/freebsd-13-stable/contrib/ntp/conf/ |
H A D | pogo.conf | 34 keys /usr/local/etc/ntp.keys # path for keys file 35 trustedkey 3 4 5 14 # define trusted keys
|
H A D | rackety.conf | 44 keys /usr/local/etc/ntp.keys # symmetric keys file 45 trustedkey 3 4 5 14 # define trusted keys
|
/freebsd-13-stable/crypto/openssh/regress/ |
H A D | keys-command.sh | 1 # $OpenBSD: keys-command.sh,v 1.4 2016/09/26 21:34:38 bluhm Exp $ 4 tid="authorized keys from command" 12 rm -f $OBJ/keys-command-args 14 touch $OBJ/keys-command-args 15 chmod a+rw $OBJ/keys-command-args 25 echo args: "\$@" >> $OBJ/keys-command-args 39 if ! $OBJ/check-perm -m keys-command $KEY_COMMAND ; then
|
/freebsd-13-stable/contrib/mtree/ |
H A D | create.c | 179 if (sflag && keys & F_CKSUM) 205 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) { 206 if (keys & F_UNAME && 209 if (keys & F_UID || (keys & F_UNAME && name == NULL)) 213 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) { 214 if (keys & F_GNAME && 217 if (keys & F_GID || (keys & F_GNAME && name == NULL)) 221 if (keys [all...] |
/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | Makefile.am | 86 man5_MANS= ntp.conf.5 ntp.keys.5 134 invoke-ntp.keys.menu \ 135 invoke-ntp.keys.texi \ 146 ntp.keys.5man \ 147 ntp.keys.5mdoc \ 148 ntp.keys.def \ 149 ntp.keys.man.in \ 150 ntp.keys.mdoc.in \ 151 ntp.keys.html \ 152 ntp.keys [all...] |
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | rename_s.c | 72 for(i = 0; i < ent.entry.keys.len; i++){ 73 if(ent.entry.keys.val[i].salt == NULL){ 74 ent.entry.keys.val[i].salt = 75 malloc(sizeof(*ent.entry.keys.val[i].salt)); 76 if(ent.entry.keys.val[i].salt == NULL) 78 ret = copy_Salt(&salt, ent.entry.keys.val[i].salt);
|
/freebsd-13-stable/lib/libc/tests/stdlib/ |
H A D | tsearch_test.c | 88 /* Create 1000 possible keys. */ 89 int keys[NKEYS]; local 91 keys[i] = i; 121 ATF_CHECK_EQ(&keys[key], 129 ATF_CHECK_EQ(&keys[key], 132 ATF_CHECK_EQ(&keys[key], *(int **)tsearch( 133 &keys[key], &root, compar));
|
/freebsd-13-stable/crypto/heimdal/lib/hdb/ |
H A D | keys.c | 38 * free all the memory used by (len, keys) 42 hdb_free_keys (krb5_context context, int len, Key *keys) argument 47 free(keys[i].mkvno); 48 keys[i].mkvno = NULL; 49 if (keys[i].salt != NULL) { 50 free_Salt(keys[i].salt); 51 free(keys[i].salt); 52 keys[i].salt = NULL; 54 krb5_free_keyblock_contents(context, &keys[i].key); 56 free (keys); 361 hdb_generate_key_set_password(krb5_context context, krb5_principal principal, const char *password, Key **keys, size_t *num_keys) argument [all...] |
H A D | print.c | 44 keys... 141 /* --- keys */ 142 for(i = 0; i < ent->keys.len; i++){ 144 if(ent->keys.val[i].mkvno) 146 *ent->keys.val[i].mkvno, 147 ent->keys.val[i].key.keytype); 150 ent->keys.val[i].key.keytype); 152 append_hex(context, sp, &ent->keys.val[i].key.keyvalue); 155 if(ent->keys.val[i].salt){ 156 append_string(context, sp, "%u/", ent->keys [all...] |
/freebsd-13-stable/contrib/ipfilter/ |
H A D | mkfilters | 13 foreach $i (keys %ifaces) { 22 foreach $i (keys %ifaces) { 36 foreach $i (keys %ifaces) { 52 foreach $j (keys %ifaces) {
|
/freebsd-13-stable/crypto/openssh/ |
H A D | sshconnect.h | 29 struct sshkey **keys; member in struct:Sensitive
|
/freebsd-13-stable/usr.sbin/fmtree/ |
H A D | mtree.c | 57 u_int keys; variable 71 keys = KEYDEFAULT; 105 keys |= parsekey(p, NULL); 108 keys = F_TYPE; 111 keys |= parsekey(p, NULL);
|
H A D | extern.h | 54 extern u_int keys;
|
/freebsd-13-stable/contrib/ofed/opensm/opensm/ |
H A D | osm_pkey.c | 64 cl_map_construct(&p_pkey_tbl->keys); 88 cl_map_remove_all(&p_pkey_tbl->keys); 89 cl_map_destroy(&p_pkey_tbl->keys); 97 cl_map_init(&p_pkey_tbl->keys, 1); 148 tables there is no other way but to refresh the entire keys map. 153 cl_map_remove_all(&p_pkey_tbl->keys); 176 p_prev_pkey = cl_map_get(&p_pkey_tbl->keys, pkey_base); 182 cl_map_insert(&p_pkey_tbl->keys, pkey_base, 346 pkey1 = cl_map_get(&(osm_physp_get_pkey_tbl(p_physp1))->keys, 349 pkey1 = cl_map_get(&(osm_physp_get_pkey_tbl(p_physp1))->keys, [all...] |
/freebsd-13-stable/contrib/ldns/ldns/ |
H A D | dnssec_verify.h | 352 * \param *keys A ldns_rr_list of DNSKEY and DS rrs to look for 355 * the keys, or the *first* error encountered 360 ldns_rr_list *keys); 367 * \param[in] keys a list of keys to check with 368 * \param[out] good_keys if this is a (initialized) list, the pointer to keys 369 * from keys that validate one of the signatures 375 const ldns_rr_list *keys, 383 * \param[in] keys a list of keys t [all...] |
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | cpw.c | 49 krb5_keyblock *keys; local 52 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys); 56 krb5_free_keyblock_contents(context, &keys[i]); 57 free(keys);
|
/freebsd-13-stable/contrib/ntp/sntp/ |
H A D | crypto.h | 28 extern int auth_init(const char *keyfile, struct key **keys);
|
/freebsd-13-stable/usr.sbin/iscsid/ |
H A D | Makefile | 5 SRCS= chap.c discovery.c iscsid.c keys.c log.c login.c pdu.c
|
/freebsd-13-stable/tools/tools/commitsdb/ |
H A D | make_commit_db | 37 foreach my $f (keys %logs) { 39 foreach my $rev (keys %$file) {
|
/freebsd-13-stable/contrib/libarchive/libarchive/ |
H A D | archive_write_set_format_mtree.c | 138 int keys; member in struct:mtree_writer::__anon1138 172 int keys; member in struct:mtree_writer 442 int keys, oldkeys, effkeys; local 446 keys = mtree->keys & SET_KEYS; 447 oldkeys = mtree->set.keys; 448 effkeys = keys; 488 keys &= ~(F_UNAME | F_UID); 490 keys &= ~(F_GNAME | F_GID); 492 keys 643 int keys = mtree->keys; local 729 int keys; local 911 int keys, ret; local [all...] |
/freebsd-13-stable/contrib/ldns/drill/ |
H A D | drill_util.c | 82 /*fprintf(stderr, "No keys read\n");*/ 114 * For all keys in a packet print the DS 119 ldns_rr_list *keys; local 124 keys = ldns_pkt_rr_list_by_type(p, LDNS_RR_TYPE_DNSKEY, 130 if (keys) { 131 for (i = 0; i < ldns_rr_list_rr_count(keys); i++) { 133 (unsigned int)ldns_calc_keytag(ldns_rr_list_rr(keys, i))); 135 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA1); 137 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA256); 140 ldns_rr_list_deep_free(keys); [all...] |
/freebsd-13-stable/contrib/llvm-project/lld/lib/ReaderWriter/YAML/ |
H A D | ReaderWriterYAML.cpp | 707 keys(io, file, nullptr); 709 info->_file = keys.operator->(); 711 io.mapOptional("path", keys->_path); 714 io.mapOptional("defined-atoms", keys->_definedAtomsRef); 715 io.mapOptional("undefined-atoms", keys->_undefinedAtomsRef); 716 io.mapOptional("shared-library-atoms", keys->_sharedLibraryAtomsRef); 717 io.mapOptional("absolute-atoms", keys->_absoluteAtomsRef); 719 io.mapOptional("defined-atoms", keys->_definedAtoms); 720 io.mapOptional("undefined-atoms", keys->_undefinedAtoms); 721 io.mapOptional("shared-library-atoms", keys [all...] |
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | mit_dump.c | 42 %d\t (number of key data, e.g. how many keys for this user) 60 foreach key 0 to number of keys - 1 as above 155 Salt *salt = ent->keys.val[key_num].salt; 350 ALLOC_SEQ(&ent.entry.keys, num_key_data); 359 * An MIT dump file may contain multiple sets of keys with 362 * that set will be given first, and discard all keys with lower 366 errx(1, "line %d: high kvno keys given after low kvno keys", 377 ent.entry.keys.len--; 382 ALLOC(ent.entry.keys [all...] |
/freebsd-13-stable/usr.sbin/ctld/ |
H A D | ctld.h | 272 struct keys { struct 436 struct keys *keys_new(void); 437 void keys_delete(struct keys *keys); 438 void keys_load(struct keys *keys, const struct pdu *pdu); 439 void keys_save(struct keys *keys, struct pdu *pdu); 440 const char *keys_find(struct keys *keys, cons [all...] |
/freebsd-13-stable/crypto/heimdal/admin/ |
H A D | get.c | 128 krb5_keyblock *keys; local 170 ret = kadm5_randkey_principal(kadm_handle, princ_ent, &keys, &n_keys); 183 krb5_free_keyblock_contents(context, &keys[j]); 200 krb5_free_keyblock_contents(context, &keys[j]); 213 if (keys[j].keytype == etypes[k]) { 221 entry.keyblock = keys[j]; 227 krb5_free_keyblock_contents(context, &keys[j]);
|