/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 39 * Set the keys of `ent' to the string-to-key of `password' 47 Key *keys; local 53 password, &keys, &num_keys); 57 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); 58 ent->keys.val = keys; 59 ent->keys.len = num_keys; 76 * Set the keys of `ent' to (`n_key_data', `key_data') 88 Key *keys; local 147 Key *keys; local 206 Key *keys; local [all...] |
H A D | default_keys.c | 40 print_keys(krb5_context context, Key *keys, size_t nkeys) argument 46 printf("keys:\n"); 50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 53 (int)keys[i].key.keytype); 58 if (keys[i].salt) { 61 switch (keys[i].salt->type) { 69 printf("unknown salt: %d", keys[i].salt->type); 72 if (keys[i].salt->salt.length) 73 printf("%.*s", (int)keys[i].salt->salt.length, 74 (char *)keys[ 86 Key *keys; local [all...] |
H A D | keys.c | 36 RCSID("$Id: keys.c 14297 2004-10-11 23:50:25Z lha $"); 39 * free all the memory used by (len, keys) 44 int len, Key *keys) 46 hdb_free_keys(context, len, keys); 50 * null-ify `len', `keys' 54 _kadm5_init_keys (Key *keys, int len) argument 59 keys[i].mkvno = NULL; 60 keys[i].salt = NULL; 61 keys[i].key.keyvalue.length = 0; 62 keys[ 43 _kadm5_free_keys(krb5_context context, int len, Key *keys) argument [all...] |
H A D | chpass_s.c | 47 Key *keys; local 60 num_keys = ent.entry.keys.len; 61 keys = ent.entry.keys.val; 63 ent.entry.keys.len = 0; 64 ent.entry.keys.val = NULL; 68 _kadm5_free_keys (context->context, num_keys, keys); 73 cmp = _kadm5_cmp_keys (ent.entry.keys.val, ent.entry.keys.len, 74 keys, num_key [all...] |
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | ext.c | 49 krb5_keytab_entry *keys = NULL; local 59 keys = malloc(sizeof(*keys) * princ.n_key_data); 60 if (keys == NULL) { 68 keys[i].principal = princ.principal; 69 keys[i].vno = kd->key_data_kvno; 70 keys[i].keyblock.keytype = kd->key_data_type[0]; 71 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; 72 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0]; 73 keys[ [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | ks_mem.c | 49 hx509_private_key *keys; member in struct:mem_data 81 for (i = 0; mem->keys && mem->keys[i]; i++) 82 _hx509_private_key_free(&mem->keys[i]); 83 free(mem->keys); 159 hx509_private_key **keys) 164 for (i = 0; mem->keys && mem->keys[i]; i++) 166 *keys = calloc(i + 1, sizeof(**keys)); 156 mem_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument [all...] |
/freebsd-9.3-release/contrib/wpa/hostapd/logwatch/ |
H A D | hostapd | 40 if (keys %hostapd) { 41 foreach my $iface (sort keys %hostapd) { 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) {
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_ikev2_common.c | 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 33 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 84 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, argument 91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 112 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len,
|
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 38 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys,
|
H A D | eap_fast_common.c | 105 struct tls_keys keys; local 123 if (tls_connection_get_keys(ssl_ctx, conn, &keys)) 126 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 130 os_memcpy(rnd, keys.server_random, keys.server_random_len); 131 os_memcpy(rnd + keys.server_random_len, keys.client_random, 132 keys.client_random_len); 135 "expansion", keys [all...] |
/freebsd-9.3-release/share/keys/pkg/trusted/ |
H A D | Makefile | 7 FILESDIR= /usr/share/keys/pkg/trusted
|
/freebsd-9.3-release/contrib/ntp/conf/ |
H A D | malarky.conf | 7 # /usr/local/bin/ntpd -a -k /usr/local/bin/ntp.keys -m -t 3 21 keys /usr/local/etc/ntp.keys # path for key file 22 trustedkey 3 4 5 6 14 # define trusted keys
|
H A D | beauregard.conf | 20 keys /usr/local/etc/ntp.keys # path for keys file 21 trustedkey 3 4 5 6 14 15 # define trusted keys
|
H A D | pogo.conf | 34 keys /usr/local/etc/ntp.keys # path for keys file 35 trustedkey 3 4 5 14 # define trusted keys
|
H A D | grundoon.conf | 27 keys /usr/local/etc/ntp.keys # path for keys file 28 trustedkey 3 4 5 14 # define trusted keys
|
/freebsd-9.3-release/contrib/amd/scripts/ |
H A D | fix-amd-map.in | 46 foreach $m (keys %mappings) {
|
/freebsd-9.3-release/contrib/ntp/sntp/tests/ |
H A D | keyFile.c | 72 struct key * keys = NULL; local 76 TEST_ASSERT_EQUAL(0, auth_init(path, &keys)); 77 TEST_ASSERT_NULL(keys); 86 struct key * keys = NULL; local 91 TEST_ASSERT_EQUAL(2, auth_init(path, &keys)); 92 TEST_ASSERT_NOT_NULL(keys); 110 struct key * keys = NULL; local 117 TEST_ASSERT_EQUAL(3, auth_init(path, &keys)); 118 TEST_ASSERT_NOT_NULL(keys); 145 struct key * keys local 171 struct key * keys = NULL; local [all...] |
/freebsd-9.3-release/contrib/libarchive/libarchive/ |
H A D | archive_write_set_format_mtree.c | 58 int keys; member in struct:mtree_writer::__anon1638 88 int keys; member in struct:mtree_writer 379 int keys, oldkeys, effkeys; local 408 keys = mtree->keys & (F_FLAGS | F_GID | F_GNAME | F_NLINK | F_MODE 410 oldkeys = mtree->set.keys; 411 effkeys = keys; 436 if ((keys & effkeys & F_TYPE) != 0) { 443 if ((keys & effkeys & F_UNAME) != 0) { 450 keys 502 int keys; local 651 int keys, ret; local [all...] |
/freebsd-9.3-release/usr.sbin/mtree/ |
H A D | create.c | 141 if (sflag && keys & F_CKSUM) 176 if (keys & F_UNAME) { 188 if (keys & F_UID) 192 if (keys & F_GNAME) { 204 if (keys & F_GID) 207 if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode) 209 if (keys & F_NLINK && p->fts_statp->st_nlink != 1) 211 if (keys & F_SIZE && S_ISREG(p->fts_statp->st_mode)) 214 if (keys & F_TIME) 218 if (keys [all...] |
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Bin/ |
H A D | guess.d | 50 keys[pos] = *(char *)key; 56 /self->inguess && keys[pos-1] == '\n'/ 60 guess = fac * (keys[pos] - '0'); 63 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess; 66 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess;
|
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Misc/ |
H A D | guess.d | 50 keys[pos] = *(char *)key; 56 /self->inguess && keys[pos-1] == '\n'/ 60 guess = fac * (keys[pos] - '0'); 63 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess; 66 guess = pos >= 0 ? guess + fac * (keys[pos] - '0') : guess;
|
/freebsd-9.3-release/contrib/mtree/ |
H A D | create.c | 171 if (sflag && keys & F_CKSUM) 196 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) { 197 if (keys & F_UNAME && 200 if (keys & F_UID || (keys & F_UNAME && name == NULL)) 203 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) { 204 if (keys & F_GNAME && 207 if (keys & F_GID || (keys & F_GNAME && name == NULL)) 210 if (keys [all...] |
/freebsd-9.3-release/contrib/gcc/ |
H A D | pointer-set.c | 189 its contents. Null keys are a reserved value. Deletion is not 199 void **keys; 213 result->keys = XCNEWVEC (void *, result->n_slots); 221 XDELETEVEC (pmap->keys); 237 if (pmap->keys[n] == p) 239 else if (pmap->keys[n] == 0) 268 if (pmap->keys[i]) 270 void *key = pmap->keys[i]; 276 XDELETEVEC (pmap->keys); 280 pmap->keys 198 void **keys; member in struct:pointer_map_t [all...] |
/freebsd-9.3-release/contrib/ofed/management/opensm/opensm/ |
H A D | osm_db_pack.c | 93 cl_list_t keys; local 96 cl_list_construct(&keys); 97 cl_list_init(&keys, 10); 99 if (osm_db_keys(p_g2l, &keys)) 102 while ((p_key = cl_list_remove_head(&keys)) != NULL) { 111 cl_list_destroy(&keys);
|