/freebsd-10.1-release/usr.bin/newkey/ |
H A D | Makefile | 5 PROG= newkey 6 SRCS= newkey.c generic.c update.c 10 MAN= newkey.8
|
/freebsd-10.1-release/usr.bin/chkey/ |
H A D | Makefile | 5 .PATH: ${.CURDIR}/../newkey 9 CFLAGS+= -I${.CURDIR}/../newkey
|
/freebsd-10.1-release/sys/kgssapi/krb5/ |
H A D | kcrypto_arcfour.c | 104 uint8_t *newkey) 115 arcfour_hmac(ks->ks_key, L40, 14, newkey); 116 memset(newkey + 7, 0xab, 9); 118 arcfour_hmac(ks->ks_key, t, 4, newkey); 135 uint8_t newkey[16]; local 137 arcfour_derive_key(ks, 0, newkey); 144 arcfour_hmac(newkey, ivec, ivlen, kk); 147 rc4_init(&rs, newkey, 16); 103 arcfour_derive_key(const struct krb5_key_state *ks, uint32_t usage, uint8_t *newkey) argument
|
/freebsd-10.1-release/crypto/heimdal/kadmin/ |
H A D | random_password.c | 58 OtpKey newkey; local 60 krb5_generate_random_block(&newkey, sizeof(newkey)); 61 otp_print_stddict (newkey, pw, len);
|
/freebsd-10.1-release/etc/rc.d/ |
H A D | sendmail | 131 -config openssl.cnf -newkey rsa:2048 >/dev/null 2>&1 && 134 openssl req -batch -nodes -new -x509 -keyout newkey.pem \ 136 -newkey rsa:2048 >/dev/null 2>&1 && 139 openssl x509 -x509toreq -in newreq.pem -signkey newkey.pem \ 148 chmod 600 newkey.pem && 151 cp -p newkey.pem "$CERTDIR"/host.key &&
|
/freebsd-10.1-release/crypto/openssl/util/ |
H A D | mkcerts.sh | 21 -new -md5 -newkey $CAbits \ 57 -new -md5 -newkey $CAbits \ 94 -new -md5 -newkey 512 \ 131 -new -md5 -newkey 1024 \ 168 -new -md5 -newkey 512 \
|
/freebsd-10.1-release/contrib/opie/ |
H A D | opiekey.c | 139 struct opie_otpkey key, newkey; local 270 if (opiekeycrunch(algorithm, &newkey, newseed, newsecret)) { 276 opiehash(&newkey, algorithm); 323 strcat(response, opiebtoh(buf, &newkey)); 329 strcat(response, opiebtoe(buf, &newkey));
|
/freebsd-10.1-release/contrib/opie/libopie/ |
H A D | generator.c | 175 struct opie_otpkey newkey; local 185 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 189 opiehash(&newkey, algorithm); 201 strcat(response, opiebtoh(buf, &newkey));
|
/freebsd-10.1-release/crypto/openssl/apps/ |
H A D | CA.sh | 86 $REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS 88 echo "Certificate is in newcert.pem, private key is in newkey.pem" 92 $REQ -new -keyout newkey.pem -out newreq.pem $DAYS 94 echo "Request is in newreq.pem, private key is in newkey.pem"
|
H A D | req.c | 123 * -newkey - make a key and a request. 175 long newkey = -1; local 286 } else if (strcmp(*argv, "-newkey") == 0) { 409 " -newkey rsa:bits generate a new RSA key of 'bits' in size\n"); 411 " -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n"); 414 " -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n"); 625 if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) { 626 newkey = DEFAULT_KEY_LENGTH; 630 genctx = set_keygen_ctx(bio_err, keyalg, &pkey_type, &newkey, 636 if (newkey < MIN_KEY_LENGT [all...] |
/freebsd-10.1-release/contrib/ldns/ |
H A D | keys.c | 62 ldns_key *newkey; local 64 newkey = LDNS_MALLOC(ldns_key); 65 if (!newkey) { 69 ldns_key_set_use(newkey, true); 70 ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY); 71 ldns_key_set_origttl(newkey, 0); 72 ldns_key_set_keytag(newkey, 0); 73 ldns_key_set_inception(newkey, 0); 74 ldns_key_set_expiration(newkey, 0); 75 ldns_key_set_pubkey_owner(newkey, NUL [all...] |
/freebsd-10.1-release/crypto/openssh/ |
H A D | monitor_wrap.c | 471 Newkeys *newkey = NULL; local 483 newkey = xcalloc(1, sizeof(*newkey)); 484 enc = &newkey->enc; 485 mac = &newkey->mac; 486 comp = &newkey->comp; 522 return (newkey); 533 Newkeys *newkey = (Newkeys *)packet_get_newkeys(mode); local 535 debug3("%s: converting %p", __func__, newkey); 537 if (newkey [all...] |
/freebsd-10.1-release/usr.sbin/ndiscvt/ |
H A D | inf.c | 113 char newkey[256]; local 118 bzero(newkey, sizeof(newkey)); 119 strncpy(newkey, k + 1, strlen(k) - 2); 120 k = newkey;
|
/freebsd-10.1-release/sys/dev/kbd/ |
H A D | kbd.c | 1026 key_change_ok(struct keyent_t *oldkey, struct keyent_t *newkey, struct thread *td) argument 1037 if (oldkey->map[i] != newkey->map[i]) 1039 if (oldkey->spcl != newkey->spcl) 1041 if (oldkey->flgs != newkey->flgs) 1049 * If either the oldkey or the newkey action is restricted 1052 if (!RESTRICTED_KEY(oldkey, i) && !RESTRICTED_KEY(newkey, i)) 1054 if ((oldkey->spcl & (0x80 >> i)) == (newkey->spcl & (0x80 >> i)) 1055 && oldkey->map[i] == newkey->map[i]) 1107 fkey_change_ok(fkeytab_t *oldkey, fkeyarg_t *newkey, struct thread *td) argument 1112 if (oldkey->len != newkey [all...] |
/freebsd-10.1-release/contrib/libreadline/ |
H A D | readline.c | 701 int r, newkey; local 824 newkey = _rl_subseq_getchar (key); 825 if (newkey < 0) 831 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function);
|
/freebsd-10.1-release/usr.bin/ |
H A D | Makefile | 314 SUBDIR+= newkey
|
/freebsd-10.1-release/crypto/openssl/engines/ccgost/ |
H A D | gost89.c | 564 unsigned char newkey[32], newiv[8]; local 567 gost_dec(ctx, CryptoProKeyMeshingKey, newkey, 4); 569 gost_key(ctx, newkey);
|
/freebsd-10.1-release/sys/ofed/include/rdma/ |
H A D | ib_verbs.h | 2225 * @newkey - new key to be used. 2227 static inline void ib_update_fast_reg_key(struct ib_mr *mr, u8 newkey) argument 2229 mr->lkey = (mr->lkey & 0xffffff00) | newkey; 2230 mr->rkey = (mr->rkey & 0xffffff00) | newkey;
|
/freebsd-10.1-release/contrib/gcc/ |
H A D | sys-protos.h | 768 extern int newkey(char *, int, int);
|
/freebsd-10.1-release/contrib/texinfo/info/ |
H A D | session.c | 4688 unsigned char newkey; 4690 newkey = info_get_another_input_char (); 4691 info_dispatch_on_key (newkey, (Keymap)map[key].function); 4675 unsigned char newkey; local
|