/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Bin/ |
H A D | wpm.d | 102 this->key = stringof(copyin(self->buf, arg0)); 107 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r") && 116 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r")/
|
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Misc/ |
H A D | wpm.d | 102 this->key = stringof(copyin(self->buf, arg0)); 107 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r") && 116 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r")/
|
/freebsd-9.3-release/contrib/nvi/ex/ |
H A D | ex_usage.c | 48 "For a vi key usage statement enter \":viusage [key]<CR>\"\n"); 137 * ex_viusage -- :viusage [key] 149 int key; local 158 key = cmdp->argv[0]->bp[0]; 159 if (key > MAXVIKEY) 163 if ((key == '[' || key == ']') && cmdp->argv[0]->bp[1] != key) 167 if (key [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto.h | 79 * @seed: Seed/key for the PRF 106 * @key: 7 octets (in) (no parity bits included) 109 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher); 113 * @key: Encryption key 117 void * aes_encrypt_init(const u8 *key, size_t len); 135 * @key: Decryption key 139 void * aes_decrypt_init(const u8 *key, size_t len); 166 * @key [all...] |
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | keytype.sh | 4 tid="login with different key types" 14 # Traditional and builtin key types. 17 for i in `$SSH -Q key`; do 26 rm -f $OBJ/key.$kt 30 ${TIME} ${SSHKEYGEN} -b $bits -q -N '' -t $type -f $OBJ/key.$kt ||\ 42 echo HostKey $OBJ/key.$ht 46 echo IdentityFile $OBJ/key.$ut 50 cat $OBJ/key.$ht.pub 52 cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | ssh-ecdsa.c | 44 #include "key.h" 48 ssh_ecdsa_sign(const Key *key, u_char **sigp, u_int *lenp, argument 57 if (key == NULL || key_type_plain(key->type) != KEY_ECDSA || 58 key->ecdsa == NULL) { 59 error("%s: no ECDSA key", __func__); 63 hash_alg = key_ec_nid_to_hash_alg(key->ecdsa_nid); 74 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 88 buffer_put_cstring(&b, key_ssh_name_plain(key)); 103 ssh_ecdsa_verify(const Key *key, cons argument [all...] |
H A D | auth2-pubkey.c | 53 #include "key.h" 77 Key *key = NULL; local 105 logit("userauth_pubkey: unsupported public key algorithm: %s", 109 key = key_from_blob(pkblob, blen); 110 if (key == NULL) { 111 error("userauth_pubkey: cannot decode key: %s", pkalg); 114 if (key->type != pktype) { 115 error("userauth_pubkey: type mismatch for decoded key " 116 "(received %d, expected %d)", key->type, pktype); 119 if (key_type_plain(key 199 pubkey_auth_info(Authctxt *authctxt, const Key *key, const char *fmt, ...) argument 315 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) argument 425 user_cert_trusted_ca(struct passwd *pw, Key *key) argument 481 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument 504 user_key_command_allowed2(struct passwd *user_pw, Key *key) argument 651 user_key_allowed(struct passwd *pw, Key *key) argument [all...] |
/freebsd-9.3-release/sys/opencrypto/ |
H A D | xform.c | 130 NULL_BLOCK_LEN, 0, 256, /* 2048 bits, max key */ 160 BLOWFISH_BLOCK_LEN, 5, 56 /* 448 bits, max key */, 300 null_encrypt(caddr_t key, u_int8_t *blk) argument 304 null_decrypt(caddr_t key, u_int8_t *blk) argument 308 null_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 320 des1_encrypt(caddr_t key, u_int8_t *blk) argument 323 des_key_schedule *p = (des_key_schedule *) key; 329 des1_decrypt(caddr_t key, u_int8_t *blk) argument 332 des_key_schedule *p = (des_key_schedule *) key; 338 des1_setkey(u_int8_t **sched, u_int8_t *key, in argument 363 des3_encrypt(caddr_t key, u_int8_t *blk) argument 372 des3_decrypt(caddr_t key, u_int8_t *blk) argument 381 des3_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 408 blf_encrypt(caddr_t key, u_int8_t *blk) argument 423 blf_decrypt(caddr_t key, u_int8_t *blk) argument 438 blf_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 461 cast5_encrypt(caddr_t key, u_int8_t *blk) argument 467 cast5_decrypt(caddr_t key, u_int8_t *blk) argument 473 cast5_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 495 skipjack_encrypt(caddr_t key, u_int8_t *blk) argument 501 skipjack_decrypt(caddr_t key, u_int8_t *blk) argument 507 skipjack_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 539 rijndael128_encrypt(caddr_t key, u_int8_t *blk) argument 545 rijndael128_decrypt(caddr_t key, u_int8_t *blk) argument 552 rijndael128_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 588 aes_xts_reinit(caddr_t key, u_int8_t *iv) argument 639 aes_xts_encrypt(caddr_t key, u_int8_t *data) argument 645 aes_xts_decrypt(caddr_t key, u_int8_t *data) argument 651 aes_xts_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 679 cml_encrypt(caddr_t key, u_int8_t *blk) argument 685 cml_decrypt(caddr_t key, u_int8_t *blk) argument 692 cml_setkey(u_int8_t **sched, u_int8_t *key, int len) argument [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | opensslecdsa_link.c | 52 static isc_result_t opensslecdsa_todns(const dst_key_t *key, 56 opensslecdsa_createctx(dst_key_t *key, dst_context_t *dctx) { argument 60 UNUSED(key); 61 REQUIRE(dctx->key->key_alg == DST_ALG_ECDSA256 || 62 dctx->key->key_alg == DST_ALG_ECDSA384); 67 if (dctx->key->key_alg == DST_ALG_ECDSA256) 88 REQUIRE(dctx->key->key_alg == DST_ALG_ECDSA256 || 89 dctx->key->key_alg == DST_ALG_ECDSA384); 101 REQUIRE(dctx->key->key_alg == DST_ALG_ECDSA256 || 102 dctx->key 125 dst_key_t *key = dctx->key; local 176 dst_key_t *key = dctx->key; local 285 opensslecdsa_generate(dst_key_t *key, int unused, void (*callback)(int)) argument 327 opensslecdsa_isprivate(const dst_key_t *key) argument 339 opensslecdsa_destroy(dst_key_t *key) argument 347 opensslecdsa_todns(const dst_key_t *key, isc_buffer_t *data) argument 383 opensslecdsa_fromdns(dst_key_t *key, isc_buffer_t *data) argument 443 opensslecdsa_tofile(const dst_key_t *key, const char *directory) argument 517 opensslecdsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument [all...] |
H A D | opensslgost_link.c | 49 static isc_result_t opensslgost_todns(const dst_key_t *key, 53 opensslgost_createctx(dst_key_t *key, dst_context_t *dctx) { argument 57 UNUSED(key); 97 dst_key_t *key = dctx->key; local 101 EVP_PKEY *pkey = key->keydata.pkey; 118 dst_key_t *key = dctx->key; local 121 EVP_PKEY *pkey = key->keydata.pkey; 170 opensslgost_generate(dst_key_t *key, in argument 211 opensslgost_isprivate(const dst_key_t *key) argument 222 opensslgost_destroy(dst_key_t *key) argument 238 opensslgost_todns(const dst_key_t *key, isc_buffer_t *data) argument 263 opensslgost_fromdns(dst_key_t *key, isc_buffer_t *data) argument 289 opensslgost_tofile(const dst_key_t *key, const char *directory) argument 331 opensslgost_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument [all...] |
H A D | tsec.c | 42 dst_key_t *key; member in union:dns_tsec::__anon214 47 dns_tsec_create(isc_mem_t *mctx, dns_tsectype_t type, dst_key_t *key, argument 67 switch (dst_key_alg(key)) { 90 result = dns_tsigkey_createfromkey(dst_key_name(key), 91 algname, key, ISC_FALSE, 101 tsec->ukey.key = key; 126 dst_key_free(&tsec->ukey.key); 155 *(dst_key_t **)keyp = tsec->ukey.key;
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | test_pkinit_dh2key.c | 49 krb5_keyblock key; local 56 &key); 60 if (key.keyvalue.length != result->length || 61 memcmp(key.keyvalue.data, result->data, result->length) != 0) 62 krb5_errx(context, 1, "resulting key wrong: %d", i); 64 krb5_free_keyblock_contents(context, &key); 71 krb5_data key; member in struct:__anon4659 212 tests[i].type, &tests[i].key);
|
/freebsd-9.3-release/lib/libc/db/test/hash.tests/ |
H A D | tdel.c | 59 DBT item, key; local 82 key.data = wp1; 90 key.size = strlen(wp1); 94 * enter key/data pair into the table 96 if ((dbp->put)(dbp, &key, &item, R_NOOVERWRITE) != NULL) { 97 fprintf(stderr, "cannot enter: key %s\n", 109 key.size = strlen(wp1); 110 stat = (dbp->del)(dbp, &key, 0); 112 fprintf ( stderr, "Error retrieving %s\n", key.data );
|
/freebsd-9.3-release/usr.sbin/sa/ |
H A D | extern.h | 69 BTREEINFO *bti, int (*v1_to_v2)(DBT *key, DBT *data)); 103 #define DB_GET(db, key, data, flags) \ 104 ((*(db)->get)((db), (key), (data), (flags))) 105 #define DB_PUT(db, key, data, flags) \ 106 ((*(db)->put)((db), (key), (data), (flags))) 109 #define DB_SEQ(db, key, data, flags) \ 110 ((*(db)->seq)((db), (key), (data), (flags)))
|
H A D | usrdb.c | 67 v1_to_v2(DBT *key, DBT *data) argument 73 if (key->size != sizeof(u_long) || data->size != sizeof(uiv1)) { 78 /* Convert key. */ 79 key->size = sizeof(uid_t); 80 uid = (uid_t)*(u_long *)(key->data); 81 key->data = &uid; 120 DBT key, data; local 126 key.data = &uid; 127 key.size = sizeof uid; 129 rv = DB_GET(usracct_db, &key, 183 DBT key, data; local [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | wrap.c | 45 krb5_keyblock **key) 48 *key = NULL; 53 key); 57 key); 59 if (ret == 0 && *key == NULL) 62 key); 63 if (ret == 0 && *key == NULL) { 73 krb5_keyblock **key) 76 *key = NULL; 81 key); 43 _gsskrb5i_get_initiator_subkey(const gsskrb5_ctx ctx, krb5_context context, krb5_keyblock **key) argument 71 _gsskrb5i_get_acceptor_subkey(const gsskrb5_ctx ctx, krb5_context context, krb5_keyblock **key) argument 95 _gsskrb5i_get_token_key(const gsskrb5_ctx ctx, krb5_context context, krb5_keyblock **key) argument 150 krb5_keyblock *key; local 510 krb5_keyblock *key; local [all...] |
/freebsd-9.3-release/sys/crypto/des/ |
H A D | des_setkey.c | 70 void des_set_odd_parity(des_cblock *key) argument 75 (*key)[i]=odd_parity[(*key)[i]]; 78 int des_check_key_parity(des_cblock *key) argument 84 if ((*key)[i] != odd_parity[(*key)[i]]) 120 int des_is_weak_key(des_cblock *key) argument 131 if (memcmp(weak_keys[i],key,sizeof(des_cblock)) == 0) return(1); 145 int des_set_key(des_cblock *key, des_key_schedule schedule) argument 149 return des_set_key_checked(key, schedul 162 des_set_key_checked(des_cblock *key, des_key_schedule schedule) argument 172 des_set_key_unchecked(des_cblock *key, des_key_schedule schedule) argument 228 des_key_sched(des_cblock *key, des_key_schedule schedule) argument 233 des_fixup_key_parity(des_cblock *key) argument [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 68 /* Return BIO based on EncryptedContentInfo and key */ 97 * If not keeping key set cipher to NULL so subsequent calls decrypt. 99 if (ec->key) 132 /* Generate random session key */ 133 if (!enc || !ec->key) { 143 if (!ec->key) { 144 ec->key = tkey; 155 /* If necessary set key length */ 166 /* Use random key */ 167 OPENSSL_cleanse(ec->key, e 213 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument 230 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument [all...] |
/freebsd-9.3-release/sys/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 37 int rijndael_makeKey(keyInstance *key, BYTE direction, int keyLen, char *keyMaterial) { argument 40 if (key == NULL) { 45 key->direction = direction; 51 key->keyLen = keyLen; 57 memcpy(key->keyMaterial, keyMaterial, keyLen/8); 60 /* initialize key schedule: */ 61 memcpy(cipherKey, key->keyMaterial, keyLen/8); 63 key->Nr = rijndaelKeySetupEnc(key->rk, cipherKey, keyLen); 65 key 85 rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 200 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 263 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 362 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/ |
H A D | key_25.c | 75 /* Ensure there's at least enough data to compute a key ID for MD5 */ 127 /* key */ 148 RETERR(str_totext(" ; key id = ", target)); 190 * RSAMD5 computes key ID differently from other 233 dns_rdata_key_t *key = source; local 237 REQUIRE(key->common.rdtype == type); 238 REQUIRE(key->common.rdclass == rdclass); 244 RETERR(uint16_tobuffer(key->flags, target)); 247 RETERR(uint8_tobuffer(key->protocol, target)); 250 RETERR(uint8_tobuffer(key 258 dns_rdata_key_t *key = target; local 301 dns_rdata_key_t *key = (dns_rdata_key_t *) source; local [all...] |
/freebsd-9.3-release/contrib/bind9/bin/tools/ |
H A D | isc-hmac-fixup.c | 36 unsigned char key[1024]; local 63 isc_md5_final(&md5ctx, key); 65 r.base = key; 74 isc_sha1_final(&sha1ctx, key); 76 r.base = key; 85 isc_sha224_final(key, &sha224ctx); 87 r.base = key; 96 isc_sha256_final(key, &sha256ctx); 98 r.base = key; 107 isc_sha384_final(key, [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | ndbm_wrap.c | 80 DBT key; local 81 DATUM2DBT(&dkey, &key); 83 RETURN(D(db)->del(D(db), NULL, &key, 0)); 85 RETURN(D(db)->del(D(db), &key, 0)); 93 DBT key, value; local 94 DATUM2DBT(&dkey, &key); 99 &key, &value, 0) != 0) { 112 DBT key, value; local 117 if(cursor->c_get(cursor, &key, &value, flags) != 0) { 123 db->seq(db, &key, 194 DBT key, value; local [all...] |
/freebsd-9.3-release/lib/librpcsvc/ |
H A D | yp_update.c | 58 yp_update(char *domain, char *map, unsigned int ypop, char *key, int keylen, argument 88 * netname. This is how the client side knows what public key 98 /* Make up a DES session key. */ 124 upargs.key.yp_buf_len = keylen; 125 upargs.key.yp_buf_val = key; 141 upargs.key.yp_buf_len = keylen; 142 upargs.key.yp_buf_val = key; 158 delargs.key [all...] |
/freebsd-9.3-release/contrib/gcc/config/i386/ |
H A D | gthr-win32.c | 55 to emulate pthreads key dtors; the runtime provides a special DLL, 105 __gthr_win32_key_create (__gthread_key_t *key, void (*dtor) (void *)) argument 111 *key = tls_index; 115 status = __mingwthr_key_dtor (*key, dtor); 124 __gthr_win32_key_delete (__gthread_key_t key) argument 126 return (TlsFree (key) != 0) ? 0 : (int) GetLastError (); 130 __gthr_win32_getspecific (__gthread_key_t key) argument 135 ptr = TlsGetValue(key); 141 __gthr_win32_setspecific (__gthread_key_t key, const void *ptr) argument 143 return (TlsSetValue (key, (voi [all...] |
/freebsd-9.3-release/crypto/heimdal/appl/ftp/ftp/ |
H A D | kauth.c | 45 des_cblock key; local 111 des_string_to_key (passwd, &key); 113 des_key_sched(&key, schedule); 117 schedule, &key, DES_DECRYPT); 120 afs_string_to_key (passwd, krb_realmofhost(hostname), &key); 121 des_key_sched (&key, schedule); 124 schedule, &key, DES_DECRYPT); 126 memset(key, 0, sizeof(key));
|