/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 610 return keys->SK_d && keys->SK_ai && keys->SK_ar && keys->SK_ei && in ikev2_keys_set() 611 keys->SK_er && keys->SK_pi && keys->SK_pr; in ikev2_keys_set() 624 keys->SK_d = keys->SK_ai = keys->SK_ar = keys->SK_ei = keys->SK_er = in ikev2_free_keys() 625 keys->SK_pi = keys->SK_pr = NULL; in ikev2_free_keys() 666 keys->SK_d, keys->SK_d_len); in ikev2_derive_sk_keys() 674 keys->SK_ai, keys->SK_integ_len); in ikev2_derive_sk_keys() 682 keys->SK_ar, keys->SK_integ_len); in ikev2_derive_sk_keys() 690 keys->SK_ei, keys->SK_encr_len); in ikev2_derive_sk_keys() 698 keys->SK_er, keys->SK_encr_len); in ikev2_derive_sk_keys() 706 keys->SK_pi, keys->SK_prf_len); in ikev2_derive_sk_keys() [all …]
|
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 68 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, in eap_ikev2_validate_icv() argument 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv() 96 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len, in eap_ikev2_validate_icv()
|
H A D | ikev2_common.h | 245 int ikev2_keys_set(struct ikev2_keys *keys); 246 void ikev2_free_keys(struct ikev2_keys *keys); 288 struct ikev2_keys *keys, int initiator, 320 u8 * ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, 325 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, 332 struct ikev2_keys *keys);
|
/dragonfly/sbin/hammer2/ |
H A D | cmd_rsa.c | 197 keys[i], in cmd_rsaenc() 202 keys[i], in cmd_rsaenc() 222 keys[i], in cmd_rsaenc() 227 keys[i], in cmd_rsaenc() 245 if (keys[i]) in cmd_rsaenc() 248 free(keys); in cmd_rsaenc() 331 keys[i], in cmd_rsadec() 356 keys[i], in cmd_rsadec() 361 keys[i], in cmd_rsadec() 379 if (keys[i]) in cmd_rsadec() [all …]
|
/dragonfly/usr.sbin/mtree/ |
H A D | create.c | 235 if (keys & F_UNAME && in statf() 238 if (keys & F_UID || (keys & F_UNAME && name == NULL)) in statf() 246 if (keys & F_GID || (keys & F_GNAME && name == NULL)) in statf() 253 if (keys & F_DEV && in statf() 260 if (keys & F_SIZE && in statf() 264 if (keys & F_TIME) in statf() 288 if (keys & F_SLINK && in statf() 402 if (keys & F_UID || (keys & F_UNAME && name == NULL)) in statd() 409 if (keys & F_GID || (keys & F_GNAME && name == NULL)) in statd() 412 if (keys & F_MODE) in statd() [all …]
|
H A D | mtree.c | 135 keys = F_TYPE; in main() 138 keys |= parsekey(p, NULL); in main() 143 keys |= parsekey(p, NULL); in main() 190 keys &= ~parsekey(p, NULL); in main()
|
/dragonfly/contrib/libarchive/libarchive/ |
H A D | archive_write_set_format_mtree.c | 138 int keys; member 172 int keys; member 446 keys = mtree->keys & SET_KEYS; in write_global() 448 effkeys = keys; in write_global() 562 mtree->set.keys = keys; in write_global() 643 int keys = mtree->keys; in attr_counter_set_collect() local 729 int keys; in get_global_set_keys() local 731 keys = mtree->keys; in get_global_set_keys() 752 keys &= ~F_MODE; in get_global_set_keys() 771 return (keys); in get_global_set_keys() [all …]
|
/dragonfly/games/tetris/ |
H A D | tetris.c | 152 const char *keys; in main() local 158 keys = "jkl pq"; in main() 202 if (keys[i] == keys[j]) in main() 205 if (keys[i] == ' ') in main() 208 key_write[i][0] = keys[i]; in main() 267 if (c == keys[5]) { in main() 271 if (c == keys[4]) { in main() 287 if (c == keys[0]) { in main() 293 if (c == keys[1]) { in main() 302 if (c == keys[2]) { in main() [all …]
|
/dragonfly/contrib/gcc-4.7/gcc/ |
H A D | pointer-set.c | 197 const void **keys; member 219 XDELETEVEC (pmap->keys); in pointer_map_destroy() 235 if (pmap->keys[n] == p) in pointer_map_contains() 237 else if (pmap->keys[n] == 0) in pointer_map_contains() 266 if (pmap->keys[i]) in pointer_map_insert() 268 const void *key = pmap->keys[i]; in pointer_map_insert() 274 XDELETEVEC (pmap->keys); in pointer_map_insert() 278 pmap->keys = new_keys; in pointer_map_insert() 283 if (!pmap->keys[n]) in pointer_map_insert() 286 pmap->keys[n] = p; in pointer_map_insert() [all …]
|
/dragonfly/contrib/mdocml/ |
H A D | tbl_opts.c | 42 static const struct tbl_phrase keys[] = { variable 60 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0]))) 107 "%s", keys[key].name); in arg() 110 "%s want %d have %d", keys[key].name, want, len); in arg() 154 (strncasecmp(p + pos, keys[i].name, len) || in tbl_option() 155 keys[i].name[len] != '\0')) in tbl_option() 168 if (keys[i].key) in tbl_option() 169 tbl->opts.opts |= keys[i].key; in tbl_option()
|
/dragonfly/lib/libdmsg/ |
H A D | crypto.c | 407 if (keys[0] == NULL) { in dmsg_crypto_negotiate() 427 if (keys[1] == NULL) { in dmsg_crypto_negotiate() 444 if (keys[2] == NULL) { in dmsg_crypto_negotiate() 456 if (keys[0]) { in dmsg_crypto_negotiate() 525 if (keys[0]) { in dmsg_crypto_negotiate() 655 if (keys[0]) in dmsg_crypto_negotiate() 656 RSA_free(keys[0]); in dmsg_crypto_negotiate() 657 if (keys[1]) in dmsg_crypto_negotiate() 658 RSA_free(keys[1]); in dmsg_crypto_negotiate() 659 if (keys[2]) in dmsg_crypto_negotiate() [all …]
|
/dragonfly/tools/regression/usr.sbin/installer/libaura/dict2/ |
H A D | dict2.c | 9 const char keys[][16] = { variable 63 aura_dict_store(d, keys[i], strlen(keys[i]), in test_store() 66 m2s(method), keys[i], values[i]); in test_store() 81 aura_dict_fetch(d, keys[i], strlen(keys[i]), in test_fetch() 89 printf("%s_fetch: %s=>%d\n", m2s(method), keys[i], *val); in test_fetch()
|
/dragonfly/contrib/ldns/ldns/ |
H A D | dnssec_verify.h | 360 ldns_rr_list *keys); 375 const ldns_rr_list *keys, 392 const ldns_rr_list *keys, 411 const ldns_rr_list *keys, 430 const ldns_rr_list * keys, 465 const ldns_rr_list *keys); 480 const ldns_rr_list *keys, time_t check_time); 494 const ldns_rr_list * keys); 653 const ldns_rr_list *keys, 670 const ldns_rr_list *keys, time_t check_time, [all …]
|
/dragonfly/crypto/openssh/ |
H A D | PROTOCOL.key | 5 The key consists of a header, a list of public keys, and 6 an encrypted list of matching private keys. 14 uint32 number of keys N 19 string encrypted, padded list of private keys 30 3. Unencrypted list of N private keys 63 encrypt the unencrypted list of private keys. 67 For unencrypted keys the cipher "none" and the KDF "none"
|
H A D | README.dns | 1 How to verify host keys using OpenSSH and DNS 4 OpenSSH contains support for verifying host keys using DNS as described 18 file containing the public host key file. If you have multiple keys, 30 (2) Client: Enable ssh to verify host keys using DNS 32 To enable the ssh client to verify host keys using DNS, you have to
|
H A D | ssh-keysign.c | 181 struct sshkey *keys[NUM_KEYTYPES], *key = NULL; in main() local 239 keys[i] = NULL; in main() 248 keys[i] = key; in main() 279 if (keys[i] != NULL && in main() 280 sshkey_equal_public(key, keys[i])) { in main() 293 if ((r = sshkey_sign(keys[i], &signature, &slen, data, dlen, in main()
|
/dragonfly/contrib/ldns/drill/ |
H A D | drill_util.c | 119 ldns_rr_list *keys; in print_ds_of_keys() local 124 keys = ldns_pkt_rr_list_by_type(p, LDNS_RR_TYPE_DNSKEY, in print_ds_of_keys() 130 if (keys) { in print_ds_of_keys() 131 for (i = 0; i < ldns_rr_list_rr_count(keys); i++) { in print_ds_of_keys() 133 (unsigned int)ldns_calc_keytag(ldns_rr_list_rr(keys, i))); in print_ds_of_keys() 135 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA1); in print_ds_of_keys() 137 ds = ldns_key_rr2ds(ldns_rr_list_rr(keys, i), LDNS_SHA256); in print_ds_of_keys() 140 ldns_rr_list_deep_free(keys); in print_ds_of_keys()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls_common.c | 146 struct tls_random keys; in eap_server_tls_derive_session_id() local 173 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys)) in eap_server_tls_derive_session_id() 176 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id() 179 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_server_tls_derive_session_id() 186 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id() 187 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_server_tls_derive_session_id() 188 keys.server_random_len); in eap_server_tls_derive_session_id()
|
/dragonfly/contrib/ldns/ |
H A D | dnssec_verify.c | 106 ldns_rr_list *keys; in ldns_dnssec_build_data_chain_dnskey() local 118 if (!keys) { in ldns_dnssec_build_data_chain_dnskey() 133 keys, in ldns_dnssec_build_data_chain_dnskey() 142 keys, in ldns_dnssec_build_data_chain_dnskey() 147 ldns_rr_list_deep_free(keys); in ldns_dnssec_build_data_chain_dnskey() 1101 const ldns_rr_list *keys, in ldns_verify_time() argument 1201 if (res && domain && keys) { in ldns_fetch_valid_domain_keys_time() 1217 keys, in ldns_fetch_valid_domain_keys_time() 1270 const ldns_rr_list * keys, in ldns_validate_domain_dnskey_time() argument 1373 const ldns_rr_list * keys, in ldns_validate_domain_ds_time() argument [all …]
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | eapol_test.c | 852 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys() 853 os_free(keys); in ieee802_1x_get_keys() 858 if (keys) { in ieee802_1x_get_keys() 859 if (keys->send) { in ieee802_1x_get_keys() 861 keys->send, keys->send_len); in ieee802_1x_get_keys() 863 if (keys->recv) { in ieee802_1x_get_keys() 865 keys->recv, keys->recv_len); in ieee802_1x_get_keys() 868 keys->recv_len; in ieee802_1x_get_keys() 878 keys->send, keys->send_len); in ieee802_1x_get_keys() 883 os_free(keys->send); in ieee802_1x_get_keys() [all …]
|
/dragonfly/contrib/lvm2/dist/tools/ |
H A D | reporter.c | 222 const char *keys = NULL, *options = NULL, *separator; in _report() local 249 keys = find_config_tree_str(cmd, "report/lvs_sort", in _report() 261 keys = find_config_tree_str(cmd, "report/vgs_sort", in _report() 274 keys = find_config_tree_str(cmd, "report/pvs_sort", in _report() 286 keys = find_config_tree_str(cmd, "report/segs_sort", in _report() 298 keys = find_config_tree_str(cmd, "report/pvsegs_sort", in _report() 333 keys = arg_str_value(cmd, sort_ARG, keys); in _report() 353 if (!(report_handle = report_init(cmd, options, keys, &report_type, in _report()
|
/dragonfly/share/syscons/keymaps/ |
H A D | INDEX.keymaps | 47 be.iso.acc.kbd:en:Belgian ISO-8859-1 (accent keys) 101 el.iso07.kbd:en:Greek ISO-8859-7 (104 keys) 131 fr.iso.acc.kbd:en:French ISO-8859-1 (accent keys) 133 fr.iso.acc.kbd:fr:Fran�ais ISO-8859-1 (accent keys) 165 gr.us101.acc.kbd:en:Greek ISO-8859-7 (101 keys) 175 hu.iso2.101keys.kbd:en:Hungarian 101 ISO-8859-2 176 hu.iso2.101keys.kbd:de:Ungarisch 101 ISO-8859-2 177 hu.iso2.101keys.kbd:es:H�ngaro 101 ISO-8859-2 179 hu.iso2.102keys.kbd:en:Hungarian 102 ISO-8859-2 180 hu.iso2.102keys.kbd:de:Ungarisch 102 ISO-8859-2 [all …]
|
/dragonfly/contrib/grep/src/ |
H A D | grep.c | 2300 char *keys = *keys_p; in fgrep_to_grep_pattern() local 2323 switch (*keys) in fgrep_to_grep_pattern() 2328 *p++ = *keys; in fgrep_to_grep_pattern() 2352 char const *q = keys; in try_fgrep_pattern() 2426 char *keys = NULL; in main() local 2572 keys = x2realloc (keys, &keyalloc); in main() 2577 keys[keycc++] = '\n'; in main() 2598 keys = x2realloc (keys, &keyalloc); in main() 2610 keys[keycc++] = '\n'; in main() 2796 if (keys) in main() [all …]
|
/dragonfly/crypto/libressl/tls/ |
H A D | tls_signer.c | 36 struct tls_signer_key *keys; member 62 while (signer->keys) { in tls_signer_free() 63 skey = signer->keys; in tls_signer_free() 64 signer->keys = skey->next; in tls_signer_free() 139 skey->next = signer->keys; in tls_signer_add_keypair_mem() 140 signer->keys = skey; in tls_signer_add_keypair_mem() 286 for (skey = signer->keys; skey; skey = skey->next) in tls_signer_sign()
|
/dragonfly/tools/tools/locale/tools/ |
H A D | cldr2def.pl | 52 my %keys = (); 53 tie(%keys, "Tie::IxHash"); 130 %keys = ( 141 %keys = ( 164 %keys = ( 176 %keys = ( 541 foreach my $k (keys(%keys)) { 678 foreach my $k (keys(%keys)) { 679 my $f = $keys{$k}; 689 $f = $keys{$k};
|