| /src/stand/libsa/geli/ |
| H A D | geli_metadata.c | 43 struct keybuf *keybuf; in geli_export_key_metadata() local 45 keybuf = malloc(GELI_KEYBUF_SIZE); in geli_export_key_metadata() 46 geli_export_key_buffer(keybuf); in geli_export_key_metadata() 47 file_addmetadata(kfp, MODINFOMD_KEYBUF, GELI_KEYBUF_SIZE, keybuf); in geli_export_key_metadata() 48 explicit_bzero(keybuf, GELI_KEYBUF_SIZE); in geli_export_key_metadata() 49 free(keybuf); in geli_export_key_metadata()
|
| H A D | geliboot.h | 48 #define GELI_KEYBUF_SIZE (sizeof(struct keybuf) + \ 95 void geli_import_key_buffer(struct keybuf *keybuf); 96 void geli_export_key_buffer(struct keybuf *keybuf);
|
| /src/contrib/sendmail/src/ |
| H A D | udb.c | 140 char keybuf[MAXUDBKEY]; local 176 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop"); 179 if (keylen >= sizeof(keybuf)) 218 key.data = keybuf; 222 keybuf, keylen); 245 keybuf, keylen); 262 memcmp(key.data, keybuf, keylen) == 0) 359 (void) sm_strlcpyn(keybuf, sizeof(keybuf), 2, a->q_user, 361 keylen = strlen(keybuf); 362 key.data = keybuf; [all …]
|
| H A D | map.c | 1930 char keybuf[MAXNAME + 1]; /* EAI:ok */ local 1944 if (key.dsize > sizeof(keybuf) - 1) 1945 key.dsize = sizeof(keybuf) - 1; 1946 memmove(keybuf, key.dptr, key.dsize); 1947 keybuf[key.dsize] = '\0'; 1948 makelower_buf(keybuf, keybuf, sizeof(keybuf)); 1949 key.dptr = keybuf; 2042 char keybuf[MAXNAME + 1]; /* EAI:ok */ local 2052 if (key.dsize > sizeof(keybuf) - 1) 2053 key.dsize = sizeof(keybuf) - 1; [all …]
|
| /src/contrib/sendmail/libsm/ |
| H A D | niprop.c | 77 char keybuf[1024]; variable 89 if (i >= sizeof keybuf) 91 (void) sm_strlcpyn(keybuf, sizeof keybuf, 2, keydir, "/"); 94 (void) sm_strlcat2(keybuf, keyprop, "=", sizeof keybuf); 96 (void) sm_strlcat(keybuf, keyval, sizeof keybuf); 101 keydir, keyprop, keyval, valprop, sepchar, keybuf); 149 if (ni_pathsearch(ni, &nid, keybuf) != 0)
|
| /src/stand/i386/common/ |
| H A D | bootargs.h | 104 struct keybuf *keybuf; member 106 void *keybuf; member 120 gbdata->keybuf = malloc(sizeof(struct keybuf) + in export_geli_boot_data() 122 geli_export_key_buffer(gbdata->keybuf); in export_geli_boot_data() 133 geli_import_key_buffer(gbdata->keybuf); in import_geli_boot_data()
|
| /src/crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash1.tests/ |
| H A D | driver2.c | 67 char keybuf[2049]; local 90 key.data = keybuf; 92 memset(keybuf, '\0', sizeof(keybuf)); 99 snprintf(keybuf, sizeof(keybuf), "Key #%d", i);
|
| /src/include/rpcsvc/ |
| H A D | key_prot.x | 89 typedef opaque keybuf[HEXKEYBYTES]; /* store key in hex */ typedef 146 keybuf st_priv_key; 147 keybuf st_pub_key; 173 KEY_SET(keybuf) = 1; 215 KEY_SET(keybuf) = 1; 276 KEY_GET_CONV(keybuf) = 10;
|
| /src/usr.sbin/yp_mkdb/ |
| H A D | yp_mkdb.c | 113 char *keybuf, *datbuf; in main() local 271 keybuf = (char *)&buf; in main() 281 if (*keybuf == '+' || *keybuf == '-' || in main() 289 if (strlen(keybuf) > YPMAXRECORD) { in main() 290 warnx("key too long: %s", keybuf); in main() 294 if (!strlen(keybuf)) { in main() 304 key.data = keybuf; in main() 305 key.size = strlen(keybuf); in main() 312 warnx("duplicate key '%s' - skipping", keybuf); in main()
|
| /src/lib/libc/db/test/hash.tests/ |
| H A D | driver2.c | 55 char keybuf[2049]; local 78 key.data = keybuf; 80 bzero(keybuf, sizeof(keybuf)); 87 sprintf(keybuf, "Key #%d", i);
|
| /src/stand/efi/libefi/ |
| H A D | efi_console.c | 98 static unsigned keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable 1217 if (keybuf[i] != 0) { in keybuf_getchar() 1218 c = keybuf[i]; in keybuf_getchar() 1219 keybuf[i] = 0; in keybuf_getchar() 1233 if (keybuf[i] != 0) in keybuf_ischar() 1249 keybuf[0] = 0x1b; /* esc */ in keybuf_inschar() 1250 keybuf[1] = '['; in keybuf_inschar() 1251 keybuf[2] = 'A'; in keybuf_inschar() 1254 keybuf[0] = 0x1b; /* esc */ in keybuf_inschar() 1255 keybuf[1] = '['; in keybuf_inschar() [all …]
|
| /src/crypto/openssl/crypto/hashtable/ |
| H A D | hashtable.c | 520 PREFETCH(a->keybuf); in match_key() 521 PREFETCH(b->keybuf); in match_key() 522 if (a->keybuf != NULL && b->keybuf != NULL && a->keysize == b->keysize) in match_key() 523 return !memcmp(a->keybuf, b->keybuf, a->keysize); in match_key() 610 tmp->value.key.keybuf = NULL; in alloc_new_value() 612 tmp->value.key.keybuf = (uint8_t *)(tmp + 1); in alloc_new_value() 614 memcpy(tmp->value.key.keybuf, key->keybuf, key->keysize); in alloc_new_value() 643 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_insert() 672 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_get() 721 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_delete()
|
| /src/secure/lib/libcrypt/ |
| H A D | crypt-des.c | 592 u_int32_t count, salt, l, r0, r1, keybuf[2]; in crypt_des() local 602 q = (u_char *)keybuf; in crypt_des() 603 while (q - (u_char *)keybuf - 8) { in crypt_des() 608 if (des_setkey((char *)keybuf)) in crypt_des() 627 if (des_cipher((char *)keybuf, (char *)keybuf, 0L, 1)) in crypt_des() 632 q = (u_char *)keybuf; in crypt_des() 633 while (q - (u_char *)keybuf - 8 && *key) in crypt_des() 636 if (des_setkey((char *)keybuf)) in crypt_des()
|
| /src/tools/tools/net80211/wesside/wesside/ |
| H A D | aircrack-ptw-lib.c | 220 uint8_t keybuf[PTW_KSBYTES]; in correct() local 224 memcpy(&keybuf[IVBYTES], key, keylen); in correct() 225 memcpy(keybuf, state->sessions[i].iv, IVBYTES); in correct() 226 rc4init(keybuf, keylen+IVBYTES, &rc4state); in correct() 361 int PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) { in PTW_computeKey() argument 403 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, simple)) { in PTW_computeKey() 415 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, onestrong)) { in PTW_computeKey() 421 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, twostrong)) { in PTW_computeKey()
|
| /src/sys/crypto/ |
| H A D | intake.h | 52 struct keybuf { struct 59 extern struct keybuf* get_keybuf(void); argument
|
| /src/crypto/openssl/crypto/pem/ |
| H A D | pvkfmt.c | 862 unsigned char keybuf[20]; in do_PVK_body_key() local 892 if (!derive_pvk_key(keybuf, sizeof(keybuf), p, saltlen, in do_PVK_body_key() 907 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 916 memset(keybuf + 5, 0, 11); in do_PVK_body_key() 917 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 943 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key() 1084 unsigned char keybuf[20]; in i2b_PVK() local 1094 if (!derive_pvk_key(keybuf, sizeof(keybuf), salt, PVK_SALTLEN, in i2b_PVK() 1100 memset(keybuf + 5, 0, 11); in i2b_PVK() 1102 if (!EVP_EncryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in i2b_PVK() [all …]
|
| /src/stand/i386/libi386/ |
| H A D | vidconsole.c | 85 static uint8_t keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable 1057 if (keybuf[i] != 0) { in vidc_getchar() 1058 c = keybuf[i]; in vidc_getchar() 1059 keybuf[i] = 0; in vidc_getchar() 1076 keybuf[0] = '['; in vidc_getchar() 1077 keybuf[1] = 'A'; in vidc_getchar() 1080 keybuf[0] = '['; in vidc_getchar() 1081 keybuf[1] = 'D'; in vidc_getchar() 1084 keybuf[0] = '['; in vidc_getchar() 1085 keybuf[1] = 'C'; in vidc_getchar() [all …]
|
| /src/contrib/ntp/libntp/ |
| H A D | a_md5encrypt.c | 97 u_char keybuf[AES_128_KEY_SIZE]; in make_mac() local 101 memcpy(keybuf, keyptr, key->len); in make_mac() 102 zero_mem((keybuf + key->len), in make_mac() 104 keyptr = keybuf; in make_mac()
|
| /src/sbin/restore/ |
| H A D | restore.c | 487 static char keybuf[32]; in keyval() local 489 (void) strcpy(keybuf, "|NIL"); in keyval() 490 keybuf[0] = '\0'; in keyval() 492 (void) strcat(keybuf, "|ONTAPE"); in keyval() 494 (void) strcat(keybuf, "|INOFND"); in keyval() 496 (void) strcat(keybuf, "|NAMEFND"); in keyval() 498 (void) strcat(keybuf, "|MODECHG"); in keyval() 499 return (&keybuf[1]); in keyval()
|
| /src/usr.sbin/ypldap/ |
| H A D | yp.c | 654 static char keybuf[YPMAXRECORD+1]; in yp_make_keyval() local 657 memset(keybuf, 0, sizeof(keybuf)); in yp_make_keyval() 660 (void)strlcpy(keybuf, key, sizeof(keybuf)); in yp_make_keyval() 661 res->key.keydat_len = strlen(keybuf); in yp_make_keyval() 662 res->key.keydat_val = keybuf; in yp_make_keyval() 672 log_debug("sending out %s => %s", keybuf, buf); in yp_make_keyval()
|
| /src/contrib/ntp/sntp/ |
| H A D | crypto.c | 43 u_char keybuf[AES_128_KEY_SIZE]; in compute_mac() local 47 memcpy(keybuf, key_data, key_size); in compute_mac() 48 memset((keybuf + key_size), 0, in compute_mac() 50 key_data = keybuf; in compute_mac()
|
| /src/sys/contrib/openzfs/cmd/zed/ |
| H A D | zed_event.c | 273 char keybuf[MAXBUF]; in _zed_event_add_var() local 300 dstp = keybuf; in _zed_event_add_var() 301 lastp = keybuf + sizeof (keybuf); in _zed_event_add_var() 321 n = strlcpy(dstp, keybuf, buflen); in _zed_event_add_var() 325 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var() 337 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var() 348 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var() 350 } else if (zed_strings_add(zsp, keybuf, valbuf) < 0) { in _zed_event_add_var() 352 keybuf, eid, strerror(errno)); in _zed_event_add_var()
|
| /src/sys/geom/eli/ |
| H A D | g_eli.c | 181 struct keybuf *keybuf; in zero_geli_intake_keys() local 184 if ((keybuf = get_keybuf()) != NULL) { in zero_geli_intake_keys() 186 for (i = 0; i < keybuf->kb_nents; i++) { in zero_geli_intake_keys() 187 if (keybuf->kb_ents[i].ke_type == KEYBUF_TYPE_GELI) { in zero_geli_intake_keys() 188 explicit_bzero(keybuf->kb_ents[i].ke_data, in zero_geli_intake_keys() 189 sizeof(keybuf->kb_ents[i].ke_data)); in zero_geli_intake_keys() 190 keybuf->kb_ents[i].ke_type = KEYBUF_TYPE_NONE; in zero_geli_intake_keys() 1330 struct keybuf *keybuf; in g_eli_taste() local 1375 if ((keybuf = get_keybuf()) != NULL) { in g_eli_taste() 1377 for (i = 0; i < keybuf->kb_nents; i++) { in g_eli_taste() [all …]
|
| /src/lib/libc/gen/ |
| H A D | getpwent.c | 795 char keybuf[MAXLOGNAME + 1]; in files_passwd() local 813 keybuf[0] = _PW_KEYBYNAME; in files_passwd() 817 keybuf[0] = _PW_KEYBYUID; in files_passwd() 820 keybuf[0] = _PW_KEYBYNUM; in files_passwd() 847 key.data = keybuf; in files_passwd() 854 namesize = strlcpy(&keybuf[1], name, sizeof(keybuf)-1); in files_passwd() 855 if (namesize >= sizeof(keybuf)-1) { in files_passwd() 864 memcpy(&keybuf[1], &uid, sizeof(uid)); in files_passwd() 868 memcpy(&keybuf[1], &store, sizeof(store)); in files_passwd() 875 memcpy(&keybuf[1], &st->keynum, in files_passwd() [all …]
|
| /src/contrib/wpa/src/eap_common/ |
| H A D | ikev2_common.c | 635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local 650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys() 651 if (keybuf == NULL) in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 656 os_free(keybuf); in ikev2_derive_sk_keys() 660 pos = keybuf; in ikev2_derive_sk_keys() 717 os_free(keybuf); in ikev2_derive_sk_keys()
|