/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | default_keys.c | 40 print_keys(krb5_context context, Key *keys, size_t nkeys) argument 48 for (i = 0; i < nkeys; i++) { 85 size_t nkeys; local 88 ret = hdb_generate_key_set(context, principal, &keys, &nkeys, no_salt); 92 print_keys(context, keys, nkeys); 94 hdb_free_keys(context, nkeys, keys);
|
/freebsd-current/crypto/openssh/regress/ |
H A D | hostkey-rotate.sh | 40 nkeys=0 45 nkeys=`expr $nkeys + 1` 93 expect_nkeys $nkeys "learn hostkeys" 106 expect_nkeys $nkeys "learn hostkeys $k" 119 expect_nkeys $nkeys "learn hostkeys" 132 expect_nkeys `expr $nkeys + 1` "learn hostkeys" 144 expect_nkeys $nkeys "learn hostkeys"
|
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | collector.c | 290 size_t i, nkeys; local 294 for (i = 0, nkeys = 0; i < c->val.len; i++) 296 nkeys++; 298 *keys = calloc(nkeys + 1, sizeof(**keys)); 304 for (i = 0, nkeys = 0; i < c->val.len; i++) { 306 (*keys)[nkeys++] = c->val.data[i]->private_key; 310 (*keys)[nkeys] = NULL;
|
/freebsd-current/crypto/openssh/ |
H A D | authfd.h | 24 size_t nkeys; member in struct:ssh_identitylist 34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ member in struct:dest_constraint_hop
|
H A D | ssh-pkcs11.c | 691 pkcs11_key_included(struct sshkey ***keysp, int *nkeys, struct sshkey *key) argument 695 for (i = 0; i < *nkeys; i++) 1104 * add 'wrapped' public keys to the 'keysp' array and increment nkeys. 1105 * keysp points to an (possibly empty) array with *nkeys keys. 1109 struct sshkey ***keysp, char ***labelsp, int *nkeys) 1178 if (pkcs11_key_included(keysp, nkeys, key)) { 1183 *keysp = xrecallocarray(*keysp, *nkeys, 1184 *nkeys + 1, sizeof(struct sshkey *)); 1185 (*keysp)[*nkeys] = key; 1187 *labelsp = xrecallocarray(*labelsp, *nkeys, 1108 pkcs11_fetch_certs(struct pkcs11_provider *p, CK_ULONG slotidx, struct sshkey ***keysp, char ***labelsp, int *nkeys) argument 1213 pkcs11_fetch_keys(struct pkcs11_provider *p, CK_ULONG slotidx, struct sshkey ***keysp, char ***labelsp, int *nkeys) argument 1515 int nkeys, need_finalize = 0; local 1676 int nkeys; local [all...] |
H A D | sshconnect.h | 30 int nkeys; member in struct:Sensitive
|
H A D | ssh-pkcs11-client.c | 593 u_int nkeys, i; local 612 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) 613 fatal_fr(r, "parse nkeys"); 614 *keysp = xcalloc(nkeys, sizeof(struct sshkey *)); 616 *labelsp = xcalloc(nkeys, sizeof(char *)); 617 for (i = 0; i < nkeys; i++) { 633 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) 634 nkeys = -1; 636 nkeys = -1; 639 return (nkeys); [all...] |
H A D | ssh-add.c | 342 for (i = 0; i < idlist->nkeys; i++) { 548 for (i = 0; i < idlist->nkeys; i++) { 739 hke->file, hke->line, dch->nkeys); 740 dch->keys = xrecallocarray(dch->keys, dch->nkeys, 741 dch->nkeys + 1, sizeof(*dch->keys)); 742 dch->key_is_ca = xrecallocarray(dch->key_is_ca, dch->nkeys, 743 dch->nkeys + 1, sizeof(*dch->key_is_ca)); 745 &(dch->keys[dch->nkeys]))) != 0) 747 dch->key_is_ca[dch->nkeys] = want_ca; 748 dch->nkeys [all...] |
H A D | hostfile.h | 56 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
|
H A D | ssh-pkcs11-helper.c | 123 int r, i, nkeys; local 134 if ((nkeys = pkcs11_add_provider(name, pin, &keys, &labels)) > 0) { 137 (r = sshbuf_put_u32(msg, nkeys)) != 0) 139 for (i = 0; i < nkeys; i++) { 152 (r = sshbuf_put_u32(msg, -nkeys)) != 0)
|
H A D | ssh-agent.c | 255 for (i = 0; i < dch->nkeys; i++) 284 out->nkeys = dch->nkeys; 285 out->keys = out->nkeys == 0 ? NULL : 286 xcalloc(out->nkeys, sizeof(*out->keys)); 287 out->key_is_ca = out->nkeys == 0 ? NULL : 288 xcalloc(out->nkeys, sizeof(*out->key_is_ca)); 289 for (i = 0; i < dch->nkeys; i++) { 322 debug_f("user %s hostname %s is_ca %d nkeys %u", 325 dch->is_ca, dch->nkeys); [all...] |
H A D | clientloop.c | 2043 size_t nkeys, nnew, nincomplete; /* total, new keys, incomplete match */ member in struct:hostkeys_update_ctx 2067 for (i = 0; i < ctx->nkeys; i++) 2115 for (i = 0; i < ctx->nkeys; i++) { 2164 for (i = 0; i < ctx->nkeys; i++) { 2260 for (i = 0; i < ctx->nkeys; i++) { 2336 i == 0 ? ctx->keys : NULL, i == 0 ? ctx->nkeys : 0, 2376 for (ndone = i = 0; i < ctx->nkeys; i++) { 2519 for (i = 0; i < ctx->nkeys; i++) { 2527 if ((tmp = recallocarray(ctx->keys, ctx->nkeys, ctx->nkeys [all...] |
H A D | hostfile.c | 546 size_t nkeys; member in struct:host_delete_ctx 564 for (i = 0; i < ctx->nkeys; i++) { 596 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) 614 if ((ctx.match_keys = calloc(nkeys, sizeof(*ctx.match_keys))) == NULL) 617 ctx.nkeys = nkeys; 653 for (i = 0; i < nkeys; i++) { 595 hostfile_replace_entries(const char *filename, const char *host, const char *ip, struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) argument
|
H A D | authfd.c | 324 idl->nkeys = num; 342 for (i = 0; i < idl->nkeys; i++) { 368 for (i = 0; i < idlist->nkeys; i++) { 471 for (i = 0; i < dch->nkeys; i++) {
|
H A D | ssh.c | 1673 sensitive_data.nkeys = 0; 1678 sensitive_data.nkeys = 10; 1679 sensitive_data.keys = xcalloc(sensitive_data.nkeys, 1684 if ((o) >= sensitive_data.nkeys) \ 1695 if ((o) >= sensitive_data.nkeys) \ 1782 if (sensitive_data.nkeys != 0) { 1783 for (i = 0; i < sensitive_data.nkeys; i++) { 2349 int nkeys; local 2366 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, 2368 for (i = 0; i < nkeys; [all...] |
H A D | sshd.c | 780 u_int i, nkeys; local 790 for (i = nkeys = 0; i < options.num_host_key_files; i++) { 799 if (nkeys == 0) { 815 nkeys++; 817 debug3_f("sent %u hostkeys", nkeys); 818 if (nkeys == 0)
|
H A D | ssh-keygen.c | 854 int i, nkeys; local 863 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys, &comments); 864 if (nkeys <= 0) 866 for (i = 0; i < nkeys; i++) { 1728 int r, i, nkeys; local 1733 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, 1735 debug3_f("%d keys", nkeys); 1736 if (nkeys <= 0) 1738 for (i = 0; i < nkeys; i++) { 1801 for (j = 0; j < agent_ids->nkeys; [all...] |
/freebsd-current/lib/libc/db/btree/ |
H A D | bt_debug.c | 247 u_long ifree, lfree, nkeys; local 252 nkeys = ifree = lfree = 0; 265 nkeys += NEXTINDEX(h); 286 levels, levels == 1 ? "" : "s", nkeys);
|
/freebsd-current/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 162 int nkeys, nullok, pam_err, pass; local 179 nkeys = 0; 199 ++nkeys; 211 if (nkeys == 0 && pass == 1 && 219 if (nkeys == 0)
|
/freebsd-current/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 30 size_t nkeys; member in struct:shared_state 128 ((size_t)pubkey->type < st->nkeys && 131 if ((size_t)pubkey->type >= st->nkeys) { 133 st->nkeys, pubkey->type + 1, sizeof(*st->pubkeys)); 135 st->nkeys, privkey->type + 1, sizeof(*st->privkeys)); 136 st->nkeys = privkey->type + 1; 159 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || 168 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys ||
|
/freebsd-current/lib/libc/db/hash/ |
H A D | hash.h | 78 int32_t nkeys; /* Number of keys in hash table */ member in struct:hashhdr 282 #define NKEYS hdr.nkeys
|
H A D | hash.c | 924 P_32_COPY(srcp->nkeys, destp->nkeys); 955 M_32_SWAP(hdrp->nkeys);
|
/freebsd-current/tools/tools/ath/athregs/ |
H A D | dumpregs.c | 65 static void ath_hal_dumpkeycache(FILE *fd, int nkeys); 663 ath_hal_dumpkeycache(FILE *fd, int nkeys) argument 683 for (entry = 0; entry < nkeys; entry++) {
|
/freebsd-current/contrib/ntp/util/ |
H A D | ntp-keygen.c | 168 int nkeys; /* MV keys */ variable 413 nkeys = OPT_VALUE_MV_PARAMS; 417 nkeys = OPT_VALUE_MV_KEYS; 1593 n = nkeys;
|
/freebsd-current/sys/cddl/contrib/opensolaris/uts/common/dtrace/ |
H A D | dtrace.c | 1880 dtrace_dynvar(dtrace_dstate_t *dstate, uint_t nkeys, argument 1894 ASSERT(nkeys != 0); 1907 for (i = 0; i < nkeys; i++) { 2037 if (dtuple->dtt_nkeys != nkeys) 2040 for (i = 0; i < nkeys; i++, dkey++) { 2148 * size of dtrace_dynvar plus the size of nkeys dtrace_key_t's plus the 2153 for (ksize = 0, i = 0; i < nkeys; i++) 2166 if (sizeof (dtrace_dynvar_t) + sizeof (dtrace_key_t) * (nkeys - 1) + 2289 kdata = (uintptr_t)&dvar->dtdv_tuple.dtt_key[nkeys]; 2291 dvar->dtdv_tuple.dtt_nkeys = nkeys; [all...] |