Searched refs:key (Results 151 - 175 of 2805) sorted by relevance

1234567891011>>

/freebsd-current/crypto/openssl/crypto/ec/
H A Dec_key.c134 /* copy the public key */
143 /* copy the private key */
245 * eckey An EC key object that contains domain params. The generated keypair
291 /* range of SM2 private key is [1, n-1) */
396 * Check the range of the EC public key.
402 * Returns 1 if the public key has a valid range, otherwise it returns 0.
404 static int ec_key_public_range_check(BN_CTX *ctx, const EC_KEY *key) argument
415 if (!EC_POINT_get_affine_coordinates(key->group, key->pub_key, x, y, ctx))
418 if (EC_GROUP_get_field_type(key
598 EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM *y) argument
656 ossl_ec_key_get_libctx(const EC_KEY *key) argument
661 ossl_ec_key_get0_propq(const EC_KEY *key) argument
666 ossl_ec_key_set0_libctx(EC_KEY *key, OSSL_LIB_CTX *libctx) argument
672 EC_KEY_get0_group(const EC_KEY *key) argument
677 EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group) argument
690 EC_KEY_get0_private_key(const EC_KEY *key) argument
695 EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *priv_key) argument
790 EC_KEY_get0_public_key(const EC_KEY *key) argument
795 EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub_key) argument
806 EC_KEY_get_enc_flags(const EC_KEY *key) argument
811 EC_KEY_set_enc_flags(EC_KEY *key, unsigned int flags) argument
816 EC_KEY_get_conv_form(const EC_KEY *key) argument
821 EC_KEY_set_conv_form(EC_KEY *key, point_conversion_form_t cform) argument
828 EC_KEY_set_asn1_flag(EC_KEY *key, int flag) argument
835 EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx) argument
843 EC_KEY_get_flags(const EC_KEY *key) argument
848 EC_KEY_set_flags(EC_KEY *key, int flags) argument
854 EC_KEY_clear_flags(EC_KEY *key, int flags) argument
860 EC_KEY_decoded_from_explicit_params(const EC_KEY *key) argument
867 EC_KEY_key2buf(const EC_KEY *key, point_conversion_form_t form, unsigned char **pbuf, BN_CTX *ctx) argument
875 EC_KEY_oct2key(EC_KEY *key, const unsigned char *buf, size_t len, BN_CTX *ctx) argument
[all...]
/freebsd-current/contrib/wpa/src/tls/
H A Dpkcs1.h15 int pkcs1_encrypt(int block_type, struct crypto_rsa_key *key,
18 int pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key,
21 int pkcs1_decrypt_public_key(struct crypto_rsa_key *key,
H A Drsa.h21 size_t crypto_rsa_get_modulus_len(struct crypto_rsa_key *key);
23 struct crypto_rsa_key *key, int use_private);
24 void crypto_rsa_free(struct crypto_rsa_key *key);
/freebsd-current/tests/sys/net/if_ovpn/
H A DMakefile21 client.key \
23 client2.key \
26 server.key \
/freebsd-current/crypto/openssl/crypto/bf/
H A Dbf_ecb.c32 const BF_KEY *key, int encrypt)
41 BF_encrypt(d, key);
43 BF_decrypt(d, key);
31 BF_ecb_encrypt(const unsigned char *in, unsigned char *out, const BF_KEY *key, int encrypt) argument
/freebsd-current/crypto/openssl/crypto/evp/
H A De_cast.c26 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
40 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
47 CAST_set_key(&data(ctx)->ks, keylen, key);
H A De_bf.c25 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
38 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
45 BF_set_key(&data(ctx)->ks, len, key);
H A De_seed.c25 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
36 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
39 SEED_set_key(key, &EVP_C_DATA(EVP_SEED_KEY,ctx)->ks);
H A De_chacha20_poly1305.c26 } key; member in struct:__anon3940
40 EVP_CHACHA_KEY *key = data(ctx); local
45 key->key.d[i/4] = CHACHA_U8TOU32(user_key+i);
50 key->counter[i/4] = CHACHA_U8TOU32(iv+i);
53 key->partial_len = 0;
61 EVP_CHACHA_KEY *key = data(ctx); local
64 if ((n = key->partial_len)) {
66 *out++ = *inp++ ^ key->buf[n++];
69 key
154 EVP_CHACHA_KEY key; member in struct:__anon3942
[all...]
H A De_aes_cbc_hmac_sha256.c50 AES_KEY *key);
52 AES_KEY *key);
57 const AES_KEY *key, unsigned char *ivec, int enc);
60 const AES_KEY *key, unsigned char iv[16],
69 EVP_AES_HMAC_SHA256 *key = data(ctx); local
75 &key->ks);
79 &key->ks);
81 SHA256_Init(&key->head); /* handy when benchmarking */
82 key->tail = key
155 tls1_1_multi_block_encrypt(EVP_AES_HMAC_SHA256 *key, unsigned char *out, const unsigned char *inp, size_t inp_len, int n4x) argument
426 EVP_AES_HMAC_SHA256 *key = data(ctx); local
751 EVP_AES_HMAC_SHA256 *key = data(ctx); local
[all...]
H A De_aes_cbc_hmac_sha1.c50 AES_KEY *key);
52 AES_KEY *key);
57 const AES_KEY *key, unsigned char *ivec, int enc);
60 const AES_KEY *key, unsigned char iv[16],
64 const AES_KEY *key, unsigned char iv[16],
73 EVP_AES_HMAC_SHA1 *key = data(ctx); local
79 &key->ks);
83 &key->ks);
85 SHA1_Init(&key->head); /* handy when benchmarking */
86 key
160 tls1_1_multi_block_encrypt(EVP_AES_HMAC_SHA1 *key, unsigned char *out, const unsigned char *inp, size_t inp_len, int n4x) argument
411 EVP_AES_HMAC_SHA1 *key = data(ctx); local
774 EVP_AES_HMAC_SHA1 *key = data(ctx); local
[all...]
/freebsd-current/crypto/openssl/include/crypto/
H A Daria.h44 ARIA_KEY *key);
46 ARIA_KEY *key);
49 const ARIA_KEY *key);
/freebsd-current/lib/libc/iconv/
H A Dcitrus_lookup.h53 _citrus_lookup_alias(const char *path, const char *key, char *buf, size_t n, argument
58 ret = _citrus_lookup_simple(path, key, buf, n, ignore_case);
60 ret = key;
/freebsd-current/tools/tools/termcap/
H A Dtermcap.pl117 foreach my $key (sort(keys(%keys))) {
118 next if (!defined $tc{$tca}{$key} && !defined $tc{$tcb}{$key});
120 defined $tc{$tca}{$key} ? "+" : "",
121 defined $tc{$tcb}{$key} ? "+" : "",
122 $key,
138 foreach my $key (sort(keys(%keys))) {
139 next if (!defined $tc{$tca}{$key});
140 printf("%s\n", $key);
145 foreach my $key (key
[all...]
/freebsd-current/sys/crypto/openssl/
H A Dossl_aarch64.h24 size_t length, const void *key, unsigned char *iv, int encrypt)
27 aes_v8_cbc_encrypt(in, out, length, key, iv, encrypt);
29 vpaes_cbc_encrypt(in, out, length, key, iv, encrypt);
23 AES_CBC_ENCRYPT(const unsigned char *in, unsigned char *out, size_t length, const void *key, unsigned char *iv, int encrypt) argument
/freebsd-current/crypto/openssl/test/testutil/
H A Dstanza.c45 if (s->key == NULL) {
46 if (!TEST_ptr(s->key = BIO_new(BIO_s_mem())))
48 } else if (!TEST_int_gt(BIO_reset(s->key), 0)) {
55 if (!TEST_int_gt(BIO_puts(s->key, tmpbuf), 0))
60 TEST_error("Can't find key end");
89 char *p, *equals, *key; local
108 /* Parse into key=value */
114 if (!TEST_ptr(key = strip_spaces(s->buff))) {
121 if (strcmp(key, "Title") == 0) {
129 if (strcmp(key, "PrivateKe
[all...]
/freebsd-current/crypto/openssh/
H A Dxmss_hash.c38 int core_hash_SHA2(unsigned char *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned char *in, unsigned long long inlen, unsigned int n){ argument
48 buf[i+n] = key[i];
71 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) argument
73 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen);
79 int h_msg(unsigned char *out, const unsigned char *in, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned int n) argument
85 return core_hash_SHA2(out, 2, key, keylen, in, inlen, n);
95 unsigned char key[n]; local
102 prf(key, byte_addr, pub_seed, n);
113 return core_hash_SHA2(out, 1, key, n, buf, 2*n, n);
119 unsigned char key[ local
[all...]
H A Dauth2-hostbased.c63 struct sshkey *key = NULL; local
86 logit_f("unsupported public key algorithm: %s",
90 if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) {
94 if (key == NULL) {
95 error_f("cannot decode key: %s", pkalg);
98 if (key->type != pktype) {
99 error_f("type mismatch for decoded key "
100 "(received %d, expected %d)", key->type, pktype);
108 if ((r = sshkey_check_cert_sigtype(key,
111 (key
169 hostbased_key_allowed(struct ssh *ssh, struct passwd *pw, const char *cuser, char *chost, struct sshkey *key) argument
[all...]
/freebsd-current/contrib/bmake/
H A Dhash.c87 Hash_String(const char *key, const char **out_keyEnd) argument
93 for (p = key; *p != '\0'; p++)
102 Hash_Substring(Substring key) argument
108 for (p = key.start; p != key.end; p++)
114 HashTable_Find(HashTable *t, Substring key, unsigned int h) argument
118 size_t keyLen = Substring_Length(key);
121 DEBUG4(HASH, "HashTable_Find: %p h=%08x key=%.*s\n",
122 t, h, (int)keyLen, key.start);
128 strncmp(he->key, ke
182 HashTable_FindEntry(HashTable *t, const char *key) argument
191 HashTable_FindValue(HashTable *t, const char *key) argument
202 HashTable_FindValueBySubstringHash(HashTable *t, Substring key, unsigned int h) argument
250 HashTable_CreateEntry(HashTable *t, const char *key, bool *out_isNew) argument
280 HashTable_Set(HashTable *t, const char *key, void *value) argument
[all...]
/freebsd-current/contrib/nvi/common/
H A Dmark.c28 * Marks are maintained in a key sorted singly linked list. We can't
29 * use arrays because we have no idea how big an index key could be.
106 mark_get(SCR *sp, ARG_CHAR_T key, MARK *mp, mtype_t mtype) argument
110 if (key == ABSMARK2)
111 key = ABSMARK1;
113 lmp = mark_find(sp, key);
114 if (lmp == NULL || lmp->name != key) {
115 msgq(sp, mtype, "017|Mark %s: not set", KEY_NAME(sp, key));
120 "018|Mark %s: the line was deleted", KEY_NAME(sp, key));
132 KEY_NAME(sp, key));
147 mark_set(SCR *sp, ARG_CHAR_T key, MARK *value, int userset) argument
185 mark_find(SCR *sp, ARG_CHAR_T key) argument
[all...]
/freebsd-current/sys/contrib/openzfs/cmd/zed/
H A Dzed_strings.c31 char *key; member in struct:zed_strings_node
51 s1 = ((const zed_strings_node_t *) x1)->key;
53 s2 = ((const zed_strings_node_t *) x2)->key;
94 if (np->key) {
95 if (np->key != np->val)
96 free(np->key);
97 np->key = NULL;
108 * If [key] is specified, it will be used to index the node; otherwise,
112 _zed_strings_node_create(const char *key, const char *val) argument
126 if (key) {
168 zed_strings_add(zed_strings_t *zsp, const char *key, const char *s) argument
[all...]
/freebsd-current/contrib/netbsd-tests/lib/libc/stdlib/
H A Dt_hsearch.c99 e.key = strdup(ch); /* ptr to provided key is kept! */
100 ATF_REQUIRE(e.key != NULL);
106 ATF_REQUIRE_STREQ(ep->key, ch);
110 /* e.key should be constant from here on down. */
111 e.key = ch;
120 ATF_REQUIRE_STREQ(ep->key, ch);
145 e.key = __UNCONST("a");
151 ATF_REQUIRE_STREQ(ep->key, "a");
160 ATF_REQUIRE_STREQ(ep->key, "
[all...]
/freebsd-current/crypto/openssl/crypto/modes/
H A Dcts128.c29 const void *key, unsigned char ivec[16],
42 CRYPTO_cbc128_encrypt(in, out, len, key, ivec, block);
49 (*block) (ivec, ivec, key);
58 const void *key,
71 CRYPTO_cbc128_encrypt(in, out, len, key, ivec, block);
81 (*block) (ivec, ivec, key);
88 size_t len, const void *key,
105 (*cbc) (in, out, len, key, ivec, 1);
112 (*cbc) (in, out - 16, residue, key, ivec, 1);
118 (*cbc) (tmp.c, out - 16, 16, key, ive
27 CRYPTO_cts128_encrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument
56 CRYPTO_nistcts128_encrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument
87 CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument
123 CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument
158 CRYPTO_cts128_decrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument
200 CRYPTO_nistcts128_decrypt_block(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument
248 CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument
288 CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], cbc128_f cbc) argument
[all...]
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/
H A Dmac_legacy_kmgmt.c140 const MAC_KEY *key = keydata; local
143 if (ossl_prov_is_running() && key != NULL) {
152 ok = key->priv_key != NULL;
184 static int mac_key_fromdata(MAC_KEY *key, const OSSL_PARAM params[]) argument
194 OPENSSL_secure_clear_free(key->priv_key, key->priv_key_len);
195 /* allocate at least one byte to distinguish empty key from no key set */
196 key->priv_key = OPENSSL_secure_malloc(p->data_size > 0 ? p->data_size : 1);
197 if (key
233 MAC_KEY *key = keydata; local
244 key_to_params(MAC_KEY *key, OSSL_PARAM_BLD *tmpl, OSSL_PARAM params[]) argument
276 MAC_KEY *key = keydata; local
332 mac_get_params(void *key, OSSL_PARAM params[]) argument
359 MAC_KEY *key = keydata; local
486 MAC_KEY *key; local
[all...]
/freebsd-current/lib/libc/db/test/btree.tests/
H A Dmain.c83 "a", 2, 1, append, "append key def", "append key with data def",
86 "delc", 0, 0, delcur, "delcur", "delete key the cursor references",
90 "g", 1, 1, get, "get key", "locate key",
92 "ia", 2, 1, iafter, "iafter key data", "insert data after key",
93 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key",
94 "ic", 2, 1, icursor, "icursor key dat
271 DBT key, data; local
301 DBT data, key; local
341 DBT key; local
376 DBT data, key; local
399 DBT data, key; local
441 DBT key, data; local
471 DBT key, data; local
502 DBT data, key; local
531 DBT data, key; local
559 DBT data, key; local
582 DBT data, key; local
607 DBT data, key; local
660 DBT data, key; local
683 DBT data, key; local
[all...]

Completed in 228 milliseconds

1234567891011>>