Searched refs:skey (Results 1 - 25 of 41) sorted by relevance

12

/netbsd-6-1-5-RELEASE/lib/libskey/
H A DMakefile5 LIB= skey
7 INCS= skey.h
10 MAN= skey.3
12 MLINKS= skey.3 skeychallenge.3 \
13 skey.3 skeylookup.3 \
14 skey.3 skeygetnext.3 \
15 skey.3 skeyverify.3 \
16 skey.3 skeyzero.3 \
17 skey.3 getskeyprompt.3 \
18 skey
[all...]
H A Dskey.h1 /* $NetBSD: skey.h,v 1.8 2000/07/28 16:35:11 thorpej Exp $ */
4 * S/KEY v1.1b (skey.h)
19 struct skey { struct
77 int skeychallenge(struct skey *, const char *, char *, size_t);
78 int skeylookup(struct skey *, const char *);
79 int skeyverify(struct skey *, char *);
89 int getskeyprompt(struct skey *, char *, char *);
95 int skeygetnext(struct skey *);
96 int skeyzero(struct skey *, char *);
H A Dskeylogin.c38 #include "skey.h"
42 /* Issue a skey challenge for user 'name'. If successful,
43 * fill in the caller's skey structure and return 0. If unsuccessful
49 int getskeyprompt(struct skey *mp, char *name, char *prompt)
73 /* Return a skey challenge string for user 'name'. If successful,
74 * fill in the caller's skey structure and return 0. If unsuccessful
80 int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen)
126 int skeylookup(struct skey *mp, const char *name)
189 int skeygetnext(struct skey *mp)
241 int skeyverify(struct skey *m
355 struct skey skey; local
375 struct skey skey; local
398 struct skey skey; local
447 struct skey skey; local
452 struct skey skey; local
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/skey/
H A DMakefile3 PROG= skey
4 MAN= skey.1 skeyaudit.1
H A Dskey.c1 /* $NetBSD: skey.c,v 1.17 2004/11/01 21:52:07 dsl Exp $ */
4 * S/KEY v1.1b (skey.c)
18 * >skey 88 ka9q2
26 __RCSID("$NetBSD: skey.c,v 1.17 2004/11/01 21:52:07 dsl Exp $");
33 #include <skey.h>
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_skey/
H A DMakefile13 LIBDPLIBS+= skey ${.CURDIR}/../../../libskey
H A Dpam_skey.c41 #include <skey.h>
/netbsd-6-1-5-RELEASE/usr.bin/skeyinfo/
H A Dskeyinfo.c44 #include <skey.h> /* requires stdio.h */
49 struct skey skey; local
80 if (getskeyprompt(&skey, name, prompt) == -1) {
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/cms/
H A Dcms_sign.c10 EVP_PKEY *skey = NULL; local
34 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
36 if (!scert || !skey)
47 cms = CMS_sign(scert, skey, NULL, in, flags);
77 if (skey)
78 EVP_PKEY_free(skey);
H A Dcms_sign2.c10 EVP_PKEY *skey = NULL, *skey2 = NULL; local
26 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
56 if (!CMS_add1_signer(cms, scert, skey, NULL, 0))
86 if (skey)
87 EVP_PKEY_free(skey);
91 if (skey)
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/smime/
H A Dsmsign.c10 EVP_PKEY *skey = NULL; local
34 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
36 if (!scert || !skey)
47 p7 = PKCS7_sign(scert, skey, NULL, in, flags);
77 if (skey)
78 EVP_PKEY_free(skey);
H A Dsmsign2.c10 EVP_PKEY *skey = NULL, *skey2 = NULL; local
26 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
56 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0))
86 if (skey)
87 EVP_PKEY_free(skey);
91 if (skey)
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dauth-skey.c1 /* $NetBSD: auth-skey.c,v 1.14 2008/04/06 23:39:05 christos Exp $ */
2 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
27 __RCSID("$NetBSD: auth-skey.c,v 1.14 2008/04/06 23:39:05 christos Exp $");
36 #include <skey.h>
62 struct skey skey; local
64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1)
98 "skey",
106 "skey",
/netbsd-6-1-5-RELEASE/usr.bin/skeyinit/
H A Dskeyinit.c39 #include <skey.h>
57 struct skey skey; local
171 rval = skeylookup(&skey, pp->pw_name);
178 exit(skeyzero(&skey, pp->pw_name));
181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed);
184 * lets be nice if they have a skey.seed that
187 l = strlen(skey.seed);
189 lastc = skey.seed[l - 1];
191 (void)strlcpy(defaultseed, skey
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/
H A Dcrypto_libtomcrypt.c48 symmetric_key skey; local
59 des_setup(pkey, 8, 0, &skey);
60 des_ecb_encrypt(clear, cypher, &skey);
61 des_done(&skey);
93 symmetric_key *skey; local
94 skey = os_malloc(sizeof(*skey));
95 if (skey == NULL)
97 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
98 os_free(skey);
107 symmetric_key *skey = ctx; local
114 symmetric_key *skey = ctx; local
122 symmetric_key *skey; local
136 symmetric_key *skey = ctx; local
143 symmetric_key *skey = ctx; local
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ocsp/
H A Docsp_vfy.c92 EVP_PKEY *skey; local
93 skey = X509_get_pubkey(signer);
94 if (skey)
96 ret = OCSP_BASICRESP_verify(bs, skey, 0);
97 EVP_PKEY_free(skey);
99 if(!skey || ret <= 0)
392 EVP_PKEY *skey; local
393 skey = X509_get_pubkey(signer);
394 ret = OCSP_REQUEST_verify(req, skey);
395 EVP_PKEY_free(skey);
[all...]
/netbsd-6-1-5-RELEASE/lib/libtelnet/
H A Dsra.c166 Session_Key skey; local
224 skey.data = ck;
225 skey.type = SK_DES;
226 skey.length = 8;
227 encrypt_session_key(&skey, 1);
260 Session_Key skey; local
354 skey.data = ck;
355 skey.type = SK_DES;
356 skey.length = 8;
357 encrypt_session_key(&skey,
[all...]
H A Dkerberos5.c413 Session_Key skey; local
415 skey.type = SK_DES;
416 skey.length = 8;
417 skey.data = key_block->keyvalue.data;
418 encrypt_session_key(&skey, 0);
522 Session_Key skey; local
547 skey.type = SK_DES;
548 skey.length = 8;
549 skey.data = keyblock->keyvalue.data;
550 encrypt_session_key(&skey,
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/
H A Dtest_engine_dso.c87 void *skey, *ckey; local
90 skey = emalloc(DH_size(server));
93 ssize = DH_compute_key(skey, client->pub_key, server);
103 if (memcmp(skey, ckey, csize) != 0)
106 free(skey);
/netbsd-6-1-5-RELEASE/usr.sbin/netgroup_mkdb/
H A Dnetgroup_mkdb.c610 struct string skey, sdata; local
616 str_init(&skey);
620 str_prepend(&skey, e->n_name, k);
622 key.data = (u_char *) skey.s_str;
623 key.size = skey.s_len + 1;
641 str_free(&skey);
664 struct string skey, sdata; local
670 str_init(&skey);
673 str_prepend(&skey, (char *) key.data, k);
675 key.data = (u_char *) skey
[all...]
/netbsd-6-1-5-RELEASE/tests/lib/libskey/
H A Dt_algorithms.c36 #include <skey.h>
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/bin/dlzbdb/
H A Ddlzbdb.c89 getzone(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey);
92 gethost(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey);
299 getzone(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey) { argument
325 skey->data = strdup(left);
326 if (skey->data == NULL) {
331 skey->size = strlen(skey->data);
332 skey->flags = DB_DBT_APPMALLOC;
348 gethost(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey) { argument
383 skey
[all...]
/netbsd-6-1-5-RELEASE/sbin/scsictl/
H A Dscsi_sense.c421 unsigned char skey; local
424 skey = 0;
427 skey = snsbuf[2] & 0xf;
429 (void) strlcpy(rqsbuf, sense_keys[skey], rqsbuflen);
436 (void) snprintf(rqsbuf, rqsbuflen, "%s, %s", sense_keys[skey],
443 switch (skey) {
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/bin/sshd/
H A DMakefile14 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kuser/
H A Dkimpersonate.c62 EncryptionKey *skey,
108 ret = krb5_crypto_init(context, skey, etype, &crypto);
61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument

Completed in 159 milliseconds

12