/freebsd-11-stable/usr.bin/newkey/ |
H A D | Makefile | 5 PROG= newkey 6 SRCS= newkey.c generic.c update.c 10 MAN= newkey.8
|
/freebsd-11-stable/usr.bin/chkey/ |
H A D | Makefile | 5 .PATH: ${SRCTOP}/usr.bin/newkey 9 CFLAGS+= -I${SRCTOP}/usr.bin/newkey
|
/freebsd-11-stable/sys/kgssapi/krb5/ |
H A D | kcrypto_arcfour.c | 107 uint8_t *newkey) 118 arcfour_hmac(ks->ks_key, L40, 14, newkey); 119 memset(newkey + 7, 0xab, 9); 121 arcfour_hmac(ks->ks_key, t, 4, newkey); 138 uint8_t newkey[16]; local 140 arcfour_derive_key(ks, 0, newkey); 147 arcfour_hmac(newkey, ivec, ivlen, kk); 150 rc4_init(&rs, newkey, 16); 106 arcfour_derive_key(const struct krb5_key_state *ks, uint32_t usage, uint8_t *newkey) argument
|
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | random_password.c | 58 OtpKey newkey; local 60 krb5_generate_random_block(&newkey, sizeof(newkey)); 61 otp_print_stddict (newkey, pw, len);
|
/freebsd-11-stable/sys/netinet/ |
H A D | tcp_fastopen.c | 259 uint8_t newkey[TCP_FASTOPEN_KEY_LEN]; local 261 arc4rand(newkey, TCP_FASTOPEN_KEY_LEN, 0); 262 tcp_fastopen_addkey_locked(newkey); 427 uint8_t newkey[TCP_FASTOPEN_KEY_LEN]; local 433 if (req->newlen != sizeof(newkey)) 435 error = SYSCTL_IN(req, newkey, sizeof(newkey)); 440 tcp_fastopen_addkey_locked(newkey);
|
/freebsd-11-stable/etc/rc.d/ |
H A D | sendmail | 132 -config openssl.cnf -newkey rsa:2048 >/dev/null 2>&1 && 135 openssl req -batch -nodes -new -x509 -keyout newkey.pem \ 137 -newkey rsa:2048 >/dev/null 2>&1 && 140 openssl x509 -x509toreq -in newreq.pem -signkey newkey.pem \ 149 chmod 600 newkey.pem && 152 cp -p newkey.pem "$CERTDIR"/host.key &&
|
/freebsd-11-stable/crypto/openssl/util/ |
H A D | mkcerts.sh | 21 -new -md5 -newkey $CAbits \ 57 -new -md5 -newkey $CAbits \ 94 -new -md5 -newkey 512 \ 131 -new -md5 -newkey 1024 \ 168 -new -md5 -newkey 512 \
|
/freebsd-11-stable/contrib/opie/ |
H A D | opiekey.c | 140 struct opie_otpkey key, newkey; local 271 if (opiekeycrunch(algorithm, &newkey, newseed, newsecret)) { 277 opiehash(&newkey, algorithm); 324 strcat(response, opiebtoh(buf, &newkey)); 330 strcat(response, opiebtoe(buf, &newkey));
|
/freebsd-11-stable/contrib/opie/libopie/ |
H A D | generator.c | 176 struct opie_otpkey newkey; local 186 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 190 opiehash(&newkey, algorithm); 202 strcat(response, opiebtoh(buf, &newkey));
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | CA.sh | 86 $REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS 88 echo "Certificate is in newcert.pem, private key is in newkey.pem" 92 $REQ -new -keyout newkey.pem -out newreq.pem $DAYS 94 echo "Request is in newreq.pem, private key is in newkey.pem"
|
H A D | req.c | 123 * -newkey - make a key and a request. 175 long newkey = -1; local 284 } else if (strcmp(*argv, "-newkey") == 0) { 407 " -newkey rsa:bits generate a new RSA key of 'bits' in size\n"); 409 " -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n"); 412 " -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n"); 624 if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) { 625 newkey = DEFAULT_KEY_LENGTH; 629 genctx = set_keygen_ctx(bio_err, keyalg, &pkey_type, &newkey, 635 if (newkey < MIN_KEY_LENGT [all...] |
/freebsd-11-stable/contrib/ldns/ |
H A D | keys.c | 62 ldns_key *newkey; local 64 newkey = LDNS_MALLOC(ldns_key); 65 if (!newkey) { 69 ldns_key_set_use(newkey, true); 70 ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY); 71 ldns_key_set_origttl(newkey, 0); 72 ldns_key_set_keytag(newkey, 0); 73 ldns_key_set_inception(newkey, 0); 74 ldns_key_set_expiration(newkey, 0); 75 ldns_key_set_pubkey_owner(newkey, NUL [all...] |
/freebsd-11-stable/usr.sbin/ndiscvt/ |
H A D | inf.c | 115 char newkey[256]; local 120 bzero(newkey, sizeof(newkey)); 121 strncpy(newkey, k + 1, strlen(k) - 2); 122 k = newkey;
|
/freebsd-11-stable/sys/dev/kbd/ |
H A D | kbd.c | 1030 key_change_ok(struct keyent_t *oldkey, struct keyent_t *newkey, struct thread *td) argument 1041 if (oldkey->map[i] != newkey->map[i]) 1043 if (oldkey->spcl != newkey->spcl) 1045 if (oldkey->flgs != newkey->flgs) 1053 * If either the oldkey or the newkey action is restricted 1056 if (!RESTRICTED_KEY(oldkey, i) && !RESTRICTED_KEY(newkey, i)) 1058 if ((oldkey->spcl & (0x80 >> i)) == (newkey->spcl & (0x80 >> i)) 1059 && oldkey->map[i] == newkey->map[i]) 1111 fkey_change_ok(fkeytab_t *oldkey, fkeyarg_t *newkey, struct thread *td) argument 1116 if (oldkey->len != newkey [all...] |
/freebsd-11-stable/contrib/libreadline/ |
H A D | readline.c | 701 int r, newkey; local 824 newkey = _rl_subseq_getchar (key); 825 if (newkey < 0) 831 r = _rl_dispatch_subseq (newkey, _rl_dispatching_keymap, got_subseq || map[ANYOTHERKEY].function);
|
/freebsd-11-stable/crypto/openssh/ |
H A D | packet.c | 2520 struct newkeys *newkey; local 2523 if ((newkey = ssh->state->newkeys[mode]) == NULL) 2525 enc = &newkey->enc; 2526 mac = &newkey->mac; 2527 comp = &newkey->comp; 2624 struct newkeys *newkey = NULL; local 2628 if ((newkey = calloc(1, sizeof(*newkey))) == NULL) { 2637 enc = &newkey->enc; 2638 mac = &newkey [all...] |
/freebsd-11-stable/usr.bin/ |
H A D | Makefile | 260 SUBDIR.${MK_OPENSSL}+= newkey
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost89.c | 567 unsigned char newkey[32], newiv[8]; local 570 gost_dec(ctx, CryptoProKeyMeshingKey, newkey, 4); 572 gost_key(ctx, newkey);
|
/freebsd-11-stable/sys/ofed/include/rdma/ |
H A D | ib_verbs.h | 3228 * @newkey - new key to be used. 3230 static inline void ib_update_fast_reg_key(struct ib_mr *mr, u8 newkey) argument 3232 mr->lkey = (mr->lkey & 0xffffff00) | newkey; 3233 mr->rkey = (mr->rkey & 0xffffff00) | newkey;
|
/freebsd-11-stable/crypto/openssl/ |
H A D | Makefile.org | 430 $(RM) test/evptests.txt test/newkey.pem test/testkey.pem test/testreq.pem
|
H A D | Makefile | 432 $(RM) test/evptests.txt test/newkey.pem test/testkey.pem test/testreq.pem
|
/freebsd-11-stable/contrib/gcc/ |
H A D | sys-protos.h | 768 extern int newkey(char *, int, int);
|
/freebsd-11-stable/targets/pseudo/userland/ |
H A D | Makefile.depend | 306 usr.bin/newkey \
|