/freebsd-10.0-release/crypto/openssh/ |
H A D | krl.h | 17 /* $OpenBSD: krl.h,v 1.2 2013/01/18 00:24:58 djm Exp $ */ 42 void ssh_krl_free(struct ssh_krl *krl); 43 void ssh_krl_set_version(struct ssh_krl *krl, u_int64_t version); 44 void ssh_krl_set_sign_key(struct ssh_krl *krl, const Key *sign_key); 45 void ssh_krl_set_comment(struct ssh_krl *krl, const char *comment); 46 int ssh_krl_revoke_cert_by_serial(struct ssh_krl *krl, const Key *ca_key, 48 int ssh_krl_revoke_cert_by_serial_range(struct ssh_krl *krl, const Key *ca_key, 50 int ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const Key *ca_key, 52 int ssh_krl_revoke_key_explicit(struct ssh_krl *krl, const Key *key); 53 int ssh_krl_revoke_key_sha1(struct ssh_krl *krl, cons [all...] |
H A D | krl.c | 17 /* $OpenBSD: krl.c,v 1.13 2013/07/20 22:20:42 djm Exp $ */ 40 #include "krl.h" 132 struct ssh_krl *krl; local 134 if ((krl = calloc(1, sizeof(*krl))) == NULL) 136 RB_INIT(&krl->revoked_keys); 137 RB_INIT(&krl->revoked_sha1s); 138 TAILQ_INIT(&krl->revoked_certs); 139 return krl; 162 ssh_krl_free(struct ssh_krl *krl) argument 188 ssh_krl_set_version(struct ssh_krl *krl, u_int64_t version) argument 194 ssh_krl_set_comment(struct ssh_krl *krl, const char *comment) argument 206 revoked_certs_for_ca_key(struct ssh_krl *krl, const Key *ca_key, struct revoked_certs **rcp, int allow_create) argument 308 ssh_krl_revoke_cert_by_serial(struct ssh_krl *krl, const Key *ca_key, u_int64_t serial) argument 315 ssh_krl_revoke_cert_by_serial_range(struct ssh_krl *krl, const Key *ca_key, u_int64_t lo, u_int64_t hi) argument 328 ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const Key *ca_key, const char *key_id) argument 391 ssh_krl_revoke_key_explicit(struct ssh_krl *krl, const Key *key) argument 403 ssh_krl_revoke_key_sha1(struct ssh_krl *krl, const Key *key) argument 415 ssh_krl_revoke_key(struct ssh_krl *krl, const Key *key) argument 662 ssh_krl_to_blob(struct ssh_krl *krl, Buffer *buf, const Key **sign_keys, u_int nsign_keys) argument 753 parse_revoked_certs(Buffer *buf, struct ssh_krl *krl) argument 886 struct ssh_krl *krl; local 1110 is_key_revoked(struct ssh_krl *krl, const Key *key) argument 1180 ssh_krl_check_key(struct ssh_krl *krl, const Key *key) argument 1201 struct ssh_krl *krl; local [all...] |
H A D | ssh-keygen.c | 55 #include "krl.h" 1924 struct ssh_krl *krl) 1996 if (ssh_krl_revoke_cert_by_serial_range(krl, 2008 if (ssh_krl_revoke_cert_by_key_id(krl, ca, cp) != 0) 2030 r = ssh_krl_revoke_key_explicit(krl, key); 2032 r = ssh_krl_revoke_key_sha1(krl, key); 2034 r = ssh_krl_revoke_key(krl, key); 2048 struct ssh_krl *krl; local 2072 load_krl(identity_file, &krl); 2073 else if ((krl 1923 update_krl_from_file(struct passwd *pw, const char *file, const Key *ca, struct ssh_krl *krl) argument 2104 struct ssh_krl *krl; local [all...] |
/freebsd-10.0-release/crypto/openssh/regress/ |
H A D | krl.sh | 1 # $OpenBSD: krl.sh,v 1.1 2013/01/18 00:45:29 djm Exp $ 15 rm -f $OBJ/revoked-* $OBJ/krl-* 83 $SSHKEYGEN $OPTS -kf $OBJ/krl-empty - </dev/null \ 85 $SSHKEYGEN $OPTS -kf $OBJ/krl-keys $REVOKED_KEYS \ 87 $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $REVOKED_CERTS \ 89 $SSHKEYGEN $OPTS -kf $OBJ/krl-all $REVOKED_KEYS $REVOKED_CERTS \ 91 $SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked-ca.pub \ 94 $SSHKEYGEN $OPTS -kf $OBJ/krl-serial $OBJ/revoked-serials \ 96 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 98 $SSHKEYGEN $OPTS -kf $OBJ/krl [all...] |
H A D | Makefile | 66 krl 87 sshd_proxy.* authorized_keys_${USER}.* modpipe revoked-* krl-* \
|
/freebsd-10.0-release/sys/crypto/camellia/ |
H A D | camellia.c | 128 #define CAMELLIA_FLS(ll, lr, rl, rr, kll, klr, krl, krr, t0, t1, t2, t3) \ 136 t3 = krl; \ 442 uint32_t kll, klr, krl, krr; local 449 * k == kll || klr || krl || krr (|| is concatination) 453 krl = GETU32(key + 8); 459 subl(1) = krl; subr(1) = krr; 460 CAMELLIA_ROLDQ(kll, klr, krl, krr, w0, w1, 15); 462 subl(5) = krl; subr(5) = krr; 463 CAMELLIA_ROLDQ(kll, klr, krl, krr, w0, w1, 30); 465 subl(11) = krl; sub 648 uint32_t kll,klr,krl,krr; /* left half of key */ local [all...] |
/freebsd-10.0-release/secure/lib/libssh/ |
H A D | Makefile | 12 krl.c log.c match.c md-sha256.c moduli.c nchan.c packet.c \
|
/freebsd-10.0-release/sys/compat/svr4/ |
H A D | svr4_misc.c | 905 struct rlimit krl; local 907 krl.rlim_cur = uap->newlimit * 512; 909 krl.rlim_max = lim_max(td->td_proc, RLIMIT_FSIZE); 912 error = kern_setrlimit(td, RLIMIT_FSIZE, &krl);
|