Searched refs:skey (Results 1 - 25 of 72) sorted by relevance

123

/netbsd-current/lib/libskey/
H A DMakefile5 LIB= skey
7 INCS= skey.h
10 MAN= skey.3
12 MLINKS= skey.3 skeychallenge.3 \
13 skey.3 skeylookup.3 \
14 skey.3 skeygetnext.3 \
15 skey.3 skeyverify.3 \
16 skey.3 skeyzero.3 \
17 skey.3 getskeyprompt.3 \
18 skey
[all...]
H A Dskey.h1 /* $NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $ */
4 * S/KEY v1.1b (skey.h)
21 struct skey { struct
79 int skeychallenge(struct skey *, const char *, char *, size_t);
80 int skeylookup(struct skey *, const char *);
81 int skeyverify(struct skey *, char *);
91 int getskeyprompt(struct skey *, char *, char *);
97 int skeygetnext(struct skey *);
98 int skeyzero(struct skey *, char *);
H A Dskeylogin.c38 #include "skey.h"
42 /* Issue a skey challenge for user 'name'. If successful,
43 * fill in the caller's skey structure and return 0. If unsuccessful
49 int getskeyprompt(struct skey *mp, char *name, char *prompt)
73 /* Return a skey challenge string for user 'name'. If successful,
74 * fill in the caller's skey structure and return 0. If unsuccessful
80 int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen)
126 int skeylookup(struct skey *mp, const char *name)
189 int skeygetnext(struct skey *mp)
241 int skeyverify(struct skey *m
355 struct skey skey; local
375 struct skey skey; local
398 struct skey skey; local
447 struct skey skey; local
452 struct skey skey; local
[all...]
/netbsd-current/usr.bin/skey/
H A DMakefile3 PROG= skey
4 MAN= skey.1 skeyaudit.1
/netbsd-current/lib/libpam/modules/pam_skey/
H A DMakefile13 LIBDPLIBS+= skey ${.CURDIR}/../../../libskey
/netbsd-current/usr.bin/skeyinfo/
H A Dskeyinfo.c44 #include <skey.h> /* requires stdio.h */
49 struct skey skey; local
80 if (getskeyprompt(&skey, name, prompt) == -1) {
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/cms/
H A Dcms_sign.c19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 cms = CMS_sign(scert, skey, NULL, in, flags);
83 EVP_PKEY_free(skey);
H A Dcms_sign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0))
91 EVP_PKEY_free(skey);
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/smime/
H A Dsmsign.c19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 p7 = PKCS7_sign(scert, skey, NULL, in, flags);
81 EVP_PKEY_free(skey);
H A Dsmsign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0))
89 EVP_PKEY_free(skey);
/netbsd-current/crypto/external/bsd/openssl/dist/demos/smime/
H A Dsmsign.c19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 p7 = PKCS7_sign(scert, skey, NULL, in, flags);
81 EVP_PKEY_free(skey);
H A Dsmsign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0))
89 EVP_PKEY_free(skey);
/netbsd-current/crypto/external/bsd/openssl/dist/demos/cms/
H A Dcms_sign.c19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 cms = CMS_sign(scert, skey, NULL, in, flags);
83 EVP_PKEY_free(skey);
H A Dcms_sign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0))
91 EVP_PKEY_free(skey);
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dauth-skey.c1 /* $NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $ */
2 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
27 __RCSID("$NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $");
36 #include <skey.h>
62 struct skey skey; local
64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1)
98 "skey",
106 "skey",
/netbsd-current/usr.bin/skeyinit/
H A Dskeyinit.c39 #include <skey.h>
57 struct skey skey; local
171 rval = skeylookup(&skey, pp->pw_name);
178 exit(skeyzero(&skey, pp->pw_name));
181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed);
184 * lets be nice if they have a skey.seed that
187 l = strlen(skey.seed);
189 lastc = skey.seed[l - 1];
191 (void)strlcpy(defaultseed, skey
[all...]
/netbsd-current/sys/crypto/aes/
H A Daes_ct.c275 uint32_t skey[120]; local
296 skey[(i << 1) + 0] = tmp;
297 skey[(i << 1) + 1] = tmp;
306 tmp ^= skey[(i - nk) << 1];
307 skey[(i << 1) + 0] = tmp;
308 skey[(i << 1) + 1] = tmp;
315 br_aes_ct_ortho(skey + (i << 1));
318 comp_skey[i] = (skey[j + 0] & 0x55555555)
319 | (skey[j + 1] & 0xAAAAAAAA);
326 br_aes_ct_skey_expand(uint32_t *skey, argument
346 br_aes_ct_keysched_stdenc(uint32_t *skey, const void *key, size_t key_len) argument
391 br_aes_ct_keysched_stddec(uint32_t *skey, const void *key, size_t key_len) argument
[all...]
H A Daes_ct_enc.c105 const uint32_t *skey, uint32_t *q)
109 add_round_key(q, skey);
114 add_round_key(q, skey + (u << 3));
118 add_round_key(q, skey + (num_rounds << 3));
104 br_aes_ct_bitslice_encrypt(unsigned num_rounds, const uint32_t *skey, uint32_t *q) argument
/netbsd-current/external/bsd/wpa/dist/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; local
53 des_setup(pkey, 8, 0, &skey);
54 des_ecb_encrypt(clear, cypher, &skey);
55 des_done(&skey);
88 symmetric_key *skey; local
89 skey = os_malloc(sizeof(*skey));
90 if (skey == NULL)
92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
93 os_free(skey);
102 symmetric_key *skey = ctx; local
109 symmetric_key *skey = ctx; local
117 symmetric_key *skey; local
131 symmetric_key *skey = ctx; local
138 symmetric_key *skey = ctx; local
[all...]
/netbsd-current/sys/net/
H A Dtoeplitz.c139 * a 16x16 circulant Toeplitz matrix T generated by skey.
148 stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey) argument
157 column[b] = skey << b | skey >> (NBSK - b);
221 uint16_t skey = htons(stoeplitz_keyseed); local
226 for (i = 0; i < klen; i += sizeof(skey)) {
227 k[i + 0] = skey >> 8;
228 k[i + 1] = skey;
/netbsd-current/sys/crypto/aes/arch/x86/
H A Daes_sse2_enc.c122 const uint64_t *skey, __m128i q[static 4])
126 add_round_key(q, skey);
131 add_round_key(q, skey + (u << 3));
135 add_round_key(q, skey + (num_rounds << 3));
121 aes_sse2_bitslice_encrypt(unsigned num_rounds, const uint64_t *skey, __m128i q[static 4]) argument
H A Daes_sse2.c320 uint32_t skey[60]; local
338 br_range_dec32le(skey, (key_len >> 2), key);
339 tmp = skey[(key_len >> 2) - 1];
347 tmp ^= skey[i - nk];
348 skey[i] = tmp;
359 w = _mm_loadu_epi8(skey + i);
377 aes_sse2_skey_expand(uint64_t *skey, argument
398 _mm_storeu_si64(&skey[v + 0], x0);
399 _mm_storeu_si64(&skey[v + 1], x1);
400 _mm_storeu_si64(&skey[
[all...]
/netbsd-current/lib/libtelnet/
H A Dsra.c166 Session_Key skey; local
224 skey.data = ck;
225 skey.type = SK_DES;
226 skey.length = 8;
227 encrypt_session_key(&skey, 1);
260 Session_Key skey; local
354 skey.data = ck;
355 skey.type = SK_DES;
356 skey.length = 8;
357 encrypt_session_key(&skey,
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/
H A Dtest_engine_dso.c84 void *skey, *ckey; local
87 skey = emalloc(DH_size(server));
90 ssize = DH_compute_key(skey, client->pub_key, server);
100 if (memcmp(skey, ckey, csize) != 0)
103 free(skey);
/netbsd-current/usr.sbin/netgroup_mkdb/
H A Dnetgroup_mkdb.c610 struct string skey, sdata; local
616 str_init(&skey);
620 str_prepend(&skey, e->n_name, k);
622 key.data = (u_char *) skey.s_str;
623 key.size = skey.s_len + 1;
641 str_free(&skey);
664 struct string skey, sdata; local
670 str_init(&skey);
673 str_prepend(&skey, (char *) key.data, k);
675 key.data = (u_char *) skey
[all...]

Completed in 320 milliseconds

123