Home
last modified time | relevance | path

Searched refs:nkeys (Results 1 – 21 of 21) sorted by relevance

/dragonfly/sbin/hammer2/
H A Dcmd_rsa.c131 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc()
193 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc()
204 if (i + 1 != nkeys) in cmd_rsaenc()
218 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc()
229 if (i + 1 != nkeys) in cmd_rsaenc()
244 for (i = 0; i < nkeys; ++i) { in cmd_rsaenc()
266 for (i = 0; i < nkeys; ++i) { in cmd_rsadec()
338 if (i + 1 != nkeys) in cmd_rsadec()
352 for (i = 0; i < nkeys; ++i) { in cmd_rsadec()
363 if (i + 1 != nkeys) in cmd_rsadec()
[all …]
H A Dhammer2.h161 int cmd_rsaenc(const char **keys, int nkeys);
162 int cmd_rsadec(const char **keys, int nkeys);
/dragonfly/crypto/openssh/
H A Dssh-add.c329 for (i = 0; i < idlist->nkeys; i++) { in add_file()
524 for (i = 0; i < idlist->nkeys; i++) { in list_identities()
714 hke->file, hke->line, dch->nkeys); in parse_dest_constraint_hop()
715 dch->keys = xrecallocarray(dch->keys, dch->nkeys, in parse_dest_constraint_hop()
716 dch->nkeys + 1, sizeof(*dch->keys)); in parse_dest_constraint_hop()
717 dch->key_is_ca = xrecallocarray(dch->key_is_ca, dch->nkeys, in parse_dest_constraint_hop()
718 dch->nkeys + 1, sizeof(*dch->key_is_ca)); in parse_dest_constraint_hop()
720 &(dch->keys[dch->nkeys]))) != 0) in parse_dest_constraint_hop()
722 dch->key_is_ca[dch->nkeys] = want_ca; in parse_dest_constraint_hop()
723 dch->nkeys++; in parse_dest_constraint_hop()
[all …]
H A Dssh-pkcs11-helper.c123 int r, i, nkeys; in process_add() local
134 if ((nkeys = pkcs11_add_provider(name, pin, &keys, &labels)) > 0) { in process_add()
137 (r = sshbuf_put_u32(msg, nkeys)) != 0) in process_add()
139 for (i = 0; i < nkeys; i++) { in process_add()
152 (r = sshbuf_put_u32(msg, -nkeys)) != 0) in process_add()
H A Dclientloop.c1824 for (i = 0; i < ctx->nkeys; i++) in hostkeys_update_ctx_free()
1872 for (i = 0; i < ctx->nkeys; i++) { in hostkeys_find()
1921 for (i = 0; i < ctx->nkeys; i++) { in hostkeys_find()
2017 for (i = 0; i < ctx->nkeys; i++) { in update_known_hosts()
2276 for (i = 0; i < ctx->nkeys; i++) { in client_input_hostkeys()
2284 if ((tmp = recallocarray(ctx->keys, ctx->nkeys, ctx->nkeys + 1, in client_input_hostkeys()
2287 ctx->nkeys); in client_input_hostkeys()
2289 ctx->keys[ctx->nkeys++] = key; in client_input_hostkeys()
2293 if (ctx->nkeys == 0) { in client_input_hostkeys()
2331 for (i = 0; i < ctx->nkeys; i++) { in client_input_hostkeys()
[all …]
H A Dssh-agent.c228 for (i = 0; i < dch->nkeys; i++) in free_dest_constraint_hop()
277 tag, hostname, sshkey_type(key), fp, dch->nkeys); in match_key_hop()
279 for (i = 0; i < dch->nkeys; i++) { in match_key_hop()
333 d->from.nkeys, in permitted_by_dest_constraints()
340 if (d->from.hostname != NULL || d->from.nkeys != 0) in permitted_by_dest_constraints()
984 dch->keys = xrecallocarray(dch->keys, dch->nkeys, in parse_dest_constraint_hop()
985 dch->nkeys + 1, sizeof(*dch->keys)); in parse_dest_constraint_hop()
987 dch->nkeys + 1, sizeof(*dch->key_is_ca)); in parse_dest_constraint_hop()
999 dch->keys[dch->nkeys] = k; in parse_dest_constraint_hop()
1000 dch->key_is_ca[dch->nkeys] = key_is_ca != 0; in parse_dest_constraint_hop()
[all …]
H A Dauthfd.h24 size_t nkeys; member
34 u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ member
H A Dhostfile.c537 size_t nkeys; member
555 for (i = 0; i < ctx->nkeys; i++) { in host_delete()
587 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) in hostfile_replace_entries() argument
605 if ((ctx.match_keys = calloc(nkeys, sizeof(*ctx.match_keys))) == NULL) in hostfile_replace_entries()
608 ctx.nkeys = nkeys; in hostfile_replace_entries()
644 for (i = 0; i < nkeys; i++) { in hostfile_replace_entries()
H A Dauthfd.c325 idl->nkeys = num; in ssh_fetch_identitylist()
343 for (i = 0; i < idl->nkeys; i++) { in ssh_free_identitylist()
369 for (i = 0; i < idlist->nkeys; i++) { in ssh_agent_has_key()
472 for (i = 0; i < dch->nkeys; i++) { in encode_dest_constraint_hop()
H A Dssh.c1577 sensitive_data.nkeys = 0; in main()
1580 sensitive_data.nkeys = 10; in main()
1581 sensitive_data.keys = xcalloc(sensitive_data.nkeys, in main()
1586 if ((o) >= sensitive_data.nkeys) \ in main()
1595 if ((o) >= sensitive_data.nkeys) \ in main()
1673 if (sensitive_data.nkeys != 0) { in main()
1674 for (i = 0; i < sensitive_data.nkeys; i++) { in main()
2233 int nkeys; in load_public_identity_files() local
2250 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, in load_public_identity_files()
2252 for (i = 0; i < nkeys; i++) { in load_public_identity_files()
H A Dsshconnect.h30 int nkeys; member
H A Dhostfile.h56 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
H A Dsshd.c767 u_int i, nkeys; local
777 for (i = nkeys = 0; i < options.num_host_key_files; i++) {
786 if (nkeys == 0) {
802 nkeys++;
804 debug3_f("sent %u hostkeys", nkeys);
805 if (nkeys == 0)
H A Dssh-keygen.c840 int i, nkeys; in do_download() local
849 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys, &comments); in do_download()
850 if (nkeys <= 0) in do_download()
852 for (i = 0; i < nkeys; i++) { in do_download()
1703 int r, i, nkeys; in load_pkcs11_key() local
1708 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, in load_pkcs11_key()
1710 debug3_f("%d keys", nkeys); in load_pkcs11_key()
1711 if (nkeys <= 0) in load_pkcs11_key()
1713 for (i = 0; i < nkeys; i++) { in load_pkcs11_key()
1776 for (j = 0; j < agent_ids->nkeys; j++) { in do_ca_sign()
H A Dsshkey.c4148 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; in private2_decrypt() local
4166 (r = sshbuf_get_u32(decoded, &nkeys)) != 0) in private2_decrypt()
4169 if (nkeys != 1) { in private2_decrypt()
4350 u_int nkeys = 0; in sshkey_parse_private2_pubkey() local
4362 (r = sshbuf_get_u32(decoded, &nkeys)) != 0) in sshkey_parse_private2_pubkey()
4365 if (nkeys != 1) { in sshkey_parse_private2_pubkey()
H A Dsshconnect2.c1690 debug_f("agent returned %zu keys", idlist->nkeys); in get_agent_identities()
1766 for (j = 0; j < idlist->nkeys; j++) { in pubkey_prepare()
2188 for (i = 0; i < authctxt->sensitive->nkeys; i++) { in userauth_hostbased()
/dragonfly/lib/libc/db/btree/
H A Dbt_debug.c249 unsigned long ifree, lfree, nkeys; in __bt_stat() local
254 nkeys = ifree = lfree = 0; in __bt_stat()
267 nkeys += NEXTINDEX(h); in __bt_stat()
288 levels, levels == 1 ? "" : "s", nkeys); in __bt_stat()
/dragonfly/games/arithmetic/
H A Darithmetic.c85 static int nkeys = sizeof(defaultkeys) - 1; variable
117 nkeys = p - optarg; in main()
190 op = keys[random() % nkeys]; in problem()
/dragonfly/lib/libc/db/hash/
H A Dhash.h79 int32_t nkeys; /* Number of keys in hash table */ member
284 #define NKEYS hdr.nkeys
H A Dhash.c924 P_32_COPY(srcp->nkeys, destp->nkeys); in swap_header_copy()
955 M_32_SWAP(hdrp->nkeys); in swap_header()
/dragonfly/tools/tools/ath/athregs/
H A Ddumpregs.c64 static void ath_hal_dumpkeycache(FILE *fd, int nkeys);
648 ath_hal_dumpkeycache(FILE *fd, int nkeys) in ath_hal_dumpkeycache() argument
668 for (entry = 0; entry < nkeys; entry++) { in ath_hal_dumpkeycache()