathv[j],
usr.bin/ssh/auth2-pubkey.c
853
if ((success = user_cert_trusted_ca(pw, key, remote_ip, remote_host,
usr.bin/ssh/auth2-pubkey.c
859
if ((success = user_key_command_allowed2(pw, key, remote_ip,
usr.bin/ssh/auth2-pubkey.c
92
struct sshkey *key = NULL, *hostkey = NULL;
usr.bin/ssh/auth2-pubkeyfile.c
267
auth_check_authkey_line(struct passwd *pw, struct sshkey *key,
usr.bin/ssh/auth2-pubkeyfile.c
271
int want_keytype = sshkey_is_cert(key) ? KEY_UNSPEC : key->type;
usr.bin/ssh/auth2-pubkeyfile.c
310
if (sshkey_is_cert(key)) {
usr.bin/ssh/auth2-pubkeyfile.c
312
if (!sshkey_equal(found, key->cert->signature_key) ||
usr.bin/ssh/auth2-pubkeyfile.c
317
if (!sshkey_equal(found, key) || keyopts->cert_authority)
usr.bin/ssh/auth2-pubkeyfile.c
327
sshkey_is_cert(key) ? "CA" : "key", sshkey_type(found), fp);
usr.bin/ssh/auth2-pubkeyfile.c
330
sshkey_is_cert(key), remote_ip, remote_host, loc) != 0) {
usr.bin/ssh/auth2-pubkeyfile.c
335
if (!sshkey_is_cert(key)) {
usr.bin/ssh/auth2-pubkeyfile.c
348
if ((certopts = sshauthopt_from_cert(key)) == NULL) {
usr.bin/ssh/auth2-pubkeyfile.c
366
!match_principals_option(keyopts->cert_principals, key->cert)) {
usr.bin/ssh/auth2-pubkeyfile.c
370
if (sshkey_cert_check_authority_now(key, 0, 0,
usr.bin/ssh/auth2-pubkeyfile.c
377
key->cert->key_id,
usr.bin/ssh/auth2-pubkeyfile.c
378
(unsigned long long)key->cert->serial,
usr.bin/ssh/auth2-pubkeyfile.c
394
"signed by %s CA %s via %s: %s", key->cert->key_id,
usr.bin/ssh/auth2-pubkeyfile.c
395
(unsigned long long)key->cert->serial,
usr.bin/ssh/auth2-pubkeyfile.c
396
sshkey_type(key->cert->signature_key), fp, loc, reason);
usr.bin/ssh/auth2-pubkeyfile.c
398
key->cert->key_id, (unsigned long long)key->cert->serial, reason);
usr.bin/ssh/auth2-pubkeyfile.c
419
struct sshkey *key, const char *remote_ip,
usr.bin/ssh/auth2-pubkeyfile.c
444
if (auth_check_authkey_line(pw, key, cp,
usr.bin/ssh/auth2.c
672
const struct sshkey *key)
usr.bin/ssh/auth2.c
677
if ((r = sshkey_from_private(key, &dup)) != 0)
usr.bin/ssh/auth2.c
686
if ((r = sshkey_from_private(key, &dup)) != 0)
usr.bin/ssh/auth2.c
700
auth2_key_already_used(Authctxt *authctxt, const struct sshkey *key)
usr.bin/ssh/auth2.c
706
if (sshkey_equal_public(key, authctxt->prev_keys[i])) {
usr.bin/ssh/authfd.c
356
ssh_agent_has_key(int sock, const struct sshkey *key)
usr.bin/ssh/authfd.c
367
if (sshkey_equal_public(idlist->keys[i], key)) {
usr.bin/ssh/authfd.c
387
agent_encode_alg(const struct sshkey *key, const char *alg)
usr.bin/ssh/authfd.c
389
if (alg != NULL && sshkey_type_plain(key->type) == KEY_RSA) {
usr.bin/ssh/authfd.c
402
ssh_agent_sign(int sock, const struct sshkey *key,
usr.bin/ssh/authfd.c
419
flags |= agent_encode_alg(key, alg);
usr.bin/ssh/authfd.c
421
(r = sshkey_puts(key, msg)) != 0 ||
usr.bin/ssh/authfd.c
445
if (!sshkey_is_sk(key) &&
usr.bin/ssh/authfd.c
587
ssh_add_identity_constrained(int sock, struct sshkey *key,
usr.bin/ssh/authfd.c
599
switch (key->type) {
usr.bin/ssh/authfd.c
616
(r = sshkey_private_serialize(key, msg)) != 0 ||
usr.bin/ssh/authfd.c
642
ssh_remove_identity(int sock, const struct sshkey *key)
usr.bin/ssh/authfd.c
652
if (key->type != KEY_UNSPEC) {
usr.bin/ssh/authfd.c
653
if ((r = sshkey_to_blob(key, &blob, &blen)) != 0)
usr.bin/ssh/authfd.c
747
ssh_agent_bind_hostkey(int sock, const struct sshkey *key,
usr.bin/ssh/authfd.c
754
if (key == NULL || session_id == NULL || signature == NULL)
usr.bin/ssh/authfd.c
760
(r = sshkey_puts(key, msg)) != 0 ||
usr.bin/ssh/authfd.h
50
int ssh_add_identity_constrained(int sock, struct sshkey *key,
usr.bin/ssh/authfd.h
53
int ssh_agent_has_key(int sock, const struct sshkey *key);
usr.bin/ssh/authfd.h
54
int ssh_remove_identity(int sock, const struct sshkey *key);
usr.bin/ssh/authfd.h
62
int ssh_agent_sign(int sock, const struct sshkey *key,
usr.bin/ssh/authfd.h
66
int ssh_agent_bind_hostkey(int sock, const struct sshkey *key,
usr.bin/ssh/authfile.c
308
struct sshkey *key = NULL, *cert = NULL;
usr.bin/ssh/authfile.c
327
passphrase, &key, NULL)) != 0 ||
usr.bin/ssh/authfile.c
332
if (sshkey_equal_public(key, cert) == 0) {
usr.bin/ssh/authfile.c
337
if ((r = sshkey_to_certified(key)) != 0 ||
usr.bin/ssh/authfile.c
338
(r = sshkey_cert_copy(cert, key)) != 0)
usr.bin/ssh/authfile.c
342
*keyp = key;
usr.bin/ssh/authfile.c
343
key = NULL;
usr.bin/ssh/authfile.c
346
sshkey_free(key);
usr.bin/ssh/authfile.c
360
sshkey_in_file(struct sshkey *key, const char *filename, int strict_type,
usr.bin/ssh/authfile.c
404
if (sshkey_compare(key, pub) ||
usr.bin/ssh/authfile.c
405
(check_ca && sshkey_is_cert(key) &&
usr.bin/ssh/authfile.c
406
sshkey_compare(key->cert->signature_key, pub))) {
usr.bin/ssh/authfile.c
427
sshkey_check_revoked(struct sshkey *key, const char *revoked_keys_file)
usr.bin/ssh/authfile.c
431
r = ssh_krl_file_contains_key(revoked_keys_file, key);
usr.bin/ssh/authfile.c
440
switch ((r = sshkey_in_file(key, revoked_keys_file, 0, 1))) {
usr.bin/ssh/authfile.c
477
sshkey_save_public(const struct sshkey *key, const char *path,
usr.bin/ssh/authfile.c
491
if ((r = sshkey_write(key, f)) != 0)
usr.bin/ssh/authfile.c
59
sshkey_save_private(struct sshkey *key, const char *filename,
usr.bin/ssh/authfile.c
68
if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment,
usr.bin/ssh/authfile.h
49
int sshkey_check_revoked(struct sshkey *key, const char *revoked_keys_file);
usr.bin/ssh/authfile.h
51
int sshkey_save_public(const struct sshkey *key, const char *path,
usr.bin/ssh/cipher-chachapoly-libcrypto.c
33
chachapoly_new(const u_char *key, u_int keylen)
usr.bin/ssh/cipher-chachapoly-libcrypto.c
44
if (!EVP_CipherInit(ctx->main_evp, EVP_chacha20(), key, NULL, 1))
usr.bin/ssh/cipher-chachapoly-libcrypto.c
46
if (!EVP_CipherInit(ctx->header_evp, EVP_chacha20(), key + 32, NULL, 1))
usr.bin/ssh/cipher-chachapoly.c
33
chachapoly_new(const u_char *key, u_int keylen)
usr.bin/ssh/cipher-chachapoly.c
41
chacha_keysetup(&ctx->main_ctx, key, 256);
usr.bin/ssh/cipher-chachapoly.c
42
chacha_keysetup(&ctx->header_ctx, key + 32, 256);
usr.bin/ssh/cipher-chachapoly.h
29
struct chachapoly_ctx *chachapoly_new(const u_char *key, u_int keylen)
usr.bin/ssh/cipher.c
231
const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
usr.bin/ssh/cipher.c
256
cc->cp_ctx = chachapoly_new(key, keylen);
usr.bin/ssh/cipher.c
266
aesctr_keysetup(&cc->ac_ctx, key, 8 * keylen, 8 * ivlen);
usr.bin/ssh/cipher.c
297
if (EVP_CipherInit(cc->evp, NULL, (u_char *)key, NULL, -1) == 0) {
usr.bin/ssh/clientloop.c
2108
if (l->key == NULL)
usr.bin/ssh/clientloop.c
2113
if (sshkey_equal(l->key, ctx->keys[i])) {
usr.bin/ssh/clientloop.c
2162
if (!sshkey_equal(l->key, ctx->keys[i]))
usr.bin/ssh/clientloop.c
2170
debug3_f("deprecated %s key at %s:%ld", sshkey_ssh_name(l->key),
usr.bin/ssh/clientloop.c
2176
ctx->old_keys[ctx->nold++] = l->key;
usr.bin/ssh/clientloop.c
2177
l->key = NULL;
usr.bin/ssh/clientloop.c
2191
if (l->status == HKF_STATUS_MATCHED || l->key == NULL)
usr.bin/ssh/clientloop.c
2196
if (!sshkey_equal(l->key, ctx->old_keys[i]))
usr.bin/ssh/clientloop.c
2453
struct sshkey *key = NULL, **tmp;
usr.bin/ssh/clientloop.c
2469
sshkey_free(key);
usr.bin/ssh/clientloop.c
2470
key = NULL;
usr.bin/ssh/clientloop.c
2475
if ((r = sshkey_from_blob(blob, len, &key)) != 0) {
usr.bin/ssh/clientloop.c
2481
fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/clientloop.c
2483
debug3_f("received %s key %s", sshkey_type(key), fp);
usr.bin/ssh/clientloop.c
2486
if (!hostkey_accepted_by_hostkeyalgs(key)) {
usr.bin/ssh/clientloop.c
2488
"HostkeyAlgorithms", sshkey_ssh_name(key));
usr.bin/ssh/clientloop.c
2492
if (sshkey_is_cert(key)) {
usr.bin/ssh/clientloop.c
2494
sshkey_ssh_name(key));
usr.bin/ssh/clientloop.c
2499
if (sshkey_equal(key, ctx->keys[i])) {
usr.bin/ssh/clientloop.c
2501
sshkey_ssh_name(key));
usr.bin/ssh/clientloop.c
2511
ctx->keys[ctx->nkeys++] = key;
usr.bin/ssh/clientloop.c
2512
key = NULL;
usr.bin/ssh/clientloop.c
2639
sshkey_free(key);
usr.bin/ssh/dns.c
110
if ((r = sshkey_fingerprint_raw(key, fp_alg, digest,
usr.bin/ssh/dns.c
296
export_dns_rr(const char *hostname, struct sshkey *key, FILE *f, int generic,
usr.bin/ssh/dns.c
311
&rdata_digest, &rdata_digest_len, key)) {
usr.bin/ssh/dns.c
79
u_char **digest, size_t *digest_len, struct sshkey *key)
usr.bin/ssh/dns.c
84
switch (key->type) {
usr.bin/ssh/hmac.c
139
hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen)
usr.bin/ssh/hmac.c
147
if (ssh_hmac_init(ctx, key, klen) < 0 ||
usr.bin/ssh/hmac.c
63
ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
usr.bin/ssh/hmac.c
68
if (key != NULL) {
usr.bin/ssh/hmac.c
71
memcpy(ctx->buf, key, klen);
usr.bin/ssh/hmac.c
72
else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf,
usr.bin/ssh/hmac.h
29
int ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
usr.bin/ssh/hostfile.c
245
sshkey_type(l->key), l->path, l->linenum);
usr.bin/ssh/hostfile.c
253
hostkeys->entries[hostkeys->num_entries].key = l->key;
usr.bin/ssh/hostfile.c
254
l->key = NULL; /* steal it */
usr.bin/ssh/hostfile.c
306
sshkey_free(hostkeys->entries[i].key);
usr.bin/ssh/hostfile.c
322
if (sshkey_equal_public(k, hostkeys->entries[i].key))
usr.bin/ssh/hostfile.c
326
hostkeys->entries[i].key))
usr.bin/ssh/hostfile.c
363
if (hostkeys->entries[i].key->type != keytype)
usr.bin/ssh/hostfile.c
367
hostkeys->entries[i].key->ecdsa_nid != nid)
usr.bin/ssh/hostfile.c
372
k = hostkeys->entries[i].key;
usr.bin/ssh/hostfile.c
377
hostkeys->entries[i].key)) {
usr.bin/ssh/hostfile.c
385
if (sshkey_equal(k, hostkeys->entries[i].key)) {
usr.bin/ssh/hostfile.c
406
check_key_in_hostkeys(struct hostkeys *hostkeys, struct sshkey *key,
usr.bin/ssh/hostfile.c
409
if (key == NULL)
usr.bin/ssh/hostfile.c
411
return check_hostkeys_by_key_or_type(hostkeys, key, 0, -1, found);
usr.bin/ssh/hostfile.c
436
const struct sshkey *key, int store_hash)
usr.bin/ssh/hostfile.c
461
if ((r = sshkey_format_text(key, entry)) == 0)
usr.bin/ssh/hostfile.c
470
success = format_host_entry(entry, ip, NULL, key, 1);
usr.bin/ssh/hostfile.c
476
const struct sshkey *key, int store_hash)
usr.bin/ssh/hostfile.c
483
if ((r = format_host_entry(entry, host, ip, key, store_hash)) != 1) {
usr.bin/ssh/hostfile.c
536
const struct sshkey *key, int store_hash)
usr.bin/ssh/hostfile.c
541
if (key == NULL)
usr.bin/ssh/hostfile.c
556
success = write_host_entry(f, host, NULL, key, store_hash);
usr.bin/ssh/hostfile.c
586
if (!sshkey_equal(ctx->keys[i], l->key))
usr.bin/ssh/hostfile.c
591
sshkey_type(l->key), l->path, l->linenum);
usr.bin/ssh/hostfile.c
601
l->path, l->linenum, sshkey_type(l->key), ctx->host);
usr.bin/ssh/hostfile.c
804
sshkey_free(lineinfo.key);
usr.bin/ssh/hostfile.c
898
if ((lineinfo.key = sshkey_new(KEY_UNSPEC)) == NULL) {
usr.bin/ssh/hostfile.c
903
if (!hostfile_read_key(&cp, &kbits, lineinfo.key)) {
usr.bin/ssh/hostfile.c
906
lineinfo.keytype = lineinfo.key->type;
usr.bin/ssh/hostfile.c
941
sshkey_free(lineinfo.key);
usr.bin/ssh/hostfile.c
942
lineinfo.key = NULL;
usr.bin/ssh/hostfile.c
952
sshkey_free(lineinfo.key);
usr.bin/ssh/hostfile.h
101
struct sshkey *key; /* Key, if parsed ok and HKF_WANT_MATCH_HOST set */
usr.bin/ssh/hostfile.h
29
struct sshkey *key;
usr.bin/ssh/kex.c
1158
kex->newkeys[mode]->enc.key = keys[ctos ? 2 : 3];
usr.bin/ssh/kex.c
1159
kex->newkeys[mode]->mac.key = keys[ctos ? 4 : 5];
usr.bin/ssh/kex.c
694
if (newkeys->enc.key) {
usr.bin/ssh/kex.c
695
explicit_bzero(newkeys->enc.key, newkeys->enc.key_len);
usr.bin/ssh/kex.c
696
free(newkeys->enc.key);
usr.bin/ssh/kex.c
697
newkeys->enc.key = NULL;
usr.bin/ssh/kex.c
709
if (newkeys->mac.key) {
usr.bin/ssh/kex.c
710
explicit_bzero(newkeys->mac.key, newkeys->mac.key_len);
usr.bin/ssh/kex.c
711
free(newkeys->mac.key);
usr.bin/ssh/kex.c
712
newkeys->mac.key = NULL;
usr.bin/ssh/kex.c
813
enc->key = NULL;
usr.bin/ssh/kex.c
832
mac->key = NULL;
usr.bin/ssh/kex.h
123
u_char *key;
usr.bin/ssh/kex.h
266
void kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE])
usr.bin/ssh/kex.h
269
int kexc25519_shared_key(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kex.h
273
int kexc25519_shared_key_ext(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kexc25519.c
48
kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE])
usr.bin/ssh/kexc25519.c
52
arc4random_buf(key, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
53
crypto_scalarmult_curve25519(pub, key, basepoint);
usr.bin/ssh/kexc25519.c
57
kexc25519_shared_key_ext(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kexc25519.c
64
crypto_scalarmult_curve25519(shared_key, key, pub);
usr.bin/ssh/kexc25519.c
83
kexc25519_shared_key(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kexc25519.c
86
return kexc25519_shared_key_ext(key, pub, out, 0);
usr.bin/ssh/kexecdh.c
134
EC_KEY *key, const EC_GROUP *group, struct sshbuf **shared_secretp)
usr.bin/ssh/kexecdh.c
174
if (ECDH_compute_key(kbuf, klen, dh_pub, key, NULL) != (int)klen ||
usr.bin/ssh/kexecdh.c
41
kex_ecdh_dec_key_group(struct kex *, const struct sshbuf *, EC_KEY *key,
usr.bin/ssh/krl.c
1156
is_cert_revoked(const struct sshkey *key, struct revoked_certs *rc)
usr.bin/ssh/krl.c
1163
rki.key_id = key->cert->key_id;
usr.bin/ssh/krl.c
1174
if (key->cert->serial == 0)
usr.bin/ssh/krl.c
1178
rs.lo = rs.hi = key->cert->serial;
usr.bin/ssh/krl.c
1182
key->cert->serial, ers->lo, ers->hi));
usr.bin/ssh/krl.c
1190
is_key_revoked(struct ssh_krl *krl, const struct sshkey *key)
usr.bin/ssh/krl.c
1198
if ((r = sshkey_fingerprint_raw(key, SSH_DIGEST_SHA1,
usr.bin/ssh/krl.c
1208
if ((r = sshkey_fingerprint_raw(key, SSH_DIGEST_SHA256,
usr.bin/ssh/krl.c
1220
if ((r = plain_key_blob(key, &rb.blob, &rb.len)) != 0)
usr.bin/ssh/krl.c
1229
if (!sshkey_is_cert(key))
usr.bin/ssh/krl.c
1233
if ((r = revoked_certs_for_ca_key(krl, key->cert->signature_key,
usr.bin/ssh/krl.c
1237
if ((r = is_cert_revoked(key, rc)) != 0)
usr.bin/ssh/krl.c
1244
if ((r = is_cert_revoked(key, rc)) != 0)
usr.bin/ssh/krl.c
1248
KRL_DBG(("%llu no match", key->cert->serial));
usr.bin/ssh/krl.c
1253
ssh_krl_check_key(struct ssh_krl *krl, const struct sshkey *key)
usr.bin/ssh/krl.c
1258
if ((r = is_key_revoked(krl, key)) != 0)
usr.bin/ssh/krl.c
1260
if (sshkey_is_cert(key)) {
usr.bin/ssh/krl.c
1262
if ((r = is_key_revoked(krl, key->cert->signature_key)) != 0)
usr.bin/ssh/krl.c
1270
ssh_krl_file_contains_key(const char *path, const struct sshkey *key)
usr.bin/ssh/krl.c
1285
r = ssh_krl_check_key(krl, key);
usr.bin/ssh/krl.c
1297
struct sshkey *key = NULL;
usr.bin/ssh/krl.c
1319
if ((r = sshkey_from_blob(rb->blob, rb->len, &key)) != 0) {
usr.bin/ssh/krl.c
1324
if ((fp = sshkey_fingerprint(key, SSH_FP_HASH_DEFAULT,
usr.bin/ssh/krl.c
1330
fprintf(f, "hash: %s # %s\n", fp, sshkey_ssh_name(key));
usr.bin/ssh/krl.c
1332
free(key);
usr.bin/ssh/krl.c
365
plain_key_blob(const struct sshkey *key, u_char **blob, size_t *blen)
usr.bin/ssh/krl.c
370
if ((r = sshkey_from_private(key, &kcopy)) != 0)
usr.bin/ssh/krl.c
402
ssh_krl_revoke_key_explicit(struct ssh_krl *krl, const struct sshkey *key)
usr.bin/ssh/krl.c
408
debug3_f("revoke type %s", sshkey_type(key));
usr.bin/ssh/krl.c
409
if ((r = plain_key_blob(key, &blob, &len)) != 0)
usr.bin/ssh/krl.c
450
ssh_krl_revoke_key(struct ssh_krl *krl, const struct sshkey *key)
usr.bin/ssh/krl.c
453
if (!sshkey_is_cert(key))
usr.bin/ssh/krl.c
454
return ssh_krl_revoke_key_explicit(krl, key);
usr.bin/ssh/krl.c
456
if (key->cert->serial == 0) {
usr.bin/ssh/krl.c
458
key->cert->signature_key,
usr.bin/ssh/krl.c
459
key->cert->key_id);
usr.bin/ssh/krl.c
462
key->cert->signature_key,
usr.bin/ssh/krl.c
463
key->cert->serial);
usr.bin/ssh/krl.h
56
int ssh_krl_revoke_key_explicit(struct ssh_krl *krl, const struct sshkey *key);
usr.bin/ssh/krl.h
59
int ssh_krl_revoke_key(struct ssh_krl *krl, const struct sshkey *key);
usr.bin/ssh/krl.h
62
int ssh_krl_check_key(struct ssh_krl *krl, const struct sshkey *key);
usr.bin/ssh/krl.h
63
int ssh_krl_file_contains_key(const char *path, const struct sshkey *key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10238
libcrux_ml_kem_polynomial_PolynomialRingElement_1d *key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10243
(size_t)3U, key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10248
libcrux_ml_kem_polynomial_PolynomialRingElement_1d re = key[i0];
usr.bin/ssh/mac.c
129
if (mac->key == NULL)
usr.bin/ssh/mac.c
134
ssh_hmac_init(mac->hmac_ctx, mac->key, mac->key_len) < 0)
usr.bin/ssh/mac.c
138
if ((mac->umac_ctx = umac_new(mac->key)) == NULL)
usr.bin/ssh/mac.c
142
if ((mac->umac_ctx = umac128_new(mac->key)) == NULL)
usr.bin/ssh/mac.h
35
u_char *key;
usr.bin/ssh/misc.c
1311
const char *key;
usr.bin/ssh/misc.c
1328
keys[num_keys].key = va_arg(ap, char *);
usr.bin/ssh/misc.c
1329
if (keys[num_keys].key == NULL)
usr.bin/ssh/misc.c
1334
keys[num_keys].key);
usr.bin/ssh/misc.c
1393
if (strchr(keys[i].key, *string) != NULL) {
usr.bin/ssh/monitor.c
1033
key_base_type_match(const char *method, const struct sshkey *key,
usr.bin/ssh/monitor.c
1041
if (sshkey_type_from_name(s) == key->type) {
usr.bin/ssh/monitor.c
1048
sshkey_ssh_name(key), list);
usr.bin/ssh/monitor.c
1058
struct sshkey *key = NULL;
usr.bin/ssh/monitor.c
1069
(r = sshkey_froms(m, &key)) != 0 ||
usr.bin/ssh/monitor.c
1073
if (key != NULL && authctxt->valid) {
usr.bin/ssh/monitor.c
1079
if (auth2_key_already_used(authctxt, key))
usr.bin/ssh/monitor.c
1081
if (!key_base_type_match(auth_method, key,
usr.bin/ssh/monitor.c
1084
allowed = user_key_allowed(ssh, authctxt->pw, key,
usr.bin/ssh/monitor.c
1091
if (auth2_key_already_used(authctxt, key))
usr.bin/ssh/monitor.c
1093
if (!key_base_type_match(auth_method, key,
usr.bin/ssh/monitor.c
1097
cuser, chost, key);
usr.bin/ssh/monitor.c
1110
(key == NULL || !authctxt->valid) ? "invalid" : sshkey_type(key),
usr.bin/ssh/monitor.c
1113
auth2_record_key(authctxt, 0, key);
usr.bin/ssh/monitor.c
1120
if ((r = sshkey_to_blob(key, &key_blob, &key_bloblen)) != 0)
usr.bin/ssh/monitor.c
1132
sshkey_free(key);
usr.bin/ssh/monitor.c
1300
struct sshkey *key;
usr.bin/ssh/monitor.c
1325
if ((r = sshkey_from_blob(blob, bloblen, &key)) != 0)
usr.bin/ssh/monitor.c
1347
if ((fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/monitor.c
1351
ret = sshkey_verify(key, signature, signaturelen, data, datalen,
usr.bin/ssh/monitor.c
1354
sshkey_type(key), sigalg == NULL ? "default" : sigalg,
usr.bin/ssh/monitor.c
1367
sshkey_type(key), fp,
usr.bin/ssh/monitor.c
1379
"not met ", sshkey_type(key), fp,
usr.bin/ssh/monitor.c
1386
auth2_record_key(authctxt, ret == 0, key);
usr.bin/ssh/monitor.c
1409
sshkey_free(key);
usr.bin/ssh/monitor.c
670
struct sshkey *pubkey, *key;
usr.bin/ssh/monitor.c
714
if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL)
usr.bin/ssh/monitor.c
721
(r = sshkey_puts(key, sigbuf)) != 0)
usr.bin/ssh/monitor.c
738
if ((key = get_hostkey_by_index(keyid)) != NULL) {
usr.bin/ssh/monitor.c
739
if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg,
usr.bin/ssh/monitor.c
742
} else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL &&
usr.bin/ssh/monitor.c
744
if ((r = ssh_agent_sign(auth_sock, key, &signature, &siglen,
usr.bin/ssh/monitor_wrap.c
270
mm_sshkey_sign(struct ssh *ssh, struct sshkey *key, u_char **sigp, size_t *lenp,
usr.bin/ssh/monitor_wrap.c
280
if ((r = sshkey_puts(key, m)) != 0 ||
usr.bin/ssh/monitor_wrap.c
493
mm_user_key_allowed(struct ssh *ssh, struct passwd *pw, struct sshkey *key,
usr.bin/ssh/monitor_wrap.c
496
return (mm_key_allowed(MM_USERKEY, NULL, NULL, key,
usr.bin/ssh/monitor_wrap.c
502
const char *user, const char *host, struct sshkey *key)
usr.bin/ssh/monitor_wrap.c
504
return (mm_key_allowed(MM_HOSTKEY, user, host, key, 0, NULL));
usr.bin/ssh/monitor_wrap.c
509
struct sshkey *key, int pubkey_auth_attempt, struct sshauthopt **authoptp)
usr.bin/ssh/monitor_wrap.c
525
(r = sshkey_puts(key, m)) != 0 ||
usr.bin/ssh/monitor_wrap.c
558
mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen,
usr.bin/ssh/monitor_wrap.c
574
if ((r = sshkey_puts(key, m)) != 0 ||
usr.bin/ssh/packet.c
1007
if ((r = cipher_init(ccp, enc->cipher, enc->key, enc->key_len,
usr.bin/ssh/packet.c
2431
(r = sshbuf_put_string(b, enc->key, enc->key_len)) != 0 ||
usr.bin/ssh/packet.c
2437
(r = sshbuf_put_string(b, mac->key, mac->key_len)) != 0)
usr.bin/ssh/packet.c
2508
(r = sshbuf_get_string(b, &enc->key, &keylen)) != 0 ||
usr.bin/ssh/packet.c
2521
(r = sshbuf_get_string(b, &mac->key, &maclen)) != 0)
usr.bin/ssh/packet.h
46
struct sshkey *key;
usr.bin/ssh/pkcs11.h
1096
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1115
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1143
(ck_session_handle_t session, ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1152
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1168
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1178
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1194
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1230
ck_object_handle_t *key));
usr.bin/ssh/pkcs11.h
1244
ck_object_handle_t key,
usr.bin/ssh/pkcs11.h
1255
ck_object_handle_t *key));
usr.bin/ssh/pkcs11.h
1262
ck_object_handle_t *key));
usr.bin/ssh/pkcs11.h
1299
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1331
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1363
ck_object_handle_t key));
usr.bin/ssh/pkcs11.h
1390
ck_object_handle_t key));
usr.bin/ssh/poly1305.c
146
f0 = ((h0 ) | (h1 << 26)) + (uint64_t)U8TO32_LE(&key[16]);
usr.bin/ssh/poly1305.c
147
f1 = ((h1 >> 6) | (h2 << 20)) + (uint64_t)U8TO32_LE(&key[20]);
usr.bin/ssh/poly1305.c
148
f2 = ((h2 >> 12) | (h3 << 14)) + (uint64_t)U8TO32_LE(&key[24]);
usr.bin/ssh/poly1305.c
149
f3 = ((h3 >> 18) | (h4 << 8)) + (uint64_t)U8TO32_LE(&key[28]);
usr.bin/ssh/poly1305.c
29
poly1305_auth(unsigned char out[POLY1305_TAGLEN], const unsigned char *m, size_t inlen, const unsigned char key[POLY1305_KEYLEN]) {
usr.bin/ssh/poly1305.c
43
t0 = U8TO32_LE(key+0);
usr.bin/ssh/poly1305.c
44
t1 = U8TO32_LE(key+4);
usr.bin/ssh/poly1305.c
45
t2 = U8TO32_LE(key+8);
usr.bin/ssh/poly1305.c
46
t3 = U8TO32_LE(key+12);
usr.bin/ssh/poly1305.h
17
const u_char key[POLY1305_KEYLEN])
usr.bin/ssh/readconf.c
1100
for (i = 0; multistate_ptr[i].key != NULL; i++) {
usr.bin/ssh/readconf.c
1101
if (strcasecmp(arg, multistate_ptr[i].key) == 0)
usr.bin/ssh/readconf.c
1235
for (i = 0; multistate_ptr[i].key != NULL; i++) {
usr.bin/ssh/readconf.c
1236
if (strcasecmp(arg, multistate_ptr[i].key) == 0) {
usr.bin/ssh/readconf.c
3557
for (i = 0; m[i].key != NULL; i++) {
usr.bin/ssh/readconf.c
3559
return m[i].key;
usr.bin/ssh/readconf.c
979
char *key;
usr.bin/ssh/servconf.c
1211
char *key;
usr.bin/ssh/servconf.c
1420
for (i = 0; multistate_ptr[i].key != NULL; i++) {
usr.bin/ssh/servconf.c
1421
if (strcasecmp(arg, multistate_ptr[i].key) == 0) {
usr.bin/ssh/servconf.c
3026
for (i = 0; m[i].key != NULL; i++) {
usr.bin/ssh/servconf.c
3028
return m[i].key;
usr.bin/ssh/serverloop.c
662
struct sshkey *key = NULL, *key_pub = NULL, *key_prv = NULL;
usr.bin/ssh/serverloop.c
675
sshkey_free(key);
usr.bin/ssh/serverloop.c
676
key = NULL;
usr.bin/ssh/serverloop.c
678
(r = sshkey_from_blob(blob, blen, &key)) != 0) {
usr.bin/ssh/serverloop.c
686
if ((ndx = ssh->kex->host_key_index(key, 1, ssh)) == -1) {
usr.bin/ssh/serverloop.c
687
error_f("unknown host %s key", sshkey_type(key));
usr.bin/ssh/serverloop.c
706
sigalg = sshkey_ssh_name(key);
usr.bin/ssh/serverloop.c
707
if (sshkey_type_plain(key->type) == KEY_RSA) {
usr.bin/ssh/serverloop.c
717
sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg);
usr.bin/ssh/serverloop.c
722
(r = sshkey_puts(key, sigbuf)) != 0 ||
usr.bin/ssh/serverloop.c
738
sshkey_free(key);
usr.bin/ssh/sk-api.h
68
struct sk_enroll_response key;
usr.bin/ssh/sk-usbhid.c
1221
(srk->key.key_handle = calloc(1,
usr.bin/ssh/sk-usbhid.c
1230
srk->key.key_handle_len = fido_cred_id_len(cred);
usr.bin/ssh/sk-usbhid.c
1231
memcpy(srk->key.key_handle, fido_cred_id_ptr(cred),
usr.bin/ssh/sk-usbhid.c
1232
srk->key.key_handle_len);
usr.bin/ssh/sk-usbhid.c
1255
&srk->key)) != 0) {
usr.bin/ssh/sk-usbhid.c
1275
freezero(srk->key.public_key, srk->key.public_key_len);
usr.bin/ssh/sk-usbhid.c
1276
freezero(srk->key.key_handle, srk->key.key_handle_len);
usr.bin/ssh/sk-usbhid.c
1329
freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);
usr.bin/ssh/sk-usbhid.c
1330
freezero(rks[i]->key.key_handle, rks[i]->key.key_handle_len);
usr.bin/ssh/ssh-add.c
106
delete_one(int agent_fd, const struct sshkey *key, const char *comment,
usr.bin/ssh/ssh-add.c
111
if ((r = ssh_remove_identity(agent_fd, key)) != 0) {
usr.bin/ssh/ssh-add.c
118
sshkey_type(key), comment ? comment : "no comment");
usr.bin/ssh/ssh-add.c
128
struct sshkey *key = NULL;
usr.bin/ssh/ssh-add.c
133
sshkey_free(key);
usr.bin/ssh/ssh-add.c
134
key = NULL;
usr.bin/ssh/ssh-add.c
139
if ((key = sshkey_new(KEY_UNSPEC)) == NULL)
usr.bin/ssh/ssh-add.c
141
if ((r = sshkey_read(key, &cp)) != 0) {
usr.bin/ssh/ssh-add.c
146
(key_only && !sshkey_is_cert(key)) ||
usr.bin/ssh/ssh-add.c
147
(cert_only && sshkey_is_cert(key))) {
usr.bin/ssh/ssh-add.c
148
if (delete_one(agent_fd, key, cp,
usr.bin/ssh/ssh-add.c
153
sshkey_free(key);
usr.bin/ssh/ssh-add.c
492
struct sshkey *key = NULL;
usr.bin/ssh/ssh-add.c
499
if ((r = sshkey_load_public(filename, &key, NULL)) != 0) {
usr.bin/ssh/ssh-add.c
503
if (sshkey_type_plain(key->type) == KEY_RSA)
usr.bin/ssh/ssh-add.c
506
if ((r = ssh_agent_sign(agent_fd, key, &sig, &slen, data, sizeof(data),
usr.bin/ssh/ssh-add.c
511
if ((r = sshkey_verify(key, sig, slen, data, sizeof(data),
usr.bin/ssh/ssh-add.c
520
sshkey_free(key);
usr.bin/ssh/ssh-add.c
597
struct sshkey *key;
usr.bin/ssh/ssh-add.c
608
key = srks[i]->key;
usr.bin/ssh/ssh-add.c
609
if ((fp = sshkey_fingerprint(key,
usr.bin/ssh/ssh-add.c
612
if ((r = ssh_add_identity_constrained(agent_fd, key,
usr.bin/ssh/ssh-add.c
613
key->sk_application, lifetime, confirm, skprovider,
usr.bin/ssh/ssh-add.c
616
sshkey_type(key), fp);
usr.bin/ssh/ssh-add.c
625
sshkey_type(key), fp);
usr.bin/ssh/ssh-add.c
738
host, sshkey_type(hke->key), want_ca ? "CA " : "",
usr.bin/ssh/ssh-add.c
744
if ((r = sshkey_from_private(hke->key,
usr.bin/ssh/ssh-agent.c
1002
if ((id = lookup_identity(key)) == NULL) {
usr.bin/ssh/ssh-agent.c
1017
sshkey_free(key);
usr.bin/ssh/ssh-agent.c
110
struct sshkey *key;
usr.bin/ssh/ssh-agent.c
131
struct sshkey *key;
usr.bin/ssh/ssh-agent.c
1411
sshkey_free(id->key);
usr.bin/ssh/ssh-agent.c
1418
id->key = k;
usr.bin/ssh/ssh-agent.c
1520
add_p11_identity(struct sshkey *key, char *comment, const char *provider,
usr.bin/ssh/ssh-agent.c
1526
if (lookup_identity(key) != NULL) {
usr.bin/ssh/ssh-agent.c
1527
sshkey_free(key);
usr.bin/ssh/ssh-agent.c
1532
id->key = key;
usr.bin/ssh/ssh-agent.c
1679
struct sshkey *key = NULL;
usr.bin/ssh/ssh-agent.c
1687
if ((r = sshkey_froms(e->request, &key)) != 0 ||
usr.bin/ssh/ssh-agent.c
1698
if ((fp = sshkey_fingerprint(key, SSH_FP_HASH_DEFAULT,
usr.bin/ssh/ssh-agent.c
1702
if ((r = sshkey_verify(key, sshbuf_ptr(sig), sshbuf_len(sig),
usr.bin/ssh/ssh-agent.c
1704
error_fr(r, "sshkey_verify for %s %s", sshkey_type(key), fp);
usr.bin/ssh/ssh-agent.c
1716
key_match = sshkey_equal(key, e->session_ids[i].key);
usr.bin/ssh/ssh-agent.c
1719
sshkey_type(key), fp);
usr.bin/ssh/ssh-agent.c
1724
"for %s %s", sshkey_type(key), fp);
usr.bin/ssh/ssh-agent.c
1742
debug_f("recorded %s %s (slot %zu of %d)", sshkey_type(key), fp, i,
usr.bin/ssh/ssh-agent.c
1744
e->session_ids[i].key = key;
usr.bin/ssh/ssh-agent.c
1746
key = NULL; /* transferred */
usr.bin/ssh/ssh-agent.c
1756
sshkey_free(key);
usr.bin/ssh/ssh-agent.c
203
sshkey_free(e->session_ids[i].key);
usr.bin/ssh/ssh-agent.c
337
sshkey_free(id->key);
usr.bin/ssh/ssh-agent.c
350
match_key_hop(const char *tag, const struct sshkey *key,
usr.bin/ssh/ssh-agent.c
358
if (key == NULL)
usr.bin/ssh/ssh-agent.c
361
if ((fp = sshkey_fingerprint(key, SSH_FP_HASH_DEFAULT,
usr.bin/ssh/ssh-agent.c
365
tag, hostname, sshkey_type(key), fp, dch->nkeys);
usr.bin/ssh/ssh-agent.c
378
if (!sshkey_is_cert(key)) {
usr.bin/ssh/ssh-agent.c
381
!sshkey_equal(key, dch->keys[i]))
usr.bin/ssh/ssh-agent.c
388
if (key->cert == NULL || key->cert->signature_key == NULL)
usr.bin/ssh/ssh-agent.c
390
if (!sshkey_equal(key->cert->signature_key, dch->keys[i]))
usr.bin/ssh/ssh-agent.c
392
if (sshkey_cert_check_host(key, hostname,
usr.bin/ssh/ssh-agent.c
395
key->cert->key_id, hostname, reason);
usr.bin/ssh/ssh-agent.c
451
sshkey_type(id->key), id->comment);
usr.bin/ssh/ssh-agent.c
473
"%zu constraints", sshkey_type(id->key), id->comment,
usr.bin/ssh/ssh-agent.c
489
if (hks->key == NULL)
usr.bin/ssh/ssh-agent.c
497
if ((fp2 = sshkey_fingerprint(hks->key, SSH_FP_HASH_DEFAULT,
usr.bin/ssh/ssh-agent.c
505
sshkey_type(hks->key), fp2);
usr.bin/ssh/ssh-agent.c
535
if (permitted_by_dest_constraints(fromkey, hks->key, id,
usr.bin/ssh/ssh-agent.c
538
fromkey = hks->key;
usr.bin/ssh/ssh-agent.c
550
permitted_by_dest_constraints(hks->key, NULL, id,
usr.bin/ssh/ssh-agent.c
568
lookup_identity(struct sshkey *key)
usr.bin/ssh/ssh-agent.c
573
if (sshkey_equal(key, id->key))
usr.bin/ssh/ssh-agent.c
586
p = sshkey_fingerprint(id->key, fingerprint_hash, SSH_FP_DEFAULT);
usr.bin/ssh/ssh-agent.c
629
if ((fp = sshkey_fingerprint(id->key, SSH_FP_HASH_DEFAULT,
usr.bin/ssh/ssh-agent.c
633
sshkey_ssh_name(id->key), fp);
usr.bin/ssh/ssh-agent.c
640
if ((r = sshkey_puts(id->key, keys)) != 0 ||
usr.bin/ssh/ssh-agent.c
661
agent_decode_alg(struct sshkey *key, u_int flags)
usr.bin/ssh/ssh-agent.c
663
if (key->type == KEY_RSA) {
usr.bin/ssh/ssh-agent.c
668
} else if (key->type == KEY_RSA_CERT) {
usr.bin/ssh/ssh-agent.c
803
check_websafe_message_contents(struct sshkey *key, struct sshbuf *data)
usr.bin/ssh/ssh-agent.c
805
if (parse_userauth_request(data, key, NULL, NULL, NULL) == 0) {
usr.bin/ssh/ssh-agent.c
844
struct sshkey *key = NULL, *hostkey = NULL;
usr.bin/ssh/ssh-agent.c
852
if ((r = sshkey_froms(e->request, &key)) != 0 ||
usr.bin/ssh/ssh-agent.c
859
if ((id = lookup_identity(key)) == NULL) {
usr.bin/ssh/ssh-agent.c
860
verbose_f("%s key not found", sshkey_type(key));
usr.bin/ssh/ssh-agent.c
863
if ((fp = sshkey_fingerprint(key, SSH_FP_HASH_DEFAULT,
usr.bin/ssh/ssh-agent.c
873
if (parse_userauth_request(data, key, &user, &sid,
usr.bin/ssh/ssh-agent.c
894
sshkey_type(id->key), fp);
usr.bin/ssh/ssh-agent.c
909
e->session_ids[e->nsession_ids - 1].key)) {
usr.bin/ssh/ssh-agent.c
922
if (sshkey_is_sk(id->key)) {
usr.bin/ssh/ssh-agent.c
924
match_pattern_list(id->key->sk_application,
usr.bin/ssh/ssh-agent.c
926
!check_websafe_message_contents(key, data)) {
usr.bin/ssh/ssh-agent.c
930
if (id->key->sk_flags & SSH_SK_USER_PRESENCE_REQD) {
usr.bin/ssh/ssh-agent.c
933
sshkey_type(id->key), fp,
usr.bin/ssh/ssh-agent.c
939
if ((r = sshkey_sign(id->key, &signature, &slen,
usr.bin/ssh/ssh-agent.c
940
sshbuf_ptr(data), sshbuf_len(data), agent_decode_alg(key, flags),
usr.bin/ssh/ssh-agent.c
943
if (pin == NULL && !retried && sshkey_is_sk(id->key) &&
usr.bin/ssh/ssh-agent.c
949
(id->key->sk_flags & SSH_SK_USER_PRESENCE_REQD) ?
usr.bin/ssh/ssh-agent.c
951
sshkey_type(id->key), fp);
usr.bin/ssh/ssh-agent.c
978
sshkey_free(key);
usr.bin/ssh/ssh-agent.c
994
struct sshkey *key = NULL;
usr.bin/ssh/ssh-agent.c
998
if ((r = sshkey_froms(e->request, &key)) != 0) {
usr.bin/ssh/ssh-ecdsa-sk.c
111
struct sshkey *key)
usr.bin/ssh/ssh-ecdsa-sk.c
115
if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0)
usr.bin/ssh/ssh-ecdsa-sk.c
117
if ((r = sshkey_deserialize_sk(b, key)) != 0)
usr.bin/ssh/ssh-ecdsa-sk.c
124
struct sshkey *key)
usr.bin/ssh/ssh-ecdsa-sk.c
128
if (!sshkey_is_cert(key)) {
usr.bin/ssh/ssh-ecdsa-sk.c
130
b, key)) != 0)
usr.bin/ssh/ssh-ecdsa-sk.c
133
if ((r = sshkey_private_deserialize_sk(b, key)) != 0)
usr.bin/ssh/ssh-ecdsa-sk.c
216
ssh_ecdsa_sk_verify(const struct sshkey *key,
usr.bin/ssh/ssh-ecdsa-sk.c
239
if (key == NULL || key->pkey == NULL ||
usr.bin/ssh/ssh-ecdsa-sk.c
240
sshkey_type_plain(key->type) != KEY_ECDSA_SK ||
usr.bin/ssh/ssh-ecdsa-sk.c
244
if (key->ecdsa_nid != NID_X9_62_prime256v1)
usr.bin/ssh/ssh-ecdsa-sk.c
336
if ((ret = ssh_digest_memory(SSH_DIGEST_SHA256, key->sk_application,
usr.bin/ssh/ssh-ecdsa-sk.c
337
strlen(key->sk_application), apphash, sizeof(apphash))) != 0)
usr.bin/ssh/ssh-ecdsa-sk.c
383
key->pkey) != 1) {
usr.bin/ssh/ssh-ecdsa-sk.c
67
ssh_ecdsa_sk_serialize_public(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ecdsa-sk.c
72
if ((r = sshkey_ecdsa_funcs.serialize_public(key, b, opts)) != 0)
usr.bin/ssh/ssh-ecdsa-sk.c
74
if ((r = sshkey_serialize_sk(key, b)) != 0)
usr.bin/ssh/ssh-ecdsa-sk.c
81
ssh_ecdsa_sk_serialize_private(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ecdsa-sk.c
86
if (!sshkey_is_cert(key)) {
usr.bin/ssh/ssh-ecdsa-sk.c
87
if ((r = sshkey_ecdsa_funcs.serialize_public(key,
usr.bin/ssh/ssh-ecdsa-sk.c
91
if ((r = sshkey_serialize_private_sk(key, b)) != 0)
usr.bin/ssh/ssh-ecdsa.c
125
ssh_ecdsa_serialize_public(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ecdsa.c
130
if (key->pkey == NULL)
usr.bin/ssh/ssh-ecdsa.c
133
sshkey_curve_nid_to_name(key->ecdsa_nid))) != 0 ||
usr.bin/ssh/ssh-ecdsa.c
134
(r = sshbuf_put_ec_pkey(b, key->pkey)) != 0)
usr.bin/ssh/ssh-ecdsa.c
141
ssh_ecdsa_serialize_private(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ecdsa.c
146
if (!sshkey_is_cert(key)) {
usr.bin/ssh/ssh-ecdsa.c
147
if ((r = ssh_ecdsa_serialize_public(key, b, opts)) != 0)
usr.bin/ssh/ssh-ecdsa.c
151
EC_KEY_get0_private_key(EVP_PKEY_get0_EC_KEY(key->pkey)))) != 0)
usr.bin/ssh/ssh-ecdsa.c
221
struct sshkey *key)
usr.bin/ssh/ssh-ecdsa.c
228
if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1)
usr.bin/ssh/ssh-ecdsa.c
232
if (key->ecdsa_nid != sshkey_curve_name_to_nid(curve)) {
usr.bin/ssh/ssh-ecdsa.c
236
if ((ec = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL) {
usr.bin/ssh/ssh-ecdsa.c
255
EVP_PKEY_free(key->pkey);
usr.bin/ssh/ssh-ecdsa.c
256
key->pkey = pkey;
usr.bin/ssh/ssh-ecdsa.c
262
EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(key->pkey)),
usr.bin/ssh/ssh-ecdsa.c
263
EC_KEY_get0_public_key(EVP_PKEY_get0_EC_KEY(key->pkey)));
usr.bin/ssh/ssh-ecdsa.c
274
struct sshkey *key)
usr.bin/ssh/ssh-ecdsa.c
280
if (!sshkey_is_cert(key)) {
usr.bin/ssh/ssh-ecdsa.c
281
if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0)
usr.bin/ssh/ssh-ecdsa.c
286
if ((ec = EVP_PKEY_get1_EC_KEY(key->pkey)) == NULL) {
usr.bin/ssh/ssh-ecdsa.c
296
if (EVP_PKEY_set1_EC_KEY(key->pkey, ec) != 1) {
usr.bin/ssh/ssh-ecdsa.c
309
ssh_ecdsa_sign(struct sshkey *key,
usr.bin/ssh/ssh-ecdsa.c
327
if (key == NULL || key->pkey == NULL ||
usr.bin/ssh/ssh-ecdsa.c
328
sshkey_type_plain(key->type) != KEY_ECDSA)
usr.bin/ssh/ssh-ecdsa.c
331
if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1)
usr.bin/ssh/ssh-ecdsa.c
334
if ((ret = sshkey_pkey_digest_sign(key->pkey, hash_alg, &sigb, &slen,
usr.bin/ssh/ssh-ecdsa.c
345
if ((ret = ssh_ecdsa_encode_store_sig(key, sig_r, sig_s,
usr.bin/ssh/ssh-ecdsa.c
357
ssh_ecdsa_encode_store_sig(const struct sshkey *key,
usr.bin/ssh/ssh-ecdsa.c
377
if ((ret = sshbuf_put_cstring(b, sshkey_ssh_name_plain(key))) != 0 ||
usr.bin/ssh/ssh-ecdsa.c
398
ssh_ecdsa_verify(const struct sshkey *key,
usr.bin/ssh/ssh-ecdsa.c
411
if (key == NULL || key->pkey == NULL ||
usr.bin/ssh/ssh-ecdsa.c
412
sshkey_type_plain(key->type) != KEY_ECDSA ||
usr.bin/ssh/ssh-ecdsa.c
416
if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1)
usr.bin/ssh/ssh-ecdsa.c
427
if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
usr.bin/ssh/ssh-ecdsa.c
471
if ((ret = sshkey_pkey_digest_verify(key->pkey, hash_alg,
usr.bin/ssh/ssh-ecdsa.c
95
ssh_ecdsa_size(const struct sshkey *key)
usr.bin/ssh/ssh-ecdsa.c
97
switch (key->ecdsa_nid) {
usr.bin/ssh/ssh-ed25519-sk.c
100
if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
102
if ((r = sshkey_deserialize_sk(b, key)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
109
struct sshkey *key)
usr.bin/ssh/ssh-ed25519-sk.c
113
if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
115
if ((r = sshkey_private_deserialize_sk(b, key)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
121
ssh_ed25519_sk_verify(const struct sshkey *key,
usr.bin/ssh/ssh-ed25519-sk.c
145
if (key == NULL ||
usr.bin/ssh/ssh-ed25519-sk.c
146
sshkey_type_plain(key->type) != KEY_ED25519_SK ||
usr.bin/ssh/ssh-ed25519-sk.c
147
key->ed25519_pk == NULL ||
usr.bin/ssh/ssh-ed25519-sk.c
168
if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
usr.bin/ssh/ssh-ed25519-sk.c
180
if (ssh_digest_memory(SSH_DIGEST_SHA256, key->sk_application,
usr.bin/ssh/ssh-ed25519-sk.c
181
strlen(key->sk_application), apphash, sizeof(apphash)) != 0 ||
usr.bin/ssh/ssh-ed25519-sk.c
223
key->ed25519_pk)) != 0) {
usr.bin/ssh/ssh-ed25519-sk.c
55
ssh_ed25519_sk_serialize_public(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ed25519-sk.c
60
if ((r = sshkey_ed25519_funcs.serialize_public(key, b, opts)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
62
if ((r = sshkey_serialize_sk(key, b)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
69
ssh_ed25519_sk_serialize_private(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ed25519-sk.c
74
if ((r = sshkey_ed25519_funcs.serialize_public(key, b, opts)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
76
if ((r = sshkey_serialize_private_sk(key, b)) != 0)
usr.bin/ssh/ssh-ed25519-sk.c
96
struct sshkey *key)
usr.bin/ssh/ssh-ed25519.c
101
struct sshkey *key)
usr.bin/ssh/ssh-ed25519.c
113
key->ed25519_pk = pk;
usr.bin/ssh/ssh-ed25519.c
119
struct sshkey *key)
usr.bin/ssh/ssh-ed25519.c
125
if ((r = ssh_ed25519_deserialize_public(NULL, b, key)) != 0)
usr.bin/ssh/ssh-ed25519.c
133
key->ed25519_sk = ed25519_sk;
usr.bin/ssh/ssh-ed25519.c
143
ssh_ed25519_sign(struct sshkey *key,
usr.bin/ssh/ssh-ed25519.c
158
if (key == NULL ||
usr.bin/ssh/ssh-ed25519.c
159
sshkey_type_plain(key->type) != KEY_ED25519 ||
usr.bin/ssh/ssh-ed25519.c
160
key->ed25519_sk == NULL ||
usr.bin/ssh/ssh-ed25519.c
168
key->ed25519_sk)) != 0 || smlen <= datalen) {
usr.bin/ssh/ssh-ed25519.c
225
ssh_ed25519_verify(const struct sshkey *key,
usr.bin/ssh/ssh-ed25519.c
238
if (key == NULL ||
usr.bin/ssh/ssh-ed25519.c
239
sshkey_type_plain(key->type) != KEY_ED25519 ||
usr.bin/ssh/ssh-ed25519.c
240
key->ed25519_pk == NULL ||
usr.bin/ssh/ssh-ed25519.c
275
key->ed25519_pk)) != 0) {
usr.bin/ssh/ssh-ed25519.c
52
ssh_ed25519_serialize_public(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ed25519.c
57
if (key->ed25519_pk == NULL)
usr.bin/ssh/ssh-ed25519.c
59
if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0)
usr.bin/ssh/ssh-ed25519.c
66
ssh_ed25519_serialize_private(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-ed25519.c
71
if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0 ||
usr.bin/ssh/ssh-ed25519.c
72
(r = sshbuf_put_string(b, key->ed25519_sk, ED25519_SK_SZ)) != 0)
usr.bin/ssh/ssh-keygen.c
1205
fp = sshkey_fingerprint(l->key, fptype, rep);
usr.bin/ssh/ssh-keygen.c
1206
ra = sshkey_fingerprint(l->key,
usr.bin/ssh/ssh-keygen.c
1211
sshkey_type(l->key), fp,
usr.bin/ssh/ssh-keygen.c
128
char *key;
usr.bin/ssh/ssh-keygen.c
1555
cert_ext_add(const char *key, const char *value, int iscrit)
usr.bin/ssh/ssh-keygen.c
1558
cert_ext[ncert_ext].key = xstrdup(key);
usr.bin/ssh/ssh-keygen.c
1574
if ((r = strcmp(a->key, b->key)) != 0)
usr.bin/ssh/ssh-keygen.c
1603
debug3_f("%s", ext->key);
usr.bin/ssh/ssh-keygen.c
1604
if ((r = sshbuf_put_cstring(c, ext->key)) != 0 ||
usr.bin/ssh/ssh-keygen.c
1609
debug3_f("%s=%s", ext->key, ext->val);
usr.bin/ssh/ssh-keygen.c
1611
if ((r = sshbuf_put_cstring(c, ext->key)) != 0 ||
usr.bin/ssh/ssh-keygen.c
1680
agent_signer(struct sshkey *key, u_char **sigp, size_t *lenp,
usr.bin/ssh/ssh-keygen.c
1687
return ssh_agent_sign(*agent_fdp, key, sigp, lenp,
usr.bin/ssh/ssh-keygen.c
2054
print_cert(struct sshkey *key)
usr.bin/ssh/ssh-keygen.c
2059
key_fp = sshkey_fingerprint(key, fingerprint_hash, SSH_FP_DEFAULT);
usr.bin/ssh/ssh-keygen.c
2060
ca_fp = sshkey_fingerprint(key->cert->signature_key,
usr.bin/ssh/ssh-keygen.c
2064
sshkey_format_cert_validity(key->cert, valid, sizeof(valid));
usr.bin/ssh/ssh-keygen.c
2066
printf(" Type: %s %s certificate\n", sshkey_ssh_name(key),
usr.bin/ssh/ssh-keygen.c
2067
sshkey_cert_type(key));
usr.bin/ssh/ssh-keygen.c
2068
printf(" Public key: %s %s\n", sshkey_type(key), key_fp);
usr.bin/ssh/ssh-keygen.c
2070
sshkey_type(key->cert->signature_key), ca_fp,
usr.bin/ssh/ssh-keygen.c
2071
key->cert->signature_type);
usr.bin/ssh/ssh-keygen.c
2072
printf(" Key ID: \"%s\"\n", key->cert->key_id);
usr.bin/ssh/ssh-keygen.c
2073
printf(" Serial: %llu\n", (unsigned long long)key->cert->serial);
usr.bin/ssh/ssh-keygen.c
2076
if (key->cert->nprincipals == 0)
usr.bin/ssh/ssh-keygen.c
2079
for (i = 0; i < key->cert->nprincipals; i++)
usr.bin/ssh/ssh-keygen.c
2081
key->cert->principals[i]);
usr.bin/ssh/ssh-keygen.c
2085
if (sshbuf_len(key->cert->critical) == 0)
usr.bin/ssh/ssh-keygen.c
2089
show_options(key->cert->critical, 1);
usr.bin/ssh/ssh-keygen.c
2092
if (sshbuf_len(key->cert->extensions) == 0)
usr.bin/ssh/ssh-keygen.c
2096
show_options(key->cert->extensions, 0);
usr.bin/ssh/ssh-keygen.c
2103
struct sshkey *key = NULL;
usr.bin/ssh/ssh-keygen.c
2127
sshkey_free(key);
usr.bin/ssh/ssh-keygen.c
2128
key = NULL;
usr.bin/ssh/ssh-keygen.c
2133
if ((key = sshkey_new(KEY_UNSPEC)) == NULL)
usr.bin/ssh/ssh-keygen.c
2135
if ((r = sshkey_read(key, &cp)) != 0) {
usr.bin/ssh/ssh-keygen.c
2139
if (!sshkey_is_cert(key)) {
usr.bin/ssh/ssh-keygen.c
2148
print_cert(key);
usr.bin/ssh/ssh-keygen.c
2151
sshkey_free(key);
usr.bin/ssh/ssh-keygen.c
2210
struct sshkey *key = NULL;
usr.bin/ssh/ssh-keygen.c
2327
if ((key = sshkey_new(KEY_UNSPEC)) == NULL)
usr.bin/ssh/ssh-keygen.c
2329
if ((r = sshkey_read(key, &cp)) != 0)
usr.bin/ssh/ssh-keygen.c
2332
r = ssh_krl_revoke_key_explicit(krl, key);
usr.bin/ssh/ssh-keygen.c
2334
if (sshkey_fingerprint_raw(key,
usr.bin/ssh/ssh-keygen.c
2341
if (sshkey_fingerprint_raw(key,
usr.bin/ssh/ssh-keygen.c
2348
r = ssh_krl_revoke_key(krl, key);
usr.bin/ssh/ssh-keygen.c
2354
sshkey_free(key);
usr.bin/ssh/ssh-keygen.c
3096
struct sshkey *key;
usr.bin/ssh/ssh-keygen.c
3119
key = srks[i]->key;
usr.bin/ssh/ssh-keygen.c
3120
if (key->type != KEY_ECDSA_SK && key->type != KEY_ED25519_SK) {
usr.bin/ssh/ssh-keygen.c
3122
sshkey_type(key), key->type);
usr.bin/ssh/ssh-keygen.c
3125
if ((fp = sshkey_fingerprint(key, fingerprint_hash,
usr.bin/ssh/ssh-keygen.c
3129
sshkey_type(key), fp, key->sk_application, key->sk_flags);
usr.bin/ssh/ssh-keygen.c
3130
ext = sk_suffix(key->sk_application,
usr.bin/ssh/ssh-keygen.c
3133
key->type == KEY_ECDSA_SK ? "ecdsa_sk" : "ed25519_sk",
usr.bin/ssh/ssh-keygen.c
3145
if ((r = sshkey_save_private(key, path, pass,
usr.bin/ssh/ssh-keygen.c
3146
key->sk_application, private_key_format,
usr.bin/ssh/ssh-keygen.c
3153
printf("Saved %s key%s%s to %s\n", sshkey_type(key),
usr.bin/ssh/ssh-keygen.c
3155
*ext != '\0' ? key->sk_application : "",
usr.bin/ssh/ssh-keygen.c
3162
if ((r = sshkey_save_public(key, pubpath,
usr.bin/ssh/ssh-keygen.c
3163
key->sk_application)) != 0) {
usr.bin/ssh/ssh-keygen.c
435
struct sshkey *key = NULL;
usr.bin/ssh/ssh-keygen.c
478
if ((key = sshkey_new(ktype)) == NULL)
usr.bin/ssh/ssh-keygen.c
482
switch (key->type) {
usr.bin/ssh/ssh-keygen.c
502
sshkey_free(key);
usr.bin/ssh/ssh-keygen.c
519
EVP_PKEY_free(key->pkey);
usr.bin/ssh/ssh-keygen.c
520
if ((key->pkey = EVP_PKEY_new()) == NULL)
usr.bin/ssh/ssh-keygen.c
533
if (EVP_PKEY_set1_RSA(key->pkey, rsa) != 1)
usr.bin/ssh/ssh-keygen.c
544
if ((r = sshkey_sign(key, &sig, &slen, data, sizeof(data),
usr.bin/ssh/ssh-keygen.c
547
else if ((r = sshkey_verify(key, sig, slen, data, sizeof(data),
usr.bin/ssh/ssh-keygen.c
551
sshkey_free(key);
usr.bin/ssh/ssh-keygen.c
556
return key;
usr.bin/ssh/ssh-keyscan.c
114
static void keyprint(con *c, struct sshkey *key);
usr.bin/ssh/ssh-keyscan.c
280
keyprint_one(const char *host, struct sshkey *key)
usr.bin/ssh/ssh-keyscan.c
289
export_dns_rr(host, key, stdout, 0, hashalg);
usr.bin/ssh/ssh-keyscan.c
300
if (r >= 0 && sshkey_write(key, stdout) == 0)
usr.bin/ssh/ssh-keyscan.c
307
keyprint(con *c, struct sshkey *key)
usr.bin/ssh/ssh-keyscan.c
312
if (key == NULL)
usr.bin/ssh/ssh-keyscan.c
315
keyprint_one(hosts, key);
usr.bin/ssh/ssh-keyscan.c
320
keyprint_one(host, key);
usr.bin/ssh/ssh-keysign.c
120
else if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) {
usr.bin/ssh/ssh-keysign.c
123
} else if (key->type != pktype)
usr.bin/ssh/ssh-keysign.c
157
*ret = key;
usr.bin/ssh/ssh-keysign.c
158
key = NULL;
usr.bin/ssh/ssh-keysign.c
165
sshkey_free(key);
usr.bin/ssh/ssh-keysign.c
178
struct sshkey *keys[NUM_KEYTYPES], *key = NULL;
usr.bin/ssh/ssh-keysign.c
239
NULL, &key, NULL);
usr.bin/ssh/ssh-keysign.c
243
else if (key != NULL) {
usr.bin/ssh/ssh-keysign.c
244
keys[i] = key;
usr.bin/ssh/ssh-keysign.c
269
if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0)
usr.bin/ssh/ssh-keysign.c
276
sshkey_equal_public(key, keys[i])) {
usr.bin/ssh/ssh-keysign.c
282
if ((fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/ssh-keysign.c
286
sshkey_type(key), fp ? fp : "");
usr.bin/ssh/ssh-keysign.c
64
struct sshkey *key = NULL;
usr.bin/ssh/ssh-pkcs11-client.c
101
helper_add_key(struct helper *helper, struct sshkey *key)
usr.bin/ssh/ssh-pkcs11-client.c
109
if ((r = sshkey_putb(key, helper->keyblobs[helper->nkeyblobs])) != 0)
usr.bin/ssh/ssh-pkcs11-client.c
113
sshkey_type(key), helper->path, helper->nkeyblobs);
usr.bin/ssh/ssh-pkcs11-client.c
225
pkcs11_sign(struct sshkey *key,
usr.bin/ssh/ssh-pkcs11-client.c
243
if ((helper = helper_by_key(key)) == NULL || helper->fd == -1)
usr.bin/ssh/ssh-pkcs11-client.c
244
fatal_f("no helper for %s key", sshkey_type(key));
usr.bin/ssh/ssh-pkcs11-client.c
249
(r = sshkey_puts_plain(key, msg)) != 0 ||
usr.bin/ssh/ssh-pkcs11-client.c
458
pkcs11_key_free(struct sshkey *key)
usr.bin/ssh/ssh-pkcs11-client.c
465
debug3_f("free %s key", sshkey_type(key));
usr.bin/ssh/ssh-pkcs11-client.c
467
if ((helper = helper_by_key(key)) == NULL || helper->fd == -1)
usr.bin/ssh/ssh-pkcs11-client.c
468
fatal_f("no helper for %s key", sshkey_type(key));
usr.bin/ssh/ssh-pkcs11-client.c
471
if ((r = sshkey_putb(key, keyblob)) != 0)
usr.bin/ssh/ssh-pkcs11-client.c
73
helper_by_key(const struct sshkey *key)
usr.bin/ssh/ssh-pkcs11-client.c
81
if ((r = sshkey_putb(key, keyblob)) != 0)
usr.bin/ssh/ssh-pkcs11-helper.c
105
struct sshkey *key = NULL;
usr.bin/ssh/ssh-pkcs11-helper.c
109
if ((r = sshkey_froms(iqueue, &key)) != 0 ||
usr.bin/ssh/ssh-pkcs11-helper.c
120
if ((r = pkcs11_sign(key, &signature, &slen, data, dlen,
usr.bin/ssh/ssh-pkcs11-helper.c
122
error_fr(r, "sign %s", sshkey_type(key));
usr.bin/ssh/ssh-pkcs11-helper.c
139
sshkey_free(key);
usr.bin/ssh/ssh-pkcs11.c
1048
key = sshkey_new(KEY_UNSPEC);
usr.bin/ssh/ssh-pkcs11.c
1049
if (key == NULL) {
usr.bin/ssh/ssh-pkcs11.c
1054
EVP_PKEY_free(key->pkey);
usr.bin/ssh/ssh-pkcs11.c
1055
if ((key->pkey = EVP_PKEY_new()) == NULL)
usr.bin/ssh/ssh-pkcs11.c
1057
if (EVP_PKEY_set1_RSA(key->pkey, rsa) != 1)
usr.bin/ssh/ssh-pkcs11.c
1059
key->type = KEY_RSA;
usr.bin/ssh/ssh-pkcs11.c
1060
key->flags |= SSHKEY_FLAG_EXT;
usr.bin/ssh/ssh-pkcs11.c
1061
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
usr.bin/ssh/ssh-pkcs11.c
1063
EVP_PKEY_bits(key->pkey), SSH_RSA_MINIMUM_MODULUS_SIZE);
usr.bin/ssh/ssh-pkcs11.c
1066
if (pkcs11_record_key(p, slotidx, &key_attr[0], key))
usr.bin/ssh/ssh-pkcs11.c
1075
sshkey_free(key);
usr.bin/ssh/ssh-pkcs11.c
1076
key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1078
return key;
usr.bin/ssh/ssh-pkcs11.c
1090
struct sshkey *key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1170
if ((key = sshkey_new(KEY_UNSPEC)) == NULL)
usr.bin/ssh/ssh-pkcs11.c
1172
key->ed25519_pk = xmalloc(ED25519_PK_SZ);
usr.bin/ssh/ssh-pkcs11.c
1173
memcpy(key->ed25519_pk, d, ED25519_PK_SZ);
usr.bin/ssh/ssh-pkcs11.c
1174
key->type = KEY_ED25519;
usr.bin/ssh/ssh-pkcs11.c
1175
key->flags |= SSHKEY_FLAG_EXT;
usr.bin/ssh/ssh-pkcs11.c
1176
if (pkcs11_record_key(p, slotidx, &key_attr[0], key))
usr.bin/ssh/ssh-pkcs11.c
1182
sshkey_free(key);
usr.bin/ssh/ssh-pkcs11.c
1183
key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1188
return key;
usr.bin/ssh/ssh-pkcs11.c
1205
struct sshkey *key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1281
key = sshkey_new(KEY_UNSPEC);
usr.bin/ssh/ssh-pkcs11.c
1282
if (key == NULL) {
usr.bin/ssh/ssh-pkcs11.c
1287
EVP_PKEY_free(key->pkey);
usr.bin/ssh/ssh-pkcs11.c
1288
if ((key->pkey = EVP_PKEY_new()) == NULL)
usr.bin/ssh/ssh-pkcs11.c
1290
if (EVP_PKEY_set1_RSA(key->pkey, rsa) != 1)
usr.bin/ssh/ssh-pkcs11.c
1292
key->type = KEY_RSA;
usr.bin/ssh/ssh-pkcs11.c
1293
key->flags |= SSHKEY_FLAG_EXT;
usr.bin/ssh/ssh-pkcs11.c
1294
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
usr.bin/ssh/ssh-pkcs11.c
1296
EVP_PKEY_bits(key->pkey),
usr.bin/ssh/ssh-pkcs11.c
1300
if (pkcs11_record_key(p, slotidx, &cert_attr[0], key))
usr.bin/ssh/ssh-pkcs11.c
1324
key = sshkey_new(KEY_UNSPEC);
usr.bin/ssh/ssh-pkcs11.c
1325
if (key == NULL) {
usr.bin/ssh/ssh-pkcs11.c
1330
EVP_PKEY_free(key->pkey);
usr.bin/ssh/ssh-pkcs11.c
1331
if ((key->pkey = EVP_PKEY_new()) == NULL)
usr.bin/ssh/ssh-pkcs11.c
1333
if (EVP_PKEY_set1_EC_KEY(key->pkey, ec) != 1)
usr.bin/ssh/ssh-pkcs11.c
1335
key->ecdsa_nid = nid;
usr.bin/ssh/ssh-pkcs11.c
1336
key->type = KEY_ECDSA;
usr.bin/ssh/ssh-pkcs11.c
1337
key->flags |= SSHKEY_FLAG_EXT;
usr.bin/ssh/ssh-pkcs11.c
1338
if (pkcs11_record_key(p, slotidx, &cert_attr[0], key))
usr.bin/ssh/ssh-pkcs11.c
1343
if ((key = sshkey_new(KEY_UNSPEC)) == NULL ||
usr.bin/ssh/ssh-pkcs11.c
1344
(key->ed25519_pk = calloc(1, ED25519_PK_SZ)) == NULL)
usr.bin/ssh/ssh-pkcs11.c
1347
if (!EVP_PKEY_get_raw_public_key(evp, key->ed25519_pk, &len)) {
usr.bin/ssh/ssh-pkcs11.c
1356
key->type = KEY_ED25519;
usr.bin/ssh/ssh-pkcs11.c
1357
key->flags |= SSHKEY_FLAG_EXT;
usr.bin/ssh/ssh-pkcs11.c
1358
if (pkcs11_record_key(p, slotidx, &cert_attr[0], key))
usr.bin/ssh/ssh-pkcs11.c
1372
if (success != 0 || key == NULL) {
usr.bin/ssh/ssh-pkcs11.c
1373
sshkey_free(key);
usr.bin/ssh/ssh-pkcs11.c
1378
*keyp = key;
usr.bin/ssh/ssh-pkcs11.c
1386
struct sshkey *key)
usr.bin/ssh/ssh-pkcs11.c
1390
if ((fp = sshkey_fingerprint(key, SSH_FP_HASH_DEFAULT,
usr.bin/ssh/ssh-pkcs11.c
1396
(u_long)slotidx, sshkey_type(key), fp);
usr.bin/ssh/ssh-pkcs11.c
1410
struct sshkey *key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1461
key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1466
&key, &label) != 0) {
usr.bin/ssh/ssh-pkcs11.c
1476
note_key(p, slotidx, __func__, key);
usr.bin/ssh/ssh-pkcs11.c
1477
if (pkcs11_key_included(keysp, nkeys, key)) {
usr.bin/ssh/ssh-pkcs11.c
1479
sshkey_free(key);
usr.bin/ssh/ssh-pkcs11.c
1484
(*keysp)[*nkeys] = key;
usr.bin/ssh/ssh-pkcs11.c
1516
struct sshkey *key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1575
key = pkcs11_fetch_rsa_pubkey(p, slotidx, &obj);
usr.bin/ssh/ssh-pkcs11.c
1578
key = pkcs11_fetch_ecdsa_pubkey(p, slotidx, &obj);
usr.bin/ssh/ssh-pkcs11.c
1582
key = pkcs11_fetch_ed25519_pubkey(p, slotidx, &obj);
usr.bin/ssh/ssh-pkcs11.c
1586
key = NULL;
usr.bin/ssh/ssh-pkcs11.c
1591
if (key == NULL) {
usr.bin/ssh/ssh-pkcs11.c
1595
note_key(p, slotidx, __func__, key);
usr.bin/ssh/ssh-pkcs11.c
1596
if (pkcs11_key_included(keysp, nkeys, key)) {
usr.bin/ssh/ssh-pkcs11.c
1598
sshkey_free(key);
usr.bin/ssh/ssh-pkcs11.c
1603
(*keysp)[*nkeys] = key;
usr.bin/ssh/ssh-pkcs11.c
2044
pkcs11_sign(struct sshkey *key,
usr.bin/ssh/ssh-pkcs11.c
2050
switch (key->type) {
usr.bin/ssh/ssh-pkcs11.c
2054
return pkcs11_sign_rsa(key, sigp, lenp, data, datalen,
usr.bin/ssh/ssh-pkcs11.c
2058
return pkcs11_sign_ecdsa(key, sigp, lenp, data, datalen,
usr.bin/ssh/ssh-pkcs11.c
2063
return pkcs11_sign_ed25519(key, sigp, lenp, data, datalen,
usr.bin/ssh/ssh-pkcs11.c
2071
pkcs11_key_free(struct sshkey *key)
usr.bin/ssh/ssh-pkcs11.c
396
CK_ATTRIBUTE *keyid_attrib, struct sshkey *key)
usr.bin/ssh/ssh-pkcs11.c
405
sshkey_type(key), provider->name, (u_long)slotidx, hex);
usr.bin/ssh/ssh-pkcs11.c
410
if ((r = sshkey_putb(key, keyblob)) != 0)
usr.bin/ssh/ssh-pkcs11.c
444
pkcs11_lookup_key(struct sshkey *key)
usr.bin/ssh/ssh-pkcs11.c
452
if ((r = sshkey_putb(key, keyblob)) != 0)
usr.bin/ssh/ssh-pkcs11.c
534
pkcs11_sign_rsa(struct sshkey *key,
usr.bin/ssh/ssh-pkcs11.c
555
if ((k11 = pkcs11_lookup_key(key)) == NULL) {
usr.bin/ssh/ssh-pkcs11.c
571
if ((siglen = EVP_PKEY_size(key->pkey)) <= 0)
usr.bin/ssh/ssh-pkcs11.c
623
pkcs11_sign_ecdsa(struct sshkey *key,
usr.bin/ssh/ssh-pkcs11.c
644
if ((k11 = pkcs11_lookup_key(key)) == NULL) {
usr.bin/ssh/ssh-pkcs11.c
661
if ((hashalg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1)
usr.bin/ssh/ssh-pkcs11.c
670
if ((siglen = EVP_PKEY_size(key->pkey)) <= 0)
usr.bin/ssh/ssh-pkcs11.c
692
if ((ret = ssh_ecdsa_encode_store_sig(key, sig_r, sig_s,
usr.bin/ssh/ssh-pkcs11.c
708
pkcs11_sign_ed25519(struct sshkey *key,
usr.bin/ssh/ssh-pkcs11.c
728
if ((k11 = pkcs11_lookup_key(key)) == NULL) {
usr.bin/ssh/ssh-pkcs11.c
836
pkcs11_key_included(struct sshkey ***keysp, int *nkeys, struct sshkey *key)
usr.bin/ssh/ssh-pkcs11.c
841
if (sshkey_equal(key, (*keysp)[i]))
usr.bin/ssh/ssh-pkcs11.c
858
struct sshkey *key = NULL;
usr.bin/ssh/ssh-pkcs11.c
946
key = sshkey_new(KEY_UNSPEC);
usr.bin/ssh/ssh-pkcs11.c
947
if (key == NULL) {
usr.bin/ssh/ssh-pkcs11.c
952
EVP_PKEY_free(key->pkey);
usr.bin/ssh/ssh-pkcs11.c
953
if ((key->pkey = EVP_PKEY_new()) == NULL)
usr.bin/ssh/ssh-pkcs11.c
955
if (EVP_PKEY_set1_EC_KEY(key->pkey, ec) != 1)
usr.bin/ssh/ssh-pkcs11.c
957
key->ecdsa_nid = nid;
usr.bin/ssh/ssh-pkcs11.c
958
key->type = KEY_ECDSA;
usr.bin/ssh/ssh-pkcs11.c
959
key->flags |= SSHKEY_FLAG_EXT;
usr.bin/ssh/ssh-pkcs11.c
960
if (pkcs11_record_key(p, slotidx, &key_attr[0], key))
usr.bin/ssh/ssh-pkcs11.c
966
sshkey_free(key);
usr.bin/ssh/ssh-pkcs11.c
967
key = NULL;
usr.bin/ssh/ssh-pkcs11.c
978
return (key);
usr.bin/ssh/ssh-pkcs11.c
991
struct sshkey *key = NULL;
usr.bin/ssh/ssh-rsa.c
189
struct sshkey *key)
usr.bin/ssh/ssh-rsa.c
208
if (EVP_PKEY_set1_RSA(key->pkey, rsa) != 1) {
usr.bin/ssh/ssh-rsa.c
212
if ((ret = sshkey_check_rsa_length(key, 0)) != 0)
usr.bin/ssh/ssh-rsa.c
228
struct sshkey *key)
usr.bin/ssh/ssh-rsa.c
236
if (sshkey_is_cert(key)) {
usr.bin/ssh/ssh-rsa.c
238
if ((rsa = EVP_PKEY_get1_RSA(key->pkey)) == NULL) {
usr.bin/ssh/ssh-rsa.c
284
if (EVP_PKEY_set1_RSA(key->pkey, rsa) != 1) {
usr.bin/ssh/ssh-rsa.c
288
if ((r = sshkey_check_rsa_length(key, 0)) != 0)
usr.bin/ssh/ssh-rsa.c
397
ssh_rsa_sign(struct sshkey *key,
usr.bin/ssh/ssh-rsa.c
417
if (key == NULL || key->pkey == NULL || hash_alg == -1 ||
usr.bin/ssh/ssh-rsa.c
418
sshkey_type_plain(key->type) != KEY_RSA)
usr.bin/ssh/ssh-rsa.c
420
slen = EVP_PKEY_size(key->pkey);
usr.bin/ssh/ssh-rsa.c
423
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE)
usr.bin/ssh/ssh-rsa.c
426
if ((ret = sshkey_pkey_digest_sign(key->pkey, hash_alg, &sig, &len,
usr.bin/ssh/ssh-rsa.c
489
ssh_rsa_verify(const struct sshkey *key,
usr.bin/ssh/ssh-rsa.c
500
if (key == NULL || key->pkey == NULL ||
usr.bin/ssh/ssh-rsa.c
501
sshkey_type_plain(key->type) != KEY_RSA ||
usr.bin/ssh/ssh-rsa.c
504
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE)
usr.bin/ssh/ssh-rsa.c
540
modlen = EVP_PKEY_size(key->pkey);
usr.bin/ssh/ssh-rsa.c
557
rsasize = EVP_PKEY_size(key->pkey);
usr.bin/ssh/ssh-rsa.c
563
ret = sshkey_pkey_digest_verify(key->pkey, hash_alg, data, dlen,
usr.bin/ssh/ssh-rsa.c
64
ssh_rsa_serialize_public(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-rsa.c
71
if (key->pkey == NULL)
usr.bin/ssh/ssh-rsa.c
73
if ((rsa = EVP_PKEY_get0_RSA(key->pkey)) == NULL)
usr.bin/ssh/ssh-rsa.c
85
ssh_rsa_serialize_private(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/ssh-rsa.c
92
if ((rsa = EVP_PKEY_get0_RSA(key->pkey)) == NULL)
usr.bin/ssh/ssh-rsa.c
98
if (!sshkey_is_cert(key)) {
usr.bin/ssh/ssh-sk-client.c
246
sshsk_sign(const char *provider, struct sshkey *key,
usr.bin/ssh/ssh-sk-client.c
262
if ((r = sshkey_private_serialize(key, kbuf)) != 0) {
usr.bin/ssh/ssh-sk-client.c
313
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk-client.c
355
if ((r = sshkey_private_deserialize(kbuf, &key)) != 0) {
usr.bin/ssh/ssh-sk-client.c
366
*keyp = key;
usr.bin/ssh/ssh-sk-client.c
367
key = NULL;
usr.bin/ssh/ssh-sk-client.c
370
sshkey_free(key);
usr.bin/ssh/ssh-sk-client.c
384
sshkey_free(srk->key);
usr.bin/ssh/ssh-sk-client.c
410
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk-client.c
444
if ((r = sshkey_private_deserialize(kbuf, &key)) != 0) {
usr.bin/ssh/ssh-sk-client.c
453
srk->key = key;
usr.bin/ssh/ssh-sk-client.c
454
key = NULL;
usr.bin/ssh/ssh-sk-client.c
466
sshkey_type(srk->key), srk->key->sk_application,
usr.bin/ssh/ssh-sk-client.c
484
sshkey_free(key);
usr.bin/ssh/ssh-sk-helper.c
100
pkcs11_key_free(struct sshkey *key)
usr.bin/ssh/ssh-sk-helper.c
109
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk-helper.c
126
if ((r = sshkey_private_deserialize(kbuf, &key)) != 0)
usr.bin/ssh/ssh-sk-helper.c
128
if (!sshkey_is_sk(key)) {
usr.bin/ssh/ssh-sk-helper.c
130
__progname, sshkey_ssh_name(key));
usr.bin/ssh/ssh-sk-helper.c
134
"msg len %zu, compat 0x%lx", sshkey_type(key),
usr.bin/ssh/ssh-sk-helper.c
139
if ((r = sshsk_sign(provider, key, &sig, &siglen,
usr.bin/ssh/ssh-sk-helper.c
152
sshkey_free(key);
usr.bin/ssh/ssh-sk-helper.c
170
struct sshkey *key;
usr.bin/ssh/ssh-sk-helper.c
199
flags, pin, challenge, &key, attest)) != 0) {
usr.bin/ssh/ssh-sk-helper.c
206
if ((r = sshkey_private_serialize(key, kbuf)) != 0)
usr.bin/ssh/ssh-sk-helper.c
214
sshkey_free(key);
usr.bin/ssh/ssh-sk-helper.c
265
sshkey_type(srks[i]->key), srks[i]->key->sk_application,
usr.bin/ssh/ssh-sk-helper.c
268
if ((r = sshkey_private_serialize(srks[i]->key, kbuf)) != 0)
usr.bin/ssh/ssh-sk-helper.c
90
pkcs11_sign(struct sshkey *key,
usr.bin/ssh/ssh-sk.c
190
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk.c
198
if ((key = sshkey_new(KEY_ECDSA_SK)) == NULL) {
usr.bin/ssh/ssh-sk.c
203
key->ecdsa_nid = NID_X9_62_prime256v1;
usr.bin/ssh/ssh-sk.c
204
if ((ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL ||
usr.bin/ssh/ssh-sk.c
233
if ((key->pkey = EVP_PKEY_new()) == NULL) {
usr.bin/ssh/ssh-sk.c
238
if (EVP_PKEY_set1_EC_KEY(key->pkey, ecdsa) != 1) {
usr.bin/ssh/ssh-sk.c
244
*keyp = key;
usr.bin/ssh/ssh-sk.c
245
key = NULL; /* transferred */
usr.bin/ssh/ssh-sk.c
248
sshkey_free(key);
usr.bin/ssh/ssh-sk.c
259
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk.c
268
if ((key = sshkey_new(KEY_ED25519_SK)) == NULL) {
usr.bin/ssh/ssh-sk.c
273
if ((key->ed25519_pk = malloc(ED25519_PK_SZ)) == NULL) {
usr.bin/ssh/ssh-sk.c
278
memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ);
usr.bin/ssh/ssh-sk.c
280
*keyp = key;
usr.bin/ssh/ssh-sk.c
281
key = NULL; /* transferred */
usr.bin/ssh/ssh-sk.c
284
sshkey_free(key);
usr.bin/ssh/ssh-sk.c
292
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk.c
306
if ((r = sshsk_ecdsa_assemble(resp, &key)) != 0)
usr.bin/ssh/ssh-sk.c
311
if ((r = sshsk_ed25519_assemble(resp, &key)) != 0)
usr.bin/ssh/ssh-sk.c
319
key->sk_flags = flags;
usr.bin/ssh/ssh-sk.c
320
if ((key->sk_key_handle = sshbuf_new()) == NULL ||
usr.bin/ssh/ssh-sk.c
321
(key->sk_reserved = sshbuf_new()) == NULL) {
usr.bin/ssh/ssh-sk.c
326
if ((key->sk_application = strdup(application)) == NULL) {
usr.bin/ssh/ssh-sk.c
331
if ((r = sshbuf_put(key->sk_key_handle, resp->key_handle,
usr.bin/ssh/ssh-sk.c
338
*keyp = key;
usr.bin/ssh/ssh-sk.c
339
key = NULL;
usr.bin/ssh/ssh-sk.c
341
sshkey_free(key);
usr.bin/ssh/ssh-sk.c
465
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk.c
539
resp, &key)) != 0)
usr.bin/ssh/ssh-sk.c
547
*keyp = key;
usr.bin/ssh/ssh-sk.c
548
key = NULL; /* transferred */
usr.bin/ssh/ssh-sk.c
553
sshkey_free(key);
usr.bin/ssh/ssh-sk.c
633
sshsk_sign(const char *provider_path, struct sshkey *key,
usr.bin/ssh/ssh-sk.c
645
provider_path, sshkey_type(key), key->sk_flags,
usr.bin/ssh/ssh-sk.c
652
type = sshkey_type_plain(key->type);
usr.bin/ssh/ssh-sk.c
666
key->sk_key_handle == NULL ||
usr.bin/ssh/ssh-sk.c
667
key->sk_application == NULL || *key->sk_application == '\0') {
usr.bin/ssh/ssh-sk.c
677
__func__, key->sk_flags, key->sk_application);
usr.bin/ssh/ssh-sk.c
679
sshbuf_dump(key->sk_key_handle, stderr);
usr.bin/ssh/ssh-sk.c
681
if ((r = skp->sk_sign(alg, data, datalen, key->sk_application,
usr.bin/ssh/ssh-sk.c
682
sshbuf_ptr(key->sk_key_handle), sshbuf_len(key->sk_key_handle),
usr.bin/ssh/ssh-sk.c
683
key->sk_flags, pin, opts, &resp)) != 0) {
usr.bin/ssh/ssh-sk.c
693
if ((r = sshbuf_put_cstring(sig, sshkey_ssh_name_plain(key))) != 0) {
usr.bin/ssh/ssh-sk.c
747
freezero(rks[i]->key.key_handle, rks[i]->key.key_handle_len);
usr.bin/ssh/ssh-sk.c
748
freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);
usr.bin/ssh/ssh-sk.c
749
freezero(rks[i]->key.signature, rks[i]->key.signature_len);
usr.bin/ssh/ssh-sk.c
750
freezero(rks[i]->key.attestation_cert,
usr.bin/ssh/ssh-sk.c
751
rks[i]->key.attestation_cert_len);
usr.bin/ssh/ssh-sk.c
762
sshkey_free(srk->key);
usr.bin/ssh/ssh-sk.c
790
struct sshkey *key = NULL;
usr.bin/ssh/ssh-sk.c
832
rks[i]->application, sk_flags, &rks[i]->key, &key)) != 0)
usr.bin/ssh/ssh-sk.c
839
srk->key = key;
usr.bin/ssh/ssh-sk.c
840
key = NULL; /* transferred */
usr.bin/ssh/ssh-sk.c
869
sshkey_free(key);
usr.bin/ssh/ssh-sk.h
35
struct sshkey *key;
usr.bin/ssh/ssh-sk.h
61
int sshsk_sign(const char *provider_path, struct sshkey *key,
usr.bin/ssh/ssh_api.c
169
sshkey_free(k->key);
usr.bin/ssh/ssh_api.c
194
ssh_add_hostkey(struct ssh *ssh, struct sshkey *key)
usr.bin/ssh/ssh_api.c
201
if ((r = sshkey_from_private(key, &pubkey)) != 0)
usr.bin/ssh/ssh_api.c
209
k_prv->key = key;
usr.bin/ssh/ssh_api.c
213
k->key = pubkey;
usr.bin/ssh/ssh_api.c
219
k->key = key;
usr.bin/ssh/ssh_api.c
481
debug3_f("check %s", sshkey_type(k->key));
usr.bin/ssh/ssh_api.c
482
if (k->key->type == type &&
usr.bin/ssh/ssh_api.c
483
(type != KEY_ECDSA || k->key->ecdsa_nid == nid))
usr.bin/ssh/ssh_api.c
484
return (k->key);
usr.bin/ssh/ssh_api.c
496
debug3_f("check %s", sshkey_type(k->key));
usr.bin/ssh/ssh_api.c
497
if (k->key->type == type &&
usr.bin/ssh/ssh_api.c
498
(type != KEY_ECDSA || k->key->ecdsa_nid == nid))
usr.bin/ssh/ssh_api.c
499
return (k->key);
usr.bin/ssh/ssh_api.c
511
debug3_f("check %s", sshkey_type(k->key));
usr.bin/ssh/ssh_api.c
512
if (sshkey_equal_public(hostkey, k->key))
usr.bin/ssh/ssh_api.c
547
if (k->key->type != ktype &&
usr.bin/ssh/ssh_api.c
548
(!sshkey_is_cert(k->key) ||
usr.bin/ssh/ssh_api.c
549
k->key->type != sshkey_type_plain(ktype)))
usr.bin/ssh/ssh_api.c
551
if (sshkey_type_plain(k->key->type) == KEY_ECDSA &&
usr.bin/ssh/ssh_api.c
552
k->key->ecdsa_nid != nid)
usr.bin/ssh/ssh_api.c
59
mm_sshkey_sign(struct sshkey *key, u_char **sigp, u_int *lenp,
usr.bin/ssh/ssh_api.c
66
ret = sshkey_sign(key, sigp, &slen, data, datalen, alg,
usr.bin/ssh/ssh_api.h
63
int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key);
usr.bin/ssh/sshconnect.c
1037
!sshkey_equal(ip_found->key, host_found->key))))
usr.bin/ssh/sshconnect.c
1279
sshkey_type(host_found->key),
usr.bin/ssh/sshconnect.c
1601
show_other_keys(struct hostkeys *hostkeys, struct sshkey *key)
usr.bin/ssh/sshconnect.c
1614
if (type[i] == key->type)
usr.bin/ssh/sshconnect.c
1619
fp = sshkey_fingerprint(found->key,
usr.bin/ssh/sshconnect.c
1621
ra = sshkey_fingerprint(found->key,
usr.bin/ssh/sshconnect.c
1628
sshkey_type(found->key),
usr.bin/ssh/sshconnect.c
1630
sshkey_type(found->key), fp);
usr.bin/ssh/sshconnect.c
647
const struct sshkey *key;
usr.bin/ssh/sshconnect.c
683
hostkey_accepted_by_hostkeyalgs(const struct sshkey *key)
usr.bin/ssh/sshconnect.c
685
const char *ktype = sshkey_ssh_name(key);
usr.bin/ssh/sshconnect.c
688
if (key->type == KEY_UNSPEC)
usr.bin/ssh/sshconnect.c
690
if (key->type == KEY_RSA &&
usr.bin/ssh/sshconnect.c
694
if (key->type == KEY_RSA_CERT &&
usr.bin/ssh/sshconnect.c
714
if (l->key == NULL || !sshkey_equal(ctx->key, l->key))
usr.bin/ssh/sshconnect.c
752
hostkeys_find_by_key(const char *host, const char *ip, const struct sshkey *key,
usr.bin/ssh/sshconnect.c
763
if (key == NULL || sshkey_is_cert(key))
usr.bin/ssh/sshconnect.c
768
ctx.key = key;
usr.bin/ssh/sshconnect.c
795
const struct sshkey *key,
usr.bin/ssh/sshconnect.c
802
hostkeys_find_by_key(host, ip, key,
usr.bin/ssh/sshconnect2.c
1152
key_sig_algorithm(struct ssh *ssh, const struct sshkey *key)
usr.bin/ssh/sshconnect2.c
1163
(key->type != KEY_RSA && key->type != KEY_RSA_CERT) ||
usr.bin/ssh/sshconnect2.c
1164
(key->type == KEY_RSA_CERT && (ssh->compat & SSH_BUG_SIGTYPE))) {
usr.bin/ssh/sshconnect2.c
1166
return match_list(sshkey_ssh_name(key),
usr.bin/ssh/sshconnect2.c
1175
if (key->type == KEY_RSA && (ssh->compat & SSH_BUG_SIGTYPE74))
usr.bin/ssh/sshconnect2.c
1186
if (sshkey_type_from_name(cp) != key->type)
usr.bin/ssh/sshconnect2.c
1213
if (id->key != NULL && id->agent_fd != -1) {
usr.bin/ssh/sshconnect2.c
1214
return ssh_agent_sign(id->agent_fd, id->key, sigp, lenp,
usr.bin/ssh/sshconnect2.c
1222
if (id->key != NULL &&
usr.bin/ssh/sshconnect2.c
1223
(id->isprivate || (id->key->flags & SSHKEY_FLAG_EXT))) {
usr.bin/ssh/sshconnect2.c
1224
sign_key = id->key;
usr.bin/ssh/sshconnect2.c
1230
if (id->key != NULL && !sshkey_equal_public(prv, id->key)) {
usr.bin/ssh/sshconnect2.c
1272
if ((id->key->flags & SSHKEY_FLAG_EXT) != 0 &&
usr.bin/ssh/sshconnect2.c
1327
if ((fp = sshkey_fingerprint(id->key, options.fingerprint_hash,
usr.bin/ssh/sshconnect2.c
1331
debug3_f("using %s with %s %s", method, sshkey_type(id->key), fp);
usr.bin/ssh/sshconnect2.c
1341
if (id->agent_fd == -1 && sshkey_is_cert(id->key)) {
usr.bin/ssh/sshconnect2.c
1343
if (sshkey_equal_public(id->key, private_id->key) &&
usr.bin/ssh/sshconnect2.c
1344
id->key->type != private_id->key->type) {
usr.bin/ssh/sshconnect2.c
1358
(id->key->flags & SSHKEY_FLAG_EXT) == 0) {
usr.bin/ssh/sshconnect2.c
1360
if (private_id->key == NULL &&
usr.bin/ssh/sshconnect2.c
1390
id->key)) == NULL) {
usr.bin/ssh/sshconnect2.c
1414
(r = sshkey_puts(id->key, b)) != 0) {
usr.bin/ssh/sshconnect2.c
1436
else if ((sign_id->key->flags & SSHKEY_FLAG_EXT) != 0)
usr.bin/ssh/sshconnect2.c
1439
loc, sshkey_type(id->key), fp);
usr.bin/ssh/sshconnect2.c
1443
sshkey_type(sign_id->key), sign_id->filename,
usr.bin/ssh/sshconnect2.c
1488
if ((alg = key_sig_algorithm(ssh, id->key)) == NULL) {
usr.bin/ssh/sshconnect2.c
1493
if ((r = sshkey_to_blob(id->key, &blob, &bloblen)) != 0) {
usr.bin/ssh/sshconnect2.c
1585
!(id->key && id->isprivate))
usr.bin/ssh/sshconnect2.c
1598
key_type_allowed(struct sshkey *key, const char *allowlist)
usr.bin/ssh/sshconnect2.c
1600
if (match_pattern_list(sshkey_ssh_name(key), allowlist, 0) == 1)
usr.bin/ssh/sshconnect2.c
1604
switch (key->type) {
usr.bin/ssh/sshconnect2.c
1624
key_type_allowed_by_config(struct sshkey *key)
usr.bin/ssh/sshconnect2.c
1626
return key_type_allowed(key, options.pubkey_accepted_algos);
usr.bin/ssh/sshconnect2.c
1673
struct sshkey *key;
usr.bin/ssh/sshconnect2.c
1686
key = options.identity_keys[i];
usr.bin/ssh/sshconnect2.c
1687
if (key && key->cert &&
usr.bin/ssh/sshconnect2.c
1688
key->cert->type != SSH2_CERT_TYPE_USER) {
usr.bin/ssh/sshconnect2.c
1693
if (key && sshkey_is_sk(key) && options.sk_provider == NULL) {
usr.bin/ssh/sshconnect2.c
1702
id->key = key;
usr.bin/ssh/sshconnect2.c
1709
key = options.certificates[i];
usr.bin/ssh/sshconnect2.c
1710
if (!sshkey_is_cert(key) || key->cert == NULL ||
usr.bin/ssh/sshconnect2.c
1711
key->cert->type != SSH2_CERT_TYPE_USER) {
usr.bin/ssh/sshconnect2.c
1716
if (key && sshkey_is_sk(key) && options.sk_provider == NULL) {
usr.bin/ssh/sshconnect2.c
1725
id->key = key;
usr.bin/ssh/sshconnect2.c
1745
if (sshkey_equal(idlist->keys[j], id->key)) {
usr.bin/ssh/sshconnect2.c
1756
id->key = idlist->keys[j];
usr.bin/ssh/sshconnect2.c
1771
if (id->key == NULL || (id->key->flags & SSHKEY_FLAG_EXT) == 0)
usr.bin/ssh/sshconnect2.c
1775
if (id2->key == NULL ||
usr.bin/ssh/sshconnect2.c
1776
(id2->key->flags & SSHKEY_FLAG_EXT) != 0)
usr.bin/ssh/sshconnect2.c
1778
if (sshkey_equal(id->key, id2->key)) {
usr.bin/ssh/sshconnect2.c
1797
if (id->key == NULL)
usr.bin/ssh/sshconnect2.c
1799
if (!key_type_allowed_by_config(id->key)) {
usr.bin/ssh/sshconnect2.c
1802
sshkey_ssh_name(id->key), id->filename);
usr.bin/ssh/sshconnect2.c
1805
(cp = key_sig_algorithm(ssh, id->key)) == NULL) {
usr.bin/ssh/sshconnect2.c
1808
sshkey_ssh_name(id->key), id->filename);
usr.bin/ssh/sshconnect2.c
1816
sshkey_free(id->key);
usr.bin/ssh/sshconnect2.c
1842
sshkey_free(id->key);
usr.bin/ssh/sshconnect2.c
1882
if (id->key != NULL) {
usr.bin/ssh/sshconnect2.c
1889
id->key = load_identity_file(id);
usr.bin/ssh/sshconnect2.c
1890
if (id->key != NULL) {
usr.bin/ssh/sshconnect2.c
1893
sshkey_free(id->key);
usr.bin/ssh/sshconnect2.c
1894
id->key = NULL;
usr.bin/ssh/sshconnect2.c
2017
ssh_keysign(struct ssh *ssh, struct sshkey *key, u_char **sigp, size_t *lenp,
usr.bin/ssh/sshconnect2.c
298
struct sshkey *key; /* public/private key */
usr.bin/ssh/sshconnect2.c
653
if (id->key != NULL) {
usr.bin/ssh/sshconnect2.c
654
fp = sshkey_fingerprint(id->key, options.fingerprint_hash,
usr.bin/ssh/sshconnect2.c
657
if (id->key) {
usr.bin/ssh/sshconnect2.c
658
if ((id->key->flags & SSHKEY_FLAG_EXT) != 0)
usr.bin/ssh/sshconnect2.c
660
else if (sshkey_is_sk(id->key))
usr.bin/ssh/sshconnect2.c
665
id->key ? sshkey_type(id->key) : "", id->key ? " " : "",
usr.bin/ssh/sshconnect2.c
677
struct sshkey *key = NULL;
usr.bin/ssh/sshconnect2.c
698
if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) {
usr.bin/ssh/sshconnect2.c
702
if (key->type != pktype) {
usr.bin/ssh/sshconnect2.c
705
key->type, pktype);
usr.bin/ssh/sshconnect2.c
716
if (sshkey_equal(key, id->key)) {
usr.bin/ssh/sshconnect2.c
722
fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/sshconnect2.c
725
sshkey_type(key), fp == NULL ? "<ERROR>" : fp);
usr.bin/ssh/sshconnect2.c
734
sshkey_free(key);
usr.bin/ssh/sshd-auth.c
221
struct sshkey *key;
usr.bin/ssh/sshd-auth.c
228
key = host_pubkeys[i];
usr.bin/ssh/sshd-auth.c
229
if (key == NULL)
usr.bin/ssh/sshd-auth.c
231
switch (key->type) {
usr.bin/ssh/sshd-auth.c
241
append_hostkey_type(b, sshkey_ssh_name(key));
usr.bin/ssh/sshd-auth.c
245
key = host_certificates[i];
usr.bin/ssh/sshd-auth.c
246
if (key == NULL)
usr.bin/ssh/sshd-auth.c
248
switch (key->type) {
usr.bin/ssh/sshd-auth.c
260
append_hostkey_type(b, sshkey_ssh_name(key));
usr.bin/ssh/sshd-auth.c
275
struct sshkey *key;
usr.bin/ssh/sshd-auth.c
284
key = host_certificates[i];
usr.bin/ssh/sshd-auth.c
287
key = host_pubkeys[i];
usr.bin/ssh/sshd-auth.c
290
if (key == NULL || key->type != type)
usr.bin/ssh/sshd-auth.c
297
if (key->ecdsa_nid != nid)
usr.bin/ssh/sshd-auth.c
301
return key;
usr.bin/ssh/sshd-auth.c
330
get_hostkey_index(struct sshkey *key, int compare, struct ssh *ssh)
usr.bin/ssh/sshd-auth.c
335
if (sshkey_is_cert(key)) {
usr.bin/ssh/sshd-auth.c
336
if (key == host_certificates[i] ||
usr.bin/ssh/sshd-auth.c
338
sshkey_equal(key, host_certificates[i])))
usr.bin/ssh/sshd-auth.c
341
if (key == host_pubkeys[i] ||
usr.bin/ssh/sshd-auth.c
343
sshkey_equal(key, host_pubkeys[i])))
usr.bin/ssh/sshd-session.c
399
struct sshkey *key;
usr.bin/ssh/sshd-session.c
408
key = sensitive_data.host_certificates[i];
usr.bin/ssh/sshd-session.c
411
key = sensitive_data.host_keys[i];
usr.bin/ssh/sshd-session.c
412
if (key == NULL && !need_private)
usr.bin/ssh/sshd-session.c
413
key = sensitive_data.host_pubkeys[i];
usr.bin/ssh/sshd-session.c
416
if (key == NULL || key->type != type)
usr.bin/ssh/sshd-session.c
423
if (key->ecdsa_nid != nid)
usr.bin/ssh/sshd-session.c
428
sensitive_data.host_keys[i] : key;
usr.bin/ssh/sshd-session.c
463
get_hostkey_index(struct sshkey *key, int compare, struct ssh *ssh)
usr.bin/ssh/sshd-session.c
468
if (sshkey_is_cert(key)) {
usr.bin/ssh/sshd-session.c
469
if (key == sensitive_data.host_certificates[i] ||
usr.bin/ssh/sshd-session.c
471
sshkey_equal(key,
usr.bin/ssh/sshd-session.c
475
if (key == sensitive_data.host_keys[i] ||
usr.bin/ssh/sshd-session.c
477
sshkey_equal(key, sensitive_data.host_keys[i])))
usr.bin/ssh/sshd-session.c
479
if (key == sensitive_data.host_pubkeys[i] ||
usr.bin/ssh/sshd-session.c
481
sshkey_equal(key, sensitive_data.host_pubkeys[i])))
usr.bin/ssh/sshd-session.c
493
struct sshkey *key;
usr.bin/ssh/sshd-session.c
505
key = get_hostkey_public_by_index(i, ssh);
usr.bin/ssh/sshd-session.c
506
if (key == NULL || key->type == KEY_UNSPEC ||
usr.bin/ssh/sshd-session.c
507
sshkey_is_cert(key))
usr.bin/ssh/sshd-session.c
509
fp = sshkey_fingerprint(key, options.fingerprint_hash,
usr.bin/ssh/sshd-session.c
511
debug3_f("key %d: %s %s", i, sshkey_ssh_name(key), fp);
usr.bin/ssh/sshd-session.c
525
if ((r = sshkey_putb(key, buf)) != 0)
usr.bin/ssh/sshd.c
1200
struct sshkey *key)
usr.bin/ssh/sshd.c
1210
if (key == NULL) { /* finalize */
usr.bin/ssh/sshd.c
1227
if ((r = sshkey_private_serialize(key, buf)) != 0)
usr.bin/ssh/sshd.c
1228
fatal_fr(r, "encode %s key", sshkey_ssh_name(key));
usr.bin/ssh/sshd.c
1272
struct sshkey *key;
usr.bin/ssh/sshd.c
1539
&key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
usr.bin/ssh/sshd.c
1542
if (sshkey_is_sk(key) &&
usr.bin/ssh/sshd.c
1543
key->sk_flags & SSH_SK_USER_PRESENCE_REQD) {
usr.bin/ssh/sshd.c
1546
key->sk_flags &= ~SSH_SK_USER_PRESENCE_REQD;
usr.bin/ssh/sshd.c
1548
if (r == 0 && key != NULL &&
usr.bin/ssh/sshd.c
1549
(r = sshkey_shield_private(key)) != 0) {
usr.bin/ssh/sshd.c
1552
sshkey_free(key);
usr.bin/ssh/sshd.c
1553
key = NULL;
usr.bin/ssh/sshd.c
1559
if (pubkey != NULL && key != NULL) {
usr.bin/ssh/sshd.c
1560
if (!sshkey_equal(pubkey, key)) {
usr.bin/ssh/sshd.c
1567
if (pubkey == NULL && key != NULL) {
usr.bin/ssh/sshd.c
1568
if ((r = sshkey_from_private(key, &pubkey)) != 0)
usr.bin/ssh/sshd.c
1576
sshkey_free(key);
usr.bin/ssh/sshd.c
1579
sensitive_data.host_keys[i] = key;
usr.bin/ssh/sshd.c
1582
if (key == NULL && pubkey != NULL && have_agent) {
usr.bin/ssh/sshd.c
1586
} else if (key != NULL) {
usr.bin/ssh/sshd.c
1587
keytype = key->type;
usr.bin/ssh/sshd.c
1588
accumulate_host_timing_secret(cfg, key);
usr.bin/ssh/sshd.c
1603
if (have_agent || key != NULL)
usr.bin/ssh/sshd.c
1611
key ? "private" : "agent", i, sshkey_ssh_name(pubkey), fp);
usr.bin/ssh/sshd.c
1633
&key, NULL)) != 0) {
usr.bin/ssh/sshd.c
1638
if (!sshkey_is_cert(key)) {
usr.bin/ssh/sshd.c
1641
sshkey_free(key);
usr.bin/ssh/sshd.c
1646
if (sshkey_equal_public(key,
usr.bin/ssh/sshd.c
1648
sensitive_data.host_certificates[j] = key;
usr.bin/ssh/sshd.c
1655
sshkey_free(key);
usr.bin/ssh/sshd.c
1658
sensitive_data.host_certificates[j] = key;
usr.bin/ssh/sshd.c
1659
debug("host certificate: #%u type %d %s", j, key->type,
usr.bin/ssh/sshd.c
1660
sshkey_type(key));
usr.bin/ssh/sshkey.c
1331
sshkey_to_base64(const struct sshkey *key, char **b64p)
usr.bin/ssh/sshkey.c
1341
if ((r = sshkey_putb(key, b)) != 0)
usr.bin/ssh/sshkey.c
1360
sshkey_format_text(const struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
1365
if ((r = sshkey_to_base64(key, &uu)) != 0)
usr.bin/ssh/sshkey.c
1368
sshkey_ssh_name(key), uu)) != 0)
usr.bin/ssh/sshkey.c
1377
sshkey_write(const struct sshkey *key, FILE *f)
usr.bin/ssh/sshkey.c
1384
if ((r = sshkey_format_text(key, b)) != 0)
usr.bin/ssh/sshkey.c
1812
cert_parse(struct sshbuf *b, struct sshkey *key, struct sshbuf *certbuf)
usr.bin/ssh/sshkey.c
1821
if ((ret = sshbuf_putb(key->cert->certblob, certbuf)) != 0)
usr.bin/ssh/sshkey.c
1825
if ((ret = sshbuf_get_u64(b, &key->cert->serial)) != 0 ||
usr.bin/ssh/sshkey.c
1826
(ret = sshbuf_get_u32(b, &key->cert->type)) != 0 ||
usr.bin/ssh/sshkey.c
1827
(ret = sshbuf_get_cstring(b, &key->cert->key_id, &kidlen)) != 0 ||
usr.bin/ssh/sshkey.c
1829
(ret = sshbuf_get_u64(b, &key->cert->valid_after)) != 0 ||
usr.bin/ssh/sshkey.c
1830
(ret = sshbuf_get_u64(b, &key->cert->valid_before)) != 0 ||
usr.bin/ssh/sshkey.c
1841
signed_len = sshbuf_len(key->cert->certblob) - sshbuf_len(b);
usr.bin/ssh/sshkey.c
1848
if (key->cert->type != SSH2_CERT_TYPE_USER &&
usr.bin/ssh/sshkey.c
1849
key->cert->type != SSH2_CERT_TYPE_HOST) {
usr.bin/ssh/sshkey.c
1859
if (key->cert->nprincipals >= SSHKEY_CERT_MAX_PRINCIPALS) {
usr.bin/ssh/sshkey.c
1868
oprincipals = key->cert->principals;
usr.bin/ssh/sshkey.c
1869
key->cert->principals = recallocarray(key->cert->principals,
usr.bin/ssh/sshkey.c
1870
key->cert->nprincipals, key->cert->nprincipals + 1,
usr.bin/ssh/sshkey.c
1871
sizeof(*key->cert->principals));
usr.bin/ssh/sshkey.c
1872
if (key->cert->principals == NULL) {
usr.bin/ssh/sshkey.c
1874
key->cert->principals = oprincipals;
usr.bin/ssh/sshkey.c
1878
key->cert->principals[key->cert->nprincipals++] = principal;
usr.bin/ssh/sshkey.c
1885
if ((ret = sshbuf_putb(key->cert->critical, crit)) != 0 ||
usr.bin/ssh/sshkey.c
1887
(ret = sshbuf_putb(key->cert->extensions, exts)) != 0))
usr.bin/ssh/sshkey.c
1896
sshbuf_reset(key->cert->critical);
usr.bin/ssh/sshkey.c
1904
sshbuf_reset(key->cert->extensions);
usr.bin/ssh/sshkey.c
1911
if (sshkey_from_blob_internal(ca, &key->cert->signature_key, 0) != 0) {
usr.bin/ssh/sshkey.c
1915
if (!sshkey_type_is_valid_ca(key->cert->signature_key->type)) {
usr.bin/ssh/sshkey.c
1919
if ((ret = sshkey_verify(key->cert->signature_key, sig, slen,
usr.bin/ssh/sshkey.c
1920
sshbuf_ptr(key->cert->certblob), signed_len, NULL, 0, NULL)) != 0)
usr.bin/ssh/sshkey.c
1923
&key->cert->signature_type)) != 0)
usr.bin/ssh/sshkey.c
1938
sshkey_deserialize_sk(struct sshbuf *b, struct sshkey *key)
usr.bin/ssh/sshkey.c
1941
if (sshbuf_get_cstring(b, &key->sk_application, NULL) != 0)
usr.bin/ssh/sshkey.c
1952
struct sshkey *key = NULL;
usr.bin/ssh/sshkey.c
1979
if ((key = sshkey_new(type)) == NULL) {
usr.bin/ssh/sshkey.c
1990
if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0)
usr.bin/ssh/sshkey.c
1994
if (sshkey_is_cert(key) && (ret = cert_parse(b, key, copy)) != 0)
usr.bin/ssh/sshkey.c
1997
if (key != NULL && sshbuf_len(b) != 0) {
usr.bin/ssh/sshkey.c
2003
*keyp = key;
usr.bin/ssh/sshkey.c
2004
key = NULL;
usr.bin/ssh/sshkey.c
2008
sshkey_free(key);
usr.bin/ssh/sshkey.c
2078
sshkey_check_cert_sigtype(const struct sshkey *key, const char *allowed)
usr.bin/ssh/sshkey.c
2080
if (key == NULL || allowed == NULL)
usr.bin/ssh/sshkey.c
2082
if (!sshkey_type_is_cert(key->type))
usr.bin/ssh/sshkey.c
2084
if (key->cert == NULL || key->cert->signature_type == NULL)
usr.bin/ssh/sshkey.c
2086
if (match_pattern_list(key->cert->signature_type, allowed, 0) != 1)
usr.bin/ssh/sshkey.c
2138
sshkey_sign(struct sshkey *key,
usr.bin/ssh/sshkey.c
2143
int was_shielded = sshkey_is_shielded(key);
usr.bin/ssh/sshkey.c
2153
if ((impl = sshkey_impl_from_key(key)) == NULL)
usr.bin/ssh/sshkey.c
2155
if ((r = sshkey_unshield_private(key)) != 0)
usr.bin/ssh/sshkey.c
2157
if (sshkey_is_sk(key)) {
usr.bin/ssh/sshkey.c
2158
r = sshsk_sign(sk_provider, key, sigp, lenp, data,
usr.bin/ssh/sshkey.c
2160
} else if ((key->flags & SSHKEY_FLAG_EXT) != 0) {
usr.bin/ssh/sshkey.c
2161
r = pkcs11_sign(key, sigp, lenp, data, datalen,
usr.bin/ssh/sshkey.c
2167
r = impl->funcs->sign(key, sigp, lenp, data, datalen,
usr.bin/ssh/sshkey.c
2171
if (was_shielded && (r2 = sshkey_shield_private(key)) != 0)
usr.bin/ssh/sshkey.c
2181
sshkey_verify(const struct sshkey *key,
usr.bin/ssh/sshkey.c
2192
if ((impl = sshkey_impl_from_key(key)) == NULL)
usr.bin/ssh/sshkey.c
2194
return impl->funcs->verify(key, sig, siglen, data, dlen,
usr.bin/ssh/sshkey.c
2337
default_key_sign(struct sshkey *key, u_char **sigp, size_t *lenp,
usr.bin/ssh/sshkey.c
2344
return sshkey_sign(key, sigp, lenp, data, datalen, alg,
usr.bin/ssh/sshkey.c
2432
sshkey_cert_check_host(const struct sshkey *key, const char *host,
usr.bin/ssh/sshkey.c
2437
if ((r = sshkey_cert_check_authority_now(key, 1, 1, host, reason)) != 0)
usr.bin/ssh/sshkey.c
2439
if (sshbuf_len(key->cert->critical) != 0) {
usr.bin/ssh/sshkey.c
2444
(r = sshkey_check_cert_sigtype(key, ca_sign_algorithms)) != 0) {
usr.bin/ssh/sshkey.c
2478
sshkey_serialize_private_sk(const struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
2482
if ((r = sshbuf_put_cstring(b, key->sk_application)) != 0 ||
usr.bin/ssh/sshkey.c
2483
(r = sshbuf_put_u8(b, key->sk_flags)) != 0 ||
usr.bin/ssh/sshkey.c
2484
(r = sshbuf_put_stringb(b, key->sk_key_handle)) != 0 ||
usr.bin/ssh/sshkey.c
2485
(r = sshbuf_put_stringb(b, key->sk_reserved)) != 0)
usr.bin/ssh/sshkey.c
2492
sshkey_private_serialize_opt(struct sshkey *key, struct sshbuf *buf,
usr.bin/ssh/sshkey.c
2496
int was_shielded = sshkey_is_shielded(key);
usr.bin/ssh/sshkey.c
2500
if ((impl = sshkey_impl_from_key(key)) == NULL)
usr.bin/ssh/sshkey.c
2502
if ((r = sshkey_unshield_private(key)) != 0)
usr.bin/ssh/sshkey.c
2506
if ((r = sshbuf_put_cstring(b, sshkey_ssh_name(key))) != 0)
usr.bin/ssh/sshkey.c
2508
if (sshkey_is_cert(key)) {
usr.bin/ssh/sshkey.c
2509
if (key->cert == NULL ||
usr.bin/ssh/sshkey.c
2510
sshbuf_len(key->cert->certblob) == 0) {
usr.bin/ssh/sshkey.c
2514
if ((r = sshbuf_put_stringb(b, key->cert->certblob)) != 0)
usr.bin/ssh/sshkey.c
2517
if ((r = impl->funcs->serialize_private(key, b, opts)) != 0)
usr.bin/ssh/sshkey.c
2527
r = sshkey_shield_private(key);
usr.bin/ssh/sshkey.c
2536
sshkey_private_serialize(struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
2538
return sshkey_private_serialize_opt(key, b,
usr.bin/ssh/sshkey.c
2694
sshkey_ec_validate_private(const EC_KEY *key)
usr.bin/ssh/sshkey.c
2705
if (EC_GROUP_get_order(EC_KEY_get0_group(key), order, NULL) != 1) {
usr.bin/ssh/sshkey.c
2709
if (BN_num_bits(EC_KEY_get0_private_key(key)) <=
usr.bin/ssh/sshkey.c
2718
if (BN_cmp(EC_KEY_get0_private_key(key), tmp) >= 0)
usr.bin/ssh/sshkey.c
2756
sshkey_dump_ec_key(const EC_KEY *key)
usr.bin/ssh/sshkey.c
2760
sshkey_dump_ec_point(EC_KEY_get0_group(key),
usr.bin/ssh/sshkey.c
2761
EC_KEY_get0_public_key(key));
usr.bin/ssh/sshkey.c
2763
if ((exponent = EC_KEY_get0_private_key(key)) == NULL)
usr.bin/ssh/sshkey.c
2766
BN_print_fp(stderr, EC_KEY_get0_private_key(key));
usr.bin/ssh/sshkey.c
2776
u_char *cp, *key = NULL, *pubkeyblob = NULL;
usr.bin/ssh/sshkey.c
2808
if ((key = calloc(1, keylen + ivlen)) == NULL) {
usr.bin/ssh/sshkey.c
2815
salt, SALT_LEN, key, keylen + ivlen, rounds) < 0) {
usr.bin/ssh/sshkey.c
2827
if ((r = cipher_init(&ciphercontext, cipher, key, keylen,
usr.bin/ssh/sshkey.c
2828
key + keylen, ivlen, 1)) != 0)
usr.bin/ssh/sshkey.c
2889
if (key != NULL)
usr.bin/ssh/sshkey.c
2890
freezero(key, keylen + ivlen);
usr.bin/ssh/sshkey.c
2982
u_char *key = NULL, *salt = NULL, *dp;
usr.bin/ssh/sshkey.c
3044
if ((key = calloc(1, keylen + ivlen)) == NULL) {
usr.bin/ssh/sshkey.c
3053
key, keylen + ivlen, rounds) < 0) {
usr.bin/ssh/sshkey.c
3068
(r = cipher_init(&ciphercontext, cipher, key, keylen,
usr.bin/ssh/sshkey.c
3069
key + keylen, ivlen, 0)) != 0)
usr.bin/ssh/sshkey.c
3109
if (key != NULL) {
usr.bin/ssh/sshkey.c
3110
explicit_bzero(key, keylen + ivlen);
usr.bin/ssh/sshkey.c
3111
free(key);
usr.bin/ssh/sshkey.c
3231
sshkey_private_to_blob_pem_pkcs8(struct sshkey *key, struct sshbuf *buf,
usr.bin/ssh/sshkey.c
3234
int was_shielded = sshkey_is_shielded(key);
usr.bin/ssh/sshkey.c
3252
if ((r = sshkey_unshield_private(key)) != 0)
usr.bin/ssh/sshkey.c
3255
switch (key->type) {
usr.bin/ssh/sshkey.c
3259
EVP_PKEY_get0_EC_KEY(key->pkey),
usr.bin/ssh/sshkey.c
3262
pkey = key->pkey;
usr.bin/ssh/sshkey.c
3263
EVP_PKEY_up_ref(key->pkey);
usr.bin/ssh/sshkey.c
3270
EVP_PKEY_get0_RSA(key->pkey),
usr.bin/ssh/sshkey.c
3273
pkey = key->pkey;
usr.bin/ssh/sshkey.c
3274
EVP_PKEY_up_ref(key->pkey);
usr.bin/ssh/sshkey.c
3285
NULL, key->ed25519_sk,
usr.bin/ssh/sshkey.c
3315
r = sshkey_shield_private(key);
usr.bin/ssh/sshkey.c
3328
sshkey_private_to_fileblob(struct sshkey *key, struct sshbuf *blob,
usr.bin/ssh/sshkey.c
3332
switch (key->type) {
usr.bin/ssh/sshkey.c
3345
return sshkey_private_to_blob2(key, blob, passphrase,
usr.bin/ssh/sshkey.c
3354
return sshkey_private_to_blob2(key, blob, passphrase,
usr.bin/ssh/sshkey.c
3358
return sshkey_private_to_blob_pem_pkcs8(key, blob,
usr.bin/ssh/sshkey.c
807
sshkey_serialize_sk(const struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
811
if ((r = sshbuf_put_cstring(b, key->sk_application)) != 0)
usr.bin/ssh/sshkey.c
818
to_blob_buf(const struct sshkey *key, struct sshbuf *b, int force_plain,
usr.bin/ssh/sshkey.c
825
if (key == NULL)
usr.bin/ssh/sshkey.c
828
type = force_plain ? sshkey_type_plain(key->type) : key->type;
usr.bin/ssh/sshkey.c
831
if (key->cert == NULL)
usr.bin/ssh/sshkey.c
833
if (sshbuf_len(key->cert->certblob) == 0)
usr.bin/ssh/sshkey.c
836
if ((ret = sshbuf_putb(b, key->cert->certblob)) != 0)
usr.bin/ssh/sshkey.c
843
typename = sshkey_ssh_name_from_type_nid(type, key->ecdsa_nid);
usr.bin/ssh/sshkey.c
846
return impl->funcs->serialize_public(key, b, opts);
usr.bin/ssh/sshkey.c
850
sshkey_putb(const struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
852
return to_blob_buf(key, b, 0, SSHKEY_SERIALIZE_DEFAULT);
usr.bin/ssh/sshkey.c
856
sshkey_puts_opts_internal(const struct sshkey *key, struct sshbuf *b,
usr.bin/ssh/sshkey.c
864
r = to_blob_buf(key, tmp, force_plain, opts);
usr.bin/ssh/sshkey.c
872
sshkey_puts(const struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
874
return sshkey_puts_opts_internal(key, b, SSHKEY_SERIALIZE_DEFAULT, 0);
usr.bin/ssh/sshkey.c
878
sshkey_putb_plain(const struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
880
return to_blob_buf(key, b, 1, SSHKEY_SERIALIZE_DEFAULT);
usr.bin/ssh/sshkey.c
884
sshkey_puts_plain(const struct sshkey *key, struct sshbuf *b)
usr.bin/ssh/sshkey.c
886
return sshkey_puts_opts_internal(key, b, SSHKEY_SERIALIZE_DEFAULT, 1);
usr.bin/ssh/sshkey.c
890
to_blob(const struct sshkey *key, u_char **blobp, size_t *lenp, int force_plain,
usr.bin/ssh/sshkey.c
903
if ((ret = to_blob_buf(key, b, force_plain, opts)) != 0)
usr.bin/ssh/sshkey.c
922
sshkey_to_blob(const struct sshkey *key, u_char **blobp, size_t *lenp)
usr.bin/ssh/sshkey.c
924
return to_blob(key, blobp, lenp, 0, SSHKEY_SERIALIZE_DEFAULT);
usr.bin/ssh/sshkey.c
928
sshkey_plain_to_blob(const struct sshkey *key, u_char **blobp, size_t *lenp)
usr.bin/ssh/sshkey.c
930
return to_blob(key, blobp, lenp, 1, SSHKEY_SERIALIZE_DEFAULT);
usr.bin/ssh/sshkey.h
279
int sshkey_private_serialize(struct sshkey *key, struct sshbuf *buf);
usr.bin/ssh/sshkey.h
283
int sshkey_private_to_fileblob(struct sshkey *key, struct sshbuf *blob,
usr.bin/ssh/sshkey.h
307
int sshkey_serialize_sk(const struct sshkey *key, struct sshbuf *b);
usr.bin/ssh/sshkey.h
309
int sshkey_deserialize_sk(struct sshbuf *b, struct sshkey *key);
usr.bin/ssh/sshkey.h
310
int sshkey_serialize_private_sk(const struct sshkey *key,
usr.bin/ssh/sshsig.c
162
sshsig_wrap_sign(struct sshkey *key, const char *hashalg,
usr.bin/ssh/sshsig.c
191
if (sshkey_type_plain(key->type) == KEY_RSA) {
usr.bin/ssh/sshsig.c
200
if ((r = signer(key, &sig, &slen,
usr.bin/ssh/sshsig.c
207
if ((r = sshkey_sign(key, &sig, &slen,
usr.bin/ssh/sshsig.c
217
(r = sshkey_puts(key, blob)) != 0 ||
usr.bin/ssh/sshsig.c
309
struct sshkey *key = NULL;
usr.bin/ssh/sshsig.c
338
if ((r = sshkey_froms(signature, &key)) != 0 ||
usr.bin/ssh/sshsig.c
368
if (sshkey_type_plain(key->type) == KEY_RSA) {
usr.bin/ssh/sshsig.c
381
if ((r = sshkey_verify(key, sig, siglen, sshbuf_ptr(toverify),
usr.bin/ssh/sshsig.c
390
*sign_keyp = key;
usr.bin/ssh/sshsig.c
391
key = NULL; /* transferred */
usr.bin/ssh/sshsig.c
399
sshkey_free(key);
usr.bin/ssh/sshsig.c
446
sshsig_signb(struct sshkey *key, const char *hashalg,
usr.bin/ssh/sshsig.c
462
if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b,
usr.bin/ssh/sshsig.c
574
sshsig_sign_fd(struct sshkey *key, const char *hashalg,
usr.bin/ssh/sshsig.c
590
if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b,
usr.bin/ssh/sshsig.c
741
struct sshkey *key = NULL;
usr.bin/ssh/sshsig.c
782
if ((key = sshkey_new(KEY_UNSPEC)) == NULL) {
usr.bin/ssh/sshsig.c
787
if (sshkey_read(key, &cp) != 0) {
usr.bin/ssh/sshsig.c
802
if (sshkey_read(key, &cp) != 0) {
usr.bin/ssh/sshsig.c
824
*keyp = key;
usr.bin/ssh/sshsig.c
825
key = NULL; /* transferred */
usr.bin/ssh/sshsig.c
831
sshkey_free(key);
usr.bin/ssh/sshsig.h
37
int sshsig_signb(struct sshkey *key, const char *hashalg,
usr.bin/ssh/sshsig.h
58
int sshsig_sign_fd(struct sshkey *key, const char *hashalg,
usr.bin/ssh/umac.c
1014
aes_key_setup(key,prf_key);
usr.bin/ssh/umac.c
1210
struct umac_ctx *umac_new(const u_char key[])
usr.bin/ssh/umac.c
1227
aes_key_setup(key, prf_key);
usr.bin/ssh/umac.c
160
#define aes_key_setup(key,int_key) \
usr.bin/ssh/umac.c
161
AES_set_encrypt_key((const u_char *)(key),UMAC_KEY_LEN*8,int_key)
usr.bin/ssh/umac.c
168
#define aes_key_setup(key,int_key) \
usr.bin/ssh/umac.c
169
rijndaelKeySetupEnc((u32 *)(int_key), (const unsigned char *)(key), \
usr.bin/ssh/umac.c
179
static void kdf(void *buffer_ptr, aes_int_key key, UINT8 ndx, int nbytes)
usr.bin/ssh/umac.c
191
aes_encryption(in_buf, out_buf, key);
usr.bin/ssh/umac.c
198
aes_encryption(in_buf, out_buf, key);
usr.bin/ssh/umac.c
539
UINT8 *key;
usr.bin/ssh/umac.c
541
key = hc->nh_key + hc->bytes_hashed;
usr.bin/ssh/umac.c
542
nh_aux(key, buf, hc->state, nbytes);
usr.bin/ssh/umac.c
792
static UINT64 poly64(UINT64 cur, UINT64 key, UINT64 data)
usr.bin/ssh/umac.c
794
UINT32 key_hi = (UINT32)(key >> 32),
usr.bin/ssh/umac.c
795
key_lo = (UINT32)key,
usr.bin/ssh/umac.c
999
static uhash_ctx_t uhash_alloc(u_char key[])
usr.bin/ssh/umac.h
120
struct umac_ctx *umac128_new(const u_char key[]);
usr.bin/ssh/umac.h
55
struct umac_ctx *umac_new(const u_char key[]);
usr.bin/ssh/umac.h
91
uhash_ctx_t uhash_alloc(u_char key[16]);
usr.bin/systat/engine.c
626
int key = tolower(ch);
usr.bin/systat/engine.c
630
if (key == v->hotkey) {
usr.bin/systat/engine.c
937
int key = ch;
usr.bin/systat/engine.c
948
if (key == o->hotkey) {
usr.bin/systat/pftop.c
442
if (s1->key[side].af > s2->key[side].af)
usr.bin/systat/pftop.c
444
if (s1->key[side].af < s2->key[side].af)
usr.bin/systat/pftop.c
454
if (s1->key[PF_SK_STACK].af != s1->key[PF_SK_WIRE].af) {
usr.bin/systat/pftop.c
463
aa = &s1->key[PF_SK_STACK].addr[ii];
usr.bin/systat/pftop.c
464
pa = s1->key[PF_SK_STACK].port[ii];
usr.bin/systat/pftop.c
465
af = s1->key[PF_SK_STACK].af;
usr.bin/systat/pftop.c
467
aa = &s1->key[side].addr[io];
usr.bin/systat/pftop.c
468
pa = s1->key[side].port[io];
usr.bin/systat/pftop.c
469
af = s1->key[side].af;
usr.bin/systat/pftop.c
472
if (s2->key[PF_SK_STACK].af != s2->key[PF_SK_WIRE].af) {
usr.bin/systat/pftop.c
481
ab = &s2->key[PF_SK_STACK].addr[ii];
usr.bin/systat/pftop.c
482
pb = s2->key[PF_SK_STACK].port[ii];
usr.bin/systat/pftop.c
483
af = s1->key[PF_SK_STACK].af;
usr.bin/systat/pftop.c
485
ab = &s2->key[side].addr[io];
usr.bin/systat/pftop.c
486
pb = s2->key[side].port[io];
usr.bin/systat/pftop.c
487
af = s1->key[side].af;
usr.bin/systat/pftop.c
509
if (s1->key[side].af > s2->key[side].af)
usr.bin/systat/pftop.c
511
if (s1->key[side].af < s2->key[side].af)
usr.bin/systat/pftop.c
521
if (s1->key[PF_SK_STACK].af != s1->key[PF_SK_WIRE].af) {
usr.bin/systat/pftop.c
530
aa = &s1->key[PF_SK_STACK].addr[ii];
usr.bin/systat/pftop.c
531
pa = s1->key[PF_SK_STACK].port[ii];
usr.bin/systat/pftop.c
532
af = s1->key[PF_SK_STACK].af;
usr.bin/systat/pftop.c
534
aa = &s1->key[side].addr[io];
usr.bin/systat/pftop.c
535
pa = s1->key[side].port[io];
usr.bin/systat/pftop.c
536
af = s1->key[side].af;
usr.bin/systat/pftop.c
539
if (s2->key[PF_SK_STACK].af != s2->key[PF_SK_WIRE].af) {
usr.bin/systat/pftop.c
548
ab = &s2->key[PF_SK_STACK].addr[ii];
usr.bin/systat/pftop.c
549
pb = s2->key[PF_SK_STACK].port[ii];
usr.bin/systat/pftop.c
550
af = s1->key[PF_SK_STACK].af;
usr.bin/systat/pftop.c
552
ab = &s2->key[side].addr[io];
usr.bin/systat/pftop.c
553
pb = s2->key[side].port[io];
usr.bin/systat/pftop.c
554
af = s1->key[side].af;
usr.bin/systat/pftop.c
835
afto = s->key[PF_SK_STACK].af == s->key[PF_SK_WIRE].af ? 0 : 1;
usr.bin/systat/pftop.c
855
&s->key[afto ? PF_SK_STACK : PF_SK_WIRE],
usr.bin/systat/pftop.c
856
&s->key[PF_SK_STACK], 1);
usr.bin/systat/pftop.c
858
&s->key[afto ? PF_SK_STACK : PF_SK_WIRE],
usr.bin/systat/pftop.c
859
&s->key[afto ? PF_SK_WIRE : PF_SK_STACK], 0);
usr.bin/systat/pftop.c
861
print_fld_host2(FLD_SRC, &s->key[PF_SK_STACK],
usr.bin/systat/pftop.c
862
&s->key[PF_SK_WIRE], 0);
usr.bin/systat/pftop.c
863
print_fld_host2(FLD_DEST, &s->key[PF_SK_STACK],
usr.bin/systat/pftop.c
864
&s->key[PF_SK_WIRE], 1);
usr.bin/tcpbench/tcpbench.c
1120
uint8_t *crt = NULL, *key = NULL;
usr.bin/tcpbench/tcpbench.c
1266
if ((key = tls_load_file(keyfile, &key_size, NULL)) == NULL)
usr.bin/tcpbench/tcpbench.c
1357
if (tls_config_set_key_mem(ptb->tls_cfg, key,
usr.bin/tmux/cmd-bind-key.c
105
key_bindings_add(tablename, key, note, repeat, pr->cmdlist);
usr.bin/tmux/cmd-bind-key.c
58
key_code key;
usr.bin/tmux/cmd-bind-key.c
65
key = key_string_lookup_string(args_string(args, 0));
usr.bin/tmux/cmd-bind-key.c
66
if (key == KEYC_NONE || key == KEYC_UNKNOWN) {
usr.bin/tmux/cmd-bind-key.c
80
key_bindings_add(tablename, key, note, repeat, NULL);
usr.bin/tmux/cmd-bind-key.c
86
key_bindings_add(tablename, key, note, repeat, value->cmdlist);
usr.bin/tmux/cmd-display-menu.c
293
const char *key, *name, *value;
usr.bin/tmux/cmd-display-menu.c
339
key = args_string(args, i++);
usr.bin/tmux/cmd-display-menu.c
342
menu_item.key = key_string_lookup_string(key);
usr.bin/tmux/cmd-display-message.c
53
cmd_display_message_each(const char *key, const char *value, void *arg)
usr.bin/tmux/cmd-display-message.c
57
cmdq_print(item, "%s=%s", key, value);
usr.bin/tmux/cmd-display-panes.c
233
key_code key;
usr.bin/tmux/cmd-display-panes.c
235
if (event->key >= '0' && event->key <= '9')
usr.bin/tmux/cmd-display-panes.c
236
index = event->key - '0';
usr.bin/tmux/cmd-display-panes.c
237
else if ((event->key & KEYC_MASK_MODIFIERS) == 0) {
usr.bin/tmux/cmd-display-panes.c
238
key = (event->key & KEYC_MASK_KEY);
usr.bin/tmux/cmd-display-panes.c
239
if (key >= 'a' && key <= 'z')
usr.bin/tmux/cmd-display-panes.c
240
index = 10 + (key - 'a');
usr.bin/tmux/cmd-list-keys.c
125
key_code key;
usr.bin/tmux/cmd-list-keys.c
129
key = l[i]->key & (KEYC_MASK_KEY|KEYC_MASK_MODIFIERS);
usr.bin/tmux/cmd-list-keys.c
130
if (filter_key && only != key)
usr.bin/tmux/cmd-list-keys.c
158
format_add(ft, "key_string", "%s", key_string_lookup_key(bd->key, 0));
usr.bin/tmux/cmd-list-keys.c
75
width = utf8_cstrwidth(key_string_lookup_key(l[i]->key, 0));
usr.bin/tmux/cmd-queue.c
221
state->event.key = KEYC_NONE;
usr.bin/tmux/cmd-queue.c
261
cmdq_add_format(struct cmdq_state *state, const char *key, const char *fmt, ...)
usr.bin/tmux/cmd-queue.c
272
format_add(state->formats, key, "%s", value);
usr.bin/tmux/cmd-queue.c
566
const char *key;
usr.bin/tmux/cmd-queue.c
582
if (c->session != NULL && state->event.key != KEYC_NONE) {
usr.bin/tmux/cmd-queue.c
583
key = key_string_lookup_key(state->event.key, 0);
usr.bin/tmux/cmd-queue.c
585
key, tmp);
usr.bin/tmux/cmd-send-keys.c
111
key_code key;
usr.bin/tmux/cmd-send-keys.c
126
key = key_string_lookup_string(s);
usr.bin/tmux/cmd-send-keys.c
127
if (key != KEYC_NONE && key != KEYC_UNKNOWN) {
usr.bin/tmux/cmd-send-keys.c
129
key);
usr.bin/tmux/cmd-send-keys.c
139
key = loop->data[0];
usr.bin/tmux/cmd-send-keys.c
143
key = uc;
usr.bin/tmux/cmd-send-keys.c
146
key);
usr.bin/tmux/cmd-send-keys.c
166
key_code key;
usr.bin/tmux/cmd-send-keys.c
210
window_pane_key(wp, tc, s, wl, m->key, m);
usr.bin/tmux/cmd-send-keys.c
216
key = options_get_number(s->options, "prefix2");
usr.bin/tmux/cmd-send-keys.c
218
key = options_get_number(s->options, "prefix");
usr.bin/tmux/cmd-send-keys.c
219
cmd_send_keys_inject_key(item, item, args, key);
usr.bin/tmux/cmd-send-keys.c
233
cmd_send_keys_inject_key(item, NULL, args, event->key);
usr.bin/tmux/cmd-send-keys.c
62
struct args *args, key_code key)
usr.bin/tmux/cmd-send-keys.c
78
event->key = key|KEYC_SENT;
usr.bin/tmux/cmd-send-keys.c
89
if (window_pane_key(wp, tc, s, wl, key, NULL) != 0)
usr.bin/tmux/cmd-send-keys.c
95
bd = key_bindings_get(table, key & ~KEYC_MASK_FLAGS);
usr.bin/tmux/cmd-unbind-key.c
102
key_bindings_remove(tablename, key);
usr.bin/tmux/cmd-unbind-key.c
46
key_code key;
usr.bin/tmux/cmd-unbind-key.c
82
key = key_string_lookup_string(keystr);
usr.bin/tmux/cmd-unbind-key.c
83
if (key == KEYC_NONE || key == KEYC_UNKNOWN) {
usr.bin/tmux/format.c
126
char *key;
usr.bin/tmux/format.c
187
return (strcmp(fe1->key, fe2->key));
usr.bin/tmux/format.c
3107
const char *key;
usr.bin/tmux/format.c
3700
const char *key = key0;
usr.bin/tmux/format.c
3703
return (strcmp(key, entry->key));
usr.bin/tmux/format.c
3708
format_table_get(const char *key)
usr.bin/tmux/format.c
3710
return (bsearch(key, format_table, nitems(format_table),
usr.bin/tmux/format.c
3722
format_add(ft, fe->key, "%s", fe->value);
usr.bin/tmux/format.c
3777
free(fe->key);
usr.bin/tmux/format.c
3788
format_log_debug_cb(const char *key, const char *value, void *arg)
usr.bin/tmux/format.c
3792
log_debug("%s: %s=%s", prefix, key, value);
usr.bin/tmux/format.c
3823
cb(fte->key, s, arg);
usr.bin/tmux/format.c
3825
cb(fte->key, value, arg);
usr.bin/tmux/format.c
3832
cb(fe->key, s, arg);
usr.bin/tmux/format.c
3839
cb(fe->key, fe->value, arg);
usr.bin/tmux/format.c
3846
format_add(struct format_tree *ft, const char *key, const char *fmt, ...)
usr.bin/tmux/format.c
3853
fe->key = xstrdup(key);
usr.bin/tmux/format.c
3857
free(fe->key);
usr.bin/tmux/format.c
3873
format_add_tv(struct format_tree *ft, const char *key, struct timeval *tv)
usr.bin/tmux/format.c
3878
fe->key = xstrdup(key);
usr.bin/tmux/format.c
3882
free(fe->key);
usr.bin/tmux/format.c
3896
format_add_cb(struct format_tree *ft, const char *key, format_cb cb)
usr.bin/tmux/format.c
3902
fe->key = xstrdup(key);
usr.bin/tmux/format.c
3906
free(fe->key);
usr.bin/tmux/format.c
3998
format_find(struct format_tree *ft, const char *key, int modifiers,
usr.bin/tmux/format.c
4012
o = options_parse_get(global_options, key, &idx, 0);
usr.bin/tmux/format.c
4014
o = options_parse_get(ft->wp->options, key, &idx, 0);
usr.bin/tmux/format.c
4016
o = options_parse_get(ft->w->options, key, &idx, 0);
usr.bin/tmux/format.c
4018
o = options_parse_get(global_w_options, key, &idx, 0);
usr.bin/tmux/format.c
4020
o = options_parse_get(ft->s->options, key, &idx, 0);
usr.bin/tmux/format.c
4022
o = options_parse_get(global_s_options, key, &idx, 0);
usr.bin/tmux/format.c
4028
fte = format_table_get(key);
usr.bin/tmux/format.c
4037
fe_find.key = (char *)key;
usr.bin/tmux/format.c
4056
envent = environ_find(ft->s->environ, key);
usr.bin/tmux/format.c
4058
envent = environ_find(global_environ, key);
usr.bin/tmux/format.c
4599
char *key, *prefixed, *oval;
usr.bin/tmux/format.c
4601
xasprintf(&key, "%s_window_index", prefix);
usr.bin/tmux/format.c
4602
format_add(nft, key, "%u", wl->idx);
usr.bin/tmux/format.c
4603
free(key);
usr.bin/tmux/format.c
4605
xasprintf(&key, "%s_window_active", prefix);
usr.bin/tmux/format.c
4606
format_add(nft, key, "%d", wl == s->curw);
usr.bin/tmux/format.c
4607
free(key);
usr.bin/tmux/format.c
4938
format_replace(struct format_expand_state *es, const char *key, size_t keylen,
usr.bin/tmux/format.c
4963
copy = copy0 = xstrndup(key, keylen);
usr.bin/tmux/input-keys.c
101
{ .key = KEYC_F12,
usr.bin/tmux/input-keys.c
104
{ .key = KEYC_IC,
usr.bin/tmux/input-keys.c
107
{ .key = KEYC_DC,
usr.bin/tmux/input-keys.c
110
{ .key = KEYC_HOME,
usr.bin/tmux/input-keys.c
113
{ .key = KEYC_END,
usr.bin/tmux/input-keys.c
116
{ .key = KEYC_NPAGE,
usr.bin/tmux/input-keys.c
119
{ .key = KEYC_PPAGE,
usr.bin/tmux/input-keys.c
122
{ .key = KEYC_BTAB,
usr.bin/tmux/input-keys.c
127
{ .key = KEYC_UP|KEYC_CURSOR,
usr.bin/tmux/input-keys.c
130
{ .key = KEYC_DOWN|KEYC_CURSOR,
usr.bin/tmux/input-keys.c
133
{ .key = KEYC_RIGHT|KEYC_CURSOR,
usr.bin/tmux/input-keys.c
136
{ .key = KEYC_LEFT|KEYC_CURSOR,
usr.bin/tmux/input-keys.c
139
{ .key = KEYC_UP,
usr.bin/tmux/input-keys.c
142
{ .key = KEYC_DOWN,
usr.bin/tmux/input-keys.c
145
{ .key = KEYC_RIGHT,
usr.bin/tmux/input-keys.c
148
{ .key = KEYC_LEFT,
usr.bin/tmux/input-keys.c
153
{ .key = KEYC_KP_SLASH|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
156
{ .key = KEYC_KP_STAR|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
159
{ .key = KEYC_KP_MINUS|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
162
{ .key = KEYC_KP_SEVEN|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
165
{ .key = KEYC_KP_EIGHT|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
168
{ .key = KEYC_KP_NINE|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
171
{ .key = KEYC_KP_PLUS|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
174
{ .key = KEYC_KP_FOUR|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
177
{ .key = KEYC_KP_FIVE|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
180
{ .key = KEYC_KP_SIX|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
183
{ .key = KEYC_KP_ONE|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
186
{ .key = KEYC_KP_TWO|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
189
{ .key = KEYC_KP_THREE|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
192
{ .key = KEYC_KP_ENTER|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
195
{ .key = KEYC_KP_ZERO|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
198
{ .key = KEYC_KP_PERIOD|KEYC_KEYPAD,
usr.bin/tmux/input-keys.c
201
{ .key = KEYC_KP_SLASH,
usr.bin/tmux/input-keys.c
204
{ .key = KEYC_KP_STAR,
usr.bin/tmux/input-keys.c
207
{ .key = KEYC_KP_MINUS,
usr.bin/tmux/input-keys.c
210
{ .key = KEYC_KP_SEVEN,
usr.bin/tmux/input-keys.c
213
{ .key = KEYC_KP_EIGHT,
usr.bin/tmux/input-keys.c
216
{ .key = KEYC_KP_NINE,
usr.bin/tmux/input-keys.c
219
{ .key = KEYC_KP_PLUS,
usr.bin/tmux/input-keys.c
222
{ .key = KEYC_KP_FOUR,
usr.bin/tmux/input-keys.c
225
{ .key = KEYC_KP_FIVE,
usr.bin/tmux/input-keys.c
228
{ .key = KEYC_KP_SIX,
usr.bin/tmux/input-keys.c
231
{ .key = KEYC_KP_ONE,
usr.bin/tmux/input-keys.c
234
{ .key = KEYC_KP_TWO,
usr.bin/tmux/input-keys.c
237
{ .key = KEYC_KP_THREE,
usr.bin/tmux/input-keys.c
240
{ .key = KEYC_KP_ENTER,
usr.bin/tmux/input-keys.c
243
{ .key = KEYC_KP_ZERO,
usr.bin/tmux/input-keys.c
246
{ .key = KEYC_KP_PERIOD,
usr.bin/tmux/input-keys.c
251
{ .key = KEYC_F1|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
254
{ .key = KEYC_F2|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
257
{ .key = KEYC_F3|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
260
{ .key = KEYC_F4|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
263
{ .key = KEYC_F5|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
266
{ .key = KEYC_F6|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
269
{ .key = KEYC_F7|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
272
{ .key = KEYC_F8|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
275
{ .key = KEYC_F9|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
278
{ .key = KEYC_F10|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
281
{ .key = KEYC_F11|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
284
{ .key = KEYC_F12|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
287
{ .key = KEYC_UP|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
290
{ .key = KEYC_DOWN|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
293
{ .key = KEYC_RIGHT|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
296
{ .key = KEYC_LEFT|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
299
{ .key = KEYC_HOME|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
302
{ .key = KEYC_END|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
305
{ .key = KEYC_PPAGE|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
308
{ .key = KEYC_NPAGE|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
311
{ .key = KEYC_IC|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
314
{ .key = KEYC_DC|KEYC_BUILD_MODIFIERS,
usr.bin/tmux/input-keys.c
334
if (ike1->key < ike2->key)
usr.bin/tmux/input-keys.c
336
if (ike1->key > ike2->key)
usr.bin/tmux/input-keys.c
343
input_key_get(key_code key)
usr.bin/tmux/input-keys.c
345
struct input_key_entry entry = { .key = key };
usr.bin/tmux/input-keys.c
370
key_code key;
usr.bin/tmux/input-keys.c
374
if (~ike->key & KEYC_BUILD_MODIFIERS) {
usr.bin/tmux/input-keys.c
38
key_code key;
usr.bin/tmux/input-keys.c
380
key = (ike->key & ~KEYC_BUILD_MODIFIERS);
usr.bin/tmux/input-keys.c
385
new->key = key|input_key_modifiers[j];
usr.bin/tmux/input-keys.c
392
log_debug("%s: 0x%llx (%s) is %s", __func__, ike->key,
usr.bin/tmux/input-keys.c
393
key_string_lookup_key(ike->key, 1), ike->data);
usr.bin/tmux/input-keys.c
399
input_key_pane(struct window_pane *wp, key_code key, struct mouse_event *m)
usr.bin/tmux/input-keys.c
402
log_debug("writing key 0x%llx (%s) to %%%u", key,
usr.bin/tmux/input-keys.c
403
key_string_lookup_key(key, 1), wp->id);
usr.bin/tmux/input-keys.c
406
if (KEYC_IS_MOUSE(key)) {
usr.bin/tmux/input-keys.c
411
return (input_key(wp->screen, wp->event, key));
usr.bin/tmux/input-keys.c
427
input_key_extended(struct bufferevent *bev, key_code key)
usr.bin/tmux/input-keys.c
433
switch (key & KEYC_MASK_MODIFIERS) {
usr.bin/tmux/input-keys.c
459
if (KEYC_IS_UNICODE(key)) {
usr.bin/tmux/input-keys.c
460
utf8_to_data(key & KEYC_MASK_KEY, &ud);
usr.bin/tmux/input-keys.c
462
key = wc;
usr.bin/tmux/input-keys.c
466
key &= KEYC_MASK_KEY;
usr.bin/tmux/input-keys.c
469
xsnprintf(tmp, sizeof tmp, "\033[27;%c;%llu~", modifier, key);
usr.bin/tmux/input-keys.c
471
xsnprintf(tmp, sizeof tmp, "\033[%llu;%cu", key, modifier);
usr.bin/tmux/input-keys.c
483
input_key_vt10x(struct bufferevent *bev, key_code key)
usr.bin/tmux/input-keys.c
493
log_debug("%s: key in %llx", __func__, key);
usr.bin/tmux/input-keys.c
495
if (key & KEYC_META)
usr.bin/tmux/input-keys.c
502
if (KEYC_IS_UNICODE(key)) {
usr.bin/tmux/input-keys.c
503
utf8_to_data(key, &ud);
usr.bin/tmux/input-keys.c
512
onlykey = key & KEYC_MASK_KEY;
usr.bin/tmux/input-keys.c
514
key &= ~KEYC_CTRL;
usr.bin/tmux/input-keys.c
525
if (key & KEYC_CTRL) {
usr.bin/tmux/input-keys.c
528
key = standard_map[1][p - standard_map[0]];
usr.bin/tmux/input-keys.c
530
key = onlykey - '\030';
usr.bin/tmux/input-keys.c
532
key = onlykey & 0x1f;
usr.bin/tmux/input-keys.c
537
log_debug("%s: key out %llx", __func__, key);
usr.bin/tmux/input-keys.c
539
ud.data[0] = key & 0x7f;
usr.bin/tmux/input-keys.c
54
{ .key = KEYC_PASTE_START,
usr.bin/tmux/input-keys.c
546
input_key_mode1(struct bufferevent *bev, key_code key)
usr.bin/tmux/input-keys.c
550
log_debug("%s: key in %llx", __func__, key);
usr.bin/tmux/input-keys.c
553
if ((key & (KEYC_CTRL | KEYC_META)) == KEYC_META)
usr.bin/tmux/input-keys.c
554
return (input_key_vt10x(bev, key));
usr.bin/tmux/input-keys.c
560
onlykey = key & KEYC_MASK_KEY;
usr.bin/tmux/input-keys.c
561
if ((key & KEYC_CTRL) &&
usr.bin/tmux/input-keys.c
568
return (input_key_vt10x(bev, key));
usr.bin/tmux/input-keys.c
57
{ .key = KEYC_PASTE_START|KEYC_IMPLIED_META,
usr.bin/tmux/input-keys.c
575
input_key(struct screen *s, struct bufferevent *bev, key_code key)
usr.bin/tmux/input-keys.c
582
if (KEYC_IS_MOUSE(key))
usr.bin/tmux/input-keys.c
586
if (key & KEYC_LITERAL) {
usr.bin/tmux/input-keys.c
587
ud.data[0] = (u_char)key;
usr.bin/tmux/input-keys.c
593
if ((key & KEYC_MASK_KEY) == KEYC_BSPACE) {
usr.bin/tmux/input-keys.c
596
key, newkey);
usr.bin/tmux/input-keys.c
597
if ((key & KEYC_MASK_MODIFIERS) == 0) {
usr.bin/tmux/input-keys.c
60
{ .key = KEYC_PASTE_END,
usr.bin/tmux/input-keys.c
614
key = newkey|(key & (KEYC_MASK_FLAGS|KEYC_MASK_MODIFIERS));
usr.bin/tmux/input-keys.c
618
if ((key & KEYC_MASK_KEY) == KEYC_BTAB) {
usr.bin/tmux/input-keys.c
621
key = '\011' | (key & ~KEYC_MASK_KEY) | KEYC_SHIFT;
usr.bin/tmux/input-keys.c
624
key &= ~KEYC_MASK_MODIFIERS;
usr.bin/tmux/input-keys.c
63
{ .key = KEYC_PASTE_END|KEYC_IMPLIED_META,
usr.bin/tmux/input-keys.c
633
if (!(key & ~KEYC_MASK_KEY)) {
usr.bin/tmux/input-keys.c
634
if (key == C0_HT ||
usr.bin/tmux/input-keys.c
635
key == C0_CR ||
usr.bin/tmux/input-keys.c
636
key == C0_ESC ||
usr.bin/tmux/input-keys.c
637
(key >= 0x20 && key <= 0x7f)) {
usr.bin/tmux/input-keys.c
638
ud.data[0] = key;
usr.bin/tmux/input-keys.c
642
if (KEYC_IS_UNICODE(key)) {
usr.bin/tmux/input-keys.c
643
utf8_to_data(key, &ud);
usr.bin/tmux/input-keys.c
654
key &= ~KEYC_KEYPAD;
usr.bin/tmux/input-keys.c
656
key &= ~KEYC_CURSOR;
usr.bin/tmux/input-keys.c
658
ike = input_key_get(key);
usr.bin/tmux/input-keys.c
659
if (ike == NULL && (key & KEYC_META) && (~key & KEYC_IMPLIED_META))
usr.bin/tmux/input-keys.c
660
ike = input_key_get(key & ~KEYC_META);
usr.bin/tmux/input-keys.c
661
if (ike == NULL && (key & KEYC_CURSOR))
usr.bin/tmux/input-keys.c
662
ike = input_key_get(key & ~KEYC_CURSOR);
usr.bin/tmux/input-keys.c
663
if (ike == NULL && (key & KEYC_KEYPAD))
usr.bin/tmux/input-keys.c
664
ike = input_key_get(key & ~KEYC_KEYPAD);
usr.bin/tmux/input-keys.c
666
log_debug("%s: found key 0x%llx: \"%s\"", __func__, key,
usr.bin/tmux/input-keys.c
668
if (KEYC_IS_PASTE(key) && (~s->mode & MODE_BRACKETPASTE))
usr.bin/tmux/input-keys.c
670
if ((key & KEYC_META) && (~key & KEYC_IMPLIED_META))
usr.bin/tmux/input-keys.c
677
if (KEYC_IS_USER(key) || KEYC_IS_SPECIAL(key) || KEYC_IS_MOUSE(key)) {
usr.bin/tmux/input-keys.c
678
log_debug("%s: ignoring key 0x%llx", __func__, key);
usr.bin/tmux/input-keys.c
68
{ .key = KEYC_F1,
usr.bin/tmux/input-keys.c
697
return (input_key_extended(bev, key));
usr.bin/tmux/input-keys.c
703
if (input_key_mode1(bev, key) == -1)
usr.bin/tmux/input-keys.c
704
return (input_key_extended(bev, key));
usr.bin/tmux/input-keys.c
708
return (input_key_vt10x(bev, key));
usr.bin/tmux/input-keys.c
71
{ .key = KEYC_F2,
usr.bin/tmux/input-keys.c
74
{ .key = KEYC_F3,
usr.bin/tmux/input-keys.c
77
{ .key = KEYC_F4,
usr.bin/tmux/input-keys.c
80
{ .key = KEYC_F5,
usr.bin/tmux/input-keys.c
83
{ .key = KEYC_F6,
usr.bin/tmux/input-keys.c
86
{ .key = KEYC_F7,
usr.bin/tmux/input-keys.c
89
{ .key = KEYC_F8,
usr.bin/tmux/input-keys.c
92
{ .key = KEYC_F9,
usr.bin/tmux/input-keys.c
95
{ .key = KEYC_F10,
usr.bin/tmux/input-keys.c
98
{ .key = KEYC_F11,
usr.bin/tmux/input.c
769
input_table_compare(const void *key, const void *value)
usr.bin/tmux/input.c
771
const struct input_ctx *ictx = key;
usr.bin/tmux/key-bindings.c
160
key_bindings_get(struct key_table *table, key_code key)
usr.bin/tmux/key-bindings.c
164
bd.key = key;
usr.bin/tmux/key-bindings.c
169
key_bindings_get_default(struct key_table *table, key_code key)
usr.bin/tmux/key-bindings.c
173
bd.key = key;
usr.bin/tmux/key-bindings.c
190
key_bindings_add(const char *name, key_code key, const char *note, int repeat,
usr.bin/tmux/key-bindings.c
199
bd = key_bindings_get(table, key & ~KEYC_MASK_FLAGS);
usr.bin/tmux/key-bindings.c
217
bd->key = (key & ~KEYC_MASK_FLAGS);
usr.bin/tmux/key-bindings.c
228
log_debug("%s: %#llx %s = %s", __func__, bd->key,
usr.bin/tmux/key-bindings.c
229
key_string_lookup_key(bd->key, 1), s);
usr.bin/tmux/key-bindings.c
234
key_bindings_remove(const char *name, key_code key)
usr.bin/tmux/key-bindings.c
243
bd = key_bindings_get(table, key & ~KEYC_MASK_FLAGS);
usr.bin/tmux/key-bindings.c
247
log_debug("%s: %#llx %s", __func__, bd->key,
usr.bin/tmux/key-bindings.c
248
key_string_lookup_key(bd->key, 1));
usr.bin/tmux/key-bindings.c
261
key_bindings_reset(const char *name, key_code key)
usr.bin/tmux/key-bindings.c
270
bd = key_bindings_get(table, key & ~KEYC_MASK_FLAGS);
usr.bin/tmux/key-bindings.c
274
dd = key_bindings_get_default(table, bd->key);
usr.bin/tmux/key-bindings.c
276
key_bindings_remove(name, bd->key);
usr.bin/tmux/key-bindings.c
323
key_bindings_reset(name, bd->key);
usr.bin/tmux/key-bindings.c
335
new_bd->key = bd->key;
usr.bin/tmux/key-bindings.c
89
if (bd1->key < bd2->key)
usr.bin/tmux/key-bindings.c
91
if (bd1->key > bd2->key)
usr.bin/tmux/key-string.c
202
return (key_string_table[i].key);
usr.bin/tmux/key-string.c
245
key_code key, modifiers = 0;
usr.bin/tmux/key-string.c
297
key = (u_char)string[0];
usr.bin/tmux/key-string.c
298
if (key < 32)
usr.bin/tmux/key-string.c
315
key = key_string_search_table(string);
usr.bin/tmux/key-string.c
316
if (key == KEYC_UNKNOWN)
usr.bin/tmux/key-string.c
319
key &= ~KEYC_IMPLIED_META;
usr.bin/tmux/key-string.c
322
return (key|modifiers);
usr.bin/tmux/key-string.c
327
key_string_lookup_key(key_code key, int with_flags)
usr.bin/tmux/key-string.c
329
key_code saved = key;
usr.bin/tmux/key-string.c
33
key_code key;
usr.bin/tmux/key-string.c
340
if (key & KEYC_LITERAL) {
usr.bin/tmux/key-string.c
341
snprintf(out, sizeof out, "%c", (int)(key & 0xff));
usr.bin/tmux/key-string.c
346
if (key & KEYC_CTRL)
usr.bin/tmux/key-string.c
348
if (key & KEYC_META)
usr.bin/tmux/key-string.c
350
if (key & KEYC_SHIFT)
usr.bin/tmux/key-string.c
352
key &= KEYC_MASK_KEY;
usr.bin/tmux/key-string.c
355
if (key == KEYC_NONE) {
usr.bin/tmux/key-string.c
361
if (key == KEYC_UNKNOWN) {
usr.bin/tmux/key-string.c
365
if (key == KEYC_ANY) {
usr.bin/tmux/key-string.c
369
if (key == KEYC_FOCUS_IN) {
usr.bin/tmux/key-string.c
373
if (key == KEYC_FOCUS_OUT) {
usr.bin/tmux/key-string.c
377
if (key == KEYC_PASTE_START) {
usr.bin/tmux/key-string.c
381
if (key == KEYC_PASTE_END) {
usr.bin/tmux/key-string.c
385
if (key == KEYC_REPORT_DARK_THEME) {
usr.bin/tmux/key-string.c
389
if (key == KEYC_REPORT_LIGHT_THEME) {
usr.bin/tmux/key-string.c
393
if (key == KEYC_MOUSE) {
usr.bin/tmux/key-string.c
397
if (key == KEYC_DRAGGING) {
usr.bin/tmux/key-string.c
401
if (key == KEYC_MOUSEMOVE_PANE) {
usr.bin/tmux/key-string.c
405
if (key == KEYC_MOUSEMOVE_STATUS) {
usr.bin/tmux/key-string.c
409
if (key == KEYC_MOUSEMOVE_STATUS_LEFT) {
usr.bin/tmux/key-string.c
413
if (key == KEYC_MOUSEMOVE_STATUS_RIGHT) {
usr.bin/tmux/key-string.c
417
if (key == KEYC_MOUSEMOVE_BORDER) {
usr.bin/tmux/key-string.c
421
if (KEYC_IS_USER(key)) {
usr.bin/tmux/key-string.c
422
snprintf(tmp, sizeof tmp, "User%u", (u_int)(key - KEYC_USER));
usr.bin/tmux/key-string.c
429
if (key == (key_string_table[i].key & KEYC_MASK_KEY))
usr.bin/tmux/key-string.c
438
if (KEYC_IS_UNICODE(key)) {
usr.bin/tmux/key-string.c
439
utf8_to_data(key, &ud);
usr.bin/tmux/key-string.c
447
if (key > 255) {
usr.bin/tmux/key-string.c
453
if (key > 32 && key <= 126) {
usr.bin/tmux/key-string.c
454
tmp[0] = key;
usr.bin/tmux/key-string.c
456
} else if (key == 127)
usr.bin/tmux/key-string.c
458
else if (key >= 128)
usr.bin/tmux/key-string.c
459
xsnprintf(tmp, sizeof tmp, "\\%llo", key);
usr.bin/tmux/menu.c
100
if (*s != '-' && item->key != KEYC_UNKNOWN && item->key != KEYC_NONE) {
usr.bin/tmux/menu.c
101
key = key_string_lookup_key(item->key, 0);
usr.bin/tmux/menu.c
102
keylen = strlen(key) + 3; /* 3 = space and two brackets */
usr.bin/tmux/menu.c
112
key = NULL;
usr.bin/tmux/menu.c
120
if (key != NULL) {
usr.bin/tmux/menu.c
122
trimmed, suffix, key);
usr.bin/tmux/menu.c
139
new_item->key = item->key;
usr.bin/tmux/menu.c
325
if (KEYC_IS_MOUSE(event->key)) {
usr.bin/tmux/menu.c
366
if ((event->key & ~KEYC_MASK_FLAGS) == menu->items[i].key) {
usr.bin/tmux/menu.c
371
switch (event->key & ~KEYC_MASK_FLAGS) {
usr.bin/tmux/menu.c
491
md->cb(md->menu, md->choice, item->key, md->data);
usr.bin/tmux/menu.c
68
const char *key = NULL, *cmd, *suffix = "";
usr.bin/tmux/mode-tree.c
1095
key_code key, void *data)
usr.bin/tmux/mode-tree.c
1100
if (mtd->dead || key == KEYC_NONE)
usr.bin/tmux/mode-tree.c
1106
mtd->menucb(mtd->modedata, mtm->c, key);
usr.bin/tmux/mode-tree.c
1211
mode_tree_key(struct mode_tree_data *mtd, struct client *c, key_code *key,
usr.bin/tmux/mode-tree.c
1219
if (KEYC_IS_MOUSE(*key) && m != NULL) {
usr.bin/tmux/mode-tree.c
1221
*key = KEYC_NONE;
usr.bin/tmux/mode-tree.c
1230
if (*key == KEYC_MOUSEDOWN3_PANE)
usr.bin/tmux/mode-tree.c
1233
*key = KEYC_NONE;
usr.bin/tmux/mode-tree.c
1237
if (*key == KEYC_MOUSEDOWN1_PANE ||
usr.bin/tmux/mode-tree.c
1238
*key == KEYC_MOUSEDOWN3_PANE ||
usr.bin/tmux/mode-tree.c
1239
*key == KEYC_DOUBLECLICK1_PANE)
usr.bin/tmux/mode-tree.c
1241
if (*key == KEYC_DOUBLECLICK1_PANE)
usr.bin/tmux/mode-tree.c
1242
*key = '\r';
usr.bin/tmux/mode-tree.c
1244
if (*key == KEYC_MOUSEDOWN3_PANE)
usr.bin/tmux/mode-tree.c
1246
*key = KEYC_NONE;
usr.bin/tmux/mode-tree.c
1249
if (*key == KEYC_MOUSEDOWN3_PANE)
usr.bin/tmux/mode-tree.c
1251
*key = KEYC_NONE;
usr.bin/tmux/mode-tree.c
1261
if (*key == mtd->line_list[i].item->key) {
usr.bin/tmux/mode-tree.c
1268
*key = KEYC_NONE;
usr.bin/tmux/mode-tree.c
1272
*key = '\r';
usr.bin/tmux/mode-tree.c
1276
switch (*key) {
usr.bin/tmux/mode-tree.c
262
mti->key = mtd->keycb(mtd->modedata, mti->itemdata,
usr.bin/tmux/mode-tree.c
264
if (mti->key == KEYC_UNKNOWN)
usr.bin/tmux/mode-tree.c
265
mti->key = KEYC_NONE;
usr.bin/tmux/mode-tree.c
267
mti->key = '0' + mti->line;
usr.bin/tmux/mode-tree.c
269
mti->key = KEYC_META|('a' + mti->line - 10);
usr.bin/tmux/mode-tree.c
271
mti->key = KEYC_NONE;
usr.bin/tmux/mode-tree.c
272
if (mti->key != KEYC_NONE) {
usr.bin/tmux/mode-tree.c
273
mti->keystr = xstrdup(key_string_lookup_key(mti->key,
usr.bin/tmux/mode-tree.c
462
struct client *c, key_code key, int current)
usr.bin/tmux/mode-tree.c
473
cb(mtd->modedata, mti->itemdata, c, key);
usr.bin/tmux/mode-tree.c
478
cb(mtd->modedata, mti->itemdata, c, key);
usr.bin/tmux/mode-tree.c
740
char *text, *start, *key;
usr.bin/tmux/mode-tree.c
761
if (mti->key == KEYC_NONE)
usr.bin/tmux/mode-tree.c
788
if (mti->key != KEYC_NONE)
usr.bin/tmux/mode-tree.c
789
xasprintf(&key, "(%s)%*s", mti->keystr, pad, "");
usr.bin/tmux/mode-tree.c
791
key = xstrdup("");
usr.bin/tmux/mode-tree.c
826
xasprintf(&text, "%-*s%s%*s%s%s", keylen, key, start,
usr.bin/tmux/mode-tree.c
855
free(key);
usr.bin/tmux/mode-tree.c
93
key_code key;
usr.bin/tmux/options.c
1105
key_code key;
usr.bin/tmux/options.c
1146
key = key_string_lookup_string(value);
usr.bin/tmux/options.c
1147
if (key == KEYC_UNKNOWN) {
usr.bin/tmux/options.c
1151
options_set_number(oo, name, key);
usr.bin/tmux/popup.c
452
key_code key, void *data)
usr.bin/tmux/popup.c
464
switch (key) {
usr.bin/tmux/popup.c
576
if (KEYC_IS_MOUSE(event->key)) {
usr.bin/tmux/popup.c
618
(event->key == '\033' || event->key == ('c'|KEYC_CTRL)))
usr.bin/tmux/popup.c
621
!KEYC_IS_MOUSE(event->key) && !KEYC_IS_PASTE(event->key))
usr.bin/tmux/popup.c
624
if (KEYC_IS_MOUSE(event->key)) {
usr.bin/tmux/popup.c
638
input_key(&pd->s, job_get_event(pd->job), event->key);
usr.bin/tmux/server-client.c
1017
key = KEYC_MAKE_MOUSE_KEY(type, bn, loc);
usr.bin/tmux/server-client.c
1022
key |= KEYC_META;
usr.bin/tmux/server-client.c
1024
key |= KEYC_CTRL;
usr.bin/tmux/server-client.c
1026
key |= KEYC_SHIFT;
usr.bin/tmux/server-client.c
1029
log_debug("mouse key is %s", key_string_lookup_key (key, 1));
usr.bin/tmux/server-client.c
1030
return (key);
usr.bin/tmux/server-client.c
1035
server_client_is_bracket_paste(struct client *c, key_code key)
usr.bin/tmux/server-client.c
1037
if ((key & KEYC_MASK_KEY) == KEYC_PASTE_START) {
usr.bin/tmux/server-client.c
1043
if ((key & KEYC_MASK_KEY) == KEYC_PASTE_END) {
usr.bin/tmux/server-client.c
1112
if ((~c->flags & CLIENT_REPEAT) || bd->key != c->last_key) {
usr.bin/tmux/server-client.c
1129
key_code key = event->key;
usr.bin/tmux/server-client.c
1157
if (key == KEYC_MOUSE || key == KEYC_DOUBLECLICK) {
usr.bin/tmux/server-client.c
1160
key = server_client_check_mouse(c, event);
usr.bin/tmux/server-client.c
1161
if (key == KEYC_UNKNOWN)
usr.bin/tmux/server-client.c
1165
m->key = key;
usr.bin/tmux/server-client.c
1171
if ((key & KEYC_MASK_KEY) == KEYC_DRAGGING) {
usr.bin/tmux/server-client.c
1175
event->key = key;
usr.bin/tmux/server-client.c
1179
if (!KEYC_IS_MOUSE(key) || cmd_find_from_mouse(&fs, m, 0) != 0)
usr.bin/tmux/server-client.c
1184
if (KEYC_IS_MOUSE(key) && !options_get_number(s->options, "mouse"))
usr.bin/tmux/server-client.c
1188
if (server_client_is_bracket_paste (c, key))
usr.bin/tmux/server-client.c
1192
if (!KEYC_IS_MOUSE(key) &&
usr.bin/tmux/server-client.c
1193
key != KEYC_FOCUS_IN &&
usr.bin/tmux/server-client.c
1194
key != KEYC_FOCUS_OUT &&
usr.bin/tmux/server-client.c
1195
(~key & KEYC_SENT) &&
usr.bin/tmux/server-client.c
1219
key0 = (key & (KEYC_MASK_KEY|KEYC_MASK_MODIFIERS));
usr.bin/tmux/server-client.c
1297
c->last_key = bd->key;
usr.bin/tmux/server-client.c
1327
if (key == KEYC_MOUSEMOVE_PANE ||
usr.bin/tmux/server-client.c
1328
key == KEYC_MOUSEMOVE_STATUS ||
usr.bin/tmux/server-client.c
1329
key == KEYC_MOUSEMOVE_STATUS_LEFT ||
usr.bin/tmux/server-client.c
1330
key == KEYC_MOUSEMOVE_STATUS_RIGHT ||
usr.bin/tmux/server-client.c
1331
key == KEYC_MOUSEMOVE_STATUS_DEFAULT ||
usr.bin/tmux/server-client.c
1332
key == KEYC_MOUSEMOVE_BORDER)
usr.bin/tmux/server-client.c
1365
!KEYC_IS_MOUSE(key) &&
usr.bin/tmux/server-client.c
1366
!KEYC_IS_PASTE(key) &&
usr.bin/tmux/server-client.c
1375
window_pane_key(wp, c, s, wl, key, m);
usr.bin/tmux/server-client.c
1382
window_pane_paste(wp, key, event->buf, event->len);
usr.bin/tmux/server-client.c
1383
key = KEYC_NONE;
usr.bin/tmux/server-client.c
1387
if (s != NULL && key != KEYC_FOCUS_OUT)
usr.bin/tmux/server-client.c
1409
if (event->key == KEYC_REPORT_LIGHT_THEME) {
usr.bin/tmux/server-client.c
1413
if (event->key == KEYC_REPORT_DARK_THEME) {
usr.bin/tmux/server-client.c
1440
if (status_prompt_key(c, event->key) == 0)
usr.bin/tmux/server-client.c
1840
event->key = KEYC_DOUBLECLICK;
usr.bin/tmux/server-client.c
709
key_code key;
usr.bin/tmux/server-client.c
719
if (event->key == KEYC_DOUBLECLICK) {
usr.bin/tmux/server-client.c
937
key = KEYC_UNKNOWN;
usr.bin/tmux/server-client.c
964
key = KEYC_MOUSEMOVE_PANE;
usr.bin/tmux/server-client.c
975
key = KEYC_DRAGGING;
usr.bin/tmux/server-client.c
995
if (key == KEYC_UNKNOWN) {
usr.bin/tmux/sort.c
294
result = a->key - b->key;
usr.bin/tmux/sort.c
297
result = (a->key & KEYC_MASK_MODIFIERS) -
usr.bin/tmux/sort.c
298
(b->key & KEYC_MASK_MODIFIERS);
usr.bin/tmux/spawn.c
225
key_code key;
usr.bin/tmux/spawn.c
424
key = options_get_number(global_options, "backspace");
usr.bin/tmux/spawn.c
425
if (key >= 0x7f)
usr.bin/tmux/spawn.c
428
now.c_cc[VERASE] = key;
usr.bin/tmux/status.c
1010
*new_key = key;
usr.bin/tmux/status.c
1019
*new_key = key;
usr.bin/tmux/status.c
1023
switch (key) {
usr.bin/tmux/status.c
1048
switch (key) {
usr.bin/tmux/status.c
1369
status_prompt_key(struct client *c, key_code key)
usr.bin/tmux/status.c
1379
keystring = key_string_lookup_key(key, 0);
usr.bin/tmux/status.c
1387
if (key >= '0' && key <= '9')
usr.bin/tmux/status.c
1395
key &= ~KEYC_MASK_FLAGS;
usr.bin/tmux/status.c
1398
if ((key & KEYC_MASK_KEY) == KEYC_BSPACE)
usr.bin/tmux/status.c
1399
key = 0x7f;
usr.bin/tmux/status.c
1400
else if ((key & KEYC_MASK_KEY) > 0x7f) {
usr.bin/tmux/status.c
1401
if (!KEYC_IS_UNICODE(key))
usr.bin/tmux/status.c
1403
key &= KEYC_MASK_KEY;
usr.bin/tmux/status.c
1405
key &= (key & KEYC_CTRL) ? 0x1f : KEYC_MASK_KEY;
usr.bin/tmux/status.c
1412
switch (status_prompt_translate_key(c, key, &key)) {
usr.bin/tmux/status.c
1423
switch (key) {
usr.bin/tmux/status.c
1648
if (key <= 0x7f) {
usr.bin/tmux/status.c
1649
utf8_set(&tmp, key);
usr.bin/tmux/status.c
1650
if (key <= 0x1f || key == 0x7f)
usr.bin/tmux/status.c
1652
} else if (KEYC_IS_UNICODE(key))
usr.bin/tmux/status.c
1653
utf8_to_data(key, &tmp);
usr.bin/tmux/status.c
1868
status_prompt_menu_callback(__unused struct menu *menu, u_int idx, key_code key,
usr.bin/tmux/status.c
1876
if (key != KEYC_NONE) {
usr.bin/tmux/status.c
1929
item.key = '0' + (i - spm->start);
usr.bin/tmux/status.c
2002
item.key = '0' + size - 1;
usr.bin/tmux/status.c
980
status_prompt_translate_key(struct client *c, key_code key, key_code *new_key)
usr.bin/tmux/status.c
983
switch (key) {
usr.bin/tmux/tmux.h
1095
key_code key;
usr.bin/tmux/tmux.h
1121
void (*key)(struct window_mode_entry *, struct client *,
usr.bin/tmux/tmux.h
1523
key_code key;
usr.bin/tmux/tmux.h
1549
key_code key;
usr.bin/tmux/tmux.h
187
#define KEYC_IS_UNICODE(key) \
usr.bin/tmux/tmux.h
188
(((key) & KEYC_MASK_TYPE) == KEYC_SHIFT_TYPE(KEYC_TYPE_UNICODE) && \
usr.bin/tmux/tmux.h
189
((key) & KEYC_MASK_KEY) > 0x7f)
usr.bin/tmux/tmux.h
192
#define KEYC_IS_USER(key) \
usr.bin/tmux/tmux.h
193
(((key) & KEYC_MASK_TYPE) == KEYC_SHIFT_TYPE(KEYC_TYPE_USER))
usr.bin/tmux/tmux.h
196
#define KEYC_IS_SPECIAL(key) \
usr.bin/tmux/tmux.h
197
(((key) & KEYC_MASK_TYPE) == KEYC_SHIFT_TYPE(KEYC_TYPE_FUNCTION))
usr.bin/tmux/tmux.h
200
#define KEYC_IS_MOUSE(key) \
usr.bin/tmux/tmux.h
201
(((key) & KEYC_MASK_KEY) == KEYC_MOUSE || \
usr.bin/tmux/tmux.h
202
(((key) & KEYC_MASK_TYPE) >= KEYC_SHIFT_TYPE(KEYC_TYPE_MOUSEMOVE) && \
usr.bin/tmux/tmux.h
203
((key) & KEYC_MASK_TYPE) <= KEYC_SHIFT_TYPE(KEYC_TYPE_TRIPLECLICK)))
usr.bin/tmux/tmux.h
206
#define KEYC_IS_PASTE(key) \
usr.bin/tmux/tmux.h
207
(((key) & KEYC_MASK_TYPE) == KEYC_SHIFT_TYPE(KEYC_TYPE_FUNCTION) && \
usr.bin/tmux/tmux.h
208
(((key) & KEYC_MASK_KEY) == KEYC_PASTE_START || \
usr.bin/tmux/tmux.h
209
((key) & KEYC_MASK_KEY) == KEYC_PASTE_END))
usr.bin/tmux/tty-acs.c
186
tty_acs_cmp(const void *key, const void *value)
usr.bin/tmux/tty-acs.c
189
int test = *(u_char *)key;
usr.bin/tmux/tty-acs.c
191
return (test - entry->key);
usr.bin/tmux/tty-acs.c
195
tty_acs_reverse_cmp(const void *key, const void *value)
usr.bin/tmux/tty-acs.c
198
const char *test = key;
usr.bin/tmux/tty-acs.c
268
return (entry->key);
usr.bin/tmux/tty-acs.c
28
u_char key;
usr.bin/tmux/tty-acs.c
73
u_char key;
usr.bin/tmux/tty-keys.c
1018
log_debug("%s: discard key %.*s %#llx", c->name, (int)size, buf, key);
usr.bin/tmux/tty-keys.c
1045
size_t *size, key_code *key)
usr.bin/tmux/tty-keys.c
1155
*key = nkey;
usr.bin/tmux/tty-keys.c
226
key_code key;
usr.bin/tmux/tty-keys.c
280
key_code key;
usr.bin/tmux/tty-keys.c
434
tty_keys_add(struct tty *tty, const char *s, key_code key)
usr.bin/tmux/tty-keys.c
440
keystr = key_string_lookup_key(key, 1);
usr.bin/tmux/tty-keys.c
442
log_debug("new key %s: 0x%llx (%s)", s, key, keystr);
usr.bin/tmux/tty-keys.c
443
tty_keys_add1(&tty->key_tree, s, key);
usr.bin/tmux/tty-keys.c
445
log_debug("replacing key %s: 0x%llx (%s)", s, key, keystr);
usr.bin/tmux/tty-keys.c
446
tk->key = key;
usr.bin/tmux/tty-keys.c
452
tty_keys_add1(struct tty_key **tkp, const char *s, key_code key)
usr.bin/tmux/tty-keys.c
461
tk->key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
471
tk->key = key;
usr.bin/tmux/tty-keys.c
485
tty_keys_add1(tkp, s, key);
usr.bin/tmux/tty-keys.c
501
key_code key;
usr.bin/tmux/tty-keys.c
513
key = tdkx->key|tty_default_xterm_modifiers[j];
usr.bin/tmux/tty-keys.c
514
tty_keys_add(tty, copy, key);
usr.bin/tmux/tty-keys.c
522
tty_keys_add(tty, s, tdkr->key);
usr.bin/tmux/tty-keys.c
529
tty_keys_add(tty, s, tdkc->key);
usr.bin/tmux/tty-keys.c
592
if (len == 0 || (tk->next == NULL && tk->key != KEYC_UNKNOWN))
usr.bin/tmux/tty-keys.c
610
tty_keys_next1(struct tty *tty, const char *buf, size_t len, key_code *key,
usr.bin/tmux/tty-keys.c
625
if (tk != NULL && tk->key != KEYC_UNKNOWN) {
usr.bin/tmux/tty-keys.c
628
log_debug("%s: keys in list: %#llx", c->name, tk1->key);
usr.bin/tmux/tty-keys.c
632
*key = tk->key;
usr.bin/tmux/tty-keys.c
652
*key = uc;
usr.bin/tmux/tty-keys.c
655
ud.data, *key);
usr.bin/tmux/tty-keys.c
67
key_code key;
usr.bin/tmux/tty-keys.c
740
key_code key, onlykey;
usr.bin/tmux/tty-keys.c
754
key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
765
key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
776
key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
78
key_code key;
usr.bin/tmux/tty-keys.c
787
key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
798
key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
811
key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
822
key = KEYC_MOUSE;
usr.bin/tmux/tty-keys.c
827
key = KEYC_MOUSE;
usr.bin/tmux/tty-keys.c
834
switch (tty_keys_extended_key(tty, buf, len, &size, &key)) {
usr.bin/tmux/tty-keys.c
846
key = KEYC_UNKNOWN;
usr.bin/tmux/tty-keys.c
856
n = tty_keys_next1(tty, buf, len, &key, &size, expired);
usr.bin/tmux/tty-keys.c
868
n = tty_keys_next1(tty, buf + 1, len - 1, &key, &size, expired);
usr.bin/tmux/tty-keys.c
870
if (key & KEYC_IMPLIED_META) {
usr.bin/tmux/tty-keys.c
878
key = '\033';
usr.bin/tmux/tty-keys.c
882
key |= KEYC_META;
usr.bin/tmux/tty-keys.c
895
key = (u_char)buf[1] | KEYC_META;
usr.bin/tmux/tty-keys.c
898
key = (u_char)buf[0];
usr.bin/tmux/tty-keys.c
903
if ((key & KEYC_MASK_KEY) == C0_NUL)
usr.bin/tmux/tty-keys.c
904
key = ' ' | KEYC_CTRL | (key & KEYC_META);
usr.bin/tmux/tty-keys.c
913
if (key == bspace) {
usr.bin/tmux/tty-keys.c
914
log_debug("%s: key %#llx is BSpace", c->name, key);
usr.bin/tmux/tty-keys.c
915
key = KEYC_BSPACE;
usr.bin/tmux/tty-keys.c
917
if (key == (bspace|KEYC_META)) {
usr.bin/tmux/tty-keys.c
918
log_debug("%s: key %#llx is M-BSpace", c->name, key);
usr.bin/tmux/tty-keys.c
919
key = KEYC_BSPACE|KEYC_META;
usr.bin/tmux/tty-keys.c
928
onlykey = key & KEYC_MASK_KEY;
usr.bin/tmux/tty-keys.c
936
key = onlykey | KEYC_CTRL | (key & KEYC_META);
usr.bin/tmux/tty-keys.c
978
log_debug("%s: complete key %.*s %#llx", c->name, (int)size, buf, key);
usr.bin/tmux/tty-keys.c
986
if (key == KEYC_FOCUS_OUT) {
usr.bin/tmux/tty-keys.c
990
} else if (key == KEYC_FOCUS_IN) {
usr.bin/tmux/tty-keys.c
997
if (key != KEYC_UNKNOWN) {
usr.bin/tmux/tty-keys.c
999
event->key = key;
usr.bin/tmux/window-buffer.c
277
window_buffer_menu(void *modedata, struct client *c, key_code key)
usr.bin/tmux/window-buffer.c
286
window_buffer_key(wme, c, NULL, NULL, key, NULL);
usr.bin/tmux/window-buffer.c
300
key_code key;
usr.bin/tmux/window-buffer.c
318
key = key_string_lookup_string(expanded);
usr.bin/tmux/window-buffer.c
321
return (key);
usr.bin/tmux/window-buffer.c
430
__unused struct client *c, __unused key_code key)
usr.bin/tmux/window-buffer.c
453
__unused key_code key)
usr.bin/tmux/window-buffer.c
536
__unused struct session *s, __unused struct winlink *wl, key_code key,
usr.bin/tmux/window-buffer.c
550
finished = mode_tree_key(mtd, c, &key, m, NULL, NULL);
usr.bin/tmux/window-buffer.c
551
switch (key) {
usr.bin/tmux/window-buffer.c
558
window_buffer_do_delete(data, item, c, key);
usr.bin/tmux/window-buffer.c
562
mode_tree_each_tagged(mtd, window_buffer_do_delete, c, key, 0);
usr.bin/tmux/window-buffer.c
566
mode_tree_each_tagged(mtd, window_buffer_do_paste, c, key, 0);
usr.bin/tmux/window-buffer.c
572
window_buffer_do_paste(data, item, c, key);
usr.bin/tmux/window-buffer.c
76
.key = window_buffer_key,
usr.bin/tmux/window-client.c
203
window_client_menu(void *modedata, struct client *c, key_code key)
usr.bin/tmux/window-client.c
212
window_client_key(wme, c, NULL, NULL, key, NULL);
usr.bin/tmux/window-client.c
222
key_code key;
usr.bin/tmux/window-client.c
229
key = key_string_lookup_string(expanded);
usr.bin/tmux/window-client.c
232
return (key);
usr.bin/tmux/window-client.c
341
__unused struct client *c, key_code key)
usr.bin/tmux/window-client.c
348
if (key == 'd' || key == 'D')
usr.bin/tmux/window-client.c
350
else if (key == 'x' || key == 'X')
usr.bin/tmux/window-client.c
352
else if (key == 'z' || key == 'Z')
usr.bin/tmux/window-client.c
358
__unused struct session *s, __unused struct winlink *wl, key_code key,
usr.bin/tmux/window-client.c
367
finished = mode_tree_key(mtd, c, &key, m, NULL, NULL);
usr.bin/tmux/window-client.c
368
switch (key) {
usr.bin/tmux/window-client.c
373
window_client_do_detach(data, item, c, key);
usr.bin/tmux/window-client.c
379
mode_tree_each_tagged(mtd, window_client_do_detach, c, key, 0);
usr.bin/tmux/window-client.c
71
.key = window_client_key,
usr.bin/tmux/window-clock.c
216
__unused key_code key, __unused struct mouse_event *m)
usr.bin/tmux/window-clock.c
44
.key = window_clock_key,
usr.bin/tmux/window-customize.c
1260
key_code key = item->key;
usr.bin/tmux/window-customize.c
1273
xasprintf(&prompt, "(%s) ", key_string_lookup_key(key, 0));
usr.bin/tmux/window-customize.c
1280
new_item->key = key;
usr.bin/tmux/window-customize.c
1290
xasprintf(&prompt, "(%s) ", key_string_lookup_key(key, 0));
usr.bin/tmux/window-customize.c
1296
new_item->key = key;
usr.bin/tmux/window-customize.c
1322
key_bindings_remove(kt->name, bd->key);
usr.bin/tmux/window-customize.c
1335
dd = key_bindings_get_default(kt, bd->key);
usr.bin/tmux/window-customize.c
1342
key_bindings_reset(kt->name, bd->key);
usr.bin/tmux/window-customize.c
1347
__unused struct client *c, __unused key_code key)
usr.bin/tmux/window-customize.c
1428
__unused struct session *s, __unused struct winlink *wl, key_code key,
usr.bin/tmux/window-customize.c
1439
finished = mode_tree_key(data->data, c, &key, m, NULL, NULL);
usr.bin/tmux/window-customize.c
1443
switch (key) {
usr.bin/tmux/window-customize.c
175
bd = key_bindings_get(kt, item->key);
usr.bin/tmux/window-customize.c
468
format_add(ft, "key", "%s", key_string_lookup_key(bd->key, 0));
usr.bin/tmux/window-customize.c
483
item->key = bd->key;
usr.bin/tmux/window-customize.c
484
item->name = xstrdup(key_string_lookup_key(item->key, 0));
usr.bin/tmux/window-customize.c
496
tag|(bd->key << 3)|(0 << 1)|1, "Command", text, -1);
usr.bin/tmux/window-customize.c
506
tag|(bd->key << 3)|(1 << 1)|1, "Note", text, -1);
usr.bin/tmux/window-customize.c
516
tag|(bd->key << 3)|(2 << 1)|1, "Repeat", flag, -1);
usr.bin/tmux/window-customize.c
633
default_bd = key_bindings_get_default(kt, bd->key);
usr.bin/tmux/window-customize.c
65
.key = window_customize_key,
usr.bin/tmux/window-customize.c
853
window_customize_menu(void *modedata, struct client *c, key_code key)
usr.bin/tmux/window-customize.c
862
window_customize_key(wme, c, NULL, NULL, key, NULL);
usr.bin/tmux/window-customize.c
89
key_code key;
usr.bin/tmux/window-tree.c
1027
__unused key_code key)
usr.bin/tmux/window-tree.c
1084
__unused struct client *c, __unused key_code key)
usr.bin/tmux/window-tree.c
1156
window_tree_mouse(struct window_tree_modedata *data, key_code key, u_int x,
usr.bin/tmux/window-tree.c
1164
if (key != KEYC_MOUSEDOWN1_PANE)
usr.bin/tmux/window-tree.c
1218
__unused struct session *s, __unused struct winlink *wl, key_code key,
usr.bin/tmux/window-tree.c
1233
finished = mode_tree_key(data->data, c, &key, m, &x, &y);
usr.bin/tmux/window-tree.c
1240
if (KEYC_IS_MOUSE(key) && m != NULL) {
usr.bin/tmux/window-tree.c
1241
key = window_tree_mouse(data, key, x, item);
usr.bin/tmux/window-tree.c
1245
switch (key) {
usr.bin/tmux/window-tree.c
763
window_tree_menu(void *modedata, struct client *c, key_code key)
usr.bin/tmux/window-tree.c
772
window_tree_key(wme, c, NULL, NULL, key, NULL);
usr.bin/tmux/window-tree.c
785
key_code key;
usr.bin/tmux/window-tree.c
798
key = key_string_lookup_string(expanded);
usr.bin/tmux/window-tree.c
801
return (key);
usr.bin/tmux/window-tree.c
89
.key = window_tree_key,
usr.bin/tmux/window.c
1226
window_pane_copy_key(struct window_pane *wp, key_code key)
usr.bin/tmux/window.c
1237
input_key_pane(loop, key, NULL);
usr.bin/tmux/window.c
1242
window_pane_paste(struct window_pane *wp, key_code key, char *buf, size_t len)
usr.bin/tmux/window.c
1250
if (KEYC_IS_PASTE(key) && (~wp->screen->mode & MODE_BRACKETPASTE))
usr.bin/tmux/window.c
1262
struct winlink *wl, key_code key, struct mouse_event *m)
usr.bin/tmux/window.c
1266
if (KEYC_IS_MOUSE(key) && m == NULL)
usr.bin/tmux/window.c
1271
if (wme->mode->key != NULL && c != NULL) {
usr.bin/tmux/window.c
1272
key &= ~KEYC_MASK_FLAGS;
usr.bin/tmux/window.c
1273
wme->mode->key(wme, c, s, wl, key, m);
usr.bin/tmux/window.c
1281
if (input_key_pane(wp, key, m) != 0)
usr.bin/tmux/window.c
1284
if (KEYC_IS_MOUSE(key))
usr.bin/tmux/window.c
1287
window_pane_copy_key(wp, key);
usr.bin/vacation/vacation.c
388
DBT key, data;
usr.bin/vacation/vacation.c
391
key.data = VIT;
usr.bin/vacation/vacation.c
392
key.size = sizeof(VIT);
usr.bin/vacation/vacation.c
393
if ((db->get)(db, &key, &data, 0))
usr.bin/vacation/vacation.c
399
key.data = from;
usr.bin/vacation/vacation.c
400
key.size = strlen(from);
usr.bin/vacation/vacation.c
401
if (!(db->get)(db, &key, &data, 0)) {
usr.bin/vacation/vacation.c
417
DBT key, data;
usr.bin/vacation/vacation.c
419
key.data = VIT;
usr.bin/vacation/vacation.c
420
key.size = sizeof(VIT);
usr.bin/vacation/vacation.c
423
(void)(db->put)(db, &key, &data, 0);
usr.bin/vacation/vacation.c
433
DBT key, data;
usr.bin/vacation/vacation.c
436
key.data = from;
usr.bin/vacation/vacation.c
437
key.size = strlen(from);
usr.bin/vacation/vacation.c
441
(void)(db->put)(db, &key, &data, 0);
usr.bin/vi/common/line.c
143
key.data = &lno;
usr.bin/vi/common/line.c
144
key.size = sizeof(lno);
usr.bin/vi/common/line.c
145
switch (ep->db->get(ep->db, &key, &data, 0)) {
usr.bin/vi/common/line.c
182
DBT key;
usr.bin/vi/common/line.c
204
key.data = &lno;
usr.bin/vi/common/line.c
205
key.size = sizeof(lno);
usr.bin/vi/common/line.c
206
if (ep->db->del(ep->db, &key, 0) == 1) {
usr.bin/vi/common/line.c
236
DBT data, key;
usr.bin/vi/common/line.c
250
key.data = &lno;
usr.bin/vi/common/line.c
251
key.size = sizeof(lno);
usr.bin/vi/common/line.c
254
if (ep->db->put(ep->db, &key, &data, R_IAFTER) == -1) {
usr.bin/vi/common/line.c
303
DBT data, key;
usr.bin/vi/common/line.c
318
key.data = &lno;
usr.bin/vi/common/line.c
319
key.size = sizeof(lno);
usr.bin/vi/common/line.c
322
if (ep->db->put(ep->db, &key, &data, R_IBEFORE) == -1) {
usr.bin/vi/common/line.c
362
DBT data, key;
usr.bin/vi/common/line.c
380
key.data = &lno;
usr.bin/vi/common/line.c
381
key.size = sizeof(lno);
usr.bin/vi/common/line.c
384
if (ep->db->put(ep->db, &key, &data, 0) == -1) {
usr.bin/vi/common/line.c
448
DBT data, key;
usr.bin/vi/common/line.c
470
key.data = &lno;
usr.bin/vi/common/line.c
471
key.size = sizeof(lno);
usr.bin/vi/common/line.c
473
switch (ep->db->seq(ep->db, &key, &data, R_LAST)) {
usr.bin/vi/common/line.c
486
memcpy(&lno, key.data, sizeof(lno));
usr.bin/vi/common/line.c
77
DBT data, key;
usr.bin/vi/common/log.c
172
DBT data, key;
usr.bin/vi/common/log.c
180
key.data = &ep->l_cur;
usr.bin/vi/common/log.c
181
key.size = sizeof(recno_t);
usr.bin/vi/common/log.c
184
if (ep->log->put(ep->log, &key, &data, 0) == -1)
usr.bin/vi/common/log.c
207
DBT data, key;
usr.bin/vi/common/log.c
255
key.data = &ep->l_cur;
usr.bin/vi/common/log.c
256
key.size = sizeof(recno_t);
usr.bin/vi/common/log.c
259
if (ep->log->put(ep->log, &key, &data, 0) == -1)
usr.bin/vi/common/log.c
304
DBT data, key;
usr.bin/vi/common/log.c
323
key.data = &ep->l_cur;
usr.bin/vi/common/log.c
324
key.size = sizeof(recno_t);
usr.bin/vi/common/log.c
327
if (ep->log->put(ep->log, &key, &data, 0) == -1)
usr.bin/vi/common/log.c
348
DBT key, data;
usr.bin/vi/common/log.c
370
key.data = &ep->l_cur; /* Initialize db request. */
usr.bin/vi/common/log.c
371
key.size = sizeof(recno_t);
usr.bin/vi/common/log.c
374
if (ep->log->get(ep->log, &key, &data, 0))
usr.bin/vi/common/log.c
452
DBT key, data;
usr.bin/vi/common/log.c
471
key.data = &ep->l_cur; /* Initialize db request. */
usr.bin/vi/common/log.c
472
key.size = sizeof(recno_t);
usr.bin/vi/common/log.c
476
if (ep->log->get(ep->log, &key, &data, 0))
usr.bin/vi/common/log.c
538
DBT key, data;
usr.bin/vi/common/log.c
560
key.data = &ep->l_cur; /* Initialize db request. */
usr.bin/vi/common/log.c
561
key.size = sizeof(recno_t);
usr.bin/vi/common/log.c
564
if (ep->log->get(ep->log, &key, &data, 0))
usr.bin/vi/common/mark.c
107
mark_get(SCR *sp, CHAR_T key, MARK *mp, mtype_t mtype)
usr.bin/vi/common/mark.c
111
if (key == ABSMARK2)
usr.bin/vi/common/mark.c
112
key = ABSMARK1;
usr.bin/vi/common/mark.c
114
lmp = mark_find(sp, key);
usr.bin/vi/common/mark.c
115
if (lmp == NULL || lmp->name != key) {
usr.bin/vi/common/mark.c
116
msgq(sp, mtype, "Mark %s: not set", KEY_NAME(sp, key));
usr.bin/vi/common/mark.c
121
"Mark %s: the line was deleted", KEY_NAME(sp, key));
usr.bin/vi/common/mark.c
133
KEY_NAME(sp, key));
usr.bin/vi/common/mark.c
148
mark_set(SCR *sp, CHAR_T key, MARK *value, int userset)
usr.bin/vi/common/mark.c
152
if (key == ABSMARK2)
usr.bin/vi/common/mark.c
153
key = ABSMARK1;
usr.bin/vi/common/mark.c
161
lmp = mark_find(sp, key);
usr.bin/vi/common/mark.c
162
if (lmp == NULL || lmp->name != key) {
usr.bin/vi/common/mark.c
175
lmp->name = key;
usr.bin/vi/common/mark.c
186
mark_find(SCR *sp, CHAR_T key)
usr.bin/vi/common/mark.c
196
if (lmp->name >= key)
usr.bin/vi/common/mark.c
197
return (lmp->name == key ? lmp : lastlmp);
usr.bin/vi/ex/ex_usage.c
120
int key;
usr.bin/vi/ex/ex_usage.c
128
key = cmdp->argv[0]->bp[0];
usr.bin/vi/ex/ex_usage.c
129
if (key > MAXVIKEY)
usr.bin/vi/ex/ex_usage.c
133
if ((key == '[' || key == ']') && cmdp->argv[0]->bp[1] != key)
usr.bin/vi/ex/ex_usage.c
137
if (key == '~' && O_ISSET(sp, O_TILDEOP))
usr.bin/vi/ex/ex_usage.c
140
kp = &vikeys[key];
usr.bin/vi/ex/ex_usage.c
145
KEY_NAME(sp, key));
usr.bin/vi/ex/ex_usage.c
152
for (key = 0; key <= MAXVIKEY && !INTERRUPTED(sp); ++key) {
usr.bin/vi/ex/ex_usage.c
154
if (key == '~' && O_ISSET(sp, O_TILDEOP))
usr.bin/vi/ex/ex_usage.c
157
kp = &vikeys[key];
usr.bin/vi/vi/v_ch.c
139
int isempty, key;
usr.bin/vi/vi/v_ch.c
147
key = vp->character;
usr.bin/vi/vi/v_ch.c
149
VIP(sp)->lastckey = key;
usr.bin/vi/vi/v_ch.c
159
empty: notfound(sp, key);
usr.bin/vi/vi/v_ch.c
166
while (++p < endp && *p != key);
usr.bin/vi/vi/v_ch.c
168
notfound(sp, key);
usr.bin/vi/vi/v_ch.c
220
int isempty, key;
usr.bin/vi/vi/v_ch.c
229
key = vp->character;
usr.bin/vi/vi/v_ch.c
231
VIP(sp)->lastckey = key;
usr.bin/vi/vi/v_ch.c
241
empty: notfound(sp, key);
usr.bin/vi/vi/v_ch.c
248
while (--p > endp && *p != key);
usr.bin/vi/vi/v_ch.c
250
notfound(sp, key);
usr.bin/vi/vi/vi.c
1094
switch (vp->key) {
usr.bin/vi/vi/vi.c
1097
vp->key = 'c';
usr.bin/vi/vi/vi.c
1101
vp->key = 'd';
usr.bin/vi/vi/vi.c
1105
vp->key = 'c';
usr.bin/vi/vi/vi.c
1109
vp->key = 'y';
usr.bin/vi/vi/vi.c
1115
NULL, &push, 1, CH_NOMAP | CH_QUOTED) ? NULL : &vikeys[vp->key]);
usr.bin/vi/vi/vi.c
1225
TRACE(sp, "vcmd: %c", vp->key);
usr.bin/vi/vi/vi.c
171
ex_emsg(sp, KEY_NAME(sp, vp->key), EXM_SECURE);
usr.bin/vi/vi/vi.c
419
#define KEY(key, ec_flags) { \
usr.bin/vi/vi/vi.c
426
(key) = ev.e_c; \
usr.bin/vi/vi/vi.c
466
CHAR_T key;
usr.bin/vi/vi/vi.c
492
key = ev.e_c;
usr.bin/vi/vi/vi.c
498
if (key == '"') {
usr.bin/vi/vi/vi.c
507
KEY(key, EC_MAPCOMMAND);
usr.bin/vi/vi/vi.c
514
if (isdigit(key) && key != '0') {
usr.bin/vi/vi/vi.c
515
if (v_count(sp, key, &vp->count))
usr.bin/vi/vi/vi.c
520
KEY(key, EC_MAPCOMMAND);
usr.bin/vi/vi/vi.c
525
if (key == '"') {
usr.bin/vi/vi/vi.c
538
KEY(key, EC_MAPCOMMAND);
usr.bin/vi/vi/vi.c
543
if (key > MAXVIKEY) {
usr.bin/vi/vi/vi.c
544
v_emsg(sp, KEY_NAME(sp, key), VIM_NOCOM);
usr.bin/vi/vi/vi.c
547
kp = &vikeys[vp->key = key];
usr.bin/vi/vi/vi.c
553
if (vp->key == 'D' && F_ISSET(vp, VC_C1SET)) {
usr.bin/vi/vi/vi.c
564
if (key == '~' && O_ISSET(sp, O_TILDEOP))
usr.bin/vi/vi/vi.c
577
if (key != '.') {
usr.bin/vi/vi/vi.c
578
v_emsg(sp, KEY_NAME(sp, key),
usr.bin/vi/vi/vi.c
643
if (vp->key == '[' || vp->key == ']' || vp->key == 'Z') {
usr.bin/vi/vi/vi.c
656
KEY(key, 0);
usr.bin/vi/vi/vi.c
658
if (vp->key != key) {
usr.bin/vi/vi/vi.c
661
else if (ismotion->key == '~' && O_ISSET(sp, O_TILDEOP))
usr.bin/vi/vi/vi.c
664
s = vikeys[ismotion->key].usage;
usr.bin/vi/vi/vi.c
670
if (vp->key == 'z') {
usr.bin/vi/vi/vi.c
684
if (ismotion != NULL && ismotion->key != key && !LF_ISSET(V_MOVE)) {
usr.bin/vi/vi/vi.c
686
KEY_NAME(sp, key));
usr.bin/vi/vi/vi.c
768
if (vp->key == motion.key) {
usr.bin/vi/vi/vi.c
785
(vp->key != 'c' && vp->key != '!')) {
usr.bin/vi/vi/vi.c
857
(vp->key != 'c' && vp->key != '!')) {
usr.bin/vi/vi/vi.h
21
CHAR_T key; /* Command key. */
usr.bin/vi/vi/vi.h
28
#define ISCMD(p, key) ((p) == &vikeys[(key)])
usr.bin/x99token/x99token.c
107
key[i] = key[i] << 3 | (*b++ - '0');
usr.bin/x99token/x99token.c
125
key[i>>1] |= d << ((i & 1) ? 0 : 4);
usr.bin/x99token/x99token.c
139
key[0] ^= (pin >> ((i * 7) % 26)) & 0x7f;
usr.bin/x99token/x99token.c
147
fprintf(fp, "%c", digits[(key[i]>>4)&0xf]);
usr.bin/x99token/x99token.c
148
fprintf(fp, "%c", digits[(key[i]>>0)&0xf]);
usr.bin/x99token/x99token.c
155
DES_fixup_key_parity(&key);
usr.bin/x99token/x99token.c
156
DES_key_sched(&key, &ks);
usr.bin/x99token/x99token.c
39
DES_cblock key;
usr.bin/x99token/x99token.c
99
memset(key, 0, sizeof(key));
usr.bin/yacc/lr0.c
190
int n, found, key;
usr.bin/yacc/lr0.c
202
key = *isp1;
usr.bin/yacc/lr0.c
203
assert(0 <= key && key < nitems);
usr.bin/yacc/lr0.c
204
sp = state_set[key];
usr.bin/yacc/lr0.c
228
state_set[key] = sp = new_state(symbol);
usr.bin/ypcat/ypcat.c
111
key = 1;
usr.bin/ypcat/ypcat.c
59
int key;
usr.bin/ypcat/ypcat.c
76
if (key)
usr.bin/ypcat/ypcat.c
96
notrans = key = 0;
usr.bin/ypmatch/ypmatch.c
122
if (key)
usr.bin/ypmatch/ypmatch.c
74
int outbuflen, key, notrans, rval;
usr.bin/ypmatch/ypmatch.c
78
notrans = key = 0;
usr.bin/ypmatch/ypmatch.c
94
key = 1;
usr.sbin/acme-client/http.c
426
if (strcasecmp(h[i].key, v) == 0)
usr.sbin/acme-client/http.c
530
h[hsz].key = "Status";
usr.sbin/acme-client/http.c
544
h[hsz].key = cp;
usr.sbin/acme-client/http.h
33
const char *key;
usr.sbin/acme-client/keyproc.c
90
const char *keyfile = domain->key;
usr.sbin/acme-client/parse.h
58
char *key;
usr.sbin/acme-client/parse.y
1129
if (d->key != NULL)
usr.sbin/acme-client/parse.y
1130
printf("\tdomain key \"%s\" %s\n", d->key, kt2txt(
usr.sbin/acme-client/parse.y
284
if (domain->key == NULL) {
usr.sbin/acme-client/parse.y
335
if (domain->key != NULL) {
usr.sbin/acme-client/parse.y
350
domain->key = s;
usr.sbin/amd/amd/afs_ops.c
1474
cp->key = pfname;
usr.sbin/amd/amd/afs_ops.c
499
char *key; /* Map key */
usr.sbin/amd/amd/afs_ops.c
521
free(cp->key);
usr.sbin/amd/amd/afs_ops.c
843
p = sunos4_match(&cp->fs_opts, *cp->ivec, cp->def_opts, mp->am_path, cp->key, mp->am_parent->am_mnt->mf_info);
usr.sbin/amd/amd/afs_ops.c
847
p = ops_match(&cp->fs_opts, *cp->ivec, cp->def_opts, mp->am_path, cp->key, mp->am_parent->am_mnt->mf_info);
usr.sbin/amd/amd/am_ops.c
100
char *host = key;
usr.sbin/amd/amd/am_ops.c
116
ops_match(am_opts *fo, char *key, char *g_key, char *path, char *keym,
usr.sbin/amd/amd/am_ops.c
125
if (!eval_fs_opts(fo, key, g_key, path, keym, map)) {
usr.sbin/amd/amd/am_ops.c
97
sunos4_match(am_opts *fo, char *key, char *g_key, char *path,
usr.sbin/amd/amd/info_file.c
146
if (fn || (*key == *kp && strcmp(key, kp) == 0)) {
usr.sbin/amd/amd/info_file.c
160
dlog("%s returns %s", key, dc);
usr.sbin/amd/amd/info_file.c
230
file_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp)
usr.sbin/amd/amd/info_file.c
241
error = search_or_reload_file(mapf, map, key, pval, 0, 0);
usr.sbin/amd/amd/info_file.c
85
search_or_reload_file(FILE *fp, char *map, char *key, char **val, mnt_map *m,
usr.sbin/amd/amd/info_ndbm.c
51
search_ndbm(DBM *db, char *key, char **val)
usr.sbin/amd/amd/info_ndbm.c
55
k.dptr = key;
usr.sbin/amd/amd/info_ndbm.c
56
k.dsize = strlen(key) + 1;
usr.sbin/amd/amd/info_ndbm.c
66
ndbm_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp)
usr.sbin/amd/amd/info_ndbm.c
80
error = search_ndbm(db, key, pval);
usr.sbin/amd/amd/info_nis.c
104
char *kp = strnsave(key, kl);
usr.sbin/amd/amd/info_nis.c
167
nis_search(mnt_map *m, char *map, char *key, char **val, time_t *tp)
usr.sbin/amd/amd/info_nis.c
222
res = yp_match(domain, map, key, strlen(key), val, &outlen);
usr.sbin/amd/amd/info_nis.c
96
callback(unsigned long status, char *key, int kl, char *val, int vl, void *arg)
usr.sbin/amd/amd/info_passwd.c
67
passwd_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp)
usr.sbin/amd/amd/info_passwd.c
72
if (strcmp(key, "/defaults") == 0) {
usr.sbin/amd/amd/info_passwd.c
77
pw = getpwnam(key);
usr.sbin/amd/amd/info_union.c
65
union_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp)
usr.sbin/amd/amd/mapc.c
119
char *key;
usr.sbin/amd/amd/mapc.c
211
kvhash_of(char *key)
usr.sbin/amd/amd/mapc.c
215
for (i = 0; (j = *key++); i += j)
usr.sbin/amd/amd/mapc.c
238
mapc_add_kv(mnt_map *m, char *key, char *val)
usr.sbin/amd/amd/mapc.c
242
int hash = kvhash_of(key);
usr.sbin/amd/amd/mapc.c
245
dlog("add_kv: %s -> %s", key, val);
usr.sbin/amd/amd/mapc.c
256
snprintf(keyb, sizeof(keyb), "^%s$", key);
usr.sbin/amd/amd/mapc.c
273
free(key);
usr.sbin/amd/amd/mapc.c
274
key = (char *)re;
usr.sbin/amd/amd/mapc.c
279
n->key = key;
usr.sbin/amd/amd/mapc.c
286
mapc_repl_kv(mnt_map *m, char *key, char *val)
usr.sbin/amd/amd/mapc.c
293
k = m->kvhash[kvhash_of(key)];
usr.sbin/amd/amd/mapc.c
298
while (k && !FSTREQ(k->key, key))
usr.sbin/amd/amd/mapc.c
305
mapc_add_kv(m, key, val);
usr.sbin/amd/amd/mapc.c
315
static int search_map(mnt_map *m, char *key, char **valp)
usr.sbin/amd/amd/mapc.c
320
rc = (*m->search)(m, m->map_name, key, valp, &m->modify);
usr.sbin/amd/amd/mapc.c
463
free(k->key);
usr.sbin/amd/amd/mapc.c
532
mapc_meta_search(mnt_map *m, char *key, char **pval, int recurse)
usr.sbin/amd/amd/mapc.c
541
plog(XLOG_ERROR, "Null map request for %s", key);
usr.sbin/amd/amd/mapc.c
562
k = m->kvhash[kvhash_of(key)];
usr.sbin/amd/amd/mapc.c
567
while (k && !FSTREQ(k->key, key)) k = k->next;
usr.sbin/amd/amd/mapc.c
582
if (regexec((regex_t *)k->key, key,
usr.sbin/amd/amd/mapc.c
612
error = search_map(m, key, pval);
usr.sbin/amd/amd/mapc.c
614
mapc_add_kv(m, strdup(key), strdup(*pval));
usr.sbin/amd/amd/mapc.c
626
if (*key == '/')
usr.sbin/amd/amd/mapc.c
634
strlcpy(wildname, key, sizeof wildname);
usr.sbin/amd/amd/mapc.c
655
mapc_search(mnt_map *m, char *key, char **pval)
usr.sbin/amd/amd/mapc.c
657
return mapc_meta_search(m, key, pval, MREC_FULL);
usr.sbin/amd/amd/mapc.c
753
(*fn)(k->key, arg);
usr.sbin/amd/amd/mapc.c
794
error_search(mnt_map *m, char *map, char *key, char **pval, time_t *tp)
usr.sbin/amd/amd/opts.c
702
expand_key(char *key)
usr.sbin/amd/amd/opts.c
706
oa.opt = &key; oa.val = 0;
usr.sbin/amd/amd/opts.c
709
return key;
usr.sbin/amd/amd/opts.c
728
char *key, char *map)
usr.sbin/amd/amd/opts.c
744
opt_key = key;
usr.sbin/amd/amd/opts.c
761
if (!eval_opts(fs_static.fs_glob, key))
usr.sbin/amd/amd/opts.c
767
if (ok && !eval_opts(fs_static.fs_local, key))
usr.sbin/amd/amd/util.c
250
valid_key(char *key)
usr.sbin/amd/amd/util.c
252
while (*key)
usr.sbin/amd/amd/util.c
253
if (strchr(invalid_keys, *key++))
usr.sbin/bgpctl/ometric.c
213
l->key = *keys;
usr.sbin/bgpctl/ometric.c
302
if (fprintf(out, "%s%s=\"%s\"", comma, l->key,
usr.sbin/bgpctl/ometric.c
33
const char *key;
usr.sbin/bgpd/chash.h
128
_name##_CH_FIND(struct _name *head, const struct _type *key) \
usr.sbin/bgpd/chash.h
131
h = _hash(key); \
usr.sbin/bgpd/chash.h
132
return _ch_find(_name##_CH_TYPE, &head->ch_table, h, key); \
usr.sbin/bgpd/kroute.c
2342
kroute_match(struct ktable *kt, struct bgpd_addr *key, int matchany)
usr.sbin/bgpd/kroute.c
2349
applymask(&masked, key, i);
usr.sbin/bgpd/kroute.c
2359
kroute6_match(struct ktable *kt, struct bgpd_addr *key, int matchany)
usr.sbin/bgpd/kroute.c
2366
applymask(&masked, key, i);
usr.sbin/bgpd/pfkey.c
505
uint8_t keylen, char *key, uint32_t *spi)
usr.sbin/bgpd/pfkey.c
513
src, dst, *spi, 0, keylen, key, 0, 0, NULL, 0, 0) == -1)
usr.sbin/bgplgd/qs.c
281
for (i = 0; qsargs[i].key != NULL; i++)
usr.sbin/bgplgd/qs.c
282
if (strncmp(qsargs[i].key, param, len) == 0)
usr.sbin/bgplgd/qs.c
284
if (qsargs[i].key == NULL) {
usr.sbin/bgplgd/qs.c
290
qsargs[i].key);
usr.sbin/bgplgd/qs.c
295
qsargs[i].key);
usr.sbin/bgplgd/qs.c
301
lwarnx("querystring %s without value", qsargs[i].key);
usr.sbin/bgplgd/qs.c
40
const char *key;
usr.sbin/bgplgd/qs.c
430
for (i = 0; qsargs[i].key != NULL; i++)
usr.sbin/bgplgd/qs.c
432
return qsargs[i].key;
usr.sbin/bgplgd/slowcgi.c
1195
free(env_entry->key);
usr.sbin/bgplgd/slowcgi.c
791
if ((env_entry->key = malloc(name_len + 1)) == NULL) {
usr.sbin/bgplgd/slowcgi.c
798
free(env_entry->key);
usr.sbin/bgplgd/slowcgi.c
803
memcpy(env_entry->key, buf, name_len);
usr.sbin/bgplgd/slowcgi.c
806
env_entry->key[name_len] = '\0';
usr.sbin/bgplgd/slowcgi.c
81
char *key;
usr.sbin/bgplgd/slowcgi.c
813
ldebug("env[%d], %s=%s", c->env_count, env_entry->key,
usr.sbin/bgplgd/slowcgi.c
874
env_get(struct request *c, const char *key)
usr.sbin/bgplgd/slowcgi.c
879
if (strcmp(env->key, key) == 0)
usr.sbin/btrace/ksyms.c
353
const struct sym *entry = entryp, *key = keyp;
usr.sbin/btrace/ksyms.c
355
if (key->sym_value < entry->sym_value)
usr.sbin/btrace/ksyms.c
357
return key->sym_value >= entry->sym_value + entry->sym_size;
usr.sbin/btrace/ksyms.c
421
struct sym key = { .sym_value = pc };
usr.sbin/btrace/ksyms.c
429
if ((sls = find_shlib((caddr_t)key.sym_value)) == NULL)
usr.sbin/btrace/ksyms.c
430
sls = load_syms(dtfd, pid, (caddr_t)key.sym_value);
usr.sbin/btrace/ksyms.c
435
entry = bsearch(&key, sls->sls_syms->table, sls->sls_syms->nsymb,
usr.sbin/btrace/ksyms.c
453
struct sym key = { .sym_value = pc };
usr.sbin/btrace/ksyms.c
457
entry = bsearch(&key, syms->table, syms->nsymb, sizeof *syms->table,
usr.sbin/btrace/map.c
101
map_delete(struct map *map, const char *key)
usr.sbin/btrace/map.c
105
strlcpy(me.mkey, key, KLEN);
usr.sbin/btrace/map.c
114
map_get(struct map *map, const char *key)
usr.sbin/btrace/map.c
118
mep = mget(map, key);
usr.sbin/btrace/map.c
126
map_insert(struct map *map, const char *key, void *cookie)
usr.sbin/btrace/map.c
130
mep = mget(map, key);
usr.sbin/btrace/map.c
56
mget(struct map *map, const char *key)
usr.sbin/btrace/map.c
60
strlcpy(me.mkey, key, KLEN);
usr.sbin/btrace/map.c
67
strlcpy(mep->mkey, key, KLEN);
usr.sbin/crunchgen/mangle.c
103
len = write(key_fd, key, sizeof(key));
usr.sbin/crunchgen/mangle.c
104
if (len != sizeof(key)) {
usr.sbin/crunchgen/mangle.c
118
printf("key %d %d\n", i, key[i]);
usr.sbin/crunchgen/mangle.c
139
keyval = key[len-1]++;
usr.sbin/crunchgen/mangle.c
48
uint32_t key[MAX_KEY_STR_LEN];
usr.sbin/crunchgen/mangle.c
65
if (ret != -1 && sb.st_size == sizeof(key)) {
usr.sbin/crunchgen/mangle.c
73
len = read(key_fd, key, sizeof(key));
usr.sbin/crunchgen/mangle.c
74
if (len != sizeof(key)) {
usr.sbin/crunchgen/mangle.c
85
key[i] = 0;
usr.sbin/dev_mkdb/dev_mkdb.c
108
key.data = &bkey;
usr.sbin/dev_mkdb/dev_mkdb.c
109
key.size = sizeof(bkey);
usr.sbin/dev_mkdb/dev_mkdb.c
134
if ((db->put)(db, &key, &data, 0))
usr.sbin/dev_mkdb/dev_mkdb.c
58
DBT data, key;
usr.sbin/hostapd/hostapd.c
589
struct hostapd_entry *entry, key;
usr.sbin/hostapd/hostapd.c
591
bcopy(lladdr, key.e_lladdr, IEEE80211_ADDR_LEN);
usr.sbin/hostapd/hostapd.c
592
if ((entry = RB_FIND(hostapd_tree, &table->t_tree, &key)) != NULL)
usr.sbin/hostctl/hostctl.c
160
key = argv[0];
usr.sbin/hostctl/hostctl.c
162
if (kvsetstr(pvr.pvr_key, key, pvr.pvr_keylen) == -1)
usr.sbin/hostctl/hostctl.c
97
const char *key, *value, *in = NULL, *out = NULL;
usr.sbin/httpd/httpd.c
1003
kv->kv_key = key;
usr.sbin/httpd/httpd.c
933
kv_add(struct kvtree *keys, char *key, char *value)
usr.sbin/httpd/httpd.c
937
if (key == NULL)
usr.sbin/httpd/httpd.c
941
if ((kv->kv_key = strdup(key)) == NULL) {
usr.sbin/httpd/httpd.c
993
char *key = NULL;
usr.sbin/httpd/httpd.c
997
ret = vasprintf(&key, fmt, ap);
usr.sbin/httpd/server.c
1351
struct server_tls_ticket key;
usr.sbin/httpd/server.c
1379
IMSG_SIZE_CHECK(imsg, (&key));
usr.sbin/httpd/server.c
1380
memcpy(&key, imsg->data, sizeof(key));
usr.sbin/httpd/server.c
1382
srv = server_byid(key.tt_id);
usr.sbin/httpd/server.c
1385
key.tt_keyrev, key.tt_key, sizeof(key.tt_key));
usr.sbin/httpd/server.c
377
struct server_tls_ticket *key = &srv_conf->tls_ticket_key;
usr.sbin/httpd/server.c
379
key->tt_id = srv_conf->id;
usr.sbin/httpd/server.c
380
key->tt_keyrev = arc4random();
usr.sbin/httpd/server.c
381
arc4random_buf(key->tt_key, sizeof(key->tt_key));
usr.sbin/httpd/server_fcgi.c
442
fcgi_add_param(struct server_fcgi_param *p, const char *key,
usr.sbin/httpd/server_fcgi.c
447
int key_len = strlen(key);
usr.sbin/httpd/server_fcgi.c
455
DPRINTF("%s: %s[%d] => %s[%d], total_len: %d", __func__, key, key_len,
usr.sbin/httpd/server_fcgi.c
487
memcpy(param, key, key_len);
usr.sbin/httpd/server_fcgi.c
649
struct kv *cl, key;
usr.sbin/httpd/server_fcgi.c
678
key.kv_key = "Content-Length";
usr.sbin/httpd/server_fcgi.c
679
if (kv_find(&resp->http_headers, &key) == NULL) {
usr.sbin/httpd/server_fcgi.c
690
key.kv_key = "Content-Length";
usr.sbin/httpd/server_fcgi.c
691
if (kv_find(&resp->http_headers, &key) != NULL) {
usr.sbin/httpd/server_fcgi.c
728
key.kv_key = "Date";
usr.sbin/httpd/server_fcgi.c
729
if (kv_find(&resp->http_headers, &key) == NULL &&
usr.sbin/httpd/server_fcgi.c
748
const char *key;
usr.sbin/httpd/server_fcgi.c
753
key = hdr->kv_parent->kv_key;
usr.sbin/httpd/server_fcgi.c
755
key = hdr->kv_key;
usr.sbin/httpd/server_fcgi.c
759
if (strcasecmp(key, "Content-Length") == 0 ||
usr.sbin/httpd/server_fcgi.c
760
strcasecmp(key, "Content-Type") == 0) {
usr.sbin/httpd/server_fcgi.c
761
if ((name = strdup(key)) == NULL)
usr.sbin/httpd/server_fcgi.c
764
if (asprintf(&name, "HTTP_%s", key) == -1)
usr.sbin/httpd/server_fcgi.c
823
char *line, *key, *value;
usr.sbin/httpd/server_fcgi.c
827
key = line;
usr.sbin/httpd/server_fcgi.c
829
if ((value = strchr(key, ':')) == NULL)
usr.sbin/httpd/server_fcgi.c
835
DPRINTF("%s: %s: %s", __func__, key, value);
usr.sbin/httpd/server_fcgi.c
837
if (strcasecmp("Status", key) == 0) {
usr.sbin/httpd/server_fcgi.c
845
(void)kv_add(&resp->http_headers, key, value);
usr.sbin/httpd/server_file.c
164
key.kv_key = "Range";
usr.sbin/httpd/server_file.c
165
r = kv_find(&desc->http_headers, &key);
usr.sbin/httpd/server_file.c
180
key.kv_key = "Accept-Encoding";
usr.sbin/httpd/server_file.c
181
r = kv_find(&req->http_headers, &key);
usr.sbin/httpd/server_file.c
66
struct kv *r, key;
usr.sbin/httpd/server_file.c
719
struct kv key, *since;
usr.sbin/httpd/server_file.c
722
key.kv_key = "If-Modified-Since";
usr.sbin/httpd/server_file.c
723
if ((since = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
1295
struct kv *kv, key, *host;
usr.sbin/httpd/server_http.c
130
struct kv *ba, key;
usr.sbin/httpd/server_http.c
1317
key.kv_key = "Host";
usr.sbin/httpd/server_http.c
1318
if ((host = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
1328
key.kv_key = "Connection";
usr.sbin/httpd/server_http.c
1329
if ((kv = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
1336
key.kv_key = "Connection";
usr.sbin/httpd/server_http.c
1337
if ((kv = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
138
key.kv_key = "Authorization";
usr.sbin/httpd/server_http.c
140
if ((ba = kv_find(&desc->http_headers, &key)) == NULL ||
usr.sbin/httpd/server_http.c
1677
const char *key;
usr.sbin/httpd/server_http.c
1681
key = hdr->kv_parent->kv_key;
usr.sbin/httpd/server_http.c
1683
key = hdr->kv_key;
usr.sbin/httpd/server_http.c
1686
if (server_bufferevent_print(clt, key) == -1 ||
usr.sbin/httpd/server_http.c
1692
DPRINTF("%s: %s: %s", __func__, key,
usr.sbin/httpd/server_http.c
1854
struct kv key, *agent, *referrer, *xff, *xfp;
usr.sbin/httpd/server_http.c
1923
key.kv_key = "Referer"; /* sic */
usr.sbin/httpd/server_http.c
1924
if ((referrer = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
1928
key.kv_key = "User-Agent";
usr.sbin/httpd/server_http.c
1929
if ((agent = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
1980
key.kv_key = "X-Forwarded-For";
usr.sbin/httpd/server_http.c
1981
if ((xff = kv_find(&desc->http_headers, &key)) != NULL
usr.sbin/httpd/server_http.c
1989
key.kv_key = "X-Forwarded-Port";
usr.sbin/httpd/server_http.c
1990
if ((xfp = kv_find(&desc->http_headers, &key)) != NULL &&
usr.sbin/httpd/server_http.c
224
char *line = NULL, *key, *value;
usr.sbin/httpd/server_http.c
244
key = EVBUFFER_DATA(src);
usr.sbin/httpd/server_http.c
245
if (!isalpha((unsigned char)*key)) {
usr.sbin/httpd/server_http.c
272
key = line;
usr.sbin/httpd/server_http.c
286
value = strchr(key, ' ');
usr.sbin/httpd/server_http.c
287
else if (*key == ' ' || *key == '\t')
usr.sbin/httpd/server_http.c
292
value = strchr(key, ':');
usr.sbin/httpd/server_http.c
320
clt->clt_id, key, value);
usr.sbin/httpd/server_http.c
326
if ((desc->http_method = server_httpmethod_byname(key))
usr.sbin/httpd/server_http.c
382
strcasecmp("Content-Length", key) == 0) {
usr.sbin/httpd/server_http.c
398
if (strcasecmp("Transfer-Encoding", key) == 0 &&
usr.sbin/httpd/server_http.c
403
if ((hdr = kv_add(&desc->http_headers, key,
usr.sbin/ikectl/ikeca.c
1054
ca_setenv(const char *key, const char *value)
usr.sbin/ikectl/ikeca.c
1060
if (strcmp(ca_env[i][0], key) == 0) {
usr.sbin/ikectl/ikeca.c
1062
errx(1, "env %s already set: %s", key, value);
usr.sbin/ikectl/ikeca.c
1070
errx(1, "env %s invalid", key);
usr.sbin/ikectl/ikeca.c
225
char key[PATH_MAX];
usr.sbin/ikectl/ikeca.c
250
len = snprintf(key, sizeof(key), "%s/private/%s.key", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
251
if (len < 0 || (size_t)len >= sizeof(key))
usr.sbin/ikectl/ikeca.c
257
char *cmd[] = { PATH_OPENSSL, "req", "-new", "-key", key, "-out", path,
usr.sbin/ikectl/ikeca.c
455
char key[PATH_MAX];
usr.sbin/ikectl/ikeca.c
462
len = snprintf(key, sizeof(key), "%s/private/ca.key", ca->sslpath);
usr.sbin/ikectl/ikeca.c
463
if (len < 0 || (size_t)len >= sizeof(key))
usr.sbin/ikectl/ikeca.c
465
char *genrsa[] = { PATH_OPENSSL, "genrsa", "-aes256", "-out", key,
usr.sbin/ikectl/ikeca.c
469
chmod(key, 0600);
usr.sbin/ikectl/ikeca.c
478
char *reqcmd[] = { PATH_OPENSSL, "req", "-new", "-key", key,
usr.sbin/ikectl/ikeca.c
488
"-in", csr, "-signkey", key, "-sha256",
usr.sbin/ikectl/ikeca.c
725
char key[PATH_MAX];
usr.sbin/ikectl/ikeca.c
764
len = snprintf(key, sizeof(key), "%s/private/%s.key", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
765
if (len < 0 || (size_t)len >= sizeof(key))
usr.sbin/ikectl/ikeca.c
781
"-name", keyname, "-CAfile", cacrt, "-inkey", key,
usr.sbin/ikectl/ikeca.c
882
char *cmd[] = { PATH_OPENSSL, "rsa", "-out", dst, "-in", key,
usr.sbin/iscsid/connection.c
264
if (!strcmp((p)->key, #v)) { \
usr.sbin/iscsid/connection.c
268
(p)->key, (p)->value, err); \
usr.sbin/iscsid/connection.c
276
if (!strcmp((p)->key, #v)) { \
usr.sbin/iscsid/connection.c
280
(p)->key, (p)->value, err); \
usr.sbin/iscsid/connection.c
288
if (!strcmp((p)->key, #v)) { \
usr.sbin/iscsid/connection.c
292
(p)->key, (p)->value, err); \
usr.sbin/iscsid/connection.c
307
for (k = kvp; k->key; k++) {
usr.sbin/iscsid/connection.c
308
log_debug("conn_parse_kvp: %s = %s", k->key, k->value);
usr.sbin/iscsid/connection.c
341
(dst)->key = #k; \
usr.sbin/iscsid/connection.c
350
(dst)->key = #k; \
usr.sbin/iscsid/connection.c
360
(dst)->key = #k; \
usr.sbin/iscsid/connection.c
372
(dst)->key = #k; \
usr.sbin/iscsid/connection.c
381
(dst)->key = #k; \
usr.sbin/iscsid/connection.c
389
kvp_set_from_mine(struct kvp *kvp, const char *key, struct connection *c)
usr.sbin/iscsid/connection.c
394
free(kvp->key);
usr.sbin/iscsid/connection.c
395
kvp->key = NULL;
usr.sbin/iscsid/connection.c
402
if (!strcmp(key, "AuthMethod")) {
usr.sbin/iscsid/connection.c
403
kvp->key = "AuthMethod";
usr.sbin/iscsid/connection.c
407
GET_DIGEST_P(kvp, key, HeaderDigest, c, f);
usr.sbin/iscsid/connection.c
408
GET_DIGEST_P(kvp, key, DataDigest, c, f);
usr.sbin/iscsid/connection.c
409
GET_NUM_P(kvp, key, MaxConnections, c->session, f, e);
usr.sbin/iscsid/connection.c
410
GET_STR_C(kvp, key, TargetName, c->session, f);
usr.sbin/iscsid/connection.c
411
GET_STR_C(kvp, key, InitiatorName, c->session, f);
usr.sbin/iscsid/connection.c
412
GET_BOOL_P(kvp, key, InitialR2T, c->session, f);
usr.sbin/iscsid/connection.c
413
GET_BOOL_P(kvp, key, ImmediateData, c->session, f);
usr.sbin/iscsid/connection.c
414
GET_NUM_P(kvp, key, MaxRecvDataSegmentLength, c, f, e);
usr.sbin/iscsid/connection.c
415
GET_NUM_P(kvp, key, MaxBurstLength, c->session, f, e);
usr.sbin/iscsid/connection.c
416
GET_NUM_P(kvp, key, FirstBurstLength, c->session, f, e);
usr.sbin/iscsid/connection.c
417
GET_NUM_P(kvp, key, DefaultTime2Wait, c->session, f, e);
usr.sbin/iscsid/connection.c
418
GET_NUM_P(kvp, key, DefaultTime2Retain, c->session, f, e);
usr.sbin/iscsid/connection.c
419
GET_NUM_P(kvp, key, MaxOutstandingR2T, c->session, f, e);
usr.sbin/iscsid/connection.c
420
GET_BOOL_P(kvp, key, DataPDUInOrder, c->session, f);
usr.sbin/iscsid/connection.c
421
GET_BOOL_P(kvp, key, DataSequenceInOrder, c->session, f);
usr.sbin/iscsid/connection.c
422
GET_NUM_P(kvp, key, ErrorRecoveryLevel, c->session, f, e);
usr.sbin/iscsid/connection.c
423
GET_STYPE_C(kvp, key, SessionType, c->session, f);
usr.sbin/iscsid/initiator.c
568
for (k = kvp; k->key; k++) {
usr.sbin/iscsid/initiator.c
569
log_debug("%s\t=>\t%s", k->key, k->value);
usr.sbin/iscsid/iscsid.h
300
char *key;
usr.sbin/iscsid/pdu.c
122
k[i].key = buf;
usr.sbin/iscsid/pdu.c
66
while(k[nk].key) {
usr.sbin/iscsid/pdu.c
67
len += 2 + strlen(k[nk].key) + strlen(k[nk].value);
usr.sbin/iscsid/pdu.c
76
while(k[nk].key) {
usr.sbin/iscsid/pdu.c
77
n = snprintf(s, rem, "%s=%s", k[nk].key, k[nk].value);
usr.sbin/iscsid/util.c
200
for (k = kvp; k->key; k++) {
usr.sbin/iscsid/util.c
202
free(k->key);
usr.sbin/kvm_mkdb/nlist.c
219
key.data = (u_char *)buf;
usr.sbin/kvm_mkdb/nlist.c
220
key.size = strlen((char *)key.data);
usr.sbin/kvm_mkdb/nlist.c
221
if (db->put(db, &key, &data, 0))
usr.sbin/kvm_mkdb/nlist.c
224
if (strcmp((char *)key.data, VRS_SYM) == 0) {
usr.sbin/kvm_mkdb/nlist.c
273
key.data = (u_char *)VRS_KEY;
usr.sbin/kvm_mkdb/nlist.c
274
key.size = sizeof(VRS_KEY) - 1;
usr.sbin/kvm_mkdb/nlist.c
277
if (db->put(db, &key, &data, 0))
usr.sbin/kvm_mkdb/nlist.c
73
DBT data, key;
usr.sbin/ldapctl/ldapctl.c
143
struct btval key, val;
usr.sbin/ldapctl/ldapctl.c
174
bzero(&key, sizeof(key));
usr.sbin/ldapctl/ldapctl.c
192
rc = btree_cursor_get(cursor, &key, &val, BT_NEXT);
usr.sbin/ldapctl/ldapctl.c
197
rc = index_entry(ns, &key, elm);
usr.sbin/ldapctl/ldapctl.c
199
btval_reset(&key);
usr.sbin/ldapd/auth.c
38
struct btval key;
usr.sbin/ldapd/auth.c
47
key.size = strlen(dn);
usr.sbin/ldapd/auth.c
48
key.data = dn;
usr.sbin/ldapd/auth.c
57
if (!is_child_of(&key, aci->target))
usr.sbin/ldapd/auth.c
61
if (!has_suffix(&key, aci->target))
usr.sbin/ldapd/auth.c
74
if (!has_suffix(&key, aci->target))
usr.sbin/ldapd/auth.c
84
if (!has_suffix(&key, aci->target))
usr.sbin/ldapd/btest.c
100
key.size = strlen(key.data);
usr.sbin/ldapd/btest.c
107
maxkey.size = strlen(key.data);
usr.sbin/ldapd/btest.c
111
while ((rc = btree_cursor_get(cursor, &key, &data,
usr.sbin/ldapd/btest.c
113
if (argc > 2 && btree_cmp(bt, &key, &maxkey) > 0)
usr.sbin/ldapd/btest.c
116
key.size, (int)key.size, (char *)key.data);
usr.sbin/ldapd/btest.c
37
struct btval key, data, maxkey;
usr.sbin/ldapd/btest.c
60
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/btest.c
67
key.data = argv[1];
usr.sbin/ldapd/btest.c
68
key.size = strlen(key.data);
usr.sbin/ldapd/btest.c
71
rc = btree_put(bt, &key, &data, 0);
usr.sbin/ldapd/btest.c
79
key.data = argv[1];
usr.sbin/ldapd/btest.c
80
key.size = strlen(key.data);
usr.sbin/ldapd/btest.c
81
rc = btree_del(bt, &key, NULL);
usr.sbin/ldapd/btest.c
89
key.data = argv[1];
usr.sbin/ldapd/btest.c
90
key.size = strlen(key.data);
usr.sbin/ldapd/btest.c
91
rc = btree_get(bt, &key, &data);
usr.sbin/ldapd/btest.c
99
key.data = argv[1];
usr.sbin/ldapd/btree.c
1197
btree_search_node(struct btree *bt, struct mpage *mp, struct btval *key,
usr.sbin/ldapd/btree.c
1225
rc = bt->cmp(key, &nodekey);
usr.sbin/ldapd/btree.c
1227
rc = bt_cmp(bt, key, &nodekey, &mp->prefix);
usr.sbin/ldapd/btree.c
1370
btree_search_page_root(struct btree *bt, struct mpage *root, struct btval *key,
usr.sbin/ldapd/btree.c
1387
if (key == NULL) /* Initialize cursor to first page. */
usr.sbin/ldapd/btree.c
1391
node = btree_search_node(bt, mp, key, &exact, &i);
usr.sbin/ldapd/btree.c
1400
if (key)
usr.sbin/ldapd/btree.c
1402
i, (int)key->size, (char *)key->data);
usr.sbin/ldapd/btree.c
1430
key ? (int)key->size : 0, key ? (char *)key->data : NULL);
usr.sbin/ldapd/btree.c
1443
btree_search_page(struct btree *bt, struct btree_txn *txn, struct btval *key,
usr.sbin/ldapd/btree.c
1491
return btree_search_page_root(bt, mp, key, cursor, modify, mpp);
usr.sbin/ldapd/btree.c
1556
struct btval *key, struct btval *data)
usr.sbin/ldapd/btree.c
1562
assert(key);
usr.sbin/ldapd/btree.c
1564
DPRINTF("===> get key [%.*s]", (int)key->size, (char *)key->data);
usr.sbin/ldapd/btree.c
1579
if (key->size == 0 || key->size > MAXKEYSIZE) {
usr.sbin/ldapd/btree.c
1584
if ((rc = btree_search_page(bt, txn, key, NULL, 0, &mp)) != BT_SUCCESS)
usr.sbin/ldapd/btree.c
1587
leaf = btree_search_node(bt, mp, key, &exact, NULL);
usr.sbin/ldapd/btree.c
1648
struct btval *key)
usr.sbin/ldapd/btree.c
1650
if (key == NULL)
usr.sbin/ldapd/btree.c
1654
key->size = node->ksize + mp->prefix.len;
usr.sbin/ldapd/btree.c
1655
key->data = malloc(key->size);
usr.sbin/ldapd/btree.c
1656
if (key->data == NULL)
usr.sbin/ldapd/btree.c
1661
key->data, &key->size);
usr.sbin/ldapd/btree.c
1662
key->free_data = 1;
usr.sbin/ldapd/btree.c
1664
key->size = node->ksize;
usr.sbin/ldapd/btree.c
1665
key->data = NODEKEY(node);
usr.sbin/ldapd/btree.c
1666
key->free_data = 0;
usr.sbin/ldapd/btree.c
1667
key->mp = mp;
usr.sbin/ldapd/btree.c
1675
btree_cursor_next(struct cursor *cursor, struct btval *key, struct btval *data)
usr.sbin/ldapd/btree.c
1714
if (bt_set_key(cursor->bt, mp, leaf, key) != 0)
usr.sbin/ldapd/btree.c
1721
btree_cursor_set(struct cursor *cursor, struct btval *key, struct btval *data,
usr.sbin/ldapd/btree.c
1730
assert(key);
usr.sbin/ldapd/btree.c
1731
assert(key->size > 0);
usr.sbin/ldapd/btree.c
1733
rc = btree_search_page(cursor->bt, cursor->txn, key, cursor, 0, &mp);
usr.sbin/ldapd/btree.c
1739
leaf = btree_search_node(cursor->bt, mp, key, exactp, &top->ki);
usr.sbin/ldapd/btree.c
1763
if (bt_set_key(cursor->bt, mp, leaf, key) != 0)
usr.sbin/ldapd/btree.c
1766
(int)key->size, (char *)key->data);
usr.sbin/ldapd/btree.c
1772
btree_cursor_first(struct cursor *cursor, struct btval *key, struct btval *data)
usr.sbin/ldapd/btree.c
1790
if (bt_set_key(cursor->bt, mp, leaf, key) != 0)
usr.sbin/ldapd/btree.c
1797
btree_cursor_get(struct cursor *cursor, struct btval *key, struct btval *data,
usr.sbin/ldapd/btree.c
1810
if (key == NULL || key->size == 0 || key->size > MAXKEYSIZE) {
usr.sbin/ldapd/btree.c
1814
rc = btree_cursor_set(cursor, key, data, &exact);
usr.sbin/ldapd/btree.c
1816
rc = btree_cursor_set(cursor, key, data, NULL);
usr.sbin/ldapd/btree.c
1820
rc = btree_cursor_first(cursor, key, data);
usr.sbin/ldapd/btree.c
1822
rc = btree_cursor_next(cursor, key, data);
usr.sbin/ldapd/btree.c
1827
rc = btree_cursor_first(cursor, key, data);
usr.sbin/ldapd/btree.c
1875
bt_leaf_size(struct btree *bt, struct btval *key, struct btval *data)
usr.sbin/ldapd/btree.c
1879
sz = LEAFSIZE(key, data);
usr.sbin/ldapd/btree.c
1889
bt_branch_size(struct btree *bt, struct btval *key)
usr.sbin/ldapd/btree.c
1893
sz = INDXSIZE(key);
usr.sbin/ldapd/btree.c
1941
struct btval *key, struct btval *data, pgno_t pgno, uint8_t flags)
usr.sbin/ldapd/btree.c
1954
key ? (int)key->size : 0, key ? (char *)key->data : NULL,
usr.sbin/ldapd/btree.c
1956
mp->pgno, indx, key ? key->size : 0);
usr.sbin/ldapd/btree.c
1958
if (key != NULL)
usr.sbin/ldapd/btree.c
1959
node_size += key->size;
usr.sbin/ldapd/btree.c
2001
node->ksize = (key == NULL) ? 0 : key->size;
usr.sbin/ldapd/btree.c
2008
if (key)
usr.sbin/ldapd/btree.c
2009
bcopy(key->data, NODEKEY(node), key->size);
usr.sbin/ldapd/btree.c
2012
assert(key);
usr.sbin/ldapd/btree.c
2015
bcopy(data->data, node->data + key->size,
usr.sbin/ldapd/btree.c
2018
bcopy(data->data, node->data + key->size,
usr.sbin/ldapd/btree.c
2021
bcopy(&ofp->pgno, node->data + key->size,
usr.sbin/ldapd/btree.c
2113
struct btval *key)
usr.sbin/ldapd/btree.c
2126
(int)key->size, (char *)key->data,
usr.sbin/ldapd/btree.c
2129
if (key->size != node->ksize) {
usr.sbin/ldapd/btree.c
2130
delta = key->size - node->ksize;
usr.sbin/ldapd/btree.c
2148
node->ksize = key->size;
usr.sbin/ldapd/btree.c
2151
bcopy(key->data, NODEKEY(node), key->size);
usr.sbin/ldapd/btree.c
2162
struct btval key;
usr.sbin/ldapd/btree.c
2189
key.size = tmpkey.len;
usr.sbin/ldapd/btree.c
2190
key.data = tmpkey.str;
usr.sbin/ldapd/btree.c
2191
if (btree_update_key(bt, src, i, &key) != BT_SUCCESS)
usr.sbin/ldapd/btree.c
2209
struct btval key, data;
usr.sbin/ldapd/btree.c
2280
key.size = tmpkey.len;
usr.sbin/ldapd/btree.c
2281
key.data = tmpkey.str;
usr.sbin/ldapd/btree.c
2282
remove_prefix(bt, &key, dst->prefix.len);
usr.sbin/ldapd/btree.c
2285
rc = btree_add_node(bt, dst, dstindx, &key, &data, NODEPGNO(srcnode),
usr.sbin/ldapd/btree.c
2298
key.size = tmpkey.len;
usr.sbin/ldapd/btree.c
2299
key.data = tmpkey.str;
usr.sbin/ldapd/btree.c
2300
remove_prefix(bt, &key, src->parent->prefix.len);
usr.sbin/ldapd/btree.c
2303
src->pgno, (int)key.size, (char *)key.data);
usr.sbin/ldapd/btree.c
2305
&key) != BT_SUCCESS)
usr.sbin/ldapd/btree.c
2317
key.size = tmpkey.len;
usr.sbin/ldapd/btree.c
2318
key.data = tmpkey.str;
usr.sbin/ldapd/btree.c
2319
remove_prefix(bt, &key, dst->parent->prefix.len);
usr.sbin/ldapd/btree.c
2322
dst->pgno, (int)key.size, (char *)key.data);
usr.sbin/ldapd/btree.c
2324
&key) != BT_SUCCESS)
usr.sbin/ldapd/btree.c
235
struct mpage *root, struct btval *key,
usr.sbin/ldapd/btree.c
2379
struct btval key, data;
usr.sbin/ldapd/btree.c
239
struct btree_txn *txn, struct btval *key,
usr.sbin/ldapd/btree.c
2427
key.size = tmpkey.len;
usr.sbin/ldapd/btree.c
2428
key.data = tmpkey.str;
usr.sbin/ldapd/btree.c
2430
remove_prefix(bt, &key, dst->prefix.len);
usr.sbin/ldapd/btree.c
2433
rc = btree_add_node(bt, dst, NUMKEYS(dst), &key,
usr.sbin/ldapd/btree.c
2446
key.size = 0;
usr.sbin/ldapd/btree.c
2447
if (btree_update_key(bt, src->parent, 0, &key) != BT_SUCCESS)
usr.sbin/ldapd/btree.c
252
struct btval *key, int *exactp, unsigned int *kip);
usr.sbin/ldapd/btree.c
254
indx_t indx, struct btval *key, struct btval *data,
usr.sbin/ldapd/btree.c
2566
struct btval *key, struct btval *data)
usr.sbin/ldapd/btree.c
2573
DPRINTF("========> delete key %.*s", (int)key->size, (char *)key->data);
usr.sbin/ldapd/btree.c
2575
assert(key != NULL);
usr.sbin/ldapd/btree.c
2595
if (key->size == 0 || key->size > MAXKEYSIZE) {
usr.sbin/ldapd/btree.c
2606
if ((rc = btree_search_page(bt, txn, key, NULL, 1, &mp)) != BT_SUCCESS)
usr.sbin/ldapd/btree.c
2609
leaf = btree_search_node(bt, mp, key, &exact, &ki);
usr.sbin/ldapd/btree.c
263
indx_t indx, struct btval *key);
usr.sbin/ldapd/btree.c
282
struct node *node, struct btval *key);
usr.sbin/ldapd/btree.c
285
struct btval *key, struct btval *data);
usr.sbin/ldapd/btree.c
287
struct btval *key, struct btval *data, int *exactp);
usr.sbin/ldapd/btree.c
2885
struct btval *key, struct btval *data, unsigned int flags)
usr.sbin/ldapd/btree.c
289
struct btval *key, struct btval *data);
usr.sbin/ldapd/btree.c
2893
assert(key != NULL);
usr.sbin/ldapd/btree.c
2914
if (key->size == 0 || key->size > MAXKEYSIZE) {
usr.sbin/ldapd/btree.c
2920
(int)key->size, (char *)key->data, key->size, data->size);
usr.sbin/ldapd/btree.c
2928
rc = btree_search_page(bt, txn, key, NULL, 1, &mp);
usr.sbin/ldapd/btree.c
293
static void remove_prefix(struct btree *bt, struct btval *key,
usr.sbin/ldapd/btree.c
2930
leaf = btree_search_node(bt, mp, key, &exact, &ki);
usr.sbin/ldapd/btree.c
2934
(int)key->size, (char *)key->data);
usr.sbin/ldapd/btree.c
2966
xkey.data = key->data;
usr.sbin/ldapd/btree.c
2967
xkey.size = key->size;
usr.sbin/ldapd/btree.c
2969
if (SIZELEFT(mp) < bt_leaf_size(bt, key, data)) {
usr.sbin/ldapd/btree.c
303
static size_t bt_leaf_size(struct btree *bt, struct btval *key,
usr.sbin/ldapd/btree.c
305
static size_t bt_branch_size(struct btree *bt, struct btval *key);
usr.sbin/ldapd/btree.c
408
remove_prefix(struct btree *bt, struct btval *key, size_t pfxlen)
usr.sbin/ldapd/btree.c
414
(int)key->size, (char *)key->data);
usr.sbin/ldapd/btree.c
415
assert(pfxlen <= key->size);
usr.sbin/ldapd/btree.c
416
key->size -= pfxlen;
usr.sbin/ldapd/btree.c
418
key->data = (char *)key->data + pfxlen;
usr.sbin/ldapd/btree.h
112
struct btval *key, struct btval *data,
usr.sbin/ldapd/btree.h
87
struct btval *key, struct btval *data);
usr.sbin/ldapd/btree.h
89
struct btval *key, struct btval *data,
usr.sbin/ldapd/btree.h
92
struct btval *key, struct btval *data);
usr.sbin/ldapd/btree.h
94
#define btree_get(bt, key, data) \
usr.sbin/ldapd/btree.h
95
btree_txn_get(bt, NULL, key, data)
usr.sbin/ldapd/btree.h
96
#define btree_put(bt, key, data, flags) \
usr.sbin/ldapd/btree.h
97
btree_txn_put(bt, NULL, key, data, flags)
usr.sbin/ldapd/btree.h
98
#define btree_del(bt, key, data) \
usr.sbin/ldapd/btree.h
99
btree_txn_del(bt, NULL, key, data)
usr.sbin/ldapd/index.c
108
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/index.c
109
key.size = asprintf(&t, "%s=%s,%.*s", attr, s, dnsz,
usr.sbin/ldapd/index.c
111
if (key.size == (size_t)-1)
usr.sbin/ldapd/index.c
113
key.data = t;
usr.sbin/ldapd/index.c
114
normalize_dn(key.data);
usr.sbin/ldapd/index.c
115
rc = btree_txn_put(NULL, ns->indx_txn, &key, &val,
usr.sbin/ldapd/index.c
126
index_rdn_key(struct namespace *ns, struct btval *dn, struct btval *key)
usr.sbin/ldapd/index.c
131
memset(key, 0, sizeof(*key));
usr.sbin/ldapd/index.c
153
key->data = t;
usr.sbin/ldapd/index.c
154
key->size = strlen(t);
usr.sbin/ldapd/index.c
155
key->free_data = 1;
usr.sbin/ldapd/index.c
163
struct btval key, val;
usr.sbin/ldapd/index.c
172
if (index_rdn_key(ns, dn, &key) < 0)
usr.sbin/ldapd/index.c
175
log_debug("indexing rdn on %.*s", (int)key.size, (char *)key.data);
usr.sbin/ldapd/index.c
176
rc = btree_txn_put(NULL, ns->indx_txn, &key, &val, BT_NOOVERWRITE);
usr.sbin/ldapd/index.c
177
btval_reset(&key);
usr.sbin/ldapd/index.c
190
struct btval key;
usr.sbin/ldapd/index.c
207
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/index.c
208
key.size = asprintf(&t, "%s=%s,%.*s", attr, s, dnsz,
usr.sbin/ldapd/index.c
210
key.data = t;
usr.sbin/ldapd/index.c
211
normalize_dn(key.data);
usr.sbin/ldapd/index.c
212
rc = btree_txn_del(NULL, ns->indx_txn, &key, NULL);
usr.sbin/ldapd/index.c
243
struct btval key;
usr.sbin/ldapd/index.c
249
if (index_rdn_key(ns, dn, &key) < 0)
usr.sbin/ldapd/index.c
252
log_debug("unindexing rdn on %.*s", (int)key.size, (char *)key.data);
usr.sbin/ldapd/index.c
253
rc = btree_txn_del(NULL, ns->indx_txn, &key, NULL);
usr.sbin/ldapd/index.c
254
btval_reset(&key);
usr.sbin/ldapd/index.c
91
struct btval key, val;
usr.sbin/ldapd/ldapd.h
170
struct btval key;
usr.sbin/ldapd/ldapd.h
442
int is_child_of(struct btval *key, const char *base);
usr.sbin/ldapd/ldapd.h
473
int has_suffix(struct btval *key, const char *suffix);
usr.sbin/ldapd/ldapd.h
474
int has_prefix(struct btval *key, const char *prefix);
usr.sbin/ldapd/ldape.c
350
struct ssl key;
usr.sbin/ldapd/ldape.c
428
if (strlcpy(key.ssl_name, l->ssl_cert_name,
usr.sbin/ldapd/ldape.c
429
sizeof(key.ssl_name)) >= sizeof(key.ssl_name))
usr.sbin/ldapd/ldape.c
432
l->ssl = SPLAY_FIND(ssltree, conf->sc_ssl, &key);
usr.sbin/ldapd/modify.c
119
btval_reset(&key);
usr.sbin/ldapd/modify.c
34
struct btval key;
usr.sbin/ldapd/modify.c
77
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/modify.c
78
key.data = dn;
usr.sbin/ldapd/modify.c
79
key.size = strlen(dn);
usr.sbin/ldapd/modify.c
80
if (btree_cursor_get(cursor, &key, NULL, BT_CURSOR_EXACT) != 0) {
usr.sbin/ldapd/modify.c
86
btval_reset(&key);
usr.sbin/ldapd/modify.c
87
if (btree_cursor_get(cursor, &key, NULL, BT_NEXT) != 0) {
usr.sbin/ldapd/modify.c
90
} else if (has_suffix(&key, dn)) {
usr.sbin/ldapd/namespace.c
258
struct btval key;
usr.sbin/ldapd/namespace.c
266
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/namespace.c
269
key.data = dn;
usr.sbin/ldapd/namespace.c
270
key.size = strlen(dn);
usr.sbin/ldapd/namespace.c
272
if (btree_txn_get(ns->data_db, ns->data_txn, &key, &val) != 0) {
usr.sbin/ldapd/namespace.c
330
struct btval key, val;
usr.sbin/ldapd/namespace.c
336
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/namespace.c
337
key.data = dn;
usr.sbin/ldapd/namespace.c
338
key.size = strlen(dn);
usr.sbin/ldapd/namespace.c
343
rc = btree_txn_put(NULL, ns->data_txn, &key, &val,
usr.sbin/ldapd/namespace.c
355
if (update && (rc = unindex_entry(ns, &key, root)) != BT_SUCCESS)
usr.sbin/ldapd/namespace.c
358
rc = index_entry(ns, &key, root);
usr.sbin/ldapd/namespace.c
382
struct btval key, data;
usr.sbin/ldapd/namespace.c
388
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/namespace.c
391
key.data = dn;
usr.sbin/ldapd/namespace.c
392
key.size = strlen(key.data);
usr.sbin/ldapd/namespace.c
394
rc = btree_txn_del(NULL, ns->data_txn, &key, &data);
usr.sbin/ldapd/namespace.c
396
rc = unindex_entry(ns, &key, root);
usr.sbin/ldapd/parse.y
1238
struct ssl key;
usr.sbin/ldapd/parse.y
1243
if (strlcpy(key.ssl_name, name, sizeof(key.ssl_name))
usr.sbin/ldapd/parse.y
1244
>= sizeof(key.ssl_name)) {
usr.sbin/ldapd/parse.y
1249
s = SPLAY_FIND(ssltree, env->sc_ssl, &key);
usr.sbin/ldapd/parse.y
1259
(void)strlcpy(s->ssl_name, key.ssl_name, sizeof(s->ssl_name));
usr.sbin/ldapd/search.c
183
free(dn->key.data);
usr.sbin/ldapd/search.c
204
is_child_of(struct btval *key, const char *base)
usr.sbin/ldapd/search.c
209
if ((p = memchr(key->data, ',', key->size)) == NULL)
usr.sbin/ldapd/search.c
212
ksz = key->size - (p - (char *)key->data);
usr.sbin/ldapd/search.c
218
check_search_entry(struct btval *key, struct btval *val, struct search *search)
usr.sbin/ldapd/search.c
226
!is_child_of(key, search->basedn)) {
usr.sbin/ldapd/search.c
231
if ((dn0 = strndup(key->data, key->size)) == NULL) {
usr.sbin/ldapd/search.c
246
(int)key->size, (char *)key->data);
usr.sbin/ldapd/search.c
255
rc = search_result(key->data, key->size, elm, search);
usr.sbin/ldapd/search.c
265
mk_dup(struct search *search, struct btval *key)
usr.sbin/ldapd/search.c
272
if ((udn->key.data = malloc(key->size)) == NULL) {
usr.sbin/ldapd/search.c
276
bcopy(key->data, udn->key.data, key->size);
usr.sbin/ldapd/search.c
277
udn->key.size = key->size;
usr.sbin/ldapd/search.c
284
is_dup(struct search *search, struct btval *key)
usr.sbin/ldapd/search.c
288
find.key.data = key->data;
usr.sbin/ldapd/search.c
289
find.key.size = key->size;
usr.sbin/ldapd/search.c
302
struct btval key, ikey, val;
usr.sbin/ldapd/search.c
306
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/search.c
324
key.data = search->cindx->prefix;
usr.sbin/ldapd/search.c
329
key.data = search->basedn;
usr.sbin/ldapd/search.c
333
if (key.data) {
usr.sbin/ldapd/search.c
334
key.size = strlen(key.data);
usr.sbin/ldapd/search.c
342
rc = btree_cursor_get(search->cursor, &key, &val, op);
usr.sbin/ldapd/search.c
346
log_debug("found index %.*s", (int)key.size,
usr.sbin/ldapd/search.c
347
(char *)key.data);
usr.sbin/ldapd/search.c
349
if (!has_prefix(&key, search->cindx->prefix)) {
usr.sbin/ldapd/search.c
353
btval_reset(&key);
usr.sbin/ldapd/search.c
364
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/search.c
365
key.data = search->cindx->prefix;
usr.sbin/ldapd/search.c
366
key.size = strlen(key.data);
usr.sbin/ldapd/search.c
385
bcopy(&key, &ikey, sizeof(key));
usr.sbin/ldapd/search.c
386
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/search.c
389
rc = index_to_dn(search->ns, &ikey, &key);
usr.sbin/ldapd/search.c
397
(int)key.size, (char *)key.data);
usr.sbin/ldapd/search.c
401
!is_child_of(&key, search->basedn)) {
usr.sbin/ldapd/search.c
403
btval_reset(&key);
usr.sbin/ldapd/search.c
407
if (search->plan->indexed > 1 && is_dup(search, &key)) {
usr.sbin/ldapd/search.c
409
(int)key.size, (char *)key.data);
usr.sbin/ldapd/search.c
411
btval_reset(&key);
usr.sbin/ldapd/search.c
415
rc = btree_txn_get(NULL, search->data_txn, &key, &val);
usr.sbin/ldapd/search.c
420
(int)key.size, (char *)key.data);
usr.sbin/ldapd/search.c
421
btval_reset(&key);
usr.sbin/ldapd/search.c
426
btval_reset(&key);
usr.sbin/ldapd/search.c
43
if (a->key.size < b->key.size)
usr.sbin/ldapd/search.c
432
log_debug("found dn %.*s", (int)key.size, (char *)key.data);
usr.sbin/ldapd/search.c
434
if (!has_suffix(&key, search->basedn)) {
usr.sbin/ldapd/search.c
436
btval_reset(&key);
usr.sbin/ldapd/search.c
446
rc = check_search_entry(&key, &val, search);
usr.sbin/ldapd/search.c
449
rc = mk_dup(search, &key);
usr.sbin/ldapd/search.c
45
if (a->key.size > b->key.size)
usr.sbin/ldapd/search.c
451
btval_reset(&key);
usr.sbin/ldapd/search.c
47
return memcmp(a->key.data, b->key.data, a->key.size);
usr.sbin/ldapd/search.c
493
struct ber_element *root, *elm, *key, *val;
usr.sbin/ldapd/search.c
500
key = ober_add_string(elm, "objectClass");
usr.sbin/ldapd/search.c
501
val = ober_add_set(key);
usr.sbin/ldapd/search.c
505
key = ober_add_string(elm, "supportedLDAPVersion");
usr.sbin/ldapd/search.c
506
val = ober_add_set(key);
usr.sbin/ldapd/search.c
510
key = ober_add_string(elm, "namingContexts");
usr.sbin/ldapd/search.c
511
val = ober_add_set(key);
usr.sbin/ldapd/search.c
516
key = ober_add_string(elm, "supportedExtension");
usr.sbin/ldapd/search.c
517
val = ober_add_set(key);
usr.sbin/ldapd/search.c
521
key = ober_add_string(elm, "supportedFeatures");
usr.sbin/ldapd/search.c
522
val = ober_add_set(key);
usr.sbin/ldapd/search.c
527
key = ober_add_string(elm, "subschemaSubentry");
usr.sbin/ldapd/search.c
528
val = ober_add_set(key);
usr.sbin/ldapd/search.c
533
key = ober_add_string(elm, "supportedSASLMechanisms");
usr.sbin/ldapd/search.c
534
val = ober_add_set(key);
usr.sbin/ldapd/search.c
549
struct ber_element *root, *elm, *key, *val;
usr.sbin/ldapd/search.c
559
key = ober_add_string(elm, "objectClass");
usr.sbin/ldapd/search.c
560
val = ober_add_set(key);
usr.sbin/ldapd/search.c
565
key = ober_add_string(elm, "createTimestamp");
usr.sbin/ldapd/search.c
566
val = ober_add_set(key);
usr.sbin/ldapd/search.c
570
key = ober_add_string(elm, "modifyTimestamp");
usr.sbin/ldapd/search.c
571
val = ober_add_set(key);
usr.sbin/ldapd/search.c
575
key = ober_add_string(elm, "subschemaSubentry");
usr.sbin/ldapd/search.c
576
val = ober_add_set(key);
usr.sbin/ldapd/search.c
581
key = ober_add_string(elm, "objectClasses");
usr.sbin/ldapd/search.c
582
val = ober_add_set(key);
usr.sbin/ldapd/search.c
595
key = ober_add_string(elm, "attributeTypes");
usr.sbin/ldapd/search.c
596
val = ober_add_set(key);
usr.sbin/ldapd/search.c
609
key = ober_add_string(elm, "matchingRules");
usr.sbin/ldapd/search.c
610
val = ober_add_set(key);
usr.sbin/ldapd/search.c
960
struct btval key, val;
usr.sbin/ldapd/search.c
962
memset(&key, 0, sizeof(key));
usr.sbin/ldapd/search.c
964
key.data = search->basedn;
usr.sbin/ldapd/search.c
965
key.size = strlen(key.data);
usr.sbin/ldapd/search.c
967
if (btree_txn_get(NULL, search->data_txn, &key, &val) == 0) {
usr.sbin/ldapd/search.c
968
check_search_entry(&key, &val, search);
usr.sbin/ldapd/util.c
101
return (memcmp(key->data, prefix, pfxlen) == 0);
usr.sbin/ldapd/util.c
80
has_suffix(struct btval *key, const char *suffix)
usr.sbin/ldapd/util.c
86
if (key->size < slen)
usr.sbin/ldapd/util.c
88
return (bcmp((char *)key->data + key->size - slen, suffix, slen) == 0);
usr.sbin/ldapd/util.c
94
has_prefix(struct btval *key, const char *prefix)
usr.sbin/ldapd/util.c
99
if (pfxlen > key->size)
usr.sbin/ldpd/kroute.c
897
kroute_match(int af, union ldpd_addr *key)
usr.sbin/ldpd/kroute.c
917
ldp_applymask(af, &addr, key, i);
usr.sbin/ldpd/pfkey.c
341
char *key, uint32_t *spi)
usr.sbin/ldpd/pfkey.c
349
af, src, dst, *spi, 0, keylen, key, 0, 0, NULL, 0, 0) < 0)
usr.sbin/lldpd/lldpd.c
368
struct iface_key key = { .if_index = ifindex };
usr.sbin/lldpd/lldpd.c
370
return (RBT_FIND(ifaces, &lldpd->ifaces, (struct iface *)&key));
usr.sbin/lldpd/lldpd.c
589
struct iface_key key;
usr.sbin/lldpd/lldpd.c
617
key.if_index = sfrm.sfrm_ifindex;
usr.sbin/lldpd/lldpd.c
618
ifp = RBT_FIND(ifaces, &lldpd->ifaces, (struct iface *)&key);
usr.sbin/lpd/frontend.c
119
struct conn key, *conn;
usr.sbin/lpd/frontend.c
121
key.id = connid;
usr.sbin/lpd/frontend.c
122
conn = SPLAY_FIND(conntree, &conns, &key);
usr.sbin/lpd/frontend_lpr.c
141
struct lpr_conn *conn = NULL, key;
usr.sbin/lpd/frontend_lpr.c
146
key.id = imsg->hdr.peerid;
usr.sbin/lpd/frontend_lpr.c
147
if (key.id) {
usr.sbin/lpd/frontend_lpr.c
148
conn = SPLAY_FIND(lpr_conn_tree, &conns, &key);
usr.sbin/lpd/frontend_lpr.c
150
log_debug("%08x dead-session", key.id);
usr.sbin/lpd/lp_banner.c
1087
scnline(int key, char *p, int c)
usr.sbin/lpd/lp_banner.c
1092
key <<= 1;
usr.sbin/lpd/lp_banner.c
1093
*p++ = key & 0200 ? c : BACKGND;
usr.sbin/lpd/lp_stty.c
122
return (strcmp(((const struct key *)a)->name,
usr.sbin/lpd/lp_stty.c
123
((const struct key *)b)->name));
usr.sbin/lpd/lp_stty.c
130
struct key *kp, tmp;
usr.sbin/lpd/lp_stty.c
140
if (!(kp = (struct key *)bsearch(&tmp, keys,
usr.sbin/lpd/lp_stty.c
141
sizeof(keys)/sizeof(struct key), sizeof(struct key), c_key)))
usr.sbin/lpd/resolver.c
222
struct request key, *req;
usr.sbin/lpd/resolver.c
228
key.id = imsg->hdr.peerid;
usr.sbin/lpd/resolver.c
229
req = SPLAY_FIND(reqtree, &reqs, &key);
usr.sbin/lpr/lpd/key.c
109
if (!(kp = (struct key *)bsearch(&tmp, keys,
usr.sbin/lpr/lpd/key.c
110
sizeof(keys)/sizeof(struct key), sizeof(struct key), c_key)))
usr.sbin/lpr/lpd/key.c
92
return (strcmp(((struct key *)a)->name, ((struct key *)b)->name));
usr.sbin/lpr/lpd/key.c
99
struct key *kp, tmp;
usr.sbin/lpr/lpd/printjob.c
1040
scnline(int key, char *p, int c)
usr.sbin/lpr/lpd/printjob.c
1045
key <<= 1;
usr.sbin/lpr/lpd/printjob.c
1046
*p++ = key & 0200 ? c : BACKGND;
usr.sbin/makefs/cd9660/cd9660_eltorito.c
234
ve->key[0] = 0x55;
usr.sbin/makefs/cd9660/cd9660_eltorito.c
235
ve->key[1] = 0xAA;
usr.sbin/makefs/cd9660/cd9660_eltorito.c
250
ve->key[0], ve->key[1], checksum));
usr.sbin/makefs/cd9660/cd9660_eltorito.h
79
u_char key [ISODCL(0x1E,0x1F)];
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
197
DBT data, key;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
221
key.data = (u_char *) head->n_name;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
222
key.size = strlen(head->n_name) + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
225
switch ((db->put)(db, &key, &data,
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
297
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
299
key.data = (u_char *) name;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
300
key.size = strlen(name) + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
302
switch ((db->get)(db, &key, &data, 0)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
314
switch ((db->put)(db, &key, &data, R_NOOVERWRITE)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
348
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
371
key.data = (u_char *) name;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
372
key.size = strlen(name) + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
375
switch ((xdb->put)(xdb, &key, &data, R_NOOVERWRITE)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
392
key.data = (u_char *) e->n_name;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
393
key.size = strlen(e->n_name) + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
394
switch ((db->get)(db, &key, &data, 0)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
428
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
438
switch ((db->seq)(db, &key, &data, pos)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
442
ng_reventry(db, udb, fe, (char *) key.data, s, sl);
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
501
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
504
switch ((db->seq)(db, &key, &data, pos)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
506
str_append(str, (char *) key.data, ',');
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
527
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
532
switch ((db->seq)(db, &key, &data, pos)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
561
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
566
switch ((db->seq)(db, &key, &data, pos)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
572
(char *) key.data, buf.s_str ? buf.s_str : "");
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
594
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
599
switch ((idb->seq)(idb, &key, &data, pos)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
608
key.data = (u_char *) skey.s_str;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
609
key.size = skey.s_len + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
613
switch ((odb->put)(odb, &key, &data, R_NOOVERWRITE)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
648
DBT key, data;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
653
switch ((idb->seq)(idb, &key, &data, pos)) {
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
659
str_prepend(&skey, (char *) key.data, k);
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
661
key.data = (u_char *) skey.s_str;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
662
key.size = skey.s_len + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
666
switch ((odb->put)(odb, &key, &data, R_NOOVERWRITE)) {
usr.sbin/npppd/common/hash.c
113
if (htbl->cmp(w->key, k) == 0)
usr.sbin/npppd/common/hash.c
137
n->key = k;
usr.sbin/npppd/common/hash.c
160
if (htbl->cmp(w->key, k) == 0) {
usr.sbin/npppd/common/hash.h
36
const void *key;
usr.sbin/npppd/npppd/chap_ms.c
100
des_key[5] = get7bits(key, 35);
usr.sbin/npppd/npppd/chap_ms.c
101
des_key[6] = get7bits(key, 42);
usr.sbin/npppd/npppd/chap_ms.c
102
des_key[7] = get7bits(key, 49);
usr.sbin/npppd/npppd/chap_ms.c
108
mschap_des_encrypt(u_int8_t *clear, u_int8_t *key, u_int8_t *cipher)
usr.sbin/npppd/npppd/chap_ms.c
113
mschap_des_addparity(key, des_key);
usr.sbin/npppd/npppd/chap_ms.c
93
mschap_des_addparity(u_int8_t *key, u_int8_t *des_key)
usr.sbin/npppd/npppd/chap_ms.c
95
des_key[0] = get7bits(key, 0);
usr.sbin/npppd/npppd/chap_ms.c
96
des_key[1] = get7bits(key, 7);
usr.sbin/npppd/npppd/chap_ms.c
97
des_key[2] = get7bits(key, 14);
usr.sbin/npppd/npppd/chap_ms.c
98
des_key[3] = get7bits(key, 21);
usr.sbin/npppd/npppd/chap_ms.c
99
des_key[4] = get7bits(key, 28);
usr.sbin/npppd/npppd/mppe.c
591
rc4_key(void *rc4ctx, int lkey, u_char *key)
usr.sbin/npppd/npppd/mppe.c
594
RC4_set_key(rc4ctx, lkey, key);
usr.sbin/npppd/npppd/npppd.c
1512
hl->key = ppp1->username;
usr.sbin/npppd/npppd/radius_chap_const.h
57
char key[253];
usr.sbin/nsd/configparser.y
256
| key
usr.sbin/nsd/configparser.y
900
key:
usr.sbin/nsd/configparser.y
903
key_options_type *key = key_options_create(cfg_parser->opt->region);
usr.sbin/nsd/configparser.y
904
key->algorithm = region_strdup(cfg_parser->opt->region, "sha256");
usr.sbin/nsd/configparser.y
905
assert(cfg_parser->key == NULL);
usr.sbin/nsd/configparser.y
906
cfg_parser->key = key;
usr.sbin/nsd/configparser.y
910
struct key_options *key = cfg_parser->key;
usr.sbin/nsd/configparser.y
911
if(key->name == NULL) {
usr.sbin/nsd/configparser.y
913
} else if(key->algorithm == NULL) {
usr.sbin/nsd/configparser.y
914
yyerror("tsig key %s has no algorithm", key->name);
usr.sbin/nsd/configparser.y
915
} else if(key->secret == NULL) {
usr.sbin/nsd/configparser.y
916
yyerror("tsig key %s has no secret blob", key->name);
usr.sbin/nsd/configparser.y
917
} else if(key_options_find(cfg_parser->opt, key->name)) {
usr.sbin/nsd/configparser.y
918
yyerror("duplicate tsig key %s", key->name);
usr.sbin/nsd/configparser.y
920
key_options_insert(cfg_parser->opt, key);
usr.sbin/nsd/configparser.y
921
cfg_parser->key = NULL;
usr.sbin/nsd/configparser.y
934
cfg_parser->key->name = region_strdup(cfg_parser->opt->region, $2);
usr.sbin/nsd/configparser.y
946
cfg_parser->key->algorithm = region_strdup(cfg_parser->opt->region, $2);
usr.sbin/nsd/configparser.y
954
cfg_parser->key->secret = region_strdup(cfg_parser->opt->region, $2);
usr.sbin/nsd/configparser.y
958
cfg_parser->key->name?
usr.sbin/nsd/configparser.y
959
cfg_parser->key->name:"");
usr.sbin/nsd/dbaccess.c
371
const dname_type* dname = (const dname_type*)zopt->node.key;
usr.sbin/nsd/dbcreate.c
185
zone = namedb_find_zone(nsd->db, (const dname_type*)zopt->node.key);
usr.sbin/nsd/difffile.c
1849
void task_new_add_key(udb_base* udb, udb_ptr* last, struct key_options* key)
usr.sbin/nsd/difffile.c
1853
assert(key->name && key->algorithm && key->secret);
usr.sbin/nsd/difffile.c
1856
+strlen(key->name)+1+strlen(key->algorithm)+1+
usr.sbin/nsd/difffile.c
1857
strlen(key->secret)+1, NULL)) {
usr.sbin/nsd/difffile.c
1863
memmove(p, key->name, strlen(key->name)+1);
usr.sbin/nsd/difffile.c
1864
p+=strlen(key->name)+1;
usr.sbin/nsd/difffile.c
1865
memmove(p, key->algorithm, strlen(key->algorithm)+1);
usr.sbin/nsd/difffile.c
1866
p+=strlen(key->algorithm)+1;
usr.sbin/nsd/difffile.c
1867
memmove(p, key->secret, strlen(key->secret)+1);
usr.sbin/nsd/difffile.c
2126
struct key_options key;
usr.sbin/nsd/difffile.c
2127
key.name = (char*)task->zname;
usr.sbin/nsd/difffile.c
2128
DEBUG(DEBUG_IPC,1, (LOG_INFO, "addkey task %s", key.name));
usr.sbin/nsd/difffile.c
2129
key.algorithm = key.name + strlen(key.name)+1;
usr.sbin/nsd/difffile.c
2130
key.secret = key.algorithm + strlen(key.algorithm)+1;
usr.sbin/nsd/difffile.c
2131
key_options_add_modify(nsd->options, &key);
usr.sbin/nsd/difffile.c
2132
memset(key.secret, 0xdd, strlen(key.secret)); /* wipe secret */
usr.sbin/nsd/difffile.c
524
rr->owner->nsec3->nsec3_node.key &&
usr.sbin/nsd/difffile.c
565
domain->nsec3->hash_wc->hash.node.key &&
usr.sbin/nsd/difffile.c
579
domain->nsec3->ds_parent_hash->node.key &&
usr.sbin/nsd/difffile.c
599
|| !domain->nsec3->hash_wc->hash.node.key)
usr.sbin/nsd/difffile.c
606
|| !domain->nsec3->ds_parent_hash->node.key)
usr.sbin/nsd/difffile.c
642
(!rr->owner->nsec3 || !rr->owner->nsec3->nsec3_node.key)
usr.sbin/nsd/difffile.h
147
void task_new_add_key(udb_base* udb, udb_ptr* last, struct key_options* key);
usr.sbin/nsd/ixfr.c
131
struct rrcompress_entry key, *found;
usr.sbin/nsd/ixfr.c
132
key.node.key = &key;
usr.sbin/nsd/ixfr.c
133
key.dname = dname;
usr.sbin/nsd/ixfr.c
134
key.len = len;
usr.sbin/nsd/ixfr.c
135
found = (struct rrcompress_entry*)rbtree_search(&pcomp->tree, &key);
usr.sbin/nsd/ixfr.c
154
entry->node.key = entry;
usr.sbin/nsd/ixfr.c
1587
rbtree_delete(ixfr->data, data->node.key);
usr.sbin/nsd/ixfr.c
1605
data->node.key = &data->oldserial;
usr.sbin/nsd/ixfr.c
2195
rbtree_delete(table->names_to_domains, domain->node.key);
usr.sbin/nsd/lookup3.c
328
uint32_t hashlittle( const void *key, size_t length, uint32_t initval)
usr.sbin/nsd/lookup3.c
336
u.ptr = key;
usr.sbin/nsd/lookup3.c
338
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
usr.sbin/nsd/lookup3.c
406
const uint16_t *k = (const uint16_t *)key; /* read 16-bit chunks */
usr.sbin/nsd/lookup3.c
453
const uint8_t *k = (const uint8_t *)key;
usr.sbin/nsd/lookup3.c
523
const void *key, /* the key to hash */
usr.sbin/nsd/lookup3.c
535
u.ptr = key;
usr.sbin/nsd/lookup3.c
537
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
usr.sbin/nsd/lookup3.c
605
const uint16_t *k = (const uint16_t *)key; /* read 16-bit chunks */
usr.sbin/nsd/lookup3.c
652
const uint8_t *k = (const uint8_t *)key;
usr.sbin/nsd/lookup3.c
708
uint32_t hashbig( const void *key, size_t length, uint32_t initval)
usr.sbin/nsd/lookup3.c
716
u.ptr = key;
usr.sbin/nsd/lookup3.c
718
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
usr.sbin/nsd/lookup3.c
786
const uint8_t *k = (const uint8_t *)key;
usr.sbin/nsd/mini_event.c
326
ev->node.key = ev;
usr.sbin/nsd/namedb.c
163
if(!node->key || !tree)
usr.sbin/nsd/namedb.c
165
rbtree_delete(tree, node->key);
usr.sbin/nsd/namedb.c
167
node->key = NULL;
usr.sbin/nsd/namedb.c
229
if(domain->nsec3->nsec3_node.key)
usr.sbin/nsd/namedb.c
233
if(domain->nsec3->hash_wc->hash.node.key)
usr.sbin/nsd/namedb.c
236
if(domain->nsec3->hash_wc->wc.node.key)
usr.sbin/nsd/namedb.c
240
if(domain->nsec3->ds_parent_hash && domain->nsec3->ds_parent_hash->node.key)
usr.sbin/nsd/namedb.c
269
rbtree_delete(db->domains->names_to_domains, domain->node.key);
usr.sbin/nsd/namedb.c
302
if(node->key && node->key == domain
usr.sbin/nsd/namedb.c
306
node->key = domain;
usr.sbin/nsd/namedb.c
325
root->node.key
usr.sbin/nsd/namedb.c
39
result->node.key
usr.sbin/nsd/namedb.c
80
result->nsec3->nsec3_node.key = NULL;
usr.sbin/nsd/namedb.h
299
return (dname_type *) domain->node.key;
usr.sbin/nsd/namedb.h
309
return (const dname_type *) domain->node.key;
usr.sbin/nsd/nsd-checkconf.c
292
key_options_type* key = key_options_find(opt, k);
usr.sbin/nsd/nsd-checkconf.c
293
if(key) {
usr.sbin/nsd/nsd-checkconf.c
295
quote(key->secret);
usr.sbin/nsd/nsd-checkconf.c
297
quote(key->algorithm);
usr.sbin/nsd/nsd-checkconf.c
617
key_options_type* key;
usr.sbin/nsd/nsd-checkconf.c
797
RBTREE_FOR(key, key_options_type*, opt->keys)
usr.sbin/nsd/nsd-checkconf.c
800
print_string_var("name:", key->name);
usr.sbin/nsd/nsd-checkconf.c
801
print_string_var("algorithm:", key->algorithm);
usr.sbin/nsd/nsd-checkconf.c
802
print_string_var("secret:", key->secret);
usr.sbin/nsd/nsd-checkzone.c
65
zo->node.key = dname;
usr.sbin/nsd/nsd-mem.c
197
const dname_type* dname = (const dname_type*)zo->node.key;
usr.sbin/nsd/nsd.h
457
SSL_CTX* server_tls_ctx_setup(char* key, char* pem, char* verifypem);
usr.sbin/nsd/nsec3.c
144
domain->nsec3->hash_wc->hash.node.key = NULL;
usr.sbin/nsd/nsec3.c
145
domain->nsec3->hash_wc->wc.node.key = NULL;
usr.sbin/nsd/nsec3.c
162
domain->nsec3->ds_parent_hash->node.key = NULL;
usr.sbin/nsd/nsec3.c
351
if(domain->nsec3 && domain->nsec3->nsec3_node.key) {
usr.sbin/nsd/nsec3.c
357
return (domain_type*)r->key;
usr.sbin/nsd/nsec3.c
408
walk->nsec3->nsec3_node.key = NULL;
usr.sbin/nsd/nsec3.c
527
d.node.key = n;
usr.sbin/nsd/nsec3.c
540
*result = (domain_type*)r->key;
usr.sbin/nsd/nsec3.c
625
if(rbtree_last(zone->nsec3tree)->key == domain) {
usr.sbin/nsd/nsec3.c
709
hash_wc.hash.node.key = NULL;
usr.sbin/nsd/nsec3.c
710
hash_wc.wc.node.key = NULL;
usr.sbin/nsd/nsec3.c
712
ds_parent_hash.node.key = NULL;
usr.sbin/nsd/nsec3.c
743
hash_wc.hash.node.key = NULL;
usr.sbin/nsd/nsec3.c
744
hash_wc.wc.node.key = NULL;
usr.sbin/nsd/nsec3.c
746
ds_parent_hash.node.key = NULL;
usr.sbin/nsd/nsec3.c
783
((domain_type*)(p->key))->nsec3->nsec3_cover = nsec3;
usr.sbin/nsd/nsec3.c
784
((domain_type*)(p->key))->nsec3->nsec3_is_exact = 1;
usr.sbin/nsd/nsec3.c
789
((domain_type*)(pds->key))->nsec3->
usr.sbin/nsd/nsec3.c
791
((domain_type*)(pds->key))->nsec3->
usr.sbin/nsd/nsec3.c
814
((domain_type*)(p->key))->nsec3->nsec3_cover = nsec3;
usr.sbin/nsd/nsec3.c
815
((domain_type*)(p->key))->nsec3->nsec3_is_exact = 0;
usr.sbin/nsd/nsec3.c
819
((domain_type*)(pwc->key))->nsec3->
usr.sbin/nsd/nsec3.c
824
((domain_type*)(pds->key))->nsec3->
usr.sbin/nsd/nsec3.c
826
((domain_type*)(pds->key))->nsec3->
usr.sbin/nsd/nsec3.c
844
assert(domain->nsec3 && domain->nsec3->nsec3_node.key);
usr.sbin/nsd/nsec3.c
848
domain_type* end = (domain_type*)nx->key;
usr.sbin/nsd/nsec3.c
853
zone->nsec3tree)->key);
usr.sbin/nsd/options.c
1794
struct key_options* key;
usr.sbin/nsd/options.c
1795
key = (struct key_options*)region_alloc_zero(region,
usr.sbin/nsd/options.c
1797
return key;
usr.sbin/nsd/options.c
1809
key_options_insert(struct nsd_options* opt, struct key_options* key)
usr.sbin/nsd/options.c
1811
if(!key->name) return;
usr.sbin/nsd/options.c
1812
key->node.key = key->name;
usr.sbin/nsd/options.c
1813
(void)rbtree_insert(opt->keys, &key->node);
usr.sbin/nsd/options.c
1826
auth->node.key = auth->name;
usr.sbin/nsd/options.c
1838
key_options_desetup(region_type* region, struct key_options* key)
usr.sbin/nsd/options.c
1841
if(!key->tsig_key)
usr.sbin/nsd/options.c
1844
if(key->tsig_key->data) {
usr.sbin/nsd/options.c
1846
memset(key->tsig_key->data, 0xdd, key->tsig_key->size);
usr.sbin/nsd/options.c
1847
region_recycle(region, key->tsig_key->data,
usr.sbin/nsd/options.c
1848
key->tsig_key->size);
usr.sbin/nsd/options.c
1849
key->tsig_key->data = NULL;
usr.sbin/nsd/options.c
1850
key->tsig_key->size = 0;
usr.sbin/nsd/options.c
1856
key_options_setup(region_type* region, struct key_options* key)
usr.sbin/nsd/options.c
1860
if(!key->tsig_key) {
usr.sbin/nsd/options.c
1862
key->tsig_key = (tsig_key_type *) region_alloc(region,
usr.sbin/nsd/options.c
1865
key->tsig_key->name = dname_parse(region, key->name);
usr.sbin/nsd/options.c
1866
if(!key->tsig_key->name) {
usr.sbin/nsd/options.c
1868
key->name);
usr.sbin/nsd/options.c
1872
key->tsig_key->size = 0;
usr.sbin/nsd/options.c
1873
key->tsig_key->data = NULL;
usr.sbin/nsd/options.c
1875
size = __b64_pton(key->secret, data, sizeof(data));
usr.sbin/nsd/options.c
1878
key->name);
usr.sbin/nsd/options.c
1882
key->tsig_key->size = size;
usr.sbin/nsd/options.c
1883
key->tsig_key->data = (uint8_t *)region_alloc_init(region, data, size);
usr.sbin/nsd/options.c
1919
key_options_add_modify(struct nsd_options* opt, struct key_options* key)
usr.sbin/nsd/options.c
1921
struct key_options* orig = key_options_find(opt, key->name);
usr.sbin/nsd/options.c
1925
orig->name = region_strdup(opt->region, key->name);
usr.sbin/nsd/options.c
1926
orig->algorithm = region_strdup(opt->region, key->algorithm);
usr.sbin/nsd/options.c
1927
orig->secret = region_strdup(opt->region, key->secret);
usr.sbin/nsd/options.c
1936
orig->algorithm = region_strdup(opt->region, key->algorithm);
usr.sbin/nsd/options.c
1939
orig->secret = region_strdup(opt->region, key->secret);
usr.sbin/nsd/options.c
199
zone->node.key = dname;
usr.sbin/nsd/options.c
211
pat->node.key = pat->pname;
usr.sbin/nsd/options.c
2502
const dname_type* d = (const dname_type*)zone->node.key;
usr.sbin/nsd/options.c
253
cfg_parser->key = NULL;
usr.sbin/nsd/options.c
2693
parse_acl_info(region_type* region, char* ip, const char* key)
usr.sbin/nsd/options.c
2751
if(strcmp(key, "NOKEY")==0) {
usr.sbin/nsd/options.c
2755
} else if(strcmp(key, "BLOCKED")==0) {
usr.sbin/nsd/options.c
2762
acl->key_name = region_strdup(region, key);
usr.sbin/nsd/options.c
2955
n->node.key = region_strdup(opt->region, statname);
usr.sbin/nsd/options.c
2956
if(!n->node.key) {
usr.sbin/nsd/options.c
418
n->node.key = region_strdup(opt->region, "");
usr.sbin/nsd/options.c
419
if(!n->node.key) {
usr.sbin/nsd/options.c
452
b->node.key = &b->linesize;
usr.sbin/nsd/options.c
650
rbtree_delete(opt->zone_options, zone->node.key);
usr.sbin/nsd/options.c
651
region_recycle(opt->region, (void*)zone->node.key, dname_total_size(
usr.sbin/nsd/options.c
652
(dname_type*)zone->node.key));
usr.sbin/nsd/options.h
503
struct key_options *key;
usr.sbin/nsd/options.h
546
void key_options_insert(struct nsd_options* opt, struct key_options* key);
usr.sbin/nsd/options.h
550
void key_options_add_modify(struct nsd_options* opt, struct key_options* key);
usr.sbin/nsd/options.h
551
void key_options_setup(region_type* region, struct key_options* key);
usr.sbin/nsd/options.h
552
void key_options_desetup(region_type* region, struct key_options* key);
usr.sbin/nsd/options.h
646
const char* key);
usr.sbin/nsd/query.c
1417
(const dname_type*)q->zone->opts->node.key)
usr.sbin/nsd/query.c
437
dname_to_string(q->tsig.key->name, NULL), a);
usr.sbin/nsd/query.c
441
dname_to_string(q->tsig.key->name, NULL)));
usr.sbin/nsd/query.c
890
newdom->node.key
usr.sbin/nsd/query.c
917
newdom->node.key
usr.sbin/nsd/rbtree.c
220
if ((r = rbtree->cmp(data->key, node->key)) == 0) {
usr.sbin/nsd/rbtree.c
260
rbtree_search (rbtree_type *rbtree, const void *key)
usr.sbin/nsd/rbtree.c
269
if (rbtree_find_less_equal(rbtree, key, &node)) {
usr.sbin/nsd/rbtree.c
313
rbtree_delete(rbtree_type *rbtree, const void *key)
usr.sbin/nsd/rbtree.c
323
if((to_delete = rbtree_search(rbtree, key)) == 0) return 0;
usr.sbin/nsd/rbtree.c
505
rbtree_find_less_equal(rbtree_type *rbtree, const void *key, rbnode_type **result)
usr.sbin/nsd/rbtree.c
525
r = rbtree->cmp(key, node->key);
usr.sbin/nsd/rbtree.h
25
const void *key;
usr.sbin/nsd/rbtree.h
54
rbnode_type *rbtree_delete(rbtree_type *rbtree, const void *key);
usr.sbin/nsd/rbtree.h
55
rbnode_type *rbtree_search(rbtree_type *rbtree, const void *key);
usr.sbin/nsd/rbtree.h
58
int rbtree_find_less_equal(rbtree_type *rbtree, const void *key, rbnode_type **result);
usr.sbin/nsd/rbtree.h
66
(rbtree)->_node != RBTREE_NULL && ((k) = (rbtree)->_node->key) && \
usr.sbin/nsd/rdata.c
716
uint16_t key, count;
usr.sbin/nsd/rdata.c
722
key = buffer_read_u16(packet);
usr.sbin/nsd/rdata.c
724
if(count == 0 && svcparam_must_have_value(key))
usr.sbin/nsd/rdata.c
726
if(count != 0 && svcparam_must_not_have_value(key))
usr.sbin/nsd/rdata.c
966
uint16_t key, length;
usr.sbin/nsd/rdata.c
974
key = read_uint16(rdata + *offset);
usr.sbin/nsd/rdata.c
980
if(length == 0 && svcparam_must_have_value(key))
usr.sbin/nsd/rdata.c
982
if(length != 0 && svcparam_must_not_have_value(key))
usr.sbin/nsd/rdata.c
984
if (key < sizeof(svcparams)/sizeof(svcparams[0])) {
usr.sbin/nsd/rdata.c
985
if(!svcparams[key].print_rdata(output, key, rdata+*offset+4, length))
usr.sbin/nsd/rdata.c
991
buffer_printf(output, "key%" PRIu16, key);
usr.sbin/nsd/rdata.h
48
uint16_t key;
usr.sbin/nsd/remote.c
1002
dname_type*)zo->node.key);
usr.sbin/nsd/remote.c
1036
(const dname_type*)zo->node.key);
usr.sbin/nsd/remote.c
1038
xfrd->notify_zones, (const dname_type*)zo->node.key);
usr.sbin/nsd/remote.c
1048
(const dname_type*)zo->node.key);
usr.sbin/nsd/remote.c
1052
, zo->node.key);
usr.sbin/nsd/remote.c
1080
, zo->node.key);
usr.sbin/nsd/remote.c
2045
zone_opt->node.key);
usr.sbin/nsd/remote.c
2053
zone_opt->node.key);
usr.sbin/nsd/remote.c
2255
struct key_options* key;
usr.sbin/nsd/remote.c
2256
RBTREE_FOR(key, struct key_options*, xfrd->nsd->options->keys) {
usr.sbin/nsd/remote.c
2257
if(!ssl_printf(ssl, "key: name: \"%s\" secret: \"%s\" algorithm: %s\n", key->name, key->secret, key->algorithm))
usr.sbin/nsd/remote.c
3116
char* name = (char*)n->node.key;
usr.sbin/nsd/remote.c
908
xfrd->last_task, zo?(const dname_type*)zo->node.key:NULL);
usr.sbin/nsd/remote.c
921
xfrd->last_task, zo?(const dname_type*)zo->node.key:NULL);
usr.sbin/nsd/remote.c
935
xfrd->notify_zones, (const dname_type*)zo->node.key);
usr.sbin/nsd/remote.c
961
dname_type*)zo->node.key);
usr.sbin/nsd/server.c
2147
server_tls_ctx_setup(char* key, char* pem, char* verifypem)
usr.sbin/nsd/server.c
2235
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
usr.sbin/nsd/server.c
2236
log_msg(LOG_ERR, "error for private key file: %s", key);
usr.sbin/nsd/server.c
2242
log_msg(LOG_ERR, "error for key file: %s", key);
usr.sbin/nsd/server.c
2264
char *key, *pem;
usr.sbin/nsd/server.c
2267
key = nsd->options->tls_service_key;
usr.sbin/nsd/server.c
2269
if(!key || key[0] == 0) {
usr.sbin/nsd/server.c
2280
ctx = server_tls_ctx_setup(key, pem, verifypem);
usr.sbin/nsd/simdzone/src/generic/algorithm.h
139
memcpy(&name, algorithm->key.name, 8);
usr.sbin/nsd/simdzone/src/generic/algorithm.h
144
memcpy(&name, algorithm->key.name + 8, 8);
usr.sbin/nsd/simdzone/src/generic/algorithm.h
149
memcpy(&name, algorithm->key.name + 16, 8);
usr.sbin/nsd/simdzone/src/generic/algorithm.h
152
return matches & (length == algorithm->key.length) & (*number > 0);
usr.sbin/nsd/simdzone/src/generic/algorithm.h
19
} key;
usr.sbin/nsd/simdzone/src/generic/cert.h
19
} key;
usr.sbin/nsd/simdzone/src/generic/cert.h
96
memcpy(&name, certificate_type->key.name, 8);
usr.sbin/nsd/simdzone/src/generic/cert.h
99
(length == certificate_type->key.length) &
usr.sbin/nsd/simdzone/src/generic/parser.h
54
} key;
usr.sbin/nsd/simdzone/src/generic/parser.h
58
#define NAME(info) ((info)->name.key.data)
usr.sbin/nsd/simdzone/src/generic/parser.h
85
} key;
usr.sbin/nsd/simdzone/src/generic/parser.h
93
struct { string_t key; } name; // convenience
usr.sbin/nsd/simdzone/src/generic/svcb.h
1001
if (key == smaller_key)
usr.sbin/nsd/simdzone/src/generic/svcb.h
1018
parser, type, field, key, param, param->parse, &rdata_view, token)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
1026
key = htobe16(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
1027
memcpy(octets, &key, sizeof(key));
usr.sbin/nsd/simdzone/src/generic/svcb.h
155
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
163
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
194
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
203
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
230
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
239
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
262
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
271
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
302
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
310
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
342
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
349
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
374
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
383
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
423
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
433
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
438
#define SVC_PARAM(name, key, value, parse, parse_lax) \
usr.sbin/nsd/simdzone/src/generic/svcb.h
439
{ { { name, sizeof(name) - 1 }, key }, value, parse, parse_lax }
usr.sbin/nsd/simdzone/src/generic/svcb.h
489
const char *data, uint16_t *key, const svc_param_info_t **param)
usr.sbin/nsd/simdzone/src/generic/svcb.h
510
return (void)(*param = &svc_params[(*key = (uint16_t)number)]), length;
usr.sbin/nsd/simdzone/src/generic/svcb.h
512
return (void)(*key = (uint16_t)number), (void)(*param = &unknown_svc_param), length;
usr.sbin/nsd/simdzone/src/generic/svcb.h
518
const char *data, uint16_t *key, const svc_param_info_t **param)
usr.sbin/nsd/simdzone/src/generic/svcb.h
526
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_MANDATORY)]), 9;
usr.sbin/nsd/simdzone/src/generic/svcb.h
528
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_ALPN)]), 4;
usr.sbin/nsd/simdzone/src/generic/svcb.h
530
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_NO_DEFAULT_ALPN)]), 15;
usr.sbin/nsd/simdzone/src/generic/svcb.h
532
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_PORT)]), 4;
usr.sbin/nsd/simdzone/src/generic/svcb.h
534
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_IPV4HINT)]), 8;
usr.sbin/nsd/simdzone/src/generic/svcb.h
536
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_ECH)]), 3;
usr.sbin/nsd/simdzone/src/generic/svcb.h
538
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_IPV6HINT)]), 8;
usr.sbin/nsd/simdzone/src/generic/svcb.h
540
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_DOHPATH)]), 7;
usr.sbin/nsd/simdzone/src/generic/svcb.h
542
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_OHTTP)]), 5;
usr.sbin/nsd/simdzone/src/generic/svcb.h
544
return (void)(*param = &svc_params[(*key = ZONE_SVC_PARAM_KEY_TLS_SUPPORTED_GROUPS)]), 20;
usr.sbin/nsd/simdzone/src/generic/svcb.h
546
return scan_unknown_svc_param_key(data, key, param);
usr.sbin/nsd/simdzone/src/generic/svcb.h
553
const char *data, uint16_t *key)
usr.sbin/nsd/simdzone/src/generic/svcb.h
557
return scan_svc_param(data, key, &param);
usr.sbin/nsd/simdzone/src/generic/svcb.h
565
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
595
if (!(skip = scan_svc_param_key(data, &key)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
597
if (key < 64)
usr.sbin/nsd/simdzone/src/generic/svcb.h
598
keys = 1llu << key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
600
highest_key = key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
601
key = htobe16(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
602
memcpy(rdata->octets, &key, sizeof(key));
usr.sbin/nsd/simdzone/src/generic/svcb.h
603
rdata->octets += sizeof(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
607
if (!(skip = scan_svc_param_key(data + 1, &key)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
611
if (key < 64)
usr.sbin/nsd/simdzone/src/generic/svcb.h
612
keys |= 1llu << key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
615
if (key > highest_key) {
usr.sbin/nsd/simdzone/src/generic/svcb.h
616
highest_key = key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
617
key = htobe16(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
618
memcpy(rdata->octets, &key, 2);
usr.sbin/nsd/simdzone/src/generic/svcb.h
629
if (key <= smaller_key)
usr.sbin/nsd/simdzone/src/generic/svcb.h
636
if (key == smaller_key)
usr.sbin/nsd/simdzone/src/generic/svcb.h
638
assert(key < smaller_key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
641
key = htobe16(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
642
memcpy(octets, &key, 2);
usr.sbin/nsd/simdzone/src/generic/svcb.h
661
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
688
if (!(skip = scan_svc_param_key(data, &key)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
690
if (key < 64)
usr.sbin/nsd/simdzone/src/generic/svcb.h
691
keys |= 1llu << key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
701
key = htobe16(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
702
memcpy(rdata->octets, &key, 2);
usr.sbin/nsd/simdzone/src/generic/svcb.h
707
if (!(skip = scan_svc_param_key(data + 1, &key)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
711
if (key < 64)
usr.sbin/nsd/simdzone/src/generic/svcb.h
712
keys |= (1llu << key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
714
if ((int32_t)key <= highest_key) {
usr.sbin/nsd/simdzone/src/generic/svcb.h
723
if (key <= smaller_key)
usr.sbin/nsd/simdzone/src/generic/svcb.h
730
if (key == smaller_key)
usr.sbin/nsd/simdzone/src/generic/svcb.h
732
assert(key < smaller_key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
737
key = htobe16(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
738
memcpy(rdata->octets, &key, 2);
usr.sbin/nsd/simdzone/src/generic/svcb.h
778
uint16_t key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
779
memcpy(&key, keys, sizeof(key));
usr.sbin/nsd/simdzone/src/generic/svcb.h
783
if (key == 0)
usr.sbin/nsd/simdzone/src/generic/svcb.h
792
if (memcmp(parameters, &key, 2) == 0) {
usr.sbin/nsd/simdzone/src/generic/svcb.h
798
if (memcmp(parameter, &key, 2) == 0)
usr.sbin/nsd/simdzone/src/generic/svcb.h
821
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
853
return parse(parser, type, field, key, param, rdata, token);
usr.sbin/nsd/simdzone/src/generic/svcb.h
873
uint16_t key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
877
if (!(count = scan_svc_param(token->data, &key, &param)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
881
if (likely(key > highest_key))
usr.sbin/nsd/simdzone/src/generic/svcb.h
882
highest_key = key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
886
if (key < 64)
usr.sbin/nsd/simdzone/src/generic/svcb.h
887
keys |= (1llu << key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
90
uint16_t key,
usr.sbin/nsd/simdzone/src/generic/svcb.h
900
parser, type, field, key, param, param->parse_lax, rdata, value)) < 0)
usr.sbin/nsd/simdzone/src/generic/svcb.h
904
key = htobe16(key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
905
memcpy(octets, &key, sizeof(key));
usr.sbin/nsd/simdzone/src/generic/svcb.h
955
uint16_t key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
959
if (!(count = scan_svc_param(token->data, &key, &param)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
963
if (key < 64)
usr.sbin/nsd/simdzone/src/generic/svcb.h
964
keys |= (1llu << key);
usr.sbin/nsd/simdzone/src/generic/svcb.h
976
if (likely(key > highest_key)) {
usr.sbin/nsd/simdzone/src/generic/svcb.h
977
highest_key = key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
98
(void)key;
usr.sbin/nsd/simdzone/src/generic/svcb.h
981
parser, type, field, key, param, param->parse, rdata, value)))
usr.sbin/nsd/simdzone/src/generic/svcb.h
993
if (key <= smaller_key)
usr.sbin/nsd/simdzone/src/generic/type.h
147
memcpy(&name0, (*mnemonic)->key.data, 8);
usr.sbin/nsd/simdzone/src/generic/type.h
148
memcpy(&name1, (*mnemonic)->key.data + 8, 8);
usr.sbin/nsd/simdzone/src/generic/type.h
190
memcpy(&name0, (*mnemonic)->key.data, 8);
usr.sbin/nsd/simdzone/src/generic/type.h
191
memcpy(&name1, (*mnemonic)->key.data + 8, 8);
usr.sbin/nsd/simdzone/src/generic/wks.h
100
key &= mask;
usr.sbin/nsd/simdzone/src/generic/wks.h
102
if (key == TCP)
usr.sbin/nsd/simdzone/src/generic/wks.h
104
else if (key == UDP)
usr.sbin/nsd/simdzone/src/generic/wks.h
115
} key;
usr.sbin/nsd/simdzone/src/generic/wks.h
227
uint64_t key = input0 & upper_mask;
usr.sbin/nsd/simdzone/src/generic/wks.h
233
uint8_t index = service_hash(key & zero_mask0, length);
usr.sbin/nsd/simdzone/src/generic/wks.h
242
memcpy(&name0, services[index].key.name, 8);
usr.sbin/nsd/simdzone/src/generic/wks.h
243
memcpy(&name1, services[index].key.name+8, 8);
usr.sbin/nsd/simdzone/src/generic/wks.h
248
(services[index].key.length == length);
usr.sbin/nsd/simdzone/src/generic/wks.h
93
uint64_t key;
usr.sbin/nsd/simdzone/src/generic/wks.h
98
memcpy(&key, name, sizeof(key)); // safe, input is padded
usr.sbin/nsd/simdzone/src/generic/wks.h
99
key |= (key & 0x4040404040404040) >> 1; // convert to lower case
usr.sbin/nsd/simdzone/src/haswell/simd.h
49
static really_inline uint64_t simd_find_8x(const simd_8x_t *simd, char key)
usr.sbin/nsd/simdzone/src/haswell/simd.h
51
const __m256i k = _mm256_set1_epi8(key);
usr.sbin/nsd/simdzone/src/haswell/simd.h
73
static really_inline uint64_t simd_find_8x16(const simd_8x16_t *simd, char key)
usr.sbin/nsd/simdzone/src/haswell/simd.h
75
const __m128i k = _mm_set1_epi8(key);
usr.sbin/nsd/simdzone/src/haswell/simd.h
83
#define simd_find_8x32(simd, key) simd_find_8x(simd, key)
usr.sbin/nsd/simdzone/src/haswell/simd.h
93
static really_inline uint64_t simd_find_8x64(const simd_8x64_t *simd, char key)
usr.sbin/nsd/simdzone/src/haswell/simd.h
95
const __m256i k = _mm256_set1_epi8(key);
usr.sbin/nsd/simdzone/src/westmere/simd.h
102
static really_inline uint64_t simd_find_8x64(const simd_8x64_t *simd, char key)
usr.sbin/nsd/simdzone/src/westmere/simd.h
104
const __m128i k = _mm_set1_epi8(key);
usr.sbin/nsd/simdzone/src/westmere/simd.h
47
static really_inline uint64_t simd_find_8x(const simd_8x_t *simd, char key)
usr.sbin/nsd/simdzone/src/westmere/simd.h
49
const __m128i k = _mm_set1_epi8(key);
usr.sbin/nsd/simdzone/src/westmere/simd.h
65
#define simd_find_8x16(simd, key) simd_find_8x(simd, key)
usr.sbin/nsd/simdzone/src/westmere/simd.h
82
static really_inline uint64_t simd_find_8x32(const simd_8x32_t *simd, char key)
usr.sbin/nsd/simdzone/src/westmere/simd.h
84
const __m128i k = _mm_set1_epi8(key);
usr.sbin/nsd/simdzone/src/westmere/type.h
132
const __m128i compar = _mm_loadu_si128((const __m128i *)(*mnemonic)->key.data);
usr.sbin/nsd/simdzone/src/westmere/type.h
168
const __m128i compar = _mm_loadu_si128((const __m128i *)(*mnemonic)->key.data);
usr.sbin/nsd/tsig-openssl.c
215
tsig_key_type *key)
usr.sbin/nsd/tsig-openssl.c
220
HMAC_Init_ex(ctx, key->data, key->size, md, NULL);
usr.sbin/nsd/tsig-openssl.c
237
key->data, key->size);
usr.sbin/nsd/tsig-openssl.c
24
tsig_key_type *key);
usr.sbin/nsd/tsig.c
163
tsig_add_key(tsig_key_type *key)
usr.sbin/nsd/tsig.c
167
entry->key = key;
usr.sbin/nsd/tsig.c
168
entry->node.key = entry->key->name;
usr.sbin/nsd/tsig.c
173
tsig_del_key(tsig_key_type *key)
usr.sbin/nsd/tsig.c
176
if(!key) return;
usr.sbin/nsd/tsig.c
177
entry = (tsig_key_table_type*)rbtree_delete(tsig_key_table, key->name);
usr.sbin/nsd/tsig.c
188
return entry->key;
usr.sbin/nsd/tsig.c
328
tsig_key_type *key)
usr.sbin/nsd/tsig.c
336
tsig->key = key;
usr.sbin/nsd/tsig.c
345
tsig_key_type *key = NULL;
usr.sbin/nsd/tsig.c
353
assert(!tsig->key);
usr.sbin/nsd/tsig.c
355
key = (tsig_key_type*)tsig_find_key(tsig->key_name);
usr.sbin/nsd/tsig.c
370
if (!algorithm || !key) {
usr.sbin/nsd/tsig.c
377
|| (tsig->key && key != tsig->key))
usr.sbin/nsd/tsig.c
430
tsig->key = key;
usr.sbin/nsd/tsig.c
442
assert(tsig->key);
usr.sbin/nsd/tsig.c
447
tsig->key_name = tsig->key->name;
usr.sbin/nsd/tsig.c
469
tsig->key);
usr.sbin/nsd/tsig.c
82
tsig_key_type *key;
usr.sbin/nsd/tsig.h
113
tsig_key_type *key;
usr.sbin/nsd/tsig.h
142
void tsig_add_key(tsig_key_type *key);
usr.sbin/nsd/tsig.h
143
void tsig_del_key(tsig_key_type *key);
usr.sbin/nsd/tsig.h
197
tsig_key_type *key);
usr.sbin/nsd/tsig.h
81
tsig_key_type *key);
usr.sbin/nsd/xdp-dns-redirect_kern.c
18
__type(key, __u32);
usr.sbin/nsd/xfrd-catalog-zones.c
1132
(const dname_type*)xw->producer_zone->options->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
1158
(const dname_type*)xw->producer_zone->options->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
1187
producer_name = (dname_type*)producer_zone->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
187
xfrd->catalog_consumer_zones, zone->node.key))) {
usr.sbin/nsd/xfrd-catalog-zones.c
199
consumer_zone->node.key = zone->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
245
rbtree_first(&consumer_zone->member_ids)->key;
usr.sbin/nsd/xfrd-catalog-zones.c
258
&& consumer_zone->options && consumer_zone->options->node.key) {
usr.sbin/nsd/xfrd-catalog-zones.c
261
(const dname_type*)consumer_zone->options->node.key);
usr.sbin/nsd/xfrd-catalog-zones.c
350
const dname_type* dname = consumer_member_zone->options.node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
386
if (name && dname_compare(name, consumer_zone->node.key) != 0)
usr.sbin/nsd/xfrd-catalog-zones.c
388
name = consumer_zone->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
401
consumer_zone->options->node.key,
usr.sbin/nsd/xfrd-catalog-zones.c
437
rbtree_search(xfrd->catalog_consumer_zones, zone->node.key)))
usr.sbin/nsd/xfrd-catalog-zones.c
465
{ return node != RBTREE_NULL ? (struct catalog_member_zone*)node->key : NULL; }
usr.sbin/nsd/xfrd-catalog-zones.c
517
dname = (const dname_type*)consumer_zone->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
746
dname = (dname_type *)zopt->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
843
to_add->node.key = to_add;
usr.sbin/nsd/xfrd-catalog-zones.c
935
producer_name = (dname_type*)producer_zopt->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
945
producer_zone->node.key = producer_zopt->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
973
producer_name = producer_zone->node.key;
usr.sbin/nsd/xfrd-catalog-zones.c
992
cmz->node.key = cmz;
usr.sbin/nsd/xfrd-catalog-zones.c
999
to_add->member_zone_name = (dname_type*)cmz->options.node.key;
usr.sbin/nsd/xfrd-notify.c
101
not->node.key = not->apex;
usr.sbin/nsd/xfrd-notify.c
99
not->apex = options->node.key;
usr.sbin/nsd/xfrd-tcp.c
1651
tp->key.num_skip++;
usr.sbin/nsd/xfrd-tcp.c
1674
tp->key.num_skip++;
usr.sbin/nsd/xfrd-tcp.c
1700
tp->key.num_unused));
usr.sbin/nsd/xfrd-tcp.c
1703
if(tp->key.num_unused == 1 && set->tcp_waiting_first) {
usr.sbin/nsd/xfrd-tcp.c
1711
if(to_len == tp->key.ip_len && memcmp(&to, &tp->key.ip, to_len) == 0) {
usr.sbin/nsd/xfrd-tcp.c
1727
if(tp->key.num_unused >= tp->pipe_num || tp->key.num_skip >= tp->pipe_num - tp->key.num_unused)
usr.sbin/nsd/xfrd-tcp.c
1758
(void)rbtree_delete(xfrd->tcp_set->pipetree, &tp->key.node);
usr.sbin/nsd/xfrd-tcp.c
1785
(void)rbtree_insert(set->pipetree, &tp->key.node);
usr.sbin/nsd/xfrd-tcp.c
243
if(y->key.ip_len != x->key.ip_len)
usr.sbin/nsd/xfrd-tcp.c
245
return (int)y->key.ip_len - (int)x->key.ip_len;
usr.sbin/nsd/xfrd-tcp.c
246
r = memcmp(&x->key.ip, &y->key.ip, x->key.ip_len);
usr.sbin/nsd/xfrd-tcp.c
250
if(x->key.num_unused != y->key.num_unused) {
usr.sbin/nsd/xfrd-tcp.c
251
return (x->key.num_unused < y->key.num_unused) ? -1 : 1;
usr.sbin/nsd/xfrd-tcp.c
366
tp->key.node.key = tp;
usr.sbin/nsd/xfrd-tcp.c
367
tp->key.num_unused = tp->pipe_num;
usr.sbin/nsd/xfrd-tcp.c
368
tp->key.num_skip = 0;
usr.sbin/nsd/xfrd-tcp.c
386
tp->key.num_unused = tp->pipe_num;
usr.sbin/nsd/xfrd-tcp.c
406
struct xfrd_tcp_pipeline_id key;
usr.sbin/nsd/xfrd-tcp.c
408
memset(&key, 0, sizeof(key));
usr.sbin/nsd/xfrd-tcp.c
409
key.node.key = &key;
usr.sbin/nsd/xfrd-tcp.c
410
key.id = id;
usr.sbin/nsd/xfrd-tcp.c
411
n = rbtree_search(tp->zone_per_id, &key);
usr.sbin/nsd/xfrd-tcp.c
431
n->node.key = n;
usr.sbin/nsd/xfrd-tcp.c
440
struct xfrd_tcp_pipeline_id key;
usr.sbin/nsd/xfrd-tcp.c
442
memset(&key, 0, sizeof(key));
usr.sbin/nsd/xfrd-tcp.c
443
key.node.key = &key;
usr.sbin/nsd/xfrd-tcp.c
444
key.id = id;
usr.sbin/nsd/xfrd-tcp.c
445
node = rbtree_delete(tp->zone_per_id, &key);
usr.sbin/nsd/xfrd-tcp.c
457
struct xfrd_tcp_pipeline_id key;
usr.sbin/nsd/xfrd-tcp.c
459
memset(&key, 0, sizeof(key));
usr.sbin/nsd/xfrd-tcp.c
460
key.node.key = &key;
usr.sbin/nsd/xfrd-tcp.c
461
key.id = id;
usr.sbin/nsd/xfrd-tcp.c
462
n = rbtree_search(tp->zone_per_id, &key);
usr.sbin/nsd/xfrd-tcp.c
636
struct xfrd_tcp_pipeline_key k, *key=&k;
usr.sbin/nsd/xfrd-tcp.c
637
key->node.key = key;
usr.sbin/nsd/xfrd-tcp.c
638
key->ip_len = xfrd_acl_sockaddr_to(zone->master, &key->ip);
usr.sbin/nsd/xfrd-tcp.c
639
key->num_unused = set->tcp_pipeline;
usr.sbin/nsd/xfrd-tcp.c
641
if(rbtree_find_less_equal(set->pipetree, key, &sme)) {
usr.sbin/nsd/xfrd-tcp.c
647
r = (struct xfrd_tcp_pipeline*)sme->key;
usr.sbin/nsd/xfrd-tcp.c
649
if(r->key.ip_len != key->ip_len)
usr.sbin/nsd/xfrd-tcp.c
651
if(memcmp(&r->key.ip, &key->ip, key->ip_len) != 0)
usr.sbin/nsd/xfrd-tcp.c
654
if(r->key.num_unused == 0)
usr.sbin/nsd/xfrd-tcp.c
703
assert(tp->key.num_unused < tp->pipe_num && tp->key.num_unused >= 0);
usr.sbin/nsd/xfrd-tcp.c
706
tp->unused[tp->key.num_unused] = zone->query_id;
usr.sbin/nsd/xfrd-tcp.c
708
(void)rbtree_delete(xfrd->tcp_set->pipetree, &tp->key.node);
usr.sbin/nsd/xfrd-tcp.c
709
tp->key.num_unused++;
usr.sbin/nsd/xfrd-tcp.c
710
(void)rbtree_insert(xfrd->tcp_set->pipetree, &tp->key.node);
usr.sbin/nsd/xfrd-tcp.c
719
assert(tp->key.num_unused < tp->pipe_num); /* at least one 'in-use' */
usr.sbin/nsd/xfrd-tcp.c
720
assert(tp->pipe_num - tp->key.num_unused > tp->key.num_skip); /* at least one 'nonskip' */
usr.sbin/nsd/xfrd-tcp.c
800
assert(tp->key.num_unused > 0);
usr.sbin/nsd/xfrd-tcp.c
802
idx = random_generate(tp->key.num_unused);
usr.sbin/nsd/xfrd-tcp.c
804
tp->unused[idx] = tp->unused[tp->key.num_unused-1];
usr.sbin/nsd/xfrd-tcp.c
807
(void)rbtree_delete(set->pipetree, &tp->key.node);
usr.sbin/nsd/xfrd-tcp.c
808
tp->key.num_unused--;
usr.sbin/nsd/xfrd-tcp.c
809
(void)rbtree_insert(set->pipetree, &tp->key.node);
usr.sbin/nsd/xfrd-tcp.c
868
(void)rbtree_insert(set->pipetree, &tp->key.node);
usr.sbin/nsd/xfrd-tcp.c
972
tp->key.ip_len = xfrd_acl_sockaddr_to(zone->master, &tp->key.ip);
usr.sbin/nsd/xfrd-tcp.c
982
conn = connect(fd, (struct sockaddr*)&tp->key.ip, tp->key.ip_len);
usr.sbin/nsd/xfrd-tcp.h
130
struct xfrd_tcp_pipeline_key key;
usr.sbin/nsd/xfrd.c
529
xzone->apex = zone_opt->node.key;
usr.sbin/nsd/xfrd.c
576
xzone->node.key = xzone->apex;
usr.sbin/ocspcheck/http.c
441
if (strcmp(h[i].key, v))
usr.sbin/ocspcheck/http.c
546
h[hsz].key = "Status";
usr.sbin/ocspcheck/http.c
560
h[hsz].key = cp;
usr.sbin/ocspcheck/http.c
772
warnx("head: [%s]=[%s]", httph[i].key, httph[i].val);
usr.sbin/ocspcheck/http.h
42
const char *key;
usr.sbin/ocspcheck/ocspcheck.c
685
dspew(" [%s]=[%s]\n", hget->head[i].key, hget->head[i].val);
usr.sbin/ospf6d/kroute.c
864
kroute_match(struct in6_addr *key)
usr.sbin/ospf6d/kroute.c
872
inet6applymask(&ina, key, i);
usr.sbin/ospf6d/rde_lsdb.c
596
struct vertex key;
usr.sbin/ospf6d/rde_lsdb.c
599
key.ls_id = ntohl(ls_id);
usr.sbin/ospf6d/rde_lsdb.c
600
key.adv_rtr = ntohl(adv_rtr);
usr.sbin/ospf6d/rde_lsdb.c
601
key.type = ntohs(type);
usr.sbin/ospf6d/rde_lsdb.c
603
v = RB_FIND(lsa_tree, tree, &key);
usr.sbin/ospf6d/rde_lsdb.c
625
struct vertex key;
usr.sbin/ospf6d/rde_lsdb.c
628
key.ls_id = 0;
usr.sbin/ospf6d/rde_lsdb.c
629
key.adv_rtr = ntohl(rtr_id);
usr.sbin/ospf6d/rde_lsdb.c
630
key.type = LSA_TYPE_ROUTER;
usr.sbin/ospf6d/rde_lsdb.c
633
v = RB_NFIND(lsa_tree, &area->lsa_tree, &key);
usr.sbin/ospf6d/rde_lsdb.c
665
struct vertex key;
usr.sbin/ospf6d/rde_lsdb.c
668
key.ls_id = 0;
usr.sbin/ospf6d/rde_lsdb.c
669
key.adv_rtr = ntohl(lsa->hdr.adv_rtr);
usr.sbin/ospf6d/rde_lsdb.c
670
key.type = ntohs(lsa->hdr.type);
usr.sbin/ospf6d/rde_lsdb.c
674
v = RB_NFIND(lsa_tree, tree, &key);
usr.sbin/ospf6d/rde_lsdb.c
676
if (v->type != key.type ||
usr.sbin/ospf6d/rde_lsdb.c
677
v->adv_rtr != key.adv_rtr) {
usr.sbin/ospfd/auth.c
112
strncpy(digest, md->key, MD5_DIGEST_LENGTH);
usr.sbin/ospfd/auth.c
193
strncpy(digest, md->key, MD5_DIGEST_LENGTH);
usr.sbin/ospfd/auth.c
213
md_list_add(struct auth_md_head *head, u_int8_t keyid, char *key)
usr.sbin/ospfd/auth.c
219
strncpy(md->key, key, sizeof(md->key));
usr.sbin/ospfd/auth.c
227
strncpy(md->key, key, sizeof(md->key));
usr.sbin/ospfd/auth.c
243
strncpy(md->key, m->key, sizeof(md->key));
usr.sbin/ospfd/kroute.c
962
kroute_match(in_addr_t key)
usr.sbin/ospfd/kroute.c
969
if ((kr = kroute_find(key & prefixlen2mask(i), i,
usr.sbin/ospfd/ospfd.h
311
char key[MD5_DIGEST_LENGTH];
usr.sbin/ospfd/ospfe.c
440
md_list_add(&niface->auth_md_list, md.keyid, md.key);
usr.sbin/ospfd/rde_lsdb.c
514
struct vertex key;
usr.sbin/ospfd/rde_lsdb.c
517
key.ls_id = ntohl(ls_id);
usr.sbin/ospfd/rde_lsdb.c
518
key.adv_rtr = ntohl(adv_rtr);
usr.sbin/ospfd/rde_lsdb.c
519
key.type = type;
usr.sbin/ospfd/rde_lsdb.c
521
v = RB_FIND(lsa_tree, tree, &key);
usr.sbin/pwd_mkdb/pwd_mkdb.c
101
DBT data, key;
usr.sbin/pwd_mkdb/pwd_mkdb.c
202
key.data = (u_char *)buf;
usr.sbin/pwd_mkdb/pwd_mkdb.c
203
key.size = strlen(buf + 1) + 1;
usr.sbin/pwd_mkdb/pwd_mkdb.c
204
if ((dp->get)(dp, &key, &data, 0) == 0) {
usr.sbin/pwd_mkdb/pwd_mkdb.c
303
key.data = (u_char *)_PW_YPTOKEN;
usr.sbin/pwd_mkdb/pwd_mkdb.c
304
key.size = strlen(_PW_YPTOKEN);
usr.sbin/pwd_mkdb/pwd_mkdb.c
308
if ((edp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
usr.sbin/pwd_mkdb/pwd_mkdb.c
311
if (dp && (dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
usr.sbin/pwd_mkdb/pwd_mkdb.c
521
DBT data, key;
usr.sbin/pwd_mkdb/pwd_mkdb.c
530
key.data = (u_char *)tbuf;
usr.sbin/pwd_mkdb/pwd_mkdb.c
562
key.size = sizeof(olduid) + 1;
usr.sbin/pwd_mkdb/pwd_mkdb.c
563
(edp->del)(edp, &key, 0);
usr.sbin/pwd_mkdb/pwd_mkdb.c
565
(dp->del)(dp, &key, 0);
usr.sbin/pwd_mkdb/pwd_mkdb.c
575
key.size = sizeof(cnt) + 1;
usr.sbin/pwd_mkdb/pwd_mkdb.c
581
key.size = len + 1;
usr.sbin/pwd_mkdb/pwd_mkdb.c
586
key.size = sizeof(pw->pw_uid) + 1;
usr.sbin/pwd_mkdb/pwd_mkdb.c
616
if ((edp->put)(edp, &key, &data, dbmode) == -1)
usr.sbin/pwd_mkdb/pwd_mkdb.c
634
if ((dp->put)(dp, &key, &data, dbmode) == -1)
usr.sbin/radiusctl/chap_ms.c
100
des_key[5] = get7bits(key, 35);
usr.sbin/radiusctl/chap_ms.c
101
des_key[6] = get7bits(key, 42);
usr.sbin/radiusctl/chap_ms.c
102
des_key[7] = get7bits(key, 49);
usr.sbin/radiusctl/chap_ms.c
108
mschap_des_encrypt(u_int8_t *clear, u_int8_t *key, u_int8_t *cipher)
usr.sbin/radiusctl/chap_ms.c
113
mschap_des_addparity(key, des_key);
usr.sbin/radiusctl/chap_ms.c
93
mschap_des_addparity(u_int8_t *key, u_int8_t *des_key)
usr.sbin/radiusctl/chap_ms.c
95
des_key[0] = get7bits(key, 0);
usr.sbin/radiusctl/chap_ms.c
96
des_key[1] = get7bits(key, 7);
usr.sbin/radiusctl/chap_ms.c
97
des_key[2] = get7bits(key, 14);
usr.sbin/radiusctl/chap_ms.c
98
des_key[3] = get7bits(key, 21);
usr.sbin/radiusctl/chap_ms.c
99
des_key[4] = get7bits(key, 28);
usr.sbin/radiusd/chap_ms.c
100
des_key[5] = get7bits(key, 35);
usr.sbin/radiusd/chap_ms.c
101
des_key[6] = get7bits(key, 42);
usr.sbin/radiusd/chap_ms.c
102
des_key[7] = get7bits(key, 49);
usr.sbin/radiusd/chap_ms.c
108
mschap_des_encrypt(u_int8_t *clear, u_int8_t *key, u_int8_t *cipher)
usr.sbin/radiusd/chap_ms.c
113
mschap_des_addparity(key, des_key);
usr.sbin/radiusd/chap_ms.c
93
mschap_des_addparity(u_int8_t *key, u_int8_t *des_key)
usr.sbin/radiusd/chap_ms.c
95
des_key[0] = get7bits(key, 0);
usr.sbin/radiusd/chap_ms.c
96
des_key[1] = get7bits(key, 7);
usr.sbin/radiusd/chap_ms.c
97
des_key[2] = get7bits(key, 14);
usr.sbin/radiusd/chap_ms.c
98
des_key[3] = get7bits(key, 21);
usr.sbin/radiusd/chap_ms.c
99
des_key[4] = get7bits(key, 28);
usr.sbin/radiusd/parse.y
108
%type <v.string> key
usr.sbin/radiusd/parse.y
337
| MODULE SET STRING key str_l {
usr.sbin/radiusd/parse.y
367
| SET key str_l {
usr.sbin/radiusd/parse.y
386
key : STRING
usr.sbin/radiusd/radiusd_eap2mschap.c
299
struct access_req key;
usr.sbin/radiusd/radiusd_eap2mschap.c
413
memcpy(key.state, state, statesiz);
usr.sbin/radiusd/radiusd_eap2mschap.c
414
if ((req = RB_FIND(access_reqt, &self->eapt, &key)) == NULL) {
usr.sbin/radiusd/radiusd_file.c
485
uint8_t key[16];
usr.sbin/radiusd/radiusd_file.c
570
mschap_asymetric_startkey(master, rcvkey.key, 16, 0, 1);
usr.sbin/radiusd/radiusd_file.c
579
mschap_asymetric_startkey(master, sndkey.key, 16, 1, 1);
usr.sbin/radiusd/radiusd_ipcp.c
1336
struct assigned_ipv4 key, *ret;
usr.sbin/radiusd/radiusd_ipcp.c
1338
key.ipv4 = ina;
usr.sbin/radiusd/radiusd_ipcp.c
1339
ret = RB_FIND(assigned_ipv4_tree, &self->ipv4s, &key);
usr.sbin/radiusd/radiusd_ipcp.c
1407
} key;
usr.sbin/radiusd/radiusd_ipcp.c
1410
strlcpy(key.user.name, username, 256);
usr.sbin/radiusd/radiusd_ipcp.c
1411
elm = RB_FIND(user_tree, &self->users, &key.user);
usr.sbin/radiusd/radiusd_ipcp.c
1458
DBT key, val;
usr.sbin/radiusd/radiusd_ipcp.c
1471
key.data = "ipv4/";
usr.sbin/radiusd/radiusd_ipcp.c
1472
key.size = 5;
usr.sbin/radiusd/radiusd_ipcp.c
1473
if (db->seq(db, &key, &val, R_CURSOR) == 0) {
usr.sbin/radiusd/radiusd_ipcp.c
1475
if (key.size >= sizeof(keybuf))
usr.sbin/radiusd/radiusd_ipcp.c
1477
memcpy(keybuf, key.data, key.size);
usr.sbin/radiusd/radiusd_ipcp.c
1478
keybuf[key.size] = '\0';
usr.sbin/radiusd/radiusd_ipcp.c
1512
} while (db->seq(db, &key, &val, R_NEXT) == 0);
usr.sbin/radiusd/radiusd_ipcp.c
1523
DBT key, val;
usr.sbin/radiusd/radiusd_ipcp.c
1531
key.data = keybuf;
usr.sbin/radiusd/radiusd_ipcp.c
1532
key.size = strlen(keybuf);
usr.sbin/radiusd/radiusd_ipcp.c
1555
db->put(db, &key, &val, 0);
usr.sbin/radiusd/radiusd_ipcp.c
1563
DBT key;
usr.sbin/radiusd/radiusd_ipcp.c
1568
key.data = keybuf;
usr.sbin/radiusd/radiusd_ipcp.c
1569
key.size = strlen(keybuf);
usr.sbin/radiusd/radiusd_ipcp.c
1574
db->del(db, &key, 0);
usr.sbin/relayd/config.c
664
rule->rule_ctl.kvlen[i].key =
usr.sbin/relayd/config.c
669
rule->rule_ctl.kvlen[i].key;
usr.sbin/relayd/config.c
671
rule->rule_ctl.kvlen[i].key = -1;
usr.sbin/relayd/config.c
774
GETKV(i, key);
usr.sbin/relayd/parse.y
153
union hashkey key;
usr.sbin/relayd/parse.y
155
} key;
usr.sbin/relayd/parse.y
199
%type <v.key> hashkey
usr.sbin/relayd/parse.y
545
memcpy(&rdr->conf.key,
usr.sbin/relayd/parse.y
546
hashkey, sizeof(rdr->conf.key));
usr.sbin/relayd/parse.y
864
$$.key.data[0] = arc4random();
usr.sbin/relayd/parse.y
865
$$.key.data[1] = arc4random();
usr.sbin/relayd/parse.y
866
$$.key.data[2] = arc4random();
usr.sbin/relayd/parse.y
867
$$.key.data[3] = arc4random();
usr.sbin/relayd/parse.y
882
&$$.key.data[0], &$$.key.data[1],
usr.sbin/relayd/parse.y
883
&$$.key.data[2], &$$.key.data[3]) != 4) {
usr.sbin/relayd/parse.y
894
MD5Final((unsigned char *)$$.key.data,
usr.sbin/relayd/parse.y
896
HTONL($$.key.data[0]);
usr.sbin/relayd/parse.y
897
HTONL($$.key.data[1]);
usr.sbin/relayd/parse.y
898
HTONL($$.key.data[2]);
usr.sbin/relayd/parse.y
899
HTONL($$.key.data[3]);
usr.sbin/relayd/pfe_filter.c
483
memcpy(rio.rule.rdr.key.key32, rdr->conf.key.data,
usr.sbin/relayd/pfe_filter.c
484
sizeof(rio.rule.rdr.key.key32));
usr.sbin/relayd/relay_http.c
1180
struct kv *host, key;
usr.sbin/relayd/relay_http.c
1187
key.kv_key = "Host";
usr.sbin/relayd/relay_http.c
1188
host = kv_find(&desc->http_headers, &key);
usr.sbin/relayd/relay_http.c
1294
const char *key;
usr.sbin/relayd/relay_http.c
1301
key = hdr->kv_parent->kv_key;
usr.sbin/relayd/relay_http.c
1303
key = hdr->kv_key;
usr.sbin/relayd/relay_http.c
1306
if (relay_bufferevent_print(dst, key) == -1 ||
usr.sbin/relayd/relay_http.c
1312
DPRINTF("%s: %s: %s", __func__, key,
usr.sbin/relayd/relay_http.c
1495
struct kv *host, key;
usr.sbin/relayd/relay_http.c
1504
key.kv_key = "Host";
usr.sbin/relayd/relay_http.c
1505
host = kv_find(&desc->http_headers, &key);
usr.sbin/relayd/relay_http.c
1525
struct kv *kv = &rule->rule_kv[KEY_TYPE_COOKIE], key;
usr.sbin/relayd/relay_http.c
1534
key.kv_key = "Cookie";
usr.sbin/relayd/relay_http.c
1537
key.kv_key = "Set-Cookie";
usr.sbin/relayd/relay_http.c
1549
match = kv_find(&desc->http_headers, &key);
usr.sbin/relayd/relay_http.c
1607
struct kv *kv, *match, *kp, *mp, kvcopy, matchcopy, key;
usr.sbin/relayd/relay_http.c
1759
key.kv_key = "Host";
usr.sbin/relayd/relay_http.c
1760
host = kv_find(&desc->http_headers, &key);
usr.sbin/relayd/relay_http.c
190
char *line = NULL, *key, *value;
usr.sbin/relayd/relay_http.c
2019
char *key, *value;
usr.sbin/relayd/relay_http.c
2024
key = line;
usr.sbin/relayd/relay_http.c
2025
if ((value = strchr(key, ' ')) == NULL) {
usr.sbin/relayd/relay_http.c
2055
desc->http_version = strdup(key);
usr.sbin/relayd/relay_http.c
2085
desc->http_method = relay_httpmethod_byname(key);
usr.sbin/relayd/relay_http.c
285
key = desc->http_lastheader->kv_key;
usr.sbin/relayd/relay_http.c
289
con->se_id, key, value);
usr.sbin/relayd/relay_http.c
292
strcasecmp("Content-Length", key) == 0) {
usr.sbin/relayd/relay_http.c
359
if (strcasecmp("Transfer-Encoding", key) == 0) {
usr.sbin/relayd/relay_http.c
369
if (strcasecmp("Host", key) == 0) {
usr.sbin/relayd/relay_http.c
393
key = line;
usr.sbin/relayd/relay_http.c
401
if (!relay_http_header_name_valid(key)) {
usr.sbin/relayd/relay_http.c
407
unique = strcasecmp("Host", key) == 0;
usr.sbin/relayd/relay_http.c
409
if ((hdr = kv_add(&desc->http_headers, key,
usr.sbin/relayd/relay_http.c
944
char *val, *ptr, *key, *value;
usr.sbin/relayd/relay_http.c
954
key = ptr;
usr.sbin/relayd/relay_http.c
961
if (*key == '$')
usr.sbin/relayd/relay_http.c
965
strchr(key, '=')) == NULL ||
usr.sbin/relayd/relay_http.c
975
__func__, key, value, kv->kv_key, kv->kv_value,
usr.sbin/relayd/relay_http.c
976
strcasecmp(kv->kv_key, key));
usr.sbin/relayd/relay_http.c
978
if (strcasecmp(kv->kv_key, key) == 0 &&
usr.sbin/relayd/relay_udp.c
406
u_int16_t key;
usr.sbin/relayd/relay_udp.c
413
key = ntohs(hdr->dns_id);
usr.sbin/relayd/relay_udp.c
424
priv->dp_outkey = key;
usr.sbin/relayd/relay_udp.c
433
lpriv.dp_inkey = key;
usr.sbin/relayd/relay_udp.c
442
if (priv == NULL || key != priv->dp_inkey) {
usr.sbin/relayd/relayd.c
1893
struct relay_ticket_key key;
usr.sbin/relayd/relayd.c
1897
key.tt_keyrev = arc4random();
usr.sbin/relayd/relayd.c
1898
arc4random_buf(key.tt_key, sizeof(key.tt_key));
usr.sbin/relayd/relayd.c
1901
-1, -1, &key, sizeof(key));
usr.sbin/relayd/relayd.c
557
purge_key(char **key, off_t len)
usr.sbin/relayd/relayd.c
559
freezero(*key, len);
usr.sbin/relayd/relayd.c
561
*key = NULL;
usr.sbin/relayd/relayd.c
631
kv_add(struct kvtree *keys, char *key, char *value, int unique)
usr.sbin/relayd/relayd.c
635
if (key == NULL)
usr.sbin/relayd/relayd.c
639
if ((kv->kv_key = strdup(key)) == NULL)
usr.sbin/relayd/relayd.c
697
char *key = NULL;
usr.sbin/relayd/relayd.c
701
ret = vasprintf(&key, fmt, ap);
usr.sbin/relayd/relayd.c
707
kv->kv_key = key;
usr.sbin/relayd/relayd.c
829
const char *key;
usr.sbin/relayd/relayd.c
833
key = kv->kv_key == NULL ? "" : kv->kv_key;
usr.sbin/relayd/relayd.c
835
if (fnmatch(key, match->kv_key, FNM_CASEFOLD) == 0)
usr.sbin/relayd/relayd.c
847
kv_find_value(struct kvtree *keys, char *key, const char *value,
usr.sbin/relayd/relayd.c
854
kv.kv_key = key;
usr.sbin/relayd/relayd.c
882
DPRINTF("%s: matched %s: %s", __func__, key, value);
usr.sbin/relayd/relayd.h
309
ssize_t key;
usr.sbin/relayd/relayd.h
548
union hashkey key;
usr.sbin/relayd/ssl.c
53
EVP_PKEY *key = NULL;
usr.sbin/relayd/ssl.c
64
key = PEM_read_PrivateKey(fp, NULL, ssl_password_cb, pass);
usr.sbin/relayd/ssl.c
66
if (key == NULL)
usr.sbin/relayd/ssl.c
74
if (!PEM_write_bio_PrivateKey(bio, key, NULL, NULL, 0, NULL, NULL))
usr.sbin/relayd/ssl.c
83
EVP_PKEY_free(key);
usr.sbin/relayd/ssl.c
92
if (key != NULL)
usr.sbin/relayd/ssl.c
93
EVP_PKEY_free(key);
usr.sbin/ripd/auth.c
164
memcpy(digest, md->key, MD5_DIGEST_LENGTH);
usr.sbin/ripd/auth.c
257
memcpy(digest, md->key, MD5_DIGEST_LENGTH);
usr.sbin/ripd/auth.c
272
md_list_add(struct auth_md_head *head, u_int8_t keyid, char *key)
usr.sbin/ripd/auth.c
276
if (strlen(key) > MD5_DIGEST_LENGTH)
usr.sbin/ripd/auth.c
281
bzero(md->key, sizeof(md->key));
usr.sbin/ripd/auth.c
282
memcpy(md->key, key, strlen(key));
usr.sbin/ripd/auth.c
290
memcpy(md->key, key, strlen(key));
usr.sbin/ripd/auth.c
309
memcpy(md->key, m->key, sizeof(md->key));
usr.sbin/ripd/auth.c
47
MD5Update(&md5ctx, (void *)&md->key, MD5_DIGEST_LENGTH);
usr.sbin/ripd/kroute.c
560
kroute_match(in_addr_t key)
usr.sbin/ripd/kroute.c
567
if ((kr = kroute_find(key & prefixlen2mask(i),
usr.sbin/ripd/ripd.h
144
u_int8_t key[MD5_DIGEST_LENGTH];
usr.sbin/rpc.statd/statd.c
238
DBT key, data;
usr.sbin/rpc.statd/statd.c
250
key.data = hostname;
usr.sbin/rpc.statd/statd.c
251
key.size = ptr - hostname + 1;
usr.sbin/rpc.statd/statd.c
255
switch ((*db->put)(db, &key, &data, 0)) {
usr.sbin/rpc.statd/statd.c
277
DBT key, data;
usr.sbin/rpc.statd/statd.c
284
key.data = hostname;
usr.sbin/rpc.statd/statd.c
285
key.size = ptr - hostname + 1;
usr.sbin/rpc.statd/statd.c
286
switch ((*db->get)(db, &key, &data, 0)) {
usr.sbin/rpc.statd/statd.c
311
walk_one(int (*fun)(DBT *, HostInfo *, void *), DBT *key, DBT *data, void *ptr)
usr.sbin/rpc.statd/statd.c
314
if (key->size == undefkey.size &&
usr.sbin/rpc.statd/statd.c
315
memcmp(key->data, undefkey.data, key->size) == 0)
usr.sbin/rpc.statd/statd.c
322
return (*fun)(key, &h, ptr);
usr.sbin/rpc.statd/statd.c
334
DBT key, data;
usr.sbin/rpc.statd/statd.c
336
switch ((*db->seq)(db, &key, &data, R_FIRST)) {
usr.sbin/rpc.statd/statd.c
343
if (walk_one(fun, &key, &data, ptr) == -1)
usr.sbin/rpc.statd/statd.c
351
switch ((*db->seq)(db, &key, &data, R_NEXT)) {
usr.sbin/rpc.statd/statd.c
355
if (walk_one(fun, &key, &data, ptr) == -1)
usr.sbin/rpc.statd/statd.c
385
reset_host(DBT *key, HostInfo *hi, void *ptr)
usr.sbin/rpc.statd/statd.c
391
change_host((char *)key->data, hi);
usr.sbin/rpc.statd/statd.c
403
check_work(DBT *key, HostInfo *hi, void *ptr)
usr.sbin/rpc.statd/statd.c
415
unmon_host(DBT *key, HostInfo *hi, void *ptr)
usr.sbin/rpc.statd/statd.c
417
char *name = key->data;
usr.sbin/rpc.statd/statd.c
431
notify_one(DBT *key, HostInfo *hi, void *ptr)
usr.sbin/rpc.statd/statd.c
434
char *name = key->data;
usr.sbin/rpki-client/ometric.c
213
l->key = *keys;
usr.sbin/rpki-client/ometric.c
304
if (fprintf(out, "%s%s=\"%s\"", comma, l->key,
usr.sbin/rpki-client/ometric.c
33
const char *key;
usr.sbin/sa/extern.h
100
#define DB_SEQ(db, key, data, flags) \
usr.sbin/sa/extern.h
101
((*(db)->seq)((db), (key), (data), (flags)))
usr.sbin/sa/extern.h
94
#define DB_GET(db, key, data, flags) \
usr.sbin/sa/extern.h
95
((*(db)->get)((db), (key), (data), (flags)))
usr.sbin/sa/extern.h
96
#define DB_PUT(db, key, data, flags) \
usr.sbin/sa/extern.h
97
((*(db)->put)((db), (key), (data), (flags)))
usr.sbin/sa/pdb.c
115
DBT key, data;
usr.sbin/sa/pdb.c
121
key.data = &keydata;
usr.sbin/sa/pdb.c
122
key.size = strlen(keydata);
usr.sbin/sa/pdb.c
124
rv = DB_GET(pacct_db, &key, &data, 0);
usr.sbin/sa/pdb.c
134
memcpy(newci.ci_comm, key.data, key.size);
usr.sbin/sa/pdb.c
141
rv = DB_PUT(pacct_db, &key, &data, 0);
usr.sbin/sa/pdb.c
158
DBT key, data;
usr.sbin/sa/pdb.c
170
serr = DB_SEQ(pacct_db, &key, &data, R_FIRST);
usr.sbin/sa/pdb.c
176
nerr = DB_PUT(saved_pacct_db, &key, &data, 0);
usr.sbin/sa/pdb.c
183
serr = DB_SEQ(pacct_db, &key, &data, R_NEXT);
usr.sbin/sa/pdb.c
206
DBT key, data, ndata;
usr.sbin/sa/pdb.c
232
rv = DB_SEQ(pacct_db, &key, &data, R_FIRST);
usr.sbin/sa/pdb.c
257
next: rv = DB_SEQ(pacct_db, &key, &data, R_NEXT);
usr.sbin/sa/pdb.c
60
DBT key, data;
usr.sbin/sa/pdb.c
72
serr = DB_SEQ(saved_pacct_db, &key, &data, R_FIRST);
usr.sbin/sa/pdb.c
79
nerr = DB_PUT(pacct_db, &key, &data, 0);
usr.sbin/sa/pdb.c
86
serr = DB_SEQ(saved_pacct_db, &key, &data, R_NEXT);
usr.sbin/sa/usrdb.c
120
DBT key, data;
usr.sbin/sa/usrdb.c
126
key.data = &uid;
usr.sbin/sa/usrdb.c
127
key.size = sizeof(uid);
usr.sbin/sa/usrdb.c
129
rv = DB_GET(usracct_db, &key, &data, 0);
usr.sbin/sa/usrdb.c
155
rv = DB_PUT(usracct_db, &key, &data, 0);
usr.sbin/sa/usrdb.c
171
DBT key, data;
usr.sbin/sa/usrdb.c
187
serr = DB_SEQ(usracct_db, &key, &data, R_FIRST);
usr.sbin/sa/usrdb.c
193
nerr = DB_PUT(saved_usracct_db, &key, &data, 0);
usr.sbin/sa/usrdb.c
200
serr = DB_SEQ(usracct_db, &key, &data, R_NEXT);
usr.sbin/sa/usrdb.c
222
DBT key, data;
usr.sbin/sa/usrdb.c
227
rv = DB_SEQ(usracct_db, &key, &data, R_FIRST);
usr.sbin/sa/usrdb.c
258
rv = DB_SEQ(usracct_db, &key, &data, R_NEXT);
usr.sbin/sa/usrdb.c
63
DBT key, data;
usr.sbin/sa/usrdb.c
75
serr = DB_SEQ(saved_usracct_db, &key, &data, R_FIRST);
usr.sbin/sa/usrdb.c
82
nerr = DB_PUT(usracct_db, &key, &data, 0);
usr.sbin/sa/usrdb.c
89
serr = DB_SEQ(saved_usracct_db, &key, &data, R_NEXT);
usr.sbin/sasyncd/conf.y
112
key : STRING
usr.sbin/sasyncd/conf.y
221
| SHAREDKEY key
usr.sbin/smtpd/bounce.c
121
struct bounce_message key, *msg;
usr.sbin/smtpd/bounce.c
137
key.msgid = evpid_to_msgid(evpid);
usr.sbin/smtpd/bounce.c
138
key.bounce = evp.agent.bounce;
usr.sbin/smtpd/bounce.c
139
key.smtpname = evp.smtpname;
usr.sbin/smtpd/bounce.c
143
key.bounce.type = B_DELIVERED;
usr.sbin/smtpd/bounce.c
146
key.bounce.type = B_DELAYED;
usr.sbin/smtpd/bounce.c
149
key.bounce.type = B_FAILED;
usr.sbin/smtpd/bounce.c
152
key.bounce.dsn_ret = evp.dsn_ret;
usr.sbin/smtpd/bounce.c
153
key.bounce.ttl = evp.ttl;
usr.sbin/smtpd/bounce.c
154
msg = SPLAY_FIND(bounce_message_tree, &messages, &key);
usr.sbin/smtpd/bounce.c
157
msg->msgid = key.msgid;
usr.sbin/smtpd/bounce.c
158
msg->bounce = key.bounce;
usr.sbin/smtpd/control.c
116
m_get_string(&m, &key);
usr.sbin/smtpd/control.c
123
stat_backend->increment(key, val.u.counter);
usr.sbin/smtpd/control.c
124
control_digest_update(key, val.u.counter, 1);
usr.sbin/smtpd/control.c
129
m_get_string(&m, &key);
usr.sbin/smtpd/control.c
136
stat_backend->decrement(key, val.u.counter);
usr.sbin/smtpd/control.c
137
control_digest_update(key, val.u.counter, 0);
usr.sbin/smtpd/control.c
142
m_get_string(&m, &key);
usr.sbin/smtpd/control.c
149
stat_backend->set(key, &val);
usr.sbin/smtpd/control.c
369
control_digest_update(const char *key, size_t value, int incr)
usr.sbin/smtpd/control.c
375
if (!strcmp(key, "smtp.session")) {
usr.sbin/smtpd/control.c
381
else if (!strcmp(key, "scheduler.envelope")) {
usr.sbin/smtpd/control.c
387
else if (!strcmp(key, "scheduler.envelope.expired"))
usr.sbin/smtpd/control.c
389
else if (!strcmp(key, "scheduler.envelope.removed"))
usr.sbin/smtpd/control.c
391
else if (!strcmp(key, "scheduler.delivery.ok"))
usr.sbin/smtpd/control.c
393
else if (!strcmp(key, "scheduler.delivery.permfail"))
usr.sbin/smtpd/control.c
395
else if (!strcmp(key, "scheduler.delivery.tempfail"))
usr.sbin/smtpd/control.c
397
else if (!strcmp(key, "scheduler.delivery.loop"))
usr.sbin/smtpd/control.c
400
else if (!strcmp(key, "queue.bounce"))
usr.sbin/smtpd/control.c
418
char *key;
usr.sbin/smtpd/control.c
458
if (!stat_backend->iter(&kvp->iter, &key, &val))
usr.sbin/smtpd/control.c
461
(void)strlcpy(kvp->key, key, sizeof kvp->key);
usr.sbin/smtpd/control.c
77
const char *key;
usr.sbin/smtpd/crypto.c
174
EVP_DecryptInit_ex(ctx, EVP_aes_256_gcm(), NULL, cp.key, iv);
usr.sbin/smtpd/crypto.c
245
EVP_EncryptInit_ex(ctx, EVP_aes_256_gcm(), NULL, cp.key, iv);
usr.sbin/smtpd/crypto.c
301
EVP_DecryptInit_ex(ctx, EVP_aes_256_gcm(), NULL, cp.key, iv);
usr.sbin/smtpd/crypto.c
41
unsigned char key[KEY_SIZE];
usr.sbin/smtpd/crypto.c
45
crypto_setup(const char *key, size_t len)
usr.sbin/smtpd/crypto.c
53
memcpy(cp.key, key, sizeof cp.key);
usr.sbin/smtpd/crypto.c
92
EVP_EncryptInit_ex(ctx, EVP_aes_256_gcm(), NULL, cp.key, iv);
usr.sbin/smtpd/dict.c
100
struct dictentry key, *entry;
usr.sbin/smtpd/dict.c
102
key.key = k;
usr.sbin/smtpd/dict.c
103
if ((entry = SPLAY_FIND(_dict, &d->dict, &key)) == NULL)
usr.sbin/smtpd/dict.c
112
struct dictentry key, *entry;
usr.sbin/smtpd/dict.c
114
key.key = k;
usr.sbin/smtpd/dict.c
115
if ((entry = SPLAY_FIND(_dict, &d->dict, &key)) == NULL)
usr.sbin/smtpd/dict.c
124
struct dictentry key, *entry;
usr.sbin/smtpd/dict.c
127
key.key = k;
usr.sbin/smtpd/dict.c
128
if ((entry = SPLAY_FIND(_dict, &d->dict, &key)) == NULL)
usr.sbin/smtpd/dict.c
142
struct dictentry key, *entry;
usr.sbin/smtpd/dict.c
145
key.key = k;
usr.sbin/smtpd/dict.c
146
if ((entry = SPLAY_FIND(_dict, &d->dict, &key)) == NULL)
usr.sbin/smtpd/dict.c
183
*k = entry->key;
usr.sbin/smtpd/dict.c
202
*k = curr->key;
usr.sbin/smtpd/dict.c
215
struct dictentry *curr = *hdl, key;
usr.sbin/smtpd/dict.c
221
key.key = kfrom;
usr.sbin/smtpd/dict.c
222
curr = SPLAY_FIND(_dict, &d->dict, &key);
usr.sbin/smtpd/dict.c
224
SPLAY_INSERT(_dict, &d->dict, &key);
usr.sbin/smtpd/dict.c
225
curr = SPLAY_NEXT(_dict, &d->dict, &key);
usr.sbin/smtpd/dict.c
226
SPLAY_REMOVE(_dict, &d->dict, &key);
usr.sbin/smtpd/dict.c
235
*k = curr->key;
usr.sbin/smtpd/dict.c
262
return strcmp(a->key, b->key);
usr.sbin/smtpd/dict.c
30
const char *key;
usr.sbin/smtpd/dict.c
41
struct dictentry key;
usr.sbin/smtpd/dict.c
43
key.key = k;
usr.sbin/smtpd/dict.c
44
return (SPLAY_FIND(_dict, &d->dict, &key) != NULL);
usr.sbin/smtpd/dict.c
57
e->key = t = (char*)(e) + sizeof(*e);
usr.sbin/smtpd/dict.c
67
struct dictentry *entry, key;
usr.sbin/smtpd/dict.c
70
key.key = k;
usr.sbin/smtpd/dict.c
71
if ((entry = SPLAY_FIND(_dict, &d->dict, &key)) == NULL) {
usr.sbin/smtpd/expand.c
28
expand_lookup(struct expand *expand, struct expandnode *key)
usr.sbin/smtpd/expand.c
30
return RB_FIND(expandtree, &expand->tree, key);
usr.sbin/smtpd/limit.c
101
else if (!strcmp(key, "task-release"))
usr.sbin/smtpd/limit.c
56
limit_mta_set(struct mta_limits *limits, const char *key, int64_t value)
usr.sbin/smtpd/limit.c
58
if (!strcmp(key, "max-conn-per-host"))
usr.sbin/smtpd/limit.c
60
else if (!strcmp(key, "max-conn-per-route"))
usr.sbin/smtpd/limit.c
62
else if (!strcmp(key, "max-conn-per-source"))
usr.sbin/smtpd/limit.c
64
else if (!strcmp(key, "max-conn-per-connector"))
usr.sbin/smtpd/limit.c
66
else if (!strcmp(key, "max-conn-per-relay"))
usr.sbin/smtpd/limit.c
68
else if (!strcmp(key, "max-conn-per-domain"))
usr.sbin/smtpd/limit.c
71
else if (!strcmp(key, "conn-delay-host"))
usr.sbin/smtpd/limit.c
73
else if (!strcmp(key, "conn-delay-route"))
usr.sbin/smtpd/limit.c
75
else if (!strcmp(key, "conn-delay-source"))
usr.sbin/smtpd/limit.c
77
else if (!strcmp(key, "conn-delay-connector"))
usr.sbin/smtpd/limit.c
79
else if (!strcmp(key, "conn-delay-relay"))
usr.sbin/smtpd/limit.c
81
else if (!strcmp(key, "conn-delay-domain"))
usr.sbin/smtpd/limit.c
84
else if (!strcmp(key, "reconn-delay-route"))
usr.sbin/smtpd/limit.c
87
else if (!strcmp(key, "session-mail-max"))
usr.sbin/smtpd/limit.c
89
else if (!strcmp(key, "session-transaction-delay"))
usr.sbin/smtpd/limit.c
91
else if (!strcmp(key, "session-keepalive"))
usr.sbin/smtpd/limit.c
94
else if (!strcmp(key, "max-failures-per-session"))
usr.sbin/smtpd/limit.c
97
else if (!strcmp(key, "task-hiwat"))
usr.sbin/smtpd/limit.c
99
else if (!strcmp(key, "task-lowat"))
usr.sbin/smtpd/lka_filter.c
1042
filter_check_rdns_table(struct filter *filter, enum table_service kind, const char *key)
usr.sbin/smtpd/lka_filter.c
1049
if (table_match(filter->config->rdns_table, kind, key) > 0)
usr.sbin/smtpd/lka_filter.c
1056
filter_check_rdns_regex(struct filter *filter, const char *key)
usr.sbin/smtpd/lka_filter.c
1063
if (table_match(filter->config->rdns_regex, K_REGEX, key) > 0)
usr.sbin/smtpd/lka_filter.c
1069
filter_check_src_table(struct filter *filter, enum table_service kind, const char *key)
usr.sbin/smtpd/lka_filter.c
1076
if (table_match(filter->config->src_table, kind, key) > 0)
usr.sbin/smtpd/lka_filter.c
1082
filter_check_src_regex(struct filter *filter, const char *key)
usr.sbin/smtpd/lka_filter.c
1089
if (table_match(filter->config->src_regex, K_REGEX, key) > 0)
usr.sbin/smtpd/lka_filter.c
1095
filter_check_helo_table(struct filter *filter, enum table_service kind, const char *key)
usr.sbin/smtpd/lka_filter.c
1102
if (table_match(filter->config->helo_table, kind, key) > 0)
usr.sbin/smtpd/lka_filter.c
1108
filter_check_helo_regex(struct filter *filter, const char *key)
usr.sbin/smtpd/lka_filter.c
1115
if (table_match(filter->config->helo_regex, K_REGEX, key) > 0)
usr.sbin/smtpd/lka_filter.c
1134
filter_check_auth_table(struct filter *filter, enum table_service kind, const char *key)
usr.sbin/smtpd/lka_filter.c
1141
if (key && table_match(filter->config->auth_table, kind, key) > 0)
usr.sbin/smtpd/lka_filter.c
1148
filter_check_auth_regex(struct filter *filter, const char *key)
usr.sbin/smtpd/lka_filter.c
1155
if (key && table_match(filter->config->auth_regex, K_REGEX, key) > 0)
usr.sbin/smtpd/lka_filter.c
1162
filter_check_mail_from_table(struct filter *filter, enum table_service kind, const char *key)
usr.sbin/smtpd/lka_filter.c
1169
if (table_match(filter->config->mail_from_table, kind, key) > 0)
usr.sbin/smtpd/lka_filter.c
1175
filter_check_mail_from_regex(struct filter *filter, const char *key)
usr.sbin/smtpd/lka_filter.c
1182
if (table_match(filter->config->mail_from_regex, K_REGEX, key) > 0)
usr.sbin/smtpd/lka_filter.c
1188
filter_check_rcpt_to_table(struct filter *filter, enum table_service kind, const char *key)
usr.sbin/smtpd/lka_filter.c
1195
if (table_match(filter->config->rcpt_to_table, kind, key) > 0)
usr.sbin/smtpd/lka_filter.c
1201
filter_check_rcpt_to_regex(struct filter *filter, const char *key)
usr.sbin/smtpd/lka_filter.c
1208
if (table_match(filter->config->rcpt_to_regex, K_REGEX, key) > 0)
usr.sbin/smtpd/makemap.c
250
char *key, *val, *line = NULL;
usr.sbin/smtpd/makemap.c
275
&key, &val, &malformed) != -1) {
usr.sbin/smtpd/makemap.c
283
if (key == NULL)
usr.sbin/smtpd/makemap.c
289
r = add_mapentry(db, dbputs, key, val, lineno);
usr.sbin/smtpd/makemap.c
292
r = add_setentry(db, dbputs, key, lineno);
usr.sbin/smtpd/makemap.c
311
DBT key;
usr.sbin/smtpd/makemap.c
315
key.data = keyp;
usr.sbin/smtpd/makemap.c
316
key.size = strlen(keyp) + 1;
usr.sbin/smtpd/makemap.c
318
xlowercase(key.data, key.data, strlen(key.data) + 1);
usr.sbin/smtpd/makemap.c
319
if (db->get(db, &key, &val, 0) == 0) {
usr.sbin/smtpd/makemap.c
333
if (db->put(db, &key, &val, 0) == -1) {
usr.sbin/smtpd/makemap.c
352
DBT key;
usr.sbin/smtpd/makemap.c
359
key.data = keyp;
usr.sbin/smtpd/makemap.c
360
key.size = strlen(keyp) + 1;
usr.sbin/smtpd/makemap.c
361
xlowercase(key.data, key.data, strlen(key.data) + 1);
usr.sbin/smtpd/makemap.c
362
if (db->get(db, &key, &val, 0) == 0) {
usr.sbin/smtpd/makemap.c
367
if (db->put(db, &key, &val, 0) == -1) {
usr.sbin/smtpd/makemap.c
445
DBT key, val;
usr.sbin/smtpd/makemap.c
453
for (r = db->seq(db, &key, &val, R_FIRST); r == 0;
usr.sbin/smtpd/makemap.c
454
r = db->seq(db, &key, &val, R_NEXT)) {
usr.sbin/smtpd/makemap.c
455
keystr = key.data;
usr.sbin/smtpd/makemap.c
457
if (keystr[key.size - 1] == '\0')
usr.sbin/smtpd/makemap.c
458
key.size--;
usr.sbin/smtpd/makemap.c
461
printf("%.*s\t%.*s\n", (int)key.size, keystr,
usr.sbin/smtpd/mproc.c
480
const char *key;
usr.sbin/smtpd/mproc.c
490
while (dict_iter(d, &iter, &key, (void **)&value)) {
usr.sbin/smtpd/mproc.c
491
m_add_string(m, key);
usr.sbin/smtpd/mproc.c
621
const char *key;
usr.sbin/smtpd/mproc.c
630
m_get_string(m, &key);
usr.sbin/smtpd/mproc.c
634
dict_set(d, key, tmp);
usr.sbin/smtpd/mta.c
1803
struct mta_relay key, *r;
usr.sbin/smtpd/mta.c
1807
memset(&key, 0, sizeof key);
usr.sbin/smtpd/mta.c
1809
key.pki_name = dispatcher->u.remote.pki;
usr.sbin/smtpd/mta.c
1810
key.ca_name = dispatcher->u.remote.ca;
usr.sbin/smtpd/mta.c
1811
key.authtable = dispatcher->u.remote.auth;
usr.sbin/smtpd/mta.c
1812
key.sourcetable = dispatcher->u.remote.source;
usr.sbin/smtpd/mta.c
1813
key.helotable = dispatcher->u.remote.helo_source;
usr.sbin/smtpd/mta.c
1814
key.heloname = dispatcher->u.remote.helo;
usr.sbin/smtpd/mta.c
1815
key.srs = dispatcher->u.remote.srs;
usr.sbin/smtpd/mta.c
1818
key.domain = mta_domain(relayh->hostname, 1);
usr.sbin/smtpd/mta.c
1821
key.domain = mta_domain(e->dest.domain, 0);
usr.sbin/smtpd/mta.c
1823
key.backupname = dispatcher->u.remote.backupmx;
usr.sbin/smtpd/mta.c
1824
if (key.backupname == NULL)
usr.sbin/smtpd/mta.c
1825
key.backupname = e->smtpname;
usr.sbin/smtpd/mta.c
1829
key.tls = relayh->tls;
usr.sbin/smtpd/mta.c
1830
key.flags |= relayh->flags;
usr.sbin/smtpd/mta.c
1831
key.port = relayh->port;
usr.sbin/smtpd/mta.c
1832
key.authlabel = relayh->authlabel;
usr.sbin/smtpd/mta.c
1833
if (!key.authlabel[0])
usr.sbin/smtpd/mta.c
1834
key.authlabel = NULL;
usr.sbin/smtpd/mta.c
1836
if ((r = SPLAY_FIND(mta_relay_tree, &relays, &key)) == NULL) {
usr.sbin/smtpd/mta.c
1841
r->tls = key.tls;
usr.sbin/smtpd/mta.c
1842
r->flags = key.flags;
usr.sbin/smtpd/mta.c
1843
r->domain = key.domain;
usr.sbin/smtpd/mta.c
1844
r->backupname = key.backupname ?
usr.sbin/smtpd/mta.c
1845
xstrdup(key.backupname) : NULL;
usr.sbin/smtpd/mta.c
1847
r->port = key.port;
usr.sbin/smtpd/mta.c
1848
r->pki_name = key.pki_name ? xstrdup(key.pki_name) : NULL;
usr.sbin/smtpd/mta.c
1849
r->ca_name = key.ca_name ? xstrdup(key.ca_name) : NULL;
usr.sbin/smtpd/mta.c
1850
if (key.authtable)
usr.sbin/smtpd/mta.c
1851
r->authtable = xstrdup(key.authtable);
usr.sbin/smtpd/mta.c
1852
if (key.authlabel)
usr.sbin/smtpd/mta.c
1853
r->authlabel = xstrdup(key.authlabel);
usr.sbin/smtpd/mta.c
1854
if (key.sourcetable)
usr.sbin/smtpd/mta.c
1855
r->sourcetable = xstrdup(key.sourcetable);
usr.sbin/smtpd/mta.c
1856
if (key.helotable)
usr.sbin/smtpd/mta.c
1857
r->helotable = xstrdup(key.helotable);
usr.sbin/smtpd/mta.c
1858
if (key.heloname)
usr.sbin/smtpd/mta.c
1859
r->heloname = xstrdup(key.heloname);
usr.sbin/smtpd/mta.c
1860
r->srs = key.srs;
usr.sbin/smtpd/mta.c
1864
mta_domain_unref(key.domain); /* from here */
usr.sbin/smtpd/mta.c
2181
struct mta_host key, *h;
usr.sbin/smtpd/mta.c
2185
key.sa = (struct sockaddr*)&ss;
usr.sbin/smtpd/mta.c
2186
h = SPLAY_FIND(mta_host_tree, &hosts, &key);
usr.sbin/smtpd/mta.c
2247
struct mta_domain key, *d;
usr.sbin/smtpd/mta.c
2249
key.name = name;
usr.sbin/smtpd/mta.c
2250
key.as_host = as_host;
usr.sbin/smtpd/mta.c
2251
d = SPLAY_FIND(mta_domain_tree, &domains, &key);
usr.sbin/smtpd/mta.c
2310
struct mta_source key, *s;
usr.sbin/smtpd/mta.c
2315
key.sa = (struct sockaddr*)&ss;
usr.sbin/smtpd/mta.c
2317
key.sa = NULL;
usr.sbin/smtpd/mta.c
2318
s = SPLAY_FIND(mta_source_tree, &sources, &key);
usr.sbin/smtpd/mta.c
2429
struct mta_route key, *r;
usr.sbin/smtpd/mta.c
2432
key.src = src;
usr.sbin/smtpd/mta.c
2433
key.dst = dst;
usr.sbin/smtpd/mta.c
2434
r = SPLAY_FIND(mta_route_tree, &routes, &key);
usr.sbin/smtpd/mta.c
2554
struct mta_block key, *b;
usr.sbin/smtpd/mta.c
2556
key.source = src;
usr.sbin/smtpd/mta.c
2557
key.domain = dom;
usr.sbin/smtpd/mta.c
2559
b = SPLAY_FIND(mta_block_tree, &blocks, &key);
usr.sbin/smtpd/mta.c
2574
struct mta_block key, *b;
usr.sbin/smtpd/mta.c
2576
key.source = src;
usr.sbin/smtpd/mta.c
2577
key.domain = dom;
usr.sbin/smtpd/mta.c
2579
b = SPLAY_FIND(mta_block_tree, &blocks, &key);
usr.sbin/smtpd/mta.c
2593
struct mta_block key;
usr.sbin/smtpd/mta.c
2595
key.source = src;
usr.sbin/smtpd/mta.c
2596
key.domain = dom;
usr.sbin/smtpd/mta.c
2598
if (SPLAY_FIND(mta_block_tree, &blocks, &key))
usr.sbin/smtpd/mta.c
460
const char *key;
usr.sbin/smtpd/mta.c
464
while (dict_iter(env->sc_dispatchers, &iter, &key, (void **)&dispatcher)) {
usr.sbin/smtpd/mta.c
465
log_debug("%s: %s", __func__, key);
usr.sbin/smtpd/resolver.c
302
struct request key, *req;
usr.sbin/smtpd/resolver.c
311
key.id = imsg->hdr.peerid;
usr.sbin/smtpd/resolver.c
312
req = SPLAY_FIND(reqtree, &reqs, &key);
usr.sbin/smtpd/ruleset.c
171
const char *key;
usr.sbin/smtpd/ruleset.c
181
if ((key = mailaddr_to_text(&evp->sender)) == NULL)
usr.sbin/smtpd/ruleset.c
185
ret = table_match(table, service, key);
usr.sbin/smtpd/ruleset.c
194
const char *key;
usr.sbin/smtpd/ruleset.c
204
if ((key = mailaddr_to_text(&evp->dest)) == NULL)
usr.sbin/smtpd/ruleset.c
208
ret = table_match(table, service, key);
usr.sbin/smtpd/ruleset.c
50
const char *key;
usr.sbin/smtpd/ruleset.c
63
key = "local";
usr.sbin/smtpd/ruleset.c
71
key = evp->hostname;
usr.sbin/smtpd/ruleset.c
74
key = ss_to_text(&evp->ss);
usr.sbin/smtpd/ruleset.c
76
if (strcmp(key, "local") == 0)
usr.sbin/smtpd/ruleset.c
86
ret = table_match(table, service, key);
usr.sbin/smtpd/smtpctl.c
1285
char *key;
usr.sbin/smtpd/smtpctl.c
1300
key = getpass("key> ");
usr.sbin/smtpd/smtpctl.c
1301
if (crypto_setup(key, strlen(key)))
usr.sbin/smtpd/smtpctl.c
1308
printf("object is encrypted: %s\n", key);
usr.sbin/smtpd/smtpctl.c
835
if (strcmp(kv.key, "uptime") == 0) {
usr.sbin/smtpd/smtpctl.c
845
kv.key, kv.val.u.counter);
usr.sbin/smtpd/smtpctl.c
849
kv.key, (int64_t)kv.val.u.timestamp);
usr.sbin/smtpd/smtpctl.c
853
kv.key, (long long)kv.val.u.tv.tv_sec,
usr.sbin/smtpd/smtpctl.c
858
kv.key,
usr.sbin/smtpd/smtpd.c
1141
fork_proc_backend(const char *key, const char *conf, const char *procname,
usr.sbin/smtpd/smtpd.c
1151
log_warnx("warn: %s-proc: conf too long", key);
usr.sbin/smtpd/smtpd.c
1159
if (snprintf(path, sizeof(path), PATH_LIBEXEC "/%s-%s", key, name) >=
usr.sbin/smtpd/smtpd.c
1161
log_warn("warn: %s-proc: exec path too long", key);
usr.sbin/smtpd/smtpd.c
1166
log_warn("warn: %s-proc: socketpair", key);
usr.sbin/smtpd/smtpd.c
1171
log_warn("warn: %s-proc: fork", key);
usr.sbin/smtpd/smtpd.c
1867
char key[STAT_KEY_SIZE];
usr.sbin/smtpd/smtpd.c
1872
if (!bsnprintf(key, sizeof key,
usr.sbin/smtpd/smtpd.c
1878
stat_set(key, stat_timespec(&dt));
usr.sbin/smtpd/smtpd.h
940
char key[STAT_KEY_SIZE];
usr.sbin/smtpd/srs.c
69
srs_hash(const char *key, const char *value)
usr.sbin/smtpd/srs.c
75
SHA1_Update(&c, key, strlen(key));
usr.sbin/smtpd/ssl.c
115
EVP_PKEY *key = NULL;
usr.sbin/smtpd/ssl.c
148
key = PEM_read_PrivateKey(fp, NULL, ssl_password_cb, prompt);
usr.sbin/smtpd/ssl.c
153
if (key == NULL)
usr.sbin/smtpd/ssl.c
160
if (!PEM_write_bio_PrivateKey(bio, key, NULL, NULL, 0, NULL, NULL))
usr.sbin/smtpd/ssl.c
169
EVP_PKEY_free(key);
usr.sbin/smtpd/ssl.c
177
EVP_PKEY_free(key);
usr.sbin/smtpd/stat_backend.c
30
stat_increment(const char *key, size_t count)
usr.sbin/smtpd/stat_backend.c
40
m_add_string(p_control, key);
usr.sbin/smtpd/stat_backend.c
46
stat_decrement(const char *key, size_t count)
usr.sbin/smtpd/stat_backend.c
56
m_add_string(p_control, key);
usr.sbin/smtpd/stat_backend.c
62
stat_set(const char *key, const struct stat_value *value)
usr.sbin/smtpd/stat_backend.c
65
m_add_string(p_control, key);
usr.sbin/smtpd/stat_ramstat.c
108
(void)strlcpy(lk.key, name, sizeof (lk.key));
usr.sbin/smtpd/stat_ramstat.c
112
(void)strlcpy(np->key, name, sizeof (np->key));
usr.sbin/smtpd/stat_ramstat.c
137
*name = np->key;
usr.sbin/smtpd/stat_ramstat.c
146
return strcmp(e1->key, e2->key);
usr.sbin/smtpd/stat_ramstat.c
32
char key[STAT_KEY_SIZE];
usr.sbin/smtpd/stat_ramstat.c
72
(void)strlcpy(lk.key, name, sizeof (lk.key));
usr.sbin/smtpd/stat_ramstat.c
76
(void)strlcpy(np->key, name, sizeof (np->key));
usr.sbin/smtpd/stat_ramstat.c
90
(void)strlcpy(lk.key, name, sizeof (lk.key));
usr.sbin/smtpd/stat_ramstat.c
94
(void)strlcpy(np->key, name, sizeof (np->key));
usr.sbin/smtpd/table.c
132
table_match(struct table *table, enum table_service kind, const char *key)
usr.sbin/smtpd/table.c
134
return table_lookup(table, kind, key, NULL);
usr.sbin/smtpd/table.c
138
table_lookup(struct table *table, enum table_service kind, const char *key,
usr.sbin/smtpd/table.c
147
else if (!lowercase(lkey, key, sizeof lkey)) {
usr.sbin/smtpd/table.c
148
log_warnx("warn: lookup key too long: %s", key);
usr.sbin/smtpd/table.c
157
key,
usr.sbin/smtpd/table.c
170
key,
usr.sbin/smtpd/table.c
294
table_add(struct table *t, const char *key, const char *val)
usr.sbin/smtpd/table.c
299
if (t->t_backend->add(t, key, val) == 0)
usr.sbin/smtpd/table.c
300
log_warnx("warn: failed to add \"%s\" in table \"%s\"", key, t->t_name);
usr.sbin/smtpd/table.c
547
table_parse_lookup(enum table_service service, const char *key,
usr.sbin/smtpd/table.c
584
if (strlcpy(lk->creds.username, key, sizeof (lk->creds.username))
usr.sbin/smtpd/table.c
611
if (!bsnprintf(buffer, sizeof(buffer), "%s:%s", key, line))
usr.sbin/smtpd/table.c
641
PF_UNSPEC, key) == -1)
usr.sbin/smtpd/table_db.c
155
table_db_lookup(struct table *table, enum table_service service, const char *key,
usr.sbin/smtpd/table_db.c
180
line = table_db_get_entry(handle, key, &len);
usr.sbin/smtpd/table_db.c
182
line = table_db_get_entry_match(handle, key, &len, match);
usr.sbin/smtpd/table_db.c
223
table_db_get_entry_match(void *hdl, const char *key, size_t *len,
usr.sbin/smtpd/table_db.c
235
if (func(key, buf)) {
usr.sbin/smtpd/table_db.c
245
table_db_get_entry(void *hdl, const char *key, size_t *len)
usr.sbin/smtpd/table_db.c
253
if (strlcpy(pkey, key, sizeof pkey) >= sizeof pkey)
usr.sbin/smtpd/table_getpwnam.c
52
table_getpwnam_lookup(struct table *table, enum table_service kind, const char *key,
usr.sbin/smtpd/table_getpwnam.c
62
pw = getpwnam(key);
usr.sbin/smtpd/table_static.c
188
table_static_add(struct table *table, const char *key, const char *val)
usr.sbin/smtpd/table_static.c
210
r = table_static_priv_add(priv, key, val);
usr.sbin/smtpd/table_static.c
220
const char *key;
usr.sbin/smtpd/table_static.c
225
while (dict_iter(&priv->dict, &iter, &key, (void**)&value)) {
usr.sbin/smtpd/table_static.c
227
log_debug(" \"%s\" -> \"%s\"", key, value);
usr.sbin/smtpd/table_static.c
229
log_debug(" \"%s\"", key);
usr.sbin/smtpd/table_static.c
264
table_static_lookup(struct table *table, enum table_service service, const char *key,
usr.sbin/smtpd/table_static.c
285
if (match(key, k)) {
usr.sbin/smtpd/table_static.c
291
if (strcmp(key, k) == 0) {
usr.sbin/smtpd/table_static.c
83
table_static_priv_add(struct table_static_priv *priv, const char *key, const char *val)
usr.sbin/smtpd/table_static.c
88
if (!lowercase(lkey, key, sizeof lkey)) {
usr.sbin/smtpd/tree.c
100
if ((entry = SPLAY_FIND(_tree, &t->tree, &key)) == NULL)
usr.sbin/smtpd/tree.c
109
struct treeentry key, *entry;
usr.sbin/smtpd/tree.c
112
key.id = id;
usr.sbin/smtpd/tree.c
113
if ((entry = SPLAY_FIND(_tree, &t->tree, &key)) == NULL)
usr.sbin/smtpd/tree.c
127
struct treeentry key, *entry;
usr.sbin/smtpd/tree.c
130
key.id = id;
usr.sbin/smtpd/tree.c
131
if ((entry = SPLAY_FIND(_tree, &t->tree, &key)) == NULL)
usr.sbin/smtpd/tree.c
201
struct treeentry *curr = *hdl, key;
usr.sbin/smtpd/tree.c
207
key.id = k;
usr.sbin/smtpd/tree.c
208
curr = SPLAY_FIND(_tree, &t->tree, &key);
usr.sbin/smtpd/tree.c
210
SPLAY_INSERT(_tree, &t->tree, &key);
usr.sbin/smtpd/tree.c
211
curr = SPLAY_NEXT(_tree, &t->tree, &key);
usr.sbin/smtpd/tree.c
212
SPLAY_REMOVE(_tree, &t->tree, &key);
usr.sbin/smtpd/tree.c
40
struct treeentry key;
usr.sbin/smtpd/tree.c
42
key.id = id;
usr.sbin/smtpd/tree.c
43
return (SPLAY_FIND(_tree, &t->tree, &key) != NULL);
usr.sbin/smtpd/tree.c
49
struct treeentry *entry, key;
usr.sbin/smtpd/tree.c
52
key.id = id;
usr.sbin/smtpd/tree.c
53
if ((entry = SPLAY_FIND(_tree, &t->tree, &key)) == NULL) {
usr.sbin/smtpd/tree.c
85
struct treeentry key, *entry;
usr.sbin/smtpd/tree.c
87
key.id = id;
usr.sbin/smtpd/tree.c
88
if ((entry = SPLAY_FIND(_tree, &t->tree, &key)) == NULL)
usr.sbin/smtpd/tree.c
97
struct treeentry key, *entry;
usr.sbin/smtpd/tree.c
99
key.id = id;
usr.sbin/smtpd/util.c
856
int *type, char **key, char **val, int *malformed)
usr.sbin/smtpd/util.c
861
*key = NULL;
usr.sbin/smtpd/util.c
901
*key = keyp;
usr.sbin/smtpd/util.c
913
*key = keyp;
usr.sbin/smtpd/waitq.c
57
struct waitq *wq, key;
usr.sbin/smtpd/waitq.c
60
key.tag = tag;
usr.sbin/smtpd/waitq.c
61
wq = SPLAY_FIND(waitqtree, &waitqs, &key);
usr.sbin/smtpd/waitq.c
80
struct waitq *wq, key;
usr.sbin/smtpd/waitq.c
83
key.tag = tag;
usr.sbin/smtpd/waitq.c
84
wq = SPLAY_FIND(waitqtree, &waitqs, &key);
usr.sbin/snmpd/smi.c
69
struct oid *value, key;
usr.sbin/snmpd/smi.c
73
bzero(&key, sizeof(key));
usr.sbin/snmpd/smi.c
74
bcopy(o, &key.o_id, sizeof(struct ber_oid));
usr.sbin/snmpd/smi.c
80
key.o_oidlen = i + 1;
usr.sbin/snmpd/smi.c
84
(value = RB_FIND(oidtree, &smi_oidtree, &key)) != NULL)
usr.sbin/snmpd/smi.c
87
snprintf(str, sizeof(str), "%d", key.o_oid[i]);
usr.sbin/snmpd/traphandler.c
427
struct trapcmd key, *res;
usr.sbin/snmpd/traphandler.c
429
bzero(&key, sizeof(key));
usr.sbin/snmpd/traphandler.c
430
key.cmd_oid = *oid;
usr.sbin/snmpd/traphandler.c
432
if ((res = RB_FIND(trapcmd_tree, &trapcmd_tree, &key)) == NULL)
usr.sbin/snmpd/traphandler.c
433
res = key.cmd_maybe;
usr.sbin/snmpd/usm.c
60
char *key;
usr.sbin/snmpd/usm.c
69
key = usm_passwd2key(md, up->uu_authkey, &len);
usr.sbin/snmpd/usm.c
693
char *key;
usr.sbin/snmpd/usm.c
71
up->uu_authkey = key;
usr.sbin/snmpd/usm.c
739
if ((key = malloc(dlen)) == NULL)
usr.sbin/snmpd/usm.c
741
memcpy(key, keybuf, dlen);
usr.sbin/snmpd/usm.c
743
return key;
usr.sbin/snmpd/usm.c
79
key = usm_passwd2key(md, up->uu_privkey, &len);
usr.sbin/snmpd/usm.c
81
up->uu_privkey = key;
usr.sbin/tcpdump/pf_print_state.c
193
sk = &s->key[PF_SK_STACK];
usr.sbin/tcpdump/pf_print_state.c
194
nk = &s->key[PF_SK_WIRE];
usr.sbin/tcpdump/pf_print_state.c
200
sk = &s->key[PF_SK_WIRE];
usr.sbin/tcpdump/pf_print_state.c
201
nk = &s->key[PF_SK_STACK];
usr.sbin/tcpdump/print-gre.c
171
uint32_t key, vsid;
usr.sbin/tcpdump/print-gre.c
173
if (l < sizeof(key))
usr.sbin/tcpdump/print-gre.c
175
key = EXTRACT_32BITS(p);
usr.sbin/tcpdump/print-gre.c
176
p += sizeof(key);
usr.sbin/tcpdump/print-gre.c
177
l -= sizeof(key);
usr.sbin/tcpdump/print-gre.c
178
length -= sizeof(key);
usr.sbin/tcpdump/print-gre.c
181
vsid = (key & NVGRE_VSID_MASK) >> NVGRE_VSID_SHIFT;
usr.sbin/tcpdump/print-gre.c
182
printf(" key=%u|%u+%02x", key, vsid,
usr.sbin/tcpdump/print-gre.c
183
(key & NVGRE_FLOWID_MASK) >> NVGRE_FLOWID_SHIFT);
usr.sbin/tcpdump/print-ipsec.c
103
free(key);
usr.sbin/tcpdump/print-ipsec.c
106
key[i] = strtoul(s, NULL, 16);
usr.sbin/tcpdump/print-ipsec.c
109
free(key);
usr.sbin/tcpdump/print-ipsec.c
112
if (!EVP_CipherInit(ctx, evp, key, NULL, 0)) {
usr.sbin/tcpdump/print-ipsec.c
114
free(key);
usr.sbin/tcpdump/print-ipsec.c
117
free(key);
usr.sbin/tcpdump/print-ipsec.c
69
u_char *key;
usr.sbin/tcpdump/print-ipsec.c
95
if ((key = malloc(klen)) == NULL)
usr.sbin/tcpdump/print-slow.c
210
EXTRACT_16BITS(tlv_ptr.actor_partner_info->key),
usr.sbin/tcpdump/print-slow.c
91
u_int8_t key[2];
usr.sbin/unbound/cachedb/cachedb.c
1020
char key[(CACHEDB_HASHSIZE/8)*2+1];
usr.sbin/unbound/cachedb/cachedb.c
1025
calc_hash(qinfo, env, key, sizeof(key));
usr.sbin/unbound/cachedb/cachedb.c
1031
(*ie->backend->store)(env, ie, key,
usr.sbin/unbound/cachedb/cachedb.c
147
char* key, struct sldns_buffer* result_buffer)
usr.sbin/unbound/cachedb/cachedb.c
152
verbose(VERB_ALGO, "testframe_lookup of %s", key);
usr.sbin/unbound/cachedb/cachedb.c
154
if(d->stored_key && strcmp(d->stored_key, key) == 0) {
usr.sbin/unbound/cachedb/cachedb.c
174
char* key, uint8_t* data, size_t data_len, time_t ATTR_UNUSED(ttl))
usr.sbin/unbound/cachedb/cachedb.c
180
verbose(VERB_ALGO, "testframe_store %s (%d bytes)", key, (int)data_len);
usr.sbin/unbound/cachedb/cachedb.c
196
d->stored_key = strdup(key);
usr.sbin/unbound/cachedb/cachedb.c
652
char key[(CACHEDB_HASHSIZE/8)*2+1];
usr.sbin/unbound/cachedb/cachedb.c
653
calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key));
usr.sbin/unbound/cachedb/cachedb.c
656
if( !(*ie->backend->lookup)(qstate->env, ie, key,
usr.sbin/unbound/cachedb/cachedb.c
679
char key[(CACHEDB_HASHSIZE/8)*2+1];
usr.sbin/unbound/cachedb/cachedb.c
680
calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key));
usr.sbin/unbound/cachedb/cachedb.c
687
(*ie->backend->store)(qstate->env, ie, key,
usr.sbin/unbound/cachedb/redis.c
508
char* key, struct sldns_buffer* result_buffer)
usr.sbin/unbound/cachedb/redis.c
522
verbose(VERB_ALGO, "redis_lookup of %s", key);
usr.sbin/unbound/cachedb/redis.c
524
n = snprintf(cmdbuf, sizeof(cmdbuf), "GET %s", key);
usr.sbin/unbound/cachedb/redis.c
563
char* key, uint8_t* data, size_t data_len, time_t ttl)
usr.sbin/unbound/cachedb/redis.c
587
verbose(VERB_ALGO, "redis_store %s (%d bytes)", key, (int)data_len);
usr.sbin/unbound/cachedb/redis.c
589
n = snprintf(cmdbuf, sizeof(cmdbuf), "SET %s %%b", key);
usr.sbin/unbound/cachedb/redis.c
594
key, (int)data_len);
usr.sbin/unbound/cachedb/redis.c
595
n = snprintf(cmdbuf, sizeof(cmdbuf), "EXPIRE %s 0", key);
usr.sbin/unbound/cachedb/redis.c
602
key, (int)data_len, (unsigned)(uint32_t)ttl);
usr.sbin/unbound/cachedb/redis.c
604
n = snprintf(cmdbuf, sizeof(cmdbuf), "SET %s %%b EX %u", key,
usr.sbin/unbound/daemon/cachedump.c
267
dump_rrset(txt, (struct ub_packed_rrset_key*)e->key,
usr.sbin/unbound/daemon/cachedump.c
374
e->key, sizeof(struct query_info));
usr.sbin/unbound/daemon/cachedump.c
555
ref.key = ak;
usr.sbin/unbound/daemon/remote.c
1897
struct msgreply_entry *k = (struct msgreply_entry*)e->key;
usr.sbin/unbound/daemon/remote.c
1900
if(!dname_subdomain_c(k->key.qname, inf->nm))
usr.sbin/unbound/daemon/remote.c
1904
addrtree_traverse(d->tree4, 0, *inf->worker->env.now, &k->key,
usr.sbin/unbound/daemon/remote.c
1908
addrtree_traverse(d->tree6, 1, *inf->worker->env.now, &k->key,
usr.sbin/unbound/daemon/remote.c
1918
struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)e->key;
usr.sbin/unbound/daemon/remote.c
1941
struct msgreply_entry* k = (struct msgreply_entry*)e->key;
usr.sbin/unbound/daemon/remote.c
1944
dname_subdomain_c(k->key.qname, inf->nm)) {
usr.sbin/unbound/daemon/remote.c
1947
sldns_wire2str_dname_buf(k->key.qname, k->key.qname_len,
usr.sbin/unbound/daemon/remote.c
1949
sldns_wire2str_type_buf(k->key.qtype, tp, sizeof(tp));
usr.sbin/unbound/daemon/remote.c
1950
sldns_wire2str_class_buf(k->key.qclass, cl, sizeof(cl));
usr.sbin/unbound/daemon/remote.c
2208
struct infra_key* k = (struct infra_key*)e->key;
usr.sbin/unbound/daemon/remote.c
2272
struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)e->key;
usr.sbin/unbound/daemon/remote.c
2289
struct msgreply_entry* k = (struct msgreply_entry*)e->key;
usr.sbin/unbound/daemon/remote.c
2290
if(dname_subdomain_c(k->key.qname, inf->name)) {
usr.sbin/unbound/daemon/remote.c
2300
cachedb_msg_remove_qinfo(&inf->worker->env, &k->key);
usr.sbin/unbound/daemon/remote.c
2311
struct key_entry_key* k = (struct key_entry_key*)e->key;
usr.sbin/unbound/daemon/remote.c
2392
&((struct msgreply_entry*)e->key)->key);
usr.sbin/unbound/daemon/remote.c
2448
struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)e->key;
usr.sbin/unbound/daemon/remote.c
2478
&((struct msgreply_entry*)e->key)->key);
usr.sbin/unbound/daemon/remote.c
3106
struct infra_key* k = (struct infra_key*)e->key;
usr.sbin/unbound/daemon/remote.c
3541
struct rate_key* k = (struct rate_key*)e->key;
usr.sbin/unbound/daemon/remote.c
3560
struct ip_rate_key* k = (struct ip_rate_key*)e->key;
usr.sbin/unbound/dns64/dns64.c
805
dk->entry.key = dk;
usr.sbin/unbound/dnscrypt/dnscrypt.c
110
uint8_t key[DNSCRYPT_SHARED_SECRET_KEY_LENGTH],
usr.sbin/unbound/dnscrypt/dnscrypt.c
124
memcpy(k->key, key, DNSCRYPT_SHARED_SECRET_KEY_LENGTH);
usr.sbin/unbound/dnscrypt/dnscrypt.c
126
k->entry.key = k;
usr.sbin/unbound/dnscrypt/dnscrypt.c
144
uint8_t key[DNSCRYPT_SHARED_SECRET_KEY_LENGTH],
usr.sbin/unbound/dnscrypt/dnscrypt.c
147
return slabhash_lookup(cache, hash, key, 0);
usr.sbin/unbound/dnscrypt/dnscrypt.c
196
k->entry.key = k;
usr.sbin/unbound/dnscrypt/dnscrypt.c
255
uint8_t key[DNSCRYPT_SHARED_SECRET_KEY_LENGTH];
usr.sbin/unbound/dnscrypt/dnscrypt.c
297
hash = dnsc_shared_secrets_cache_key(key,
usr.sbin/unbound/dnscrypt/dnscrypt.c
302
key,
usr.sbin/unbound/dnscrypt/dnscrypt.c
328
key,
usr.sbin/unbound/dnscrypt/dnscrypt.c
58
uint8_t key[DNSCRYPT_SHARED_SECRET_KEY_LENGTH];
usr.sbin/unbound/dnscrypt/dnscrypt.c
626
dnsc_key_to_fingerprint(char fingerprint[80U], const uint8_t * const key)
usr.sbin/unbound/dnscrypt/dnscrypt.c
636
key[key_pos], key[key_pos + 1U]);
usr.sbin/unbound/dnscrypt/dnscrypt.c
86
dnsc_shared_secrets_cache_key(uint8_t* key,
usr.sbin/unbound/dnscrypt/dnscrypt.c
91
key[0] = esversion;
usr.sbin/unbound/dnscrypt/dnscrypt.c
92
memcpy(key + 1, pk, crypto_box_PUBLICKEYBYTES);
usr.sbin/unbound/dnscrypt/dnscrypt.c
93
memcpy(key + 1 + crypto_box_PUBLICKEYBYTES, sk, crypto_box_SECRETKEYBYTES);
usr.sbin/unbound/dnscrypt/dnscrypt.c
94
return hashlittle(key, DNSCRYPT_SHARED_SECRET_KEY_LENGTH, 0);
usr.sbin/unbound/edns-subnet/subnetmod.c
218
subnet_markdel(void* key)
usr.sbin/unbound/edns-subnet/subnetmod.c
220
struct msgreply_entry *e = (struct msgreply_entry*)key;
usr.sbin/unbound/edns-subnet/subnetmod.c
221
e->key.qtype = 0;
usr.sbin/unbound/edns-subnet/subnetmod.c
222
e->key.qclass = 0;
usr.sbin/unbound/edns-subnet/subnetmod.c
338
struct ub_packed_rrset_key *key = elem->rrsets[i];
usr.sbin/unbound/edns-subnet/subnetmod.c
339
struct packed_rrset_data *data = key->entry.data;
usr.sbin/unbound/edns-subnet/subnetmod.c
340
s += ub_rrset_sizefunc(key, data);
usr.sbin/unbound/edns-subnet/subnetmod.c
440
rep->ref[i].key = rep->rrsets[i];
usr.sbin/unbound/edns-subnet/subnetmod.c
84
+ q->key.qname_len + lock_get_mem(&q->entry.lock);
usr.sbin/unbound/edns-subnet/subnetmod.h
162
void subnet_markdel(void* key);
usr.sbin/unbound/ipsecmod/ipsecmod-whitelist.c
72
n->node.key = n;
usr.sbin/unbound/iterator/iter_delegpt.c
566
struct delegpt_ns* ns = delegpt_find_ns(dp, msg->key.qname,
usr.sbin/unbound/iterator/iter_delegpt.c
567
msg->key.qname_len);
usr.sbin/unbound/iterator/iter_delegpt.c
568
delegpt_mark_neg(ns, msg->key.qtype);
usr.sbin/unbound/iterator/iter_fwd.c
120
node->node.key = node;
usr.sbin/unbound/iterator/iter_fwd.c
145
struct iter_forward_zone key;
usr.sbin/unbound/iterator/iter_fwd.c
146
key.node.key = &key;
usr.sbin/unbound/iterator/iter_fwd.c
147
key.dclass = c;
usr.sbin/unbound/iterator/iter_fwd.c
148
key.name = nm;
usr.sbin/unbound/iterator/iter_fwd.c
149
key.namelabs = dname_count_size_labels(nm, &key.namelen);
usr.sbin/unbound/iterator/iter_fwd.c
150
return (struct iter_forward_zone*)rbtree_search(fwd->tree, &key);
usr.sbin/unbound/iterator/iter_fwd.c
312
struct iter_forward_zone key;
usr.sbin/unbound/iterator/iter_fwd.c
313
key.node.key = &key;
usr.sbin/unbound/iterator/iter_fwd.c
314
key.dclass = c;
usr.sbin/unbound/iterator/iter_fwd.c
315
key.name = nm;
usr.sbin/unbound/iterator/iter_fwd.c
316
key.namelabs = dname_count_size_labels(key.name, &key.namelen);
usr.sbin/unbound/iterator/iter_fwd.c
317
return forwards_insert_data(fwd, key.dclass, key.name,
usr.sbin/unbound/iterator/iter_fwd.c
318
key.namelen, key.namelabs, NULL);
usr.sbin/unbound/iterator/iter_fwd.c
421
struct iter_forward_zone key;
usr.sbin/unbound/iterator/iter_fwd.c
423
key.node.key = &key;
usr.sbin/unbound/iterator/iter_fwd.c
424
key.dclass = qclass;
usr.sbin/unbound/iterator/iter_fwd.c
425
key.name = qname;
usr.sbin/unbound/iterator/iter_fwd.c
426
key.namelabs = dname_count_size_labels(qname, &key.namelen);
usr.sbin/unbound/iterator/iter_fwd.c
429
res = (struct iter_forward_zone*)rbtree_search(fwd->tree, &key);
usr.sbin/unbound/iterator/iter_fwd.c
442
struct iter_forward_zone key;
usr.sbin/unbound/iterator/iter_fwd.c
444
key.node.key = &key;
usr.sbin/unbound/iterator/iter_fwd.c
445
key.dclass = qclass;
usr.sbin/unbound/iterator/iter_fwd.c
446
key.name = qname;
usr.sbin/unbound/iterator/iter_fwd.c
447
key.namelabs = dname_count_size_labels(qname, &key.namelen);
usr.sbin/unbound/iterator/iter_fwd.c
450
if(rbtree_find_less_equal(fwd->tree, &key, &res)) {
usr.sbin/unbound/iterator/iter_fwd.c
462
(void)dname_lab_cmp(result->name, result->namelabs, key.name,
usr.sbin/unbound/iterator/iter_fwd.c
463
key.namelabs, &m);
usr.sbin/unbound/iterator/iter_fwd.c
487
struct iter_forward_zone key;
usr.sbin/unbound/iterator/iter_fwd.c
507
key.node.key = &key;
usr.sbin/unbound/iterator/iter_fwd.c
508
key.name = (uint8_t*)"\000";
usr.sbin/unbound/iterator/iter_fwd.c
509
key.namelen = 1;
usr.sbin/unbound/iterator/iter_fwd.c
510
key.namelabs = 0;
usr.sbin/unbound/iterator/iter_fwd.c
511
key.dclass = *dclass;
usr.sbin/unbound/iterator/iter_fwd.c
513
if(rbtree_find_less_equal(fwd->tree, &key, &n)) {
usr.sbin/unbound/iterator/iter_scrub.c
801
ref.key = k;
usr.sbin/unbound/iterator/iter_utils.c
1179
ref.key = rrset;
usr.sbin/unbound/iterator/iter_utils.c
1230
neg->entry.key = neg;
usr.sbin/unbound/iterator/iter_utils.c
164
n->node.key = n;
usr.sbin/unbound/libunbound/context.c
169
q->node.key = &q->querynum;
usr.sbin/unbound/libunbound/context.c
273
q->node.key = &q->querynum;
usr.sbin/unbound/libunbound/libunbound.c
639
(void)rbtree_delete(&ctx->queries, q->node.key);
usr.sbin/unbound/libunbound/libunbound.c
773
(void)rbtree_delete(&ctx->queries, q->node.key);
usr.sbin/unbound/libunbound/libunbound.c
785
(void)rbtree_delete(&ctx->queries, q->node.key);
usr.sbin/unbound/libunbound/libunbound.c
875
(void)rbtree_delete(&ctx->queries, q->node.key);
usr.sbin/unbound/libunbound/libunbound.c
914
(void)rbtree_delete(&ctx->queries, q->node.key);
usr.sbin/unbound/libunbound/libworker.c
670
(void)rbtree_delete(&ctx->queries, q->node.key);
usr.sbin/unbound/libunbound/libworker.c
769
(void)rbtree_delete(&w->ctx->queries, q->node.key);
usr.sbin/unbound/libunbound/libworker.c
795
(void)rbtree_delete(&ctx->queries, q->node.key);
usr.sbin/unbound/respip/respip.c
238
rrset->entry.key = rrset;
usr.sbin/unbound/respip/respip.c
495
respip_copy_rrset(const struct ub_packed_rrset_key* key, struct regional* region)
usr.sbin/unbound/respip/respip.c
500
struct packed_rrset_data* data = key->entry.data;
usr.sbin/unbound/respip/respip.c
508
ck->id = key->id;
usr.sbin/unbound/respip/respip.c
510
ck->entry.hash = key->entry.hash;
usr.sbin/unbound/respip/respip.c
511
ck->entry.key = ck;
usr.sbin/unbound/respip/respip.c
512
ck->rk = key->rk;
usr.sbin/unbound/respip/respip.c
513
if(key->rk.dname) {
usr.sbin/unbound/respip/respip.c
514
ck->rk.dname = regional_alloc_init(region, key->rk.dname,
usr.sbin/unbound/respip/respip.c
515
key->rk.dname_len);
usr.sbin/unbound/respip/respip.c
518
ck->rk.dname_len = key->rk.dname_len;
usr.sbin/unbound/respip/respip.c
77
struct resp_addr* r = (struct resp_addr*)n->key;
usr.sbin/unbound/respip/respip.h
313
respip_copy_rrset(const struct ub_packed_rrset_key* key, struct regional* region);
usr.sbin/unbound/services/authzone.c
176
struct ub_packed_rrset_key key;
usr.sbin/unbound/services/authzone.c
177
memset(&key, 0, sizeof(key));
usr.sbin/unbound/services/authzone.c
178
key.entry.key = &key;
usr.sbin/unbound/services/authzone.c
179
key.entry.data = rrset->data;
usr.sbin/unbound/services/authzone.c
180
key.rk.dname = node->name;
usr.sbin/unbound/services/authzone.c
181
key.rk.dname_len = node->namelen;
usr.sbin/unbound/services/authzone.c
182
key.rk.type = htons(rrset->type);
usr.sbin/unbound/services/authzone.c
183
key.rk.rrset_class = htons(z->dclass);
usr.sbin/unbound/services/authzone.c
184
key.entry.hash = rrset_key_hash(&key.rk);
usr.sbin/unbound/services/authzone.c
185
return packed_rrset_copy_region(&key, region, adjust);
usr.sbin/unbound/services/authzone.c
2353
struct auth_zone* z = (struct auth_zone*)n->key;
usr.sbin/unbound/services/authzone.c
2361
struct auth_xfer* z = (struct auth_xfer*)n->key;
usr.sbin/unbound/services/authzone.c
2692
(*cname)->entry.key = (*cname);
usr.sbin/unbound/services/authzone.c
385
struct auth_data* z = (struct auth_data*)n->key;
usr.sbin/unbound/services/authzone.c
423
z->node.key = z;
usr.sbin/unbound/services/authzone.c
452
struct auth_zone key;
usr.sbin/unbound/services/authzone.c
453
key.node.key = &key;
usr.sbin/unbound/services/authzone.c
454
key.dclass = dclass;
usr.sbin/unbound/services/authzone.c
455
key.name = nm;
usr.sbin/unbound/services/authzone.c
456
key.namelen = nmlen;
usr.sbin/unbound/services/authzone.c
457
key.namelabs = dname_count_labels(nm);
usr.sbin/unbound/services/authzone.c
458
return (struct auth_zone*)rbtree_search(&az->ztree, &key);
usr.sbin/unbound/services/authzone.c
465
struct auth_xfer key;
usr.sbin/unbound/services/authzone.c
466
key.node.key = &key;
usr.sbin/unbound/services/authzone.c
467
key.dclass = dclass;
usr.sbin/unbound/services/authzone.c
468
key.name = nm;
usr.sbin/unbound/services/authzone.c
469
key.namelen = nmlen;
usr.sbin/unbound/services/authzone.c
470
key.namelabs = dname_count_labels(nm);
usr.sbin/unbound/services/authzone.c
471
return (struct auth_xfer*)rbtree_search(&az->xtree, &key);
usr.sbin/unbound/services/authzone.c
479
struct auth_zone key;
usr.sbin/unbound/services/authzone.c
480
key.node.key = &key;
usr.sbin/unbound/services/authzone.c
481
key.dclass = dclass;
usr.sbin/unbound/services/authzone.c
482
key.name = nm;
usr.sbin/unbound/services/authzone.c
483
key.namelen = nmlen;
usr.sbin/unbound/services/authzone.c
484
key.namelabs = dname_count_labels(nm);
usr.sbin/unbound/services/authzone.c
485
return rbtree_find_less_equal(&az->ztree, &key, (rbnode_type**)z);
usr.sbin/unbound/services/authzone.c
595
n->node.key = n;
usr.sbin/unbound/services/authzone.c
616
struct auth_zone key;
usr.sbin/unbound/services/authzone.c
617
key.node.key = &key;
usr.sbin/unbound/services/authzone.c
618
key.name = nm;
usr.sbin/unbound/services/authzone.c
619
key.namelen = nmlen;
usr.sbin/unbound/services/authzone.c
620
key.namelabs = dname_count_labels(nm);
usr.sbin/unbound/services/authzone.c
621
return (struct auth_data*)rbtree_search(&z->data, &key);
usr.sbin/unbound/services/authzone.c
629
struct auth_zone key;
usr.sbin/unbound/services/authzone.c
630
key.node.key = &key;
usr.sbin/unbound/services/authzone.c
631
key.name = qinfo->qname;
usr.sbin/unbound/services/authzone.c
632
key.namelen = qinfo->qname_len;
usr.sbin/unbound/services/authzone.c
633
key.namelabs = dname_count_labels(key.name);
usr.sbin/unbound/services/authzone.c
634
*node_exact = rbtree_find_less_equal(&z->data, &key,
usr.sbin/unbound/services/authzone.c
7089
xfr->node.key = xfr;
usr.sbin/unbound/services/authzone.c
7492
struct ub_packed_rrset_key key;
usr.sbin/unbound/services/authzone.c
7493
memset(&key, 0, sizeof(key));
usr.sbin/unbound/services/authzone.c
7494
key.entry.key = &key;
usr.sbin/unbound/services/authzone.c
7495
key.entry.data = rrset->data;
usr.sbin/unbound/services/authzone.c
7496
key.rk.dname = node->name;
usr.sbin/unbound/services/authzone.c
7497
key.rk.dname_len = node->namelen;
usr.sbin/unbound/services/authzone.c
7498
key.rk.type = htons(rrset->type);
usr.sbin/unbound/services/authzone.c
7499
key.rk.rrset_class = htons(z->dclass);
usr.sbin/unbound/services/authzone.c
7500
if(!rrset_canonicalize_to_buffer(region, buf, &key)) {
usr.sbin/unbound/services/authzone.c
7634
struct ub_packed_rrset_key key;
usr.sbin/unbound/services/authzone.c
7636
memset(&key, 0, sizeof(key));
usr.sbin/unbound/services/authzone.c
7638
key.entry.key = &key;
usr.sbin/unbound/services/authzone.c
7639
key.entry.data = &data;
usr.sbin/unbound/services/authzone.c
7640
key.rk.dname = node->name;
usr.sbin/unbound/services/authzone.c
7641
key.rk.dname_len = node->namelen;
usr.sbin/unbound/services/authzone.c
7642
key.rk.type = htons(LDNS_RR_TYPE_RRSIG);
usr.sbin/unbound/services/authzone.c
7643
key.rk.rrset_class = htons(z->dclass);
usr.sbin/unbound/services/authzone.c
7656
if(!rrset_canonicalize_to_buffer(region, buf, &key)) {
usr.sbin/unbound/services/authzone.c
7841
pk.entry.key = &pk;
usr.sbin/unbound/services/authzone.c
8195
keystorage->entry.key = keystorage;
usr.sbin/unbound/services/authzone.c
8257
keystorage->entry.key = keystorage;
usr.sbin/unbound/services/authzone.c
8571
struct auth_zone key;
usr.sbin/unbound/services/authzone.c
8575
key.node.key = &key;
usr.sbin/unbound/services/authzone.c
8583
key.dclass = z->dclass;
usr.sbin/unbound/services/authzone.c
8584
key.namelabs = z->namelabs;
usr.sbin/unbound/services/authzone.c
8599
key.namelen = savezname_len;
usr.sbin/unbound/services/authzone.c
8600
key.name = savezname;
usr.sbin/unbound/services/authzone.c
8601
z = (struct auth_zone*)rbtree_search(&az->ztree, &key);
usr.sbin/unbound/services/cache/dns.c
100
rep->ref[i].id != rep->ref[i].key->id)
usr.sbin/unbound/services/cache/dns.c
103
rep->ref[i].key, region, now);
usr.sbin/unbound/services/cache/dns.c
104
lock_rw_unlock(&rep->ref[i].key->entry.lock);
usr.sbin/unbound/services/cache/dns.c
1143
ref.key = rep->rrsets[i];
usr.sbin/unbound/services/cache/dns.c
1149
((ntohs(ref.key->rk.type)==LDNS_RR_TYPE_NS
usr.sbin/unbound/services/cache/dns.c
116
rep->rrsets[i] = rep->ref[i].key;
usr.sbin/unbound/services/cache/dns.c
119
lock_rw_rdlock(&rep->ref[i].key->entry.lock);
usr.sbin/unbound/services/cache/dns.c
121
if(rep->ref[i].key->id != 0 &&
usr.sbin/unbound/services/cache/dns.c
122
rep->ref[i].id == rep->ref[i].key->id) {
usr.sbin/unbound/services/cache/dns.c
127
lock_rw_unlock(&rep->ref[i].key->entry.lock);
usr.sbin/unbound/services/cache/dns.c
166
rep->ref[i].key = rep->rrsets[i];
usr.sbin/unbound/services/cache/dns.c
302
return (struct msgreply_entry*)e->key;
usr.sbin/unbound/services/cache/dns.c
788
ck->entry.key = ck;
usr.sbin/unbound/services/cache/dns.c
86
rep->ref[i].key = rep->rrsets[i];
usr.sbin/unbound/services/cache/dns.c
90
env->alloc, ((ntohs(rep->ref[i].key->rk.type)==
usr.sbin/unbound/services/cache/dns.c
910
struct msgreply_entry* key = (struct msgreply_entry*)e->key;
usr.sbin/unbound/services/cache/dns.c
912
struct dns_msg* msg = tomsg(env, &key->key, data, region, now, 0,
usr.sbin/unbound/services/cache/dns.c
97
lock_rw_rdlock(&rep->ref[i].key->entry.lock);
usr.sbin/unbound/services/cache/dns.c
99
if(rep->ref[i].key->id == 0 ||
usr.sbin/unbound/services/cache/infra.c
1011
k->entry.key = k;
usr.sbin/unbound/services/cache/infra.c
1035
k->entry.key = k;
usr.sbin/unbound/services/cache/infra.c
108
struct infra_key* key = (struct infra_key*)k;
usr.sbin/unbound/services/cache/infra.c
109
if(!key)
usr.sbin/unbound/services/cache/infra.c
111
lock_rw_destroy(&key->entry.lock);
usr.sbin/unbound/services/cache/infra.c
112
free(key->zonename);
usr.sbin/unbound/services/cache/infra.c
113
free(key);
usr.sbin/unbound/services/cache/infra.c
126
struct rate_key* key = (struct rate_key*)k;
usr.sbin/unbound/services/cache/infra.c
127
return sizeof(*key) + sizeof(struct rate_data) + key->namelen
usr.sbin/unbound/services/cache/infra.c
128
+ lock_get_mem(&key->entry.lock);
usr.sbin/unbound/services/cache/infra.c
147
struct rate_key* key = (struct rate_key*)k;
usr.sbin/unbound/services/cache/infra.c
148
if(!key)
usr.sbin/unbound/services/cache/infra.c
150
lock_rw_destroy(&key->entry.lock);
usr.sbin/unbound/services/cache/infra.c
151
free(key->name);
usr.sbin/unbound/services/cache/infra.c
152
free(key);
usr.sbin/unbound/services/cache/infra.c
193
d->node.node.key = &d->node;
usr.sbin/unbound/services/cache/infra.c
521
k.entry.key = (void*)&k;
usr.sbin/unbound/services/cache/infra.c
561
struct infra_key* key = (struct infra_key*)malloc(sizeof(*key));
usr.sbin/unbound/services/cache/infra.c
562
if(!key)
usr.sbin/unbound/services/cache/infra.c
566
free(key);
usr.sbin/unbound/services/cache/infra.c
569
key->zonename = memdup(name, namelen);
usr.sbin/unbound/services/cache/infra.c
570
if(!key->zonename) {
usr.sbin/unbound/services/cache/infra.c
571
free(key);
usr.sbin/unbound/services/cache/infra.c
575
key->namelen = namelen;
usr.sbin/unbound/services/cache/infra.c
576
lock_rw_init(&key->entry.lock);
usr.sbin/unbound/services/cache/infra.c
577
key->entry.hash = hash_infra(addr, addrlen, name);
usr.sbin/unbound/services/cache/infra.c
578
key->entry.key = (void*)key;
usr.sbin/unbound/services/cache/infra.c
579
key->entry.data = (void*)data;
usr.sbin/unbound/services/cache/infra.c
580
key->addrlen = addrlen;
usr.sbin/unbound/services/cache/infra.c
581
memcpy(&key->addr, addr, addrlen);
usr.sbin/unbound/services/cache/infra.c
582
data_entry_init(infra, &key->entry, tm);
usr.sbin/unbound/services/cache/infra.c
583
return &key->entry;
usr.sbin/unbound/services/cache/infra.c
84
struct infra_key* key = (struct infra_key*)k;
usr.sbin/unbound/services/cache/infra.c
85
return sizeof(*key) + sizeof(struct infra_data) + key->namelen
usr.sbin/unbound/services/cache/infra.c
86
+ lock_get_mem(&key->entry.lock);
usr.sbin/unbound/services/cache/infra.c
942
struct ip_rate_key* key = (struct ip_rate_key*)k;
usr.sbin/unbound/services/cache/infra.c
943
return sizeof(*key) + sizeof(struct ip_rate_data)
usr.sbin/unbound/services/cache/infra.c
944
+ lock_get_mem(&key->entry.lock);
usr.sbin/unbound/services/cache/infra.c
957
struct ip_rate_key* key = (struct ip_rate_key*)k;
usr.sbin/unbound/services/cache/infra.c
958
if(!key)
usr.sbin/unbound/services/cache/infra.c
960
lock_rw_destroy(&key->entry.lock);
usr.sbin/unbound/services/cache/infra.c
961
free(key);
usr.sbin/unbound/services/cache/infra.c
968
struct rate_key key;
usr.sbin/unbound/services/cache/infra.c
970
memset(&key, 0, sizeof(key));
usr.sbin/unbound/services/cache/infra.c
971
key.name = name;
usr.sbin/unbound/services/cache/infra.c
972
key.namelen = namelen;
usr.sbin/unbound/services/cache/infra.c
973
key.entry.hash = h;
usr.sbin/unbound/services/cache/infra.c
974
return slabhash_lookup(infra->domain_rates, h, &key, wr);
usr.sbin/unbound/services/cache/infra.c
981
struct ip_rate_key key;
usr.sbin/unbound/services/cache/infra.c
983
memset(&key, 0, sizeof(key));
usr.sbin/unbound/services/cache/infra.c
984
key.addr = *addr;
usr.sbin/unbound/services/cache/infra.c
985
key.addrlen = addrlen;
usr.sbin/unbound/services/cache/infra.c
986
key.entry.hash = h;
usr.sbin/unbound/services/cache/infra.c
987
return slabhash_lookup(infra->client_ip_rates, h, &key, wr);
usr.sbin/unbound/services/cache/rrset.c
119
lock_rw_rdlock(&key->entry.lock);
usr.sbin/unbound/services/cache/rrset.c
120
if(key->id == id && key->entry.hash == hash) {
usr.sbin/unbound/services/cache/rrset.c
121
lru_touch(table, &key->entry);
usr.sbin/unbound/services/cache/rrset.c
123
lock_rw_unlock(&key->entry.lock);
usr.sbin/unbound/services/cache/rrset.c
182
lock_rw_wrlock(&ref->key->entry.lock);
usr.sbin/unbound/services/cache/rrset.c
184
if(ref->key->id == ref->id) {
usr.sbin/unbound/services/cache/rrset.c
185
ref->key->id = newid;
usr.sbin/unbound/services/cache/rrset.c
188
lock_rw_unlock(&ref->key->entry.lock);
usr.sbin/unbound/services/cache/rrset.c
196
struct ub_packed_rrset_key* k = ref->key;
usr.sbin/unbound/services/cache/rrset.c
211
ref->key = (struct ub_packed_rrset_key*)e->key;
usr.sbin/unbound/services/cache/rrset.c
212
ref->id = ref->key->id;
usr.sbin/unbound/services/cache/rrset.c
232
log_assert(ref->key->id != 0);
usr.sbin/unbound/services/cache/rrset.c
275
ref.key = rrset;
usr.sbin/unbound/services/cache/rrset.c
287
struct ub_packed_rrset_key key;
usr.sbin/unbound/services/cache/rrset.c
289
key.entry.key = &key;
usr.sbin/unbound/services/cache/rrset.c
290
key.entry.data = NULL;
usr.sbin/unbound/services/cache/rrset.c
291
key.rk.dname = qname;
usr.sbin/unbound/services/cache/rrset.c
292
key.rk.dname_len = qnamelen;
usr.sbin/unbound/services/cache/rrset.c
293
key.rk.type = htons(qtype);
usr.sbin/unbound/services/cache/rrset.c
294
key.rk.rrset_class = htons(qclass);
usr.sbin/unbound/services/cache/rrset.c
295
key.rk.flags = flags;
usr.sbin/unbound/services/cache/rrset.c
297
key.entry.hash = rrset_key_hash(&key.rk);
usr.sbin/unbound/services/cache/rrset.c
299
if((e = slabhash_lookup(&r->table, key.entry.hash, &key, wr))) {
usr.sbin/unbound/services/cache/rrset.c
308
return (struct ub_packed_rrset_key*)e->key;
usr.sbin/unbound/services/cache/rrset.c
318
if(i>0 && ref[i].key == ref[i-1].key)
usr.sbin/unbound/services/cache/rrset.c
320
lock_rw_rdlock(&ref[i].key->entry.lock);
usr.sbin/unbound/services/cache/rrset.c
321
if(ref[i].id != ref[i].key->id || timenow >
usr.sbin/unbound/services/cache/rrset.c
322
((struct packed_rrset_data*)(ref[i].key->entry.data))
usr.sbin/unbound/services/cache/rrset.c
337
if(i>0 && ref[i].key == ref[i-1].key)
usr.sbin/unbound/services/cache/rrset.c
339
lock_rw_unlock(&ref[i].key->entry.lock);
usr.sbin/unbound/services/cache/rrset.c
355
h[i] = ref[i].key->entry.hash;
usr.sbin/unbound/services/cache/rrset.c
358
if(i>0 && ref[i].key == ref[i-1].key)
usr.sbin/unbound/services/cache/rrset.c
360
lock_rw_unlock(&ref[i].key->entry.lock);
usr.sbin/unbound/services/cache/rrset.c
365
if(i>0 && ref[i].key == ref[i-1].key)
usr.sbin/unbound/services/cache/rrset.c
367
rrset_cache_touch(r, ref[i].key, h[i], ref[i].id);
usr.sbin/unbound/services/cache/rrset.c
535
struct ub_packed_rrset_key key;
usr.sbin/unbound/services/cache/rrset.c
536
key.entry.key = &key;
usr.sbin/unbound/services/cache/rrset.c
537
key.rk.dname = nm;
usr.sbin/unbound/services/cache/rrset.c
538
key.rk.dname_len = nmlen;
usr.sbin/unbound/services/cache/rrset.c
539
key.rk.rrset_class = htons(dclass);
usr.sbin/unbound/services/cache/rrset.c
540
key.rk.type = htons(type);
usr.sbin/unbound/services/cache/rrset.c
541
key.rk.flags = flags;
usr.sbin/unbound/services/cache/rrset.c
542
key.entry.hash = rrset_key_hash(&key.rk);
usr.sbin/unbound/services/cache/rrset.c
543
slabhash_remove(&r->table, key.entry.hash, &key);
usr.sbin/unbound/services/cache/rrset.c
55
rrset_markdel(void* key)
usr.sbin/unbound/services/cache/rrset.c
57
struct ub_packed_rrset_key* r = (struct ub_packed_rrset_key*)key;
usr.sbin/unbound/services/cache/rrset.c
98
rrset_cache_touch(struct rrset_cache* r, struct ub_packed_rrset_key* key,
usr.sbin/unbound/services/cache/rrset.h
104
void rrset_cache_touch(struct rrset_cache* r, struct ub_packed_rrset_key* key,
usr.sbin/unbound/services/cache/rrset.h
278
void rrset_markdel(void* key);
usr.sbin/unbound/services/listen_dnsport.c
3359
conn = (struct doq_conn*)node->key;
usr.sbin/unbound/services/listen_dnsport.c
3368
doq_table_quic_size_subtract(table, sizeof(*conn)+conn->key.dcidlen);
usr.sbin/unbound/services/listen_dnsport.c
3378
doq_conid_delete((struct doq_conid*)node->key);
usr.sbin/unbound/services/listen_dnsport.c
3414
struct doq_timer key;
usr.sbin/unbound/services/listen_dnsport.c
3416
memset(&key, 0, sizeof(key));
usr.sbin/unbound/services/listen_dnsport.c
3417
key.time.tv_sec = tv->tv_sec;
usr.sbin/unbound/services/listen_dnsport.c
3418
key.time.tv_usec = tv->tv_usec;
usr.sbin/unbound/services/listen_dnsport.c
3419
node = rbtree_search(table->timer_tree, &key);
usr.sbin/unbound/services/listen_dnsport.c
3421
return (struct doq_timer*)node->key;
usr.sbin/unbound/services/listen_dnsport.c
3446
rb_timer->node.key = rb_timer;
usr.sbin/unbound/services/listen_dnsport.c
3518
addr_to_str((void*)&timer->conn->key.paddr.addr,
usr.sbin/unbound/services/listen_dnsport.c
3519
timer->conn->key.paddr.addrlen, a, sizeof(a));
usr.sbin/unbound/services/listen_dnsport.c
3542
timer->node.key = timer;
usr.sbin/unbound/services/listen_dnsport.c
3558
conn->node.key = conn;
usr.sbin/unbound/services/listen_dnsport.c
3561
memmove(&conn->key.paddr.addr, &paddr->addr, paddr->addrlen);
usr.sbin/unbound/services/listen_dnsport.c
3562
conn->key.paddr.addrlen = paddr->addrlen;
usr.sbin/unbound/services/listen_dnsport.c
3563
memmove(&conn->key.paddr.localaddr, &paddr->localaddr,
usr.sbin/unbound/services/listen_dnsport.c
3565
conn->key.paddr.localaddrlen = paddr->localaddrlen;
usr.sbin/unbound/services/listen_dnsport.c
3566
conn->key.paddr.ifindex = paddr->ifindex;
usr.sbin/unbound/services/listen_dnsport.c
3567
conn->key.dcid = memdup((void*)dcid, dcidlen);
usr.sbin/unbound/services/listen_dnsport.c
3568
if(!conn->key.dcid) {
usr.sbin/unbound/services/listen_dnsport.c
3572
conn->key.dcidlen = dcidlen;
usr.sbin/unbound/services/listen_dnsport.c
3582
lock_protect(&conn->lock, &conn->key, sizeof(conn->key));
usr.sbin/unbound/services/listen_dnsport.c
3641
free(conn->key.dcid);
usr.sbin/unbound/services/listen_dnsport.c
3665
if(c->key.paddr.addrlen != d->key.paddr.addrlen) {
usr.sbin/unbound/services/listen_dnsport.c
3666
if(c->key.paddr.addrlen < d->key.paddr.addrlen)
usr.sbin/unbound/services/listen_dnsport.c
3670
if((r=memcmp(&c->key.paddr.addr, &d->key.paddr.addr,
usr.sbin/unbound/services/listen_dnsport.c
3671
c->key.paddr.addrlen))!=0)
usr.sbin/unbound/services/listen_dnsport.c
3673
if(c->key.paddr.localaddrlen != d->key.paddr.localaddrlen) {
usr.sbin/unbound/services/listen_dnsport.c
3674
if(c->key.paddr.localaddrlen < d->key.paddr.localaddrlen)
usr.sbin/unbound/services/listen_dnsport.c
3678
if((r=memcmp(&c->key.paddr.localaddr, &d->key.paddr.localaddr,
usr.sbin/unbound/services/listen_dnsport.c
3679
c->key.paddr.localaddrlen))!=0)
usr.sbin/unbound/services/listen_dnsport.c
3681
if(c->key.paddr.ifindex != d->key.paddr.ifindex) {
usr.sbin/unbound/services/listen_dnsport.c
3682
if(c->key.paddr.ifindex < d->key.paddr.ifindex)
usr.sbin/unbound/services/listen_dnsport.c
3686
if(c->key.dcidlen != d->key.dcidlen) {
usr.sbin/unbound/services/listen_dnsport.c
3687
if(c->key.dcidlen < d->key.dcidlen)
usr.sbin/unbound/services/listen_dnsport.c
3691
if((r=memcmp(c->key.dcid, d->key.dcid, c->key.dcidlen))!=0)
usr.sbin/unbound/services/listen_dnsport.c
3805
doq_conn_key_store_repinfo(struct doq_conn_key* key,
usr.sbin/unbound/services/listen_dnsport.c
3809
repinfo->doq_ifindex = key->paddr.ifindex;
usr.sbin/unbound/services/listen_dnsport.c
3810
repinfo->remote_addrlen = key->paddr.addrlen;
usr.sbin/unbound/services/listen_dnsport.c
3811
memmove(&repinfo->remote_addr, &key->paddr.addr,
usr.sbin/unbound/services/listen_dnsport.c
3813
repinfo->client_addrlen = key->paddr.addrlen;
usr.sbin/unbound/services/listen_dnsport.c
3814
memmove(&repinfo->client_addr, &key->paddr.addr,
usr.sbin/unbound/services/listen_dnsport.c
3816
doq_repinfo_store_localaddr(repinfo, &key->paddr.localaddr,
usr.sbin/unbound/services/listen_dnsport.c
3817
key->paddr.localaddrlen);
usr.sbin/unbound/services/listen_dnsport.c
3818
if(key->dcidlen > sizeof(repinfo->doq_dcid))
usr.sbin/unbound/services/listen_dnsport.c
3820
repinfo->doq_dcidlen = key->dcidlen;
usr.sbin/unbound/services/listen_dnsport.c
3821
memmove(repinfo->doq_dcid, key->dcid, key->dcidlen);
usr.sbin/unbound/services/listen_dnsport.c
3826
doq_conn_key_from_repinfo(struct doq_conn_key* key, struct comm_reply* repinfo)
usr.sbin/unbound/services/listen_dnsport.c
3828
key->paddr.ifindex = repinfo->doq_ifindex;
usr.sbin/unbound/services/listen_dnsport.c
3829
key->paddr.addrlen = repinfo->remote_addrlen;
usr.sbin/unbound/services/listen_dnsport.c
3830
memmove(&key->paddr.addr, &repinfo->remote_addr,
usr.sbin/unbound/services/listen_dnsport.c
3832
doq_repinfo_retrieve_localaddr(repinfo, &key->paddr.localaddr,
usr.sbin/unbound/services/listen_dnsport.c
3833
&key->paddr.localaddrlen);
usr.sbin/unbound/services/listen_dnsport.c
3834
key->dcidlen = repinfo->doq_dcidlen;
usr.sbin/unbound/services/listen_dnsport.c
3835
key->dcid = repinfo->doq_dcid;
usr.sbin/unbound/services/listen_dnsport.c
3859
stream->node.key = stream;
usr.sbin/unbound/services/listen_dnsport.c
3877
struct doq_stream key;
usr.sbin/unbound/services/listen_dnsport.c
3878
key.node.key = &key;
usr.sbin/unbound/services/listen_dnsport.c
3879
key.stream_id = stream_id;
usr.sbin/unbound/services/listen_dnsport.c
3880
node = rbtree_search(&conn->stream_tree, &key);
usr.sbin/unbound/services/listen_dnsport.c
3882
return (struct doq_stream*)node->key;
usr.sbin/unbound/services/listen_dnsport.c
4053
addr_to_str((void*)&conn->key.paddr.addr,
usr.sbin/unbound/services/listen_dnsport.c
4054
conn->key.paddr.addrlen, a, sizeof(a));
usr.sbin/unbound/services/listen_dnsport.c
4073
if(!doq_conn_key_store_repinfo(&conn->key, &c->repinfo)) {
usr.sbin/unbound/services/listen_dnsport.c
4641
void* quic_sslctx_create(char* key, char* pem, char* verifypem)
usr.sbin/unbound/services/listen_dnsport.c
4653
if(!key || key[0] == 0) {
usr.sbin/unbound/services/listen_dnsport.c
4682
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
usr.sbin/unbound/services/listen_dnsport.c
4683
log_err("doq: error for private key file: %s", key);
usr.sbin/unbound/services/listen_dnsport.c
4689
log_err("doq: error for key file: %s", key);
usr.sbin/unbound/services/listen_dnsport.c
4737
(void)key; (void)pem; (void)verifypem;
usr.sbin/unbound/services/listen_dnsport.c
4810
ngtcp2_cid_init(&dcid, conn->key.dcid, conn->key.dcidlen);
usr.sbin/unbound/services/listen_dnsport.c
4812
path.remote.addr = (struct sockaddr*)&conn->key.paddr.addr;
usr.sbin/unbound/services/listen_dnsport.c
4813
path.remote.addrlen = conn->key.paddr.addrlen;
usr.sbin/unbound/services/listen_dnsport.c
4814
path.local.addr = (struct sockaddr*)&conn->key.paddr.localaddr;
usr.sbin/unbound/services/listen_dnsport.c
4815
path.local.addrlen = conn->key.paddr.localaddrlen;
usr.sbin/unbound/services/listen_dnsport.c
4869
ngtcp2_cid_init(&params.retry_scid, conn->key.dcid,
usr.sbin/unbound/services/listen_dnsport.c
4870
conn->key.dcidlen);
usr.sbin/unbound/services/listen_dnsport.c
4873
ngtcp2_cid_init(&params.original_dcid, conn->key.dcid,
usr.sbin/unbound/services/listen_dnsport.c
4874
conn->key.dcidlen);
usr.sbin/unbound/services/listen_dnsport.c
4921
struct doq_conid key;
usr.sbin/unbound/services/listen_dnsport.c
4922
key.node.key = &key;
usr.sbin/unbound/services/listen_dnsport.c
4923
key.cid = (void*)data;
usr.sbin/unbound/services/listen_dnsport.c
4924
key.cidlen = datalen;
usr.sbin/unbound/services/listen_dnsport.c
4925
node = rbtree_search(table->conid_tree, &key);
usr.sbin/unbound/services/listen_dnsport.c
4927
return (struct doq_conid*)node->key;
usr.sbin/unbound/services/listen_dnsport.c
4955
doq_conid_create(uint8_t* data, size_t datalen, struct doq_conn_key* key)
usr.sbin/unbound/services/listen_dnsport.c
4967
conid->node.key = conid;
usr.sbin/unbound/services/listen_dnsport.c
4968
conid->key = *key;
usr.sbin/unbound/services/listen_dnsport.c
4969
conid->key.dcid = memdup(key->dcid, key->dcidlen);
usr.sbin/unbound/services/listen_dnsport.c
4970
if(!conid->key.dcid) {
usr.sbin/unbound/services/listen_dnsport.c
4983
free(conid->key.dcid);
usr.sbin/unbound/services/listen_dnsport.c
4992
if(conid->key.dcidlen == conn->key.dcidlen &&
usr.sbin/unbound/services/listen_dnsport.c
4993
memcmp(conid->key.dcid, conn->key.dcid, conid->key.dcidlen)==0
usr.sbin/unbound/services/listen_dnsport.c
4994
&& conid->key.paddr.addrlen == conn->key.paddr.addrlen &&
usr.sbin/unbound/services/listen_dnsport.c
4995
memcmp(&conid->key.paddr.addr, &conn->key.paddr.addr,
usr.sbin/unbound/services/listen_dnsport.c
4996
conid->key.paddr.addrlen) == 0 &&
usr.sbin/unbound/services/listen_dnsport.c
4997
conid->key.paddr.localaddrlen == conn->key.paddr.localaddrlen &&
usr.sbin/unbound/services/listen_dnsport.c
4998
memcmp(&conid->key.paddr.localaddr, &conn->key.paddr.localaddr,
usr.sbin/unbound/services/listen_dnsport.c
4999
conid->key.paddr.localaddrlen) == 0 &&
usr.sbin/unbound/services/listen_dnsport.c
5000
conid->key.paddr.ifindex == conn->key.paddr.ifindex)
usr.sbin/unbound/services/listen_dnsport.c
5023
conid = doq_conid_create(data, datalen, &conn->key);
usr.sbin/unbound/services/listen_dnsport.c
5041
conid->node.key);
usr.sbin/unbound/services/listen_dnsport.c
5059
if(!doq_conn_associate_conid(conn, conn->key.dcid, conn->key.dcidlen))
usr.sbin/unbound/services/listen_dnsport.c
5103
(void)rbtree_delete(conn->table->conid_tree, p->node.key);
usr.sbin/unbound/services/listen_dnsport.c
5209
doq_send_pkt(c, &conn->key.paddr, conn->close_ecn);
usr.sbin/unbound/services/listen_dnsport.c
5480
doq_send_pkt(c, &conn->key.paddr, pi.ecn);
usr.sbin/unbound/services/listen_dnsport.c
5602
addr_to_str((void*)&conn->key.paddr.addr, conn->key.paddr.addrlen,
usr.sbin/unbound/services/listen_dnsport.c
5604
addr_to_str((void*)&conn->key.paddr.localaddr,
usr.sbin/unbound/services/listen_dnsport.c
5605
conn->key.paddr.localaddrlen, localstr, sizeof(localstr));
usr.sbin/unbound/services/listen_dnsport.h
526
void* quic_sslctx_create(char* key, char* pem, char* verifypem);
usr.sbin/unbound/services/listen_dnsport.h
586
struct doq_conn_key key;
usr.sbin/unbound/services/listen_dnsport.h
655
struct doq_conn_key key;
usr.sbin/unbound/services/listen_dnsport.h
781
void doq_conn_key_from_repinfo(struct doq_conn_key* key,
usr.sbin/unbound/services/localzone.c
115
struct local_zone* z = (struct local_zone*)n->key;
usr.sbin/unbound/services/localzone.c
1247
struct local_zone key;
usr.sbin/unbound/services/localzone.c
1254
key.node.key = &key;
usr.sbin/unbound/services/localzone.c
1255
key.dclass = dclass;
usr.sbin/unbound/services/localzone.c
1256
key.name = name;
usr.sbin/unbound/services/localzone.c
1257
key.namelen = len;
usr.sbin/unbound/services/localzone.c
1258
key.namelabs = labs;
usr.sbin/unbound/services/localzone.c
1259
rbtree_find_less_equal(&zones->ztree, &key, &res);
usr.sbin/unbound/services/localzone.c
1265
(void)dname_lab_cmp(result->name, result->namelabs, key.name,
usr.sbin/unbound/services/localzone.c
1266
key.namelabs, &m);
usr.sbin/unbound/services/localzone.c
1282
struct local_zone key;
usr.sbin/unbound/services/localzone.c
1283
key.node.key = &key;
usr.sbin/unbound/services/localzone.c
1284
key.dclass = dclass;
usr.sbin/unbound/services/localzone.c
1285
key.name = name;
usr.sbin/unbound/services/localzone.c
1286
key.namelen = len;
usr.sbin/unbound/services/localzone.c
1287
key.namelabs = labs;
usr.sbin/unbound/services/localzone.c
1289
return (struct local_zone*)rbtree_search(&zones->ztree, &key);
usr.sbin/unbound/services/localzone.c
1297
struct local_zone key;
usr.sbin/unbound/services/localzone.c
1299
key.node.key = &key;
usr.sbin/unbound/services/localzone.c
1300
key.dclass = dclass;
usr.sbin/unbound/services/localzone.c
1301
key.name = name;
usr.sbin/unbound/services/localzone.c
1302
key.namelen = len;
usr.sbin/unbound/services/localzone.c
1303
key.namelabs = labs;
usr.sbin/unbound/services/localzone.c
1304
*exact = rbtree_find_less_equal(&zones->ztree, &key, &node);
usr.sbin/unbound/services/localzone.c
1400
r->entry.key = r;
usr.sbin/unbound/services/localzone.c
1488
struct local_data key;
usr.sbin/unbound/services/localzone.c
1491
key.node.key = &key;
usr.sbin/unbound/services/localzone.c
1492
key.name = qinfo->qname;
usr.sbin/unbound/services/localzone.c
1493
key.namelen = qinfo->qname_len;
usr.sbin/unbound/services/localzone.c
1494
key.namelabs = labs;
usr.sbin/unbound/services/localzone.c
1497
key.name = z->name;
usr.sbin/unbound/services/localzone.c
1498
key.namelen = z->namelen;
usr.sbin/unbound/services/localzone.c
1499
key.namelabs = z->namelabs;
usr.sbin/unbound/services/localzone.c
1518
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
usr.sbin/unbound/services/localzone.c
1568
qinfo->local_alias->rrset->entry.key =
usr.sbin/unbound/services/localzone.c
1621
struct local_data key;
usr.sbin/unbound/services/localzone.c
1630
key.node.key = &key;
usr.sbin/unbound/services/localzone.c
1631
key.name = qinfo->qname;
usr.sbin/unbound/services/localzone.c
1632
key.namelen = qinfo->qname_len;
usr.sbin/unbound/services/localzone.c
1633
key.namelabs = labs;
usr.sbin/unbound/services/localzone.c
1634
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
usr.sbin/unbound/services/localzone.c
191
z->node.key = z;
usr.sbin/unbound/services/localzone.c
379
rrset->rrset->entry.key = rrset->rrset;
usr.sbin/unbound/services/localzone.c
462
struct local_data key;
usr.sbin/unbound/services/localzone.c
463
key.node.key = &key;
usr.sbin/unbound/services/localzone.c
464
key.name = nm;
usr.sbin/unbound/services/localzone.c
465
key.namelen = nmlen;
usr.sbin/unbound/services/localzone.c
466
key.namelabs = nmlabs;
usr.sbin/unbound/services/localzone.c
467
return (struct local_data*)rbtree_search(&z->data, &key.node);
usr.sbin/unbound/services/localzone.c
484
ld->node.key = ld;
usr.sbin/unbound/services/localzone.c
526
rrset_negative->entry.key = rrset_negative;
usr.sbin/unbound/services/localzone.c
809
z.node.key = &z;
usr.sbin/unbound/services/mesh.c
1125
ref.node.key = &ref;
usr.sbin/unbound/services/mesh.c
1172
lookup.node.key = &lookup;
usr.sbin/unbound/services/mesh.c
1274
superref->node.key = superref;
usr.sbin/unbound/services/mesh.c
1276
subref->node.key = subref;
usr.sbin/unbound/services/mesh.c
1874
struct mesh_state key;
usr.sbin/unbound/services/mesh.c
1877
key.node.key = &key;
usr.sbin/unbound/services/mesh.c
1878
key.s.is_priming = prime;
usr.sbin/unbound/services/mesh.c
1879
key.s.is_valrec = valrec;
usr.sbin/unbound/services/mesh.c
1880
key.s.qinfo = *qinfo;
usr.sbin/unbound/services/mesh.c
1881
key.s.query_flags = qflags;
usr.sbin/unbound/services/mesh.c
1885
key.unique = NULL;
usr.sbin/unbound/services/mesh.c
1886
key.s.client_info = cinfo;
usr.sbin/unbound/services/mesh.c
1888
result = (struct mesh_state*)rbtree_search(&mesh->all, &key);
usr.sbin/unbound/services/mesh.c
2197
mstate = (struct mesh_state*)mesh->run.root->key;
usr.sbin/unbound/services/mesh.c
250
struct mesh_state* mstate = (struct mesh_state*)n->key;
usr.sbin/unbound/services/mesh.c
339
struct msgreply_entry* key;
usr.sbin/unbound/services/mesh.c
349
key = (struct msgreply_entry*)e->key;
usr.sbin/unbound/services/mesh.c
352
msg = tomsg(qstate->env, &key->key, data, qstate->region, timenow,
usr.sbin/unbound/services/mesh.c
981
mstate->node.key = mstate;
usr.sbin/unbound/services/mesh.c
982
mstate->run_node.key = mstate;
usr.sbin/unbound/services/outside_network.c
1041
log_assert(w->id_node.key != NULL);
usr.sbin/unbound/services/outside_network.c
1049
w->id_node.key = NULL;
usr.sbin/unbound/services/outside_network.c
1112
if(reuse->node.key) {
usr.sbin/unbound/services/outside_network.c
1121
reuse->node.key = NULL;
usr.sbin/unbound/services/outside_network.c
1171
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
usr.sbin/unbound/services/outside_network.c
1197
if(pend->reuse.node.key) {
usr.sbin/unbound/services/outside_network.c
1230
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
usr.sbin/unbound/services/outside_network.c
1240
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
usr.sbin/unbound/services/outside_network.c
1301
log_assert(pend->reuse.item_on_lru_list && pend->reuse.node.key);
usr.sbin/unbound/services/outside_network.c
1327
log_assert(pend->query->id_node.key);
usr.sbin/unbound/services/outside_network.c
1399
if(error == NETEVENT_NOERROR && pend->reuse.node.key) {
usr.sbin/unbound/services/outside_network.c
1484
struct pending key;
usr.sbin/unbound/services/outside_network.c
1499
key.id = (unsigned)LDNS_ID_WIRE(sldns_buffer_begin(c->buffer));
usr.sbin/unbound/services/outside_network.c
1500
memcpy(&key.addr, &reply_info->remote_addr, reply_info->remote_addrlen);
usr.sbin/unbound/services/outside_network.c
1501
key.addrlen = reply_info->remote_addrlen;
usr.sbin/unbound/services/outside_network.c
1502
verbose(VERB_ALGO, "Incoming reply id = %4.4x", key.id);
usr.sbin/unbound/services/outside_network.c
1508
p = (struct pending*)rbtree_search(outnet->pending, &key);
usr.sbin/unbound/services/outside_network.c
1549
(void)rbtree_delete(outnet->pending, p->node.key);
usr.sbin/unbound/services/outside_network.c
1978
(void)rbtree_delete(outnet->pending, p->node.key);
usr.sbin/unbound/services/outside_network.c
2052
pend->node.key = pend;
usr.sbin/unbound/services/outside_network.c
2285
pend->node.key = pend;
usr.sbin/unbound/services/outside_network.c
2494
w->id_node.key = NULL;
usr.sbin/unbound/services/outside_network.c
2587
struct serviced_query key;
usr.sbin/unbound/services/outside_network.c
2588
key.node.key = &key;
usr.sbin/unbound/services/outside_network.c
2589
key.qbuf = sldns_buffer_begin(buff);
usr.sbin/unbound/services/outside_network.c
2590
key.qbuflen = sldns_buffer_limit(buff);
usr.sbin/unbound/services/outside_network.c
2591
key.dnssec = dnssec;
usr.sbin/unbound/services/outside_network.c
2592
memcpy(&key.addr, addr, addrlen);
usr.sbin/unbound/services/outside_network.c
2593
key.addrlen = addrlen;
usr.sbin/unbound/services/outside_network.c
2594
key.outnet = outnet;
usr.sbin/unbound/services/outside_network.c
2595
key.opt_list = opt_list;
usr.sbin/unbound/services/outside_network.c
2596
return (struct serviced_query*)rbtree_search(outnet->serviced, &key);
usr.sbin/unbound/services/outside_network.c
2643
sq->node.key = sq;
usr.sbin/unbound/services/outside_network.c
2726
if(pend_tcp->reuse.node.key) {
usr.sbin/unbound/services/outside_network.c
455
log_assert(w->id_node.key == NULL);
usr.sbin/unbound/services/outside_network.c
456
w->id_node.key = w;
usr.sbin/unbound/services/outside_network.c
473
key_w.id_node.key = &key_w;
usr.sbin/unbound/services/outside_network.c
477
return (struct waiting_tcp*)n->key;
usr.sbin/unbound/services/outside_network.c
484
struct waiting_tcp* w = (struct waiting_tcp*)node->key;
usr.sbin/unbound/services/outside_network.c
494
if(!pend_tcp->reuse.node.key)
usr.sbin/unbound/services/outside_network.c
499
pend_tcp->reuse.node.key = &pend_tcp->reuse;
usr.sbin/unbound/services/outside_network.c
547
key_p.reuse.node.key = &key_p.reuse;
usr.sbin/unbound/services/outside_network.c
584
if (reuse_cmp_addrportssl(result->key, &key_p.reuse) < 0) {
usr.sbin/unbound/services/outside_network.c
597
reuse_cmp_addrportssl(prev->key, &key_p.reuse) == 0) {
usr.sbin/unbound/services/outside_network.c
604
reuse_cmp_addrportssl(result->key, &key_p.reuse) == 0) {
usr.sbin/unbound/services/outside_network.c
778
if(pend->reuse.node.key)
usr.sbin/unbound/services/rpz.c
1507
rbtree_delete(&set->entries, node->node.node.key);
usr.sbin/unbound/services/rpz.c
1828
csoa.entry.key = &csoa;
usr.sbin/unbound/services/rpz.c
2110
struct local_data key;
usr.sbin/unbound/services/rpz.c
2116
key.node.key = &key;
usr.sbin/unbound/services/rpz.c
2117
key.name = match->dname;
usr.sbin/unbound/services/rpz.c
2118
key.namelen = match->dname_len;
usr.sbin/unbound/services/rpz.c
2119
key.namelabs = dname_count_labels(match->dname);
usr.sbin/unbound/services/rpz.c
2121
rpz_log_dname("nsdname local data", key.name, key.namelen);
usr.sbin/unbound/services/rpz.c
2123
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
usr.sbin/unbound/services/rpz.c
2125
key.name = z->name;
usr.sbin/unbound/services/rpz.c
2126
key.namelen = z->namelen;
usr.sbin/unbound/services/rpz.c
2127
key.namelabs = z->namelabs;
usr.sbin/unbound/services/rpz.c
2128
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
usr.sbin/unbound/services/rpz.c
2152
struct local_data key;
usr.sbin/unbound/services/rpz.c
2155
key.node.key = &key;
usr.sbin/unbound/services/rpz.c
2156
key.name = qinfo->qname;
usr.sbin/unbound/services/rpz.c
2157
key.namelen = qinfo->qname_len;
usr.sbin/unbound/services/rpz.c
2158
key.namelabs = dname_count_labels(qinfo->qname);
usr.sbin/unbound/services/rpz.c
2159
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
usr.sbin/unbound/services/rpz.c
2161
key.name = z->name;
usr.sbin/unbound/services/rpz.c
2162
key.namelen = z->namelen;
usr.sbin/unbound/services/rpz.c
2163
key.namelabs = z->namelabs;
usr.sbin/unbound/services/rpz.c
2164
ld = (struct local_data*)rbtree_search(&z->data, &key.node);
usr.sbin/unbound/services/rpz.c
363
struct clientip_synthesized_rr* r = (struct clientip_synthesized_rr*)n->key;
usr.sbin/unbound/services/rpz.c
460
rrset->entry.key = rrset;
usr.sbin/unbound/services/rpz.c
924
rrset->rrset->entry.key = rrset->rrset;
usr.sbin/unbound/services/view.c
106
v->node.key = v;
usr.sbin/unbound/services/view.c
224
struct view key;
usr.sbin/unbound/services/view.c
225
key.node.key = &v;
usr.sbin/unbound/services/view.c
226
key.name = (char *)name;
usr.sbin/unbound/services/view.c
228
if(!(v = (struct view*)rbtree_search(&vs->vtree, &key.node))) {
usr.sbin/unbound/sldns/keyraw.c
110
uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize)
usr.sbin/unbound/sldns/keyraw.c
116
if (key[3] == LDNS_RSAMD5) {
usr.sbin/unbound/sldns/keyraw.c
119
memmove(&ac16, key + keysize - 3, 2);
usr.sbin/unbound/sldns/keyraw.c
127
ac32 += ((i & 1)) ? key[i] : key[i] << 8;
usr.sbin/unbound/sldns/keyraw.c
201
sldns_key_dsa_buf_bignum(unsigned char* key, size_t len, BIGNUM** p,
usr.sbin/unbound/sldns/keyraw.c
210
T = (uint8_t)key[0];
usr.sbin/unbound/sldns/keyraw.c
220
*q = BN_bin2bn(key+offset, SHA_DIGEST_LENGTH, NULL);
usr.sbin/unbound/sldns/keyraw.c
223
*p = BN_bin2bn(key+offset, (int)length, NULL);
usr.sbin/unbound/sldns/keyraw.c
226
*g = BN_bin2bn(key+offset, (int)length, NULL);
usr.sbin/unbound/sldns/keyraw.c
229
*y = BN_bin2bn(key+offset, (int)length, NULL);
usr.sbin/unbound/sldns/keyraw.c
243
sldns_key_buf2dsa_raw(unsigned char* key, size_t len)
usr.sbin/unbound/sldns/keyraw.c
247
if(!sldns_key_dsa_buf_bignum(key, len, &P, &Q, &G, &Y)) {
usr.sbin/unbound/sldns/keyraw.c
286
EVP_PKEY *sldns_key_dsa2pkey_raw(unsigned char* key, size_t len)
usr.sbin/unbound/sldns/keyraw.c
294
if(!sldns_key_dsa_buf_bignum(key, len, &p, &q, &g, &y)) {
usr.sbin/unbound/sldns/keyraw.c
361
dsa = sldns_key_buf2dsa_raw(key, len);
usr.sbin/unbound/sldns/keyraw.c
378
sldns_key_rsa_buf_bignum(unsigned char* key, size_t len, BIGNUM** n,
usr.sbin/unbound/sldns/keyraw.c
387
if (key[0] == 0) {
usr.sbin/unbound/sldns/keyraw.c
390
memmove(&int16, key+1, 2);
usr.sbin/unbound/sldns/keyraw.c
394
exp = key[0];
usr.sbin/unbound/sldns/keyraw.c
405
(void) BN_bin2bn(key+offset, (int)exp, *e);
usr.sbin/unbound/sldns/keyraw.c
415
(void) BN_bin2bn(key+offset, (int)(len - offset), *n);
usr.sbin/unbound/sldns/keyraw.c
421
sldns_key_buf2rsa_raw(unsigned char* key, size_t len)
usr.sbin/unbound/sldns/keyraw.c
426
if(!sldns_key_rsa_buf_bignum(key, len, &modulus, &exponent))
usr.sbin/unbound/sldns/keyraw.c
454
EVP_PKEY* sldns_key_rsa2pkey_raw(unsigned char* key, size_t len)
usr.sbin/unbound/sldns/keyraw.c
463
if(!sldns_key_rsa_buf_bignum(key, len, &n, &e)) {
usr.sbin/unbound/sldns/keyraw.c
521
rsa = sldns_key_buf2rsa_raw(key, len);
usr.sbin/unbound/sldns/keyraw.c
537
sldns_gost2pkey_raw(unsigned char* key, size_t keylen)
usr.sbin/unbound/sldns/keyraw.c
553
memmove(encoded+37, key, 64);
usr.sbin/unbound/sldns/keyraw.c
562
sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo)
usr.sbin/unbound/sldns/keyraw.c
587
memmove(buf+1, key, keylen);
usr.sbin/unbound/sldns/keyraw.c
640
memmove(buf+1, key, keylen);
usr.sbin/unbound/sldns/keyraw.c
662
sldns_ed255192pkey_raw(const unsigned char* key, size_t keylen)
usr.sbin/unbound/sldns/keyraw.c
675
memmove(buf+pre_len, key, keylen);
usr.sbin/unbound/sldns/keyraw.c
683
sldns_ed4482pkey_raw(const unsigned char* key, size_t keylen)
usr.sbin/unbound/sldns/keyraw.c
696
memmove(buf+pre_len, key, keylen);
usr.sbin/unbound/sldns/keyraw.h
104
RSA *sldns_key_buf2rsa_raw(unsigned char* key, size_t len);
usr.sbin/unbound/sldns/keyraw.h
113
EVP_PKEY* sldns_key_rsa2pkey_raw(unsigned char* key, size_t len);
usr.sbin/unbound/sldns/keyraw.h
122
EVP_PKEY* sldns_ed255192pkey_raw(const unsigned char* key, size_t len);
usr.sbin/unbound/sldns/keyraw.h
131
EVP_PKEY* sldns_ed4482pkey_raw(const unsigned char* key, size_t len);
usr.sbin/unbound/sldns/keyraw.h
47
uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
usr.sbin/unbound/sldns/keyraw.h
67
DSA *sldns_key_buf2dsa_raw(unsigned char* key, size_t len);
usr.sbin/unbound/sldns/keyraw.h
76
EVP_PKEY *sldns_key_dsa2pkey_raw(unsigned char* key, size_t len);
usr.sbin/unbound/sldns/keyraw.h
85
EVP_PKEY* sldns_gost2pkey_raw(unsigned char* key, size_t keylen);
usr.sbin/unbound/sldns/keyraw.h
95
EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
usr.sbin/unbound/sldns/str2wire.c
1110
sldns_str2wire_svcparam_key_lookup(const char *key, size_t key_len)
usr.sbin/unbound/sldns/str2wire.c
1116
if (key_len >= 4 && key_len <= 8 && !strncmp(key, "key", 3)) {
usr.sbin/unbound/sldns/str2wire.c
1117
memcpy(buf, key + 3, key_len - 3);
usr.sbin/unbound/sldns/str2wire.c
1128
if (!strncmp(key, "ech", key_len))
usr.sbin/unbound/sldns/str2wire.c
1133
if (!strncmp(key, "alpn", key_len))
usr.sbin/unbound/sldns/str2wire.c
1135
if (!strncmp(key, "port", key_len))
usr.sbin/unbound/sldns/str2wire.c
1140
if (!strncmp(key, "dohpath", key_len))
usr.sbin/unbound/sldns/str2wire.c
1145
if (!strncmp(key, "ipv4hint", key_len))
usr.sbin/unbound/sldns/str2wire.c
1147
if (!strncmp(key, "ipv6hint", key_len))
usr.sbin/unbound/sldns/str2wire.c
1152
if (!strncmp(key, "mandatory", key_len))
usr.sbin/unbound/sldns/str2wire.c
1154
if (!strncmp(key, "echconfig", key_len))
usr.sbin/unbound/sldns/str2wire.c
1159
if (!strncmp(key, "no-default-alpn", key_len))
usr.sbin/unbound/sldns/str2wire.c
1390
uint16_t key = sldns_read_uint16(current_pos);
usr.sbin/unbound/sldns/str2wire.c
1392
if (key == sldns_read_uint16(current_pos + 2)) {
usr.sbin/unbound/sldns/str2wire.c
1551
sldns_str2wire_svcparam_value(const char *key, size_t key_len,
usr.sbin/unbound/sldns/str2wire.c
1555
int svcparamkey = sldns_str2wire_svcparam_key_lookup(key, key_len);
usr.sbin/unbound/sldns/str2wire.c
695
uint16_t key = sldns_read_uint16(svcparams[i]);
usr.sbin/unbound/sldns/str2wire.c
696
if(i + 1 < nparams && key == sldns_read_uint16(svcparams[i+1]))
usr.sbin/unbound/sldns/str2wire.c
698
if(key == SVCB_KEY_MANDATORY)
usr.sbin/unbound/smallapp/unbound-checkconf.c
760
char* key = NULL;
usr.sbin/unbound/smallapp/unbound-checkconf.c
762
key = cfg->auto_trust_anchor_file_list->str;
usr.sbin/unbound/smallapp/unbound-checkconf.c
763
if(!key && cfg->trust_anchor_file_list)
usr.sbin/unbound/smallapp/unbound-checkconf.c
764
key = cfg->trust_anchor_file_list->str;
usr.sbin/unbound/smallapp/unbound-checkconf.c
765
if(!key && cfg->trust_anchor_list)
usr.sbin/unbound/smallapp/unbound-checkconf.c
766
key = cfg->trust_anchor_list->str;
usr.sbin/unbound/smallapp/unbound-checkconf.c
767
if(!key && cfg->trusted_keys_file_list)
usr.sbin/unbound/smallapp/unbound-checkconf.c
768
key = cfg->trusted_keys_file_list->str;
usr.sbin/unbound/smallapp/unbound-checkconf.c
769
if(!key) key = "";
usr.sbin/unbound/smallapp/unbound-checkconf.c
770
fatal_exit("disable-edns-do does not allow DNSSEC to work, but the validator module uses a trust anchor %s, turn off disable-edns-do or disable validation", key);
usr.sbin/unbound/testcode/checklocks.h
360
#define ub_thread_key_create(key, f) LOCKRET(pthread_key_create(key, f))
usr.sbin/unbound/testcode/checklocks.h
361
#define ub_thread_key_set(key, v) LOCKRET(pthread_setspecific(key, v))
usr.sbin/unbound/testcode/checklocks.h
362
#define ub_thread_key_get(key) pthread_getspecific(key)
usr.sbin/unbound/testcode/fake_event.c
761
struct msgreply_entry* msg = (struct msgreply_entry*)e->key;
usr.sbin/unbound/testcode/lock_verify.c
196
o->node.key = &o->id;
usr.sbin/unbound/testcode/lock_verify.c
221
o->node.key = &o->id;
usr.sbin/unbound/testcode/lock_verify.c
253
ref->node.key = &prev->id;
usr.sbin/unbound/testcode/lock_verify.c
357
start.node.key = &lock->id;
usr.sbin/unbound/testcode/memstats.c
102
get_codeline(rbtree_type* tree, char* key, char* func)
usr.sbin/unbound/testcode/memstats.c
104
struct codeline* cl = (struct codeline*)rbtree_search(tree, key);
usr.sbin/unbound/testcode/memstats.c
108
cl->codeline = strdup(key);
usr.sbin/unbound/testcode/memstats.c
120
cl->node.key = cl->codeline;
usr.sbin/unbound/testcode/petal.c
236
setup_ctx(char* key, char* cert)
usr.sbin/unbound/testcode/petal.c
252
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM))
usr.sbin/unbound/testcode/petal.c
581
do_service(char* addr, int port, char* key, char* cert)
usr.sbin/unbound/testcode/petal.c
583
SSL_CTX* sslctx = setup_ctx(key, cert);
usr.sbin/unbound/testcode/petal.c
623
char* addr = "127.0.0.1", *key = "petal.key", *cert = "petal.pem";
usr.sbin/unbound/testcode/petal.c
641
key = optarg;
usr.sbin/unbound/testcode/petal.c
684
do_service(addr, port, key, cert);
usr.sbin/unbound/testcode/replay.c
647
k.node.key = &k;
usr.sbin/unbound/testcode/replay.c
920
x->node.key = x;
usr.sbin/unbound/testcode/testbound.c
736
void* quic_sslctx_create(char* ATTR_UNUSED(key), char* ATTR_UNUSED(pem),
usr.sbin/unbound/testcode/unitinfra.c
62
*k = (struct infra_key*)e->key;
usr.sbin/unbound/testcode/unitlruhash.c
239
testkey_type* key = newkey(numtoadd);
usr.sbin/unbound/testcode/unitlruhash.c
240
key->entry.data = data;
usr.sbin/unbound/testcode/unitlruhash.c
241
lruhash_insert(table, myhash(numtoadd), &key->entry, data, NULL);
usr.sbin/unbound/testcode/unitlruhash.c
250
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitlruhash.c
251
lruhash_remove(table, myhash(num), key);
usr.sbin/unbound/testcode/unitlruhash.c
253
delkey(key);
usr.sbin/unbound/testcode/unitlruhash.c
261
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitlruhash.c
262
struct lruhash_entry* en = lruhash_lookup(table, myhash(num), key, 0);
usr.sbin/unbound/testcode/unitlruhash.c
265
unit_assert(en->key);
usr.sbin/unbound/testcode/unitlruhash.c
272
delkey(key);
usr.sbin/unbound/testcode/unitlruhash.c
317
testkey_type* key = newkey(numtoadd);
usr.sbin/unbound/testcode/unitlruhash.c
318
key->entry.data = data;
usr.sbin/unbound/testcode/unitlruhash.c
319
lruhash_insert(table, myhash(numtoadd), &key->entry, data, NULL);
usr.sbin/unbound/testcode/unitlruhash.c
329
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitlruhash.c
330
lruhash_remove(table, myhash(num), key);
usr.sbin/unbound/testcode/unitlruhash.c
333
delkey(key);
usr.sbin/unbound/testcode/unitlruhash.c
341
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitlruhash.c
342
struct lruhash_entry* en = lruhash_lookup(table, myhash(num), key, 0);
usr.sbin/unbound/testcode/unitlruhash.c
345
unit_assert(en->key);
usr.sbin/unbound/testcode/unitlruhash.c
355
delkey(key);
usr.sbin/unbound/testcode/unitlruhash.c
66
k->entry.key = k;
usr.sbin/unbound/testcode/unitslabhash.c
113
testkey_type* key = newkey(numtoadd);
usr.sbin/unbound/testcode/unitslabhash.c
114
key->entry.data = data;
usr.sbin/unbound/testcode/unitslabhash.c
115
slabhash_insert(table, myhash(numtoadd), &key->entry, data, NULL);
usr.sbin/unbound/testcode/unitslabhash.c
124
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitslabhash.c
125
slabhash_remove(table, myhash(num), key);
usr.sbin/unbound/testcode/unitslabhash.c
127
delkey(key);
usr.sbin/unbound/testcode/unitslabhash.c
135
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitslabhash.c
136
struct lruhash_entry* en = slabhash_lookup(table, myhash(num), key, 0);
usr.sbin/unbound/testcode/unitslabhash.c
139
unit_assert(en->key);
usr.sbin/unbound/testcode/unitslabhash.c
146
delkey(key);
usr.sbin/unbound/testcode/unitslabhash.c
200
testkey_type* key = newkey(numtoadd);
usr.sbin/unbound/testcode/unitslabhash.c
201
key->entry.data = data;
usr.sbin/unbound/testcode/unitslabhash.c
202
slabhash_insert(table, myhash(numtoadd), &key->entry, data, NULL);
usr.sbin/unbound/testcode/unitslabhash.c
212
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitslabhash.c
213
slabhash_remove(table, myhash(num), key);
usr.sbin/unbound/testcode/unitslabhash.c
216
delkey(key);
usr.sbin/unbound/testcode/unitslabhash.c
224
testkey_type* key = newkey(num);
usr.sbin/unbound/testcode/unitslabhash.c
225
struct lruhash_entry* en = slabhash_lookup(table, myhash(num), key, 0);
usr.sbin/unbound/testcode/unitslabhash.c
228
unit_assert(en->key);
usr.sbin/unbound/testcode/unitslabhash.c
238
delkey(key);
usr.sbin/unbound/testcode/unitslabhash.c
68
k->entry.key = k;
usr.sbin/unbound/testcode/unitverify.c
529
unsigned char key[] = {
usr.sbin/unbound/testcode/unitverify.c
574
evp_key = sldns_key_rsa2pkey_raw(key, keylen);
usr.sbin/unbound/util/alloc.c
59
t->entry.key = t;
usr.sbin/unbound/util/config_file.c
2788
w_lookup_reg_str(const char* key, const char* name)
usr.sbin/unbound/util/config_file.c
2796
ret = RegOpenKeyEx(HKEY_LOCAL_MACHINE, key, 0, KEY_READ, &hk);
usr.sbin/unbound/util/config_file.h
1420
char* w_lookup_reg_str(const char* key, const char* name);
usr.sbin/unbound/util/data/msgencode.c
291
compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
usr.sbin/unbound/util/data/msgencode.c
301
(p = compress_tree_lookup(tree, key->rk.dname,
usr.sbin/unbound/util/data/msgencode.c
307
if(!write_compressed_dname(pkt, key->rk.dname,
usr.sbin/unbound/util/data/msgencode.c
316
if(sldns_buffer_remaining(pkt) < key->rk.dname_len+4+4+2)
usr.sbin/unbound/util/data/msgencode.c
318
sldns_buffer_write(pkt, key->rk.dname,
usr.sbin/unbound/util/data/msgencode.c
319
key->rk.dname_len);
usr.sbin/unbound/util/data/msgencode.c
324
!compress_tree_store(key->rk.dname, owner_labs,
usr.sbin/unbound/util/data/msgencode.c
368
type_rdata_compressible(struct ub_packed_rrset_key* key)
usr.sbin/unbound/util/data/msgencode.c
370
uint16_t t = ntohs(key->rk.type);
usr.sbin/unbound/util/data/msgencode.c
461
packed_rrset_encode(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
usr.sbin/unbound/util/data/msgencode.c
472
key->entry.data;
usr.sbin/unbound/util/data/msgencode.c
475
if(!rrset_belongs_in_reply(s, ntohs(key->rk.type), qtype, dnssec))
usr.sbin/unbound/util/data/msgencode.c
478
owner_labs = dname_count_labels(key->rk.dname);
usr.sbin/unbound/util/data/msgencode.c
483
if((key->rk.flags & PACKED_RRSET_FIXEDTTL) != 0)
usr.sbin/unbound/util/data/msgencode.c
489
const sldns_rr_descriptor* c = type_rdata_compressible(key);
usr.sbin/unbound/util/data/msgencode.c
493
if((r=compress_owner(key, pkt, region, tree,
usr.sbin/unbound/util/data/msgencode.c
497
sldns_buffer_write(pkt, &key->rk.type, 2);
usr.sbin/unbound/util/data/msgencode.c
498
sldns_buffer_write(pkt, &key->rk.rrset_class, 2);
usr.sbin/unbound/util/data/msgencode.c
526
if((r=compress_any_dname(key->rk.dname,
usr.sbin/unbound/util/data/msgencode.c
535
sldns_buffer_write(pkt, &key->rk.rrset_class, 2);
usr.sbin/unbound/util/data/msgreply.c
167
rep->rrsets[i]->entry.key = rep->rrsets[i];
usr.sbin/unbound/util/data/msgreply.c
481
pk->entry.key = (void*)pk;
usr.sbin/unbound/util/data/msgreply.c
585
if(x->key < y->key) return -1;
usr.sbin/unbound/util/data/msgreply.c
586
if(x->key > y->key) return 1;
usr.sbin/unbound/util/data/msgreply.c
609
rep->ref[i].key->entry.data;
usr.sbin/unbound/util/data/msgreply.c
610
if(i>0 && rep->ref[i].key == rep->ref[i-1].key)
usr.sbin/unbound/util/data/msgreply.c
695
+ q->key.qname_len + lock_get_mem(&q->entry.lock)
usr.sbin/unbound/util/data/msgreply.c
707
query_info_clear(&q->key);
usr.sbin/unbound/util/data/msgreply.c
741
memcpy(&e->key, q, sizeof(*q));
usr.sbin/unbound/util/data/msgreply.c
743
e->entry.key = e;
usr.sbin/unbound/util/data/msgreply.c
746
lock_protect(&e->entry.lock, &e->key.qname, sizeof(e->key.qname));
usr.sbin/unbound/util/data/msgreply.c
747
lock_protect(&e->entry.lock, &e->key.qname_len, sizeof(e->key.qname_len));
usr.sbin/unbound/util/data/msgreply.c
748
lock_protect(&e->entry.lock, &e->key.qtype, sizeof(e->key.qtype));
usr.sbin/unbound/util/data/msgreply.c
749
lock_protect(&e->entry.lock, &e->key.qclass, sizeof(e->key.qclass));
usr.sbin/unbound/util/data/msgreply.c
750
lock_protect(&e->entry.lock, &e->key.local_alias, sizeof(e->key.local_alias));
usr.sbin/unbound/util/data/msgreply.c
752
lock_protect(&e->entry.lock, &e->entry.key, sizeof(e->entry.key));
usr.sbin/unbound/util/data/msgreply.c
754
lock_protect(&e->entry.lock, e->key.qname, e->key.qname_len);
usr.sbin/unbound/util/data/msgreply.h
108
struct ub_packed_rrset_key* key;
usr.sbin/unbound/util/data/msgreply.h
246
struct query_info key;
usr.sbin/unbound/util/data/packed_rrset.c
128
ub_rrset_key_delete(void* key, void* userdata)
usr.sbin/unbound/util/data/packed_rrset.c
130
struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)key;
usr.sbin/unbound/util/data/packed_rrset.c
163
rrset_key_hash(struct packed_rrset_key* key)
usr.sbin/unbound/util/data/packed_rrset.c
166
uint16_t t = ntohs(key->type);
usr.sbin/unbound/util/data/packed_rrset.c
170
h = dname_query_hash(key->dname, h);
usr.sbin/unbound/util/data/packed_rrset.c
172
h = hashlittle(&key->rrset_class, sizeof(uint16_t), h);
usr.sbin/unbound/util/data/packed_rrset.c
173
h = hashlittle(&key->flags, sizeof(uint32_t), h);
usr.sbin/unbound/util/data/packed_rrset.c
325
ub_packed_rrset_ttl(struct ub_packed_rrset_key* key)
usr.sbin/unbound/util/data/packed_rrset.c
327
struct packed_rrset_data* d = (struct packed_rrset_data*)key->
usr.sbin/unbound/util/data/packed_rrset.c
333
packed_rrset_copy_region(struct ub_packed_rrset_key* key,
usr.sbin/unbound/util/data/packed_rrset.c
340
key->entry.data;
usr.sbin/unbound/util/data/packed_rrset.c
345
ck->id = key->id;
usr.sbin/unbound/util/data/packed_rrset.c
347
ck->entry.hash = key->entry.hash;
usr.sbin/unbound/util/data/packed_rrset.c
348
ck->entry.key = ck;
usr.sbin/unbound/util/data/packed_rrset.c
349
ck->rk = key->rk;
usr.sbin/unbound/util/data/packed_rrset.c
350
ck->rk.dname = regional_alloc_init(region, key->rk.dname,
usr.sbin/unbound/util/data/packed_rrset.c
351
key->rk.dname_len);
usr.sbin/unbound/util/data/packed_rrset.c
375
packed_rrset_copy_alloc(struct ub_packed_rrset_key* key,
usr.sbin/unbound/util/data/packed_rrset.c
381
fd = (struct packed_rrset_data*)key->entry.data;
usr.sbin/unbound/util/data/packed_rrset.c
382
dk->entry.hash = key->entry.hash;
usr.sbin/unbound/util/data/packed_rrset.c
383
dk->rk = key->rk;
usr.sbin/unbound/util/data/packed_rrset.c
384
dk->rk.dname = (uint8_t*)memdup(key->rk.dname, key->rk.dname_len);
usr.sbin/unbound/util/data/packed_rrset.c
70
ub_rrset_sizefunc(void* key, void* data)
usr.sbin/unbound/util/data/packed_rrset.c
72
struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)key;
usr.sbin/unbound/util/data/packed_rrset.h
318
time_t ub_packed_rrset_ttl(struct ub_packed_rrset_key* key);
usr.sbin/unbound/util/data/packed_rrset.h
326
size_t ub_rrset_sizefunc(void* key, void* data);
usr.sbin/unbound/util/data/packed_rrset.h
352
void ub_rrset_key_delete(void* key, void* userdata);
usr.sbin/unbound/util/data/packed_rrset.h
366
hashvalue_type rrset_key_hash(struct packed_rrset_key* key);
usr.sbin/unbound/util/data/packed_rrset.h
449
struct ub_packed_rrset_key* key, struct regional* region,
usr.sbin/unbound/util/data/packed_rrset.h
460
struct ub_packed_rrset_key* key, struct alloc_cache* alloc,
usr.sbin/unbound/util/locks.c
146
void* ub_thread_key_get(ub_thread_key_type key)
usr.sbin/unbound/util/locks.c
149
LOCKRET(thr_getspecific(key, &ret));
usr.sbin/unbound/util/locks.c
200
void ub_thread_key_create(ub_thread_key_type* key, void* f)
usr.sbin/unbound/util/locks.c
202
*key = TlsAlloc();
usr.sbin/unbound/util/locks.c
203
if(*key == TLS_OUT_OF_INDEXES) {
usr.sbin/unbound/util/locks.c
204
*key = 0;
usr.sbin/unbound/util/locks.c
207
else ub_thread_key_set(*key, f);
usr.sbin/unbound/util/locks.c
210
void ub_thread_key_set(ub_thread_key_type key, void* v)
usr.sbin/unbound/util/locks.c
212
if(!TlsSetValue(key, v)) {
usr.sbin/unbound/util/locks.c
217
void* ub_thread_key_get(ub_thread_key_type key)
usr.sbin/unbound/util/locks.c
219
void* ret = (void*)TlsGetValue(key);
usr.sbin/unbound/util/locks.h
177
#define ub_thread_key_create(key, f) LOCKRET(pthread_key_create(key, f))
usr.sbin/unbound/util/locks.h
178
#define ub_thread_key_set(key, v) LOCKRET(pthread_setspecific(key, v))
usr.sbin/unbound/util/locks.h
179
#define ub_thread_key_get(key) pthread_getspecific(key)
usr.sbin/unbound/util/locks.h
215
#define ub_thread_key_create(key, f) LOCKRET(thr_keycreate(key, f))
usr.sbin/unbound/util/locks.h
216
#define ub_thread_key_set(key, v) LOCKRET(thr_setspecific(key, v))
usr.sbin/unbound/util/locks.h
217
void* ub_thread_key_get(ub_thread_key_type key);
usr.sbin/unbound/util/locks.h
253
void ub_thread_key_create(ub_thread_key_type* key, void* f);
usr.sbin/unbound/util/locks.h
254
void ub_thread_key_set(ub_thread_key_type key, void* v);
usr.sbin/unbound/util/locks.h
255
void* ub_thread_key_get(ub_thread_key_type key);
usr.sbin/unbound/util/locks.h
294
#define ub_thread_key_create(key, f) (*(key)) = NULL
usr.sbin/unbound/util/locks.h
295
#define ub_thread_key_set(key, v) (key) = (v)
usr.sbin/unbound/util/locks.h
296
#define ub_thread_key_get(key) (key)
usr.sbin/unbound/util/mini_event.c
274
ev->node.key = ev;
usr.sbin/unbound/util/net_help.c
1341
void* listen_sslctx_create(const char* key, const char* pem,
usr.sbin/unbound/util/net_help.c
1352
if(!key || key[0] == 0) {
usr.sbin/unbound/util/net_help.c
1372
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
usr.sbin/unbound/util/net_help.c
1373
log_err("error for private key file: %s", key);
usr.sbin/unbound/util/net_help.c
1379
log_err("error for key file: %s", key);
usr.sbin/unbound/util/net_help.c
1436
(void)key; (void)pem; (void)verifypem;
usr.sbin/unbound/util/net_help.c
1535
void* connect_sslctx_create(char* key, char* pem, char* verifypem, int wincert)
usr.sbin/unbound/util/net_help.c
1577
if(key && key[0]) {
usr.sbin/unbound/util/net_help.c
1584
if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
usr.sbin/unbound/util/net_help.c
1585
log_err("error in client private key %s", key);
usr.sbin/unbound/util/net_help.c
1591
log_err("error in client key %s", key);
usr.sbin/unbound/util/net_help.c
1626
(void)key; (void)pem; (void)verifypem; (void)wincert;
usr.sbin/unbound/util/net_help.c
1910
struct tls_session_ticket_key *key;
usr.sbin/unbound/util/net_help.c
1912
for(key = ticket_keys; key->key_name != NULL; key++) {
usr.sbin/unbound/util/net_help.c
1913
if (!memcmp(key_name, key->key_name, 16)) {
usr.sbin/unbound/util/net_help.c
1918
if(key->key_name == NULL) {
usr.sbin/unbound/util/net_help.c
1925
key->hmac_key, 32);
usr.sbin/unbound/util/net_help.c
1935
if (HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL) != 1) {
usr.sbin/unbound/util/net_help.c
1940
HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL);
usr.sbin/unbound/util/net_help.c
1942
if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) {
usr.sbin/unbound/util/net_help.c
1947
return (key == ticket_keys) ? 1 : 2;
usr.sbin/unbound/util/net_help.c
1965
struct tls_session_ticket_key *key;
usr.sbin/unbound/util/net_help.c
1967
for(key = ticket_keys; key->key_name != NULL; key++) {
usr.sbin/unbound/util/net_help.c
1970
explicit_bzero(key->key_name, 80);
usr.sbin/unbound/util/net_help.c
1972
memset(key->key_name, 0xdd, 80);
usr.sbin/unbound/util/net_help.c
1974
free(key->key_name);
usr.sbin/unbound/util/net_help.h
504
void* listen_sslctx_create(const char* key, const char* pem,
usr.sbin/unbound/util/net_help.h
518
void* connect_sslctx_create(char* key, char* pem, char* verifypem, int wincert);
usr.sbin/unbound/util/netevent.c
1646
struct doq_conn key;
usr.sbin/unbound/util/netevent.c
1647
memset(&key.node, 0, sizeof(key.node));
usr.sbin/unbound/util/netevent.c
1648
key.node.key = &key;
usr.sbin/unbound/util/netevent.c
1649
memmove(&key.key.paddr.addr, addr, addrlen);
usr.sbin/unbound/util/netevent.c
1650
key.key.paddr.addrlen = addrlen;
usr.sbin/unbound/util/netevent.c
1651
memmove(&key.key.paddr.localaddr, localaddr, localaddrlen);
usr.sbin/unbound/util/netevent.c
1652
key.key.paddr.localaddrlen = localaddrlen;
usr.sbin/unbound/util/netevent.c
1653
key.key.paddr.ifindex = ifindex;
usr.sbin/unbound/util/netevent.c
1654
key.key.dcid = (void*)dcid;
usr.sbin/unbound/util/netevent.c
1655
key.key.dcidlen = dcidlen;
usr.sbin/unbound/util/netevent.c
1656
node = rbtree_search(table->conn_tree, &key);
usr.sbin/unbound/util/netevent.c
1658
return (struct doq_conn*)node->key;
usr.sbin/unbound/util/netevent.c
1673
struct doq_conn_key key = conid->key;
usr.sbin/unbound/util/netevent.c
1675
log_assert(conid->key.dcidlen <= NGTCP2_MAX_CIDLEN);
usr.sbin/unbound/util/netevent.c
1676
memcpy(cid, conid->key.dcid, conid->key.dcidlen);
usr.sbin/unbound/util/netevent.c
1677
key.dcid = cid;
usr.sbin/unbound/util/netevent.c
1682
conn = doq_conn_find(table, &key.paddr.addr,
usr.sbin/unbound/util/netevent.c
1683
key.paddr.addrlen, &key.paddr.localaddr,
usr.sbin/unbound/util/netevent.c
1684
key.paddr.localaddrlen, key.paddr.ifindex, key.dcid,
usr.sbin/unbound/util/netevent.c
1685
key.dcidlen);
usr.sbin/unbound/util/netevent.c
1968
copy.key = conn->key;
usr.sbin/unbound/util/netevent.c
1969
log_assert(conn->key.dcidlen <= NGTCP2_MAX_CIDLEN);
usr.sbin/unbound/util/netevent.c
1970
memcpy(cid, conn->key.dcid, conn->key.dcidlen);
usr.sbin/unbound/util/netevent.c
1971
copy.key.dcid = cid;
usr.sbin/unbound/util/netevent.c
1972
copy.node.key = &copy;
usr.sbin/unbound/util/netevent.c
1977
node = rbtree_delete(c->doq_socket->table->conn_tree, copy.node.key);
usr.sbin/unbound/util/netevent.c
1979
conn = (struct doq_conn*)node->key;
usr.sbin/unbound/util/netevent.c
1998
sizeof(*conn)+conn->key.dcidlen);
usr.sbin/unbound/util/netevent.c
2039
sizeof(*conn)+conn->key.dcidlen);
usr.sbin/unbound/util/netevent.c
2237
copy.key = conn->key;
usr.sbin/unbound/util/netevent.c
2238
log_assert(conn->key.dcidlen <= NGTCP2_MAX_CIDLEN);
usr.sbin/unbound/util/netevent.c
2239
memcpy(cid, conn->key.dcid, conn->key.dcidlen);
usr.sbin/unbound/util/netevent.c
2240
copy.key.dcid = cid;
usr.sbin/unbound/util/netevent.c
2241
copy.node.key = &copy;
usr.sbin/unbound/util/netevent.c
2245
node = rbtree_search(c->doq_socket->table->conn_tree, copy.node.key);
usr.sbin/unbound/util/netevent.c
2251
conn = (struct doq_conn*)node->key;
usr.sbin/unbound/util/netevent.c
2296
copy.key = conn->key;
usr.sbin/unbound/util/netevent.c
2297
log_assert(conn->key.dcidlen <= NGTCP2_MAX_CIDLEN);
usr.sbin/unbound/util/netevent.c
2298
memcpy(cid, conn->key.dcid, conn->key.dcidlen);
usr.sbin/unbound/util/netevent.c
2299
copy.key.dcid = cid;
usr.sbin/unbound/util/netevent.c
2300
copy.node.key = &copy;
usr.sbin/unbound/util/netevent.c
2304
node = rbtree_search(c->doq_socket->table->conn_tree, copy.node.key);
usr.sbin/unbound/util/netevent.c
2310
conn = (struct doq_conn*)node->key;
usr.sbin/unbound/util/netevent.c
2499
addr_to_str((void*)&conn->key.paddr.addr,
usr.sbin/unbound/util/netevent.c
2500
conn->key.paddr.addrlen, remotestr,
usr.sbin/unbound/util/netevent.c
2582
addr_to_str((void*)&conn->key.paddr.addr,
usr.sbin/unbound/util/netevent.c
2583
conn->key.paddr.addrlen, remotestr,
usr.sbin/unbound/util/netevent.c
2587
&conn->key.paddr.addr));
usr.sbin/unbound/util/netevent.c
2806
struct doq_conn_key key;
usr.sbin/unbound/util/netevent.c
2807
doq_conn_key_from_repinfo(&key, repinfo);
usr.sbin/unbound/util/netevent.c
2809
conn = doq_conn_find(table, &key.paddr.addr,
usr.sbin/unbound/util/netevent.c
2810
key.paddr.addrlen, &key.paddr.localaddr,
usr.sbin/unbound/util/netevent.c
2811
key.paddr.localaddrlen, key.paddr.ifindex, key.dcid,
usr.sbin/unbound/util/netevent.c
2812
key.dcidlen);
usr.sbin/unbound/util/rbtree.c
241
if ((r = rbtree->cmp(data->key, node->key)) == 0) {
usr.sbin/unbound/util/rbtree.c
281
rbtree_search (rbtree_type *rbtree, const void *key)
usr.sbin/unbound/util/rbtree.c
285
if (rbtree_find_less_equal(rbtree, key, &node)) {
usr.sbin/unbound/util/rbtree.c
329
rbtree_delete(rbtree_type *rbtree, const void *key)
usr.sbin/unbound/util/rbtree.c
333
if((to_delete = rbtree_search(rbtree, key)) == 0) return 0;
usr.sbin/unbound/util/rbtree.c
511
rbtree_find_less_equal(rbtree_type *rbtree, const void *key,
usr.sbin/unbound/util/rbtree.c
527
r = rbtree->cmp(key, node->key);
usr.sbin/unbound/util/rbtree.h
119
rbnode_type *rbtree_delete(rbtree_type *rbtree, const void *key);
usr.sbin/unbound/util/rbtree.h
127
rbnode_type *rbtree_search(rbtree_type *rbtree, const void *key);
usr.sbin/unbound/util/rbtree.h
138
int rbtree_find_less_equal(rbtree_type *rbtree, const void *key,
usr.sbin/unbound/util/rbtree.h
63
const void *key;
usr.sbin/unbound/util/shm_side/shm_main.c
109
daemon->shm_info->key = daemon->cfg->shm_key;
usr.sbin/unbound/util/shm_side/shm_main.c
112
daemon->shm_info->id_ctl = shmget(daemon->shm_info->key, sizeof(int), SHM_R);
usr.sbin/unbound/util/shm_side/shm_main.c
113
daemon->shm_info->id_arr = shmget(daemon->shm_info->key + 1, sizeof(int), SHM_R);
usr.sbin/unbound/util/shm_side/shm_main.c
124
daemon->shm_info->id_ctl = shmget(daemon->shm_info->key, sizeof(struct ub_shm_stat_info), IPC_CREAT | 0644);
usr.sbin/unbound/util/shm_side/shm_main.c
129
daemon->shm_info->key, strerror(errno));
usr.sbin/unbound/util/shm_side/shm_main.c
138
daemon->shm_info->id_arr = shmget(daemon->shm_info->key + 1, shm_size, IPC_CREAT | 0644);
usr.sbin/unbound/util/shm_side/shm_main.c
143
daemon->shm_info->key, strerror(errno));
usr.sbin/unbound/util/shm_side/shm_main.c
202
daemon->shm_info->key, daemon->shm_info->id_ctl, daemon->shm_info->id_arr, daemon->shm_info->ptr_ctl, daemon->shm_info->ptr_arr);
usr.sbin/unbound/util/shm_side/shm_main.h
59
int key;
usr.sbin/unbound/util/storage/dnstree.c
100
node->node.key = node;
usr.sbin/unbound/util/storage/dnstree.c
112
node->node.key = node;
usr.sbin/unbound/util/storage/dnstree.c
182
struct name_tree_node key;
usr.sbin/unbound/util/storage/dnstree.c
183
key.node.key = &key;
usr.sbin/unbound/util/storage/dnstree.c
184
key.name = name;
usr.sbin/unbound/util/storage/dnstree.c
185
key.len = len;
usr.sbin/unbound/util/storage/dnstree.c
186
key.labs = labs;
usr.sbin/unbound/util/storage/dnstree.c
187
key.dclass = dclass;
usr.sbin/unbound/util/storage/dnstree.c
188
return (struct name_tree_node*)rbtree_search(tree, &key);
usr.sbin/unbound/util/storage/dnstree.c
196
struct name_tree_node key;
usr.sbin/unbound/util/storage/dnstree.c
197
key.node.key = &key;
usr.sbin/unbound/util/storage/dnstree.c
198
key.name = name;
usr.sbin/unbound/util/storage/dnstree.c
199
key.len = len;
usr.sbin/unbound/util/storage/dnstree.c
200
key.labs = labs;
usr.sbin/unbound/util/storage/dnstree.c
201
key.dclass = dclass;
usr.sbin/unbound/util/storage/dnstree.c
202
if(rbtree_find_less_equal(tree, &key, &res)) {
usr.sbin/unbound/util/storage/dnstree.c
212
(void)dname_lab_cmp(result->name, result->labs, key.name,
usr.sbin/unbound/util/storage/dnstree.c
213
key.labs, &m);
usr.sbin/unbound/util/storage/dnstree.c
228
struct addr_tree_node key;
usr.sbin/unbound/util/storage/dnstree.c
229
key.node.key = &key;
usr.sbin/unbound/util/storage/dnstree.c
230
memcpy(&key.addr, addr, addrlen);
usr.sbin/unbound/util/storage/dnstree.c
231
key.addrlen = addrlen;
usr.sbin/unbound/util/storage/dnstree.c
232
key.net = (addr_is_ip6(addr, addrlen)?128:32);
usr.sbin/unbound/util/storage/dnstree.c
233
if(rbtree_find_less_equal(tree, &key, &res)) {
usr.sbin/unbound/util/storage/dnstree.c
244
key.net, addrlen);
usr.sbin/unbound/util/storage/dnstree.c
258
struct addr_tree_node key;
usr.sbin/unbound/util/storage/dnstree.c
259
key.node.key = &key;
usr.sbin/unbound/util/storage/dnstree.c
260
memcpy(&key.addr, addr, addrlen);
usr.sbin/unbound/util/storage/dnstree.c
261
key.addrlen = addrlen;
usr.sbin/unbound/util/storage/dnstree.c
262
key.net = net;
usr.sbin/unbound/util/storage/dnstree.c
263
res = rbtree_search(tree, &key);
usr.sbin/unbound/util/storage/dnstree.c
270
struct name_tree_node key;
usr.sbin/unbound/util/storage/dnstree.c
290
key.node.key = &key;
usr.sbin/unbound/util/storage/dnstree.c
291
key.name = (uint8_t*)"\000";
usr.sbin/unbound/util/storage/dnstree.c
292
key.len = 1;
usr.sbin/unbound/util/storage/dnstree.c
293
key.labs = 0;
usr.sbin/unbound/util/storage/dnstree.c
294
key.dclass = *dclass;
usr.sbin/unbound/util/storage/dnstree.c
296
if(rbtree_find_less_equal(tree, &key, &n)) {
usr.sbin/unbound/util/storage/lookup3.c
356
uint32_t hashlittle( const void *key, size_t length, uint32_t initval)
usr.sbin/unbound/util/storage/lookup3.c
364
u.ptr = key;
usr.sbin/unbound/util/storage/lookup3.c
366
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
usr.sbin/unbound/util/storage/lookup3.c
450
const uint16_t *k = (const uint16_t *)key; /* read 16-bit chunks */
usr.sbin/unbound/util/storage/lookup3.c
507
const uint8_t *k = (const uint8_t *)key;
usr.sbin/unbound/util/storage/lookup3.c
588
const void *key, /* the key to hash */
usr.sbin/unbound/util/storage/lookup3.c
600
u.ptr = key;
usr.sbin/unbound/util/storage/lookup3.c
602
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
usr.sbin/unbound/util/storage/lookup3.c
686
const uint16_t *k = (const uint16_t *)key; /* read 16-bit chunks */
usr.sbin/unbound/util/storage/lookup3.c
743
const uint8_t *k = (const uint8_t *)key;
usr.sbin/unbound/util/storage/lookup3.c
821
uint32_t hashbig( const void *key, size_t length, uint32_t initval)
usr.sbin/unbound/util/storage/lookup3.c
829
u.ptr = key;
usr.sbin/unbound/util/storage/lookup3.c
831
const uint32_t *k = (const uint32_t *)key; /* read 32-bit chunks */
usr.sbin/unbound/util/storage/lookup3.c
915
const uint8_t *k = (const uint8_t *)key;
usr.sbin/unbound/util/storage/lruhash.c
111
(*table->delkeyfunc)(p->key, table->cb_arg);
usr.sbin/unbound/util/storage/lruhash.c
210
table->space_used -= table->sizefunc(d->key, d->data);
usr.sbin/unbound/util/storage/lruhash.c
212
(*table->markdelfunc)(d->key);
usr.sbin/unbound/util/storage/lruhash.c
220
struct lruhash_bin* bin, hashvalue_type hash, void* key, size_t* collisions)
usr.sbin/unbound/util/storage/lruhash.c
225
if(p->hash == hash && table->compfunc(p->key, key) == 0)
usr.sbin/unbound/util/storage/lruhash.c
317
need_size = table->sizefunc(entry->key, data);
usr.sbin/unbound/util/storage/lruhash.c
326
if(!(found=bin_find_entry(table, bin, hash, entry->key, &collisions))) {
usr.sbin/unbound/util/storage/lruhash.c
338
(*table->sizefunc)(found->key, found->data);
usr.sbin/unbound/util/storage/lruhash.c
339
(*table->delkeyfunc)(entry->key, cb_arg);
usr.sbin/unbound/util/storage/lruhash.c
357
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
usr.sbin/unbound/util/storage/lruhash.c
364
lruhash_lookup(struct lruhash* table, hashvalue_type hash, void* key, int wr)
usr.sbin/unbound/util/storage/lruhash.c
373
if((entry=bin_find_entry(table, bin, hash, key, NULL)))
usr.sbin/unbound/util/storage/lruhash.c
386
lruhash_remove(struct lruhash* table, hashvalue_type hash, void* key)
usr.sbin/unbound/util/storage/lruhash.c
400
if((entry=bin_find_entry(table, bin, hash, key, NULL))) {
usr.sbin/unbound/util/storage/lruhash.c
409
table->space_used -= (*table->sizefunc)(entry->key, entry->data);
usr.sbin/unbound/util/storage/lruhash.c
412
(*table->markdelfunc)(entry->key);
usr.sbin/unbound/util/storage/lruhash.c
418
(*table->delkeyfunc)(entry->key, table->cb_arg);
usr.sbin/unbound/util/storage/lruhash.c
435
(*table->markdelfunc)(p->key);
usr.sbin/unbound/util/storage/lruhash.c
437
(*table->delkeyfunc)(p->key, table->cb_arg);
usr.sbin/unbound/util/storage/lruhash.c
559
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
usr.sbin/unbound/util/storage/lruhash.c
589
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
usr.sbin/unbound/util/storage/lruhash.c
660
need_size = table->sizefunc(entry->key, data);
usr.sbin/unbound/util/storage/lruhash.c
669
if ((found = bin_find_entry(table, bin, hash, entry->key, &collisions)) != NULL) {
usr.sbin/unbound/util/storage/lruhash.c
698
(*table->delkeyfunc)(reclaimlist->key, cb_arg);
usr.sbin/unbound/util/storage/lruhash.h
222
void* key;
usr.sbin/unbound/util/storage/lruhash.h
291
hashvalue_type hash, void* key, int wr);
usr.sbin/unbound/util/storage/lruhash.h
369
void lruhash_remove(struct lruhash* table, hashvalue_type hash, void* key);
usr.sbin/unbound/util/storage/lruhash.h
387
struct lruhash_bin* bin, hashvalue_type hash, void* key, size_t* collisions);
usr.sbin/unbound/util/storage/slabhash.c
123
hashvalue_type hash, void* key, int wr)
usr.sbin/unbound/util/storage/slabhash.c
125
return lruhash_lookup(sl->array[slab_idx(sl, hash)], hash, key, wr);
usr.sbin/unbound/util/storage/slabhash.c
128
void slabhash_remove(struct slabhash* sl, hashvalue_type hash, void* key)
usr.sbin/unbound/util/storage/slabhash.c
130
lruhash_remove(sl->array[slab_idx(sl, hash)], hash, key);
usr.sbin/unbound/util/storage/slabhash.c
198
size_t test_slabhash_sizefunc(void* ATTR_UNUSED(key), void* ATTR_UNUSED(data))
usr.sbin/unbound/util/storage/slabhash.c
215
void test_slabhash_delkey(void* key, void* ATTR_UNUSED(arg))
usr.sbin/unbound/util/storage/slabhash.c
217
delkey((struct slabhash_testkey*)key);
usr.sbin/unbound/util/storage/slabhash.h
129
hashvalue_type hash, void* key, int wr);
usr.sbin/unbound/util/storage/slabhash.h
138
void slabhash_remove(struct slabhash* table, hashvalue_type hash, void* key);
usr.sbin/unbound/util/winsock_event.c
472
ev->node.key = ev;
usr.sbin/unbound/validator/autotrust.c
2034
return ((struct trust_anchor*)t->key)->autr->next_probe_time;
usr.sbin/unbound/validator/autotrust.c
2077
struct trust_anchor key, *tp2;
usr.sbin/unbound/validator/autotrust.c
2080
key.node.key = &key;
usr.sbin/unbound/validator/autotrust.c
2081
key.name = dnskey_rrset->rk.dname;
usr.sbin/unbound/validator/autotrust.c
2082
key.namelen = dnskey_rrset->rk.dname_len;
usr.sbin/unbound/validator/autotrust.c
2083
key.namelabs = dname_count_labels(key.name);
usr.sbin/unbound/validator/autotrust.c
2084
key.dclass = tp->dclass;
usr.sbin/unbound/validator/autotrust.c
2089
tp2 = (struct trust_anchor*)rbtree_search(env->anchors->tree, &key);
usr.sbin/unbound/validator/autotrust.c
2121
struct trust_anchor key;
usr.sbin/unbound/validator/autotrust.c
2130
memset(&key, 0, sizeof(key));
usr.sbin/unbound/validator/autotrust.c
2132
key.autr = &pd;
usr.sbin/unbound/validator/autotrust.c
2133
key.node.key = &key;
usr.sbin/unbound/validator/autotrust.c
2134
pd.pnode.key = &key;
usr.sbin/unbound/validator/autotrust.c
2136
key.name = dnskey_rrset->rk.dname;
usr.sbin/unbound/validator/autotrust.c
2137
key.namelen = tp->namelen;
usr.sbin/unbound/validator/autotrust.c
2138
key.namelabs = tp->namelabs;
usr.sbin/unbound/validator/autotrust.c
2139
key.dclass = tp->dclass;
usr.sbin/unbound/validator/autotrust.c
2146
del_tp = (struct trust_anchor*)rbtree_delete(env->anchors->tree, &key);
usr.sbin/unbound/validator/autotrust.c
2148
(void)rbtree_delete(&env->anchors->autr->probe, &key);
usr.sbin/unbound/validator/autotrust.c
2439
tp = (struct trust_anchor*)el->key;
usr.sbin/unbound/validator/autotrust.c
344
tp->node.key = tp;
usr.sbin/unbound/validator/autotrust.c
352
tp->autr->pnode.key = tp;
usr.sbin/unbound/validator/val_anchor.c
1140
struct trust_anchor key;
usr.sbin/unbound/validator/val_anchor.c
1143
key.node.key = &key;
usr.sbin/unbound/validator/val_anchor.c
1144
key.name = qname;
usr.sbin/unbound/validator/val_anchor.c
1145
key.namelabs = dname_count_labels(qname);
usr.sbin/unbound/validator/val_anchor.c
1146
key.namelen = qname_len;
usr.sbin/unbound/validator/val_anchor.c
1147
key.dclass = qclass;
usr.sbin/unbound/validator/val_anchor.c
1149
if(rbtree_find_less_equal(anchors->tree, &key, &res)) {
usr.sbin/unbound/validator/val_anchor.c
1161
(void)dname_lab_cmp(result->name, result->namelabs, key.name,
usr.sbin/unbound/validator/val_anchor.c
1162
key.namelabs, &m);
usr.sbin/unbound/validator/val_anchor.c
1229
struct trust_anchor key;
usr.sbin/unbound/validator/val_anchor.c
1230
key.node.key = &key;
usr.sbin/unbound/validator/val_anchor.c
1231
key.name = nm;
usr.sbin/unbound/validator/val_anchor.c
1232
key.namelabs = dname_count_size_labels(nm, &key.namelen);
usr.sbin/unbound/validator/val_anchor.c
1233
key.dclass = c;
usr.sbin/unbound/validator/val_anchor.c
1235
if(rbtree_search(anchors->tree, &key)) {
usr.sbin/unbound/validator/val_anchor.c
1240
if(!anchor_new_ta(anchors, nm, key.namelabs, key.namelen, c, 0)) {
usr.sbin/unbound/validator/val_anchor.c
1255
struct trust_anchor key;
usr.sbin/unbound/validator/val_anchor.c
1257
key.node.key = &key;
usr.sbin/unbound/validator/val_anchor.c
1258
key.name = nm;
usr.sbin/unbound/validator/val_anchor.c
1259
key.namelabs = dname_count_size_labels(nm, &key.namelen);
usr.sbin/unbound/validator/val_anchor.c
1260
key.dclass = c;
usr.sbin/unbound/validator/val_anchor.c
1262
if(!(ta=(struct trust_anchor*)rbtree_search(anchors->tree, &key))) {
usr.sbin/unbound/validator/val_anchor.c
200
struct trust_anchor key;
usr.sbin/unbound/validator/val_anchor.c
203
key.node.key = &key;
usr.sbin/unbound/validator/val_anchor.c
204
key.name = name;
usr.sbin/unbound/validator/val_anchor.c
205
key.namelabs = namelabs;
usr.sbin/unbound/validator/val_anchor.c
206
key.namelen = namelen;
usr.sbin/unbound/validator/val_anchor.c
207
key.dclass = dclass;
usr.sbin/unbound/validator/val_anchor.c
209
n = rbtree_search(anchors->tree, &key);
usr.sbin/unbound/validator/val_anchor.c
211
lock_basic_lock(&((struct trust_anchor*)n->key)->lock);
usr.sbin/unbound/validator/val_anchor.c
216
return (struct trust_anchor*)n->key;
usr.sbin/unbound/validator/val_anchor.c
232
ta->node.key = ta;
usr.sbin/unbound/validator/val_kcache.c
111
lookfor.entry.key = &lookfor;
usr.sbin/unbound/validator/val_kcache.c
119
return (struct key_entry_key*)e->key;
usr.sbin/unbound/validator/val_kcache.c
161
lookfor.entry.key = &lookfor;
usr.sbin/unbound/validator/val_kentry.c
120
newk->entry.key = newk;
usr.sbin/unbound/validator/val_kentry.c
169
newk->entry.key = newk;
usr.sbin/unbound/validator/val_kentry.c
267
(*k)->entry.key = *k;
usr.sbin/unbound/validator/val_kentry.c
375
rrk->entry.key = rrk;
usr.sbin/unbound/validator/val_kentry.c
52
key_entry_sizefunc(void* key, void* data)
usr.sbin/unbound/validator/val_kentry.c
54
struct key_entry_key* kk = (struct key_entry_key*)key;
usr.sbin/unbound/validator/val_kentry.c
81
key_entry_delkeyfunc(void* key, void* ATTR_UNUSED(userarg))
usr.sbin/unbound/validator/val_kentry.c
83
struct key_entry_key* kk = (struct key_entry_key*)key;
usr.sbin/unbound/validator/val_kentry.c
84
if(!key)
usr.sbin/unbound/validator/val_kentry.h
101
void key_entry_delkeyfunc(void* key, void* userarg);
usr.sbin/unbound/validator/val_kentry.h
95
size_t key_entry_sizefunc(void* key, void* data);
usr.sbin/unbound/validator/val_neg.c
285
lookfor.node.key = &lookfor;
usr.sbin/unbound/validator/val_neg.c
292
rbtree_search(&neg->tree, lookfor.node.key);
usr.sbin/unbound/validator/val_neg.c
309
lookfor.node.key = &lookfor;
usr.sbin/unbound/validator/val_neg.c
315
rbtree_search(&zone->tree, lookfor.node.key);
usr.sbin/unbound/validator/val_neg.c
373
struct val_neg_zone key;
usr.sbin/unbound/validator/val_neg.c
376
key.node.key = &key;
usr.sbin/unbound/validator/val_neg.c
377
key.name = nm;
usr.sbin/unbound/validator/val_neg.c
378
key.len = nm_len;
usr.sbin/unbound/validator/val_neg.c
379
key.labs = labs;
usr.sbin/unbound/validator/val_neg.c
380
key.dclass = qclass;
usr.sbin/unbound/validator/val_neg.c
381
if(rbtree_find_less_equal(&neg->tree, &key, &res)) {
usr.sbin/unbound/validator/val_neg.c
391
(void)dname_lab_cmp(result->name, result->labs, key.name,
usr.sbin/unbound/validator/val_neg.c
392
key.labs, &m);
usr.sbin/unbound/validator/val_neg.c
413
struct val_neg_data key;
usr.sbin/unbound/validator/val_neg.c
416
key.node.key = &key;
usr.sbin/unbound/validator/val_neg.c
417
key.name = nm;
usr.sbin/unbound/validator/val_neg.c
418
key.len = nm_len;
usr.sbin/unbound/validator/val_neg.c
419
key.labs = labs;
usr.sbin/unbound/validator/val_neg.c
420
if(rbtree_find_less_equal(&zone->tree, &key, &res)) {
usr.sbin/unbound/validator/val_neg.c
430
(void)dname_lab_cmp(result->name, result->labs, key.name,
usr.sbin/unbound/validator/val_neg.c
431
key.labs, &m);
usr.sbin/unbound/validator/val_neg.c
457
zone->node.key = zone;
usr.sbin/unbound/validator/val_neg.c
610
el->node.key = el;
usr.sbin/unbound/validator/val_neg.c
952
struct val_neg_data key;
usr.sbin/unbound/validator/val_neg.c
954
key.node.key = &key;
usr.sbin/unbound/validator/val_neg.c
955
key.name = qname;
usr.sbin/unbound/validator/val_neg.c
956
key.len = len;
usr.sbin/unbound/validator/val_neg.c
957
key.labs = labs;
usr.sbin/unbound/validator/val_neg.c
958
if(rbtree_find_less_equal(&zone->tree, &key, &r)) {
usr.sbin/unbound/validator/val_nsec3.c
666
looki.node.key = &looki;
usr.sbin/unbound/validator/val_nsec3.c
680
c->node.key = c;
usr.sbin/unbound/validator/val_secalgo.c
1043
SECKEYPublicKey* key;
usr.sbin/unbound/validator/val_secalgo.c
1049
key = PORT_ArenaZNew(arena, SECKEYPublicKey);
usr.sbin/unbound/validator/val_secalgo.c
1050
if(!key) {
usr.sbin/unbound/validator/val_secalgo.c
1055
key->arena = arena;
usr.sbin/unbound/validator/val_secalgo.c
1056
key->keyType = ktype;
usr.sbin/unbound/validator/val_secalgo.c
1057
key->pkcs11Slot = NULL;
usr.sbin/unbound/validator/val_secalgo.c
1058
key->pkcs11ID = CK_INVALID_HANDLE;
usr.sbin/unbound/validator/val_secalgo.c
1059
return key;
usr.sbin/unbound/validator/val_secalgo.c
1062
static SECKEYPublicKey* nss_buf2ecdsa(unsigned char* key, size_t len, int algo)
usr.sbin/unbound/validator/val_secalgo.c
1089
memmove(buf+1, key, len);
usr.sbin/unbound/validator/val_secalgo.c
1117
static SECKEYPublicKey* nss_buf2dsa(unsigned char* key, size_t len)
usr.sbin/unbound/validator/val_secalgo.c
1130
T = (uint8_t)key[0];
usr.sbin/unbound/validator/val_secalgo.c
1140
Q.data = key+offset;
usr.sbin/unbound/validator/val_secalgo.c
1144
P.data = key+offset;
usr.sbin/unbound/validator/val_secalgo.c
1148
G.data = key+offset;
usr.sbin/unbound/validator/val_secalgo.c
1152
Y.data = key+offset;
usr.sbin/unbound/validator/val_secalgo.c
1179
static SECKEYPublicKey* nss_buf2rsa(unsigned char* key, size_t len)
usr.sbin/unbound/validator/val_secalgo.c
1189
if(key[0] == 0) {
usr.sbin/unbound/validator/val_secalgo.c
1193
memmove(&int16, key+1, 2);
usr.sbin/unbound/validator/val_secalgo.c
1197
exp = key[0];
usr.sbin/unbound/validator/val_secalgo.c
1205
exponent.data = key+offset;
usr.sbin/unbound/validator/val_secalgo.c
1208
modulus.data = key+offset;
usr.sbin/unbound/validator/val_secalgo.c
1239
unsigned char* key, size_t keylen, unsigned char** prefix,
usr.sbin/unbound/validator/val_secalgo.c
1267
*pubkey = nss_buf2dsa(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
1286
*pubkey = nss_buf2rsa(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
1323
*pubkey = nss_buf2rsa(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
1335
*pubkey = nss_buf2ecdsa(key, keylen,
usr.sbin/unbound/validator/val_secalgo.c
1345
*pubkey = nss_buf2ecdsa(key, keylen,
usr.sbin/unbound/validator/val_secalgo.c
1379
unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
usr.sbin/unbound/validator/val_secalgo.c
1395
if(!nss_setup_key_digest(algo, &pubkey, &htype, key, keylen,
usr.sbin/unbound/validator/val_secalgo.c
1756
unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
usr.sbin/unbound/validator/val_secalgo.c
1770
if(key[0] != sigblock[0])
usr.sbin/unbound/validator/val_secalgo.c
1798
key_t_value = key[0];
usr.sbin/unbound/validator/val_secalgo.c
1820
nettle_mpz_set_str_256_u(pubkey.q, 20, key+offset);
usr.sbin/unbound/validator/val_secalgo.c
1822
nettle_mpz_set_str_256_u(pubkey.p, (64 + key_t_value*8), key+offset);
usr.sbin/unbound/validator/val_secalgo.c
1824
nettle_mpz_set_str_256_u(pubkey.g, (64 + key_t_value*8), key+offset);
usr.sbin/unbound/validator/val_secalgo.c
1826
nettle_mpz_set_str_256_u(pubkey.y, (64 + key_t_value*8), key+offset);
usr.sbin/unbound/validator/val_secalgo.c
1845
unsigned int sigblock_len, uint8_t* key, unsigned int keylen)
usr.sbin/unbound/validator/val_secalgo.c
1857
if (key[0] != 0) {
usr.sbin/unbound/validator/val_secalgo.c
1859
exp_len = key[0];
usr.sbin/unbound/validator/val_secalgo.c
1866
exp_len = READ_UINT16(key+1);
usr.sbin/unbound/validator/val_secalgo.c
1878
nettle_mpz_set_str_256_u(pubkey.e, exp_len, &key[exp_offset]);
usr.sbin/unbound/validator/val_secalgo.c
1879
nettle_mpz_set_str_256_u(pubkey.n, pubkey.size, &key[mod_offset]);
usr.sbin/unbound/validator/val_secalgo.c
1925
unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
usr.sbin/unbound/validator/val_secalgo.c
1944
nettle_mpz_init_set_str_256_u(x, SHA256_DIGEST_SIZE, key);
usr.sbin/unbound/validator/val_secalgo.c
1945
nettle_mpz_init_set_str_256_u(y, SHA256_DIGEST_SIZE, key+SHA256_DIGEST_SIZE);
usr.sbin/unbound/validator/val_secalgo.c
1962
nettle_mpz_init_set_str_256_u(x, SHA384_DIGEST_SIZE, key);
usr.sbin/unbound/validator/val_secalgo.c
1963
nettle_mpz_init_set_str_256_u(y, SHA384_DIGEST_SIZE, key+SHA384_DIGEST_SIZE);
usr.sbin/unbound/validator/val_secalgo.c
1991
unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
usr.sbin/unbound/validator/val_secalgo.c
2002
res = ed25519_sha512_verify((uint8_t*)key, sldns_buffer_limit(buf),
usr.sbin/unbound/validator/val_secalgo.c
2027
unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
usr.sbin/unbound/validator/val_secalgo.c
2050
*reason = _verify_nettle_dsa(buf, sigblock, sigblock_len, key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
2076
sigblock_len, key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
2090
sigblock_len, key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
2099
key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
549
unsigned char* key, size_t keylen)
usr.sbin/unbound/validator/val_secalgo.c
555
*evp_key = sldns_key_dsa2pkey_raw(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
580
*evp_key = sldns_key_rsa2pkey_raw(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
606
*evp_key = sldns_key_rsa2pkey_raw(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
616
*evp_key = sldns_gost2pkey_raw(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
632
*evp_key = sldns_ecdsa2pkey_raw(key, keylen,
usr.sbin/unbound/validator/val_secalgo.c
646
*evp_key = sldns_ecdsa2pkey_raw(key, keylen,
usr.sbin/unbound/validator/val_secalgo.c
662
*evp_key = sldns_ed255192pkey_raw(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
673
*evp_key = sldns_ed4482pkey_raw(key, keylen);
usr.sbin/unbound/validator/val_secalgo.c
736
unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
usr.sbin/unbound/validator/val_secalgo.c
753
if(!setup_key_digest(algo, &evp_key, &digest_type, key, keylen)) {
usr.sbin/unbound/validator/val_secalgo.h
148
unsigned char* key, unsigned int keylen, char** reason);
usr.sbin/unbound/validator/val_sigcrypt.c
1037
rrs[i].node.key = &rrs[i];
usr.sbin/unbound/validator/val_sigcrypt.c
1554
unsigned char* key; /* public key rdata field */
usr.sbin/unbound/validator/val_sigcrypt.c
1672
dnskey_get_pubkey(dnskey, dnskey_idx, &key, &keylen);
usr.sbin/unbound/validator/val_sigcrypt.c
1673
if(!key) {
usr.sbin/unbound/validator/val_sigcrypt.c
1680
sigblock, sigblock_len, key, keylen, reason);
usr.sbin/unbound/validator/val_utils.c
480
dnskey.entry.key = &dnskey;
usr.sbin/ypldap/aldap.c
620
char *key;
usr.sbin/ypldap/aldap.c
627
&key, &b) != 0)
usr.sbin/ypldap/aldap.c
636
(*outkey) = utoa(key);
usr.sbin/ypldap/aldap.c
650
char *key;
usr.sbin/ypldap/aldap.c
661
if (ober_scanf_elements(msg->body.search.iter, "{s(e)}", &key, &a) != 0)
usr.sbin/ypldap/aldap.c
670
(*outkey) = utoa(key);
usr.sbin/ypldap/yp.c
436
char key[YPMAXRECORD+1];
usr.sbin/ypldap/yp.c
438
log_debug("matching '%.*s' in map %s", arg->key.keydat_len,
usr.sbin/ypldap/yp.c
439
arg->key.keydat_val, arg->map);
usr.sbin/ypldap/yp.c
451
if (arg->key.keydat_len > YPMAXRECORD) {
usr.sbin/ypldap/yp.c
455
memset(key, 0, sizeof(key));
usr.sbin/ypldap/yp.c
456
(void)strncpy(key, arg->key.keydat_val, arg->key.keydat_len);
usr.sbin/ypldap/yp.c
460
ukey.ue_line = key;
usr.sbin/ypldap/yp.c
471
ukey.ue_uid = strtonum(key, 0, UID_MAX, &estr);
usr.sbin/ypldap/yp.c
486
gkey.ge_gid = strtonum(key, 0, GID_MAX, &estr);
usr.sbin/ypldap/yp.c
500
gkey.ge_line = key;
usr.sbin/ypldap/yp.c
510
bp = cp = key;
usr.sbin/ypldap/yp.c
592
char key[YPMAXRECORD+1];
usr.sbin/ypldap/yp.c
599
memset(key, 0, sizeof(key));
usr.sbin/ypldap/yp.c
600
(void)strncpy(key, arg->key.keydat_val,
usr.sbin/ypldap/yp.c
601
arg->key.keydat_len);
usr.sbin/ypldap/yp.c
602
ukey.ue_line = key;
usr.sbin/ypldap/yp.c
615
memset(key, 0, sizeof(key));
usr.sbin/ypldap/yp.c
616
(void)strncpy(key, arg->key.keydat_val,
usr.sbin/ypldap/yp.c
617
arg->key.keydat_len);
usr.sbin/ypldap/yp.c
619
gkey.ge_line = key;
usr.sbin/ypldap/yp.c
721
yp_make_keyval(struct ypresp_key_val *res, char *key, char *line)
usr.sbin/ypldap/yp.c
729
(void)strlcpy(keybuf, key, sizeof(keybuf));
usr.sbin/ypldap/yp.c
730
res->key.keydat_len = strlen(keybuf);
usr.sbin/ypldap/yp.c
731
res->key.keydat_val = keybuf;
usr.sbin/ypserv/common/ypdb.c
109
ypdb_fetch(DBM *db, datum key)
usr.sbin/ypserv/common/ypdb.c
115
nk.data = key.dptr;
usr.sbin/ypserv/common/ypdb.c
116
nk.size = key.dsize;
usr.sbin/ypserv/common/ypdb.c
184
ypdb_setkey(DBM *db, datum key)
usr.sbin/ypserv/common/ypdb.c
189
nk.data = key.dptr;
usr.sbin/ypserv/common/ypdb.c
190
nk.size = key.dsize;
usr.sbin/ypserv/common/ypdb.c
193
key.dptr = NULL;
usr.sbin/ypserv/common/ypdb.c
194
key.dsize = 0;
usr.sbin/ypserv/common/ypdb.c
196
return (key);
usr.sbin/ypserv/common/ypdb.c
206
ypdb_store(DBM *db, datum key, datum content, int flags)
usr.sbin/ypserv/common/ypdb.c
210
if (key.dsize > YPMAXRECORD || content.dsize > YPMAXRECORD)
usr.sbin/ypserv/common/ypdb.c
212
nk.data = key.dptr;
usr.sbin/ypserv/common/ypdb.c
213
nk.size = key.dsize;
usr.sbin/ypserv/common/yplib_host.c
138
yprk.key.keydat_val = (char *)inkey;
usr.sbin/ypserv/common/yplib_host.c
139
yprk.key.keydat_len = inkeylen;
usr.sbin/ypserv/common/yplib_host.c
181
*outkeylen = yprkv.key.keydat_len;
usr.sbin/ypserv/common/yplib_host.c
183
memcpy(*outkey, yprkv.key.keydat_val, *outkeylen);
usr.sbin/ypserv/common/yplib_host.c
211
yprk.key.keydat_val = inkey;
usr.sbin/ypserv/common/yplib_host.c
212
yprk.key.keydat_len = inkeylen;
usr.sbin/ypserv/common/yplib_host.c
220
*outkeylen = yprkv.key.keydat_len;
usr.sbin/ypserv/common/yplib_host.c
222
memcpy(*outkey, yprkv.key.keydat_val, *outkeylen);
usr.sbin/ypserv/common/yplib_host.c
241
char *key, *val;
usr.sbin/ypserv/common/yplib_host.c
257
size = out.ypresp_all_u.val.key.keydat_len;
usr.sbin/ypserv/common/yplib_host.c
258
if ((key = malloc(size + 1)) == NULL) {
usr.sbin/ypserv/common/yplib_host.c
262
(void)memcpy(key, out.ypresp_all_u.val.key.keydat_val,
usr.sbin/ypserv/common/yplib_host.c
264
key[size] = '\0';
usr.sbin/ypserv/common/yplib_host.c
268
free(key);
usr.sbin/ypserv/common/yplib_host.c
276
done = (*ypserv_ypresp_allfn)(status, key,
usr.sbin/ypserv/common/yplib_host.c
277
out.ypresp_all_u.val.key.keydat_len, val,
usr.sbin/ypserv/common/yplib_host.c
279
free(key);
usr.sbin/ypserv/makedbm/db.c
46
DBT key, val;
usr.sbin/ypserv/makedbm/db.c
53
status = db->seq(db, &key, &val, R_FIRST);
usr.sbin/ypserv/makedbm/db.c
56
(int)key.size-1, (int)key.size-1, (char *)key.data,
usr.sbin/ypserv/makedbm/db.c
58
status = db->seq(db, &key, &val, R_NEXT);
usr.sbin/ypserv/makedbm/makedbm.c
131
datum key, val;
usr.sbin/ypserv/makedbm/makedbm.c
145
key = ypdb_firstkey(db);
usr.sbin/ypserv/makedbm/makedbm.c
147
while (key.dptr != NULL) {
usr.sbin/ypserv/makedbm/makedbm.c
148
val = ypdb_fetch(db, key);
usr.sbin/ypserv/makedbm/makedbm.c
150
key.dsize, key.dsize, key.dptr,
usr.sbin/ypserv/makedbm/makedbm.c
152
key = ypdb_nextkey(db);
usr.sbin/ypserv/makedbm/makedbm.c
81
datum key, val;
usr.sbin/ypserv/makedbm/makedbm.c
84
key.dptr = str1;
usr.sbin/ypserv/makedbm/makedbm.c
85
key.dsize = strlen(str1);
usr.sbin/ypserv/makedbm/makedbm.c
88
val = ypdb_fetch(db, key);
usr.sbin/ypserv/makedbm/makedbm.c
96
status = ypdb_store(db, key, val, YPDB_INSERT);
usr.sbin/ypserv/mkalias/mkalias.c
146
datum key, val;
usr.sbin/ypserv/mkalias/mkalias.c
241
for (key = ypdb_firstkey(db); key.dptr != NULL;
usr.sbin/ypserv/mkalias/mkalias.c
242
key = ypdb_nextkey(db)) {
usr.sbin/ypserv/mkalias/mkalias.c
243
val = ypdb_fetch(db, key);
usr.sbin/ypserv/mkalias/mkalias.c
247
if (*key.dptr == '@' && key.dsize == 1)
usr.sbin/ypserv/mkalias/mkalias.c
249
if (strncmp(key.dptr, "YP_", 3)==0) /* YP token */
usr.sbin/ypserv/mkalias/mkalias.c
264
host, key.dsize, key.dsize, key.dptr,
usr.sbin/ypserv/mkalias/mkalias.c
270
capitalize(key.dptr, key.dsize);
usr.sbin/ypserv/mkalias/mkalias.c
273
status = ypdb_store(new_db, val, key, YPDB_INSERT);
usr.sbin/ypserv/mkalias/mkalias.c
277
key.dsize, key.dsize, key.dptr);
usr.sbin/ypserv/mkalias/mkalias.c
284
key.dsize, key.dsize, key.dptr);
usr.sbin/ypserv/mkalias/mkalias.c
292
key.dptr = YP_LAST_KEY;
usr.sbin/ypserv/mkalias/mkalias.c
293
key.dsize = strlen(YP_LAST_KEY);
usr.sbin/ypserv/mkalias/mkalias.c
296
status = ypdb_store(new_db, key, val, YPDB_INSERT);
usr.sbin/ypserv/mkalias/mkalias.c
299
key.dsize, key.dsize, key.dptr,
usr.sbin/ypserv/mkalias/mkalias.c
306
key.dptr = YP_MASTER_KEY;
usr.sbin/ypserv/mkalias/mkalias.c
307
key.dsize = strlen(YP_MASTER_KEY);
usr.sbin/ypserv/mkalias/mkalias.c
310
status = ypdb_store(new_db, key, val, YPDB_INSERT);
usr.sbin/ypserv/mkalias/mkalias.c
313
key.dsize, key.dsize, key.dptr,
usr.sbin/ypserv/mknetid/mknetid.c
100
if (key < 'A')
usr.sbin/ypserv/mknetid/mknetid.c
102
if (key <= 'Z')
usr.sbin/ypserv/mknetid/mknetid.c
103
return (1 + key - 'A');
usr.sbin/ypserv/mknetid/mknetid.c
104
if (key < 'a')
usr.sbin/ypserv/mknetid/mknetid.c
106
if (key <= 'z')
usr.sbin/ypserv/mknetid/mknetid.c
107
return (28 + key - 'a');
usr.sbin/ypserv/mknetid/mknetid.c
98
hashidx(char key)
usr.sbin/ypserv/revnetgroup/hash.c
102
hashkey(char *key)
usr.sbin/ypserv/revnetgroup/hash.c
105
if (key == NULL)
usr.sbin/ypserv/revnetgroup/hash.c
107
return(hash(key, strlen(key)) & HASH_MASK);
usr.sbin/ypserv/revnetgroup/hash.c
112
lookup(struct group_entry *table[], char *key)
usr.sbin/ypserv/revnetgroup/hash.c
116
cur = table[hashkey(key)];
usr.sbin/ypserv/revnetgroup/hash.c
119
if (!strcmp(cur->key, key))
usr.sbin/ypserv/revnetgroup/hash.c
145
ngstore(struct group_entry *table[], char *key, char *data)
usr.sbin/ypserv/revnetgroup/hash.c
150
i = hashkey(key);
usr.sbin/ypserv/revnetgroup/hash.c
153
new->key = strdup(key);
usr.sbin/ypserv/revnetgroup/hash.c
172
mstore(struct member_entry *table[], char *key, char *data, char *domain)
usr.sbin/ypserv/revnetgroup/hash.c
178
i = hashkey(key);
usr.sbin/ypserv/revnetgroup/hash.c
187
if (!strcmp(cur->key, key) && !strcmp(cur->domain, domain)) {
usr.sbin/ypserv/revnetgroup/hash.c
206
new->key = strdup(key);
usr.sbin/ypserv/revnetgroup/hash.c
54
const u_char *key;
usr.sbin/ypserv/revnetgroup/hash.c
58
#define HASHC h = *key++ + 65599 * h
usr.sbin/ypserv/revnetgroup/hash.c
61
key = keyarg;
usr.sbin/ypserv/revnetgroup/hash.h
44
char *key;
usr.sbin/ypserv/revnetgroup/hash.h
52
char *key;
usr.sbin/ypserv/revnetgroup/revnetgroup.c
131
key = readbuf;
usr.sbin/ypserv/revnetgroup/revnetgroup.c
132
ngstore(gtable, key, data);
usr.sbin/ypserv/revnetgroup/revnetgroup.c
145
__setnetgrent(gcur->key);
usr.sbin/ypserv/revnetgroup/revnetgroup.c
151
gcur->key,
usr.sbin/ypserv/revnetgroup/revnetgroup.c
158
gcur->key,
usr.sbin/ypserv/revnetgroup/revnetgroup.c
175
printf ("%s.%s\t", mcur->key, mcur->domain);
usr.sbin/ypserv/revnetgroup/revnetgroup.c
80
char *key = NULL, *data = NULL;
usr.sbin/ypserv/ypserv/ypserv_db.c
104
if (key.dsize == 0 || key.dptr == NULL)
usr.sbin/ypserv/ypserv/ypserv_db.c
107
if (key.dsize == YP_LAST_LEN &&
usr.sbin/ypserv/ypserv/ypserv_db.c
108
strncmp(key.dptr, YP_LAST_KEY, YP_LAST_LEN) == 0)
usr.sbin/ypserv/ypserv/ypserv_db.c
110
if (key.dsize == YP_INPUT_LEN &&
usr.sbin/ypserv/ypserv/ypserv_db.c
111
strncmp(key.dptr, YP_INPUT_KEY, YP_INPUT_LEN) == 0)
usr.sbin/ypserv/ypserv/ypserv_db.c
113
if (key.dsize == YP_OUTPUT_LEN &&
usr.sbin/ypserv/ypserv/ypserv_db.c
114
strncmp(key.dptr, YP_OUTPUT_KEY, YP_OUTPUT_LEN) == 0)
usr.sbin/ypserv/ypserv/ypserv_db.c
116
if (key.dsize == YP_MASTER_LEN &&
usr.sbin/ypserv/ypserv/ypserv_db.c
117
strncmp(key.dptr, YP_MASTER_KEY, YP_MASTER_LEN) == 0)
usr.sbin/ypserv/ypserv/ypserv_db.c
119
if (key.dsize == YP_DOMAIN_LEN &&
usr.sbin/ypserv/ypserv/ypserv_db.c
120
strncmp(key.dptr, YP_DOMAIN_KEY, YP_DOMAIN_LEN) == 0)
usr.sbin/ypserv/ypserv/ypserv_db.c
122
if (key.dsize == YP_INTERDOMAIN_LEN &&
usr.sbin/ypserv/ypserv/ypserv_db.c
123
strncmp(key.dptr, YP_INTERDOMAIN_KEY, YP_INTERDOMAIN_LEN) == 0)
usr.sbin/ypserv/ypserv/ypserv_db.c
125
if (key.dsize == YP_SECURE_LEN &&
usr.sbin/ypserv/ypserv/ypserv_db.c
126
strncmp(key.dptr, YP_SECURE_KEY, YP_SECURE_LEN) == 0)
usr.sbin/ypserv/ypserv/ypserv_db.c
442
ypdb_get_record(domainname domain, mapname map, keydat key, int ypprivate)
usr.sbin/ypserv/ypserv/ypserv_db.c
459
k.dptr = key.keydat_val;
usr.sbin/ypserv/ypserv/ypserv_db.c
460
k.dsize = key.keydat_len;
usr.sbin/ypserv/ypserv/ypserv_db.c
475
strncpy(keystr, key.keydat_val, key.keydat_len);
usr.sbin/ypserv/ypserv/ypserv_db.c
476
keystr[key.keydat_len] = '\0';
usr.sbin/ypserv/ypserv/ypserv_db.c
509
res.key.keydat_val = k.dptr;
usr.sbin/ypserv/ypserv/ypserv_db.c
510
res.key.keydat_len = k.dsize;
usr.sbin/ypserv/ypserv/ypserv_db.c
525
ypdb_get_next(domainname domain, mapname map, keydat key, int ypprivate)
usr.sbin/ypserv/ypserv/ypserv_db.c
535
n.dptr = key.keydat_val;
usr.sbin/ypserv/ypserv/ypserv_db.c
536
n.dsize = key.keydat_len;
usr.sbin/ypserv/ypserv/ypserv_db.c
557
res.key.keydat_val = k.dptr;
usr.sbin/ypserv/ypserv/ypserv_db.c
558
res.key.keydat_len = k.dsize;
usr.sbin/ypserv/ypserv/ypserv_db.c
660
resp.ypresp_all_u.val.key.keydat_val = k.dptr;
usr.sbin/ypserv/ypserv/ypserv_db.c
661
resp.ypresp_all_u.val.key.keydat_len = k.dsize;
usr.sbin/ypserv/ypserv/ypserv_db.c
99
yp_private(datum key, int ypprivate)
usr.sbin/ypserv/ypserv/ypserv_proc.c
148
argp->domain, argp->map, argp->key.keydat_len, argp->key.keydat_val);
usr.sbin/ypserv/ypserv/ypserv_proc.c
159
res = ypdb_get_record(argp->domain, argp->map, argp->key, TRUE);
usr.sbin/ypserv/ypserv/ypserv_proc.c
212
argp->domain, argp->map, argp->key.keydat_len, argp->key.keydat_val);
usr.sbin/ypserv/ypserv/ypserv_proc.c
223
res = ypdb_get_next(argp->domain, argp->map, argp->key,FALSE);
usr.sbin/ypserv/ypxfr/ypxfr.c
188
datum key, val;
usr.sbin/ypserv/ypxfr/ypxfr.c
194
key.dptr = keystr;
usr.sbin/ypserv/ypxfr/ypxfr.c
195
key.dsize = strlen(keystr);
usr.sbin/ypserv/ypxfr/ypxfr.c
200
status = ypdb_store(db, key, val, YPDB_INSERT);
usr.sbin/ypserv/ypxfr/ypxfr.c
212
datum key, val;
usr.sbin/ypserv/ypxfr/ypxfr.c
219
key.dptr = keystr;
usr.sbin/ypserv/ypxfr/ypxfr.c
220
key.dsize = strlen(keystr);
usr.sbin/ypserv/ypxfr/ypxfr.c
225
status = ypdb_store(db, key, val, YPDB_INSERT);
usr.sbin/ypserv/ypxfr/ypxfr.c
59
datum key, val;
usr.sbin/ypserv/ypxfr/ypxfr.c
67
key.dptr = keystr;
usr.sbin/ypserv/ypxfr/ypxfr.c
68
key.dsize = strlen(keystr);
usr.sbin/ypserv/ypxfr/ypxfr.c
73
ypdb_store(db, key, val, YPDB_INSERT);