/freebsd-13-stable/usr.bin/newkey/ |
H A D | Makefile | 5 PROG= newkey 6 SRCS= newkey.c generic.c update.c 10 MAN= newkey.8
|
/freebsd-13-stable/usr.bin/chkey/ |
H A D | Makefile | 5 .PATH: ${SRCTOP}/usr.bin/newkey 9 CFLAGS+= -I${SRCTOP}/usr.bin/newkey
|
/freebsd-13-stable/sys/dev/random/fenestrasX/ |
H A D | fx_rng.h | 60 fxrng_rng_setkey(struct fxrng_basic_rng *rng, const void *newkey, size_t len) argument 63 chacha_keysetup(&rng->rng_prf, newkey, len * 8);
|
H A D | fx_rng.c | 125 uint8_t newkey[FX_CHACHA20_KEYSIZE]; local 131 fxrng_rng_keystream_internal(&rng->rng_prf, newkey, sizeof(newkey)); 145 chacha_keysetup(&rng->rng_prf, newkey, sizeof(newkey) * 8); 146 explicit_bzero(newkey, sizeof(newkey)); 160 chacha_keysetup(&rng->rng_prf, newkey, sizeof(newkey) * 8); 161 explicit_bzero(newkey, sizeo [all...] |
H A D | fx_main.c | 168 uint8_t newkey[FX_CHACHA20_KEYSIZE]; local 217 fxrng_brng_produce_seed_data_internal(&fxrng_root, newkey, 218 sizeof(newkey), &rng->brng_generation); 221 fxrng_rng_setkey(&rng->brng_rng, newkey, sizeof(newkey)); 222 explicit_bzero(newkey, sizeof(newkey));
|
H A D | fx_brng.c | 257 uint8_t newkey[FX_CHACHA20_KEYSIZE]; local 287 fxrng_brng_produce_seed_data_internal(&fxrng_root, newkey, 288 sizeof(newkey), &rng->brng_generation); 293 fxrng_rng_setkey(&rng->brng_rng, newkey, sizeof(newkey)); 294 explicit_bzero(newkey, sizeof(newkey));
|
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | random_password.c | 58 OtpKey newkey; local 60 krb5_generate_random_block(&newkey, sizeof(newkey)); 61 otp_print_stddict (newkey, pw, len);
|
/freebsd-13-stable/sys/dev/random/ |
H A D | fortuna.c | 557 uint8_t newkey[static RANDOM_KEYSIZE], uint128_t *p_counter, 615 randomdev_keystream(p_key, p_counter, newkey, 617 randomdev_encrypt_init(p_key, newkey); 662 randomdev_keystream(p_key, p_counter, newkey, RANDOM_KEYSIZE); 663 randomdev_encrypt_init(p_key, newkey); 682 uint8_t newkey[static RANDOM_KEYSIZE]) 733 * for the blocks needed for the 'newkey'. 738 newkey, RANDOM_KEYSIZE); 739 randomdev_encrypt_init(&fortuna_state.fs_key, newkey); 747 random_fortuna_genbytes(buf, bytecount, newkey, 767 uint8_t newkey[RANDOM_KEYSIZE]; local [all...] |
/freebsd-13-stable/sys/contrib/openzfs/lib/libspl/include/sys/ |
H A D | mhd.h | 125 mhioc_resv_key_t newkey; member in struct:mhioc_register 135 mhioc_resv_key_t newkey; member in struct:mhioc_registerandignorekey
|
/freebsd-13-stable/libexec/rc/rc.d/ |
H A D | sendmail | 132 -config openssl.cnf -newkey rsa:2048 >/dev/null 2>&1 && 135 openssl req -batch -nodes -new -x509 -keyout newkey.pem \ 137 -newkey rsa:2048 >/dev/null 2>&1 && 140 openssl x509 -x509toreq -in newreq.pem -signkey newkey.pem \ 149 chmod 600 newkey.pem && 152 cp -p newkey.pem "$CERTDIR"/host.key &&
|
/freebsd-13-stable/contrib/opie/ |
H A D | opiekey.c | 140 struct opie_otpkey key, newkey; local 271 if (opiekeycrunch(algorithm, &newkey, newseed, newsecret)) { 277 opiehash(&newkey, algorithm); 324 strcat(response, opiebtoh(buf, &newkey)); 330 strcat(response, opiebtoe(buf, &newkey));
|
/freebsd-13-stable/contrib/opie/libopie/ |
H A D | generator.c | 176 struct opie_otpkey newkey; local 186 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 190 opiehash(&newkey, algorithm); 202 strcat(response, opiebtoh(buf, &newkey));
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | req.c | 112 {"newkey", OPT_NEWKEY, 's', "Specify as type:bits"}, 243 long newkey = -1; local 575 if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) { 576 newkey = DEFAULT_KEY_LENGTH; 580 genctx = set_keygen_ctx(keyalg, &pkey_type, &newkey, 586 if (newkey < MIN_KEY_LENGTH 590 MIN_KEY_LENGTH, newkey); 594 if (pkey_type == EVP_PKEY_RSA && newkey > OPENSSL_RSA_MAX_MODULUS_BITS) 598 OPENSSL_RSA_MAX_MODULUS_BITS, newkey); 601 if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BIT [all...] |
/freebsd-13-stable/sys/netinet/ |
H A D | tcp_fastopen.c | 516 uint8_t newkey[TCP_FASTOPEN_KEY_LEN]; local 518 arc4rand(newkey, TCP_FASTOPEN_KEY_LEN, 0); 519 tcp_fastopen_addkey_locked(newkey); 759 uint8_t newkey[TCP_FASTOPEN_KEY_LEN]; local 765 if (req->newlen != sizeof(newkey)) 767 error = SYSCTL_IN(req, newkey, sizeof(newkey)); 772 tcp_fastopen_addkey_locked(newkey);
|
/freebsd-13-stable/contrib/ldns/ |
H A D | keys.c | 73 ldns_key *newkey; local 75 newkey = LDNS_MALLOC(ldns_key); 76 if (!newkey) { 80 ldns_key_set_use(newkey, true); 81 ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY); 82 ldns_key_set_origttl(newkey, 0); 83 ldns_key_set_keytag(newkey, 0); 84 ldns_key_set_inception(newkey, 0); 85 ldns_key_set_expiration(newkey, 0); 86 ldns_key_set_pubkey_owner(newkey, NUL [all...] |
/freebsd-13-stable/usr.sbin/ndiscvt/ |
H A D | inf.c | 117 char newkey[256]; local 122 bzero(newkey, sizeof(newkey)); 123 strncpy(newkey, k + 1, strlen(k) - 2); 124 k = newkey;
|
/freebsd-13-stable/sys/dev/kbd/ |
H A D | kbd.c | 1003 key_change_ok(struct keyent_t *oldkey, struct keyent_t *newkey, struct thread *td) argument 1014 if (oldkey->map[i] != newkey->map[i]) 1016 if (oldkey->spcl != newkey->spcl) 1018 if (oldkey->flgs != newkey->flgs) 1026 * If either the oldkey or the newkey action is restricted 1029 if (!RESTRICTED_KEY(oldkey, i) && !RESTRICTED_KEY(newkey, i)) 1031 if ((oldkey->spcl & (0x80 >> i)) == (newkey->spcl & (0x80 >> i)) 1032 && oldkey->map[i] == newkey->map[i]) 1084 fkey_change_ok(fkeytab_t *oldkey, fkeyarg_t *newkey, struct thread *td) argument 1089 if (oldkey->len != newkey [all...] |
/freebsd-13-stable/sys/contrib/openzfs/lib/libzfs/ |
H A D | libzfs_crypto.c | 340 zfs_keyformat_t keyformat, boolean_t confirm_key, boolean_t newkey, 358 if ((ret = libzfs_getpassphrase(keyformat, B_FALSE, newkey, fsname, 374 ret = libzfs_getpassphrase(keyformat, B_TRUE, newkey, fsname, &buf2, 462 const char *fsname, zfs_keyformat_t keyformat, boolean_t newkey, 493 get_key_material(libzfs_handle_t *hdl, boolean_t do_verify, boolean_t newkey, argument 517 do_verify, newkey, &km, &kmlen); 537 fsname, keyformat, newkey, &km, &kmlen)) != 0) 659 zfs_handle_t *zhp, boolean_t newkey, zfs_keyformat_t keyformat, 670 ret = get_key_material(hdl, B_TRUE, newkey, keyformat, keylocation, 339 get_key_interactive(libzfs_handle_t *restrict hdl, const char *fsname, zfs_keyformat_t keyformat, boolean_t confirm_key, boolean_t newkey, uint8_t **restrict outbuf, size_t *restrict len_out) argument 461 get_key_material_file(libzfs_handle_t *hdl, const char *uri, const char *fsname, zfs_keyformat_t keyformat, boolean_t newkey, uint8_t **restrict buf, size_t *restrict len_out) argument 658 populate_create_encryption_params_nvlists(libzfs_handle_t *hdl, zfs_handle_t *zhp, boolean_t newkey, zfs_keyformat_t keyformat, char *keylocation, nvlist_t *props, uint8_t **wkeydata, uint_t *wkeylen) argument
|
/freebsd-13-stable/crypto/openssh/ |
H A D | packet.c | 2197 struct newkeys *newkey; local 2200 if ((newkey = ssh->state->newkeys[mode]) == NULL) 2202 enc = &newkey->enc; 2203 mac = &newkey->mac; 2204 comp = &newkey->comp; 2267 struct newkeys *newkey = NULL; local 2271 if ((newkey = calloc(1, sizeof(*newkey))) == NULL) { 2280 enc = &newkey->enc; 2281 mac = &newkey [all...] |
/freebsd-13-stable/usr.bin/ |
H A D | Makefile | 247 SUBDIR.${MK_OPENSSL}+= newkey
|
/freebsd-13-stable/sys/ofed/include/rdma/ |
H A D | ib_verbs.h | 3220 * @newkey - new key to be used. 3222 static inline void ib_update_fast_reg_key(struct ib_mr *mr, u8 newkey) argument 3224 mr->lkey = (mr->lkey & 0xffffff00) | newkey; 3225 mr->rkey = (mr->rkey & 0xffffff00) | newkey;
|
/freebsd-13-stable/targets/pseudo/userland/ |
H A D | Makefile.depend | 286 usr.bin/newkey \
|