/freebsd-10-stable/usr.sbin/ctld/ |
H A D | keys.c | 40 struct keys * 43 struct keys *keys; local 45 keys = calloc(sizeof(*keys), 1); 46 if (keys == NULL) 49 return (keys); 53 keys_delete(struct keys *keys) argument 56 free(keys 61 keys_load(struct keys *keys, const struct pdu *pdu) argument 105 keys_save(struct keys *keys, struct pdu *pdu) argument 145 keys_find(struct keys *keys, const char *name) argument 164 keys_add(struct keys *keys, const char *name, const char *value) argument 186 keys_add_int(struct keys *keys, const char *name, int value) argument [all...] |
/freebsd-10-stable/usr.sbin/iscsid/ |
H A D | keys.c | 42 struct keys * 45 struct keys *keys; local 47 keys = calloc(sizeof(*keys), 1); 48 if (keys == NULL) 51 return (keys); 55 keys_delete(struct keys *keys) argument 58 free(keys 63 keys_load(struct keys *keys, const struct pdu *pdu) argument 107 keys_save(struct keys *keys, struct pdu *pdu) argument 147 keys_find(struct keys *keys, const char *name) argument 166 keys_add(struct keys *keys, const char *name, const char *value) argument 188 keys_add_int(struct keys *keys, const char *name, int value) argument [all...] |
H A D | iscsid.h | 76 struct keys { struct 113 struct keys *keys_new(void); 114 void keys_delete(struct keys *key); 115 void keys_load(struct keys *keys, const struct pdu *pdu); 116 void keys_save(struct keys *keys, struct pdu *pdu); 117 const char *keys_find(struct keys *keys, const char *name); 118 void keys_add(struct keys *key [all...] |
/freebsd-10-stable/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 39 * Set the keys of `ent' to the string-to-key of `password' 47 Key *keys; local 53 password, &keys, &num_keys); 57 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); 58 ent->keys.val = keys; 59 ent->keys.len = num_keys; 76 * Set the keys of `ent' to (`n_key_data', `key_data') 88 Key *keys; local 147 Key *keys; local 206 Key *keys; local [all...] |
H A D | default_keys.c | 40 print_keys(krb5_context context, Key *keys, size_t nkeys) argument 46 printf("keys:\n"); 50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 53 (int)keys[i].key.keytype); 58 if (keys[i].salt) { 61 switch (keys[i].salt->type) { 69 printf("unknown salt: %d", keys[i].salt->type); 72 if (keys[i].salt->salt.length) 73 printf("%.*s", (int)keys[i].salt->salt.length, 74 (char *)keys[ 86 Key *keys; local [all...] |
H A D | keys.c | 39 * free all the memory used by (len, keys) 44 int len, Key *keys) 46 hdb_free_keys(context, len, keys); 50 * null-ify `len', `keys' 54 _kadm5_init_keys (Key *keys, int len) argument 59 keys[i].mkvno = NULL; 60 keys[i].salt = NULL; 61 keys[i].key.keyvalue.length = 0; 62 keys[i].key.keyvalue.data = NULL; 43 _kadm5_free_keys(krb5_context context, int len, Key *keys) argument
|
H A D | chpass_s.c | 47 Key *keys; local 68 num_keys = ent.entry.keys.len; 69 keys = ent.entry.keys.val; 71 ent.entry.keys.len = 0; 72 ent.entry.keys.val = NULL; 76 _kadm5_free_keys (context->context, num_keys, keys); 81 existsp = _kadm5_exists_keys (ent.entry.keys.val, 82 ent.entry.keys.len, 83 keys, num_key [all...] |
/freebsd-10-stable/crypto/heimdal/kadmin/ |
H A D | ext.c | 47 krb5_keytab_entry *keys = NULL; local 57 keys = malloc(sizeof(*keys) * princ.n_key_data); 58 if (keys == NULL) { 66 keys[i].principal = princ.principal; 67 keys[i].vno = kd->key_data_kvno; 68 keys[i].keyblock.keytype = kd->key_data_type[0]; 69 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; 70 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0]; 71 keys[ [all...] |
/freebsd-10-stable/usr.bin/ssh-copy-id/ |
H A D | ssh-copy-id.sh | 56 keys="$(ssh-add -L | grep -v 'The agent has no identities.')$nl$keys" 59 keys="" 75 keys="$(cat -- "${OPTARG}.pub")$nl$keys" 77 keys="$(cat -- "$OPTARG")$nl$keys" 107 if [ -z "$keys" ] || [ "$keys" = "$nl" ]; then 108 echo "no keys foun [all...] |
/freebsd-10-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_mem.c | 48 hx509_private_key *keys; member in struct:mem_data 80 for (i = 0; mem->keys && mem->keys[i]; i++) 81 hx509_private_key_free(&mem->keys[i]); 82 free(mem->keys); 158 hx509_private_key **keys) 163 for (i = 0; mem->keys && mem->keys[i]; i++) 165 *keys = calloc(i + 1, sizeof(**keys)); 155 mem_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument [all...] |
/freebsd-10-stable/contrib/wpa/hostapd/logwatch/ |
H A D | hostapd | 40 if (keys %hostapd) { 41 foreach my $iface (sort keys %hostapd) { 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) {
|
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 433 struct ikev2_keys *keys, int initiator, 442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 491 struct ikev2_keys *keys, int initiator, 502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 503 const u8 *SK_a = initiator ? keys->SK_ai : keys 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 670 ikev2_keys_set(struct ikev2_keys *keys) argument 677 ikev2_free_keys(struct ikev2_keys *keys) argument 691 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 78 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, argument 85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 106 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len,
|
H A D | eap_ikev2_common.h | 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 32 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys,
|
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | salt-des3.c | 48 DES_cblock keys[3]; local 73 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); 74 DES_set_odd_parity(keys + i); 75 if(DES_is_weak_key(keys + i)) 76 _krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); 77 DES_set_key_unchecked(keys + i, &s[i]); 86 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); 87 DES_set_odd_parity(keys [all...] |
/freebsd-10-stable/contrib/ntp/conf/ |
H A D | beauregard.conf | 20 keys /usr/local/etc/ntp.keys # path for keys file 21 trustedkey 3 4 5 6 14 15 # define trusted keys
|
H A D | malarky.conf | 7 # /usr/local/bin/ntpd -a -k /usr/local/bin/ntp.keys -m -t 3 21 keys /usr/local/etc/ntp.keys # path for key file 22 trustedkey 3 4 5 6 14 # define trusted keys
|
H A D | grundoon.conf | 27 keys /usr/local/etc/ntp.keys # path for keys file 28 trustedkey 3 4 5 14 # define trusted keys
|
H A D | pogo.conf | 34 keys /usr/local/etc/ntp.keys # path for keys file 35 trustedkey 3 4 5 14 # define trusted keys
|
/freebsd-10-stable/share/keys/pkg/trusted/ |
H A D | Makefile | 7 FILESDIR= ${SHAREDIR}/keys/pkg/trusted
|
/freebsd-10-stable/contrib/amd/scripts/ |
H A D | fix-amd-map.in | 46 foreach $m (keys %mappings) {
|
/freebsd-10-stable/contrib/ntp/sntp/tests/ |
H A D | keyFile.c | 72 struct key * keys = NULL; local 76 TEST_ASSERT_EQUAL(0, auth_init(path, &keys)); 77 TEST_ASSERT_NULL(keys); 86 struct key * keys = NULL; local 91 TEST_ASSERT_EQUAL(2, auth_init(path, &keys)); 92 TEST_ASSERT_NOT_NULL(keys); 110 struct key * keys = NULL; local 117 TEST_ASSERT_EQUAL(3, auth_init(path, &keys)); 118 TEST_ASSERT_NOT_NULL(keys); 145 struct key * keys local 171 struct key * keys = NULL; local [all...] |
/freebsd-10-stable/sys/gnu/dts/arm/ |
H A D | bcm47081-buffalo-wzr-900dhp.dts | 26 gpio-keys { 27 compatible = "gpio-keys";
|
/freebsd-10-stable/contrib/netbsd-tests/lib/libc/ |
H A D | t_cdb.c | 53 uint32_t keys[MAXKEYS]; variable 77 sorted_keys[i] = keys[i] = arc4random(); 99 buf[1] = keys[i]; 100 ATF_REQUIRE(cdbw_put(db, &keys[i], sizeof(keys[i]), 119 ATF_REQUIRE(cdbr_find(db, &keys[i], sizeof(keys[i]), 124 ATF_REQUIRE_EQ(buf[1], keys[i]);
|
/freebsd-10-stable/usr.sbin/mtree/ |
H A D | create.c | 141 if (sflag && keys & F_CKSUM) 176 if (keys & F_UNAME) { 188 if (keys & F_UID) 192 if (keys & F_GNAME) { 204 if (keys & F_GID) 207 if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode) 209 if (keys & F_NLINK && p->fts_statp->st_nlink != 1) 211 if (keys & F_SIZE && S_ISREG(p->fts_statp->st_mode)) 214 if (keys & F_TIME) 218 if (keys [all...] |