| /src/crypto/external/apache2/openssl/dist/crypto/sm4/asm/ |
| sm4-riscv64-zvksed.pl | 67 my ($ukey,$keys,$fk)=("a0","a1","t0"); 84 # Generate round keys. 95 # Store round keys 96 @{[vse32_v $vk0, $keys]} # rk[0:3] 97 addi $keys, $keys, 16 98 @{[vse32_v $vk1, $keys]} # rk[4:7] 99 addi $keys, $keys, 16 100 @{[vse32_v $vk2, $keys]} # rk[8:11 [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/rollover-lifetime/ns3/ |
| kasp.conf.j2 | 15 keys { 20 keys { 26 keys {
|
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ns6/policies/ |
| kasp.conf.j2 | 15 keys {
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| ikev2_common.c | 36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 371 struct ikev2_keys *keys, int initiator, 380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 429 struct ikev2_keys *keys, int initiator, 440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar [all...] |
| eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 68 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 96 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len,
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kx/ |
| crypto_kx.c | 42 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES]; local 57 COMPILER_ASSERT(sizeof keys <= crypto_generichash_BYTES_MAX); 58 crypto_generichash_init(&h, NULL, 0U, sizeof keys); 63 crypto_generichash_final(&h, keys, sizeof keys); 66 rx[i] = keys[i]; 67 tx[i] = keys[i + crypto_kx_SESSIONKEYBYTES]; 69 sodium_memzero(keys, sizeof keys); 83 unsigned char keys[2 * crypto_kx_SESSIONKEYBYTES] local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| default_keys.c | 42 print_keys(krb5_context context, Key *keys, size_t nkeys) 48 printf("keys:\n"); 52 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 55 (int)keys[i].key.keytype); 60 if (keys[i].salt) { 63 switch (keys[i].salt->type) { 71 printf("unknown salt: %d", keys[i].salt->type); 74 if (keys[i].salt->salt.length) 75 printf("%.*s", (int)keys[i].salt->salt.length, 76 (char *)keys[i].salt->salt.data) 88 Key *keys; local [all...] |
| set_keys.c | 41 * Set the keys of `ent' to the string-to-key of `password' 51 Key *keys; local 59 &keys, &num_keys); 63 _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); 64 ent->keys.val = keys; 65 ent->keys.len = num_keys; 99 * Set the keys of `ent' to (`n_key_data', `key_data') 115 Keys keys local 288 Key *keys; local 349 Key *keys; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| ks_mem.c | 50 hx509_private_key *keys; member in struct:mem_data 82 for (i = 0; mem->keys && mem->keys[i]; i++) 83 hx509_private_key_free(&mem->keys[i]); 84 free(mem->keys); 160 hx509_private_key **keys) 165 for (i = 0; mem->keys && mem->keys[i]; i++) 167 *keys = calloc(i + 1, sizeof(**keys)); [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ |
| setup.sh | 19 mkdir keys 20 mkdir ns3/keys
|
| /src/external/mpl/bind/dist/bin/tests/system/_common/ |
| controls.conf.in | 20 inet 10.53.0.2 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
|
| /src/external/mpl/bind/dist/bin/tests/system/allow-query/ns2/ |
| controls.conf.j2 | 20 inet 10.53.0.2 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
|
| /src/external/mpl/bind/dist/bin/tests/system/checkconf-keys/ |
| bad-length.conf.j2 | 15 keys {
|
| tests_checkconf_keys.py | 58 keys = isctest.kasp.keydir_to_keylist(zone) 59 assert len(keys) == 2 61 f"zone '{zone}': key file '{zone}/ECDSAP256SHA256/{keys[0].tag}' does not match dnssec-policy alternative-kz" 65 f"zone '{zone}': key file '{zone}/ECDSAP256SHA256/{keys[1].tag}' does not match dnssec-policy alternative-kz" 82 keys = isctest.kasp.keydir_to_keylist(zone) 83 assert len(keys) == 1 85 f"zone '{zone}': key file '{zone}/RSASHA256/{keys[0].tag}' does not match dnssec-policy alternative-csk" 98 keys = isctest.kasp.keydir_to_keylist(zone) 99 assert len(keys) == 1 101 f"zone '{zone}': key file '{zone}/ECDSAP256SHA256/{keys[0].tag}' does not match dnssec-policy tagrange-csk [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/isctest/vars/ |
| all.py | 33 keys = set() 35 overlap = keys.intersection(m.keys()) 38 keys = keys.union(m.keys()) 44 def keys(self): member in class:VarLookup 54 return iter(self.keys())
|
| /src/external/mpl/bind/dist/bin/tests/system/optout/ns2/ |
| controls.conf.j2 | 20 inet 10.53.0.2 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
|
| /src/external/mpl/bind/dist/bin/tests/system/statschannel/ |
| server-json.pl | 24 foreach $key (keys %{$ref->{opcodes}}) { 27 foreach $key (keys %{$ref->{rcodes}}) { 30 foreach $key (keys %{$ref->{qtypes}}) { 33 foreach $key (keys %{$ref->{nsstats}}) {
|
| zones-json.pl | 30 foreach $key (keys %{$dnssecsign}) { 35 foreach $key (keys %{$dnssecrefresh}) {
|
| /src/external/bsd/wpa/dist/hostapd/logwatch/ |
| hostapd | 40 if (keys %hostapd) { 41 foreach my $iface (sort keys %hostapd) { 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) {
|
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| ext.c | 50 krb5_keytab_entry *keys = NULL; local 71 krb5_warnx(context, "principal has no keys, or user lacks " 72 "get-keys privilege for %s", unparsed); 77 * can have corrupted a principal's keys in the HDB. If some 80 * If all keys are bogus then the server may be a pre-1.6, 81 * post-1.5 server and the client lacks get-keys privilege, or 82 * the keys are corrupted. We can't tell here. 85 krb5_warnx(context, "user lacks get-keys privilege for %s", 90 krb5_warnx(context, "some keys for %s are corrupted in the HDB", 93 keys = calloc(sizeof(*keys), princ.n_key_data) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| salt-des3.c | 50 DES_cblock keys[3]; local 73 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); 74 DES_set_odd_parity(keys + i); 75 if(DES_is_weak_key(keys + i)) 76 _krb5_xor8(*(keys + i), (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); 77 DES_set_key_unchecked(keys + i, &s[i]); 86 memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); 87 DES_set_odd_parity(keys + i) [all...] |
| /src/etc/namedb/ |
| Makefile | 3 CONFIGFILES= 127 root.cache localhost loopback.v6 bind.keys
|
| /src/external/bsd/ntp/dist/conf/ |
| beauregard.conf | 20 keys /usr/local/etc/ntp.keys # path for keys file 21 trustedkey 3 4 5 6 14 15 # define trusted keys
|
| malarky.conf | 7 # /usr/local/bin/ntpd -a -k /usr/local/bin/ntp.keys -m -t 3 21 keys /usr/local/etc/ntp.keys # path for key file 22 trustedkey 3 4 5 6 14 # define trusted keys
|
| /src/external/bsd/am-utils/dist/scripts/ |
| fix-amd-map.in | 46 foreach $m (keys %mappings) {
|