Searched refs:keys (Results 126 - 150 of 272) sorted by relevance

1234567891011

/freebsd-13-stable/contrib/wpa/src/radius/
H A Dradius.c1113 struct radius_ms_mppe_keys *keys; local
1118 keys = os_zalloc(sizeof(*keys));
1119 if (keys == NULL)
1126 keys->send = decrypt_ms_key(key, keylen,
1129 &keys->send_len);
1130 if (!keys->send) {
1141 keys->recv = decrypt_ms_key(key, keylen,
1144 &keys->recv_len);
1145 if (!keys
1162 struct radius_ms_mppe_keys *keys; local
[all...]
/freebsd-13-stable/crypto/openssh/
H A Dclientloop.c1781 * keys) by client_global_hostkeys_private_confirm().
1783 struct sshkey **keys; member in struct:hostkeys_update_ctx
1804 sshkey_free(ctx->keys[i]);
1805 free(ctx->keys);
1825 /* Mark off keys we've already seen for this host */
1827 if (sshkey_equal(l->key, ctx->keys[i])) {
1829 sshkey_ssh_name(ctx->keys[i]), l->path, l->linenum);
1860 if ((fp = sshkey_fingerprint(ctx->keys[i],
1864 sshkey_type(ctx->keys[i]), fp);
1904 * Now that all the keys ar
[all...]
H A Dhostfile.c287 debug3("%s: loaded %lu keys from %s", __func__,
327 * Match keys against a specified key, or look one up by key type.
337 * 4. If no matching keys are found, then return HOST_NEW.
469 struct sshkey * const *keys; member in struct:host_delete_ctx
489 * If this line contains one of the keys that we will be
494 if (sshkey_equal(ctx->keys[i], l->key)) {
525 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg)
541 ctx.keys = keys;
575 /* Add the requested keys */
524 hostfile_replace_entries(const char *filename, const char *host, const char *ip, struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/eap_common/
H A Deap_sim_common.c82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
280 u8 keys[EAP_SIM_K_ENCR_LEN + EAP_AKA_PRIME_K_AUT_LEN + local
297 keys, sizeof(keys));
299 pos = keys;
329 u8 keys[EAP_MSK_LEN + EAP_EMSK_LEN]; local
343 keys, sizeof(keys));
345 pos = keys;
[all...]
/freebsd-13-stable/contrib/unbound/validator/
H A Dautotrust.c400 struct autr_ta* p = tp->autr->keys, *np;
453 ta->next = (*tp)->autr->keys;
454 (*tp)->autr->keys = ta;
746 /* make packed rrset keys - malloced with no ID number, they
749 if(assemble_iterate_hasfirst(assemble_iterate_ds, tp->autr->keys)) {
751 assemble_iterate_ds, tp->autr->keys);
755 assemble_iterate_ds, tp->autr->keys);
761 if(assemble_iterate_hasfirst(assemble_iterate_dnskey, tp->autr->keys)) {
763 assemble_iterate_dnskey, tp->autr->keys);
767 assemble_iterate_dnskey, tp->autr->keys);
[all...]
/freebsd-13-stable/contrib/wpa/src/ap/
H A Dieee802_1x.c195 * sets this bit for all keys. */
1481 struct radius_ms_mppe_keys *keys; local
1488 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
1491 if (keys && keys->send && keys->recv) {
1492 len = keys->send_len + keys->recv_len;
1494 keys->send, keys
[all...]
/freebsd-13-stable/contrib/ntp/scripts/monitoring/
H A Dntptrap177 grep(&debug(" - ".$_),keys(%Host));
300 @TIMEOUTS = sort timeouts keys(%TIMEOUTS);
310 @TIMEOUTS = sort timeouts keys(%TIMEOUTS);
/freebsd-13-stable/usr.sbin/iscsid/
H A Dlogin.c194 struct keys *response_keys;
486 struct keys *request_keys, *response_keys;
504 * The following keys are irrelevant for discovery sessions.
603 struct keys *request_keys;
619 struct keys *request_keys, *response_keys;
703 struct keys *response_keys;
774 struct keys *request_keys, *response_keys;
834 * all the keys to the session and use that by default
/freebsd-13-stable/contrib/libevent/test/
H A Dregress_iocp.c117 uintptr_t keys[MAX_CALLS]; member in struct:dummy_overlapped
129 d_o->keys[d_o->call_count] = key;
145 if (o->keys[i] == key && o->sizes[i] == n) {
/freebsd-13-stable/contrib/ntp/sntp/libevent/test/
H A Dregress_iocp.c117 uintptr_t keys[MAX_CALLS]; member in struct:dummy_overlapped
129 d_o->keys[d_o->call_count] = key;
145 if (o->keys[i] == key && o->sizes[i] == n) {
/freebsd-13-stable/crypto/openssh/regress/
H A Dkrl.sh6 # If we don't support ecdsa keys then this tell will be much slower.
14 # Old keys will interfere with ssh-keygen.
72 # Generate some keys.
73 verbose "$tid: generating test keys"
88 # Specifications that revoke keys by hash.
101 $SSHKEYGEN $OPTS -kf $OBJ/krl-keys $RKEYS \
170 check_krl $f $OBJ/krl-keys $KEYS_RESULT "$TAG"
186 # keys all hash sr# ID cert CA srl ID
187 test_rev "$RKEYS" "revoked keys" y y y n n n n n n
188 test_rev "$UKEYS" "unrevoked keys"
[all...]
/freebsd-13-stable/contrib/llvm-project/lld/lib/ReaderWriter/MachO/
H A DLayoutPass.h109 std::vector<SortKey> &keys) const;
/freebsd-13-stable/contrib/unbound/smallapp/
H A Dunbound-control-setup.sh.in48 # size of keys in bits
54 # base name for unbound server keys
57 # base name for unbound-control keys
90 -d <dir> used directory to store keys and certificates (default: $DESTDIR)
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Deap_ikev2.c121 data->ikev2.proposal.prf, &data->ikev2.keys,
191 data->ikev2.keys.SK_ar,
192 data->ikev2.keys.SK_integ_len,
251 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
H A Dikev2.c19 ikev2_free_keys(&data->keys);
110 &data->keys);
550 &data->keys, 1, data->shared_secret,
579 "using shared keys");
655 &data->keys, 1, hdr, pl->encrypted,
1002 &data->keys, 0, data->shared_secret,
1117 &data->keys, 0, msg, plain,
1159 &data->keys, 0, msg, plain,
1195 &data->keys, 0, msg, plain,
/freebsd-13-stable/sys/contrib/openzfs/contrib/pyzfs/libzfs_core/
H A D_error_translation.py164 pool_names = map(_pool_name, bookmarks.keys())
189 b for b in bookmarks.keys() if not _is_valid_bmark_name(b)]
203 ret, errlist, bookmarks.keys(), lzc_exc.BookmarkFailure, _map)
263 pool_names = map(_pool_name, holds.keys())
272 b for b in holds.keys() if not _is_valid_snap_name(b)]
294 _handle_err_list(ret, errlist, holds.keys(), lzc_exc.HoldFailure, _map)
310 pool_names = map(_pool_name, holds.keys())
319 b for b in holds.keys() if not _is_valid_snap_name(b)]
338 ret, errlist, holds.keys(), lzc_exc.HoldReleaseFailure, _map)
/freebsd-13-stable/tools/tools/drm/
H A Dgen-drm_pciids130 foreach my $vendor_define (sort keys(%linux_pciids)) {
139 foreach my $device_id (sort keys(%{$linux_pciids{$vendor_define}})) {
173 foreach my $vendor_define (sort keys(%freebsd_pciids)) {
175 foreach my $device_id (sort keys(%{$freebsd_pciids{$vendor_define}})) {
/freebsd-13-stable/contrib/unbound/util/
H A Dnet_help.c1399 struct tls_session_ticket_key *keys; local
1403 keys = calloc(s, sizeof(struct tls_session_ticket_key));
1404 if(!keys)
1406 memset(keys, 0, s*sizeof(*keys));
1407 ticket_keys = keys;
1434 keys->key_name = data;
1435 keys->aes_key = data + 16;
1436 keys->hmac_key = data + 48;
1437 keys
[all...]
/freebsd-13-stable/contrib/subversion/subversion/svndumpfilter/
H A Dsvndumpfilter.c1128 apr_array_header_t *keys;
1202 /* Get the keys of the hash, sort them, then print the hash keys
1203 and values, sorted by keys. */
1205 keys = apr_array_make(pool, num_keys + 1, sizeof(svn_revnum_t));
1212 APR_ARRAY_PUSH(keys, svn_revnum_t) = *revnum;
1214 svn_sort__array(keys, svn_sort_compare_revisions);
1215 for (i = 0; i < keys->nelts; i++)
1221 this_key = APR_ARRAY_IDX(keys, i, svn_revnum_t);
1246 /* Get the keys o
1125 apr_array_header_t *keys; local
[all...]
/freebsd-13-stable/contrib/ldns/
H A DMakefile.in78 LDNS_LOBJS = buffer.lo dane.lo dname.lo dnssec.lo dnssec_sign.lo dnssec_verify.lo dnssec_zone.lo duration.lo error.lo higher.lo host2str.lo host2wire.lo keys.lo net.lo packet.lo parse.lo radix.lo rbtree.lo rdata.lo resolver.lo rr.lo rr_functions.lo sha1.lo sha2.lo str2host.lo tsig.lo update.lo util.lo wire2host.lo zone.lo
83 LDNS_HEADERS = buffer.h dane.h dname.h dnssec.h dnssec_sign.h dnssec_verify.h dnssec_zone.h duration.h error.h higher.h host2str.h host2wire.h keys.h ldns.h packet.h parse.h radix.h rbtree.h rdata.h resolver.h rr_functions.h rr.h sha1.h sha2.h str2host.h tsig.h update.h wire2host.h zone.h
541 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
549 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
557 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
565 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
573 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \
581 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \
589 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \
598 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys
[all...]
/freebsd-13-stable/crypto/heimdal/lib/kadm5/
H A Dcreate_s.c169 ent.entry.keys.len = 0;
170 ent.entry.keys.val = NULL;
/freebsd-13-stable/libexec/rc/rc.d/
H A Dsyscons107 hu.iso2.101keys) echo hu.101;;
108 hu.iso2.102keys) echo hu.102;;
200 # change function keys
/freebsd-13-stable/share/syscons/keymaps/
H A DMakefile25 hu.iso2.101keys.kbd hu.iso2.102keys.kbd \
/freebsd-13-stable/usr.sbin/ctld/
H A Dlogin.c234 struct keys *request_keys;
260 struct keys *response_keys;
284 struct keys *request_keys;
342 struct keys *request_keys, *response_keys;
452 const char *value, bool skipped_security, struct keys *response_keys)
631 struct keys *response_keys;
690 struct keys *request_keys, *response_keys;
839 struct keys *request_keys, *response_keys;
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Ddes-internal.c318 static void desfunc(u32 *block, const u32 *keys) argument
350 work = RORc(right, 4) ^ *keys++;
355 work = right ^ *keys++;
361 work = RORc(leftt, 4) ^ *keys++;
366 work = leftt ^ *keys++;

Completed in 310 milliseconds

1234567891011