Searched refs:keys (Results 26 - 50 of 272) sorted by relevance

1234567891011

/freebsd-13-stable/contrib/ntp/conf/
H A Dpogo.conf34 keys /usr/local/etc/ntp.keys # path for keys file
35 trustedkey 3 4 5 14 # define trusted keys
H A Drackety.conf44 keys /usr/local/etc/ntp.keys # symmetric keys file
45 trustedkey 3 4 5 14 # define trusted keys
/freebsd-13-stable/crypto/openssh/regress/
H A Dkeys-command.sh1 # $OpenBSD: keys-command.sh,v 1.4 2016/09/26 21:34:38 bluhm Exp $
4 tid="authorized keys from command"
12 rm -f $OBJ/keys-command-args
14 touch $OBJ/keys-command-args
15 chmod a+rw $OBJ/keys-command-args
25 echo args: "\$@" >> $OBJ/keys-command-args
39 if ! $OBJ/check-perm -m keys-command $KEY_COMMAND ; then
/freebsd-13-stable/contrib/mtree/
H A Dcreate.c179 if (sflag && keys & F_CKSUM)
205 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) {
206 if (keys & F_UNAME &&
209 if (keys & F_UID || (keys & F_UNAME && name == NULL))
213 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) {
214 if (keys & F_GNAME &&
217 if (keys & F_GID || (keys & F_GNAME && name == NULL))
221 if (keys
[all...]
/freebsd-13-stable/contrib/ntp/ntpd/
H A DMakefile.am86 man5_MANS= ntp.conf.5 ntp.keys.5
134 invoke-ntp.keys.menu \
135 invoke-ntp.keys.texi \
146 ntp.keys.5man \
147 ntp.keys.5mdoc \
148 ntp.keys.def \
149 ntp.keys.man.in \
150 ntp.keys.mdoc.in \
151 ntp.keys.html \
152 ntp.keys
[all...]
/freebsd-13-stable/crypto/heimdal/lib/kadm5/
H A Drename_s.c72 for(i = 0; i < ent.entry.keys.len; i++){
73 if(ent.entry.keys.val[i].salt == NULL){
74 ent.entry.keys.val[i].salt =
75 malloc(sizeof(*ent.entry.keys.val[i].salt));
76 if(ent.entry.keys.val[i].salt == NULL)
78 ret = copy_Salt(&salt, ent.entry.keys.val[i].salt);
/freebsd-13-stable/lib/libc/tests/stdlib/
H A Dtsearch_test.c88 /* Create 1000 possible keys. */
89 int keys[NKEYS]; local
91 keys[i] = i;
121 ATF_CHECK_EQ(&keys[key],
129 ATF_CHECK_EQ(&keys[key],
132 ATF_CHECK_EQ(&keys[key], *(int **)tsearch(
133 &keys[key], &root, compar));
/freebsd-13-stable/crypto/heimdal/lib/hdb/
H A Dkeys.c38 * free all the memory used by (len, keys)
42 hdb_free_keys (krb5_context context, int len, Key *keys) argument
47 free(keys[i].mkvno);
48 keys[i].mkvno = NULL;
49 if (keys[i].salt != NULL) {
50 free_Salt(keys[i].salt);
51 free(keys[i].salt);
52 keys[i].salt = NULL;
54 krb5_free_keyblock_contents(context, &keys[i].key);
56 free (keys);
361 hdb_generate_key_set_password(krb5_context context, krb5_principal principal, const char *password, Key **keys, size_t *num_keys) argument
[all...]
H A Dprint.c44 keys...
141 /* --- keys */
142 for(i = 0; i < ent->keys.len; i++){
144 if(ent->keys.val[i].mkvno)
146 *ent->keys.val[i].mkvno,
147 ent->keys.val[i].key.keytype);
150 ent->keys.val[i].key.keytype);
152 append_hex(context, sp, &ent->keys.val[i].key.keyvalue);
155 if(ent->keys.val[i].salt){
156 append_string(context, sp, "%u/", ent->keys
[all...]
/freebsd-13-stable/contrib/ipfilter/
H A Dmkfilters13 foreach $i (keys %ifaces) {
22 foreach $i (keys %ifaces) {
36 foreach $i (keys %ifaces) {
52 foreach $j (keys %ifaces) {
/freebsd-13-stable/crypto/openssh/
H A Dsshconnect.h29 struct sshkey **keys; member in struct:Sensitive
/freebsd-13-stable/usr.sbin/fmtree/
H A Dmtree.c57 u_int keys; variable
71 keys = KEYDEFAULT;
105 keys |= parsekey(p, NULL);
108 keys = F_TYPE;
111 keys |= parsekey(p, NULL);
H A Dextern.h54 extern u_int keys;
/freebsd-13-stable/contrib/ofed/opensm/opensm/
H A Dosm_pkey.c64 cl_map_construct(&p_pkey_tbl->keys);
88 cl_map_remove_all(&p_pkey_tbl->keys);
89 cl_map_destroy(&p_pkey_tbl->keys);
97 cl_map_init(&p_pkey_tbl->keys, 1);
148 tables there is no other way but to refresh the entire keys map.
153 cl_map_remove_all(&p_pkey_tbl->keys);
176 p_prev_pkey = cl_map_get(&p_pkey_tbl->keys, pkey_base);
182 cl_map_insert(&p_pkey_tbl->keys, pkey_base,
346 pkey1 = cl_map_get(&(osm_physp_get_pkey_tbl(p_physp1))->keys,
349 pkey1 = cl_map_get(&(osm_physp_get_pkey_tbl(p_physp1))->keys,
[all...]
/freebsd-13-stable/contrib/ldns/ldns/
H A Ddnssec_verify.h352 * \param *keys A ldns_rr_list of DNSKEY and DS rrs to look for
355 * the keys, or the *first* error encountered
360 ldns_rr_list *keys);
367 * \param[in] keys a list of keys to check with
368 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
369 * from keys that validate one of the signatures
375 const ldns_rr_list *keys,
383 * \param[in] keys a list of keys t
[all...]
/freebsd-13-stable/crypto/heimdal/kadmin/
H A Dcpw.c49 krb5_keyblock *keys; local
52 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys);
56 krb5_free_keyblock_contents(context, &keys[i]);
57 free(keys);
/freebsd-13-stable/contrib/ntp/sntp/
H A Dcrypto.h28 extern int auth_init(const char *keyfile, struct key **keys);
/freebsd-13-stable/usr.sbin/iscsid/
H A DMakefile5 SRCS= chap.c discovery.c iscsid.c keys.c log.c login.c pdu.c
/freebsd-13-stable/tools/tools/commitsdb/
H A Dmake_commit_db37 foreach my $f (keys %logs) {
39 foreach my $rev (keys %$file) {
/freebsd-13-stable/contrib/libarchive/libarchive/
H A Darchive_write_set_format_mtree.c138 int keys; member in struct:mtree_writer::__anon1138
172 int keys; member in struct:mtree_writer
442 int keys, oldkeys, effkeys; local
446 keys = mtree->keys & SET_KEYS;
447 oldkeys = mtree->set.keys;
448 effkeys = keys;
488 keys &= ~(F_UNAME | F_UID);
490 keys &= ~(F_GNAME | F_GID);
492 keys
643 int keys = mtree->keys; local
729 int keys; local
911 int keys, ret; local
[all...]
/freebsd-13-stable/contrib/ldns/drill/
H A Ddrill_util.c82 /*fprintf(stderr, "No keys read\n");*/
114 * For all keys in a packet print the DS
119 ldns_rr_list *keys; local
124 keys = ldns_pkt_rr_list_by_type(p, LDNS_RR_TYPE_DNSKEY,
130 if (keys) {
131 for (i = 0; i < ldns_rr_list_rr_count(keys); i++) {
133 (unsigned int)ldns_calc_keytag(ldns_rr_list_rr(keys, i)));
135 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA1);
137 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA256);
140 ldns_rr_list_deep_free(keys);
[all...]
/freebsd-13-stable/contrib/llvm-project/lld/lib/ReaderWriter/YAML/
H A DReaderWriterYAML.cpp707 keys(io, file, nullptr);
709 info->_file = keys.operator->();
711 io.mapOptional("path", keys->_path);
714 io.mapOptional("defined-atoms", keys->_definedAtomsRef);
715 io.mapOptional("undefined-atoms", keys->_undefinedAtomsRef);
716 io.mapOptional("shared-library-atoms", keys->_sharedLibraryAtomsRef);
717 io.mapOptional("absolute-atoms", keys->_absoluteAtomsRef);
719 io.mapOptional("defined-atoms", keys->_definedAtoms);
720 io.mapOptional("undefined-atoms", keys->_undefinedAtoms);
721 io.mapOptional("shared-library-atoms", keys
[all...]
/freebsd-13-stable/crypto/heimdal/kdc/
H A Dmit_dump.c42 %d\t (number of key data, e.g. how many keys for this user)
60 foreach key 0 to number of keys - 1 as above
155 Salt *salt = ent->keys.val[key_num].salt;
350 ALLOC_SEQ(&ent.entry.keys, num_key_data);
359 * An MIT dump file may contain multiple sets of keys with
362 * that set will be given first, and discard all keys with lower
366 errx(1, "line %d: high kvno keys given after low kvno keys",
377 ent.entry.keys.len--;
382 ALLOC(ent.entry.keys
[all...]
/freebsd-13-stable/usr.sbin/ctld/
H A Dctld.h272 struct keys { struct
436 struct keys *keys_new(void);
437 void keys_delete(struct keys *keys);
438 void keys_load(struct keys *keys, const struct pdu *pdu);
439 void keys_save(struct keys *keys, struct pdu *pdu);
440 const char *keys_find(struct keys *keys, cons
[all...]
/freebsd-13-stable/crypto/heimdal/admin/
H A Dget.c128 krb5_keyblock *keys; local
170 ret = kadm5_randkey_principal(kadm_handle, princ_ent, &keys, &n_keys);
183 krb5_free_keyblock_contents(context, &keys[j]);
200 krb5_free_keyblock_contents(context, &keys[j]);
213 if (keys[j].keytype == etypes[k]) {
221 entry.keyblock = keys[j];
227 krb5_free_keyblock_contents(context, &keys[j]);

Completed in 286 milliseconds

1234567891011