/dragonfly/sbin/hammer2/ |
H A D | cmd_rsa.c | 131 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc() 193 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc() 204 if (i + 1 != nkeys) in cmd_rsaenc() 218 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc() 229 if (i + 1 != nkeys) in cmd_rsaenc() 244 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc() 266 for (i = 0; i < nkeys; ++i) { in cmd_rsadec() 338 if (i + 1 != nkeys) in cmd_rsadec() 352 for (i = 0; i < nkeys; ++i) { in cmd_rsadec() 363 if (i + 1 != nkeys) in cmd_rsadec() [all …]
|
H A D | hammer2.h | 161 int cmd_rsaenc(const char **keys, int nkeys); 162 int cmd_rsadec(const char **keys, int nkeys);
|
/dragonfly/crypto/openssh/ |
H A D | ssh-add.c | 329 for (i = 0; i < idlist->nkeys; i++) { in add_file() 524 for (i = 0; i < idlist->nkeys; i++) { in list_identities() 714 hke->file, hke->line, dch->nkeys); in parse_dest_constraint_hop() 715 dch->keys = xrecallocarray(dch->keys, dch->nkeys, in parse_dest_constraint_hop() 716 dch->nkeys + 1, sizeof(*dch->keys)); in parse_dest_constraint_hop() 717 dch->key_is_ca = xrecallocarray(dch->key_is_ca, dch->nkeys, in parse_dest_constraint_hop() 718 dch->nkeys + 1, sizeof(*dch->key_is_ca)); in parse_dest_constraint_hop() 720 &(dch->keys[dch->nkeys]))) != 0) in parse_dest_constraint_hop() 722 dch->key_is_ca[dch->nkeys] = want_ca; in parse_dest_constraint_hop() 723 dch->nkeys++; in parse_dest_constraint_hop() [all …]
|
H A D | ssh-pkcs11-helper.c | 123 int r, i, nkeys; in process_add() local 134 if ((nkeys = pkcs11_add_provider(name, pin, &keys, &labels)) > 0) { in process_add() 137 (r = sshbuf_put_u32(msg, nkeys)) != 0) in process_add() 139 for (i = 0; i < nkeys; i++) { in process_add() 152 (r = sshbuf_put_u32(msg, -nkeys)) != 0) in process_add()
|
H A D | clientloop.c | 1824 for (i = 0; i < ctx->nkeys; i++) in hostkeys_update_ctx_free() 1872 for (i = 0; i < ctx->nkeys; i++) { in hostkeys_find() 1921 for (i = 0; i < ctx->nkeys; i++) { in hostkeys_find() 2017 for (i = 0; i < ctx->nkeys; i++) { in update_known_hosts() 2276 for (i = 0; i < ctx->nkeys; i++) { in client_input_hostkeys() 2284 if ((tmp = recallocarray(ctx->keys, ctx->nkeys, ctx->nkeys + 1, in client_input_hostkeys() 2287 ctx->nkeys); in client_input_hostkeys() 2289 ctx->keys[ctx->nkeys++] = key; in client_input_hostkeys() 2293 if (ctx->nkeys == 0) { in client_input_hostkeys() 2331 for (i = 0; i < ctx->nkeys; i++) { in client_input_hostkeys() [all …]
|
H A D | ssh-agent.c | 228 for (i = 0; i < dch->nkeys; i++) in free_dest_constraint_hop() 277 tag, hostname, sshkey_type(key), fp, dch->nkeys); in match_key_hop() 279 for (i = 0; i < dch->nkeys; i++) { in match_key_hop() 333 d->from.nkeys, in permitted_by_dest_constraints() 340 if (d->from.hostname != NULL || d->from.nkeys != 0) in permitted_by_dest_constraints() 984 dch->keys = xrecallocarray(dch->keys, dch->nkeys, in parse_dest_constraint_hop() 985 dch->nkeys + 1, sizeof(*dch->keys)); in parse_dest_constraint_hop() 987 dch->nkeys + 1, sizeof(*dch->key_is_ca)); in parse_dest_constraint_hop() 999 dch->keys[dch->nkeys] = k; in parse_dest_constraint_hop() 1000 dch->key_is_ca[dch->nkeys] = key_is_ca != 0; in parse_dest_constraint_hop() [all …]
|
H A D | authfd.h | 24 size_t nkeys; member 34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ member
|
H A D | hostfile.c | 537 size_t nkeys; member 555 for (i = 0; i < ctx->nkeys; i++) { in host_delete() 587 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) in hostfile_replace_entries() argument 605 if ((ctx.match_keys = calloc(nkeys, sizeof(*ctx.match_keys))) == NULL) in hostfile_replace_entries() 608 ctx.nkeys = nkeys; in hostfile_replace_entries() 644 for (i = 0; i < nkeys; i++) { in hostfile_replace_entries()
|
H A D | authfd.c | 325 idl->nkeys = num; in ssh_fetch_identitylist() 343 for (i = 0; i < idl->nkeys; i++) { in ssh_free_identitylist() 369 for (i = 0; i < idlist->nkeys; i++) { in ssh_agent_has_key() 472 for (i = 0; i < dch->nkeys; i++) { in encode_dest_constraint_hop()
|
H A D | ssh.c | 1577 sensitive_data.nkeys = 0; in main() 1580 sensitive_data.nkeys = 10; in main() 1581 sensitive_data.keys = xcalloc(sensitive_data.nkeys, in main() 1586 if ((o) >= sensitive_data.nkeys) \ in main() 1595 if ((o) >= sensitive_data.nkeys) \ in main() 1673 if (sensitive_data.nkeys != 0) { in main() 1674 for (i = 0; i < sensitive_data.nkeys; i++) { in main() 2233 int nkeys; in load_public_identity_files() local 2250 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, in load_public_identity_files() 2252 for (i = 0; i < nkeys; i++) { in load_public_identity_files()
|
H A D | sshconnect.h | 30 int nkeys; member
|
H A D | hostfile.h | 56 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
|
H A D | sshd.c | 767 u_int i, nkeys; local 777 for (i = nkeys = 0; i < options.num_host_key_files; i++) { 786 if (nkeys == 0) { 802 nkeys++; 804 debug3_f("sent %u hostkeys", nkeys); 805 if (nkeys == 0)
|
H A D | ssh-keygen.c | 840 int i, nkeys; in do_download() local 849 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys, &comments); in do_download() 850 if (nkeys <= 0) in do_download() 852 for (i = 0; i < nkeys; i++) { in do_download() 1703 int r, i, nkeys; in load_pkcs11_key() local 1708 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, in load_pkcs11_key() 1710 debug3_f("%d keys", nkeys); in load_pkcs11_key() 1711 if (nkeys <= 0) in load_pkcs11_key() 1713 for (i = 0; i < nkeys; i++) { in load_pkcs11_key() 1776 for (j = 0; j < agent_ids->nkeys; j++) { in do_ca_sign()
|
H A D | sshkey.c | 4148 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; in private2_decrypt() local 4166 (r = sshbuf_get_u32(decoded, &nkeys)) != 0) in private2_decrypt() 4169 if (nkeys != 1) { in private2_decrypt() 4350 u_int nkeys = 0; in sshkey_parse_private2_pubkey() local 4362 (r = sshbuf_get_u32(decoded, &nkeys)) != 0) in sshkey_parse_private2_pubkey() 4365 if (nkeys != 1) { in sshkey_parse_private2_pubkey()
|
H A D | sshconnect2.c | 1690 debug_f("agent returned %zu keys", idlist->nkeys); in get_agent_identities() 1766 for (j = 0; j < idlist->nkeys; j++) { in pubkey_prepare() 2188 for (i = 0; i < authctxt->sensitive->nkeys; i++) { in userauth_hostbased()
|
/dragonfly/lib/libc/db/btree/ |
H A D | bt_debug.c | 249 unsigned long ifree, lfree, nkeys; in __bt_stat() local 254 nkeys = ifree = lfree = 0; in __bt_stat() 267 nkeys += NEXTINDEX(h); in __bt_stat() 288 levels, levels == 1 ? "" : "s", nkeys); in __bt_stat()
|
/dragonfly/games/arithmetic/ |
H A D | arithmetic.c | 85 static int nkeys = sizeof(defaultkeys) - 1; variable 117 nkeys = p - optarg; in main() 190 op = keys[random() % nkeys]; in problem()
|
/dragonfly/lib/libc/db/hash/ |
H A D | hash.h | 79 int32_t nkeys; /* Number of keys in hash table */ member 284 #define NKEYS hdr.nkeys
|
H A D | hash.c | 924 P_32_COPY(srcp->nkeys, destp->nkeys); in swap_header_copy() 955 M_32_SWAP(hdrp->nkeys); in swap_header()
|
/dragonfly/tools/tools/ath/athregs/ |
H A D | dumpregs.c | 64 static void ath_hal_dumpkeycache(FILE *fd, int nkeys); 648 ath_hal_dumpkeycache(FILE *fd, int nkeys) in ath_hal_dumpkeycache() argument 668 for (entry = 0; entry < nkeys; entry++) { in ath_hal_dumpkeycache()
|