/freebsd/stand/libsa/geli/ |
H A D | geli_metadata.c | 43 struct keybuf *keybuf; in geli_export_key_metadata() local 45 keybuf = malloc(GELI_KEYBUF_SIZE); in geli_export_key_metadata() 46 geli_export_key_buffer(keybuf); in geli_export_key_metadata() 47 file_addmetadata(kfp, MODINFOMD_KEYBUF, GELI_KEYBUF_SIZE, keybuf); in geli_export_key_metadata() 48 explicit_bzero(keybuf, GELI_KEYBUF_SIZE); in geli_export_key_metadata() 49 free(keybuf); in geli_export_key_metadata()
|
H A D | geliboot.h | 48 #define GELI_KEYBUF_SIZE (sizeof(struct keybuf) + \ 95 void geli_import_key_buffer(struct keybuf *keybuf); 96 void geli_export_key_buffer(struct keybuf *keybuf);
|
/freebsd/contrib/sendmail/libsm/ |
H A D | niprop.c | 77 char keybuf[1024]; variable 89 if (i >= sizeof keybuf) 91 (void) sm_strlcpyn(keybuf, sizeof keybuf, 2, keydir, "/"); 94 (void) sm_strlcat2(keybuf, keyprop, "=", sizeof keybuf); 96 (void) sm_strlcat(keybuf, keyval, sizeof keybuf); 101 keydir, keyprop, keyval, valprop, sepchar, keybuf); 149 if (ni_pathsearch(ni, &nid, keybuf) != 0)
|
/freebsd/contrib/sendmail/src/ |
H A D | udb.c | 140 char keybuf[MAXUDBKEY]; local 176 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop"); 179 if (keylen >= sizeof(keybuf)) 218 key.data = keybuf; 222 keybuf, keylen); 245 keybuf, keylen); 262 memcmp(key.data, keybuf, keylen) == 0) 359 (void) sm_strlcpyn(keybuf, sizeof(keybuf), 2, a->q_user, 361 keylen = strlen(keybuf); 362 key.data = keybuf; [all …]
|
H A D | map.c | 1930 char keybuf[MAXNAME + 1]; /* EAI:ok */ local 1944 if (key.dsize > sizeof(keybuf) - 1) 1945 key.dsize = sizeof(keybuf) - 1; 1946 memmove(keybuf, key.dptr, key.dsize); 1947 keybuf[key.dsize] = '\0'; 1948 makelower_buf(keybuf, keybuf, sizeof(keybuf)); 1949 key.dptr = keybuf; 2042 char keybuf[MAXNAME + 1]; /* EAI:ok */ local 2052 if (key.dsize > sizeof(keybuf) - 1) 2053 key.dsize = sizeof(keybuf) - 1; [all …]
|
/freebsd/stand/i386/common/ |
H A D | bootargs.h | 104 struct keybuf *keybuf; member 106 void *keybuf; member 120 gbdata->keybuf = malloc(sizeof(struct keybuf) + in export_geli_boot_data() 122 geli_export_key_buffer(gbdata->keybuf); in export_geli_boot_data() 133 geli_import_key_buffer(gbdata->keybuf); in import_geli_boot_data()
|
/freebsd/include/rpcsvc/ |
H A D | key_prot.x | 89 typedef opaque keybuf[HEXKEYBYTES]; /* store key in hex */ typedef 146 keybuf st_priv_key; 147 keybuf st_pub_key; 173 KEY_SET(keybuf) = 1; 215 KEY_SET(keybuf) = 1; 276 KEY_GET_CONV(keybuf) = 10;
|
/freebsd/usr.sbin/yp_mkdb/ |
H A D | yp_mkdb.c | 113 char *keybuf, *datbuf; in main() local 271 keybuf = (char *)&buf; in main() 281 if (*keybuf == '+' || *keybuf == '-' || in main() 289 if (strlen(keybuf) > YPMAXRECORD) { in main() 290 warnx("key too long: %s", keybuf); in main() 294 if (!strlen(keybuf)) { in main() 304 key.data = keybuf; in main() 305 key.size = strlen(keybuf); in main() 312 warnx("duplicate key '%s' - skipping", keybuf); in main()
|
/freebsd/lib/libc/db/test/hash.tests/ |
H A D | driver2.c | 55 char keybuf[2049]; local 78 key.data = keybuf; 80 bzero(keybuf, sizeof(keybuf)); 87 sprintf(keybuf, "Key #%d", i);
|
/freebsd/usr.sbin/keyserv/ |
H A D | setkey.c | 58 static int storesecretkey( uid_t, keybuf ); 85 pk_setkey(uid_t uid, keybuf skey) in pk_setkey() 197 pk_get_conv_key(uid_t uid, keybuf xpublic, cryptkeyres *result) in pk_get_conv_key() 372 storesecretkey(uid_t uid, keybuf key) in storesecretkey() 446 keybuf secret; 447 keybuf public; 465 memcpy(new->public, pub, sizeof (keybuf)); in writecache() 466 memcpy(new->secret, sec, sizeof (keybuf)); in writecache() 482 (memcmp(pub, (list)->public, sizeof (keybuf)) == 0 && \ in readcache() 483 memcmp(sec, (list)->secret, sizeof (keybuf)) == 0) in readcache()
|
H A D | keyserv.h | 5 extern keystatus pk_setkey( uid_t, keybuf ); 10 extern keystatus pk_get_conv_key( uid_t, keybuf, cryptkeyres * );
|
/freebsd/stand/efi/libefi/ |
H A D | efi_console.c | 98 static unsigned keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable 1238 if (keybuf[i] != 0) { in keybuf_getchar() 1239 c = keybuf[i]; in keybuf_getchar() 1240 keybuf[i] = 0; in keybuf_getchar() 1254 if (keybuf[i] != 0) in keybuf_ischar() 1261 * We are not reading input before keybuf is empty, so we are safe 1262 * just to fill keybuf from the beginning. 1270 keybuf[0] = 0x1b; /* esc */ in keybuf_inschar() 1271 keybuf[ in keybuf_inschar() [all...] |
/freebsd/secure/lib/libcrypt/ |
H A D | crypt-des.c | 592 u_int32_t count, salt, l, r0, r1, keybuf[2]; in crypt_des() local 602 q = (u_char *)keybuf; in crypt_des() 603 while (q - (u_char *)keybuf - 8) { in crypt_des() 608 if (des_setkey((char *)keybuf)) in crypt_des() 627 if (des_cipher((char *)keybuf, (char *)keybuf, 0L, 1)) in crypt_des() 632 q = (u_char *)keybuf; in crypt_des() 633 while (q - (u_char *)keybuf - 8 && *key) in crypt_des() 636 if (des_setkey((char *)keybuf)) in crypt_des()
|
/freebsd/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.c | 220 uint8_t keybuf[PTW_KSBYTES]; in correct() local 224 memcpy(&keybuf[IVBYTES], key, keylen); in correct() 225 memcpy(keybuf, state->sessions[i].iv, IVBYTES); in correct() 226 rc4init(keybuf, keylen+IVBYTES, &rc4state); in correct() 361 int PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) { in PTW_computeKey() argument 403 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, simple)) { in PTW_computeKey() 415 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, onestrong)) { in PTW_computeKey() 421 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, twostrong)) { in PTW_computeKey()
|
/freebsd/sys/crypto/ |
H A D | intake.h | 52 struct keybuf { struct 59 extern struct keybuf* get_keybuf(void); argument
|
/freebsd/stand/i386/libi386/ |
H A D | vidconsole.c | 85 static uint8_t keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable 1076 if (keybuf[i] != 0) { in vidc_getchar() 1077 c = keybuf[i]; in vidc_getchar() 1078 keybuf[i] = 0; in vidc_getchar() 1095 keybuf[0] = '['; in vidc_getchar() 1096 keybuf[1] = 'A'; in vidc_getchar() 1099 keybuf[0] = '['; in vidc_getchar() 1100 keybuf[1] = 'D'; in vidc_getchar() 1103 keybuf[0] = '['; in vidc_getchar() 1104 keybuf[1] = 'C'; in vidc_getchar() [all …]
|
/freebsd/sbin/restore/ |
H A D | restore.c | 487 static char keybuf[32]; in keyval() local 489 (void) strcpy(keybuf, "|NIL"); in keyval() 490 keybuf[0] = '\0'; in keyval() 492 (void) strcat(keybuf, "|ONTAPE"); in keyval() 494 (void) strcat(keybuf, "|INOFND"); in keyval() 496 (void) strcat(keybuf, "|NAMEFND"); in keyval() 498 (void) strcat(keybuf, "|MODECHG"); in keyval() 499 return (&keybuf[1]); in keyval()
|
/freebsd/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 97 u_char keybuf[AES_128_KEY_SIZE]; in make_mac() 101 memcpy(keybuf, keyptr, key->len); in make_mac() 102 zero_mem((keybuf + key->len), in make_mac() 104 keyptr = keybuf; in make_mac() 67 u_char keybuf[AES_128_KEY_SIZE]; make_mac() local
|
/freebsd/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 828 unsigned char keybuf[20]; in do_PVK_body_key() local 860 if (!derive_pvk_key(keybuf, p, saltlen, in do_PVK_body_key() 875 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 884 memset(keybuf + 5, 0, 11); in do_PVK_body_key() 885 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 911 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key() 1056 unsigned char keybuf[20]; in i2b_PVK() local 1066 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, in i2b_PVK() 1072 memset(keybuf + 5, 0, 11); in i2b_PVK() 1074 if (!EVP_EncryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in i2b_PVK() [all …]
|
/freebsd/usr.sbin/ypldap/ |
H A D | yp.c | 654 static char keybuf[YPMAXRECORD+1]; in yp_make_keyval() local 657 memset(keybuf, 0, sizeof(keybuf)); in yp_make_keyval() 660 (void)strlcpy(keybuf, key, sizeof(keybuf)); in yp_make_keyval() 661 res->key.keydat_len = strlen(keybuf); in yp_make_keyval() 662 res->key.keydat_val = keybuf; in yp_make_keyval() 672 log_debug("sending out %s => %s", keybuf, buf); in yp_make_keyval()
|
/freebsd/contrib/ntp/sntp/ |
H A D | crypto.c | 43 u_char keybuf[AES_128_KEY_SIZE]; in compute_mac() 47 memcpy(keybuf, key_data, key_size); in compute_mac() 48 memset((keybuf + key_size), 0, in compute_mac() 50 key_data = keybuf; in compute_mac() 42 u_char keybuf[AES_128_KEY_SIZE]; compute_mac() local
|
/freebsd/sys/contrib/openzfs/cmd/zed/ |
H A D | zed_event.c | 272 char keybuf[MAXBUF]; in _zed_event_add_var() local 299 dstp = keybuf; in _zed_event_add_var() 300 lastp = keybuf + sizeof (keybuf); in _zed_event_add_var() 320 n = strlcpy(dstp, keybuf, buflen); in _zed_event_add_var() 324 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var() 336 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var() 347 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var() 349 } else if (zed_strings_add(zsp, keybuf, valbuf) < 0) { in _zed_event_add_var() 351 keybuf, eid, strerror(errno)); in _zed_event_add_var()
|
/freebsd/sys/geom/eli/ |
H A D | g_eli.c | 181 struct keybuf *keybuf; in zero_geli_intake_keys() local 184 if ((keybuf = get_keybuf()) != NULL) { in zero_geli_intake_keys() 186 for (i = 0; i < keybuf->kb_nents; i++) { in zero_geli_intake_keys() 187 if (keybuf->kb_ents[i].ke_type == KEYBUF_TYPE_GELI) { in zero_geli_intake_keys() 188 explicit_bzero(keybuf->kb_ents[i].ke_data, in zero_geli_intake_keys() 189 sizeof(keybuf->kb_ents[i].ke_data)); in zero_geli_intake_keys() 190 keybuf->kb_ents[i].ke_type = KEYBUF_TYPE_NONE; in zero_geli_intake_keys() 1330 struct keybuf *keybuf; in g_eli_taste() local 1375 if ((keybuf = get_keybuf()) != NULL) { in g_eli_taste() 1377 for (i = 0; i < keybuf->kb_nents; i++) { in g_eli_taste() [all …]
|
/freebsd/lib/libc/gen/ |
H A D | getpwent.c | 795 char keybuf[MAXLOGNAME + 1]; in files_passwd() local 813 keybuf[0] = _PW_KEYBYNAME; in files_passwd() 817 keybuf[0] = _PW_KEYBYUID; in files_passwd() 820 keybuf[0] = _PW_KEYBYNUM; in files_passwd() 847 key.data = keybuf; in files_passwd() 854 namesize = strlcpy(&keybuf[1], name, sizeof(keybuf)-1); in files_passwd() 855 if (namesize >= sizeof(keybuf)-1) { in files_passwd() 864 memcpy(&keybuf[1], &uid, sizeof(uid)); in files_passwd() 868 memcpy(&keybuf[1], &store, sizeof(store)); in files_passwd() 875 memcpy(&keybuf[1], &st->keynum, in files_passwd() [all …]
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local 650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys() 651 if (keybuf == NULL) in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 656 os_free(keybuf); in ikev2_derive_sk_keys() 660 pos = keybuf; in ikev2_derive_sk_keys() 717 os_free(keybuf); in ikev2_derive_sk_keys()
|