| /freebsd/usr.sbin/bluetooth/hcsecd/ |
| H A D | parser.y | 51 static void free_key (link_key_p key); 59 static link_key_p key = NULL; variable 77 key = (link_key_p) malloc(sizeof(*key)); 78 if (key == NULL) { 84 memset(key, 0, sizeof(*key)); 88 if (get_key(&key->bdaddr, 1) != NULL) { 91 bt_ntoa(&key->bdaddr, NULL)); 92 free_key(key); 94 LIST_INSERT_HEAD(&link_keys, key, next); 96 key = NULL; [all …]
|
| /freebsd/tools/cam/ |
| H A D | mps.d | 114 inline string xpt_action_string[int key] = 115 key == 0 ? "XPT_NOOP" : 116 key == 1 ? "XPT_SCSI_IO" : 117 key == 2 ? "XPT_GDEV_TYPE" : 118 key == 3 ? "XPT_GDEVLIST" : 119 key == 4 ? "XPT_PATH_INQ" : 120 key == 5 ? "XPT_REL_SIMQ" : 121 key == 6 ? "XPT_SASYNC_CB" : 122 key == 7 ? "XPT_SDEV_TYPE" : 123 key == 8 ? "XPT_SCAN_BUS" : [all …]
|
| H A D | mpr.d | 114 inline string xpt_action_string[int key] = 115 key == 0 ? "XPT_NOOP" : 116 key == 1 ? "XPT_SCSI_IO" : 117 key == 2 ? "XPT_GDEV_TYPE" : 118 key == 3 ? "XPT_GDEVLIST" : 119 key == 4 ? "XPT_PATH_INQ" : 120 key == 5 ? "XPT_REL_SIMQ" : 121 key == 6 ? "XPT_SASYNC_CB" : 122 key == 7 ? "XPT_SDEV_TYPE" : 123 key == 8 ? "XPT_SCAN_BUS" : [all …]
|
| /freebsd/crypto/openssl/crypto/slh_dsa/ |
| H A D | slh_dsa_key.c | 23 static void slh_dsa_key_hash_cleanup(SLH_DSA_KEY *key) in slh_dsa_key_hash_cleanup() argument 25 OPENSSL_free(key->propq); in slh_dsa_key_hash_cleanup() 26 if (key->md_big != key->md) in slh_dsa_key_hash_cleanup() 27 EVP_MD_free(key->md_big); in slh_dsa_key_hash_cleanup() 28 key->md_big = NULL; in slh_dsa_key_hash_cleanup() 29 EVP_MD_free(key->md); in slh_dsa_key_hash_cleanup() 30 EVP_MAC_free(key->hmac); in slh_dsa_key_hash_cleanup() 31 key->md = NULL; in slh_dsa_key_hash_cleanup() 34 static int slh_dsa_key_hash_init(SLH_DSA_KEY *key) in slh_dsa_key_hash_init() argument 36 int is_shake = key->params->is_shake; in slh_dsa_key_hash_init() [all …]
|
| /freebsd/cddl/lib/libdtrace/ |
| H A D | cam.d | 7 inline string xpt_action_string[int key] = 8 key == 0 ? "XPT_NOOP" : 9 key == 1 ? "XPT_SCSI_IO" : 10 key == 2 ? "XPT_GDEV_TYPE" : 11 key == 3 ? "XPT_GDEVLIST" : 12 key == 4 ? "XPT_PATH_INQ" : 13 key == 5 ? "XPT_REL_SIMQ" : 14 key == 6 ? "XPT_SASYNC_CB" : 15 key == 7 ? "XPT_SDEV_TYPE" : 16 key == 8 ? "XPT_SCAN_BUS" : [all …]
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | rsa.c | 63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local 67 key = os_zalloc(sizeof(*key)); in crypto_rsa_import_public_key() 68 if (key == NULL) in crypto_rsa_import_public_key() 71 key->n = bignum_init(); in crypto_rsa_import_public_key() 72 key->e = bignum_init(); in crypto_rsa_import_public_key() 73 if (key->n == NULL || key->e == NULL) { in crypto_rsa_import_public_key() 74 crypto_rsa_free(key); in crypto_rsa_import_public_key() 93 pos = crypto_rsa_parse_integer(pos, end, key->n); in crypto_rsa_import_public_key() 94 pos = crypto_rsa_parse_integer(pos, end, key->e); in crypto_rsa_import_public_key() 106 return key; in crypto_rsa_import_public_key() [all …]
|
| /freebsd/lib/libsecureboot/openpgp/ |
| H A D | opgp_key.c | 67 decode_key(int tag, unsigned char **pptr, size_t len, OpenPGP_key *key) in decode_key() argument 86 key->key = NULL; in decode_key() 109 key->id = octets2hex(&mdata[mlen - 8], 8); in decode_key() 115 key->sig_alg = *ptr++; in decode_key() 116 if (key->sig_alg == 1) { /* RSA */ in decode_key() 118 key->key = NEW(br_rsa_public_key); in decode_key() 119 if (!key->key) in decode_key() 121 key->key->n = mpi2bn(&ptr, &key->key->nlen); in decode_key() 122 key->key->e = mpi2bn(&ptr, &key->key->elen); in decode_key() 129 key->key = EVP_PKEY_new(); in decode_key() [all …]
|
| /freebsd/crypto/openssl/crypto/des/asm/ |
| H A D | dest4-sparcv9.pl | 102 { my ($inp,$out,$len,$key,$ivec) = map("%o$_",(0..4)); 129 ldd [$key + 0x00], %f4 ! load key schedule 130 ldd [$key + 0x08], %f6 131 ldd [$key + 0x10], %f8 132 ldd [$key + 0x18], %f10 133 ldd [$key + 0x20], %f12 134 ldd [$key + 0x28], %f14 135 ldd [$key + 0x30], %f16 136 ldd [$key + 0x38], %f18 137 ldd [$key + 0x40], %f20 [all …]
|
| /freebsd/crypto/openssl/test/certs/ |
| H A D | setup.sh | 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 49 ./mkcert.sh genroot "Root CA" root-key croot-cert clientAuth 65 ./mkcert.sh genroot "Root CA" root-key sroot-cert serverAuth [all …]
|
| /freebsd/crypto/openssl/crypto/ml_dsa/ |
| H A D | ml_dsa_key.c | 21 const ML_DSA_PARAMS *ossl_ml_dsa_key_params(const ML_DSA_KEY *key) in ossl_ml_dsa_key_params() argument 23 return key->params; in ossl_ml_dsa_key_params() 27 const uint8_t *ossl_ml_dsa_key_get_seed(const ML_DSA_KEY *key) in ossl_ml_dsa_key_get_seed() argument 29 return key->seed; in ossl_ml_dsa_key_get_seed() 32 int ossl_ml_dsa_key_get_prov_flags(const ML_DSA_KEY *key) in ossl_ml_dsa_key_get_prov_flags() argument 34 return key->prov_flags; in ossl_ml_dsa_key_get_prov_flags() 37 int ossl_ml_dsa_set_prekey(ML_DSA_KEY *key, int flags_set, int flags_clr, in ossl_ml_dsa_set_prekey() argument 43 if (key == NULL in ossl_ml_dsa_set_prekey() 44 || key->pub_encoding != NULL in ossl_ml_dsa_set_prekey() 45 || key->priv_encoding != NULL in ossl_ml_dsa_set_prekey() [all …]
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | e_rc4_hmac_md5.c | 39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out, 48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key() 56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key() 57 key->tail = key->head; in rc4_hmac_md5_init_key() 58 key->md = key->head; in rc4_hmac_md5_init_key() 60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key() 77 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_cipher() local 79 size_t rc4_off = 32 - 1 - (key->ks.x & (32 - 1)), /* 32 is $MOD from in rc4_hmac_md5_cipher() 81 md5_off = MD5_CBLOCK - key->md.num, blocks; in rc4_hmac_md5_cipher() [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/enc_provider/ |
| H A D | aes.c | 61 void k5_iEncExpandKey128(unsigned char *key, uint32_t *expanded_key); 62 void k5_iEncExpandKey256(unsigned char *key, uint32_t *expanded_key); 63 void k5_iDecExpandKey256(unsigned char *key, uint32_t *expanded_key); 64 void k5_iDecExpandKey128(unsigned char *key, uint32_t *expanded_key); 80 aesni_supported(krb5_key key) in aesni_supported() argument 82 return CACHE(key)->aesni; in aesni_supported() 86 aesni_expand_enc_key(krb5_key key) in aesni_expand_enc_key() argument 88 struct aes_key_info_cache *cache = CACHE(key); in aesni_expand_enc_key() 90 if (key->keyblock.length == 16) in aesni_expand_enc_key() 91 k5_iEncExpandKey128(key->keyblock.contents, cache->enc_ctx.ks); in aesni_expand_enc_key() [all …]
|
| /freebsd/contrib/libxo/tests/core/saved/ |
| H A D | test_01.X.out | 1 …key="key">GRO-000-415</sku><name key="key">gum</name><sold>1412</sold><in-stock>54</in-stock><on-o…
|
| H A D | test_01.XP.out | 28 <sku test3="value3" key="key">GRO-000-415</sku> 29 <name key="key">gum</name> 35 <sku test3="value3" key="key">HRD-000-212</sku> 36 <name key="key">rope</name> 42 <sku test3="value3" key="key">HRD-000-517</sku> 43 <name key="key">ladder</name> 49 <sku test3="value3" key="key">HRD-000-632</sku> 50 <name key="key">bolt</name> 56 <sku test3="value3" key="key">GRO-000-2331</sku> 57 <name key="key">water</name> [all …]
|
| H A D | test_10.X.out | 1 …key="key">GRO-000-415</sku><name key="key">gum</name><sold>1412</sold><in-stock>54</in-stock><on-o…
|
| H A D | test_10.XP.out | 10 <sku test3="value3" key="key">GRO-000-415</sku> 11 <name key="key">gum</name> 17 <sku test3="value3" key="key">HRD-000-212</sku> 18 <name key="key">rope</name> 24 <sku test3="value3" key="key">HRD-000-517</sku> 25 <name key="key">ladder</name> 31 <sku test3="value3" key="key">HRD-000-632</sku> 32 <name key="key">bolt</name> 38 <sku test3="value3" key="key">GRO-000-2331</sku> 39 <name key="key">water</name> [all …]
|
| H A D | test_08.X.out | 1 …key="key">gum</name><count>1412</count></item><item><name key="key">rope</name><count>85</count></…
|
| H A D | test_08.XP.out | 5 <name key="key">gum</name> 9 <name key="key">rope</name> 13 <name key="key">ladder</name> 17 <name key="key">bolt</name> 21 <name key="key">water</name> 29 <name key="key">gum</name> 33 <name key="key">rope</name> 37 <name key="key">ladder</name> 41 <name key="key">bolt</name> 45 <name key="key">water</name> [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | params.h | 27 #define OSSL_PARAM_DEFN(key, type, addr, sz) \ argument 28 { (key), (type), (addr), (sz), OSSL_PARAM_UNMODIFIED } 31 #define OSSL_PARAM_int(key, addr) \ argument 32 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(int)) 33 #define OSSL_PARAM_uint(key, addr) \ argument 34 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ 36 #define OSSL_PARAM_long(key, addr) \ argument 37 OSSL_PARAM_DEFN((key), OSSL_PARAM_INTEGER, (addr), sizeof(long int)) 38 #define OSSL_PARAM_ulong(key, addr) \ argument 39 OSSL_PARAM_DEFN((key), OSSL_PARAM_UNSIGNED_INTEGER, (addr), \ [all …]
|
| /freebsd/crypto/openssl/crypto/ml_kem/ |
| H A D | ml_kem.c | 117 EVP_MD_CTX *mdctx, const ML_KEM_KEY *key); 678 EVP_MD_CTX *mdctx, const ML_KEM_KEY *key) in prf() argument 680 return EVP_DigestInit_ex(mdctx, key->shake256_md, NULL) in prf() 689 EVP_MD_CTX *mdctx, const ML_KEM_KEY *key) in hash_h() argument 691 return EVP_DigestInit_ex(mdctx, key->sha3_256_md, NULL) in hash_h() 698 EVP_MD_CTX *mdctx, ML_KEM_KEY *key) in hash_h_pubkey() argument 700 const ML_KEM_VINFO *vinfo = key->vinfo; in hash_h_pubkey() 701 const scalar *t = key->t, *end = t + vinfo->rank; in hash_h_pubkey() 704 if (!EVP_DigestInit_ex(mdctx, key->sha3_256_md, NULL)) in hash_h_pubkey() 715 if (!EVP_DigestUpdate(mdctx, key->rho, ML_KEM_RANDOM_BYTES)) in hash_h_pubkey() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/kem/ |
| H A D | mlx_kem.c | 34 MLX_KEY *key; member 46 ctx->key = NULL; in mlx_kem_newctx() 56 static int mlx_kem_init(void *vctx, int op, void *key, in mlx_kem_init() argument 63 ctx->key = key; in mlx_kem_init() 71 MLX_KEY *key = vkey; in mlx_kem_encapsulate_init() local 73 if (!mlx_kem_have_pubkey(key)) { in mlx_kem_encapsulate_init() 77 return mlx_kem_init(vctx, EVP_PKEY_OP_ENCAPSULATE, key, params); in mlx_kem_encapsulate_init() 83 MLX_KEY *key = vkey; in mlx_kem_decapsulate_init() local 85 if (!mlx_kem_have_prvkey(key)) { in mlx_kem_decapsulate_init() 89 return mlx_kem_init(vctx, EVP_PKEY_OP_DECAPSULATE, key, params); in mlx_kem_decapsulate_init() [all …]
|
| /freebsd/usr.sbin/ctld/ |
| H A D | uclparse.cc | 283 std::string key = obj.key(); in uclparse_target_lun() local 284 if (!key.empty()) { in uclparse_target_lun() 285 id = strtoul(key.c_str(), &end, 0); in uclparse_target_lun() 288 key.c_str(), t_name); in uclparse_target_lun() 302 if (key.empty()) { in uclparse_target_lun() 338 std::string key = obj.key(); in uclparse_controller_namespace() local 339 if (!key.empty()) { in uclparse_controller_namespace() 340 id = strtoul(key.c_str(), &end, 0); in uclparse_controller_namespace() 343 " is invalid", key.c_str(), t_name); in uclparse_controller_namespace() 358 if (key.empty()) { in uclparse_controller_namespace() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/keymgmt/ |
| H A D | mlx_kmgmt.c | 64 MLX_KEY *key = vkey; in mlx_kem_key_free() local 66 if (key == NULL) in mlx_kem_key_free() 68 OPENSSL_free(key->propq); in mlx_kem_key_free() 69 EVP_PKEY_free(key->mkey); in mlx_kem_key_free() 70 EVP_PKEY_free(key->xkey); in mlx_kem_key_free() 71 OPENSSL_free(key); in mlx_kem_key_free() 78 MLX_KEY *key = NULL; in mlx_kem_key_new() local 83 || (key = OPENSSL_malloc(sizeof(*key))) == NULL) in mlx_kem_key_new() 87 key->libctx = libctx; in mlx_kem_key_new() 88 key->minfo = ossl_ml_kem_get_vinfo(ml_kem_variant); in mlx_kem_key_new() [all …]
|
| /freebsd/usr.sbin/iovctl/ |
| H A D | parse.c | 46 report_config_error(const char *key, const ucl_object_t *obj, const char *type) in report_config_error() argument 50 ucl_object_tostring(obj), key, type); in report_config_error() 58 add_bool_config(const char *key, const ucl_object_t *obj, nvlist_t *config) in add_bool_config() argument 63 report_config_error(key, obj, "bool"); in add_bool_config() 65 nvlist_add_bool(config, key, val); in add_bool_config() 73 add_string_config(const char *key, const ucl_object_t *obj, nvlist_t *config) in add_string_config() argument 78 report_config_error(key, obj, "string"); in add_string_config() 80 nvlist_add_string(config, key, val); in add_string_config() 88 add_uint_config(const char *key, const ucl_object_t *obj, nvlist_t *config, in add_uint_config() argument 96 report_config_error(key, obj, type); in add_uint_config() [all …]
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_chk.c | 22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument 29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime() 30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime() 36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime() 37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime() 39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime() 50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime() 58 if (BN_is_one(key->e)) { in rsa_validate_keypair_multiprime() 62 if (!BN_is_odd(key->e)) { in rsa_validate_keypair_multiprime() 68 if (BN_check_prime(key->p, ctx, cb) != 1) { in rsa_validate_keypair_multiprime() [all …]
|