Searched refs:key (Results 201 - 225 of 1712) sorted by relevance

1234567891011>>

/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Bin/
H A Dwpm.d102 this->key = stringof(copyin(self->buf, arg0));
107 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r") &&
116 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r")/
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Misc/
H A Dwpm.d102 this->key = stringof(copyin(self->buf, arg0));
107 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r") &&
116 /self->buf && (this->key == " " || this->key == "\n" || this->key == "\r")/
/freebsd-9.3-release/contrib/nvi/ex/
H A Dex_usage.c48 "For a vi key usage statement enter \":viusage [key]<CR>\"\n");
137 * ex_viusage -- :viusage [key]
149 int key; local
158 key = cmdp->argv[0]->bp[0];
159 if (key > MAXVIKEY)
163 if ((key == '[' || key == ']') && cmdp->argv[0]->bp[1] != key)
167 if (key
[all...]
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dcrypto.h79 * @seed: Seed/key for the PRF
106 * @key: 7 octets (in) (no parity bits included)
109 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher);
113 * @key: Encryption key
117 void * aes_encrypt_init(const u8 *key, size_t len);
135 * @key: Decryption key
139 void * aes_decrypt_init(const u8 *key, size_t len);
166 * @key
[all...]
/freebsd-9.3-release/crypto/openssh/regress/
H A Dkeytype.sh4 tid="login with different key types"
14 # Traditional and builtin key types.
17 for i in `$SSH -Q key`; do
26 rm -f $OBJ/key.$kt
30 ${TIME} ${SSHKEYGEN} -b $bits -q -N '' -t $type -f $OBJ/key.$kt ||\
42 echo HostKey $OBJ/key.$ht
46 echo IdentityFile $OBJ/key.$ut
50 cat $OBJ/key.$ht.pub
52 cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
/freebsd-9.3-release/crypto/openssh/
H A Dssh-ecdsa.c44 #include "key.h"
48 ssh_ecdsa_sign(const Key *key, u_char **sigp, u_int *lenp, argument
57 if (key == NULL || key_type_plain(key->type) != KEY_ECDSA ||
58 key->ecdsa == NULL) {
59 error("%s: no ECDSA key", __func__);
63 hash_alg = key_ec_nid_to_hash_alg(key->ecdsa_nid);
74 sig = ECDSA_do_sign(digest, dlen, key->ecdsa);
88 buffer_put_cstring(&b, key_ssh_name_plain(key));
103 ssh_ecdsa_verify(const Key *key, cons argument
[all...]
H A Dauth2-pubkey.c53 #include "key.h"
77 Key *key = NULL; local
105 logit("userauth_pubkey: unsupported public key algorithm: %s",
109 key = key_from_blob(pkblob, blen);
110 if (key == NULL) {
111 error("userauth_pubkey: cannot decode key: %s", pkalg);
114 if (key->type != pktype) {
115 error("userauth_pubkey: type mismatch for decoded key "
116 "(received %d, expected %d)", key->type, pktype);
119 if (key_type_plain(key
199 pubkey_auth_info(Authctxt *authctxt, const Key *key, const char *fmt, ...) argument
315 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) argument
425 user_cert_trusted_ca(struct passwd *pw, Key *key) argument
481 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument
504 user_key_command_allowed2(struct passwd *user_pw, Key *key) argument
651 user_key_allowed(struct passwd *pw, Key *key) argument
[all...]
/freebsd-9.3-release/sys/opencrypto/
H A Dxform.c130 NULL_BLOCK_LEN, 0, 256, /* 2048 bits, max key */
160 BLOWFISH_BLOCK_LEN, 5, 56 /* 448 bits, max key */,
300 null_encrypt(caddr_t key, u_int8_t *blk) argument
304 null_decrypt(caddr_t key, u_int8_t *blk) argument
308 null_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
320 des1_encrypt(caddr_t key, u_int8_t *blk) argument
323 des_key_schedule *p = (des_key_schedule *) key;
329 des1_decrypt(caddr_t key, u_int8_t *blk) argument
332 des_key_schedule *p = (des_key_schedule *) key;
338 des1_setkey(u_int8_t **sched, u_int8_t *key, in argument
363 des3_encrypt(caddr_t key, u_int8_t *blk) argument
372 des3_decrypt(caddr_t key, u_int8_t *blk) argument
381 des3_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
408 blf_encrypt(caddr_t key, u_int8_t *blk) argument
423 blf_decrypt(caddr_t key, u_int8_t *blk) argument
438 blf_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
461 cast5_encrypt(caddr_t key, u_int8_t *blk) argument
467 cast5_decrypt(caddr_t key, u_int8_t *blk) argument
473 cast5_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
495 skipjack_encrypt(caddr_t key, u_int8_t *blk) argument
501 skipjack_decrypt(caddr_t key, u_int8_t *blk) argument
507 skipjack_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
539 rijndael128_encrypt(caddr_t key, u_int8_t *blk) argument
545 rijndael128_decrypt(caddr_t key, u_int8_t *blk) argument
552 rijndael128_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
588 aes_xts_reinit(caddr_t key, u_int8_t *iv) argument
639 aes_xts_encrypt(caddr_t key, u_int8_t *data) argument
645 aes_xts_decrypt(caddr_t key, u_int8_t *data) argument
651 aes_xts_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
679 cml_encrypt(caddr_t key, u_int8_t *blk) argument
685 cml_decrypt(caddr_t key, u_int8_t *blk) argument
692 cml_setkey(u_int8_t **sched, u_int8_t *key, int len) argument
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Dopensslecdsa_link.c52 static isc_result_t opensslecdsa_todns(const dst_key_t *key,
56 opensslecdsa_createctx(dst_key_t *key, dst_context_t *dctx) { argument
60 UNUSED(key);
61 REQUIRE(dctx->key->key_alg == DST_ALG_ECDSA256 ||
62 dctx->key->key_alg == DST_ALG_ECDSA384);
67 if (dctx->key->key_alg == DST_ALG_ECDSA256)
88 REQUIRE(dctx->key->key_alg == DST_ALG_ECDSA256 ||
89 dctx->key->key_alg == DST_ALG_ECDSA384);
101 REQUIRE(dctx->key->key_alg == DST_ALG_ECDSA256 ||
102 dctx->key
125 dst_key_t *key = dctx->key; local
176 dst_key_t *key = dctx->key; local
285 opensslecdsa_generate(dst_key_t *key, int unused, void (*callback)(int)) argument
327 opensslecdsa_isprivate(const dst_key_t *key) argument
339 opensslecdsa_destroy(dst_key_t *key) argument
347 opensslecdsa_todns(const dst_key_t *key, isc_buffer_t *data) argument
383 opensslecdsa_fromdns(dst_key_t *key, isc_buffer_t *data) argument
443 opensslecdsa_tofile(const dst_key_t *key, const char *directory) argument
517 opensslecdsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument
[all...]
H A Dopensslgost_link.c49 static isc_result_t opensslgost_todns(const dst_key_t *key,
53 opensslgost_createctx(dst_key_t *key, dst_context_t *dctx) { argument
57 UNUSED(key);
97 dst_key_t *key = dctx->key; local
101 EVP_PKEY *pkey = key->keydata.pkey;
118 dst_key_t *key = dctx->key; local
121 EVP_PKEY *pkey = key->keydata.pkey;
170 opensslgost_generate(dst_key_t *key, in argument
211 opensslgost_isprivate(const dst_key_t *key) argument
222 opensslgost_destroy(dst_key_t *key) argument
238 opensslgost_todns(const dst_key_t *key, isc_buffer_t *data) argument
263 opensslgost_fromdns(dst_key_t *key, isc_buffer_t *data) argument
289 opensslgost_tofile(const dst_key_t *key, const char *directory) argument
331 opensslgost_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument
[all...]
H A Dtsec.c42 dst_key_t *key; member in union:dns_tsec::__anon214
47 dns_tsec_create(isc_mem_t *mctx, dns_tsectype_t type, dst_key_t *key, argument
67 switch (dst_key_alg(key)) {
90 result = dns_tsigkey_createfromkey(dst_key_name(key),
91 algname, key, ISC_FALSE,
101 tsec->ukey.key = key;
126 dst_key_free(&tsec->ukey.key);
155 *(dst_key_t **)keyp = tsec->ukey.key;
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dtest_pkinit_dh2key.c49 krb5_keyblock key; local
56 &key);
60 if (key.keyvalue.length != result->length ||
61 memcmp(key.keyvalue.data, result->data, result->length) != 0)
62 krb5_errx(context, 1, "resulting key wrong: %d", i);
64 krb5_free_keyblock_contents(context, &key);
71 krb5_data key; member in struct:__anon4659
212 tests[i].type, &tests[i].key);
/freebsd-9.3-release/lib/libc/db/test/hash.tests/
H A Dtdel.c59 DBT item, key; local
82 key.data = wp1;
90 key.size = strlen(wp1);
94 * enter key/data pair into the table
96 if ((dbp->put)(dbp, &key, &item, R_NOOVERWRITE) != NULL) {
97 fprintf(stderr, "cannot enter: key %s\n",
109 key.size = strlen(wp1);
110 stat = (dbp->del)(dbp, &key, 0);
112 fprintf ( stderr, "Error retrieving %s\n", key.data );
/freebsd-9.3-release/usr.sbin/sa/
H A Dextern.h69 BTREEINFO *bti, int (*v1_to_v2)(DBT *key, DBT *data));
103 #define DB_GET(db, key, data, flags) \
104 ((*(db)->get)((db), (key), (data), (flags)))
105 #define DB_PUT(db, key, data, flags) \
106 ((*(db)->put)((db), (key), (data), (flags)))
109 #define DB_SEQ(db, key, data, flags) \
110 ((*(db)->seq)((db), (key), (data), (flags)))
H A Dusrdb.c67 v1_to_v2(DBT *key, DBT *data) argument
73 if (key->size != sizeof(u_long) || data->size != sizeof(uiv1)) {
78 /* Convert key. */
79 key->size = sizeof(uid_t);
80 uid = (uid_t)*(u_long *)(key->data);
81 key->data = &uid;
120 DBT key, data; local
126 key.data = &uid;
127 key.size = sizeof uid;
129 rv = DB_GET(usracct_db, &key,
183 DBT key, data; local
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/krb5/
H A Dwrap.c45 krb5_keyblock **key)
48 *key = NULL;
53 key);
57 key);
59 if (ret == 0 && *key == NULL)
62 key);
63 if (ret == 0 && *key == NULL) {
73 krb5_keyblock **key)
76 *key = NULL;
81 key);
43 _gsskrb5i_get_initiator_subkey(const gsskrb5_ctx ctx, krb5_context context, krb5_keyblock **key) argument
71 _gsskrb5i_get_acceptor_subkey(const gsskrb5_ctx ctx, krb5_context context, krb5_keyblock **key) argument
95 _gsskrb5i_get_token_key(const gsskrb5_ctx ctx, krb5_context context, krb5_keyblock **key) argument
150 krb5_keyblock *key; local
510 krb5_keyblock *key; local
[all...]
/freebsd-9.3-release/sys/crypto/des/
H A Ddes_setkey.c70 void des_set_odd_parity(des_cblock *key) argument
75 (*key)[i]=odd_parity[(*key)[i]];
78 int des_check_key_parity(des_cblock *key) argument
84 if ((*key)[i] != odd_parity[(*key)[i]])
120 int des_is_weak_key(des_cblock *key) argument
131 if (memcmp(weak_keys[i],key,sizeof(des_cblock)) == 0) return(1);
145 int des_set_key(des_cblock *key, des_key_schedule schedule) argument
149 return des_set_key_checked(key, schedul
162 des_set_key_checked(des_cblock *key, des_key_schedule schedule) argument
172 des_set_key_unchecked(des_cblock *key, des_key_schedule schedule) argument
228 des_key_sched(des_cblock *key, des_key_schedule schedule) argument
233 des_fixup_key_parity(des_cblock *key) argument
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_enc.c68 /* Return BIO based on EncryptedContentInfo and key */
97 * If not keeping key set cipher to NULL so subsequent calls decrypt.
99 if (ec->key)
132 /* Generate random session key */
133 if (!enc || !ec->key) {
143 if (!ec->key) {
144 ec->key = tkey;
155 /* If necessary set key length */
166 /* Use random key */
167 OPENSSL_cleanse(ec->key, e
213 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
230 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument
[all...]
/freebsd-9.3-release/sys/crypto/rijndael/
H A Drijndael-api-fst.c37 int rijndael_makeKey(keyInstance *key, BYTE direction, int keyLen, char *keyMaterial) { argument
40 if (key == NULL) {
45 key->direction = direction;
51 key->keyLen = keyLen;
57 memcpy(key->keyMaterial, keyMaterial, keyLen/8);
60 /* initialize key schedule: */
61 memcpy(cipherKey, key->keyMaterial, keyLen/8);
63 key->Nr = rijndaelKeySetupEnc(key->rk, cipherKey, keyLen);
65 key
85 rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument
200 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
263 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument
362 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/
H A Dkey_25.c75 /* Ensure there's at least enough data to compute a key ID for MD5 */
127 /* key */
148 RETERR(str_totext(" ; key id = ", target));
190 * RSAMD5 computes key ID differently from other
233 dns_rdata_key_t *key = source; local
237 REQUIRE(key->common.rdtype == type);
238 REQUIRE(key->common.rdclass == rdclass);
244 RETERR(uint16_tobuffer(key->flags, target));
247 RETERR(uint8_tobuffer(key->protocol, target));
250 RETERR(uint8_tobuffer(key
258 dns_rdata_key_t *key = target; local
301 dns_rdata_key_t *key = (dns_rdata_key_t *) source; local
[all...]
/freebsd-9.3-release/contrib/bind9/bin/tools/
H A Disc-hmac-fixup.c36 unsigned char key[1024]; local
63 isc_md5_final(&md5ctx, key);
65 r.base = key;
74 isc_sha1_final(&sha1ctx, key);
76 r.base = key;
85 isc_sha224_final(key, &sha224ctx);
87 r.base = key;
96 isc_sha256_final(key, &sha256ctx);
98 r.base = key;
107 isc_sha384_final(key,
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/roken/
H A Dndbm_wrap.c80 DBT key; local
81 DATUM2DBT(&dkey, &key);
83 RETURN(D(db)->del(D(db), NULL, &key, 0));
85 RETURN(D(db)->del(D(db), &key, 0));
93 DBT key, value; local
94 DATUM2DBT(&dkey, &key);
99 &key, &value, 0) != 0) {
112 DBT key, value; local
117 if(cursor->c_get(cursor, &key, &value, flags) != 0) {
123 db->seq(db, &key,
194 DBT key, value; local
[all...]
/freebsd-9.3-release/lib/librpcsvc/
H A Dyp_update.c58 yp_update(char *domain, char *map, unsigned int ypop, char *key, int keylen, argument
88 * netname. This is how the client side knows what public key
98 /* Make up a DES session key. */
124 upargs.key.yp_buf_len = keylen;
125 upargs.key.yp_buf_val = key;
141 upargs.key.yp_buf_len = keylen;
142 upargs.key.yp_buf_val = key;
158 delargs.key
[all...]
/freebsd-9.3-release/contrib/gcc/config/i386/
H A Dgthr-win32.c55 to emulate pthreads key dtors; the runtime provides a special DLL,
105 __gthr_win32_key_create (__gthread_key_t *key, void (*dtor) (void *)) argument
111 *key = tls_index;
115 status = __mingwthr_key_dtor (*key, dtor);
124 __gthr_win32_key_delete (__gthread_key_t key) argument
126 return (TlsFree (key) != 0) ? 0 : (int) GetLastError ();
130 __gthr_win32_getspecific (__gthread_key_t key) argument
135 ptr = TlsGetValue(key);
141 __gthr_win32_setspecific (__gthread_key_t key, const void *ptr) argument
143 return (TlsSetValue (key, (voi
[all...]
/freebsd-9.3-release/crypto/heimdal/appl/ftp/ftp/
H A Dkauth.c45 des_cblock key; local
111 des_string_to_key (passwd, &key);
113 des_key_sched(&key, schedule);
117 schedule, &key, DES_DECRYPT);
120 afs_string_to_key (passwd, krb_realmofhost(hostname), &key);
121 des_key_sched (&key, schedule);
124 schedule, &key, DES_DECRYPT);
126 memset(key, 0, sizeof(key));

Completed in 332 milliseconds

1234567891011>>