Searched refs:ekey (Results 1 - 11 of 11) sorted by relevance
/freebsd-9.3-release/tools/regression/ipsec/ |
H A D | ipsec6.t | 52 ekey=${ecipher##*:} 68 (echo "add -6 1::1 2::1 esp $spi -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 69 echo "add -6 2::1 1::1 esp `expr $spi + 1` -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 77 echo "ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 79 echo "not ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 85 echo "ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 87 echo "not ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 92 echo "ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}" 94 echo "not ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
|
H A D | ipsec.t | 52 ekey=${ecipher##*:} 68 (echo "add ${ipbase}.0.1 ${ipbase}.1.1 esp $spi -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 69 echo "add ${ipbase}.1.1 ${ipbase}.0.1 esp `expr $spi + 1` -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;" 77 echo "ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 79 echo "not ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}" 85 echo "ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 87 echo "not ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}" 92 echo "ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}" 94 echo "not ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
|
/freebsd-9.3-release/sbin/setkey/ |
H A D | scriptdump.pl | 27 $ekey = $2; 28 $ekey =~ s/\s//g; 29 $ekey =~ s/^/0x/g; 42 print " -E $ealgo $ekey" if $ealgo; 51 $ealgo = $ekey = $aalgo = $akey = '';
|
/freebsd-9.3-release/sys/geom/eli/ |
H A D | g_eli_key_cache.c | 99 bcopy("ekey", hmacdata.magic, 4); 111 struct g_eli_key *key, *ekey, keysearch; local 124 ekey = RB_FIND(g_eli_key_tree, &sc->sc_ekeys_tree, &keysearch); 125 if (ekey != NULL) { 128 key = ekey; 203 * The encryption key is: ekey = HMAC_SHA512(Master-Key, 0x10)
|
/freebsd-9.3-release/sys/geom/ |
H A D | geom_aes.c | 178 keyInstance ekey; local 210 g_aes_makekey(sc, o, &ekey, DIR_ENCRYPT); 211 rijndael_blockEncrypt(&sc->ci, &ekey, 216 bzero(&ekey, sizeof ekey); /* destroy evidence */
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 502 AES_KEY ekey, dkey; local 505 AES_set_encrypt_key(key, keylen, &ekey); 524 &ekey, iv, AES_ENCRYPT);
|
H A D | crypto.c | 661 AES_KEY ekey; member in struct:krb5_aes_schedule 673 AES_set_encrypt_key(kd->key->keyvalue.data, bits, &key->ekey); 2252 k = &aeskey->ekey;
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 123 u8 *buf, *ekey; local 168 ekey = os_malloc(ekey_len); 169 if (ekey == NULL) { 174 os_memcpy(ekey, key->key_iv, sizeof(key->key_iv)); 175 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 176 rc4_skip(ekey, ekey_len, 0, (u8 *) (key + 1), key_len); 177 os_free(ekey);
|
/freebsd-9.3-release/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 659 u8 ekey[IEEE8021X_KEY_IV_LEN + IEEE8021X_ENCR_KEY_LEN]; local 749 os_memcpy(ekey, key->key_iv, IEEE8021X_KEY_IV_LEN); 750 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 753 rc4_skip(ekey, IEEE8021X_KEY_IV_LEN + encr_key_len, 0,
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 1267 const EncryptionKey *ekey; local 1693 ekey = &adtkt.key; 1713 ekey = &skey->key; 1735 client, server, ekey, &tkey->key, 1768 ekey,
|
/freebsd-9.3-release/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 314 struct krb5_key_state *ekey; local 318 ekey = krb5_create_key(ec); 319 ekp = ekey->ks_key; 323 krb5_set_key(ekey, ekp); 324 kc->kc_encryptkey = ekey;
|
Completed in 120 milliseconds