/freebsd/sbin/decryptcore/ |
H A D | decryptcore.c | 77 read_key(int kfd) in read_key() argument 83 PJDLOG_ASSERT(kfd >= 0); in read_key() 92 size = read(kfd, kdk, kdksize); in read_key() 101 size += read(kfd, &kdk->kdk_encryptedkey, in read_key() 126 int ifd, kfd, olen, privkeysize; in decrypt() local 154 kfd = open(keyfile, O_RDONLY); in decrypt() 155 if (kfd == -1) { in decrypt() 201 kdk = read_key(kfd); in decrypt() 202 close(kfd); in decrypt()
|
/freebsd/crypto/heimdal/appl/kf/ |
H A D | Makefile.am | 7 libexec_PROGRAMS = kfd program 9 man_MANS = kf.1 kfd.8 13 kfd_SOURCES = kfd.c kf_locl.h
|
H A D | Makefile.in | 47 libexec_PROGRAMS = kfd$(EXEEXT) 110 am_kfd_OBJECTS = kfd.$(OBJEXT) 402 man_MANS = kf.1 kfd.8 404 kfd_SOURCES = kfd.c kf_locl.h 534 kfd$(EXEEXT): $(kfd_OBJECTS) $(kfd_DEPENDENCIES) 535 @rm -f kfd$(EXEEXT) 545 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/kfd.Po@am__quote@
|
/freebsd/sbin/ipf/ipsend/ |
H A D | sock.c | 100 static int kfd = -1; in kmemcpy() local 103 if (kfd == -1) in kmemcpy() 104 kfd = open(KMEM, O_RDONLY); in kmemcpy() 106 if (lseek(kfd, offset, SEEK_SET) == -1) in kmemcpy() 111 if (read(kfd, buf, n) == -1) in kmemcpy()
|
/freebsd/kerberos5/libexec/kfd/ |
H A D | Makefile | 3 PROG= kfd 4 MAN= kfd.8
|
/freebsd/tools/tools/kttcp/ |
H A D | kttcp.c | 104 int c, error, s, verbose, s2, kfd; in main() local 193 if ((kfd = open(KTTCP_DEVICE, O_RDWR, 666)) == -1) in main() 258 if (ioctl(kfd, cmd, &kio) == -1) in main() 302 close(kfd); in main()
|
/freebsd/libexec/rc/rc.d/ |
H A D | kfd | 11 name=kfd
|
H A D | Makefile | 270 _kfd= kfd
|
/freebsd/kerberos5/libexec/ |
H A D | Makefile | 4 kdigest kfd kimpersonate kpasswdd kcm
|
/freebsd/sbin/gbde/ |
H A D | gbde.c |
|
/freebsd/sys/contrib/openzfs/lib/libzfs/ |
H A D | libzfs_crypto.c | 586 int kfd = -1; in get_key_material_https() local 588 kfd = open(getenv("TMPDIR") ?: "/tmp", in get_key_material_https() 590 if (kfd != -1) in get_key_material_https() 603 kfd = mkostemps(path, strlen(".https"), O_CLOEXEC); in get_key_material_https() 604 if (kfd == -1) { in get_key_material_https() 616 if ((key = fdopen(kfd, "r+")) == NULL) { in get_key_material_https() 618 (void) close(kfd); in get_key_material_https()
|
/freebsd/targets/pseudo/userland/kerberos5/ |
H A D | Makefile.depend | 34 kerberos5/libexec/kfd \
|
/freebsd/contrib/wpa/src/utils/ |
H A D | eloop.c | 1345 int kfd; in eloop_wait_for_read_sock() local 1348 kfd = kqueue(); in eloop_wait_for_read_sock() 1349 if (kfd == -1) in eloop_wait_for_read_sock() 1352 kevent(kfd, &ke1, 1, &ke2, 1, NULL); in eloop_wait_for_read_sock() 1353 close(kfd); in eloop_wait_for_read_sock()
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.1999 | 666 * appl/kf/kfd.c (proto): be more careful with the return value 700 * appl/kf/kfd.c: make v6 friendly and simplify 739 * appl/kf/kfd.c: add regpag support. From Miroslav Ruda 890 * appl/kf/kfd.c: clean-up and more paranoia
|
H A D | ChangeLog.2002 | 144 * appl/kf/kfd.c: use krb5_err instead of sysloging directly,
|
H A D | ChangeLog.2005 | 1129 * appl/kf/kfd.c: case uid_t to unsigned long in printf format 1913 * appl/kf/kfd.c (kfd_match_version): cast argument to islower to
|
H A D | ChangeLog.2001 | 1092 * appl/kf/kfd.c (proto): use krb5_rd_cred2 instead of krb5_rd_cred
|
H A D | ChangeLog.2003 | 1315 * appl/kf/kfd.c: use strlcpy, from openbsd
|
/freebsd/tools/build/mk/ |
H A D | OptionalObsoleteFiles.inc | 2875 OLD_FILES+=usr/libexec/kfd
|