/freebsd-9.3-release/crypto/openssh/ |
H A D | auth-skey.c | 1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 35 #include <skey.h> 57 struct skey skey; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 94 "skey", 102 "skey",
|
/freebsd-9.3-release/sys/geom/bde/ |
H A D | g_bde_crypt.c | 112 * Security objective: Find the kkey, find the skey, decrypt the sector data. 122 u_char skey[G_BDE_SKEYLEN]; local 133 AES_decrypt(&ci, &ki, d, skey, sizeof skey); 135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey); 138 bzero(skey, sizeof skey); 146 * Security objective: Create random skey, encrypt sector data, 147 * encrypt skey with the kkey. 157 u_char skey[G_BDE_SKEYLE local 198 u_char skey[G_BDE_SKEYLEN]; local [all...] |
/freebsd-9.3-release/sys/netinet/ |
H A D | sctp_auth.c | 492 sctp_free_sharedkey(sctp_sharedkey_t * skey) argument 494 if (skey == NULL) 497 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) { 498 if (skey->key != NULL) 499 sctp_free_key(skey->key); 500 SCTP_FREE(skey, SCTP_M_AUTH_KY); 507 sctp_sharedkey_t *skey; local 509 LIST_FOREACH(skey, shared_keys, next) { 510 if (skey->keyid == key_id) 511 return (skey); 520 sctp_sharedkey_t *skey; local 566 sctp_sharedkey_t *skey; local 587 sctp_sharedkey_t *skey; local 612 sctp_copy_sharedkey(const sctp_sharedkey_t * skey) argument 632 sctp_sharedkey_t *skey, *new_skey; local 1244 sctp_sharedkey_t *skey; local 1278 sctp_sharedkey_t *skey; local 1310 sctp_sharedkey_t *skey = NULL; local 1337 sctp_sharedkey_t *skey; local 1356 sctp_sharedkey_t *skey; local 1389 sctp_sharedkey_t *skey; local 1557 sctp_sharedkey_t *skey; local 1647 sctp_sharedkey_t *skey; local [all...] |
H A D | sctp_auth.h | 139 extern void sctp_free_sharedkey(sctp_sharedkey_t * skey);
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 48 symmetric_key skey; local 59 des_setup(pkey, 8, 0, &skey); 60 des_ecb_encrypt(clear, cypher, &skey); 61 des_done(&skey); 93 symmetric_key *skey; local 94 skey = os_malloc(sizeof(*skey)); 95 if (skey == NULL) 97 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 98 os_free(skey); 107 symmetric_key *skey = ctx; local 114 symmetric_key *skey = ctx; local 122 symmetric_key *skey; local 136 symmetric_key *skey = ctx; local 143 symmetric_key *skey = ctx; local [all...] |
/freebsd-9.3-release/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 241 Session_Key skey; local 309 skey.type = SK_DES; 310 skey.length = 8; 311 skey.data = session_key; 312 encrypt_session_key(&skey, 1); 342 Session_Key skey; local 368 skey.type = SK_DES; 369 skey.length = 8; 370 skey.data = session_key; 371 encrypt_session_key(&skey, [all...] |
H A D | sra.c | 158 Session_Key skey; local 210 skey.data = ck; 211 skey.type = SK_DES; 212 skey.length = 8; 213 encrypt_session_key(&skey, 1); 249 Session_Key skey; local 328 skey.data = ck; 329 skey.type = SK_DES; 330 skey.length = 8; 331 encrypt_session_key(&skey, [all...] |
H A D | krb4encpwd.c | 158 C_Block skey; local 169 KEYFILE, (char *)skey)) { 202 Session_Key skey; local 279 Session_Key skey; local
|
H A D | kerberos5.c | 465 Session_Key skey; local 467 skey.type = SK_DES; 468 skey.length = 8; 469 skey.data = key_block->keyvalue.data; 470 encrypt_session_key(&skey, 0); 585 Session_Key skey; local 613 skey.type = SK_DES; 614 skey.length = 8; 615 skey.data = keyblock->keyvalue.data; 616 encrypt_session_key(&skey, [all...] |
H A D | rsaencpwd.c | 198 Session_Key skey; local 318 Session_Key skey; local
|
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 98 EVP_PKEY *skey; local 99 skey = X509_get_pubkey(signer); 100 if (skey) { 101 ret = OCSP_BASICRESP_verify(bs, skey, 0); 102 EVP_PKEY_free(skey); 104 if (!skey || ret <= 0) { 396 EVP_PKEY *skey; local 397 skey = X509_get_pubkey(signer); 398 ret = OCSP_REQUEST_verify(req, skey); 399 EVP_PKEY_free(skey); [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | 524.c | 194 krb5_keyblock *skey, 199 ret = krb5_crypto_init(context, skey, ETYPE_DES_PCBC_NONE, &crypto); 251 Key *skey; local 267 ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey); 274 &skey->key, ticket); 300 Key *skey; local 322 ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey); 328 ret = krb5_crypto_init(context, &skey->key, 0, &crypto); 190 encrypt_v4_ticket(krb5_context context, krb5_kdc_configuration *config, void *buf, size_t len, krb5_keyblock *skey, EncryptedData *reply) argument
|
H A D | kaserver.c | 285 Key *skey, 322 &skey->key, 451 Key *skey = NULL; local 514 ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey); 568 hdr, skey, 666 Key *skey = NULL; local 722 ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey); 843 hdr, skey, 283 create_reply_ticket(krb5_context context, struct rx_header *hdr, Key *skey, char *name, char *instance, char *realm, struct sockaddr_in *addr, int life, int kvno, int32_t max_seq_len, const char *sname, const char *sinstance, uint32_t challenge, const char *label, krb5_keyblock *key, krb5_data *reply) argument
|
H A D | kerberos4.c | 139 Key *ckey, *skey; local 275 ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey); 311 &skey->key, 523 ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey); 579 &skey->key,
|
/freebsd-9.3-release/contrib/ofed/management/opensm/osmtest/ |
H A D | osmt_service.c | 180 uint8_t i, skey[16]; local 202 memset(skey, 0, 16 * sizeof(uint8_t)); 269 if (memcmp(skey, p_rec->service_key, 16 * sizeof(uint8_t)) != 0) { 704 IN uint8_t * skey, 720 sr_name, skey[0], skey[1], skey[2], skey[3], skey[4], skey[ 701 osmt_get_service_by_name_and_key(IN osmtest_t * const p_osmt, IN char *sr_name, IN uint32_t rec_num, IN uint8_t * skey, OUT ib_service_record_t * p_out_rec) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos.c | 382 Session_Key skey; 388 skey.type=SK_DES; 389 skey.length=8; 390 skey.data=session_key; 391 encrypt_session_key(&skey, 1); 461 Session_Key skey; local 487 skey.type = SK_DES; 488 skey.length = 8; 489 skey.data = session_key; 490 encrypt_session_key(&skey, [all...] |
H A D | kerberos5.c | 511 Session_Key skey; local 513 skey.type = SK_DES; 514 skey.length = 8; 515 skey.data = key_block->keyvalue.data; 516 encrypt_session_key(&skey, 0); 628 Session_Key skey; local 656 skey.type = SK_DES; 657 skey.length = 8; 658 skey.data = keyblock->keyvalue.data; 659 encrypt_session_key(&skey, [all...] |
H A D | krb4encpwd.c | 154 des_clock skey; local 165 KEYFILE, (char *)skey)) { 198 Session_Key skey; local 275 Session_Key skey; local
|
H A D | rsaencpwd.c | 198 Session_Key skey; local 318 Session_Key skey; local
|
H A D | spx.c | 314 Session_Key skey; local 417 Session_Key skey; local
|
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 61 EncryptionKey *skey, 107 krb5_crypto_init(context, skey, etype, &crypto); 60 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
/freebsd-9.3-release/sys/dev/sfxge/common/ |
H A D | siena_vpd.c | 293 efx_vpd_keyword_t skey; local 332 enp->en_u.siena.enu_svpd_length, &stag, &skey, 338 if (stag == dtag && skey == dkey) {
|
/freebsd-9.3-release/usr.sbin/keyserv/ |
H A D | setkey.c | 94 pk_setkey(uid, skey) 96 keybuf skey; 98 if (!storesecretkey(uid, skey)) {
|
/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-digest.in | 270 skey=`grep session-key= s2digest-reply | cut -f2- -d=` 277 if test "X$skey" != "X$ckey" ; then
|
/freebsd-9.3-release/secure/usr.sbin/sshd/ |
H A D | Makefile | 11 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
|