| /netbsd-src/external/bsd/wpa/dist/src/eap_common/ |
| H A D | ikev2_common.c | 371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument 380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument 440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload() 441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload() 476 if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len, in ikev2_decrypt_payload() 499 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, in ikev2_decrypt_payload() 530 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, in ikev2_build_encrypted() argument 540 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| H A D | set_keys.c | 51 Key *keys; in _kadm5_set_keys() local 59 &keys, &num_keys); in _kadm5_set_keys() 63 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); in _kadm5_set_keys() 64 ent->keys.val = keys; in _kadm5_set_keys() 65 ent->keys.len = num_keys; in _kadm5_set_keys() 115 Keys keys; in _kadm5_set_keys2() local 127 free_Keys(&ent->keys); in _kadm5_set_keys2() 131 memset(&keys, 0, sizeof (keys)); in _kadm5_set_keys2() 181 ret = add_Keys(&keys, &key); in _kadm5_set_keys2() 208 ret = add_Keys(&hkset.keys, &key); in _kadm5_set_keys2() [all …]
|
| H A D | default_keys.c | 42 print_keys(krb5_context context, Key *keys, size_t nkeys) in print_keys() argument 52 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); in print_keys() 55 (int)keys[i].key.keytype); in print_keys() 60 if (keys[i].salt) { in print_keys() 63 switch (keys[i].salt->type) { in print_keys() 71 printf("unknown salt: %d", keys[i].salt->type); in print_keys() 74 if (keys[i].salt->salt.length) in print_keys() 75 printf("%.*s", (int)keys[i].salt->salt.length, in print_keys() 76 (char *)keys[i].salt->salt.data); in print_keys() 88 Key *keys; in parse_file() local [all …]
|
| H A D | keys.c | 46 int len, Key *keys) in _kadm5_free_keys() argument 48 hdb_free_keys(context, len, keys); in _kadm5_free_keys() 56 _kadm5_init_keys (Key *keys, int len) in _kadm5_init_keys() argument 61 keys[i].mkvno = NULL; in _kadm5_init_keys() 62 keys[i].salt = NULL; in _kadm5_init_keys() 63 keys[i].key.keyvalue.length = 0; in _kadm5_init_keys() 64 keys[i].key.keyvalue.data = NULL; in _kadm5_init_keys() 128 hist_keys->val[i].keys.val, in _kadm5_exists_keys_hist() 129 hist_keys->val[i].keys.len)) in _kadm5_exists_keys_hist()
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| H A D | ks_mem.c | 50 hx509_private_key *keys; member 82 for (i = 0; mem->keys && mem->keys[i]; i++) in mem_free() 83 hx509_private_key_free(&mem->keys[i]); in mem_free() 84 free(mem->keys); in mem_free() 160 hx509_private_key **keys) in mem_getkeys() argument 165 for (i = 0; mem->keys && mem->keys[i]; i++) in mem_getkeys() 167 *keys = calloc(i + 1, sizeof(**keys)); in mem_getkeys() 168 for (i = 0; mem->keys && mem->keys[i]; i++) { in mem_getkeys() 169 (*keys)[i] = _hx509_private_key_ref(mem->keys[i]); in mem_getkeys() 170 if ((*keys)[i] == NULL) { in mem_getkeys() [all …]
|
| /netbsd-src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kx/ |
| H A D | crypto_kx.c | 42 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; in crypto_kx_client_session_keys() local 57 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX); in crypto_kx_client_session_keys() 58 crypto_generichash_init(&h, NULL, 0U, sizeof keys); in crypto_kx_client_session_keys() 63 crypto_generichash_final(&h, keys, sizeof keys); in crypto_kx_client_session_keys() 66 rx[i] = keys[i]; in crypto_kx_client_session_keys() 67 tx[i] = keys[i + crypto_kx_SESSIONKEYBYTES]; in crypto_kx_client_session_keys() 69 sodium_memzero(keys, sizeof keys); in crypto_kx_client_session_keys() 83 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; in crypto_kx_server_session_keys() local 98 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX); in crypto_kx_server_session_keys() 99 crypto_generichash_init(&h, NULL, 0U, sizeof keys); in crypto_kx_server_session_keys() [all …]
|
| /netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/ |
| H A D | ipkeylist.c | 32 ipkl->keys = NULL; in dns_ipkeylist_init() 56 if (ipkl->keys != NULL) { in dns_ipkeylist_clear() 58 if (ipkl->keys[i] == NULL) { in dns_ipkeylist_clear() 61 if (dns_name_dynamic(ipkl->keys[i])) { in dns_ipkeylist_clear() 62 dns_name_free(ipkl->keys[i], mctx); in dns_ipkeylist_clear() 64 isc_mem_put(mctx, ipkl->keys[i], sizeof(dns_name_t)); in dns_ipkeylist_clear() 66 isc_mem_put(mctx, ipkl->keys, in dns_ipkeylist_clear() 113 if (src->keys != NULL) { in dns_ipkeylist_copy() 115 if (src->keys[i] != NULL) { in dns_ipkeylist_copy() 116 dst->keys[i] = isc_mem_get(mctx, in dns_ipkeylist_copy() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/kadmin/ |
| H A D | ext.c | 50 krb5_keytab_entry *keys = NULL; in do_ext_keytab() local 93 keys = calloc(sizeof(*keys), princ.n_key_data); in do_ext_keytab() 94 if (keys == NULL) { in do_ext_keytab() 105 keys[i].principal = princ.principal; in do_ext_keytab() 106 keys[i].vno = kd->key_data_kvno; in do_ext_keytab() 107 keys[i].keyblock.keytype = kd->key_data_type[0]; in do_ext_keytab() 108 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; in do_ext_keytab() 109 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0]; in do_ext_keytab() 110 keys[i].timestamp = time(NULL); in do_ext_keytab() 118 keys = calloc(sizeof(*keys), n_k); in do_ext_keytab() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| H A D | salt-des3.c | 50 DES_cblock keys[3]; in DES3_string_to_key() local 73 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); in DES3_string_to_key() 74 DES_set_odd_parity(keys + i); in DES3_string_to_key() 75 if(DES_is_weak_key(keys + i)) in DES3_string_to_key() 76 _krb5_xor8(*(keys + i), (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); in DES3_string_to_key() 77 DES_set_key_unchecked(keys + i, &s[i]); in DES3_string_to_key() 86 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); in DES3_string_to_key() 87 DES_set_odd_parity(keys + i); in DES3_string_to_key() 88 if(DES_is_weak_key(keys + i)) in DES3_string_to_key() 89 _krb5_xor8(*(keys + i), (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); in DES3_string_to_key() [all …]
|
| /netbsd-src/external/mpl/bind/dist/lib/dns/ |
| H A D | ipkeylist.c | 32 ipkl->keys = NULL; in dns_ipkeylist_init() 55 if (ipkl->keys != NULL) { in dns_ipkeylist_clear() 57 if (ipkl->keys[i] != NULL) { in dns_ipkeylist_clear() 58 if (dns_name_dynamic(ipkl->keys[i])) { in dns_ipkeylist_clear() 59 dns_name_free(ipkl->keys[i], mctx); in dns_ipkeylist_clear() 61 isc_mem_put(mctx, ipkl->keys[i], in dns_ipkeylist_clear() 62 sizeof(*ipkl->keys[i])); in dns_ipkeylist_clear() 65 isc_mem_cput(mctx, ipkl->keys, ipkl->allocated, in dns_ipkeylist_clear() 66 sizeof(ipkl->keys[0])); in dns_ipkeylist_clear() 126 if (src->keys ! in dns_ipkeylist_copy() 163 dns_name_t **keys = NULL; dns_ipkeylist_resize() local [all...] |
| /netbsd-src/usr.sbin/mtree/ |
| H A D | create.c | 172 if (sflag && keys & F_CKSUM) in cwalk() 182 if ((keys & flag) == 0) 242 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) { in statf() 243 if (keys & F_UNAME && in statf() 246 if (keys & F_UID || (keys & F_UNAME && name == NULL)) in statf() 250 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) { in statf() 251 if (keys & F_GNAME && in statf() 254 if (keys & F_GID || (keys in statf() [all...] |
| /netbsd-src/external/bsd/ntp/dist/sntp/tests/ |
| H A D | keyFile.c | 74 struct key * keys = NULL; in test_ReadEmptyKeyFile() local 78 TEST_ASSERT_EQUAL(0, auth_init(path, &keys)); in test_ReadEmptyKeyFile() 79 TEST_ASSERT_NULL(keys); in test_ReadEmptyKeyFile() 88 struct key * keys = NULL; in test_ReadASCIIKeys() local 93 TEST_ASSERT_EQUAL(2, auth_init(path, &keys)); in test_ReadASCIIKeys() 94 TEST_ASSERT_NOT_NULL(keys); in test_ReadASCIIKeys() 112 struct key * keys = NULL; in test_ReadHexKeys() local 119 TEST_ASSERT_EQUAL(3, auth_init(path, &keys)); in test_ReadHexKeys() 120 TEST_ASSERT_NOT_NULL(keys); in test_ReadHexKeys() 147 struct key * keys = NULL; in test_ReadKeyFileWithComments() local [all …]
|
| /netbsd-src/external/bsd/openldap/dist/contrib/slapd-modules/smbk5pwd/ |
| H A D | smbk5pwd.c | 307 ent.keys.len = 1; in k5key_chk() 308 ent.keys.val = &ekey; in k5key_chk() 310 (size_t) a->a_vals[0].bv_len, &ent.keys.val[0], &l); in k5key_chk() 370 struct berval *keys; in smbk5pwd_exop_passwd() local 403 qpw->rs_new.bv_val, &ent.keys.val, &nkeys); in smbk5pwd_exop_passwd() 404 ent.keys.len = nkeys; in smbk5pwd_exop_passwd() 408 keys = ch_malloc( (ent.keys.len + 1) * sizeof(struct berval)); in smbk5pwd_exop_passwd() 410 for (i = 0; i < ent.keys.len; i++) { in smbk5pwd_exop_passwd() 414 ASN1_MALLOC_ENCODE(Key, buf, len, &ent.keys.val[i], &len, ret); in smbk5pwd_exop_passwd() 418 keys[i].bv_val = (char *)buf; in smbk5pwd_exop_passwd() [all …]
|
| /netbsd-src/external/ibm-public/postfix/dist/src/tls/ |
| H A D | tls_scache.c | 183 static TLS_TICKET_KEY *keys[2]; variable 554 for (i = 0; i < 2 && keys[i]; ++i) { in tls_scache_key() 555 if (memcmp(keyname, keys[i]->name, TLS_TICKET_NAMELEN) == 0) { in tls_scache_key() 556 if (timecmp(keys[i]->tout + timeout, now) > 0) in tls_scache_key() 557 return (keys[i]); in tls_scache_key() 561 } else if (keys[0]) { in tls_scache_key() 562 if (timecmp(keys[0]->tout, now) > 0) in tls_scache_key() 563 return (keys[0]); in tls_scache_key() 577 if (keys[1] == 0) in tls_scache_key_rotate() 578 keys[1] = (TLS_TICKET_KEY *) mymalloc(sizeof(*newkey)); in tls_scache_key_rotate() [all …]
|
| /netbsd-src/external/bsd/libarchive/dist/libarchive/ |
| H A D | archive_write_set_format_mtree.c | 137 int keys; member 171 int keys; member 441 int keys, oldkeys, effkeys; in write_global() local 445 keys = mtree->keys & SET_KEYS; in write_global() 446 oldkeys = mtree->set.keys; in write_global() 447 effkeys = keys; in write_global() 487 keys &= ~(F_UNAME | F_UID); in write_global() 489 keys &= ~(F_GNAME | F_GID); in write_global() 491 keys &= ~F_MODE; in write_global() 493 keys &= ~F_FLAGS; in write_global() [all …]
|
| /netbsd-src/games/tetris/ |
| H A D | tetris.c | 134 const char *keys; in main() local 151 keys = "jkl pqn"; in main() 159 if (strlen(keys = optarg) != NUMKEYS) in main() 195 if (keys[i] == keys[j]) { in main() 199 if (keys[i] == ' ') in main() 202 key_write[i][0] = keys[i]; in main() 261 if (c == keys[5]) { in main() 265 if (c == keys[4]) { in main() 281 if (c == keys[0]) { in main() 287 if (c == keys[1]) { in main() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| H A D | keys.c | 58 hdb_free_keys(krb5_context context, int len, Key *keys) in hdb_free_keys() argument 63 free(keys[i].mkvno); in hdb_free_keys() 64 keys[i].mkvno = NULL; in hdb_free_keys() 65 if (keys[i].salt != NULL) { in hdb_free_keys() 66 free_Salt(keys[i].salt); in hdb_free_keys() 67 free(keys[i].salt); in hdb_free_keys() 68 keys[i].salt = NULL; in hdb_free_keys() 70 krb5_free_keyblock_contents(context, &keys[i].key); in hdb_free_keys() 72 free (keys); in hdb_free_keys() 227 HDB_Ext_KeySet *keys; in hdb_prune_keys() local [all …]
|
| /netbsd-src/external/bsd/ntp/dist/ntpd/ |
| H A D | ntp.keys.texi | 3 @setfilename ntp.keys.info 15 * ntp.keys: (ntp.keys). NTP's Symmetric Key file 20 @subtitle ntp.keys, version @value{VERSION}, @value{UPDATED} 27 @node Top, ntp.keys Description, (dir), (dir) 33 This document applies to version @value{VERSION} of @code{ntp.keys}. 38 * ntp.keys Description:: 39 * ntp.keys Notes:: 42 @node ntp.keys Description, , Top, Top 47 be specified in a configuration file, by default @code{/etc/ntp.keys}. 49 @include invoke-ntp.keys.texi
|
| /netbsd-src/external/bsd/openldap/dist/servers/slapd/back-wt/ |
| H A D | index.c | 157 struct berval *keys; in indexer() local 184 atname, vals, &keys, op->o_tmpmemctx ); in indexer() 186 if( rc == LDAP_SUCCESS && keys != NULL ) { in indexer() 187 for( i=0; keys[i].bv_val != NULL; i++ ) { in indexer() 188 rc = wt_key_change( op->o_bd, cursor, &keys[i], id, opid ); in indexer() 190 ber_bvarray_free_x( keys, op->o_tmpmemctx ); in indexer() 194 ber_bvarray_free_x( keys, op->o_tmpmemctx ); in indexer() 205 atname, vals, &keys, op->o_tmpmemctx ); in indexer() 207 if( rc == LDAP_SUCCESS && keys != NULL ) { in indexer() 208 for( i=0; keys[i].bv_val != NULL; i++ ) { in indexer() [all …]
|
| /netbsd-src/external/bsd/unbound/dist/testdata/07-confroot.tdir/ |
| H A D | 07-confroot.test | 36 trusted-keys-file: "trustkeys.conf" 37 trusted-keys-file: "$subdir/trustkeys2.conf" 38 trusted-keys-file: "/subdir/trustkeys3.conf" 81 trusted-keys-file: "trustkeys.conf" 82 trusted-keys-file: "$subdir/trustkeys2.conf" 83 trusted-keys-file: "/subdir/trustkeys3.conf" 112 trusted-keys-file: "trustkeys.conf" 113 trusted-keys-file: "$subdir/trustkeys2.conf" 114 trusted-keys-file: "/subdir/trustkeys3.conf" 143 trusted-keys-file: "trustkeys.conf" [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/test/ |
| H A D | rc4test.c | 25 static unsigned char keys[6][30] = { variable 69 RC4_set_key(&key, keys[i][0], &(keys[i][1])); in test_rc4_encrypt() 80 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_end_processing() 93 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_multi_call() 112 RC4_set_key(&key, keys[0][0], &(keys[3][1])); in test_rc_bulk()
|
| H A D | evp_pkey_dparams_test.c | 218 struct pubkey keys[NUM_KEYS]; member 279 const struct pubkey *keys = pkey_params[id].keys; in set_enc_pubkey_test() local 281 if (keys[0].key_bin == NULL) in set_enc_pubkey_test() 289 for (i = 0; ret && i < NUM_KEYS && keys[i].key_bin != NULL; i++) { in set_enc_pubkey_test() 290 if (keys[i].bad) { in set_enc_pubkey_test() 294 keys[i].key_bin, in set_enc_pubkey_test() 295 keys[i].key_bin_len), in set_enc_pubkey_test() 301 keys[i].key_bin, in set_enc_pubkey_test() 302 keys[i].key_bin_len), in set_enc_pubkey_test()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
| H A D | rc4test.c | 19 static unsigned char keys[6][30] = { variable 63 RC4_set_key(&key, keys[i][0], &(keys[i][1])); in test_rc4_encrypt() 74 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_end_processing() 87 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_multi_call() 106 RC4_set_key(&key, keys[0][0], &(keys[3][1])); in test_rc_bulk()
|
| /netbsd-src/external/bsd/mdocml/dist/ |
| H A D | tbl_opts.c | 42 static const struct tbl_phrase keys[] = { variable 60 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0]))) 107 "%s", keys[key].name); in arg() 110 "%s want %d have %d", keys[key].name, want, len); in arg() 154 (strncasecmp(p + pos, keys[i].name, len) || in tbl_option() 155 keys[i].name[len] != '\0')) in tbl_option() 168 if (keys[i].key) in tbl_option() 169 tbl->opts.opts |= keys[i].key; in tbl_option()
|
| /netbsd-src/external/mpl/dhcp/bind/dist/lib/irs/ |
| H A D | dnsconf.c | 147 configure_keygroup(irs_dnsconf_t *conf, const cfg_obj_t *keys, in configure_keygroup() argument 154 for (element = cfg_list_first(keys); element != NULL; in configure_keygroup() 176 const cfg_obj_t *keys = NULL; in configure_dnsseckeys() local 178 cfg_map_get(cfgobj, "trusted-keys", &keys); in configure_dnsseckeys() 179 if (keys == NULL) { in configure_dnsseckeys() 183 result = configure_keygroup(conf, keys, rdclass); in configure_dnsseckeys() 188 keys = NULL; in configure_dnsseckeys() 189 cfg_map_get(cfgobj, "trust-anchors", &keys); in configure_dnsseckeys() 190 if (keys == NULL) { in configure_dnsseckeys() 194 result = configure_keygroup(conf, keys, rdclass); in configure_dnsseckeys() [all …]
|