Searched refs:skey (Results 1 - 25 of 32) sorted by relevance

12

/freebsd-9.3-release/crypto/openssh/
H A Dauth-skey.c1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
35 #include <skey.h>
57 struct skey skey; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
94 "skey",
102 "skey",
/freebsd-9.3-release/sys/geom/bde/
H A Dg_bde_crypt.c112 * Security objective: Find the kkey, find the skey, decrypt the sector data.
122 u_char skey[G_BDE_SKEYLEN]; local
133 AES_decrypt(&ci, &ki, d, skey, sizeof skey);
135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey);
138 bzero(skey, sizeof skey);
146 * Security objective: Create random skey, encrypt sector data,
147 * encrypt skey with the kkey.
157 u_char skey[G_BDE_SKEYLE local
198 u_char skey[G_BDE_SKEYLEN]; local
[all...]
/freebsd-9.3-release/sys/netinet/
H A Dsctp_auth.c492 sctp_free_sharedkey(sctp_sharedkey_t * skey) argument
494 if (skey == NULL)
497 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) {
498 if (skey->key != NULL)
499 sctp_free_key(skey->key);
500 SCTP_FREE(skey, SCTP_M_AUTH_KY);
507 sctp_sharedkey_t *skey; local
509 LIST_FOREACH(skey, shared_keys, next) {
510 if (skey->keyid == key_id)
511 return (skey);
520 sctp_sharedkey_t *skey; local
566 sctp_sharedkey_t *skey; local
587 sctp_sharedkey_t *skey; local
612 sctp_copy_sharedkey(const sctp_sharedkey_t * skey) argument
632 sctp_sharedkey_t *skey, *new_skey; local
1244 sctp_sharedkey_t *skey; local
1278 sctp_sharedkey_t *skey; local
1310 sctp_sharedkey_t *skey = NULL; local
1337 sctp_sharedkey_t *skey; local
1356 sctp_sharedkey_t *skey; local
1389 sctp_sharedkey_t *skey; local
1557 sctp_sharedkey_t *skey; local
1647 sctp_sharedkey_t *skey; local
[all...]
H A Dsctp_auth.h139 extern void sctp_free_sharedkey(sctp_sharedkey_t * skey);
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c48 symmetric_key skey; local
59 des_setup(pkey, 8, 0, &skey);
60 des_ecb_encrypt(clear, cypher, &skey);
61 des_done(&skey);
93 symmetric_key *skey; local
94 skey = os_malloc(sizeof(*skey));
95 if (skey == NULL)
97 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
98 os_free(skey);
107 symmetric_key *skey = ctx; local
114 symmetric_key *skey = ctx; local
122 symmetric_key *skey; local
136 symmetric_key *skey = ctx; local
143 symmetric_key *skey = ctx; local
[all...]
/freebsd-9.3-release/contrib/telnet/libtelnet/
H A Dkerberos.c241 Session_Key skey; local
309 skey.type = SK_DES;
310 skey.length = 8;
311 skey.data = session_key;
312 encrypt_session_key(&skey, 1);
342 Session_Key skey; local
368 skey.type = SK_DES;
369 skey.length = 8;
370 skey.data = session_key;
371 encrypt_session_key(&skey,
[all...]
H A Dsra.c158 Session_Key skey; local
210 skey.data = ck;
211 skey.type = SK_DES;
212 skey.length = 8;
213 encrypt_session_key(&skey, 1);
249 Session_Key skey; local
328 skey.data = ck;
329 skey.type = SK_DES;
330 skey.length = 8;
331 encrypt_session_key(&skey,
[all...]
H A Dkrb4encpwd.c158 C_Block skey; local
169 KEYFILE, (char *)skey)) {
202 Session_Key skey; local
279 Session_Key skey; local
H A Dkerberos5.c465 Session_Key skey; local
467 skey.type = SK_DES;
468 skey.length = 8;
469 skey.data = key_block->keyvalue.data;
470 encrypt_session_key(&skey, 0);
585 Session_Key skey; local
613 skey.type = SK_DES;
614 skey.length = 8;
615 skey.data = keyblock->keyvalue.data;
616 encrypt_session_key(&skey,
[all...]
H A Drsaencpwd.c198 Session_Key skey; local
318 Session_Key skey; local
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/
H A Docsp_vfy.c98 EVP_PKEY *skey; local
99 skey = X509_get_pubkey(signer);
100 if (skey) {
101 ret = OCSP_BASICRESP_verify(bs, skey, 0);
102 EVP_PKEY_free(skey);
104 if (!skey || ret <= 0) {
396 EVP_PKEY *skey; local
397 skey = X509_get_pubkey(signer);
398 ret = OCSP_REQUEST_verify(req, skey);
399 EVP_PKEY_free(skey);
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A D524.c194 krb5_keyblock *skey,
199 ret = krb5_crypto_init(context, skey, ETYPE_DES_PCBC_NONE, &crypto);
251 Key *skey; local
267 ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey);
274 &skey->key, ticket);
300 Key *skey; local
322 ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey);
328 ret = krb5_crypto_init(context, &skey->key, 0, &crypto);
190 encrypt_v4_ticket(krb5_context context, krb5_kdc_configuration *config, void *buf, size_t len, krb5_keyblock *skey, EncryptedData *reply) argument
H A Dkaserver.c285 Key *skey,
322 &skey->key,
451 Key *skey = NULL; local
514 ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey);
568 hdr, skey,
666 Key *skey = NULL; local
722 ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey);
843 hdr, skey,
283 create_reply_ticket(krb5_context context, struct rx_header *hdr, Key *skey, char *name, char *instance, char *realm, struct sockaddr_in *addr, int life, int kvno, int32_t max_seq_len, const char *sname, const char *sinstance, uint32_t challenge, const char *label, krb5_keyblock *key, krb5_data *reply) argument
H A Dkerberos4.c139 Key *ckey, *skey; local
275 ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey);
311 &skey->key,
523 ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey);
579 &skey->key,
/freebsd-9.3-release/contrib/ofed/management/opensm/osmtest/
H A Dosmt_service.c180 uint8_t i, skey[16]; local
202 memset(skey, 0, 16 * sizeof(uint8_t));
269 if (memcmp(skey, p_rec->service_key, 16 * sizeof(uint8_t)) != 0) {
704 IN uint8_t * skey,
720 sr_name, skey[0], skey[1], skey[2], skey[3], skey[4], skey[
701 osmt_get_service_by_name_and_key(IN osmtest_t * const p_osmt, IN char *sr_name, IN uint32_t rec_num, IN uint8_t * skey, OUT ib_service_record_t * p_out_rec) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dkerberos.c382 Session_Key skey;
388 skey.type=SK_DES;
389 skey.length=8;
390 skey.data=session_key;
391 encrypt_session_key(&skey, 1);
461 Session_Key skey; local
487 skey.type = SK_DES;
488 skey.length = 8;
489 skey.data = session_key;
490 encrypt_session_key(&skey,
[all...]
H A Dkerberos5.c511 Session_Key skey; local
513 skey.type = SK_DES;
514 skey.length = 8;
515 skey.data = key_block->keyvalue.data;
516 encrypt_session_key(&skey, 0);
628 Session_Key skey; local
656 skey.type = SK_DES;
657 skey.length = 8;
658 skey.data = keyblock->keyvalue.data;
659 encrypt_session_key(&skey,
[all...]
H A Dkrb4encpwd.c154 des_clock skey; local
165 KEYFILE, (char *)skey)) {
198 Session_Key skey; local
275 Session_Key skey; local
H A Drsaencpwd.c198 Session_Key skey; local
318 Session_Key skey; local
H A Dspx.c314 Session_Key skey; local
417 Session_Key skey; local
/freebsd-9.3-release/crypto/heimdal/kuser/
H A Dkimpersonate.c61 EncryptionKey *skey,
107 krb5_crypto_init(context, skey, etype, &crypto);
60 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
/freebsd-9.3-release/sys/dev/sfxge/common/
H A Dsiena_vpd.c293 efx_vpd_keyword_t skey; local
332 enp->en_u.siena.enu_svpd_length, &stag, &skey,
338 if (stag == dtag && skey == dkey) {
/freebsd-9.3-release/usr.sbin/keyserv/
H A Dsetkey.c94 pk_setkey(uid, skey)
96 keybuf skey;
98 if (!storesecretkey(uid, skey)) {
/freebsd-9.3-release/crypto/heimdal/tests/kdc/
H A Dcheck-digest.in270 skey=`grep session-key= s2digest-reply | cut -f2- -d=`
277 if test "X$skey" != "X$ckey" ; then
/freebsd-9.3-release/secure/usr.sbin/sshd/
H A DMakefile11 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \

Completed in 183 milliseconds

12