Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 198) sorted by relevance

12345678

/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Dikev2_common.c610 return keys->SK_d && keys->SK_ai && keys->SK_ar && keys->SK_ei && in ikev2_keys_set()
611 keys->SK_er && keys->SK_pi && keys->SK_pr; in ikev2_keys_set()
624 keys->SK_d = keys->SK_ai = keys->SK_ar = keys->SK_ei = keys->SK_er = in ikev2_free_keys()
625 keys->SK_pi = keys->SK_pr = NULL; in ikev2_free_keys()
666 keys->SK_d, keys->SK_d_len); in ikev2_derive_sk_keys()
674 keys->SK_ai, keys->SK_integ_len); in ikev2_derive_sk_keys()
682 keys->SK_ar, keys->SK_integ_len); in ikev2_derive_sk_keys()
690 keys->SK_ei, keys->SK_encr_len); in ikev2_derive_sk_keys()
698 keys->SK_er, keys->SK_encr_len); in ikev2_derive_sk_keys()
706 keys->SK_pi, keys->SK_prf_len); in ikev2_derive_sk_keys()
[all …]
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
68 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, in eap_ikev2_validate_icv() argument
75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv()
96 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len, in eap_ikev2_validate_icv()
H A Dikev2_common.h245 int ikev2_keys_set(struct ikev2_keys *keys);
246 void ikev2_free_keys(struct ikev2_keys *keys);
288 struct ikev2_keys *keys, int initiator,
320 u8 * ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys,
325 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys,
332 struct ikev2_keys *keys);
/dragonfly/sbin/hammer2/
H A Dcmd_rsa.c197 keys[i], in cmd_rsaenc()
202 keys[i], in cmd_rsaenc()
222 keys[i], in cmd_rsaenc()
227 keys[i], in cmd_rsaenc()
245 if (keys[i]) in cmd_rsaenc()
248 free(keys); in cmd_rsaenc()
331 keys[i], in cmd_rsadec()
356 keys[i], in cmd_rsadec()
361 keys[i], in cmd_rsadec()
379 if (keys[i]) in cmd_rsadec()
[all …]
/dragonfly/usr.sbin/mtree/
H A Dcreate.c235 if (keys & F_UNAME && in statf()
238 if (keys & F_UID || (keys & F_UNAME && name == NULL)) in statf()
246 if (keys & F_GID || (keys & F_GNAME && name == NULL)) in statf()
253 if (keys & F_DEV && in statf()
260 if (keys & F_SIZE && in statf()
264 if (keys & F_TIME) in statf()
288 if (keys & F_SLINK && in statf()
402 if (keys & F_UID || (keys & F_UNAME && name == NULL)) in statd()
409 if (keys & F_GID || (keys & F_GNAME && name == NULL)) in statd()
412 if (keys & F_MODE) in statd()
[all …]
H A Dmtree.c135 keys = F_TYPE; in main()
138 keys |= parsekey(p, NULL); in main()
143 keys |= parsekey(p, NULL); in main()
190 keys &= ~parsekey(p, NULL); in main()
/dragonfly/contrib/libarchive/libarchive/
H A Darchive_write_set_format_mtree.c138 int keys; member
172 int keys; member
446 keys = mtree->keys & SET_KEYS; in write_global()
448 effkeys = keys; in write_global()
562 mtree->set.keys = keys; in write_global()
643 int keys = mtree->keys; in attr_counter_set_collect() local
729 int keys; in get_global_set_keys() local
731 keys = mtree->keys; in get_global_set_keys()
752 keys &= ~F_MODE; in get_global_set_keys()
771 return (keys); in get_global_set_keys()
[all …]
/dragonfly/games/tetris/
H A Dtetris.c152 const char *keys; in main() local
158 keys = "jkl pq"; in main()
202 if (keys[i] == keys[j]) in main()
205 if (keys[i] == ' ') in main()
208 key_write[i][0] = keys[i]; in main()
267 if (c == keys[5]) { in main()
271 if (c == keys[4]) { in main()
287 if (c == keys[0]) { in main()
293 if (c == keys[1]) { in main()
302 if (c == keys[2]) { in main()
[all …]
/dragonfly/contrib/gcc-4.7/gcc/
H A Dpointer-set.c197 const void **keys; member
219 XDELETEVEC (pmap->keys); in pointer_map_destroy()
235 if (pmap->keys[n] == p) in pointer_map_contains()
237 else if (pmap->keys[n] == 0) in pointer_map_contains()
266 if (pmap->keys[i]) in pointer_map_insert()
268 const void *key = pmap->keys[i]; in pointer_map_insert()
274 XDELETEVEC (pmap->keys); in pointer_map_insert()
278 pmap->keys = new_keys; in pointer_map_insert()
283 if (!pmap->keys[n]) in pointer_map_insert()
286 pmap->keys[n] = p; in pointer_map_insert()
[all …]
/dragonfly/contrib/mdocml/
H A Dtbl_opts.c42 static const struct tbl_phrase keys[] = { variable
60 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0])))
107 "%s", keys[key].name); in arg()
110 "%s want %d have %d", keys[key].name, want, len); in arg()
154 (strncasecmp(p + pos, keys[i].name, len) || in tbl_option()
155 keys[i].name[len] != '\0')) in tbl_option()
168 if (keys[i].key) in tbl_option()
169 tbl->opts.opts |= keys[i].key; in tbl_option()
/dragonfly/lib/libdmsg/
H A Dcrypto.c407 if (keys[0] == NULL) { in dmsg_crypto_negotiate()
427 if (keys[1] == NULL) { in dmsg_crypto_negotiate()
444 if (keys[2] == NULL) { in dmsg_crypto_negotiate()
456 if (keys[0]) { in dmsg_crypto_negotiate()
525 if (keys[0]) { in dmsg_crypto_negotiate()
655 if (keys[0]) in dmsg_crypto_negotiate()
656 RSA_free(keys[0]); in dmsg_crypto_negotiate()
657 if (keys[1]) in dmsg_crypto_negotiate()
658 RSA_free(keys[1]); in dmsg_crypto_negotiate()
659 if (keys[2]) in dmsg_crypto_negotiate()
[all …]
/dragonfly/tools/regression/usr.sbin/installer/libaura/dict2/
H A Ddict2.c9 const char keys[][16] = { variable
63 aura_dict_store(d, keys[i], strlen(keys[i]), in test_store()
66 m2s(method), keys[i], values[i]); in test_store()
81 aura_dict_fetch(d, keys[i], strlen(keys[i]), in test_fetch()
89 printf("%s_fetch: %s=>%d\n", m2s(method), keys[i], *val); in test_fetch()
/dragonfly/contrib/ldns/ldns/
H A Ddnssec_verify.h360 ldns_rr_list *keys);
375 const ldns_rr_list *keys,
392 const ldns_rr_list *keys,
411 const ldns_rr_list *keys,
430 const ldns_rr_list * keys,
465 const ldns_rr_list *keys);
480 const ldns_rr_list *keys, time_t check_time);
494 const ldns_rr_list * keys);
653 const ldns_rr_list *keys,
670 const ldns_rr_list *keys, time_t check_time,
[all …]
/dragonfly/crypto/openssh/
H A DPROTOCOL.key5 The key consists of a header, a list of public keys, and
6 an encrypted list of matching private keys.
14 uint32 number of keys N
19 string encrypted, padded list of private keys
30 3. Unencrypted list of N private keys
63 encrypt the unencrypted list of private keys.
67 For unencrypted keys the cipher "none" and the KDF "none"
H A DREADME.dns1 How to verify host keys using OpenSSH and DNS
4 OpenSSH contains support for verifying host keys using DNS as described
18 file containing the public host key file. If you have multiple keys,
30 (2) Client: Enable ssh to verify host keys using DNS
32 To enable the ssh client to verify host keys using DNS, you have to
H A Dssh-keysign.c181 struct sshkey *keys[NUM_KEYTYPES], *key = NULL; in main() local
239 keys[i] = NULL; in main()
248 keys[i] = key; in main()
279 if (keys[i] != NULL && in main()
280 sshkey_equal_public(key, keys[i])) { in main()
293 if ((r = sshkey_sign(keys[i], &signature, &slen, data, dlen, in main()
/dragonfly/contrib/ldns/drill/
H A Ddrill_util.c119 ldns_rr_list *keys; in print_ds_of_keys() local
124 keys = ldns_pkt_rr_list_by_type(p, LDNS_RR_TYPE_DNSKEY, in print_ds_of_keys()
130 if (keys) { in print_ds_of_keys()
131 for (i = 0; i < ldns_rr_list_rr_count(keys); i++) { in print_ds_of_keys()
133 (unsigned int)ldns_calc_keytag(ldns_rr_list_rr(keys, i))); in print_ds_of_keys()
135 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA1); in print_ds_of_keys()
137 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA256); in print_ds_of_keys()
140 ldns_rr_list_deep_free(keys); in print_ds_of_keys()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_tls_common.c146 struct tls_random keys; in eap_server_tls_derive_session_id() local
173 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys)) in eap_server_tls_derive_session_id()
176 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id()
179 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_server_tls_derive_session_id()
186 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
187 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_server_tls_derive_session_id()
188 keys.server_random_len); in eap_server_tls_derive_session_id()
/dragonfly/contrib/ldns/
H A Ddnssec_verify.c106 ldns_rr_list *keys; in ldns_dnssec_build_data_chain_dnskey() local
118 if (!keys) { in ldns_dnssec_build_data_chain_dnskey()
133 keys, in ldns_dnssec_build_data_chain_dnskey()
142 keys, in ldns_dnssec_build_data_chain_dnskey()
147 ldns_rr_list_deep_free(keys); in ldns_dnssec_build_data_chain_dnskey()
1101 const ldns_rr_list *keys, in ldns_verify_time() argument
1201 if (res && domain && keys) { in ldns_fetch_valid_domain_keys_time()
1217 keys, in ldns_fetch_valid_domain_keys_time()
1270 const ldns_rr_list * keys, in ldns_validate_domain_dnskey_time() argument
1373 const ldns_rr_list * keys, in ldns_validate_domain_ds_time() argument
[all …]
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Deapol_test.c852 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys()
853 os_free(keys); in ieee802_1x_get_keys()
858 if (keys) { in ieee802_1x_get_keys()
859 if (keys->send) { in ieee802_1x_get_keys()
861 keys->send, keys->send_len); in ieee802_1x_get_keys()
863 if (keys->recv) { in ieee802_1x_get_keys()
865 keys->recv, keys->recv_len); in ieee802_1x_get_keys()
868 keys->recv_len; in ieee802_1x_get_keys()
878 keys->send, keys->send_len); in ieee802_1x_get_keys()
883 os_free(keys->send); in ieee802_1x_get_keys()
[all …]
/dragonfly/contrib/lvm2/dist/tools/
H A Dreporter.c222 const char *keys = NULL, *options = NULL, *separator; in _report() local
249 keys = find_config_tree_str(cmd, "report/lvs_sort", in _report()
261 keys = find_config_tree_str(cmd, "report/vgs_sort", in _report()
274 keys = find_config_tree_str(cmd, "report/pvs_sort", in _report()
286 keys = find_config_tree_str(cmd, "report/segs_sort", in _report()
298 keys = find_config_tree_str(cmd, "report/pvsegs_sort", in _report()
333 keys = arg_str_value(cmd, sort_ARG, keys); in _report()
353 if (!(report_handle = report_init(cmd, options, keys, &report_type, in _report()
/dragonfly/share/syscons/keymaps/
H A DINDEX.keymaps47 be.iso.acc.kbd:en:Belgian ISO-8859-1 (accent keys)
101 el.iso07.kbd:en:Greek ISO-8859-7 (104 keys)
131 fr.iso.acc.kbd:en:French ISO-8859-1 (accent keys)
133 fr.iso.acc.kbd:fr:Fran�ais ISO-8859-1 (accent keys)
165 gr.us101.acc.kbd:en:Greek ISO-8859-7 (101 keys)
175 hu.iso2.101keys.kbd:en:Hungarian 101 ISO-8859-2
176 hu.iso2.101keys.kbd:de:Ungarisch 101 ISO-8859-2
177 hu.iso2.101keys.kbd:es:H�ngaro 101 ISO-8859-2
179 hu.iso2.102keys.kbd:en:Hungarian 102 ISO-8859-2
180 hu.iso2.102keys.kbd:de:Ungarisch 102 ISO-8859-2
[all …]
/dragonfly/contrib/grep/src/
H A Dgrep.c2300 char *keys = *keys_p; in fgrep_to_grep_pattern() local
2323 switch (*keys) in fgrep_to_grep_pattern()
2328 *p++ = *keys; in fgrep_to_grep_pattern()
2352 char const *q = keys; in try_fgrep_pattern()
2426 char *keys = NULL; in main() local
2572 keys = x2realloc (keys, &keyalloc); in main()
2577 keys[keycc++] = '\n'; in main()
2598 keys = x2realloc (keys, &keyalloc); in main()
2610 keys[keycc++] = '\n'; in main()
2796 if (keys) in main()
[all …]
/dragonfly/crypto/libressl/tls/
H A Dtls_signer.c36 struct tls_signer_key *keys; member
62 while (signer->keys) { in tls_signer_free()
63 skey = signer->keys; in tls_signer_free()
64 signer->keys = skey->next; in tls_signer_free()
139 skey->next = signer->keys; in tls_signer_add_keypair_mem()
140 signer->keys = skey; in tls_signer_add_keypair_mem()
286 for (skey = signer->keys; skey; skey = skey->next) in tls_signer_sign()
/dragonfly/tools/tools/locale/tools/
H A Dcldr2def.pl52 my %keys = ();
53 tie(%keys, "Tie::IxHash");
130 %keys = (
141 %keys = (
164 %keys = (
176 %keys = (
541 foreach my $k (keys(%keys)) {
678 foreach my $k (keys(%keys)) {
679 my $f = $keys{$k};
689 $f = $keys{$k};

12345678