Symbol: keybuf
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash1.tests/driver2.c
67
char keybuf[2049];
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash1.tests/driver2.c
90
key.data = keybuf;
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash1.tests/driver2.c
92
memset(keybuf, '\0', sizeof(keybuf));
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash1.tests/driver2.c
99
snprintf(keybuf, sizeof(keybuf), "Key #%d", i);
crypto/openssh/authfile.c
54
sshkey_save_private_blob(struct sshbuf *keybuf, const char *filename)
crypto/openssh/authfile.c
60
r = sshbuf_write_file(filename, keybuf);
crypto/openssh/sshd-session.c
303
struct sshbuf *keybuf = NULL, *hostkeys = NULL;
crypto/openssh/sshd-session.c
333
sshbuf_free(keybuf);
crypto/openssh/sshd.c
679
struct sshbuf *m = NULL, *keybuf = NULL, *hostkeys = NULL;
crypto/openssh/sshd.c
685
(keybuf = sshbuf_new()) == NULL ||
crypto/openssh/sshd.c
692
sshbuf_reset(keybuf);
crypto/openssh/sshd.c
695
keybuf)) != 0)
crypto/openssh/sshd.c
697
if ((r = sshbuf_put_stringb(hostkeys, keybuf)) != 0)
crypto/openssh/sshd.c
728
sshbuf_free(keybuf);
crypto/openssl/crypto/hashtable/hashtable.c
522
PREFETCH(a->keybuf);
crypto/openssl/crypto/hashtable/hashtable.c
523
PREFETCH(b->keybuf);
crypto/openssl/crypto/hashtable/hashtable.c
524
if (a->keybuf != NULL && b->keybuf != NULL && a->keysize == b->keysize)
crypto/openssl/crypto/hashtable/hashtable.c
525
return !memcmp(a->keybuf, b->keybuf, a->keysize);
crypto/openssl/crypto/hashtable/hashtable.c
612
tmp->value.key.keybuf = NULL;
crypto/openssl/crypto/hashtable/hashtable.c
614
tmp->value.key.keybuf = (uint8_t *)(tmp + 1);
crypto/openssl/crypto/hashtable/hashtable.c
616
memcpy(tmp->value.key.keybuf, key->keybuf, key->keysize);
crypto/openssl/crypto/hashtable/hashtable.c
645
hash = h->config.ht_hash_fn(key->keybuf, key->keysize);
crypto/openssl/crypto/hashtable/hashtable.c
674
hash = h->config.ht_hash_fn(key->keybuf, key->keysize);
crypto/openssl/crypto/hashtable/hashtable.c
723
hash = h->config.ht_hash_fn(key->keybuf, key->keysize);
crypto/openssl/crypto/pem/pvkfmt.c
1084
unsigned char keybuf[20];
crypto/openssl/crypto/pem/pvkfmt.c
1094
if (!derive_pvk_key(keybuf, sizeof(keybuf), salt, PVK_SALTLEN,
crypto/openssl/crypto/pem/pvkfmt.c
1100
memset(keybuf + 5, 0, 11);
crypto/openssl/crypto/pem/pvkfmt.c
1102
if (!EVP_EncryptInit_ex(cctx, rc4, NULL, keybuf, NULL))
crypto/openssl/crypto/pem/pvkfmt.c
1104
OPENSSL_cleanse(keybuf, 20);
crypto/openssl/crypto/pem/pvkfmt.c
862
unsigned char keybuf[20];
crypto/openssl/crypto/pem/pvkfmt.c
892
if (!derive_pvk_key(keybuf, sizeof(keybuf), p, saltlen,
crypto/openssl/crypto/pem/pvkfmt.c
907
if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL))
crypto/openssl/crypto/pem/pvkfmt.c
916
memset(keybuf + 5, 0, 11);
crypto/openssl/crypto/pem/pvkfmt.c
917
if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL))
crypto/openssl/crypto/pem/pvkfmt.c
943
OPENSSL_cleanse(keybuf, sizeof(keybuf));
crypto/openssl/include/internal/hashtable.h
113
(key)->key_header.keybuf = (((uint8_t *)key) + sizeof(HT_KEY)); \
crypto/openssl/include/internal/hashtable.h
119
#define HT_KEY_RESET(key) memset((key)->key_header.keybuf, 0, (key)->key_header.keysize)
crypto/openssl/include/internal/hashtable.h
27
uint8_t *keybuf;
lib/libc/db/test/hash.tests/driver2.c
55
char keybuf[2049];
lib/libc/db/test/hash.tests/driver2.c
78
key.data = keybuf;
lib/libc/db/test/hash.tests/driver2.c
80
bzero(keybuf, sizeof(keybuf));
lib/libc/db/test/hash.tests/driver2.c
87
sprintf(keybuf, "Key #%d", i);
lib/libc/gen/getpwent.c
1731
char keybuf[MAXLOGNAME + 1];
lib/libc/gen/getpwent.c
1829
key.data = keybuf;
lib/libc/gen/getpwent.c
1834
memcpy(&keybuf[1], &keynum, sizeof(keynum));
lib/libc/gen/getpwent.c
1838
memcpy(&keybuf[1], &store, sizeof(store));
lib/libc/gen/getpwent.c
1841
keybuf[0] = _PW_VERSIONED(_PW_KEYBYNUM, st->version);
lib/libc/gen/getpwent.c
795
char keybuf[MAXLOGNAME + 1];
lib/libc/gen/getpwent.c
813
keybuf[0] = _PW_KEYBYNAME;
lib/libc/gen/getpwent.c
817
keybuf[0] = _PW_KEYBYUID;
lib/libc/gen/getpwent.c
820
keybuf[0] = _PW_KEYBYNUM;
lib/libc/gen/getpwent.c
847
key.data = keybuf;
lib/libc/gen/getpwent.c
854
namesize = strlcpy(&keybuf[1], name, sizeof(keybuf)-1);
lib/libc/gen/getpwent.c
855
if (namesize >= sizeof(keybuf)-1) {
lib/libc/gen/getpwent.c
864
memcpy(&keybuf[1], &uid, sizeof(uid));
lib/libc/gen/getpwent.c
868
memcpy(&keybuf[1], &store, sizeof(store));
lib/libc/gen/getpwent.c
875
memcpy(&keybuf[1], &st->keynum,
lib/libc/gen/getpwent.c
880
memcpy(&keybuf[1], &store, sizeof(store));
lib/libc/gen/getpwent.c
885
keybuf[0] = _PW_VERSIONED(keybuf[0], st->version);
lib/libc/rpc/key_prot_xdr.c
56
xdr_keybuf(register XDR *xdrs, keybuf objp)
sbin/restore/restore.c
487
static char keybuf[32];
sbin/restore/restore.c
489
(void) strcpy(keybuf, "|NIL");
sbin/restore/restore.c
490
keybuf[0] = '\0';
sbin/restore/restore.c
492
(void) strcat(keybuf, "|ONTAPE");
sbin/restore/restore.c
494
(void) strcat(keybuf, "|INOFND");
sbin/restore/restore.c
496
(void) strcat(keybuf, "|NAMEFND");
sbin/restore/restore.c
498
(void) strcat(keybuf, "|MODECHG");
sbin/restore/restore.c
499
return (&keybuf[1]);
secure/lib/libcrypt/crypt-des.c
592
u_int32_t count, salt, l, r0, r1, keybuf[2];
secure/lib/libcrypt/crypt-des.c
602
q = (u_char *)keybuf;
secure/lib/libcrypt/crypt-des.c
603
while (q - (u_char *)keybuf - 8) {
secure/lib/libcrypt/crypt-des.c
608
if (des_setkey((char *)keybuf))
secure/lib/libcrypt/crypt-des.c
627
if (des_cipher((char *)keybuf, (char *)keybuf, 0L, 1))
secure/lib/libcrypt/crypt-des.c
632
q = (u_char *)keybuf;
secure/lib/libcrypt/crypt-des.c
633
while (q - (u_char *)keybuf - 8 && *key)
secure/lib/libcrypt/crypt-des.c
636
if (des_setkey((char *)keybuf))
stand/efi/libefi/efi_console.c
1217
if (keybuf[i] != 0) {
stand/efi/libefi/efi_console.c
1218
c = keybuf[i];
stand/efi/libefi/efi_console.c
1219
keybuf[i] = 0;
stand/efi/libefi/efi_console.c
1233
if (keybuf[i] != 0)
stand/efi/libefi/efi_console.c
1249
keybuf[0] = 0x1b; /* esc */
stand/efi/libefi/efi_console.c
1250
keybuf[1] = '[';
stand/efi/libefi/efi_console.c
1251
keybuf[2] = 'A';
stand/efi/libefi/efi_console.c
1254
keybuf[0] = 0x1b; /* esc */
stand/efi/libefi/efi_console.c
1255
keybuf[1] = '[';
stand/efi/libefi/efi_console.c
1256
keybuf[2] = 'B';
stand/efi/libefi/efi_console.c
1259
keybuf[0] = 0x1b; /* esc */
stand/efi/libefi/efi_console.c
1260
keybuf[1] = '[';
stand/efi/libefi/efi_console.c
1261
keybuf[2] = 'C';
stand/efi/libefi/efi_console.c
1264
keybuf[0] = 0x1b; /* esc */
stand/efi/libefi/efi_console.c
1265
keybuf[1] = '[';
stand/efi/libefi/efi_console.c
1266
keybuf[2] = 'D';
stand/efi/libefi/efi_console.c
1269
keybuf[0] = CHAR_BACKSPACE;
stand/efi/libefi/efi_console.c
1272
keybuf[0] = 0x1b; /* esc */
stand/efi/libefi/efi_console.c
1275
keybuf[0] = key->UnicodeChar;
stand/efi/libefi/efi_console.c
98
static unsigned keybuf[KEYBUFSZ]; /* keybuf for extended codes */
stand/i386/common/bootargs.h
104
struct keybuf *keybuf;
stand/i386/common/bootargs.h
106
void *keybuf;
stand/i386/common/bootargs.h
120
gbdata->keybuf = malloc(sizeof(struct keybuf) +
stand/i386/common/bootargs.h
122
geli_export_key_buffer(gbdata->keybuf);
stand/i386/common/bootargs.h
133
geli_import_key_buffer(gbdata->keybuf);
stand/i386/libi386/vidconsole.c
1057
if (keybuf[i] != 0) {
stand/i386/libi386/vidconsole.c
1058
c = keybuf[i];
stand/i386/libi386/vidconsole.c
1059
keybuf[i] = 0;
stand/i386/libi386/vidconsole.c
1076
keybuf[0] = '[';
stand/i386/libi386/vidconsole.c
1077
keybuf[1] = 'A';
stand/i386/libi386/vidconsole.c
1080
keybuf[0] = '[';
stand/i386/libi386/vidconsole.c
1081
keybuf[1] = 'D';
stand/i386/libi386/vidconsole.c
1084
keybuf[0] = '[';
stand/i386/libi386/vidconsole.c
1085
keybuf[1] = 'C';
stand/i386/libi386/vidconsole.c
1088
keybuf[0] = '[';
stand/i386/libi386/vidconsole.c
1089
keybuf[1] = 'B';
stand/i386/libi386/vidconsole.c
1105
if (keybuf[i] != 0) {
stand/i386/libi386/vidconsole.c
85
static uint8_t keybuf[KEYBUFSZ]; /* keybuf for extended codes */
stand/libsa/geli/geli_metadata.c
43
struct keybuf *keybuf;
stand/libsa/geli/geli_metadata.c
45
keybuf = malloc(GELI_KEYBUF_SIZE);
stand/libsa/geli/geli_metadata.c
46
geli_export_key_buffer(keybuf);
stand/libsa/geli/geli_metadata.c
47
file_addmetadata(kfp, MODINFOMD_KEYBUF, GELI_KEYBUF_SIZE, keybuf);
stand/libsa/geli/geli_metadata.c
48
explicit_bzero(keybuf, GELI_KEYBUF_SIZE);
stand/libsa/geli/geli_metadata.c
49
free(keybuf);
stand/libsa/geli/geliboot.c
50
geli_export_key_buffer(struct keybuf *fkeybuf)
stand/libsa/geli/geliboot.c
68
geli_import_key_buffer(struct keybuf *skeybuf)
stand/libsa/geli/geliboot.h
48
#define GELI_KEYBUF_SIZE (sizeof(struct keybuf) + \
stand/libsa/geli/geliboot.h
95
void geli_import_key_buffer(struct keybuf *keybuf);
stand/libsa/geli/geliboot.h
96
void geli_export_key_buffer(struct keybuf *keybuf);
sys/crypto/intake.h
59
extern struct keybuf* get_keybuf(void);
sys/geom/eli/g_eli.c
1330
struct keybuf *keybuf;
sys/geom/eli/g_eli.c
1375
if ((keybuf = get_keybuf()) != NULL) {
sys/geom/eli/g_eli.c
1377
for (i = 0; i < keybuf->kb_nents; i++) {
sys/geom/eli/g_eli.c
1378
if (keybuf->kb_ents[i].ke_type == KEYBUF_TYPE_GELI) {
sys/geom/eli/g_eli.c
1379
memcpy(key, keybuf->kb_ents[i].ke_data,
sys/geom/eli/g_eli.c
181
struct keybuf *keybuf;
sys/geom/eli/g_eli.c
184
if ((keybuf = get_keybuf()) != NULL) {
sys/geom/eli/g_eli.c
186
for (i = 0; i < keybuf->kb_nents; i++) {
sys/geom/eli/g_eli.c
187
if (keybuf->kb_ents[i].ke_type == KEYBUF_TYPE_GELI) {
sys/geom/eli/g_eli.c
188
explicit_bzero(keybuf->kb_ents[i].ke_data,
sys/geom/eli/g_eli.c
189
sizeof(keybuf->kb_ents[i].ke_data));
sys/geom/eli/g_eli.c
190
keybuf->kb_ents[i].ke_type = KEYBUF_TYPE_NONE;
sys/opencrypto/crypto.c
246
static struct keybuf *keybuf;
sys/opencrypto/crypto.c
248
static struct keybuf empty_keybuf = {
sys/opencrypto/crypto.c
256
keybuf = (struct keybuf *)preload_search_info(preload_kmdp,
sys/opencrypto/crypto.c
259
if (keybuf == NULL)
sys/opencrypto/crypto.c
260
keybuf = &empty_keybuf;
sys/opencrypto/crypto.c
264
struct keybuf *
sys/opencrypto/crypto.c
268
return (keybuf);
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
220
uint8_t keybuf[PTW_KSBYTES];
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
224
memcpy(&keybuf[IVBYTES], key, keylen);
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
225
memcpy(keybuf, state->sessions[i].iv, IVBYTES);
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
226
rc4init(keybuf, keylen+IVBYTES, &rc4state);
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
361
int PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) {
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
403
if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, simple)) {
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
415
if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, onestrong)) {
tools/tools/net80211/wesside/wesside/aircrack-ptw-lib.c
421
if (doComputation(state, keybuf, keylen, table, (sorthelper *) sh, strongbytes, twostrong)) {
usr.sbin/pkg/ecc.c
474
uint8_t keybuf[EC_PUB_KEY_MAX_SIZE];
usr.sbin/pkg/ecc.c
480
keysz = MIN(sizeof(keybuf), cbdata->keylen / 2);
usr.sbin/pkg/ecc.c
482
keysz = sizeof(keybuf);
usr.sbin/pkg/ecc.c
484
keybuf, &keysz, &derparams) != 0) {
usr.sbin/pkg/ecc.c
504
keybuf, keysz, keyinfo->sig_alg);
usr.sbin/rpc.yppasswdd/yppasswdd_server.c
322
char keybuf[20];
usr.sbin/rpc.yppasswdd/yppasswdd_server.c
335
snprintf(keybuf, sizeof keybuf,
usr.sbin/rpc.yppasswdd/yppasswdd_server.c
337
key.data = &keybuf;
usr.sbin/rpc.yppasswdd/yppasswdd_server.c
338
key.size = strlen(keybuf);
usr.sbin/yp_mkdb/yp_mkdb.c
113
char *keybuf, *datbuf;
usr.sbin/yp_mkdb/yp_mkdb.c
271
keybuf = (char *)&buf;
usr.sbin/yp_mkdb/yp_mkdb.c
281
if (*keybuf == '+' || *keybuf == '-' ||
usr.sbin/yp_mkdb/yp_mkdb.c
289
if (strlen(keybuf) > YPMAXRECORD) {
usr.sbin/yp_mkdb/yp_mkdb.c
290
warnx("key too long: %s", keybuf);
usr.sbin/yp_mkdb/yp_mkdb.c
294
if (!strlen(keybuf)) {
usr.sbin/yp_mkdb/yp_mkdb.c
304
key.data = keybuf;
usr.sbin/yp_mkdb/yp_mkdb.c
305
key.size = strlen(keybuf);
usr.sbin/yp_mkdb/yp_mkdb.c
312
warnx("duplicate key '%s' - skipping", keybuf);
usr.sbin/ypldap/yp.c
654
static char keybuf[YPMAXRECORD+1];
usr.sbin/ypldap/yp.c
657
memset(keybuf, 0, sizeof(keybuf));
usr.sbin/ypldap/yp.c
660
(void)strlcpy(keybuf, key, sizeof(keybuf));
usr.sbin/ypldap/yp.c
661
res->key.keydat_len = strlen(keybuf);
usr.sbin/ypldap/yp.c
662
res->key.keydat_val = keybuf;
usr.sbin/ypldap/yp.c
672
log_debug("sending out %s => %s", keybuf, buf);
usr.sbin/ypserv/yp_dblookup.c
569
static unsigned char keybuf[YPMAXRECORD];
usr.sbin/ypserv/yp_dblookup.c
637
bcopy(key->data, &keybuf, key->size);
usr.sbin/ypserv/yp_dblookup.c
638
lkey.data = &keybuf;