Home
last modified time | relevance | path

Searched refs:keybuf (Results 1 – 25 of 36) sorted by relevance

12

/freebsd/stand/libsa/geli/
H A Dgeli_metadata.c43 struct keybuf *keybuf; in geli_export_key_metadata() local
45 keybuf = malloc(GELI_KEYBUF_SIZE); in geli_export_key_metadata()
46 geli_export_key_buffer(keybuf); in geli_export_key_metadata()
47 file_addmetadata(kfp, MODINFOMD_KEYBUF, GELI_KEYBUF_SIZE, keybuf); in geli_export_key_metadata()
48 explicit_bzero(keybuf, GELI_KEYBUF_SIZE); in geli_export_key_metadata()
49 free(keybuf); in geli_export_key_metadata()
H A Dgeliboot.h48 #define GELI_KEYBUF_SIZE (sizeof(struct keybuf) + \
95 void geli_import_key_buffer(struct keybuf *keybuf);
96 void geli_export_key_buffer(struct keybuf *keybuf);
/freebsd/contrib/sendmail/libsm/
H A Dniprop.c77 char keybuf[1024]; variable
89 if (i >= sizeof keybuf)
91 (void) sm_strlcpyn(keybuf, sizeof keybuf, 2, keydir, "/");
94 (void) sm_strlcat2(keybuf, keyprop, "=", sizeof keybuf);
96 (void) sm_strlcat(keybuf, keyval, sizeof keybuf);
101 keydir, keyprop, keyval, valprop, sepchar, keybuf);
149 if (ni_pathsearch(ni, &nid, keybuf) != 0)
/freebsd/contrib/sendmail/src/
H A Dudb.c140 char keybuf[MAXUDBKEY]; local
176 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop");
179 if (keylen >= sizeof(keybuf))
218 key.data = keybuf;
222 keybuf, keylen);
245 keybuf, keylen);
262 memcmp(key.data, keybuf, keylen) == 0)
359 (void) sm_strlcpyn(keybuf, sizeof(keybuf), 2, a->q_user,
361 keylen = strlen(keybuf);
362 key.data = keybuf;
[all …]
H A Dmap.c1930 char keybuf[MAXNAME + 1]; /* EAI:ok */ local
1944 if (key.dsize > sizeof(keybuf) - 1)
1945 key.dsize = sizeof(keybuf) - 1;
1946 memmove(keybuf, key.dptr, key.dsize);
1947 keybuf[key.dsize] = '\0';
1948 makelower_buf(keybuf, keybuf, sizeof(keybuf));
1949 key.dptr = keybuf;
2042 char keybuf[MAXNAME + 1]; /* EAI:ok */ local
2052 if (key.dsize > sizeof(keybuf) - 1)
2053 key.dsize = sizeof(keybuf) - 1;
[all …]
/freebsd/stand/i386/common/
H A Dbootargs.h104 struct keybuf *keybuf; member
106 void *keybuf; member
120 gbdata->keybuf = malloc(sizeof(struct keybuf) + in export_geli_boot_data()
122 geli_export_key_buffer(gbdata->keybuf); in export_geli_boot_data()
133 geli_import_key_buffer(gbdata->keybuf); in import_geli_boot_data()
/freebsd/include/rpcsvc/
H A Dkey_prot.x89 typedef opaque keybuf[HEXKEYBYTES]; /* store key in hex */ typedef
146 keybuf st_priv_key;
147 keybuf st_pub_key;
173 KEY_SET(keybuf) = 1;
215 KEY_SET(keybuf) = 1;
276 KEY_GET_CONV(keybuf) = 10;
/freebsd/usr.sbin/yp_mkdb/
H A Dyp_mkdb.c113 char *keybuf, *datbuf; in main() local
271 keybuf = (char *)&buf; in main()
281 if (*keybuf == '+' || *keybuf == '-' || in main()
289 if (strlen(keybuf) > YPMAXRECORD) { in main()
290 warnx("key too long: %s", keybuf); in main()
294 if (!strlen(keybuf)) { in main()
304 key.data = keybuf; in main()
305 key.size = strlen(keybuf); in main()
312 warnx("duplicate key '%s' - skipping", keybuf); in main()
/freebsd/lib/libc/db/test/hash.tests/
H A Ddriver2.c55 char keybuf[2049]; local
78 key.data = keybuf;
80 bzero(keybuf, sizeof(keybuf));
87 sprintf(keybuf, "Key #%d", i);
/freebsd/usr.sbin/keyserv/
H A Dsetkey.c58 static int storesecretkey( uid_t, keybuf );
85 pk_setkey(uid_t uid, keybuf skey) in pk_setkey()
197 pk_get_conv_key(uid_t uid, keybuf xpublic, cryptkeyres *result) in pk_get_conv_key()
372 storesecretkey(uid_t uid, keybuf key) in storesecretkey()
446 keybuf secret;
447 keybuf public;
465 memcpy(new->public, pub, sizeof (keybuf)); in writecache()
466 memcpy(new->secret, sec, sizeof (keybuf)); in writecache()
482 (memcmp(pub, (list)->public, sizeof (keybuf)) == 0 && \ in readcache()
483 memcmp(sec, (list)->secret, sizeof (keybuf)) == 0) in readcache()
H A Dkeyserv.h5 extern keystatus pk_setkey( uid_t, keybuf );
10 extern keystatus pk_get_conv_key( uid_t, keybuf, cryptkeyres * );
/freebsd/stand/efi/libefi/
H A Defi_console.c98 static unsigned keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable
1238 if (keybuf[i] != 0) { in keybuf_getchar()
1239 c = keybuf[i]; in keybuf_getchar()
1240 keybuf[i] = 0; in keybuf_getchar()
1254 if (keybuf[i] != 0) in keybuf_ischar()
1261 * We are not reading input before keybuf is empty, so we are safe
1262 * just to fill keybuf from the beginning.
1270 keybuf[0] = 0x1b; /* esc */ in keybuf_inschar()
1271 keybuf[ in keybuf_inschar()
[all...]
/freebsd/secure/lib/libcrypt/
H A Dcrypt-des.c592 u_int32_t count, salt, l, r0, r1, keybuf[2]; in crypt_des() local
602 q = (u_char *)keybuf; in crypt_des()
603 while (q - (u_char *)keybuf - 8) { in crypt_des()
608 if (des_setkey((char *)keybuf)) in crypt_des()
627 if (des_cipher((char *)keybuf, (char *)keybuf, 0L, 1)) in crypt_des()
632 q = (u_char *)keybuf; in crypt_des()
633 while (q - (u_char *)keybuf - 8 && *key) in crypt_des()
636 if (des_setkey((char *)keybuf)) in crypt_des()
/freebsd/tools/tools/net80211/wesside/wesside/
H A Daircrack-ptw-lib.c220 uint8_t keybuf[PTW_KSBYTES]; in correct() local
224 memcpy(&keybuf[IVBYTES], key, keylen); in correct()
225 memcpy(keybuf, state->sessions[i].iv, IVBYTES); in correct()
226 rc4init(keybuf, keylen+IVBYTES, &rc4state); in correct()
361 int PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) { in PTW_computeKey() argument
403 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, simple)) { in PTW_computeKey()
415 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, onestrong)) { in PTW_computeKey()
421 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, twostrong)) { in PTW_computeKey()
/freebsd/sys/crypto/
H A Dintake.h52 struct keybuf { struct
59 extern struct keybuf* get_keybuf(void); argument
/freebsd/stand/i386/libi386/
H A Dvidconsole.c85 static uint8_t keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable
1076 if (keybuf[i] != 0) { in vidc_getchar()
1077 c = keybuf[i]; in vidc_getchar()
1078 keybuf[i] = 0; in vidc_getchar()
1095 keybuf[0] = '['; in vidc_getchar()
1096 keybuf[1] = 'A'; in vidc_getchar()
1099 keybuf[0] = '['; in vidc_getchar()
1100 keybuf[1] = 'D'; in vidc_getchar()
1103 keybuf[0] = '['; in vidc_getchar()
1104 keybuf[1] = 'C'; in vidc_getchar()
[all …]
/freebsd/sbin/restore/
H A Drestore.c487 static char keybuf[32]; in keyval() local
489 (void) strcpy(keybuf, "|NIL"); in keyval()
490 keybuf[0] = '\0'; in keyval()
492 (void) strcat(keybuf, "|ONTAPE"); in keyval()
494 (void) strcat(keybuf, "|INOFND"); in keyval()
496 (void) strcat(keybuf, "|NAMEFND"); in keyval()
498 (void) strcat(keybuf, "|MODECHG"); in keyval()
499 return (&keybuf[1]); in keyval()
/freebsd/contrib/ntp/libntp/
H A Da_md5encrypt.c97 u_char keybuf[AES_128_KEY_SIZE]; in make_mac()
101 memcpy(keybuf, keyptr, key->len); in make_mac()
102 zero_mem((keybuf + key->len), in make_mac()
104 keyptr = keybuf; in make_mac()
67 u_char keybuf[AES_128_KEY_SIZE]; make_mac() local
/freebsd/crypto/openssl/crypto/pem/
H A Dpvkfmt.c828 unsigned char keybuf[20]; in do_PVK_body_key() local
860 if (!derive_pvk_key(keybuf, p, saltlen, in do_PVK_body_key()
875 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key()
884 memset(keybuf + 5, 0, 11); in do_PVK_body_key()
885 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key()
911 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key()
1056 unsigned char keybuf[20]; in i2b_PVK() local
1066 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, in i2b_PVK()
1072 memset(keybuf + 5, 0, 11); in i2b_PVK()
1074 if (!EVP_EncryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in i2b_PVK()
[all …]
/freebsd/usr.sbin/ypldap/
H A Dyp.c654 static char keybuf[YPMAXRECORD+1]; in yp_make_keyval() local
657 memset(keybuf, 0, sizeof(keybuf)); in yp_make_keyval()
660 (void)strlcpy(keybuf, key, sizeof(keybuf)); in yp_make_keyval()
661 res->key.keydat_len = strlen(keybuf); in yp_make_keyval()
662 res->key.keydat_val = keybuf; in yp_make_keyval()
672 log_debug("sending out %s => %s", keybuf, buf); in yp_make_keyval()
/freebsd/contrib/ntp/sntp/
H A Dcrypto.c43 u_char keybuf[AES_128_KEY_SIZE]; in compute_mac()
47 memcpy(keybuf, key_data, key_size); in compute_mac()
48 memset((keybuf + key_size), 0, in compute_mac()
50 key_data = keybuf; in compute_mac()
42 u_char keybuf[AES_128_KEY_SIZE]; compute_mac() local
/freebsd/sys/contrib/openzfs/cmd/zed/
H A Dzed_event.c272 char keybuf[MAXBUF]; in _zed_event_add_var() local
299 dstp = keybuf; in _zed_event_add_var()
300 lastp = keybuf + sizeof (keybuf); in _zed_event_add_var()
320 n = strlcpy(dstp, keybuf, buflen); in _zed_event_add_var()
324 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var()
336 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var()
347 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var()
349 } else if (zed_strings_add(zsp, keybuf, valbuf) < 0) { in _zed_event_add_var()
351 keybuf, eid, strerror(errno)); in _zed_event_add_var()
/freebsd/sys/geom/eli/
H A Dg_eli.c181 struct keybuf *keybuf; in zero_geli_intake_keys() local
184 if ((keybuf = get_keybuf()) != NULL) { in zero_geli_intake_keys()
186 for (i = 0; i < keybuf->kb_nents; i++) { in zero_geli_intake_keys()
187 if (keybuf->kb_ents[i].ke_type == KEYBUF_TYPE_GELI) { in zero_geli_intake_keys()
188 explicit_bzero(keybuf->kb_ents[i].ke_data, in zero_geli_intake_keys()
189 sizeof(keybuf->kb_ents[i].ke_data)); in zero_geli_intake_keys()
190 keybuf->kb_ents[i].ke_type = KEYBUF_TYPE_NONE; in zero_geli_intake_keys()
1330 struct keybuf *keybuf; in g_eli_taste() local
1375 if ((keybuf = get_keybuf()) != NULL) { in g_eli_taste()
1377 for (i = 0; i < keybuf->kb_nents; i++) { in g_eli_taste()
[all …]
/freebsd/lib/libc/gen/
H A Dgetpwent.c795 char keybuf[MAXLOGNAME + 1]; in files_passwd() local
813 keybuf[0] = _PW_KEYBYNAME; in files_passwd()
817 keybuf[0] = _PW_KEYBYUID; in files_passwd()
820 keybuf[0] = _PW_KEYBYNUM; in files_passwd()
847 key.data = keybuf; in files_passwd()
854 namesize = strlcpy(&keybuf[1], name, sizeof(keybuf)-1); in files_passwd()
855 if (namesize >= sizeof(keybuf)-1) { in files_passwd()
864 memcpy(&keybuf[1], &uid, sizeof(uid)); in files_passwd()
868 memcpy(&keybuf[1], &store, sizeof(store)); in files_passwd()
875 memcpy(&keybuf[1], &st->keynum, in files_passwd()
[all …]
/freebsd/contrib/wpa/src/eap_common/
H A Dikev2_common.c635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local
650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys()
651 if (keybuf == NULL) in ikev2_derive_sk_keys()
655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys()
656 os_free(keybuf); in ikev2_derive_sk_keys()
660 pos = keybuf; in ikev2_derive_sk_keys()
717 os_free(keybuf); in ikev2_derive_sk_keys()

12