Searched refs:key_handle (Results 1 - 5 of 5) sorted by relevance

/freebsd-current/crypto/openssh/
H A Dsk-api.h47 uint8_t *key_handle; member in struct:sk_enroll_response
95 const char *application, const uint8_t *key_handle, size_t key_handle_len,
H A Dsk-usbhid.c128 const char *application, const uint8_t *key_handle, size_t key_handle_len,
389 const uint8_t *key_handle, size_t key_handle_len)
411 if ((r = fido_assert_allow_cred(assert, key_handle,
476 const char *application, const uint8_t *key_handle, size_t key_handle_len)
494 if (sk_try(skv[i], application, key_handle,
560 sk_probe(const char *application, const uint8_t *key_handle, argument
586 } else if (application != NULL && key_handle != NULL) {
588 sk = sk_select_by_cred(devlist, ndevs, application, key_handle,
982 if ((response->key_handle = calloc(1, len)) == NULL) {
986 memcpy(response->key_handle, pt
388 sk_try(const struct sk_usbhid *sk, const char *application, const uint8_t *key_handle, size_t key_handle_len) argument
475 sk_select_by_cred(const fido_dev_info_t *devlist, size_t ndevs, const char *application, const uint8_t *key_handle, size_t key_handle_len) argument
1147 sk_sign(uint32_t alg, const uint8_t *data, size_t datalen, const char *application, const uint8_t *key_handle, size_t key_handle_len, uint8_t flags, const char *pin, struct sk_option **options, struct sk_sign_response **sign_response) argument
[all...]
H A Dssh-sk.c73 const uint8_t *key_handle, size_t key_handle_len,
89 const uint8_t *key_handle, size_t key_handle_len,
185 freezero(r->key_handle, r->key_handle_len);
302 if (resp->public_key == NULL || resp->key_handle == NULL) {
335 if ((r = sshbuf_put(key->sk_key_handle, resp->key_handle,
751 freezero(rks[i]->key.key_handle, rks[i]->key.key_handle_len);
/freebsd-current/crypto/openssh/regress/misc/sk-dummy/
H A Dsk-dummy.c104 response->key_handle = NULL;
147 if ((response->key_handle = malloc(privlen)) == NULL) {
148 skdebug(__func__, "malloc key_handle failed");
152 memcpy(response->key_handle, privptr, response->key_handle_len);
163 if (response->key_handle != NULL) {
164 memset(response->key_handle, 0,
166 free(response->key_handle);
167 response->key_handle = NULL;
187 response->key_handle = NULL;
202 if ((response->key_handle
308 sig_ecdsa(const uint8_t *message, size_t message_len, const char *application, uint32_t counter, uint8_t flags, const uint8_t *key_handle, size_t key_handle_len, struct sk_sign_response *response) argument
404 sig_ed25519(const uint8_t *message, size_t message_len, const char *application, uint32_t counter, uint8_t flags, const uint8_t *key_handle, size_t key_handle_len, struct sk_sign_response *response) argument
482 sk_sign(uint32_t alg, const uint8_t *data, size_t datalen, const char *application, const uint8_t *key_handle, size_t key_handle_len, uint8_t flags, const char *pin, struct sk_option **options, struct sk_sign_response **sign_response) argument
[all...]
/freebsd-current/contrib/libpcap/rpcapd/
H A Dlog.c115 &key_handle) != ERROR_SUCCESS) {

Completed in 302 milliseconds