/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | default_keys.c | 40 print_keys(krb5_context context, Key *keys, size_t nkeys) in print_keys() argument 48 for (i = 0; i < nkeys; i++) { in print_keys() 85 size_t nkeys; in parse_file() local 88 ret = hdb_generate_key_set(context, principal, &keys, &nkeys, no_salt); in parse_file() 92 print_keys(context, keys, nkeys); in parse_file() 94 hdb_free_keys(context, nkeys, keys); in parse_file()
|
/freebsd/crypto/openssh/regress/ |
H A D | hostkey-rotate.sh | 40 nkeys=0 45 nkeys=`expr $nkeys + 1` 93 expect_nkeys $nkeys "learn hostkeys" 106 expect_nkeys $nkeys "learn hostkeys $k" 119 expect_nkeys $nkeys "learn hostkeys" 132 expect_nkeys `expr $nkeys + 1` "learn hostkeys" 144 expect_nkeys $nkeys "learn hostkeys"
|
/freebsd/crypto/openssh/ |
H A D | ssh-pkcs11.c | 691 pkcs11_key_included(struct sshkey ***keysp, int *nkeys, struct sshkey *key) in pkcs11_key_included() argument 695 for (i = 0; i < *nkeys; i++) in pkcs11_key_included() 1109 struct sshkey ***keysp, char ***labelsp, int *nkeys) in pkcs11_fetch_certs() argument 1178 if (pkcs11_key_included(keysp, nkeys, key)) { in pkcs11_fetch_certs() 1183 *keysp = xrecallocarray(*keysp, *nkeys, in pkcs11_fetch_certs() 1184 *nkeys + 1, sizeof(struct sshkey *)); in pkcs11_fetch_certs() 1185 (*keysp)[*nkeys] = key; in pkcs11_fetch_certs() 1187 *labelsp = xrecallocarray(*labelsp, *nkeys, in pkcs11_fetch_certs() 1188 *nkeys + 1, sizeof(char *)); in pkcs11_fetch_certs() 1189 (*labelsp)[*nkeys] = xstrdup((char *)label); in pkcs11_fetch_certs() [all …]
|
H A D | ssh-add.c | 342 for (i = 0; i < idlist->nkeys; i++) { in add_file() 548 for (i = 0; i < idlist->nkeys; i++) { in list_identities() 739 hke->file, hke->line, dch->nkeys); in parse_dest_constraint_hop() 740 dch->keys = xrecallocarray(dch->keys, dch->nkeys, in parse_dest_constraint_hop() 741 dch->nkeys + 1, sizeof(*dch->keys)); in parse_dest_constraint_hop() 742 dch->key_is_ca = xrecallocarray(dch->key_is_ca, dch->nkeys, in parse_dest_constraint_hop() 743 dch->nkeys + 1, sizeof(*dch->key_is_ca)); in parse_dest_constraint_hop() 745 &(dch->keys[dch->nkeys]))) != 0) in parse_dest_constraint_hop() 747 dch->key_is_ca[dch->nkeys] = want_ca; in parse_dest_constraint_hop() 748 dch->nkeys++; in parse_dest_constraint_hop() [all …]
|
H A D | ssh-pkcs11-client.c | 593 u_int nkeys, i; in pkcs11_add_provider() local 612 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) in pkcs11_add_provider() 614 *keysp = xcalloc(nkeys, sizeof(struct sshkey *)); in pkcs11_add_provider() 616 *labelsp = xcalloc(nkeys, sizeof(char *)); in pkcs11_add_provider() 617 for (i = 0; i < nkeys; i++) { in pkcs11_add_provider() 633 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) in pkcs11_add_provider() 634 nkeys = -1; in pkcs11_add_provider() 636 nkeys = -1; in pkcs11_add_provider() 639 return (nkeys); in pkcs11_add_provider()
|
H A D | ssh-agent.c | 255 for (i = 0; i < dch->nkeys; i++) in free_dest_constraint_hop() 284 out->nkeys = dch->nkeys; in dup_dest_constraint_hop() 285 out->keys = out->nkeys == 0 ? NULL : in dup_dest_constraint_hop() 286 xcalloc(out->nkeys, sizeof(*out->keys)); in dup_dest_constraint_hop() 287 out->key_is_ca = out->nkeys == 0 ? NULL : in dup_dest_constraint_hop() 288 xcalloc(out->nkeys, sizeof(*out->key_is_ca)); in dup_dest_constraint_hop() 289 for (i = 0; i < dch->nkeys; i++) { in dup_dest_constraint_hop() 325 dch->is_ca, dch->nkeys); in dump_dest_constraint_hop() 326 for (i = 0; i < dch->nkeys; i++) { in dump_dest_constraint_hop() 332 debug_f("key %u/%u: %s%s%s key_is_ca %d", i, dch->nkeys, in dump_dest_constraint_hop() [all …]
|
H A D | ssh-pkcs11-helper.c | 123 int r, i, nkeys; in process_add() local 134 if ((nkeys = pkcs11_add_provider(name, pin, &keys, &labels)) > 0) { in process_add() 137 (r = sshbuf_put_u32(msg, nkeys)) != 0) in process_add() 139 for (i = 0; i < nkeys; i++) { in process_add() 152 (r = sshbuf_put_u32(msg, -nkeys)) != 0) in process_add()
|
H A D | authfd.h | 24 size_t nkeys; member 34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ member
|
H A D | clientloop.c | 2044 size_t nkeys, nnew, nincomplete; /* total, new keys, incomplete match */ 2068 for (i = 0; i < ctx->nkeys; i++) in hostkeys_update_ctx_free() 2116 for (i = 0; i < ctx->nkeys; i++) { in hostkeys_find() 2165 for (i = 0; i < ctx->nkeys; i++) { in hostkeys_find() 2261 for (i = 0; i < ctx->nkeys; i++) { in update_known_hosts() 2337 i == 0 ? ctx->keys : NULL, i == 0 ? ctx->nkeys : 0, in update_known_hosts() 2377 for (ndone = i = 0; i < ctx->nkeys; i++) { in client_global_hostkeys_prove_confirm() 2520 for (i = 0; i < ctx->nkeys; i++) { in client_input_hostkeys() 2528 if ((tmp = recallocarray(ctx->keys, ctx->nkeys, ctx->nkeys in client_input_hostkeys() 2043 size_t nkeys, nnew, nincomplete; /* total, new keys, incomplete match */ global() member [all...] |
H A D | hostfile.c | 546 size_t nkeys; member 564 for (i = 0; i < ctx->nkeys; i++) { in host_delete() 596 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) in hostfile_replace_entries() argument 614 if ((ctx.match_keys = calloc(nkeys, sizeof(*ctx.match_keys))) == NULL) in hostfile_replace_entries() 617 ctx.nkeys = nkeys; in hostfile_replace_entries() 653 for (i = 0; i < nkeys; i++) { in hostfile_replace_entries()
|
H A D | authfd.c | 324 idl->nkeys = num; in ssh_fetch_identitylist() 342 for (i = 0; i < idl->nkeys; i++) { in ssh_free_identitylist() 368 for (i = 0; i < idlist->nkeys; i++) { in ssh_agent_has_key() 471 for (i = 0; i < dch->nkeys; i++) { in encode_dest_constraint_hop()
|
H A D | sshconnect.h | 30 int nkeys; member
|
H A D | ssh.c | 1673 sensitive_data.nkeys = 0; in main() 1678 sensitive_data.nkeys = 10; in main() 1679 sensitive_data.keys = xcalloc(sensitive_data.nkeys, in main() 1684 if ((o) >= sensitive_data.nkeys) \ in main() 1695 if ((o) >= sensitive_data.nkeys) \ in main() 1782 if (sensitive_data.nkeys != 0) { in main() 1783 for (i = 0; i < sensitive_data.nkeys; i++) { in main() 2349 int nkeys; in load_public_identity_files() local 2366 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, in load_public_identity_files() 2368 for (i = 0; i < nkeys; i++) { in load_public_identity_files()
|
H A D | hostfile.h | 56 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
|
H A D | sshd.c | 778 u_int i, nkeys; local 788 for (i = nkeys = 0; i < options.num_host_key_files; i++) { 797 if (nkeys == 0) { 813 nkeys++; 815 debug3_f("sent %u hostkeys", nkeys); 816 if (nkeys == 0)
|
H A D | ssh-keygen.c | 854 int i, nkeys; in do_download() local 863 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys, &comments); in do_download() 864 if (nkeys <= 0) in do_download() 866 for (i = 0; i < nkeys; i++) { in do_download() 1728 int r, i, nkeys; in load_pkcs11_key() local 1733 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, in load_pkcs11_key() 1735 debug3_f("%d keys", nkeys); in load_pkcs11_key() 1736 if (nkeys <= 0) in load_pkcs11_key() 1738 for (i = 0; i < nkeys; i++) { in load_pkcs11_key() 1801 for (j = 0; j < agent_ids->nkeys; j++) { in do_ca_sign()
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | collector.c | 290 size_t i, nkeys; in _hx509_collector_collect_private_keys() local 294 for (i = 0, nkeys = 0; i < c->val.len; i++) in _hx509_collector_collect_private_keys() 296 nkeys++; in _hx509_collector_collect_private_keys() 298 *keys = calloc(nkeys + 1, sizeof(**keys)); in _hx509_collector_collect_private_keys() 304 for (i = 0, nkeys = 0; i < c->val.len; i++) { in _hx509_collector_collect_private_keys() 306 (*keys)[nkeys++] = c->val.data[i]->private_key; in _hx509_collector_collect_private_keys() 310 (*keys)[nkeys] = NULL; in _hx509_collector_collect_private_keys()
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 30 size_t nkeys; member 128 ((size_t)pubkey->type < st->nkeys && in store_key() 131 if ((size_t)pubkey->type >= st->nkeys) { in store_key() 133 st->nkeys, pubkey->type + 1, sizeof(*st->pubkeys)); in store_key() 135 st->nkeys, privkey->type + 1, sizeof(*st->privkeys)); in store_key() 136 st->nkeys = privkey->type + 1; in store_key() 159 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_pubkey() 168 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_privkey()
|
/freebsd/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 162 int nkeys, nullok, pam_err, pass; in pam_sm_authenticate() local 179 nkeys = 0; in pam_sm_authenticate() 199 ++nkeys; in pam_sm_authenticate() 211 if (nkeys == 0 && pass == 1 && in pam_sm_authenticate() 219 if (nkeys == 0) in pam_sm_authenticate()
|
/freebsd/lib/libc/db/btree/ |
H A D | bt_debug.c | 247 u_long ifree, lfree, nkeys; in __bt_stat() local 252 nkeys = ifree = lfree = 0; in __bt_stat() 265 nkeys += NEXTINDEX(h); in __bt_stat() 286 levels, levels == 1 ? "" : "s", nkeys); in __bt_stat()
|
/freebsd/sbin/gbde/ |
H A D | gbde.c |
|
/freebsd/lib/libc/db/hash/ |
H A D | hash.h | 78 int32_t nkeys; /* Number of keys in hash table */ member 282 #define NKEYS hdr.nkeys
|
H A D | hash.c | 924 P_32_COPY(srcp->nkeys, destp->nkeys); in swap_header_copy() 955 M_32_SWAP(hdrp->nkeys); in swap_header()
|
/freebsd/tools/tools/ath/athregs/ |
H A D | dumpregs.c | 65 static void ath_hal_dumpkeycache(FILE *fd, int nkeys); 663 ath_hal_dumpkeycache(FILE *fd, int nkeys) in ath_hal_dumpkeycache() argument 683 for (entry = 0; entry < nkeys; entry++) { in ath_hal_dumpkeycache()
|
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.c | 168 int nkeys; /* MV keys */ variable 413 nkeys = OPT_VALUE_MV_PARAMS; in main() 417 nkeys = OPT_VALUE_MV_KEYS; in main() 1593 n = nkeys; in gen_mvkey()
|