Searched refs:newkey (Results 1 - 23 of 23) sorted by relevance

/freebsd-11-stable/usr.bin/newkey/
H A DMakefile5 PROG= newkey
6 SRCS= newkey.c generic.c update.c
10 MAN= newkey.8
/freebsd-11-stable/usr.bin/chkey/
H A DMakefile5 .PATH: ${SRCTOP}/usr.bin/newkey
9 CFLAGS+= -I${SRCTOP}/usr.bin/newkey
/freebsd-11-stable/sys/kgssapi/krb5/
H A Dkcrypto_arcfour.c107 uint8_t *newkey)
118 arcfour_hmac(ks->ks_key, L40, 14, newkey);
119 memset(newkey + 7, 0xab, 9);
121 arcfour_hmac(ks->ks_key, t, 4, newkey);
138 uint8_t newkey[16]; local
140 arcfour_derive_key(ks, 0, newkey);
147 arcfour_hmac(newkey, ivec, ivlen, kk);
150 rc4_init(&rs, newkey, 16);
106 arcfour_derive_key(const struct krb5_key_state *ks, uint32_t usage, uint8_t *newkey) argument
/freebsd-11-stable/crypto/heimdal/kadmin/
H A Drandom_password.c58 OtpKey newkey; local
60 krb5_generate_random_block(&newkey, sizeof(newkey));
61 otp_print_stddict (newkey, pw, len);
/freebsd-11-stable/sys/netinet/
H A Dtcp_fastopen.c259 uint8_t newkey[TCP_FASTOPEN_KEY_LEN]; local
261 arc4rand(newkey, TCP_FASTOPEN_KEY_LEN, 0);
262 tcp_fastopen_addkey_locked(newkey);
427 uint8_t newkey[TCP_FASTOPEN_KEY_LEN]; local
433 if (req->newlen != sizeof(newkey))
435 error = SYSCTL_IN(req, newkey, sizeof(newkey));
440 tcp_fastopen_addkey_locked(newkey);
/freebsd-11-stable/etc/rc.d/
H A Dsendmail132 -config openssl.cnf -newkey rsa:2048 >/dev/null 2>&1 &&
135 openssl req -batch -nodes -new -x509 -keyout newkey.pem \
137 -newkey rsa:2048 >/dev/null 2>&1 &&
140 openssl x509 -x509toreq -in newreq.pem -signkey newkey.pem \
149 chmod 600 newkey.pem &&
152 cp -p newkey.pem "$CERTDIR"/host.key &&
/freebsd-11-stable/crypto/openssl/util/
H A Dmkcerts.sh21 -new -md5 -newkey $CAbits \
57 -new -md5 -newkey $CAbits \
94 -new -md5 -newkey 512 \
131 -new -md5 -newkey 1024 \
168 -new -md5 -newkey 512 \
/freebsd-11-stable/contrib/opie/
H A Dopiekey.c140 struct opie_otpkey key, newkey; local
271 if (opiekeycrunch(algorithm, &newkey, newseed, newsecret)) {
277 opiehash(&newkey, algorithm);
324 strcat(response, opiebtoh(buf, &newkey));
330 strcat(response, opiebtoe(buf, &newkey));
/freebsd-11-stable/contrib/opie/libopie/
H A Dgenerator.c176 struct opie_otpkey newkey; local
186 if (opiekeycrunch(algorithm, &newkey, newseed, secret))
190 opiehash(&newkey, algorithm);
202 strcat(response, opiebtoh(buf, &newkey));
/freebsd-11-stable/crypto/openssl/apps/
H A DCA.sh86 $REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS
88 echo "Certificate is in newcert.pem, private key is in newkey.pem"
92 $REQ -new -keyout newkey.pem -out newreq.pem $DAYS
94 echo "Request is in newreq.pem, private key is in newkey.pem"
H A Dreq.c123 * -newkey - make a key and a request.
175 long newkey = -1; local
284 } else if (strcmp(*argv, "-newkey") == 0) {
407 " -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
409 " -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n");
412 " -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n");
624 if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) {
625 newkey = DEFAULT_KEY_LENGTH;
629 genctx = set_keygen_ctx(bio_err, keyalg, &pkey_type, &newkey,
635 if (newkey < MIN_KEY_LENGT
[all...]
/freebsd-11-stable/contrib/ldns/
H A Dkeys.c62 ldns_key *newkey; local
64 newkey = LDNS_MALLOC(ldns_key);
65 if (!newkey) {
69 ldns_key_set_use(newkey, true);
70 ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY);
71 ldns_key_set_origttl(newkey, 0);
72 ldns_key_set_keytag(newkey, 0);
73 ldns_key_set_inception(newkey, 0);
74 ldns_key_set_expiration(newkey, 0);
75 ldns_key_set_pubkey_owner(newkey, NUL
[all...]
/freebsd-11-stable/usr.sbin/ndiscvt/
H A Dinf.c115 char newkey[256]; local
120 bzero(newkey, sizeof(newkey));
121 strncpy(newkey, k + 1, strlen(k) - 2);
122 k = newkey;
/freebsd-11-stable/sys/dev/kbd/
H A Dkbd.c1030 key_change_ok(struct keyent_t *oldkey, struct keyent_t *newkey, struct thread *td) argument
1041 if (oldkey->map[i] != newkey->map[i])
1043 if (oldkey->spcl != newkey->spcl)
1045 if (oldkey->flgs != newkey->flgs)
1053 * If either the oldkey or the newkey action is restricted
1056 if (!RESTRICTED_KEY(oldkey, i) && !RESTRICTED_KEY(newkey, i))
1058 if ((oldkey->spcl & (0x80 >> i)) == (newkey->spcl & (0x80 >> i))
1059 && oldkey->map[i] == newkey->map[i])
1111 fkey_change_ok(fkeytab_t *oldkey, fkeyarg_t *newkey, struct thread *td) argument
1116 if (oldkey->len != newkey
[all...]
/freebsd-11-stable/contrib/libreadline/
H A Dreadline.c701 int r, newkey; local
824 newkey = _rl_subseq_getchar (key);
825 if (newkey < 0)
831 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function);
/freebsd-11-stable/crypto/openssh/
H A Dpacket.c2520 struct newkeys *newkey; local
2523 if ((newkey = ssh->state->newkeys[mode]) == NULL)
2525 enc = &newkey->enc;
2526 mac = &newkey->mac;
2527 comp = &newkey->comp;
2624 struct newkeys *newkey = NULL; local
2628 if ((newkey = calloc(1, sizeof(*newkey))) == NULL) {
2637 enc = &newkey->enc;
2638 mac = &newkey
[all...]
/freebsd-11-stable/usr.bin/
H A DMakefile260 SUBDIR.${MK_OPENSSL}+= newkey
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost89.c567 unsigned char newkey[32], newiv[8]; local
570 gost_dec(ctx, CryptoProKeyMeshingKey, newkey, 4);
572 gost_key(ctx, newkey);
/freebsd-11-stable/sys/ofed/include/rdma/
H A Dib_verbs.h3228 * @newkey - new key to be used.
3230 static inline void ib_update_fast_reg_key(struct ib_mr *mr, u8 newkey) argument
3232 mr->lkey = (mr->lkey & 0xffffff00) | newkey;
3233 mr->rkey = (mr->rkey & 0xffffff00) | newkey;
/freebsd-11-stable/crypto/openssl/
H A DMakefile.org430 $(RM) test/evptests.txt test/newkey.pem test/testkey.pem test/testreq.pem
H A DMakefile432 $(RM) test/evptests.txt test/newkey.pem test/testkey.pem test/testreq.pem
/freebsd-11-stable/contrib/gcc/
H A Dsys-protos.h768 extern int newkey(char *, int, int);
/freebsd-11-stable/targets/pseudo/userland/
H A DMakefile.depend306 usr.bin/newkey \

Completed in 397 milliseconds