/freebsd-13-stable/contrib/wpa/src/radius/ |
H A D | radius.c | 1113 struct radius_ms_mppe_keys *keys; local 1118 keys = os_zalloc(sizeof(*keys)); 1119 if (keys == NULL) 1126 keys->send = decrypt_ms_key(key, keylen, 1129 &keys->send_len); 1130 if (!keys->send) { 1141 keys->recv = decrypt_ms_key(key, keylen, 1144 &keys->recv_len); 1145 if (!keys 1162 struct radius_ms_mppe_keys *keys; local [all...] |
/freebsd-13-stable/crypto/openssh/ |
H A D | clientloop.c | 1781 * keys) by client_global_hostkeys_private_confirm(). 1783 struct sshkey **keys; member in struct:hostkeys_update_ctx 1804 sshkey_free(ctx->keys[i]); 1805 free(ctx->keys); 1825 /* Mark off keys we've already seen for this host */ 1827 if (sshkey_equal(l->key, ctx->keys[i])) { 1829 sshkey_ssh_name(ctx->keys[i]), l->path, l->linenum); 1860 if ((fp = sshkey_fingerprint(ctx->keys[i], 1864 sshkey_type(ctx->keys[i]), fp); 1904 * Now that all the keys ar [all...] |
H A D | hostfile.c | 287 debug3("%s: loaded %lu keys from %s", __func__, 327 * Match keys against a specified key, or look one up by key type. 337 * 4. If no matching keys are found, then return HOST_NEW. 469 struct sshkey * const *keys; member in struct:host_delete_ctx 489 * If this line contains one of the keys that we will be 494 if (sshkey_equal(ctx->keys[i], l->key)) { 525 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) 541 ctx.keys = keys; 575 /* Add the requested keys */ 524 hostfile_replace_entries(const char *filename, const char *host, const char *ip, struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) argument [all...] |
/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 280 u8 keys[EAP_SIM_K_ENCR_LEN + EAP_AKA_PRIME_K_AUT_LEN + local 297 keys, sizeof(keys)); 299 pos = keys; 329 u8 keys[EAP_MSK_LEN + EAP_EMSK_LEN]; local 343 keys, sizeof(keys)); 345 pos = keys; [all...] |
/freebsd-13-stable/contrib/unbound/validator/ |
H A D | autotrust.c | 400 struct autr_ta* p = tp->autr->keys, *np; 453 ta->next = (*tp)->autr->keys; 454 (*tp)->autr->keys = ta; 746 /* make packed rrset keys - malloced with no ID number, they 749 if(assemble_iterate_hasfirst(assemble_iterate_ds, tp->autr->keys)) { 751 assemble_iterate_ds, tp->autr->keys); 755 assemble_iterate_ds, tp->autr->keys); 761 if(assemble_iterate_hasfirst(assemble_iterate_dnskey, tp->autr->keys)) { 763 assemble_iterate_dnskey, tp->autr->keys); 767 assemble_iterate_dnskey, tp->autr->keys); [all...] |
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 195 * sets this bit for all keys. */ 1481 struct radius_ms_mppe_keys *keys; local 1488 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 1491 if (keys && keys->send && keys->recv) { 1492 len = keys->send_len + keys->recv_len; 1494 keys->send, keys [all...] |
/freebsd-13-stable/contrib/ntp/scripts/monitoring/ |
H A D | ntptrap | 177 grep(&debug(" - ".$_),keys(%Host)); 300 @TIMEOUTS = sort timeouts keys(%TIMEOUTS); 310 @TIMEOUTS = sort timeouts keys(%TIMEOUTS);
|
/freebsd-13-stable/usr.sbin/iscsid/ |
H A D | login.c | 194 struct keys *response_keys; 486 struct keys *request_keys, *response_keys; 504 * The following keys are irrelevant for discovery sessions. 603 struct keys *request_keys; 619 struct keys *request_keys, *response_keys; 703 struct keys *response_keys; 774 struct keys *request_keys, *response_keys; 834 * all the keys to the session and use that by default
|
/freebsd-13-stable/contrib/libevent/test/ |
H A D | regress_iocp.c | 117 uintptr_t keys[MAX_CALLS]; member in struct:dummy_overlapped 129 d_o->keys[d_o->call_count] = key; 145 if (o->keys[i] == key && o->sizes[i] == n) {
|
/freebsd-13-stable/contrib/ntp/sntp/libevent/test/ |
H A D | regress_iocp.c | 117 uintptr_t keys[MAX_CALLS]; member in struct:dummy_overlapped 129 d_o->keys[d_o->call_count] = key; 145 if (o->keys[i] == key && o->sizes[i] == n) {
|
/freebsd-13-stable/crypto/openssh/regress/ |
H A D | krl.sh | 6 # If we don't support ecdsa keys then this tell will be much slower. 14 # Old keys will interfere with ssh-keygen. 72 # Generate some keys. 73 verbose "$tid: generating test keys" 88 # Specifications that revoke keys by hash. 101 $SSHKEYGEN $OPTS -kf $OBJ/krl-keys $RKEYS \ 170 check_krl $f $OBJ/krl-keys $KEYS_RESULT "$TAG" 186 # keys all hash sr# ID cert CA srl ID 187 test_rev "$RKEYS" "revoked keys" y y y n n n n n n 188 test_rev "$UKEYS" "unrevoked keys" [all...] |
/freebsd-13-stable/contrib/llvm-project/lld/lib/ReaderWriter/MachO/ |
H A D | LayoutPass.h | 109 std::vector<SortKey> &keys) const;
|
/freebsd-13-stable/contrib/unbound/smallapp/ |
H A D | unbound-control-setup.sh.in | 48 # size of keys in bits 54 # base name for unbound server keys 57 # base name for unbound-control keys 90 -d <dir> used directory to store keys and certificates (default: $DESTDIR)
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, 191 data->ikev2.keys.SK_ar, 192 data->ikev2.keys.SK_integ_len, 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
H A D | ikev2.c | 19 ikev2_free_keys(&data->keys); 110 &data->keys); 550 &data->keys, 1, data->shared_secret, 579 "using shared keys"); 655 &data->keys, 1, hdr, pl->encrypted, 1002 &data->keys, 0, data->shared_secret, 1117 &data->keys, 0, msg, plain, 1159 &data->keys, 0, msg, plain, 1195 &data->keys, 0, msg, plain,
|
/freebsd-13-stable/sys/contrib/openzfs/contrib/pyzfs/libzfs_core/ |
H A D | _error_translation.py | 164 pool_names = map(_pool_name, bookmarks.keys()) 189 b for b in bookmarks.keys() if not _is_valid_bmark_name(b)] 203 ret, errlist, bookmarks.keys(), lzc_exc.BookmarkFailure, _map) 263 pool_names = map(_pool_name, holds.keys()) 272 b for b in holds.keys() if not _is_valid_snap_name(b)] 294 _handle_err_list(ret, errlist, holds.keys(), lzc_exc.HoldFailure, _map) 310 pool_names = map(_pool_name, holds.keys()) 319 b for b in holds.keys() if not _is_valid_snap_name(b)] 338 ret, errlist, holds.keys(), lzc_exc.HoldReleaseFailure, _map)
|
/freebsd-13-stable/tools/tools/drm/ |
H A D | gen-drm_pciids | 130 foreach my $vendor_define (sort keys(%linux_pciids)) { 139 foreach my $device_id (sort keys(%{$linux_pciids{$vendor_define}})) { 173 foreach my $vendor_define (sort keys(%freebsd_pciids)) { 175 foreach my $device_id (sort keys(%{$freebsd_pciids{$vendor_define}})) {
|
/freebsd-13-stable/contrib/unbound/util/ |
H A D | net_help.c | 1399 struct tls_session_ticket_key *keys; local 1403 keys = calloc(s, sizeof(struct tls_session_ticket_key)); 1404 if(!keys) 1406 memset(keys, 0, s*sizeof(*keys)); 1407 ticket_keys = keys; 1434 keys->key_name = data; 1435 keys->aes_key = data + 16; 1436 keys->hmac_key = data + 48; 1437 keys [all...] |
/freebsd-13-stable/contrib/subversion/subversion/svndumpfilter/ |
H A D | svndumpfilter.c | 1128 apr_array_header_t *keys; 1202 /* Get the keys of the hash, sort them, then print the hash keys 1203 and values, sorted by keys. */ 1205 keys = apr_array_make(pool, num_keys + 1, sizeof(svn_revnum_t)); 1212 APR_ARRAY_PUSH(keys, svn_revnum_t) = *revnum; 1214 svn_sort__array(keys, svn_sort_compare_revisions); 1215 for (i = 0; i < keys->nelts; i++) 1221 this_key = APR_ARRAY_IDX(keys, i, svn_revnum_t); 1246 /* Get the keys o 1125 apr_array_header_t *keys; local [all...] |
/freebsd-13-stable/contrib/ldns/ |
H A D | Makefile.in | 78 LDNS_LOBJS = buffer.lo dane.lo dname.lo dnssec.lo dnssec_sign.lo dnssec_verify.lo dnssec_zone.lo duration.lo error.lo higher.lo host2str.lo host2wire.lo keys.lo net.lo packet.lo parse.lo radix.lo rbtree.lo rdata.lo resolver.lo rr.lo rr_functions.lo sha1.lo sha2.lo str2host.lo tsig.lo update.lo util.lo wire2host.lo zone.lo 83 LDNS_HEADERS = buffer.h dane.h dname.h dnssec.h dnssec_sign.h dnssec_verify.h dnssec_zone.h duration.h error.h higher.h host2str.h host2wire.h keys.h ldns.h packet.h parse.h radix.h rbtree.h rdata.h resolver.h rr_functions.h rr.h sha1.h sha2.h str2host.h tsig.h update.h wire2host.h zone.h 541 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 549 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 557 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 565 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 573 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \ 581 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \ 589 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \ 598 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys [all...] |
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | create_s.c | 169 ent.entry.keys.len = 0; 170 ent.entry.keys.val = NULL;
|
/freebsd-13-stable/libexec/rc/rc.d/ |
H A D | syscons | 107 hu.iso2.101keys) echo hu.101;; 108 hu.iso2.102keys) echo hu.102;; 200 # change function keys
|
/freebsd-13-stable/share/syscons/keymaps/ |
H A D | Makefile | 25 hu.iso2.101keys.kbd hu.iso2.102keys.kbd \
|
/freebsd-13-stable/usr.sbin/ctld/ |
H A D | login.c | 234 struct keys *request_keys; 260 struct keys *response_keys; 284 struct keys *request_keys; 342 struct keys *request_keys, *response_keys; 452 const char *value, bool skipped_security, struct keys *response_keys) 631 struct keys *response_keys; 690 struct keys *request_keys, *response_keys; 839 struct keys *request_keys, *response_keys;
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | des-internal.c | 318 static void desfunc(u32 *block, const u32 *keys) argument 350 work = RORc(right, 4) ^ *keys++; 355 work = right ^ *keys++; 361 work = RORc(leftt, 4) ^ *keys++; 366 work = leftt ^ *keys++;
|