/freebsd-13-stable/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 111 memcpy(extkey, pdu->user.auth_key, keylen); 270 memset(user->auth_key, 0, sizeof(user->auth_key)); 280 if (EVP_DigestFinal(ctx, user->auth_key, &olen) != 1) 319 memcpy(authbuf, user->auth_key, keylen); 321 memcpy(authbuf + keylen + elen, user->auth_key, keylen); 324 EVP_DigestFinal(ctx, user->auth_key, &olen) != 1) { 331 memcpy(user->priv_key, user->auth_key, sizeof(user->priv_key)); 359 memcpy(keychange, user->auth_key, keylen);
|
H A D | snmp.h | 148 uint8_t auth_key[SNMP_AUTH_KEY_SIZ]; member in struct:snmp_user
|
/freebsd-13-stable/sys/sys/ |
H A D | ktls.h | 108 const uint8_t *auth_key; member in struct:tls_enable_v0 123 const uint8_t *auth_key; member in struct:tls_enable 148 uint8_t *auth_key; member in struct:tls_session_params
|
/freebsd-13-stable/contrib/bsnmp/snmp_usm/ |
H A D | usm_snmp.c | 202 memcpy(uuser->suser.auth_key, clone->suser.auth_key, 203 sizeof(uuser->suser.auth_key)); 236 memcpy(ctx->scratch->ptr1, uuser->suser.auth_key, 238 memcpy(uuser->suser.auth_key, val->v.octetstring.octets, 358 memcpy(uuser->suser.auth_key, ctx->scratch->ptr1, 359 sizeof(uuser->suser.auth_key)); 421 return (string_get(val, (char *)uuser->suser.auth_key, 0));
|
/freebsd-13-stable/sys/kern/ |
H A D | uipc_ktls.c | 590 tls->params.auth_key = malloc(en->auth_key_len, M_KTLS, 592 error = copyin(en->auth_key, tls->params.auth_key, 652 if (tls_new->params.auth_key != NULL) { 653 tls_new->params.auth_key = malloc(tls->params.auth_key_len, 655 memcpy(tls_new->params.auth_key, tls->params.auth_key, 711 if (tls->params.auth_key != NULL) { 712 zfree(tls->params.auth_key, M_KTLS); 713 tls->params.auth_key [all...] |
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ktls.c | 91 crypto_info->auth_key = mac_key;
|
/freebsd-13-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 822 size_t cipher_key_len, const char *auth_key, size_t auth_key_len, 832 sop.mackey = auth_key; 885 char *iv, *auth_key, *cipher_key; local 920 auth_key = alloc_buffer(auth_key_len); 935 if (HMAC(md, auth_key, auth_key_len, (u_char *)ciphertext, 940 if (!ocf_init_eta_session(alg, cipher_key, cipher_key_len, auth_key, 1021 free(auth_key); 821 ocf_init_eta_session(const struct alg *alg, const char *cipher_key, size_t cipher_key_len, const char *auth_key, size_t auth_key_len, struct ocf_session *ses) argument
|
/freebsd-13-stable/contrib/bsnmp/snmpd/ |
H A D | trap.c | 514 memcpy(pdu->user.auth_key, usmuser->suser.auth_key, 515 sizeof(pdu->user.auth_key));
|
H A D | main.c | 340 memcpy(pdu->user.auth_key, usm_user->suser.auth_key, 341 sizeof(pdu->user.auth_key));
|
/freebsd-13-stable/usr.sbin/bsnmpd/tools/libbsnmptools/ |
H A D | bsnmptools.c | 523 if (parse_ascii(val, snmp_client.user.auth_key, 2118 snmp_client.user.auth_key[i]);
|
/freebsd-13-stable/sys/opencrypto/ |
H A D | ktls_ocf.c | 640 mac_csp.csp_auth_key = tls->params.auth_key;
|
/freebsd-13-stable/sys/netinet/ |
H A D | tcp_usrreq.c | 1902 tls->auth_key = tls_v0.auth_key;
|
/freebsd-13-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_kern_tls.c | 819 tls->params.auth_key, tls->params.auth_key_len,
|
/freebsd-13-stable/sys/dev/cxgbe/tom/ |
H A D | t4_tls.c | 958 t4_init_hmac_digest(axf, mac_key_size, tls->params.auth_key,
|