Searched refs:ekey (Results 1 - 11 of 11) sorted by relevance

/freebsd-9.3-release/tools/regression/ipsec/
H A Dipsec6.t52 ekey=${ecipher##*:}
68 (echo "add -6 1::1 2::1 esp $spi -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;"
69 echo "add -6 2::1 1::1 esp `expr $spi + 1` -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;"
77 echo "ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}"
79 echo "not ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}"
85 echo "ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}"
87 echo "not ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}"
92 echo "ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
94 echo "not ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
H A Dipsec.t52 ekey=${ecipher##*:}
68 (echo "add ${ipbase}.0.1 ${ipbase}.1.1 esp $spi -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;"
69 echo "add ${ipbase}.1.1 ${ipbase}.0.1 esp `expr $spi + 1` -m transport -E $ealgo \"${ekey}\" -A $aalgo \"${akey}\" ;"
77 echo "ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}"
79 echo "not ok $i - setkey ${ealgo} ${ekey} ${aalgo} ${akey}"
85 echo "ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}"
87 echo "not ok $i - test 1 ${ealgo} ${ekey} ${aalgo} ${akey}"
92 echo "ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
94 echo "not ok $i - test 2 ${ealgo} ${ekey} ${aalgo} ${akey}"
/freebsd-9.3-release/sbin/setkey/
H A Dscriptdump.pl27 $ekey = $2;
28 $ekey =~ s/\s//g;
29 $ekey =~ s/^/0x/g;
42 print " -E $ealgo $ekey" if $ealgo;
51 $ealgo = $ekey = $aalgo = $akey = '';
/freebsd-9.3-release/sys/geom/eli/
H A Dg_eli_key_cache.c99 bcopy("ekey", hmacdata.magic, 4);
111 struct g_eli_key *key, *ekey, keysearch; local
124 ekey = RB_FIND(g_eli_key_tree, &sc->sc_ekeys_tree, &keysearch);
125 if (ekey != NULL) {
128 key = ekey;
203 * The encryption key is: ekey = HMAC_SHA512(Master-Key, 0x10)
/freebsd-9.3-release/sys/geom/
H A Dgeom_aes.c178 keyInstance ekey; local
210 g_aes_makekey(sc, o, &ekey, DIR_ENCRYPT);
211 rijndael_blockEncrypt(&sc->ci, &ekey,
216 bzero(&ekey, sizeof ekey); /* destroy evidence */
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Daes-test.c502 AES_KEY ekey, dkey; local
505 AES_set_encrypt_key(key, keylen, &ekey);
524 &ekey, iv, AES_ENCRYPT);
H A Dcrypto.c661 AES_KEY ekey; member in struct:krb5_aes_schedule
673 AES_set_encrypt_key(kd->key->keyvalue.data, bits, &key->ekey);
2252 k = &aeskey->ekey;
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dieee802_1x.c123 u8 *buf, *ekey; local
168 ekey = os_malloc(ekey_len);
169 if (ekey == NULL) {
174 os_memcpy(ekey, key->key_iv, sizeof(key->key_iv));
175 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32);
176 rc4_skip(ekey, ekey_len, 0, (u8 *) (key + 1), key_len);
177 os_free(ekey);
/freebsd-9.3-release/contrib/wpa/src/eapol_supp/
H A Deapol_supp_sm.c659 u8 ekey[IEEE8021X_KEY_IV_LEN + IEEE8021X_ENCR_KEY_LEN]; local
749 os_memcpy(ekey, key->key_iv, IEEE8021X_KEY_IV_LEN);
750 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key,
753 rc4_skip(ekey, IEEE8021X_KEY_IV_LEN + encr_key_len, 0,
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dkrb5tgs.c1267 const EncryptionKey *ekey; local
1693 ekey = &adtkt.key;
1713 ekey = &skey->key;
1735 client, server, ekey, &tkey->key,
1768 ekey,
/freebsd-9.3-release/sys/kgssapi/krb5/
H A Dkrb5_mech.c314 struct krb5_key_state *ekey; local
318 ekey = krb5_create_key(ec);
319 ekp = ekey->ks_key;
323 krb5_set_key(ekey, ekp);
324 kc->kc_encryptkey = ekey;

Completed in 120 milliseconds