/netbsd-current/lib/libskey/ |
H A D | Makefile | 5 LIB= skey 7 INCS= skey.h 10 MAN= skey.3 12 MLINKS= skey.3 skeychallenge.3 \ 13 skey.3 skeylookup.3 \ 14 skey.3 skeygetnext.3 \ 15 skey.3 skeyverify.3 \ 16 skey.3 skeyzero.3 \ 17 skey.3 getskeyprompt.3 \ 18 skey [all...] |
H A D | skey.h | 1 /* $NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $ */ 4 * S/KEY v1.1b (skey.h) 21 struct skey { struct 79 int skeychallenge(struct skey *, const char *, char *, size_t); 80 int skeylookup(struct skey *, const char *); 81 int skeyverify(struct skey *, char *); 91 int getskeyprompt(struct skey *, char *, char *); 97 int skeygetnext(struct skey *); 98 int skeyzero(struct skey *, char *);
|
H A D | skeylogin.c | 38 #include "skey.h" 42 /* Issue a skey challenge for user 'name'. If successful, 43 * fill in the caller's skey structure and return 0. If unsuccessful 49 int getskeyprompt(struct skey *mp, char *name, char *prompt) 73 /* Return a skey challenge string for user 'name'. If successful, 74 * fill in the caller's skey structure and return 0. If unsuccessful 80 int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen) 126 int skeylookup(struct skey *mp, const char *name) 189 int skeygetnext(struct skey *mp) 241 int skeyverify(struct skey *m 355 struct skey skey; local 375 struct skey skey; local 398 struct skey skey; local 447 struct skey skey; local 452 struct skey skey; local [all...] |
/netbsd-current/usr.bin/skey/ |
H A D | Makefile | 3 PROG= skey 4 MAN= skey.1 skeyaudit.1
|
/netbsd-current/lib/libpam/modules/pam_skey/ |
H A D | Makefile | 13 LIBDPLIBS+= skey ${.CURDIR}/../../../libskey
|
/netbsd-current/usr.bin/skeyinfo/ |
H A D | skeyinfo.c | 44 #include <skey.h> /* requires stdio.h */ 49 struct skey skey; local 80 if (getskeyprompt(&skey, name, prompt) == -1) {
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/cms/ |
H A D | cms_sign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 cms = CMS_sign(scert, skey, NULL, in, flags); 83 EVP_PKEY_free(skey);
|
H A D | cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) 91 EVP_PKEY_free(skey);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/smime/ |
H A D | smsign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); 81 EVP_PKEY_free(skey);
|
H A D | smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) 89 EVP_PKEY_free(skey);
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/smime/ |
H A D | smsign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); 81 EVP_PKEY_free(skey);
|
H A D | smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) 89 EVP_PKEY_free(skey);
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/cms/ |
H A D | cms_sign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 cms = CMS_sign(scert, skey, NULL, in, flags); 83 EVP_PKEY_free(skey);
|
H A D | cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) 91 EVP_PKEY_free(skey);
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | auth-skey.c | 1 /* $NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $ */ 2 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 27 __RCSID("$NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $"); 36 #include <skey.h> 62 struct skey skey; local 64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1) 98 "skey", 106 "skey",
|
/netbsd-current/usr.bin/skeyinit/ |
H A D | skeyinit.c | 39 #include <skey.h> 57 struct skey skey; local 171 rval = skeylookup(&skey, pp->pw_name); 178 exit(skeyzero(&skey, pp->pw_name)); 181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed); 184 * lets be nice if they have a skey.seed that 187 l = strlen(skey.seed); 189 lastc = skey.seed[l - 1]; 191 (void)strlcpy(defaultseed, skey [all...] |
/netbsd-current/sys/crypto/aes/ |
H A D | aes_ct.c | 275 uint32_t skey[120]; local 296 skey[(i << 1) + 0] = tmp; 297 skey[(i << 1) + 1] = tmp; 306 tmp ^= skey[(i - nk) << 1]; 307 skey[(i << 1) + 0] = tmp; 308 skey[(i << 1) + 1] = tmp; 315 br_aes_ct_ortho(skey + (i << 1)); 318 comp_skey[i] = (skey[j + 0] & 0x55555555) 319 | (skey[j + 1] & 0xAAAAAAAA); 326 br_aes_ct_skey_expand(uint32_t *skey, argument 346 br_aes_ct_keysched_stdenc(uint32_t *skey, const void *key, size_t key_len) argument 391 br_aes_ct_keysched_stddec(uint32_t *skey, const void *key, size_t key_len) argument [all...] |
H A D | aes_ct_enc.c | 105 const uint32_t *skey, uint32_t *q) 109 add_round_key(q, skey); 114 add_round_key(q, skey + (u << 3)); 118 add_round_key(q, skey + (num_rounds << 3)); 104 br_aes_ct_bitslice_encrypt(unsigned num_rounds, const uint32_t *skey, uint32_t *q) argument
|
/netbsd-current/external/bsd/wpa/dist/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 88 symmetric_key *skey; local 89 skey = os_malloc(sizeof(*skey)); 90 if (skey == NULL) 92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 93 os_free(skey); 102 symmetric_key *skey = ctx; local 109 symmetric_key *skey = ctx; local 117 symmetric_key *skey; local 131 symmetric_key *skey = ctx; local 138 symmetric_key *skey = ctx; local [all...] |
/netbsd-current/sys/net/ |
H A D | toeplitz.c | 139 * a 16x16 circulant Toeplitz matrix T generated by skey. 148 stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey) argument 157 column[b] = skey << b | skey >> (NBSK - b); 221 uint16_t skey = htons(stoeplitz_keyseed); local 226 for (i = 0; i < klen; i += sizeof(skey)) { 227 k[i + 0] = skey >> 8; 228 k[i + 1] = skey;
|
/netbsd-current/sys/crypto/aes/arch/x86/ |
H A D | aes_sse2_enc.c | 122 const uint64_t *skey, __m128i q[static 4]) 126 add_round_key(q, skey); 131 add_round_key(q, skey + (u << 3)); 135 add_round_key(q, skey + (num_rounds << 3)); 121 aes_sse2_bitslice_encrypt(unsigned num_rounds, const uint64_t *skey, __m128i q[static 4]) argument
|
H A D | aes_sse2.c | 320 uint32_t skey[60]; local 338 br_range_dec32le(skey, (key_len >> 2), key); 339 tmp = skey[(key_len >> 2) - 1]; 347 tmp ^= skey[i - nk]; 348 skey[i] = tmp; 359 w = _mm_loadu_epi8(skey + i); 377 aes_sse2_skey_expand(uint64_t *skey, argument 398 _mm_storeu_si64(&skey[v + 0], x0); 399 _mm_storeu_si64(&skey[v + 1], x1); 400 _mm_storeu_si64(&skey[ [all...] |
/netbsd-current/lib/libtelnet/ |
H A D | sra.c | 166 Session_Key skey; local 224 skey.data = ck; 225 skey.type = SK_DES; 226 skey.length = 8; 227 encrypt_session_key(&skey, 1); 260 Session_Key skey; local 354 skey.data = ck; 355 skey.type = SK_DES; 356 skey.length = 8; 357 encrypt_session_key(&skey, [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | test_engine_dso.c | 84 void *skey, *ckey; local 87 skey = emalloc(DH_size(server)); 90 ssize = DH_compute_key(skey, client->pub_key, server); 100 if (memcmp(skey, ckey, csize) != 0) 103 free(skey);
|
/netbsd-current/usr.sbin/netgroup_mkdb/ |
H A D | netgroup_mkdb.c | 610 struct string skey, sdata; local 616 str_init(&skey); 620 str_prepend(&skey, e->n_name, k); 622 key.data = (u_char *) skey.s_str; 623 key.size = skey.s_len + 1; 641 str_free(&skey); 664 struct string skey, sdata; local 670 str_init(&skey); 673 str_prepend(&skey, (char *) key.data, k); 675 key.data = (u_char *) skey [all...] |