/freebsd-11-stable/stand/libsa/geli/ |
H A D | geli_metadata.c | 37 * Export a keybuf as metadata attached to a kernel module. This is separate 45 struct keybuf *keybuf; local 47 keybuf = malloc(GELI_KEYBUF_SIZE); 48 geli_export_key_buffer(keybuf); 49 file_addmetadata(kfp, MODINFOMD_KEYBUF, GELI_KEYBUF_SIZE, keybuf); 50 explicit_bzero(keybuf, GELI_KEYBUF_SIZE); 51 free(keybuf);
|
H A D | geliboot.h | 50 #define GELI_KEYBUF_SIZE (sizeof(struct keybuf) + \ 91 void geli_import_key_buffer(struct keybuf *keybuf); 92 void geli_export_key_buffer(struct keybuf *keybuf);
|
/freebsd-11-stable/sys/crypto/ |
H A D | intake.h | 54 struct keybuf { struct 61 extern struct keybuf* get_keybuf(void);
|
/freebsd-11-stable/stand/i386/common/ |
H A D | bootargs.h | 101 * single null byte to stop keybuf 106 struct keybuf *keybuf; member in struct:geli_boot_data::__anon4047::__anon4048 108 void *keybuf; member in struct:geli_boot_data::__anon4047::__anon4048 122 gbdata->keybuf = malloc(sizeof(struct keybuf) + 124 geli_export_key_buffer(gbdata->keybuf); 135 geli_import_key_buffer(gbdata->keybuf);
|
/freebsd-11-stable/usr.sbin/keyserv/ |
H A D | keyserv.h | 6 extern keystatus pk_setkey( uid_t, keybuf ); 11 extern keystatus pk_get_conv_key( uid_t, keybuf, cryptkeyres * );
|
H A D | setkey.c | 66 static int storesecretkey( uid_t, keybuf ); 96 keybuf skey; 226 keybuf xpublic; 411 keybuf key; 493 keybuf secret; 494 keybuf public; 515 memcpy(new->public, pub, sizeof (keybuf)); 516 memcpy(new->secret, sec, sizeof (keybuf)); 535 (memcmp(pub, (list)->public, sizeof (keybuf)) == 0 && \ 536 memcmp(sec, (list)->secret, sizeof (keybuf)) [all...] |
/freebsd-11-stable/contrib/sendmail/libsm/ |
H A D | niprop.c | 77 char keybuf[1024]; local 89 if (i >= sizeof keybuf) 91 (void) sm_strlcpyn(keybuf, sizeof keybuf, 2, keydir, "/"); 94 (void) sm_strlcat2(keybuf, keyprop, "=", sizeof keybuf); 96 (void) sm_strlcat(keybuf, keyval, sizeof keybuf); 100 sm_dprintf("ni_propval(%s, %s, %s, %s, %d) keybuf='%s'\n", 101 keydir, keyprop, keyval, valprop, sepchar, keybuf); [all...] |
/freebsd-11-stable/lib/libc/db/test/hash.tests/ |
H A D | driver2.c | 65 char keybuf[2049]; local 88 key.data = keybuf; 90 bzero(keybuf, sizeof(keybuf)); 97 sprintf(keybuf, "Key #%d", i);
|
/freebsd-11-stable/include/rpcsvc/ |
H A D | key_prot.x | 94 typedef opaque keybuf[HEXKEYBYTES]; /* store key in hex */ 151 keybuf st_priv_key; 152 keybuf st_pub_key; 178 KEY_SET(keybuf) = 1; 220 KEY_SET(keybuf) = 1; 281 KEY_GET_CONV(keybuf) = 10;
|
/freebsd-11-stable/stand/efi/libefi/ |
H A D | efi_console.c | 55 static unsigned keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable 448 if (keybuf[i] != 0) { 449 c = keybuf[i]; 450 keybuf[i] = 0; 464 if (keybuf[i] != 0) 471 * We are not reading input before keybuf is empty, so we are safe 472 * just to fill keybuf from the beginning. 480 keybuf[0] = 0x1b; /* esc */ 481 keybuf[ [all...] |
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | udb.c | 142 char keybuf[MAXUDBKEY]; local 178 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop"); 181 if (keylen >= sizeof(keybuf)) 220 key.data = keybuf; 224 keybuf, keylen); 247 keybuf, keylen); 264 memcmp(key.data, keybuf, keylen) == 0) 361 (void) sm_strlcpyn(keybuf, sizeof(keybuf), 606 char keybuf[MAXUDBKEY]; local 848 char keybuf[MAXNAME + 1]; local [all...] |
/freebsd-11-stable/usr.sbin/yp_mkdb/ |
H A D | yp_mkdb.c | 114 char *keybuf, *datbuf; local 272 keybuf = (char *)&buf; 282 if (*keybuf == '+' || *keybuf == '-' || 290 if (strlen(keybuf) > YPMAXRECORD) { 291 warnx("key too long: %s", keybuf); 295 if (!strlen(keybuf)) { 305 key.data = keybuf; 306 key.size = strlen(keybuf); 313 warnx("duplicate key '%s' - skipping", keybuf); [all...] |
/freebsd-11-stable/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.c | 222 uint8_t keybuf[PTW_KSBYTES]; local 226 memcpy(&keybuf[IVBYTES], key, keylen); 227 memcpy(keybuf, state->sessions[i].iv, IVBYTES); 228 rc4init(keybuf, keylen+IVBYTES, &rc4state); 363 int PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) { argument 405 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, simple)) { 417 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, onestrong)) { 423 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, twostrong)) {
|
/freebsd-11-stable/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 64 u_char keybuf[AES_128_KEY_SIZE]; local 68 memcpy(keybuf, keyptr, key->len); 69 memset((keybuf + key->len), 0, 71 keyptr = keybuf;
|
/freebsd-11-stable/contrib/ntp/sntp/ |
H A D | crypto.c | 47 u_char keybuf[AES_128_KEY_SIZE]; local 51 memcpy(keybuf, key_data, key_size); 52 memset((keybuf + key_size), 0, 54 key_data = keybuf;
|
/freebsd-11-stable/secure/lib/libcrypt/ |
H A D | crypt-des.c | 595 u_int32_t count, salt, l, r0, r1, keybuf[2]; local 606 q = (u_char *)keybuf; 607 while (q - (u_char *)keybuf - 8) { 612 if (des_setkey((char *)keybuf)) 631 if (des_cipher((char *)keybuf, (char *)keybuf, 0L, 1)) 636 q = (u_char *)keybuf; 637 while (q - (u_char *)keybuf - 8 && *key) 640 if (des_setkey((char *)keybuf))
|
/freebsd-11-stable/sbin/restore/ |
H A D | restore.c | 494 static char keybuf[32]; local 496 (void) strcpy(keybuf, "|NIL"); 497 keybuf[0] = '\0'; 499 (void) strcat(keybuf, "|ONTAPE"); 501 (void) strcat(keybuf, "|INOFND"); 503 (void) strcat(keybuf, "|NAMEFND"); 505 (void) strcat(keybuf, "|MODECHG"); 506 return (&keybuf[1]);
|
/freebsd-11-stable/usr.sbin/ypldap/ |
H A D | yp.c | 658 static char keybuf[YPMAXRECORD+1]; local 661 memset(keybuf, 0, sizeof(keybuf)); 664 (void)strlcpy(keybuf, key, sizeof(keybuf)); 665 res->key.keydat_len = strlen(keybuf); 666 res->key.keydat_val = keybuf; 676 log_debug("sending out %s => %s", keybuf, buf);
|
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 701 unsigned char keybuf[20]; local 716 if (!derive_pvk_key(keybuf, p, saltlen, 729 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL)) 738 memset(keybuf + 5, 0, 11); 739 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL)) 741 OPENSSL_cleanse(keybuf, 20); 752 OPENSSL_cleanse(keybuf, 20); 846 unsigned char keybuf[20]; local 856 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, 860 memset(keybuf [all...] |
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_pmeth.c | 514 unsigned char *keybuf = string_to_hex(value, &keylen); local 515 if (!keybuf || keylen != 32) { 518 OPENSSL_free(keybuf); 521 ret = pkey_gost_mac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, 32, keybuf); 522 OPENSSL_free(keybuf);
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | hash.c | 423 void *keybuf; 430 keybuf = apr_palloc(pool, keylen + 1); 432 keybuf, keylen, 434 ((char *) keybuf)[keylen] = '\0'; 471 apr_hash_set(hash, keybuf, keylen, value); 420 void *keybuf; local
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 635 u8 *keybuf, *pos; local 650 keybuf = os_malloc(keybuf_len); 651 if (keybuf == NULL) 655 data, data_len, keybuf, keybuf_len)) { 656 os_free(keybuf); 660 pos = keybuf; 717 os_free(keybuf);
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | load.c | 216 char *keybuf; 220 SVN_ERR(read_key_or_val(&keybuf, actual_length, 247 keybuf, 253 keybuf, 262 char *keybuf; 266 SVN_ERR(read_key_or_val(&keybuf, actual_length, 275 SVN_ERR(parse_fns->delete_node_property(record_baton, keybuf)); 215 char *keybuf; local 261 char *keybuf; local
|
/freebsd-11-stable/sys/geom/eli/ |
H A D | g_eli.c | 127 struct keybuf *keybuf; local 130 if ((keybuf = get_keybuf()) != NULL) { 132 for (i = 0; i < keybuf->kb_nents; i++) { 133 if (keybuf->kb_ents[i].ke_type == KEYBUF_TYPE_GELI) { 134 explicit_bzero(keybuf->kb_ents[i].ke_data, 135 sizeof(keybuf->kb_ents[i].ke_data)); 136 keybuf->kb_ents[i].ke_type = KEYBUF_TYPE_NONE; 1058 struct keybuf *keybuf; local [all...] |
/freebsd-11-stable/lib/libc/gen/ |
H A D | getpwent.c | 789 char keybuf[MAXLOGNAME + 1]; local 807 keybuf[0] = _PW_KEYBYNAME; 811 keybuf[0] = _PW_KEYBYUID; 814 keybuf[0] = _PW_KEYBYNUM; 841 key.data = keybuf; 848 namesize = strlcpy(&keybuf[1], name, sizeof(keybuf)-1); 849 if (namesize >= sizeof(keybuf)-1) { 858 memcpy(&keybuf[1], &uid, sizeof(uid)); 862 memcpy(&keybuf[ 1725 char keybuf[MAXLOGNAME + 1]; local [all...] |