/freebsd/usr.sbin/bluetooth/hcsecd/ |
H A D | parser.y | 51 static void free_key (link_key_p key); 59 static link_key_p key = NULL; variable 77 key = (link_key_p) malloc(sizeof(*key)); 78 if (key == NULL) { 84 memset(key, 0, sizeof(*key)); 88 if (get_key(&key->bdaddr, 1) != NULL) { 91 bt_ntoa(&key->bdaddr, NULL)); 92 free_key(key); 94 LIST_INSERT_HEAD(&link_keys, key, next); 96 key = NULL; [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | rsa.c | 63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local 67 key = os_zalloc(sizeof(*key)); in crypto_rsa_import_public_key() 68 if (key == NULL) in crypto_rsa_import_public_key() 71 key->n = bignum_init(); in crypto_rsa_import_public_key() 72 key->e = bignum_init(); in crypto_rsa_import_public_key() 73 if (key->n == NULL || key->e == NULL) { in crypto_rsa_import_public_key() 74 crypto_rsa_free(key); in crypto_rsa_import_public_key() 93 pos = crypto_rsa_parse_integer(pos, end, key->n); in crypto_rsa_import_public_key() 94 pos = crypto_rsa_parse_integer(pos, end, key->e); in crypto_rsa_import_public_key() 106 return key; in crypto_rsa_import_public_key() [all …]
|
/freebsd/lib/libsecureboot/openpgp/ |
H A D | opgp_key.c | 67 decode_key(int tag, unsigned char **pptr, size_t len, OpenPGP_key *key) in decode_key() argument 86 key->key = NULL; in decode_key() 109 key->id = octets2hex(&mdata[mlen - 8], 8); in decode_key() 115 key->sig_alg = *ptr++; in decode_key() 116 if (key->sig_alg == 1) { /* RSA */ in decode_key() 118 key->key = NEW(br_rsa_public_key); in decode_key() 119 if (!key->key) in decode_key() 121 key->key->n = mpi2bn(&ptr, &key->key->nlen); in decode_key() 122 key->key->e = mpi2bn(&ptr, &key->key->elen); in decode_key() 129 key->key = EVP_PKEY_new(); in decode_key() [all …]
|
/freebsd/crypto/openssl/crypto/des/asm/ |
H A D | dest4-sparcv9.pl | 102 { my ($inp,$out,$len,$key,$ivec) = map("%o$_",(0..4)); 129 ldd [$key + 0x00], %f4 ! load key schedule 130 ldd [$key + 0x08], %f6 131 ldd [$key + 0x10], %f8 132 ldd [$key + 0x18], %f10 133 ldd [$key + 0x20], %f12 134 ldd [$key + 0x28], %f14 135 ldd [$key + 0x30], %f16 136 ldd [$key + 0x38], %f18 137 ldd [$key + 0x40], %f20 [all …]
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out, 48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key() 56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key() 57 key->tail = key->head; in rc4_hmac_md5_init_key() 58 key->md = key->head; in rc4_hmac_md5_init_key() 60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key() 79 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_cipher() local 81 size_t rc4_off = 32 - 1 - (key->ks.x & (32 - 1)), /* 32 is $MOD from in rc4_hmac_md5_cipher() 83 md5_off = MD5_CBLOCK - key->md.num, blocks; in rc4_hmac_md5_cipher() [all …]
|
/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 49 ./mkcert.sh genroot "Root CA" root-key croot-cert clientAuth 65 ./mkcert.sh genroot "Root CA" root-key sroot-cert serverAuth [all …]
|
/freebsd/contrib/libxo/tests/core/saved/ |
H A D | test_01.X.out | 1 …key="key">GRO-000-415</sku><name key="key">gum</name><sold>1412</sold><in-stock>54</in-stock><on-o…
|
H A D | test_01.XP.out | 28 <sku test3="value3" key="key">GRO-000-415</sku> 29 <name key="key">gum</name> 35 <sku test3="value3" key="key">HRD-000-212</sku> 36 <name key="key">rope</name> 42 <sku test3="value3" key="key">HRD-000-517</sku> 43 <name key="key">ladder</name> 49 <sku test3="value3" key="key">HRD-000-632</sku> 50 <name key="key">bolt</name> 56 <sku test3="value3" key="key">GRO-000-2331</sku> 57 <name key="key">water</name> [all …]
|
H A D | test_10.X.out | 1 …key="key">GRO-000-415</sku><name key="key">gum</name><sold>1412</sold><in-stock>54</in-stock><on-o…
|
H A D | test_10.XP.out | 10 <sku test3="value3" key="key">GRO-000-415</sku> 11 <name key="key">gum</name> 17 <sku test3="value3" key="key">HRD-000-212</sku> 18 <name key="key">rope</name> 24 <sku test3="value3" key="key">HRD-000-517</sku> 25 <name key="key">ladder</name> 31 <sku test3="value3" key="key">HRD-000-632</sku> 32 <name key="key">bolt</name> 38 <sku test3="value3" key="key">GRO-000-2331</sku> 39 <name key="key">water</name> [all …]
|
H A D | test_08.X.out | 1 …key="key">gum</name><count>1412</count></item><item><name key="key">rope</name><count>85</count></…
|
H A D | test_08.XP.out | 5 <name key="key">gum</name> 9 <name key="key">rope</name> 13 <name key="key">ladder</name> 17 <name key="key">bolt</name> 21 <name key="key">water</name> 29 <name key="key">gum</name> 33 <name key="key">rope</name> 37 <name key="key">ladder</name> 41 <name key="key">bolt</name> 45 <name key="key">water</name> [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | params.h | 27 # define OSSL_PARAM_DEFN(key, type, addr, sz) \ argument 28 { (key), (type), (addr), (sz), OSSL_PARAM_UNMODIFIED } 31 # define OSSL_PARAM_int(key, addr) \ argument 32 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(int)) 33 # define OSSL_PARAM_uint(key, addr) \ argument 34 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ 36 # define OSSL_PARAM_long(key, addr) \ argument 37 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(long int)) 38 # define OSSL_PARAM_ulong(key, addr) \ argument 39 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ [all …]
|
/freebsd/usr.sbin/iovctl/ |
H A D | parse.c | 46 report_config_error(const char *key, const ucl_object_t *obj, const char *type) in report_config_error() argument 50 ucl_object_tostring(obj), key, type); in report_config_error() 58 add_bool_config(const char *key, const ucl_object_t *obj, nvlist_t *config) in add_bool_config() argument 63 report_config_error(key, obj, "bool"); in add_bool_config() 65 nvlist_add_bool(config, key, val); in add_bool_config() 73 add_string_config(const char *key, const ucl_object_t *obj, nvlist_t *config) in add_string_config() argument 78 report_config_error(key, obj, "string"); in add_string_config() 80 nvlist_add_string(config, key, val); in add_string_config() 88 add_uint_config(const char *key, const ucl_object_t *obj, nvlist_t *config, in add_uint_config() argument 96 report_config_error(key, obj, type); in add_uint_config() [all …]
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_chk.c | 22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument 29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime() 30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime() 36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime() 37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime() 39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime() 50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime() 58 if (BN_is_one(key->e)) { in rsa_validate_keypair_multiprime() 62 if (!BN_is_odd(key->e)) { in rsa_validate_keypair_multiprime() 68 if (BN_check_prime(key->p, ctx, cb) != 1) { in rsa_validate_keypair_multiprime() [all …]
|
/freebsd/lib/libthr/thread/ |
H A D | thr_spec.c | 57 _thr_key_create(pthread_key_t *key, void (*destructor)(void *)) in _thr_key_create() argument 75 *key = i + 1; in _thr_key_create() 88 int key, ret; in _thr_key_delete() local 90 key = userkey - 1; in _thr_key_delete() 91 if ((unsigned int)key >= PTHREAD_KEYS_MAX) in _thr_key_delete() 95 if (_thread_keytable[key].allocated) { in _thr_key_delete() 96 _thread_keytable[key].allocated = 0; in _thr_key_delete() 111 int i, key; in _thread_cleanupspecific() local 119 for (key = 0; key < PTHREAD_KEYS_MAX && in _thread_cleanupspecific() 120 curthread->specific_data_count > 0; key++) { in _thread_cleanupspecific() [all …]
|
/freebsd/sys/geom/eli/ |
H A D | g_eli_key_cache.c | 74 g_eli_key_fill(struct g_eli_softc *sc, struct g_eli_key *key, uint64_t keyno) in g_eli_key_fill() argument 90 sizeof(hmacdata), key->gek_key, 0); in g_eli_key_fill() 91 key->gek_keyno = keyno; in g_eli_key_fill() 92 key->gek_count = 0; in g_eli_key_fill() 93 key->gek_magic = G_ELI_KEY_MAGIC; in g_eli_key_fill() 103 struct g_eli_key *key, *ekey, keysearch; in g_eli_key_allocate() local 108 key = malloc(sizeof(*key), M_ELI, M_WAITOK); in g_eli_key_allocate() 109 g_eli_key_fill(sc, key, keyno); in g_eli_key_allocate() 118 zfree(key, M_ELI); in g_eli_key_allocate() 119 key = ekey; in g_eli_key_allocate() [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf | 5 test-0 = 0-SECLEVEL 3 with default key 6 test-1 = 1-SECLEVEL 4 with ED448 key 7 test-2 = 2-SECLEVEL 5 server with ED448 key 8 test-3 = 3-SECLEVEL 5 client with ED448 key 9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE 10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2 13 [0-SECLEVEL 3 with default key] 14 ssl_conf = 0-SECLEVEL 3 with default key-ssl 16 [0-SECLEVEL 3 with default key-ssl] 17 server = 0-SECLEVEL 3 with default key-server [all …]
|
/freebsd/sys/dev/qat/qat_common/ |
H A D | adf_cfg_section.c | 136 const char *key, in adf_cfg_set_value() argument 144 if (adf_cfg_get_param_value(accel_dev, sec, key, val)) in adf_cfg_set_value() 163 char *key = NULL; in adf_cfg_add_cy_inst_info() local 169 key = malloc(ADF_CFG_MAX_KEY_LEN_IN_BYTES, M_QAT, M_WAITOK | M_ZERO); in adf_cfg_add_cy_inst_info() 171 snprintf(key, in adf_cfg_add_cy_inst_info() 177 accel_dev, derived_sec, key, (void *)&bank_number, ADF_DEC); in adf_cfg_add_cy_inst_info() 179 snprintf(key, in adf_cfg_add_cy_inst_info() 185 accel_dev, derived_sec, key, (void *)&ring_number, ADF_DEC); in adf_cfg_add_cy_inst_info() 187 snprintf(key, in adf_cfg_add_cy_inst_info() 193 accel_dev, derived_sec, key, (void *)&ring_number, ADF_DEC); in adf_cfg_add_cy_inst_info() [all …]
|
/freebsd/contrib/bsnmp/snmp_mibII/ |
H A D | mibII_route.c | 100 struct sroute key; in mib_sroute_process() local 120 key.index[0] = (ha >> 24) & 0xff; in mib_sroute_process() 121 key.index[1] = (ha >> 16) & 0xff; in mib_sroute_process() 122 key.index[2] = (ha >> 8) & 0xff; in mib_sroute_process() 123 key.index[3] = (ha >> 0) & 0xff; in mib_sroute_process() 126 key.index[4] = (ha >> 24) & 0xff; in mib_sroute_process() 127 key.index[5] = (ha >> 16) & 0xff; in mib_sroute_process() 128 key.index[6] = (ha >> 8) & 0xff; in mib_sroute_process() 129 key.index[7] = (ha >> 0) & 0xff; in mib_sroute_process() 132 key.index[8] = 0; in mib_sroute_process() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | ssl_test.tmpl | 28 foreach my $key (sort keys %server) { 30 next if ($key eq "extra"); 31 $OUT .= qq{$key} . " = " . qq{$server{$key}\n} if defined $server{$key}; 35 foreach my $key (sort keys %server2) { 36 next if ($key eq "extra"); 37 $OUT .= qq{$key} . " = " . qq{$server2{$key}\n} if defined $server2{$key}; 42 foreach my $key (sort keys %resume_server) { 43 next if ($key eq "extra"); 44 $OUT .= qq{$key} . " = " . qq{$resume_server{$key}\n} if defined $resume_server{$key}; 50 foreach my $key (sort keys %client) { [all …]
|
H A D | rsa_sp800_56b_test.c | 224 RSA *key = NULL; in test_check_private_exponent() local 228 ret = TEST_ptr(key = RSA_new()) in test_check_private_exponent() 235 && TEST_true(RSA_set0_factors(key, p, q)); in test_check_private_exponent() 248 && TEST_true(RSA_set0_key(key, n, e, d)); in test_check_private_exponent() 256 ret = TEST_false(ossl_rsa_check_private_exponent(key, 8, ctx)) in test_check_private_exponent() 259 && TEST_true(ossl_rsa_check_private_exponent(key, 8, ctx)) in test_check_private_exponent() 261 && TEST_false(ossl_rsa_check_private_exponent(key, 16, ctx)) in test_check_private_exponent() 264 && TEST_false(ossl_rsa_check_private_exponent(key, 8, ctx)) in test_check_private_exponent() 267 && TEST_false(ossl_rsa_check_private_exponent(key, 8, ctx)); in test_check_private_exponent() 269 RSA_free(key); in test_check_private_exponent() [all …]
|
/freebsd/lib/libnv/tests/ |
H A D | cnv_tests.cc | 44 const char *key; in ATF_TEST_CASE_BODY() local 55 key = "name"; in ATF_TEST_CASE_BODY() 58 nvlist_add_bool(nvl, key, value); in ATF_TEST_CASE_BODY() 59 ATF_REQUIRE_EQ(strcmp(key, nvlist_next(nvl, &type, &cookie)), 0); in ATF_TEST_CASE_BODY() 63 ATF_REQUIRE(nvlist_exists(nvl, key)); in ATF_TEST_CASE_BODY() 64 ATF_REQUIRE(nvlist_exists_bool(nvl, key)); in ATF_TEST_CASE_BODY() 78 const char *key; in ATF_TEST_CASE_BODY() local 89 key = "name"; in ATF_TEST_CASE_BODY() 92 nvlist_add_number(nvl, key, value); in ATF_TEST_CASE_BODY() 93 ATF_REQUIRE_EQ(strcmp(key, nvlist_next(nvl, &type, &cookie)), 0); in ATF_TEST_CASE_BODY() [all …]
|
/freebsd/crypto/openssl/crypto/camellia/asm/ |
H A D | cmll-x86.pl | 58 $key="edi"; 94 &xor ($t1,&DWP($seed+$i*$scale+4,$key)); # t1^=key[1] 118 &mov ($idx,&DWP($seed+($i+1)*$scale,$key)); # prefetch key[i+1] 133 &mov ($key,&wparam(2)); # load key schedule pointer 141 &lea ("ecx",&DWP(-64-63,$key)); 149 &lea ("eax",&DWP(0,$key,"eax")); 197 &mov ($key,&wparam(2)); # load key schedule pointer 202 &mov ("eax",&DWP(272,$key)); # load grandRounds counter 206 &lea ("ecx",&DWP(-64-63,$key)); 214 &lea ("eax",&DWP(0,$key,"eax")); [all …]
|
/freebsd/contrib/dialog/samples/copifuncs/ |
H A D | ifpatch | 4 if (!strcasecmp(msg->key,"X-UUCP-From")) return 0; 5 if (!strcasecmp(msg->key,"X-Body-Start")) return 0; 6 if (!strncasecmp(msg->key,"X-FTN-",6)) return 0; 7 - if (!strcasecmp(msg->key,"Path")) return isftnpath(msg->val)?0:1; 8 + if (!strcasecmp(msg->key,"Path")) 16 if (!strcasecmp(msg->key,"Newsgroups")) return newsmode?0:2; 17 if (!strcasecmp(msg->key,"Xref")) return 0; 18 if (!strcasecmp(msg->key,"Return-Receipt-To")) return 1; 19 if (!strcasecmp(msg->key,"Received")) return newsmode?0:2; 20 - if (!strcasecmp(msg->key,"From")) return ftnorigin?0:2; [all …]
|