/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ec_key.c | 134 /* copy the public key */ 143 /* copy the private key */ 245 * eckey An EC key object that contains domain params. The generated keypair 291 /* range of SM2 private key is [1, n-1) */ 396 * Check the range of the EC public key. 402 * Returns 1 if the public key has a valid range, otherwise it returns 0. 404 static int ec_key_public_range_check(BN_CTX *ctx, const EC_KEY *key) argument 415 if (!EC_POINT_get_affine_coordinates(key->group, key->pub_key, x, y, ctx)) 418 if (EC_GROUP_get_field_type(key 598 EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM *y) argument 656 ossl_ec_key_get_libctx(const EC_KEY *key) argument 661 ossl_ec_key_get0_propq(const EC_KEY *key) argument 666 ossl_ec_key_set0_libctx(EC_KEY *key, OSSL_LIB_CTX *libctx) argument 672 EC_KEY_get0_group(const EC_KEY *key) argument 677 EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group) argument 690 EC_KEY_get0_private_key(const EC_KEY *key) argument 695 EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *priv_key) argument 790 EC_KEY_get0_public_key(const EC_KEY *key) argument 795 EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub_key) argument 806 EC_KEY_get_enc_flags(const EC_KEY *key) argument 811 EC_KEY_set_enc_flags(EC_KEY *key, unsigned int flags) argument 816 EC_KEY_get_conv_form(const EC_KEY *key) argument 821 EC_KEY_set_conv_form(EC_KEY *key, point_conversion_form_t cform) argument 828 EC_KEY_set_asn1_flag(EC_KEY *key, int flag) argument 835 EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx) argument 843 EC_KEY_get_flags(const EC_KEY *key) argument 848 EC_KEY_set_flags(EC_KEY *key, int flags) argument 854 EC_KEY_clear_flags(EC_KEY *key, int flags) argument 860 EC_KEY_decoded_from_explicit_params(const EC_KEY *key) argument 867 EC_KEY_key2buf(const EC_KEY *key, point_conversion_form_t form, unsigned char **pbuf, BN_CTX *ctx) argument 875 EC_KEY_oct2key(EC_KEY *key, const unsigned char *buf, size_t len, BN_CTX *ctx) argument [all...] |
/freebsd-current/contrib/wpa/src/tls/ |
H A D | pkcs1.h | 15 int pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, 18 int pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, 21 int pkcs1_decrypt_public_key(struct crypto_rsa_key *key,
|
H A D | rsa.h | 21 size_t crypto_rsa_get_modulus_len(struct crypto_rsa_key *key); 23 struct crypto_rsa_key *key, int use_private); 24 void crypto_rsa_free(struct crypto_rsa_key *key);
|
/freebsd-current/tests/sys/net/if_ovpn/ |
H A D | Makefile | 21 client.key \ 23 client2.key \ 26 server.key \
|
/freebsd-current/crypto/openssl/crypto/bf/ |
H A D | bf_ecb.c | 32 const BF_KEY *key, int encrypt) 41 BF_encrypt(d, key); 43 BF_decrypt(d, key); 31 BF_ecb_encrypt(const unsigned char *in, unsigned char *out, const BF_KEY *key, int encrypt) argument
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | e_cast.c | 26 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 40 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 47 CAST_set_key(&data(ctx)->ks, keylen, key);
|
H A D | e_bf.c | 25 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 38 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 45 BF_set_key(&data(ctx)->ks, len, key);
|
H A D | e_seed.c | 25 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 36 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 39 SEED_set_key(key, &EVP_C_DATA(EVP_SEED_KEY,ctx)->ks);
|
H A D | e_chacha20_poly1305.c | 26 } key; member in struct:__anon3940 40 EVP_CHACHA_KEY *key = data(ctx); local 45 key->key.d[i/4] = CHACHA_U8TOU32(user_key+i); 50 key->counter[i/4] = CHACHA_U8TOU32(iv+i); 53 key->partial_len = 0; 61 EVP_CHACHA_KEY *key = data(ctx); local 64 if ((n = key->partial_len)) { 66 *out++ = *inp++ ^ key->buf[n++]; 69 key 154 EVP_CHACHA_KEY key; member in struct:__anon3942 [all...] |
H A D | e_aes_cbc_hmac_sha256.c | 50 AES_KEY *key); 52 AES_KEY *key); 57 const AES_KEY *key, unsigned char *ivec, int enc); 60 const AES_KEY *key, unsigned char iv[16], 69 EVP_AES_HMAC_SHA256 *key = data(ctx); local 75 &key->ks); 79 &key->ks); 81 SHA256_Init(&key->head); /* handy when benchmarking */ 82 key->tail = key 155 tls1_1_multi_block_encrypt(EVP_AES_HMAC_SHA256 *key, unsigned char *out, const unsigned char *inp, size_t inp_len, int n4x) argument 426 EVP_AES_HMAC_SHA256 *key = data(ctx); local 751 EVP_AES_HMAC_SHA256 *key = data(ctx); local [all...] |
H A D | e_aes_cbc_hmac_sha1.c | 50 AES_KEY *key); 52 AES_KEY *key); 57 const AES_KEY *key, unsigned char *ivec, int enc); 60 const AES_KEY *key, unsigned char iv[16], 64 const AES_KEY *key, unsigned char iv[16], 73 EVP_AES_HMAC_SHA1 *key = data(ctx); local 79 &key->ks); 83 &key->ks); 85 SHA1_Init(&key->head); /* handy when benchmarking */ 86 key 160 tls1_1_multi_block_encrypt(EVP_AES_HMAC_SHA1 *key, unsigned char *out, const unsigned char *inp, size_t inp_len, int n4x) argument 411 EVP_AES_HMAC_SHA1 *key = data(ctx); local 774 EVP_AES_HMAC_SHA1 *key = data(ctx); local [all...] |
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | aria.h | 44 ARIA_KEY *key); 46 ARIA_KEY *key); 49 const ARIA_KEY *key);
|
/freebsd-current/lib/libc/iconv/ |
H A D | citrus_lookup.h | 53 _citrus_lookup_alias(const char *path, const char *key, char *buf, size_t n, argument 58 ret = _citrus_lookup_simple(path, key, buf, n, ignore_case); 60 ret = key;
|
/freebsd-current/tools/tools/termcap/ |
H A D | termcap.pl | 117 foreach my $key (sort(keys(%keys))) { 118 next if (!defined $tc{$tca}{$key} && !defined $tc{$tcb}{$key}); 120 defined $tc{$tca}{$key} ? "+" : "", 121 defined $tc{$tcb}{$key} ? "+" : "", 122 $key, 138 foreach my $key (sort(keys(%keys))) { 139 next if (!defined $tc{$tca}{$key}); 140 printf("%s\n", $key); 145 foreach my $key (key [all...] |
/freebsd-current/sys/crypto/openssl/ |
H A D | ossl_aarch64.h | 24 size_t length, const void *key, unsigned char *iv, int encrypt) 27 aes_v8_cbc_encrypt(in, out, length, key, iv, encrypt); 29 vpaes_cbc_encrypt(in, out, length, key, iv, encrypt); 23 AES_CBC_ENCRYPT(const unsigned char *in, unsigned char *out, size_t length, const void *key, unsigned char *iv, int encrypt) argument
|
/freebsd-current/crypto/openssl/test/testutil/ |
H A D | stanza.c | 45 if (s->key == NULL) { 46 if (!TEST_ptr(s->key = BIO_new(BIO_s_mem()))) 48 } else if (!TEST_int_gt(BIO_reset(s->key), 0)) { 55 if (!TEST_int_gt(BIO_puts(s->key, tmpbuf), 0)) 60 TEST_error("Can't find key end"); 89 char *p, *equals, *key; local 108 /* Parse into key=value */ 114 if (!TEST_ptr(key = strip_spaces(s->buff))) { 121 if (strcmp(key, "Title") == 0) { 129 if (strcmp(key, "PrivateKe [all...] |
/freebsd-current/crypto/openssh/ |
H A D | xmss_hash.c | 38 int core_hash_SHA2(unsigned char *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned char *in, unsigned long long inlen, unsigned int n){ argument 48 buf[i+n] = key[i]; 71 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) argument 73 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen); 79 int h_msg(unsigned char *out, const unsigned char *in, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned int n) argument 85 return core_hash_SHA2(out, 2, key, keylen, in, inlen, n); 95 unsigned char key[n]; local 102 prf(key, byte_addr, pub_seed, n); 113 return core_hash_SHA2(out, 1, key, n, buf, 2*n, n); 119 unsigned char key[ local [all...] |
H A D | auth2-hostbased.c | 63 struct sshkey *key = NULL; local 86 logit_f("unsupported public key algorithm: %s", 90 if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) { 94 if (key == NULL) { 95 error_f("cannot decode key: %s", pkalg); 98 if (key->type != pktype) { 99 error_f("type mismatch for decoded key " 100 "(received %d, expected %d)", key->type, pktype); 108 if ((r = sshkey_check_cert_sigtype(key, 111 (key 169 hostbased_key_allowed(struct ssh *ssh, struct passwd *pw, const char *cuser, char *chost, struct sshkey *key) argument [all...] |
/freebsd-current/contrib/bmake/ |
H A D | hash.c | 87 Hash_String(const char *key, const char **out_keyEnd) argument 93 for (p = key; *p != '\0'; p++) 102 Hash_Substring(Substring key) argument 108 for (p = key.start; p != key.end; p++) 114 HashTable_Find(HashTable *t, Substring key, unsigned int h) argument 118 size_t keyLen = Substring_Length(key); 121 DEBUG4(HASH, "HashTable_Find: %p h=%08x key=%.*s\n", 122 t, h, (int)keyLen, key.start); 128 strncmp(he->key, ke 182 HashTable_FindEntry(HashTable *t, const char *key) argument 191 HashTable_FindValue(HashTable *t, const char *key) argument 202 HashTable_FindValueBySubstringHash(HashTable *t, Substring key, unsigned int h) argument 250 HashTable_CreateEntry(HashTable *t, const char *key, bool *out_isNew) argument 280 HashTable_Set(HashTable *t, const char *key, void *value) argument [all...] |
/freebsd-current/contrib/nvi/common/ |
H A D | mark.c | 28 * Marks are maintained in a key sorted singly linked list. We can't 29 * use arrays because we have no idea how big an index key could be. 106 mark_get(SCR *sp, ARG_CHAR_T key, MARK *mp, mtype_t mtype) argument 110 if (key == ABSMARK2) 111 key = ABSMARK1; 113 lmp = mark_find(sp, key); 114 if (lmp == NULL || lmp->name != key) { 115 msgq(sp, mtype, "017|Mark %s: not set", KEY_NAME(sp, key)); 120 "018|Mark %s: the line was deleted", KEY_NAME(sp, key)); 132 KEY_NAME(sp, key)); 147 mark_set(SCR *sp, ARG_CHAR_T key, MARK *value, int userset) argument 185 mark_find(SCR *sp, ARG_CHAR_T key) argument [all...] |
/freebsd-current/sys/contrib/openzfs/cmd/zed/ |
H A D | zed_strings.c | 31 char *key; member in struct:zed_strings_node 51 s1 = ((const zed_strings_node_t *) x1)->key; 53 s2 = ((const zed_strings_node_t *) x2)->key; 94 if (np->key) { 95 if (np->key != np->val) 96 free(np->key); 97 np->key = NULL; 108 * If [key] is specified, it will be used to index the node; otherwise, 112 _zed_strings_node_create(const char *key, const char *val) argument 126 if (key) { 168 zed_strings_add(zed_strings_t *zsp, const char *key, const char *s) argument [all...] |
/freebsd-current/contrib/netbsd-tests/lib/libc/stdlib/ |
H A D | t_hsearch.c | 99 e.key = strdup(ch); /* ptr to provided key is kept! */ 100 ATF_REQUIRE(e.key != NULL); 106 ATF_REQUIRE_STREQ(ep->key, ch); 110 /* e.key should be constant from here on down. */ 111 e.key = ch; 120 ATF_REQUIRE_STREQ(ep->key, ch); 145 e.key = __UNCONST("a"); 151 ATF_REQUIRE_STREQ(ep->key, "a"); 160 ATF_REQUIRE_STREQ(ep->key, " [all...] |
/freebsd-current/crypto/openssl/crypto/modes/ |
H A D | cts128.c | 29 const void *key, unsigned char ivec[16], 42 CRYPTO_cbc128_encrypt(in, out, len, key, ivec, block); 49 (*block) (ivec, ivec, key); 58 const void *key, 71 CRYPTO_cbc128_encrypt(in, out, len, key, ivec, block); 81 (*block) (ivec, ivec, key); 88 size_t len, const void *key, 105 (*cbc) (in, out, len, key, ivec, 1); 112 (*cbc) (in, out - 16, residue, key, ivec, 1); 118 (*cbc) (tmp.c, out - 16, 16, key, ive 27 CRYPTO_cts128_encrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument 56 CRYPTO_nistcts128_encrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument 87 CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument 123 CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument 158 CRYPTO_cts128_decrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument 200 CRYPTO_nistcts128_decrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument 248 CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument 288 CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument [all...] |
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/ |
H A D | mac_legacy_kmgmt.c | 140 const MAC_KEY *key = keydata; local 143 if (ossl_prov_is_running() && key != NULL) { 152 ok = key->priv_key != NULL; 184 static int mac_key_fromdata(MAC_KEY *key, const OSSL_PARAM params[]) argument 194 OPENSSL_secure_clear_free(key->priv_key, key->priv_key_len); 195 /* allocate at least one byte to distinguish empty key from no key set */ 196 key->priv_key = OPENSSL_secure_malloc(p->data_size > 0 ? p->data_size : 1); 197 if (key 233 MAC_KEY *key = keydata; local 244 key_to_params(MAC_KEY *key, OSSL_PARAM_BLD *tmpl, OSSL_PARAM params[]) argument 276 MAC_KEY *key = keydata; local 332 mac_get_params(void *key, OSSL_PARAM params[]) argument 359 MAC_KEY *key = keydata; local 486 MAC_KEY *key; local [all...] |
/freebsd-current/lib/libc/db/test/btree.tests/ |
H A D | main.c | 83 "a", 2, 1, append, "append key def", "append key with data def", 86 "delc", 0, 0, delcur, "delcur", "delete key the cursor references", 90 "g", 1, 1, get, "get key", "locate key", 92 "ia", 2, 1, iafter, "iafter key data", "insert data after key", 93 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key", 94 "ic", 2, 1, icursor, "icursor key dat 271 DBT key, data; local 301 DBT data, key; local 341 DBT key; local 376 DBT data, key; local 399 DBT data, key; local 441 DBT key, data; local 471 DBT key, data; local 502 DBT data, key; local 531 DBT data, key; local 559 DBT data, key; local 582 DBT data, key; local 607 DBT data, key; local 660 DBT data, key; local 683 DBT data, key; local [all...] |