/freebsd-10.0-release/crypto/openssh/ |
H A D | auth-skey.c | 1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 35 #include <skey.h> 57 struct skey skey; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 94 "skey", 102 "skey",
|
H A D | monitor.c | 56 #include <skey.h> 969 struct skey skey; local 973 success = _compat_skeychallenge(&skey, authctxt->user, challenge, 1008 auth_method = "skey";
|
/freebsd-10.0-release/sys/geom/bde/ |
H A D | g_bde_crypt.c | 112 * Security objective: Find the kkey, find the skey, decrypt the sector data. 122 u_char skey[G_BDE_SKEYLEN]; local 133 AES_decrypt(&ci, &ki, d, skey, sizeof skey); 135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey); 138 bzero(skey, sizeof skey); 146 * Security objective: Create random skey, encrypt sector data, 147 * encrypt skey with the kkey. 157 u_char skey[G_BDE_SKEYLE local 198 u_char skey[G_BDE_SKEYLEN]; local [all...] |
/freebsd-10.0-release/sys/netinet/ |
H A D | sctp_auth.c | 492 sctp_free_sharedkey(sctp_sharedkey_t * skey) argument 494 if (skey == NULL) 497 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) { 498 if (skey->key != NULL) 499 sctp_free_key(skey->key); 500 SCTP_FREE(skey, SCTP_M_AUTH_KY); 507 sctp_sharedkey_t *skey; local 509 LIST_FOREACH(skey, shared_keys, next) { 510 if (skey->keyid == key_id) 511 return (skey); 520 sctp_sharedkey_t *skey; local 566 sctp_sharedkey_t *skey; local 587 sctp_sharedkey_t *skey; local 612 sctp_copy_sharedkey(const sctp_sharedkey_t * skey) argument 632 sctp_sharedkey_t *skey, *new_skey; local 1244 sctp_sharedkey_t *skey; local 1278 sctp_sharedkey_t *skey; local 1310 sctp_sharedkey_t *skey = NULL; local 1337 sctp_sharedkey_t *skey; local 1356 sctp_sharedkey_t *skey; local 1389 sctp_sharedkey_t *skey; local 1557 sctp_sharedkey_t *skey; local 1647 sctp_sharedkey_t *skey; local [all...] |
H A D | sctp_auth.h | 139 extern void sctp_free_sharedkey(sctp_sharedkey_t * skey);
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 87 symmetric_key *skey; local 88 skey = os_malloc(sizeof(*skey)); 89 if (skey == NULL) 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 92 os_free(skey); 101 symmetric_key *skey = ctx; local 108 symmetric_key *skey = ctx; local 116 symmetric_key *skey; local 130 symmetric_key *skey = ctx; local 137 symmetric_key *skey = ctx; local [all...] |
/freebsd-10.0-release/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 241 Session_Key skey; local 309 skey.type = SK_DES; 310 skey.length = 8; 311 skey.data = session_key; 312 encrypt_session_key(&skey, 1); 342 Session_Key skey; local 368 skey.type = SK_DES; 369 skey.length = 8; 370 skey.data = session_key; 371 encrypt_session_key(&skey, [all...] |
H A D | sra.c | 158 Session_Key skey; local 210 skey.data = ck; 211 skey.type = SK_DES; 212 skey.length = 8; 213 encrypt_session_key(&skey, 1); 249 Session_Key skey; local 328 skey.data = ck; 329 skey.type = SK_DES; 330 skey.length = 8; 331 encrypt_session_key(&skey, [all...] |
H A D | krb4encpwd.c | 158 C_Block skey; local 169 KEYFILE, (char *)skey)) { 202 Session_Key skey; local 279 Session_Key skey; local
|
H A D | kerberos5.c | 473 Session_Key skey; local 475 skey.type = SK_DES; 476 skey.length = 8; 477 skey.data = key_block->keyvalue.data; 478 encrypt_session_key(&skey, 0); 593 Session_Key skey; local 620 skey.type = SK_DES; 621 skey.length = 8; 622 skey.data = keyblock->keyvalue.data; 623 encrypt_session_key(&skey, [all...] |
H A D | rsaencpwd.c | 198 Session_Key skey; local 318 Session_Key skey; local
|
/freebsd-10.0-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 if (skey) 96 ret = OCSP_BASICRESP_verify(bs, skey, 0); 97 EVP_PKEY_free(skey); 99 if(!skey || ret <= 0) 392 EVP_PKEY *skey; local 393 skey = X509_get_pubkey(signer); 394 ret = OCSP_REQUEST_verify(req, skey); 395 EVP_PKEY_free(skey); [all...] |
/freebsd-10.0-release/contrib/ofed/management/opensm/osmtest/ |
H A D | osmt_service.c | 180 uint8_t i, skey[16]; local 202 memset(skey, 0, 16 * sizeof(uint8_t)); 269 if (memcmp(skey, p_rec->service_key, 16 * sizeof(uint8_t)) != 0) { 704 IN uint8_t * skey, 720 sr_name, skey[0], skey[1], skey[2], skey[3], skey[4], skey[ 701 osmt_get_service_by_name_and_key(IN osmtest_t * const p_osmt, IN char *sr_name, IN uint32_t rec_num, IN uint8_t * skey, OUT ib_service_record_t * p_out_rec) argument [all...] |
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos5.c | 512 Session_Key skey; local 514 skey.type = SK_DES; 515 skey.length = 8; 516 skey.data = key_block->keyvalue.data; 517 encrypt_session_key(&skey, 0); 629 Session_Key skey; local 657 skey.type = SK_DES; 658 skey.length = 8; 659 skey.data = keyblock->keyvalue.data; 660 encrypt_session_key(&skey, [all...] |
H A D | rsaencpwd.c | 198 Session_Key skey; local 318 Session_Key skey; local
|
H A D | spx.c | 317 Session_Key skey; local 420 Session_Key skey; local
|
/freebsd-10.0-release/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 62 EncryptionKey *skey, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
/freebsd-10.0-release/sys/dev/sfxge/common/ |
H A D | siena_vpd.c | 293 efx_vpd_keyword_t skey; local 332 enp->en_u.siena.enu_svpd_length, &stag, &skey, 338 if (stag == dtag && skey == dkey) {
|
/freebsd-10.0-release/usr.sbin/keyserv/ |
H A D | setkey.c | 94 pk_setkey(uid, skey) 96 keybuf skey; 98 if (!storesecretkey(uid, skey)) {
|
/freebsd-10.0-release/secure/usr.sbin/sshd/ |
H A D | Makefile | 11 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
|
/freebsd-10.0-release/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 326 int skvno, const EncryptionKey *skey, 352 ret = krb5_crypto_init(context, skey, etype, &crypto); 979 Key *ckey, *skey; local 1468 &setype, &skey); 1775 &skey->key, /* Server key */ 1776 &skey->key, /* FIXME: should be krbtgt key */ 1813 &skey->key, client->entry.kvno, 322 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *reply_key, int rk_is_subkey, const char **e_text, krb5_data *reply) argument
|
H A D | krb5tgs.c | 1699 Key *skey; local 1706 &skey); 1712 ekey = &skey->key; 1713 etype = skey->key.keytype;
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | get_cred.c | 327 krb5_const_pointer skey, 330 const krb5_keyblock *subkey = skey; 324 decrypt_tkt_with_subkey(krb5_context context, krb5_keyblock *key, krb5_key_usage usage, krb5_const_pointer skey, krb5_kdc_rep *dec_rep) argument
|
/freebsd-10.0-release/contrib/lukemftpd/ |
H A D | configure | 41 --with-skey Compile with S/Key authentication support." 1916 # Check whether --with-skey or --without-skey was given. 1922 ac_lib_var=`echo skey'_'skey_haskey | sed 'y%./+-%__p_%'` 1955 ac_tr_lib=HAVE_LIB`echo skey | sed -e 's/[^a-zA-Z0-9_]/_/g' \
|
/freebsd-10.0-release/contrib/lukemftpd/src/ |
H A D | ftpd.c | 162 #include <skey.h>
|