Home
last modified time | relevance | path

Searched full:keys (Results 1 – 25 of 2209) sorted by relevance

12345678910>>...89

/freebsd/crypto/openssl/crypto/sm4/asm/
H A Dsm4-riscv64-zvksed.pl67 my ($ukey,$keys,$fk)=("a0","a1","t0");
84 # Generate round keys.
95 # Store round keys
96 @{[vse32_v $vk0, $keys]} # rk[0:3]
97 addi $keys, $keys, 16
98 @{[vse32_v $vk1, $keys]} # rk[4:7]
99 addi $keys, $keys, 16
100 @{[vse32_v $vk2, $keys]} # rk[8:11]
101 addi $keys, $keys, 16
102 @{[vse32_v $vk3, $keys]} # rk[12:15]
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dset_keys.c39 * Set the keys of `ent' to the string-to-key of `password'
47 Key *keys; in _kadm5_set_keys() local
53 password, &keys, &num_keys); in _kadm5_set_keys()
57 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); in _kadm5_set_keys()
58 ent->keys.val = keys; in _kadm5_set_keys()
59 ent->keys.len = num_keys; in _kadm5_set_keys()
76 * Set the keys of `ent' to (`n_key_data', `key_data')
88 Key *keys; in _kadm5_set_keys2() local
91 keys = malloc (len * sizeof(*keys)); in _kadm5_set_keys2()
92 if (keys == NULL && len != 0) in _kadm5_set_keys2()
[all …]
H A Ddefault_keys.c40 print_keys(krb5_context context, Key *keys, size_t nkeys) in print_keys() argument
46 printf("keys:\n"); in print_keys()
50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); in print_keys()
53 (int)keys[i].key.keytype); in print_keys()
58 if (keys[i].salt) { in print_keys()
61 switch (keys[i].salt->type) { in print_keys()
69 printf("unknown salt: %d", keys[i].salt->type); in print_keys()
72 if (keys[i].salt->salt.length) in print_keys()
73 printf("%.*s", (int)keys[i].salt->salt.length, in print_keys()
74 (char *)keys[i].salt->salt.data); in print_keys()
[all …]
/freebsd/contrib/wpa/src/eap_common/
H A Dikev2_common.c36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */
371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument
380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument
440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload()
441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload()
476 if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len, in ikev2_decrypt_payload()
499 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, in ikev2_decrypt_payload()
530 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, in ikev2_build_encrypted() argument
[all …]
/freebsd/lib/libiscsiutil/
H A Dkeys.c38 struct keys *
41 struct keys *keys; in keys_new() local
43 keys = calloc(1, sizeof(*keys)); in keys_new()
44 if (keys == NULL) in keys_new()
47 return (keys); in keys_new()
51 keys_delete(struct keys *keys) in keys_delete() argument
55 free(keys->keys_names[i]); in keys_delete()
56 free(keys->keys_values[i]); in keys_delete()
58 free(keys); in keys_delete()
62 keys_load(struct keys *keys, const char *data, size_t len) in keys_load() argument
[all …]
H A Dlibiscsiutil.h77 struct keys { struct
114 struct keys *keys_new(void);
115 void keys_delete(struct keys *key);
116 void keys_load(struct keys *keys, const char *data,
118 void keys_save(struct keys *keys, char **datap,
120 const char *keys_find(struct keys *keys, const char *name);
121 void keys_add(struct keys *keys,
123 void keys_add_int(struct keys *keys,
127 keys_load_pdu(struct keys *keys, const struct pdu *pdu) in keys_load_pdu() argument
129 keys_load(keys, pdu->pdu_data, pdu->pdu_data_len); in keys_load_pdu()
[all …]
/freebsd/tools/test/sort/bigtest/
H A Dkcmd28 for KEYS in -srh -sfrudb -Vs -sM -siz
31 echo ${LANG} ${KEYS}
33 ${BSDSORT} ${KEYS} ${INPUT_FILE} -o siks/sik1
36 echo ${LANG} ${KEYS} crash >> test.log
39 ${GNUSORT} ${KEYS} ${INPUT_FILE} -o siks/sik2
41 echo ${LANG} ${KEYS} error >> test.log
43 ${BSDSORT} -c ${KEYS} siks/sik1
46 echo ${LANG} ${KEYS} -c error >> test.log
50 ${BSDSORT} ${KEYS} -t " " ${INPUT_FILE} -o siks/sik1
53 echo ${LANG} ${KEYS} -t " " crash >> test.log
[all …]
/freebsd/contrib/ldns/ldns/
H A Ddnssec_verify.h352 * \param *keys A ldns_rr_list of DNSKEY and DS rrs to look for
355 * the keys, or the *first* error encountered
360 ldns_rr_list *keys);
367 * \param[in] keys a list of keys to check with
368 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
369 * from keys that validate one of the signatures
375 const ldns_rr_list *keys,
383 * \param[in] keys a list of keys to check with
385 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
386 * from keys that validate one of the signatures
[all …]
/freebsd/contrib/ntp/ntpd/
H A Dinvoke-ntp.keys.texi1 @node ntp.keys Notes
2 @section Notes about ntp.keys
3 @pindex ntp.keys
7 # EDIT THIS FILE WITH CAUTION (invoke-ntp.keys.texi)
10 # From the definitions ntp.keys.def
24 reads its keys from a file specified using the
27 @code{keys}
32 one or more keys numbered between 1 and 65535
33 may be arbitrarily set in the keys file.
108 Note that the keys use
[all...]
H A DMakefile.am86 man5_MANS= ntp.conf.5 ntp.keys.5
132 invoke-ntp.keys.menu \
133 invoke-ntp.keys.texi \
144 ntp.keys.5man \
145 ntp.keys.5mdoc \
146 ntp.keys.def \
147 ntp.keys.man.in \
148 ntp.keys.mdoc.in \
149 ntp.keys.html \
150 ntp.keys.texi \
[all …]
H A Dntp.keys.texi3 @setfilename ntp.keys.info
15 * ntp.keys: (ntp.keys). NTP's Symmetric Key file
20 @subtitle ntp.keys, version @value{VERSION}, @value{UPDATED}
27 @node Top, ntp.keys Description, (dir), (dir)
33 This document applies to version @value{VERSION} of @code{ntp.keys}.
38 * ntp.keys Description::
39 * ntp.keys Notes::
42 @node ntp.keys Description, , Top, Top
47 be specified in a configuration file, by default @code{/etc/ntp.keys}.
49 @include invoke-ntp.keys.texi
/freebsd/crypto/heimdal/lib/hx509/
H A Dks_mem.c48 hx509_private_key *keys; member
80 for (i = 0; mem->keys && mem->keys[i]; i++) in mem_free()
81 hx509_private_key_free(&mem->keys[i]); in mem_free()
82 free(mem->keys); in mem_free()
158 hx509_private_key **keys) in mem_getkeys() argument
163 for (i = 0; mem->keys && mem->keys[i]; i++) in mem_getkeys()
165 *keys = calloc(i + 1, sizeof(**keys)); in mem_getkeys()
166 for (i = 0; mem->keys && mem->keys[i]; i++) { in mem_getkeys()
167 (*keys)[i] = _hx509_private_key_ref(mem->keys[i]); in mem_getkeys()
168 if ((*keys)[i] == NULL) { in mem_getkeys()
[all …]
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_kx/
H A Dcrypto_kx.c42 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; in crypto_kx_client_session_keys() local
57 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX); in crypto_kx_client_session_keys()
58 crypto_generichash_init(&h, NULL, 0U, sizeof keys); in crypto_kx_client_session_keys()
63 crypto_generichash_final(&h, keys, sizeof keys); in crypto_kx_client_session_keys()
66 rx[i] = keys[i]; in crypto_kx_client_session_keys()
67 tx[i] = keys[i + crypto_kx_SESSIONKEYBYTES]; in crypto_kx_client_session_keys()
69 sodium_memzero(keys, sizeof keys); in crypto_kx_client_session_keys()
83 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; in crypto_kx_server_session_keys() local
98 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX); in crypto_kx_server_session_keys()
99 crypto_generichash_init(&h, NULL, 0U, sizeof keys); in crypto_kx_server_session_keys()
[all …]
/freebsd/crypto/heimdal/kadmin/
H A Dext.c47 krb5_keytab_entry *keys = NULL; in do_ext_keytab() local
57 keys = malloc(sizeof(*keys) * princ.n_key_data); in do_ext_keytab()
58 if (keys == NULL) { in do_ext_keytab()
66 keys[i].principal = princ.principal; in do_ext_keytab()
67 keys[i].vno = kd->key_data_kvno; in do_ext_keytab()
68 keys[i].keyblock.keytype = kd->key_data_type[0]; in do_ext_keytab()
69 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; in do_ext_keytab()
70 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0]; in do_ext_keytab()
71 keys[i].timestamp = time(NULL); in do_ext_keytab()
81 keys = malloc(sizeof(*keys) * n_k); in do_ext_keytab()
[all …]
/freebsd/crypto/krb5/src/lib/kdb/
H A Dt_sort_key_data.c45 assert_sorted(krb5_key_data *keys, int num_keys) in assert_sorted() argument
50 assert_true(keys[i].key_data_kvno <= keys[i - 1].key_data_kvno); in assert_sorted()
56 krb5_key_data keys[] = { KEY(5), KEY(5), KEY(4), KEY(3), KEY(3), KEY(2), in test_pre_sorted() local
58 int n_keys = sizeof(keys)/sizeof(keys[0]); in test_pre_sorted()
60 krb5_dbe_sort_key_data(keys, n_keys); in test_pre_sorted()
61 assert_sorted(keys, n_keys); in test_pre_sorted()
67 krb5_key_data keys[] = { KEY(1), KEY(2), KEY(2), KEY(3), KEY(3), KEY(3), in test_reverse_sorted() local
69 int n_keys = sizeof(keys)/sizeof(keys[0]); in test_reverse_sorted()
71 krb5_dbe_sort_key_data(keys, n_keys); in test_reverse_sorted()
72 assert_sorted(keys, n_keys); in test_reverse_sorted()
[all …]
/freebsd/contrib/ntp/util/
H A Dntp-keygen.mdoc.in24 It can generate message digest keys used in symmetric key cryptography and,
25 if the OpenSSL software library has been installed, it can generate host keys,
26 signing keys, certificates, and identity keys and parameters used in Autokey
32 The message digest symmetric keys file is generated in a format
39 When used to generate message digest symmetric keys, the program
46 The message digest symmetric keys file must be distributed and stored
48 Besides the keys used for ordinary NTP associations, additional keys
60 However, the identity keys ar
[all...]
H A Dntp-keygen.1ntp-keygenmdoc24 It can generate message digest keys used in symmetric key cryptography and,
25 if the OpenSSL software library has been installed, it can generate host keys,
26 signing keys, certificates, and identity keys and parameters used in Autokey
32 The message digest symmetric keys file is generated in a format
39 When used to generate message digest symmetric keys, the program
46 The message digest symmetric keys file must be distributed and stored
48 Besides the keys used for ordinary NTP associations, additional keys
60 However, the identity keys ar
[all...]
H A Dntp-keygen.texi11 program, which generates various keys for @code{ntpd},
43 It can generate message digest keys used in symmetric key cryptography and,
45 library has been installed, it can generate host keys, sign keys,
46 certificates, and identity keys and parameters used by the Autokey
48 The message digest keys file is generated in a
62 keys used in symmetric key cryptography and, if the OpenSSL software
63 library has been installed, it can generate host keys, sign keys,
64 certificates, and identity keys and parameters used by the Autokey
65 public key cryptography. The message digest keys file is generated in a
70 When used to generate message digest keys, the program produces a file
[all …]
H A Dntp-keygen.1ntp-keygenman39 It can generate message digest keys used in symmetric key cryptography and,
40 if the OpenSSL software library has been installed, it can generate host keys,
41 signing keys, certificates, and identity keys and parameters used in Autokey
49 The message digest symmetric keys file is generated in a format
58 When used to generate message digest symmetric keys, the program
65 The message digest symmetric keys file must be distributed and stored
67 Besides the keys used for ordinary NTP associations, additional keys
81 However, the identity keys ar
[all...]
H A Dntp-keygen.man.in39 It can generate message digest keys used in symmetric key cryptography and,
40 if the OpenSSL software library has been installed, it can generate host keys,
41 signing keys, certificates, and identity keys and parameters used in Autokey
49 The message digest symmetric keys file is generated in a format
58 When used to generate message digest symmetric keys, the program
65 The message digest symmetric keys file must be distributed and stored
67 Besides the keys used for ordinary NTP associations, additional keys
81 However, the identity keys ar
[all...]
/freebsd/crypto/krb5/src/man/
H A Dk5srvutil.man41 k5srvutil allows an administrator to list keys currently in
42 a keytab, to obtain new keys for a principal currently in a keytab,
43 or to delete non\-current keys from a keytab.
49 Lists the keys in a keytab, showing version number and principal
53 Uses the kadmin protocol to update the keys in the Kerberos
54 database to new randomly\-generated keys, and updates the keys in
59 option is given, the old and new keys will be displayed.
60 Ordinarily, keys will be generated with the default encryption
62 option. Old keys are retained in the keytab so that existing
64 such tickets expire, to prevent attacks against the old keys.
[all …]
/freebsd/crypto/openssh/
H A Dssh-add.197 When loading keys into or deleting keys from the agent, process
98 certificates only and skip plain keys.
113 has been run without arguments, the keys for the default identities and
116 public key files to specify keys and certificates to be removed from the agent.
126 will read public keys to be removed from standard input.
136 Remove keys provided by the PKCS#11 shared library
140 destination-constrained keys via the
156 When adding keys, constrain them to be usable only through specific hosts or to
175 Multiple destination constraints may be added when loading keys.
191 Hosts are identified by their host keys, and are looked up from known hosts
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Dsalt-des3.c48 DES_cblock keys[3]; in DES3_string_to_key() local
73 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); in DES3_string_to_key()
74 DES_set_odd_parity(keys + i); in DES3_string_to_key()
75 if(DES_is_weak_key(keys + i)) in DES3_string_to_key()
76 _krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); in DES3_string_to_key()
77 DES_set_key_unchecked(keys + i, &s[i]); in DES3_string_to_key()
86 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); in DES3_string_to_key()
87 DES_set_odd_parity(keys + i); in DES3_string_to_key()
88 if(DES_is_weak_key(keys + i)) in DES3_string_to_key()
89 _krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); in DES3_string_to_key()
[all …]
/freebsd/contrib/mtree/
H A Dcreate.c179 if (sflag && keys & F_CKSUM) in cwalk()
205 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) { in statf()
206 if (keys & F_UNAME && in statf()
209 if (keys & F_UID || (keys & F_UNAME && name == NULL)) in statf()
213 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) { in statf()
214 if (keys & F_GNAME && in statf()
217 if (keys & F_GID || (keys & F_GNAME && name == NULL)) in statf()
221 if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode) in statf()
224 if (keys & F_DEV && in statf()
228 if (keys & F_NLINK && p->fts_statp->st_nlink != 1) in statf()
[all …]
/freebsd/crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/
H A Dpasstest.c11 FILE *keys, *vals; in main() local
22 keys = fopen("yp.keys", "rt"); in main()
40 while ((key_line = fgets(key_line, 100, keys)) != NULL) { in main()
57 fclose(keys); in main()
64 keys = fopen("yp.keys", "rt"); in main()
73 while ((get_key = fgets(get_key, 100, keys)) != NULL) { in main()
90 fclose(keys); in main()
123 keys = fopen("yp.keys", "rt"); in main()
128 while ((get_key = fgets(get_key, 100, keys)) != NULL) { in main()
132 key2 = fgets(get_key, 100, keys); in main()
[all …]

12345678910>>...89