Searched refs:skey (Results 1 - 25 of 26) sorted by relevance

12

/freebsd-10.0-release/crypto/openssh/
H A Dauth-skey.c1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
35 #include <skey.h>
57 struct skey skey; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
94 "skey",
102 "skey",
H A Dmonitor.c56 #include <skey.h>
969 struct skey skey; local
973 success = _compat_skeychallenge(&skey, authctxt->user, challenge,
1008 auth_method = "skey";
/freebsd-10.0-release/sys/geom/bde/
H A Dg_bde_crypt.c112 * Security objective: Find the kkey, find the skey, decrypt the sector data.
122 u_char skey[G_BDE_SKEYLEN]; local
133 AES_decrypt(&ci, &ki, d, skey, sizeof skey);
135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey);
138 bzero(skey, sizeof skey);
146 * Security objective: Create random skey, encrypt sector data,
147 * encrypt skey with the kkey.
157 u_char skey[G_BDE_SKEYLE local
198 u_char skey[G_BDE_SKEYLEN]; local
[all...]
/freebsd-10.0-release/sys/netinet/
H A Dsctp_auth.c492 sctp_free_sharedkey(sctp_sharedkey_t * skey) argument
494 if (skey == NULL)
497 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) {
498 if (skey->key != NULL)
499 sctp_free_key(skey->key);
500 SCTP_FREE(skey, SCTP_M_AUTH_KY);
507 sctp_sharedkey_t *skey; local
509 LIST_FOREACH(skey, shared_keys, next) {
510 if (skey->keyid == key_id)
511 return (skey);
520 sctp_sharedkey_t *skey; local
566 sctp_sharedkey_t *skey; local
587 sctp_sharedkey_t *skey; local
612 sctp_copy_sharedkey(const sctp_sharedkey_t * skey) argument
632 sctp_sharedkey_t *skey, *new_skey; local
1244 sctp_sharedkey_t *skey; local
1278 sctp_sharedkey_t *skey; local
1310 sctp_sharedkey_t *skey = NULL; local
1337 sctp_sharedkey_t *skey; local
1356 sctp_sharedkey_t *skey; local
1389 sctp_sharedkey_t *skey; local
1557 sctp_sharedkey_t *skey; local
1647 sctp_sharedkey_t *skey; local
[all...]
H A Dsctp_auth.h139 extern void sctp_free_sharedkey(sctp_sharedkey_t * skey);
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; local
53 des_setup(pkey, 8, 0, &skey);
54 des_ecb_encrypt(clear, cypher, &skey);
55 des_done(&skey);
87 symmetric_key *skey; local
88 skey = os_malloc(sizeof(*skey));
89 if (skey == NULL)
91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
92 os_free(skey);
101 symmetric_key *skey = ctx; local
108 symmetric_key *skey = ctx; local
116 symmetric_key *skey; local
130 symmetric_key *skey = ctx; local
137 symmetric_key *skey = ctx; local
[all...]
/freebsd-10.0-release/contrib/telnet/libtelnet/
H A Dkerberos.c241 Session_Key skey; local
309 skey.type = SK_DES;
310 skey.length = 8;
311 skey.data = session_key;
312 encrypt_session_key(&skey, 1);
342 Session_Key skey; local
368 skey.type = SK_DES;
369 skey.length = 8;
370 skey.data = session_key;
371 encrypt_session_key(&skey,
[all...]
H A Dsra.c158 Session_Key skey; local
210 skey.data = ck;
211 skey.type = SK_DES;
212 skey.length = 8;
213 encrypt_session_key(&skey, 1);
249 Session_Key skey; local
328 skey.data = ck;
329 skey.type = SK_DES;
330 skey.length = 8;
331 encrypt_session_key(&skey,
[all...]
H A Dkrb4encpwd.c158 C_Block skey; local
169 KEYFILE, (char *)skey)) {
202 Session_Key skey; local
279 Session_Key skey; local
H A Dkerberos5.c473 Session_Key skey; local
475 skey.type = SK_DES;
476 skey.length = 8;
477 skey.data = key_block->keyvalue.data;
478 encrypt_session_key(&skey, 0);
593 Session_Key skey; local
620 skey.type = SK_DES;
621 skey.length = 8;
622 skey.data = keyblock->keyvalue.data;
623 encrypt_session_key(&skey,
[all...]
H A Drsaencpwd.c198 Session_Key skey; local
318 Session_Key skey; local
/freebsd-10.0-release/crypto/openssl/crypto/ocsp/
H A Docsp_vfy.c92 EVP_PKEY *skey; local
93 skey = X509_get_pubkey(signer);
94 if (skey)
96 ret = OCSP_BASICRESP_verify(bs, skey, 0);
97 EVP_PKEY_free(skey);
99 if(!skey || ret <= 0)
392 EVP_PKEY *skey; local
393 skey = X509_get_pubkey(signer);
394 ret = OCSP_REQUEST_verify(req, skey);
395 EVP_PKEY_free(skey);
[all...]
/freebsd-10.0-release/contrib/ofed/management/opensm/osmtest/
H A Dosmt_service.c180 uint8_t i, skey[16]; local
202 memset(skey, 0, 16 * sizeof(uint8_t));
269 if (memcmp(skey, p_rec->service_key, 16 * sizeof(uint8_t)) != 0) {
704 IN uint8_t * skey,
720 sr_name, skey[0], skey[1], skey[2], skey[3], skey[4], skey[
701 osmt_get_service_by_name_and_key(IN osmtest_t * const p_osmt, IN char *sr_name, IN uint32_t rec_num, IN uint8_t * skey, OUT ib_service_record_t * p_out_rec) argument
[all...]
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dkerberos5.c512 Session_Key skey; local
514 skey.type = SK_DES;
515 skey.length = 8;
516 skey.data = key_block->keyvalue.data;
517 encrypt_session_key(&skey, 0);
629 Session_Key skey; local
657 skey.type = SK_DES;
658 skey.length = 8;
659 skey.data = keyblock->keyvalue.data;
660 encrypt_session_key(&skey,
[all...]
H A Drsaencpwd.c198 Session_Key skey; local
318 Session_Key skey; local
H A Dspx.c317 Session_Key skey; local
420 Session_Key skey; local
/freebsd-10.0-release/crypto/heimdal/kuser/
H A Dkimpersonate.c62 EncryptionKey *skey,
108 ret = krb5_crypto_init(context, skey, etype, &crypto);
61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
/freebsd-10.0-release/sys/dev/sfxge/common/
H A Dsiena_vpd.c293 efx_vpd_keyword_t skey; local
332 enp->en_u.siena.enu_svpd_length, &stag, &skey,
338 if (stag == dtag && skey == dkey) {
/freebsd-10.0-release/usr.sbin/keyserv/
H A Dsetkey.c94 pk_setkey(uid, skey)
96 keybuf skey;
98 if (!storesecretkey(uid, skey)) {
/freebsd-10.0-release/secure/usr.sbin/sshd/
H A DMakefile11 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
/freebsd-10.0-release/crypto/heimdal/kdc/
H A Dkerberos5.c326 int skvno, const EncryptionKey *skey,
352 ret = krb5_crypto_init(context, skey, etype, &crypto);
979 Key *ckey, *skey; local
1468 &setype, &skey);
1775 &skey->key, /* Server key */
1776 &skey->key, /* FIXME: should be krbtgt key */
1813 &skey->key, client->entry.kvno,
322 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *reply_key, int rk_is_subkey, const char **e_text, krb5_data *reply) argument
H A Dkrb5tgs.c1699 Key *skey; local
1706 &skey);
1712 ekey = &skey->key;
1713 etype = skey->key.keytype;
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dget_cred.c327 krb5_const_pointer skey,
330 const krb5_keyblock *subkey = skey;
324 decrypt_tkt_with_subkey(krb5_context context, krb5_keyblock *key, krb5_key_usage usage, krb5_const_pointer skey, krb5_kdc_rep *dec_rep) argument
/freebsd-10.0-release/contrib/lukemftpd/
H A Dconfigure41 --with-skey Compile with S/Key authentication support."
1916 # Check whether --with-skey or --without-skey was given.
1922 ac_lib_var=`echo skey'_'skey_haskey | sed 'y%./+-%__p_%'`
1955 ac_tr_lib=HAVE_LIB`echo skey | sed -e 's/[^a-zA-Z0-9_]/_/g' \
/freebsd-10.0-release/contrib/lukemftpd/src/
H A Dftpd.c162 #include <skey.h>

Completed in 271 milliseconds

12