Home
last modified time | relevance | path

Searched refs:keybuf (Results 1 – 25 of 40) sorted by relevance

12

/src/stand/libsa/geli/
H A Dgeli_metadata.c43 struct keybuf *keybuf; in geli_export_key_metadata() local
45 keybuf = malloc(GELI_KEYBUF_SIZE); in geli_export_key_metadata()
46 geli_export_key_buffer(keybuf); in geli_export_key_metadata()
47 file_addmetadata(kfp, MODINFOMD_KEYBUF, GELI_KEYBUF_SIZE, keybuf); in geli_export_key_metadata()
48 explicit_bzero(keybuf, GELI_KEYBUF_SIZE); in geli_export_key_metadata()
49 free(keybuf); in geli_export_key_metadata()
H A Dgeliboot.h48 #define GELI_KEYBUF_SIZE (sizeof(struct keybuf) + \
95 void geli_import_key_buffer(struct keybuf *keybuf);
96 void geli_export_key_buffer(struct keybuf *keybuf);
/src/contrib/sendmail/src/
H A Dudb.c140 char keybuf[MAXUDBKEY]; local
176 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop");
179 if (keylen >= sizeof(keybuf))
218 key.data = keybuf;
222 keybuf, keylen);
245 keybuf, keylen);
262 memcmp(key.data, keybuf, keylen) == 0)
359 (void) sm_strlcpyn(keybuf, sizeof(keybuf), 2, a->q_user,
361 keylen = strlen(keybuf);
362 key.data = keybuf;
[all …]
H A Dmap.c1930 char keybuf[MAXNAME + 1]; /* EAI:ok */ local
1944 if (key.dsize > sizeof(keybuf) - 1)
1945 key.dsize = sizeof(keybuf) - 1;
1946 memmove(keybuf, key.dptr, key.dsize);
1947 keybuf[key.dsize] = '\0';
1948 makelower_buf(keybuf, keybuf, sizeof(keybuf));
1949 key.dptr = keybuf;
2042 char keybuf[MAXNAME + 1]; /* EAI:ok */ local
2052 if (key.dsize > sizeof(keybuf) - 1)
2053 key.dsize = sizeof(keybuf) - 1;
[all …]
/src/contrib/sendmail/libsm/
H A Dniprop.c77 char keybuf[1024]; variable
89 if (i >= sizeof keybuf)
91 (void) sm_strlcpyn(keybuf, sizeof keybuf, 2, keydir, "/");
94 (void) sm_strlcat2(keybuf, keyprop, "=", sizeof keybuf);
96 (void) sm_strlcat(keybuf, keyval, sizeof keybuf);
101 keydir, keyprop, keyval, valprop, sepchar, keybuf);
149 if (ni_pathsearch(ni, &nid, keybuf) != 0)
/src/stand/i386/common/
H A Dbootargs.h104 struct keybuf *keybuf; member
106 void *keybuf; member
120 gbdata->keybuf = malloc(sizeof(struct keybuf) + in export_geli_boot_data()
122 geli_export_key_buffer(gbdata->keybuf); in export_geli_boot_data()
133 geli_import_key_buffer(gbdata->keybuf); in import_geli_boot_data()
/src/crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash1.tests/
H A Ddriver2.c67 char keybuf[2049]; local
90 key.data = keybuf;
92 memset(keybuf, '\0', sizeof(keybuf));
99 snprintf(keybuf, sizeof(keybuf), "Key #%d", i);
/src/include/rpcsvc/
H A Dkey_prot.x89 typedef opaque keybuf[HEXKEYBYTES]; /* store key in hex */ typedef
146 keybuf st_priv_key;
147 keybuf st_pub_key;
173 KEY_SET(keybuf) = 1;
215 KEY_SET(keybuf) = 1;
276 KEY_GET_CONV(keybuf) = 10;
/src/usr.sbin/yp_mkdb/
H A Dyp_mkdb.c113 char *keybuf, *datbuf; in main() local
271 keybuf = (char *)&buf; in main()
281 if (*keybuf == '+' || *keybuf == '-' || in main()
289 if (strlen(keybuf) > YPMAXRECORD) { in main()
290 warnx("key too long: %s", keybuf); in main()
294 if (!strlen(keybuf)) { in main()
304 key.data = keybuf; in main()
305 key.size = strlen(keybuf); in main()
312 warnx("duplicate key '%s' - skipping", keybuf); in main()
/src/lib/libc/db/test/hash.tests/
H A Ddriver2.c55 char keybuf[2049]; local
78 key.data = keybuf;
80 bzero(keybuf, sizeof(keybuf));
87 sprintf(keybuf, "Key #%d", i);
/src/stand/efi/libefi/
H A Defi_console.c98 static unsigned keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable
1217 if (keybuf[i] != 0) { in keybuf_getchar()
1218 c = keybuf[i]; in keybuf_getchar()
1219 keybuf[i] = 0; in keybuf_getchar()
1233 if (keybuf[i] != 0) in keybuf_ischar()
1249 keybuf[0] = 0x1b; /* esc */ in keybuf_inschar()
1250 keybuf[1] = '['; in keybuf_inschar()
1251 keybuf[2] = 'A'; in keybuf_inschar()
1254 keybuf[0] = 0x1b; /* esc */ in keybuf_inschar()
1255 keybuf[1] = '['; in keybuf_inschar()
[all …]
/src/crypto/openssl/crypto/hashtable/
H A Dhashtable.c520 PREFETCH(a->keybuf); in match_key()
521 PREFETCH(b->keybuf); in match_key()
522 if (a->keybuf != NULL && b->keybuf != NULL && a->keysize == b->keysize) in match_key()
523 return !memcmp(a->keybuf, b->keybuf, a->keysize); in match_key()
610 tmp->value.key.keybuf = NULL; in alloc_new_value()
612 tmp->value.key.keybuf = (uint8_t *)(tmp + 1); in alloc_new_value()
614 memcpy(tmp->value.key.keybuf, key->keybuf, key->keysize); in alloc_new_value()
643 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_insert()
672 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_get()
721 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_delete()
/src/secure/lib/libcrypt/
H A Dcrypt-des.c592 u_int32_t count, salt, l, r0, r1, keybuf[2]; in crypt_des() local
602 q = (u_char *)keybuf; in crypt_des()
603 while (q - (u_char *)keybuf - 8) { in crypt_des()
608 if (des_setkey((char *)keybuf)) in crypt_des()
627 if (des_cipher((char *)keybuf, (char *)keybuf, 0L, 1)) in crypt_des()
632 q = (u_char *)keybuf; in crypt_des()
633 while (q - (u_char *)keybuf - 8 && *key) in crypt_des()
636 if (des_setkey((char *)keybuf)) in crypt_des()
/src/tools/tools/net80211/wesside/wesside/
H A Daircrack-ptw-lib.c220 uint8_t keybuf[PTW_KSBYTES]; in correct() local
224 memcpy(&keybuf[IVBYTES], key, keylen); in correct()
225 memcpy(keybuf, state->sessions[i].iv, IVBYTES); in correct()
226 rc4init(keybuf, keylen+IVBYTES, &rc4state); in correct()
361 int PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) { in PTW_computeKey() argument
403 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, simple)) { in PTW_computeKey()
415 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, onestrong)) { in PTW_computeKey()
421 if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, twostrong)) { in PTW_computeKey()
/src/sys/crypto/
H A Dintake.h52 struct keybuf { struct
59 extern struct keybuf* get_keybuf(void); argument
/src/crypto/openssl/crypto/pem/
H A Dpvkfmt.c862 unsigned char keybuf[20]; in do_PVK_body_key() local
892 if (!derive_pvk_key(keybuf, sizeof(keybuf), p, saltlen, in do_PVK_body_key()
907 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key()
916 memset(keybuf + 5, 0, 11); in do_PVK_body_key()
917 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key()
943 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key()
1084 unsigned char keybuf[20]; in i2b_PVK() local
1094 if (!derive_pvk_key(keybuf, sizeof(keybuf), salt, PVK_SALTLEN, in i2b_PVK()
1100 memset(keybuf + 5, 0, 11); in i2b_PVK()
1102 if (!EVP_EncryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in i2b_PVK()
[all …]
/src/stand/i386/libi386/
H A Dvidconsole.c85 static uint8_t keybuf[KEYBUFSZ]; /* keybuf for extended codes */ variable
1057 if (keybuf[i] != 0) { in vidc_getchar()
1058 c = keybuf[i]; in vidc_getchar()
1059 keybuf[i] = 0; in vidc_getchar()
1076 keybuf[0] = '['; in vidc_getchar()
1077 keybuf[1] = 'A'; in vidc_getchar()
1080 keybuf[0] = '['; in vidc_getchar()
1081 keybuf[1] = 'D'; in vidc_getchar()
1084 keybuf[0] = '['; in vidc_getchar()
1085 keybuf[1] = 'C'; in vidc_getchar()
[all …]
/src/contrib/ntp/libntp/
H A Da_md5encrypt.c97 u_char keybuf[AES_128_KEY_SIZE]; in make_mac() local
101 memcpy(keybuf, keyptr, key->len); in make_mac()
102 zero_mem((keybuf + key->len), in make_mac()
104 keyptr = keybuf; in make_mac()
/src/sbin/restore/
H A Drestore.c487 static char keybuf[32]; in keyval() local
489 (void) strcpy(keybuf, "|NIL"); in keyval()
490 keybuf[0] = '\0'; in keyval()
492 (void) strcat(keybuf, "|ONTAPE"); in keyval()
494 (void) strcat(keybuf, "|INOFND"); in keyval()
496 (void) strcat(keybuf, "|NAMEFND"); in keyval()
498 (void) strcat(keybuf, "|MODECHG"); in keyval()
499 return (&keybuf[1]); in keyval()
/src/usr.sbin/ypldap/
H A Dyp.c654 static char keybuf[YPMAXRECORD+1]; in yp_make_keyval() local
657 memset(keybuf, 0, sizeof(keybuf)); in yp_make_keyval()
660 (void)strlcpy(keybuf, key, sizeof(keybuf)); in yp_make_keyval()
661 res->key.keydat_len = strlen(keybuf); in yp_make_keyval()
662 res->key.keydat_val = keybuf; in yp_make_keyval()
672 log_debug("sending out %s => %s", keybuf, buf); in yp_make_keyval()
/src/contrib/ntp/sntp/
H A Dcrypto.c43 u_char keybuf[AES_128_KEY_SIZE]; in compute_mac() local
47 memcpy(keybuf, key_data, key_size); in compute_mac()
48 memset((keybuf + key_size), 0, in compute_mac()
50 key_data = keybuf; in compute_mac()
/src/sys/contrib/openzfs/cmd/zed/
H A Dzed_event.c273 char keybuf[MAXBUF]; in _zed_event_add_var() local
300 dstp = keybuf; in _zed_event_add_var()
301 lastp = keybuf + sizeof (keybuf); in _zed_event_add_var()
321 n = strlcpy(dstp, keybuf, buflen); in _zed_event_add_var()
325 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var()
337 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var()
348 keybuf, eid, "Exceeded buffer size"); in _zed_event_add_var()
350 } else if (zed_strings_add(zsp, keybuf, valbuf) < 0) { in _zed_event_add_var()
352 keybuf, eid, strerror(errno)); in _zed_event_add_var()
/src/sys/geom/eli/
H A Dg_eli.c181 struct keybuf *keybuf; in zero_geli_intake_keys() local
184 if ((keybuf = get_keybuf()) != NULL) { in zero_geli_intake_keys()
186 for (i = 0; i < keybuf->kb_nents; i++) { in zero_geli_intake_keys()
187 if (keybuf->kb_ents[i].ke_type == KEYBUF_TYPE_GELI) { in zero_geli_intake_keys()
188 explicit_bzero(keybuf->kb_ents[i].ke_data, in zero_geli_intake_keys()
189 sizeof(keybuf->kb_ents[i].ke_data)); in zero_geli_intake_keys()
190 keybuf->kb_ents[i].ke_type = KEYBUF_TYPE_NONE; in zero_geli_intake_keys()
1330 struct keybuf *keybuf; in g_eli_taste() local
1375 if ((keybuf = get_keybuf()) != NULL) { in g_eli_taste()
1377 for (i = 0; i < keybuf->kb_nents; i++) { in g_eli_taste()
[all …]
/src/lib/libc/gen/
H A Dgetpwent.c795 char keybuf[MAXLOGNAME + 1]; in files_passwd() local
813 keybuf[0] = _PW_KEYBYNAME; in files_passwd()
817 keybuf[0] = _PW_KEYBYUID; in files_passwd()
820 keybuf[0] = _PW_KEYBYNUM; in files_passwd()
847 key.data = keybuf; in files_passwd()
854 namesize = strlcpy(&keybuf[1], name, sizeof(keybuf)-1); in files_passwd()
855 if (namesize >= sizeof(keybuf)-1) { in files_passwd()
864 memcpy(&keybuf[1], &uid, sizeof(uid)); in files_passwd()
868 memcpy(&keybuf[1], &store, sizeof(store)); in files_passwd()
875 memcpy(&keybuf[1], &st->keynum, in files_passwd()
[all …]
/src/contrib/wpa/src/eap_common/
H A Dikev2_common.c635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local
650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys()
651 if (keybuf == NULL) in ikev2_derive_sk_keys()
655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys()
656 os_free(keybuf); in ikev2_derive_sk_keys()
660 pos = keybuf; in ikev2_derive_sk_keys()
717 os_free(keybuf); in ikev2_derive_sk_keys()

12