| /src/crypto/openssl/crypto/sm4/asm/ |
| H A D | sm4-riscv64-zvksed.pl | 67 my ($ukey,$keys,$fk)=("a0","a1","t0"); 96 @{[vse32_v $vk0, $keys]} # rk[0:3] 97 addi $keys, $keys, 16 98 @{[vse32_v $vk1, $keys]} # rk[4:7] 99 addi $keys, $keys, 16 100 @{[vse32_v $vk2, $keys]} # rk[8:11] 101 addi $keys, $keys, 16 102 @{[vse32_v $vk3, $keys]} # rk[12:15] 103 addi $keys, $keys, 16 104 @{[vse32_v $vk4, $keys]} # rk[16:19] [all …]
|
| /src/crypto/heimdal/lib/kadm5/ |
| H A D | set_keys.c | 47 Key *keys; in _kadm5_set_keys() local 53 password, &keys, &num_keys); in _kadm5_set_keys() 57 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); in _kadm5_set_keys() 58 ent->keys.val = keys; in _kadm5_set_keys() 59 ent->keys.len = num_keys; in _kadm5_set_keys() 88 Key *keys; in _kadm5_set_keys2() local 91 keys = malloc (len * sizeof(*keys)); in _kadm5_set_keys2() 92 if (keys == NULL && len != 0) in _kadm5_set_keys2() 95 _kadm5_init_keys (keys, len); in _kadm5_set_keys2() 98 keys[i].mkvno = NULL; in _kadm5_set_keys2() [all …]
|
| H A D | default_keys.c | 40 print_keys(krb5_context context, Key *keys, size_t nkeys) in print_keys() argument 50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); in print_keys() 53 (int)keys[i].key.keytype); in print_keys() 58 if (keys[i].salt) { in print_keys() 61 switch (keys[i].salt->type) { in print_keys() 69 printf("unknown salt: %d", keys[i].salt->type); in print_keys() 72 if (keys[i].salt->salt.length) in print_keys() 73 printf("%.*s", (int)keys[i].salt->salt.length, in print_keys() 74 (char *)keys[i].salt->salt.data); in print_keys() 86 Key *keys; in parse_file() local [all …]
|
| /src/lib/libiscsiutil/ |
| H A D | keys.c | 38 struct keys * 41 struct keys *keys; in keys_new() local 43 keys = calloc(1, sizeof(*keys)); in keys_new() 44 if (keys == NULL) in keys_new() 47 return (keys); in keys_new() 51 keys_delete(struct keys *keys) in keys_delete() argument 55 free(keys->keys_names[i]); in keys_delete() 56 free(keys->keys_values[i]); in keys_delete() 58 free(keys); in keys_delete() 62 keys_load(struct keys *keys, const char *data, size_t len) in keys_load() argument [all …]
|
| H A D | libiscsiutil.h | 77 struct keys { struct 114 struct keys *keys_new(void); 115 void keys_delete(struct keys *key); 116 void keys_load(struct keys *keys, const char *data, 118 void keys_save(struct keys *keys, char **datap, 120 const char *keys_find(struct keys *keys, const char *name); 121 void keys_add(struct keys *keys, 123 void keys_add_int(struct keys *keys, 127 keys_load_pdu(struct keys *keys, const struct pdu *pdu) in keys_load_pdu() argument 129 keys_load(keys, pdu->pdu_data, pdu->pdu_data_len); in keys_load_pdu() [all …]
|
| /src/contrib/wpa/src/eap_common/ |
| H A D | ikev2_common.c | 371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument 380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument 440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload() 441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload() 476 if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len, in ikev2_decrypt_payload() 499 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, in ikev2_decrypt_payload() 530 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, in ikev2_build_encrypted() argument 540 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted() [all …]
|
| H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 68 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, in eap_ikev2_validate_icv() argument 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv() 96 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len, in eap_ikev2_validate_icv()
|
| /src/crypto/krb5/src/lib/kdb/ |
| H A D | t_sort_key_data.c | 45 assert_sorted(krb5_key_data *keys, int num_keys) in assert_sorted() argument 50 assert_true(keys[i].key_data_kvno <= keys[i - 1].key_data_kvno); in assert_sorted() 56 krb5_key_data keys[] = { KEY(5), KEY(5), KEY(4), KEY(3), KEY(3), KEY(2), in test_pre_sorted() local 58 int n_keys = sizeof(keys)/sizeof(keys[0]); in test_pre_sorted() 60 krb5_dbe_sort_key_data(keys, n_keys); in test_pre_sorted() 61 assert_sorted(keys, n_keys); in test_pre_sorted() 67 krb5_key_data keys[] = { KEY(1), KEY(2), KEY(2), KEY(3), KEY(3), KEY(3), in test_reverse_sorted() local 69 int n_keys = sizeof(keys)/sizeof(keys[0]); in test_reverse_sorted() 71 krb5_dbe_sort_key_data(keys, n_keys); in test_reverse_sorted() 72 assert_sorted(keys, n_keys); in test_reverse_sorted() [all …]
|
| /src/crypto/heimdal/lib/hx509/ |
| H A D | ks_mem.c | 48 hx509_private_key *keys; member 80 for (i = 0; mem->keys && mem->keys[i]; i++) in mem_free() 81 hx509_private_key_free(&mem->keys[i]); in mem_free() 82 free(mem->keys); in mem_free() 158 hx509_private_key **keys) in mem_getkeys() argument 163 for (i = 0; mem->keys && mem->keys[i]; i++) in mem_getkeys() 165 *keys = calloc(i + 1, sizeof(**keys)); in mem_getkeys() 166 for (i = 0; mem->keys && mem->keys[i]; i++) { in mem_getkeys() 167 (*keys)[i] = _hx509_private_key_ref(mem->keys[i]); in mem_getkeys() 168 if ((*keys)[i] == NULL) { in mem_getkeys() [all …]
|
| /src/crypto/heimdal/kadmin/ |
| H A D | ext.c | 47 krb5_keytab_entry *keys = NULL; in do_ext_keytab() local 57 keys = malloc(sizeof(*keys) * princ.n_key_data); in do_ext_keytab() 58 if (keys == NULL) { in do_ext_keytab() 66 keys[i].principal = princ.principal; in do_ext_keytab() 67 keys[i].vno = kd->key_data_kvno; in do_ext_keytab() 68 keys[i].keyblock.keytype = kd->key_data_type[0]; in do_ext_keytab() 69 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; in do_ext_keytab() 70 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0]; in do_ext_keytab() 71 keys[i].timestamp = time(NULL); in do_ext_keytab() 81 keys = malloc(sizeof(*keys) * n_k); in do_ext_keytab() [all …]
|
| /src/sys/contrib/libsodium/src/libsodium/crypto_kx/ |
| H A D | crypto_kx.c | 42 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; in crypto_kx_client_session_keys() local 57 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX); in crypto_kx_client_session_keys() 58 crypto_generichash_init(&h, NULL, 0U, sizeof keys); in crypto_kx_client_session_keys() 63 crypto_generichash_final(&h, keys, sizeof keys); in crypto_kx_client_session_keys() 66 rx[i] = keys[i]; in crypto_kx_client_session_keys() 67 tx[i] = keys[i + crypto_kx_SESSIONKEYBYTES]; in crypto_kx_client_session_keys() 69 sodium_memzero(keys, sizeof keys); in crypto_kx_client_session_keys() 83 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; in crypto_kx_server_session_keys() local 98 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX); in crypto_kx_server_session_keys() 99 crypto_generichash_init(&h, NULL, 0U, sizeof keys); in crypto_kx_server_session_keys() [all …]
|
| /src/crypto/heimdal/lib/krb5/ |
| H A D | salt-des3.c | 48 DES_cblock keys[3]; in DES3_string_to_key() local 73 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); in DES3_string_to_key() 74 DES_set_odd_parity(keys + i); in DES3_string_to_key() 75 if(DES_is_weak_key(keys + i)) in DES3_string_to_key() 76 _krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); in DES3_string_to_key() 77 DES_set_key_unchecked(keys + i, &s[i]); in DES3_string_to_key() 86 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); in DES3_string_to_key() 87 DES_set_odd_parity(keys + i); in DES3_string_to_key() 88 if(DES_is_weak_key(keys + i)) in DES3_string_to_key() 89 _krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); in DES3_string_to_key() [all …]
|
| /src/contrib/ntp/ntpd/ |
| H A D | invoke-ntp.keys.texi | 1 @node ntp.keys Notes 2 @section Notes about ntp.keys 3 @pindex ntp.keys 7 # EDIT THIS FILE WITH CAUTION (invoke-ntp.keys.texi) 10 # From the definitions ntp.keys.def 24 reads its keys from a file specified using the 27 @code{keys} 32 one or more keys numbered between 1 and 65535 33 may be arbitrarily set in the keys file. 108 Note that the keys used by the [all …]
|
| H A D | Makefile.am | 86 man5_MANS= ntp.conf.5 ntp.keys.5 132 invoke-ntp.keys.menu \ 133 invoke-ntp.keys.texi \ 144 ntp.keys.5man \ 145 ntp.keys.5mdoc \ 146 ntp.keys.def \ 147 ntp.keys.man.in \ 148 ntp.keys.mdoc.in \ 149 ntp.keys.html \ 150 ntp.keys.texi \ [all …]
|
| H A D | ntp.keys.texi | 3 @setfilename ntp.keys.info 15 * ntp.keys: (ntp.keys). NTP's Symmetric Key file 20 @subtitle ntp.keys, version @value{VERSION}, @value{UPDATED} 27 @node Top, ntp.keys Description, (dir), (dir) 33 This document applies to version @value{VERSION} of @code{ntp.keys}. 38 * ntp.keys Description:: 39 * ntp.keys Notes:: 42 @node ntp.keys Description, , Top, Top 47 be specified in a configuration file, by default @code{/etc/ntp.keys}. 49 @include invoke-ntp.keys.texi
|
| /src/contrib/ntp/sntp/tests/ |
| H A D | keyFile.c | 72 struct key * keys = NULL; in test_ReadEmptyKeyFile() local 76 TEST_ASSERT_EQUAL(0, auth_init(path, &keys)); in test_ReadEmptyKeyFile() 77 TEST_ASSERT_NULL(keys); in test_ReadEmptyKeyFile() 86 struct key * keys = NULL; in test_ReadASCIIKeys() local 91 TEST_ASSERT_EQUAL(2, auth_init(path, &keys)); in test_ReadASCIIKeys() 92 TEST_ASSERT_NOT_NULL(keys); in test_ReadASCIIKeys() 110 struct key * keys = NULL; in test_ReadHexKeys() local 117 TEST_ASSERT_EQUAL(3, auth_init(path, &keys)); in test_ReadHexKeys() 118 TEST_ASSERT_NOT_NULL(keys); in test_ReadHexKeys() 145 struct key * keys = NULL; in test_ReadKeyFileWithComments() local [all …]
|
| /src/contrib/mtree/ |
| H A D | create.c | 172 if (sflag && keys & F_CKSUM) in cwalk() 182 if ((keys & flag) == 0) in dosum() 242 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) { in statf() 243 if (keys & F_UNAME && in statf() 246 if (keys & F_UID || (keys & F_UNAME && name == NULL)) in statf() 250 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) { in statf() 251 if (keys & F_GNAME && in statf() 254 if (keys & F_GID || (keys & F_GNAME && name == NULL)) in statf() 258 if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode) in statf() 261 if (keys & F_DEV && in statf() [all …]
|
| /src/crypto/heimdal/lib/hdb/ |
| H A D | keys.c | 42 hdb_free_keys(krb5_context context, int len, Key *keys) in hdb_free_keys() argument 47 free(keys[i].mkvno); in hdb_free_keys() 48 keys[i].mkvno = NULL; in hdb_free_keys() 49 if (keys[i].salt != NULL) { in hdb_free_keys() 50 free_Salt(keys[i].salt); in hdb_free_keys() 51 free(keys[i].salt); in hdb_free_keys() 52 keys[i].salt = NULL; in hdb_free_keys() 54 krb5_free_keyblock_contents(context, &keys[i].key); in hdb_free_keys() 56 free (keys); in hdb_free_keys() 65 hdb_free_keys(context, keysets[i].keys.len, keysets[i].keys.val); in hdb_free_keysets() [all …]
|
| /src/crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/ |
| H A D | passtest.c | 11 FILE *keys, *vals; in main() local 22 keys = fopen("yp.keys", "rt"); in main() 40 while ((key_line = fgets(key_line, 100, keys)) != NULL) { in main() 57 fclose(keys); in main() 64 keys = fopen("yp.keys", "rt"); in main() 73 while ((get_key = fgets(get_key, 100, keys)) != NULL) { in main() 90 fclose(keys); in main() 123 keys = fopen("yp.keys", "rt"); in main() 128 while ((get_key = fgets(get_key, 100, keys)) != NULL) { in main() 132 key2 = fgets(get_key, 100, keys); in main() [all …]
|
| /src/contrib/ofed/opensm/opensm/ |
| H A D | osm_db_pack.c | 138 cl_list_t keys; in osm_db_guid2lid_guids() local 141 cl_list_construct(&keys); in osm_db_guid2lid_guids() 142 cl_list_init(&keys, 10); in osm_db_guid2lid_guids() 144 if (osm_db_keys(p_g2l, &keys)) in osm_db_guid2lid_guids() 147 while ((p_key = cl_list_remove_head(&keys)) != NULL) { in osm_db_guid2lid_guids() 156 cl_list_destroy(&keys); in osm_db_guid2lid_guids() 205 cl_list_t keys; in osm_db_guid2mkey_guids() local 208 cl_list_construct(&keys); in osm_db_guid2mkey_guids() 209 cl_list_init(&keys, 10); in osm_db_guid2mkey_guids() 211 if (osm_db_keys(p_g2m, &keys)) in osm_db_guid2mkey_guids() [all …]
|
| H A D | osm_pkey.c | 64 cl_map_construct(&p_pkey_tbl->keys); in osm_pkey_tbl_construct() 88 cl_map_remove_all(&p_pkey_tbl->keys); in osm_pkey_tbl_destroy() 89 cl_map_destroy(&p_pkey_tbl->keys); in osm_pkey_tbl_destroy() 97 cl_map_init(&p_pkey_tbl->keys, 1); in osm_pkey_tbl_init() 153 cl_map_remove_all(&p_pkey_tbl->keys); in osm_pkey_tbl_set() 176 p_prev_pkey = cl_map_get(&p_pkey_tbl->keys, pkey_base); in osm_pkey_tbl_set() 182 cl_map_insert(&p_pkey_tbl->keys, pkey_base, in osm_pkey_tbl_set() 346 pkey1 = cl_map_get(&(osm_physp_get_pkey_tbl(p_physp1))->keys, in osm_physp_share_this_pkey() 349 pkey1 = cl_map_get(&(osm_physp_get_pkey_tbl(p_physp1))->keys, in osm_physp_share_this_pkey() 351 pkey2 = cl_map_get(&(osm_physp_get_pkey_tbl(p_physp2))->keys, in osm_physp_share_this_pkey() [all …]
|
| /src/crypto/openssl/test/ |
| H A D | rc4test.c | 25 static unsigned char keys[6][30] = { variable 69 RC4_set_key(&key, keys[i][0], &(keys[i][1])); in test_rc4_encrypt() 80 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_end_processing() 93 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_multi_call() 112 RC4_set_key(&key, keys[0][0], &(keys[3][1])); in test_rc_bulk()
|
| H A D | evp_pkey_dparams_test.c | 218 struct pubkey keys[NUM_KEYS]; member 275 const struct pubkey *keys = pkey_params[id].keys; in set_enc_pubkey_test() local 277 if (keys[0].key_bin == NULL) in set_enc_pubkey_test() 285 for (i = 0; ret && i < NUM_KEYS && keys[i].key_bin != NULL; i++) { in set_enc_pubkey_test() 286 if (keys[i].bad) { in set_enc_pubkey_test() 290 keys[i].key_bin, in set_enc_pubkey_test() 291 keys[i].key_bin_len), in set_enc_pubkey_test() 297 keys[i].key_bin, in set_enc_pubkey_test() 298 keys[i].key_bin_len), in set_enc_pubkey_test()
|
| /src/contrib/libarchive/libarchive/ |
| H A D | archive_write_set_format_mtree.c | 138 int keys; member 172 int keys; member 442 int keys, oldkeys, effkeys; in write_global() local 446 keys = mtree->keys & SET_KEYS; in write_global() 447 oldkeys = mtree->set.keys; in write_global() 448 effkeys = keys; in write_global() 488 keys &= ~(F_UNAME | F_UID); in write_global() 490 keys &= ~(F_GNAME | F_GID); in write_global() 492 keys &= ~F_MODE; in write_global() 494 keys &= ~F_FLAGS; in write_global() [all …]
|
| /src/contrib/mandoc/ |
| H A D | tbl_opts.c | 42 static const struct tbl_phrase keys[] = { variable 60 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0]))) 107 "%s", keys[key].name); in arg() 110 "%s want %d have %d", keys[key].name, want, len); in arg() 154 (strncasecmp(p + pos, keys[i].name, len) || in tbl_option() 155 keys[i].name[len] != '\0')) in tbl_option() 168 if (keys[i].key) in tbl_option() 169 tbl->opts.opts |= keys[i].key; in tbl_option()
|