HomeSort by: relevance | last modified time | path
    Searched refs:keys (Results 1 - 25 of 1267) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/crypto/external/apache2/openssl/dist/crypto/sm4/asm/
sm4-riscv64-zvksed.pl 67 my ($ukey,$keys,$fk)=("a0","a1","t0");
84 # Generate round keys.
95 # Store round keys
96 @{[vse32_v $vk0, $keys]} # rk[0:3]
97 addi $keys, $keys, 16
98 @{[vse32_v $vk1, $keys]} # rk[4:7]
99 addi $keys, $keys, 16
100 @{[vse32_v $vk2, $keys]} # rk[8:11
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/rollover-lifetime/ns3/
kasp.conf.j2 15 keys {
20 keys {
26 keys {
  /src/external/mpl/bind/dist/bin/tests/system/kasp/ns6/policies/
kasp.conf.j2 15 keys {
  /src/external/bsd/wpa/dist/src/eap_common/
ikev2_common.c 36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */
371 struct ikev2_keys *keys, int initiator,
380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
429 struct ikev2_keys *keys, int initiator,
440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar
    [all...]
eap_ikev2_common.c 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL)
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
68 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys,
75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
96 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len,
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kx/
crypto_kx.c 42 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; local
57 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX);
58 crypto_generichash_init(&h, NULL, 0U, sizeof keys);
63 crypto_generichash_final(&h, keys, sizeof keys);
66 rx[i] = keys[i];
67 tx[i] = keys[i + crypto_kx_SESSIONKEYBYTES];
69 sodium_memzero(keys, sizeof keys);
83 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES] local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
default_keys.c 42 print_keys(krb5_context context, Key *keys, size_t nkeys)
48 printf("keys:\n");
52 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str);
55 (int)keys[i].key.keytype);
60 if (keys[i].salt) {
63 switch (keys[i].salt->type) {
71 printf("unknown salt: %d", keys[i].salt->type);
74 if (keys[i].salt->salt.length)
75 printf("%.*s", (int)keys[i].salt->salt.length,
76 (char *)keys[i].salt->salt.data)
88 Key *keys; local
    [all...]
set_keys.c 41 * Set the keys of `ent' to the string-to-key of `password'
51 Key *keys; local
59 &keys, &num_keys);
63 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val);
64 ent->keys.val = keys;
65 ent->keys.len = num_keys;
99 * Set the keys of `ent' to (`n_key_data', `key_data')
115 Keys keys local
288 Key *keys; local
349 Key *keys; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
ks_mem.c 50 hx509_private_key *keys; member in struct:mem_data
82 for (i = 0; mem->keys && mem->keys[i]; i++)
83 hx509_private_key_free(&mem->keys[i]);
84 free(mem->keys);
160 hx509_private_key **keys)
165 for (i = 0; mem->keys && mem->keys[i]; i++)
167 *keys = calloc(i + 1, sizeof(**keys));
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/kasp/
setup.sh 19 mkdir keys
20 mkdir ns3/keys
  /src/external/mpl/bind/dist/bin/tests/system/_common/
controls.conf.in 20 inet 10.53.0.2 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
  /src/external/mpl/bind/dist/bin/tests/system/allow-query/ns2/
controls.conf.j2 20 inet 10.53.0.2 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
  /src/external/mpl/bind/dist/bin/tests/system/checkconf-keys/
bad-length.conf.j2 15 keys {
tests_checkconf_keys.py 58 keys = isctest.kasp.keydir_to_keylist(zone)
59 assert len(keys) == 2
61 f"zone '{zone}': key file '{zone}/ECDSAP256SHA256/{keys[0].tag}' does not match dnssec-policy alternative-kz"
65 f"zone '{zone}': key file '{zone}/ECDSAP256SHA256/{keys[1].tag}' does not match dnssec-policy alternative-kz"
82 keys = isctest.kasp.keydir_to_keylist(zone)
83 assert len(keys) == 1
85 f"zone '{zone}': key file '{zone}/RSASHA256/{keys[0].tag}' does not match dnssec-policy alternative-csk"
98 keys = isctest.kasp.keydir_to_keylist(zone)
99 assert len(keys) == 1
101 f"zone '{zone}': key file '{zone}/ECDSAP256SHA256/{keys[0].tag}' does not match dnssec-policy tagrange-csk
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/isctest/vars/
all.py 33 keys = set()
35 overlap = keys.intersection(m.keys())
38 keys = keys.union(m.keys())
44 def keys(self): member in class:VarLookup
54 return iter(self.keys())
  /src/external/mpl/bind/dist/bin/tests/system/optout/ns2/
controls.conf.j2 20 inet 10.53.0.2 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
  /src/external/mpl/bind/dist/bin/tests/system/statschannel/
server-json.pl 24 foreach $key (keys %{$ref->{opcodes}}) {
27 foreach $key (keys %{$ref->{rcodes}}) {
30 foreach $key (keys %{$ref->{qtypes}}) {
33 foreach $key (keys %{$ref->{nsstats}}) {
zones-json.pl 30 foreach $key (keys %{$dnssecsign}) {
35 foreach $key (keys %{$dnssecrefresh}) {
  /src/external/bsd/wpa/dist/hostapd/logwatch/
hostapd 40 if (keys %hostapd) {
41 foreach my $iface (sort keys %hostapd) {
43 foreach my $mac (sort keys %{$hostapd{$iface}}) {
45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) {
47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) {
  /src/crypto/external/bsd/heimdal/dist/kadmin/
ext.c 50 krb5_keytab_entry *keys = NULL; local
71 krb5_warnx(context, "principal has no keys, or user lacks "
72 "get-keys privilege for %s", unparsed);
77 * can have corrupted a principal's keys in the HDB. If some
80 * If all keys are bogus then the server may be a pre-1.6,
81 * post-1.5 server and the client lacks get-keys privilege, or
82 * the keys are corrupted. We can't tell here.
85 krb5_warnx(context, "user lacks get-keys privilege for %s",
90 krb5_warnx(context, "some keys for %s are corrupted in the HDB",
93 keys = calloc(sizeof(*keys), princ.n_key_data)
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
salt-des3.c 50 DES_cblock keys[3]; local
73 memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
74 DES_set_odd_parity(keys + i);
75 if(DES_is_weak_key(keys + i))
76 _krb5_xor8(*(keys + i), (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
77 DES_set_key_unchecked(keys + i, &s[i]);
86 memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
87 DES_set_odd_parity(keys + i)
    [all...]
  /src/etc/namedb/
Makefile 3 CONFIGFILES= 127 root.cache localhost loopback.v6 bind.keys
  /src/external/bsd/ntp/dist/conf/
beauregard.conf 20 keys /usr/local/etc/ntp.keys # path for keys file
21 trustedkey 3 4 5 6 14 15 # define trusted keys
malarky.conf 7 # /usr/local/bin/ntpd -a -k /usr/local/bin/ntp.keys -m -t 3
21 keys /usr/local/etc/ntp.keys # path for key file
22 trustedkey 3 4 5 6 14 # define trusted keys
  /src/external/bsd/am-utils/dist/scripts/
fix-amd-map.in 46 foreach $m (keys %mappings) {

Completed in 32 milliseconds

1 2 3 4 5 6 7 8 91011>>