Searched refs:key_handle (Results 1 - 5 of 5) sorted by relevance
/freebsd-current/crypto/openssh/ |
H A D | sk-api.h | 47 uint8_t *key_handle; member in struct:sk_enroll_response 95 const char *application, const uint8_t *key_handle, size_t key_handle_len,
|
H A D | sk-usbhid.c | 128 const char *application, const uint8_t *key_handle, size_t key_handle_len, 389 const uint8_t *key_handle, size_t key_handle_len) 411 if ((r = fido_assert_allow_cred(assert, key_handle, 476 const char *application, const uint8_t *key_handle, size_t key_handle_len) 494 if (sk_try(skv[i], application, key_handle, 560 sk_probe(const char *application, const uint8_t *key_handle, argument 586 } else if (application != NULL && key_handle != NULL) { 588 sk = sk_select_by_cred(devlist, ndevs, application, key_handle, 982 if ((response->key_handle = calloc(1, len)) == NULL) { 986 memcpy(response->key_handle, pt 388 sk_try(const struct sk_usbhid *sk, const char *application, const uint8_t *key_handle, size_t key_handle_len) argument 475 sk_select_by_cred(const fido_dev_info_t *devlist, size_t ndevs, const char *application, const uint8_t *key_handle, size_t key_handle_len) argument 1147 sk_sign(uint32_t alg, const uint8_t *data, size_t datalen, const char *application, const uint8_t *key_handle, size_t key_handle_len, uint8_t flags, const char *pin, struct sk_option **options, struct sk_sign_response **sign_response) argument [all...] |
H A D | ssh-sk.c | 73 const uint8_t *key_handle, size_t key_handle_len, 89 const uint8_t *key_handle, size_t key_handle_len, 185 freezero(r->key_handle, r->key_handle_len); 302 if (resp->public_key == NULL || resp->key_handle == NULL) { 335 if ((r = sshbuf_put(key->sk_key_handle, resp->key_handle, 751 freezero(rks[i]->key.key_handle, rks[i]->key.key_handle_len);
|
/freebsd-current/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 104 response->key_handle = NULL; 147 if ((response->key_handle = malloc(privlen)) == NULL) { 148 skdebug(__func__, "malloc key_handle failed"); 152 memcpy(response->key_handle, privptr, response->key_handle_len); 163 if (response->key_handle != NULL) { 164 memset(response->key_handle, 0, 166 free(response->key_handle); 167 response->key_handle = NULL; 187 response->key_handle = NULL; 202 if ((response->key_handle 308 sig_ecdsa(const uint8_t *message, size_t message_len, const char *application, uint32_t counter, uint8_t flags, const uint8_t *key_handle, size_t key_handle_len, struct sk_sign_response *response) argument 404 sig_ed25519(const uint8_t *message, size_t message_len, const char *application, uint32_t counter, uint8_t flags, const uint8_t *key_handle, size_t key_handle_len, struct sk_sign_response *response) argument 482 sk_sign(uint32_t alg, const uint8_t *data, size_t datalen, const char *application, const uint8_t *key_handle, size_t key_handle_len, uint8_t flags, const char *pin, struct sk_option **options, struct sk_sign_response **sign_response) argument [all...] |
/freebsd-current/contrib/libpcap/rpcapd/ |
H A D | log.c | 115 &key_handle) != ERROR_SUCCESS) {
|
Completed in 302 milliseconds