Searched refs:ekey (Results 1 - 9 of 9) sorted by relevance
/freebsd-10.3-release/tools/regression/ipsec/ |
H A D | ipsec6.t | 52 ekey=${ecipher##*:} 68 (echo "add -6 1::1 2::1 esp $spi -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 69 echo "add -6 2::1 1::1 esp `expr $spi + 1` -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 77 echo "ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 79 echo "not ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 85 echo "ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 87 echo "not ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 92 echo "ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}" 94 echo "not ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
|
H A D | ipsec.t | 52 ekey=${ecipher##*:} 68 (echo "add ${ipbase}.0.1 ${ipbase}.1.1 esp $spi -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 69 echo "add ${ipbase}.1.1 ${ipbase}.0.1 esp `expr $spi + 1` -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 77 echo "ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 79 echo "not ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 85 echo "ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 87 echo "not ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 92 echo "ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}" 94 echo "not ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
|
/freebsd-10.3-release/sbin/setkey/ |
H A D | scriptdump.pl | 27 $ekey = $2; 28 $ekey =~ s/\s//g; 29 $ekey =~ s/^/0x/g; 42 print " -E $ealgo $ekey" if $ealgo; 51 $ealgo = $ekey = $aalgo = $akey = '';
|
/freebsd-10.3-release/sys/geom/eli/ |
H A D | g_eli_key_cache.c | 94 const uint8_t *ekey; local 101 ekey = sc->sc_mkey; 103 ekey = sc->sc_ekey; 105 bcopy("ekey", hmacdata.magic, 4); 107 g_eli_crypto_hmac(ekey, G_ELI_MAXKEYLEN, (uint8_t *)&hmacdata, 117 struct g_eli_key *key, *ekey, keysearch; local 130 ekey = RB_FIND(g_eli_key_tree, &sc->sc_ekeys_tree, &keysearch); 131 if (ekey != NULL) { 134 key = ekey; 205 * The encryption key is: ekey [all...] |
/freebsd-10.3-release/sys/geom/ |
H A D | geom_aes.c | 178 keyInstance ekey; local 210 g_aes_makekey(sc, o, &ekey, DIR_ENCRYPT); 211 rijndael_blockEncrypt(&sc->ci, &ekey, 216 bzero(&ekey, sizeof ekey); /* destroy evidence */
|
/freebsd-10.3-release/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 115 u8 *buf, *ekey; local 160 ekey = os_malloc(ekey_len); 161 if (ekey == NULL) { 166 os_memcpy(ekey, key->key_iv, sizeof(key->key_iv)); 167 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 168 rc4_skip(ekey, ekey_len, 0, (u8 *) (key + 1), key_len); 169 os_free(ekey);
|
/freebsd-10.3-release/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 632 u8 ekey[IEEE8021X_KEY_IV_LEN + IEEE8021X_ENCR_KEY_LEN]; local 726 os_memcpy(ekey, key->key_iv, IEEE8021X_KEY_IV_LEN); 727 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 730 rc4_skip(ekey, IEEE8021X_KEY_IV_LEN + encr_key_len, 0,
|
/freebsd-10.3-release/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 314 struct krb5_key_state *ekey; local 318 ekey = krb5_create_key(ec); 319 ekp = ekey->ks_key; 323 krb5_set_key(ekey, ekp); 324 kc->kc_encryptkey = ekey;
|
/freebsd-10.3-release/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 1493 const EncryptionKey *ekey; local 1685 ekey = &adtkt.key; 1712 ekey = &skey->key; 1833 ekey, &tkey_sign->key, 1964 ekey, &tkey_sign->key, 2103 ekey, &tkey_sign->key, 2222 ekey,
|
Completed in 100 milliseconds