/netbsd-6-1-5-RELEASE/lib/libskey/ |
H A D | Makefile | 5 LIB= skey 7 INCS= skey.h 10 MAN= skey.3 12 MLINKS= skey.3 skeychallenge.3 \ 13 skey.3 skeylookup.3 \ 14 skey.3 skeygetnext.3 \ 15 skey.3 skeyverify.3 \ 16 skey.3 skeyzero.3 \ 17 skey.3 getskeyprompt.3 \ 18 skey [all...] |
H A D | skey.h | 1 /* $NetBSD: skey.h,v 1.8 2000/07/28 16:35:11 thorpej Exp $ */ 4 * S/KEY v1.1b (skey.h) 19 struct skey { struct 77 int skeychallenge(struct skey *, const char *, char *, size_t); 78 int skeylookup(struct skey *, const char *); 79 int skeyverify(struct skey *, char *); 89 int getskeyprompt(struct skey *, char *, char *); 95 int skeygetnext(struct skey *); 96 int skeyzero(struct skey *, char *);
|
H A D | skeylogin.c | 38 #include "skey.h" 42 /* Issue a skey challenge for user 'name'. If successful, 43 * fill in the caller's skey structure and return 0. If unsuccessful 49 int getskeyprompt(struct skey *mp, char *name, char *prompt) 73 /* Return a skey challenge string for user 'name'. If successful, 74 * fill in the caller's skey structure and return 0. If unsuccessful 80 int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen) 126 int skeylookup(struct skey *mp, const char *name) 189 int skeygetnext(struct skey *mp) 241 int skeyverify(struct skey *m 355 struct skey skey; local 375 struct skey skey; local 398 struct skey skey; local 447 struct skey skey; local 452 struct skey skey; local [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/skey/ |
H A D | Makefile | 3 PROG= skey 4 MAN= skey.1 skeyaudit.1
|
H A D | skey.c | 1 /* $NetBSD: skey.c,v 1.17 2004/11/01 21:52:07 dsl Exp $ */ 4 * S/KEY v1.1b (skey.c) 18 * >skey 88 ka9q2 26 __RCSID("$NetBSD: skey.c,v 1.17 2004/11/01 21:52:07 dsl Exp $"); 33 #include <skey.h>
|
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_skey/ |
H A D | Makefile | 13 LIBDPLIBS+= skey ${.CURDIR}/../../../libskey
|
H A D | pam_skey.c | 41 #include <skey.h>
|
/netbsd-6-1-5-RELEASE/usr.bin/skeyinfo/ |
H A D | skeyinfo.c | 44 #include <skey.h> /* requires stdio.h */ 49 struct skey skey; local 80 if (getskeyprompt(&skey, name, prompt) == -1) {
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/cms/ |
H A D | cms_sign.c | 10 EVP_PKEY *skey = NULL; local 34 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 36 if (!scert || !skey) 47 cms = CMS_sign(scert, skey, NULL, in, flags); 77 if (skey) 78 EVP_PKEY_free(skey);
|
H A D | cms_sign2.c | 10 EVP_PKEY *skey = NULL, *skey2 = NULL; local 26 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 56 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) 86 if (skey) 87 EVP_PKEY_free(skey); 91 if (skey)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/smime/ |
H A D | smsign.c | 10 EVP_PKEY *skey = NULL; local 34 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 36 if (!scert || !skey) 47 p7 = PKCS7_sign(scert, skey, NULL, in, flags); 77 if (skey) 78 EVP_PKEY_free(skey);
|
H A D | smsign2.c | 10 EVP_PKEY *skey = NULL, *skey2 = NULL; local 26 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 56 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) 86 if (skey) 87 EVP_PKEY_free(skey); 91 if (skey)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | auth-skey.c | 1 /* $NetBSD: auth-skey.c,v 1.14 2008/04/06 23:39:05 christos Exp $ */ 2 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 27 __RCSID("$NetBSD: auth-skey.c,v 1.14 2008/04/06 23:39:05 christos Exp $"); 36 #include <skey.h> 62 struct skey skey; local 64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1) 98 "skey", 106 "skey",
|
/netbsd-6-1-5-RELEASE/usr.bin/skeyinit/ |
H A D | skeyinit.c | 39 #include <skey.h> 57 struct skey skey; local 171 rval = skeylookup(&skey, pp->pw_name); 178 exit(skeyzero(&skey, pp->pw_name)); 181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed); 184 * lets be nice if they have a skey.seed that 187 l = strlen(skey.seed); 189 lastc = skey.seed[l - 1]; 191 (void)strlcpy(defaultseed, skey [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | crypto_libtomcrypt.c | 48 symmetric_key skey; local 59 des_setup(pkey, 8, 0, &skey); 60 des_ecb_encrypt(clear, cypher, &skey); 61 des_done(&skey); 93 symmetric_key *skey; local 94 skey = os_malloc(sizeof(*skey)); 95 if (skey == NULL) 97 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 98 os_free(skey); 107 symmetric_key *skey = ctx; local 114 symmetric_key *skey = ctx; local 122 symmetric_key *skey; local 136 symmetric_key *skey = ctx; local 143 symmetric_key *skey = ctx; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
H A D | ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 if (skey) 96 ret = OCSP_BASICRESP_verify(bs, skey, 0); 97 EVP_PKEY_free(skey); 99 if(!skey || ret <= 0) 392 EVP_PKEY *skey; local 393 skey = X509_get_pubkey(signer); 394 ret = OCSP_REQUEST_verify(req, skey); 395 EVP_PKEY_free(skey); [all...] |
/netbsd-6-1-5-RELEASE/lib/libtelnet/ |
H A D | sra.c | 166 Session_Key skey; local 224 skey.data = ck; 225 skey.type = SK_DES; 226 skey.length = 8; 227 encrypt_session_key(&skey, 1); 260 Session_Key skey; local 354 skey.data = ck; 355 skey.type = SK_DES; 356 skey.length = 8; 357 encrypt_session_key(&skey, [all...] |
H A D | kerberos5.c | 413 Session_Key skey; local 415 skey.type = SK_DES; 416 skey.length = 8; 417 skey.data = key_block->keyvalue.data; 418 encrypt_session_key(&skey, 0); 522 Session_Key skey; local 547 skey.type = SK_DES; 548 skey.length = 8; 549 skey.data = keyblock->keyvalue.data; 550 encrypt_session_key(&skey, [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | test_engine_dso.c | 87 void *skey, *ckey; local 90 skey = emalloc(DH_size(server)); 93 ssize = DH_compute_key(skey, client->pub_key, server); 103 if (memcmp(skey, ckey, csize) != 0) 106 free(skey);
|
/netbsd-6-1-5-RELEASE/usr.sbin/netgroup_mkdb/ |
H A D | netgroup_mkdb.c | 610 struct string skey, sdata; local 616 str_init(&skey); 620 str_prepend(&skey, e->n_name, k); 622 key.data = (u_char *) skey.s_str; 623 key.size = skey.s_len + 1; 641 str_free(&skey); 664 struct string skey, sdata; local 670 str_init(&skey); 673 str_prepend(&skey, (char *) key.data, k); 675 key.data = (u_char *) skey [all...] |
/netbsd-6-1-5-RELEASE/tests/lib/libskey/ |
H A D | t_algorithms.c | 36 #include <skey.h>
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dlz/bin/dlzbdb/ |
H A D | dlzbdb.c | 89 getzone(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey); 92 gethost(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey); 299 getzone(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey) { argument 325 skey->data = strdup(left); 326 if (skey->data == NULL) { 331 skey->size = strlen(skey->data); 332 skey->flags = DB_DBT_APPMALLOC; 348 gethost(DB *dbp, const DBT *pkey, const DBT *pdata, DBT *skey) { argument 383 skey [all...] |
/netbsd-6-1-5-RELEASE/sbin/scsictl/ |
H A D | scsi_sense.c | 421 unsigned char skey; local 424 skey = 0; 427 skey = snsbuf[2] & 0xf; 429 (void) strlcpy(rqsbuf, sense_keys[skey], rqsbuflen); 436 (void) snprintf(rqsbuf, rqsbuflen, "%s, %s", sense_keys[skey], 443 switch (skey) {
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/bin/sshd/ |
H A D | Makefile | 14 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kimpersonate.c | 62 EncryptionKey *skey, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|