/freebsd-11-stable/crypto/openssh/ |
H A D | auth-skey.c | 1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 35 #include <skey.h> 57 struct skey skey; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 94 "skey", 102 "skey",
|
H A D | monitor.c | 60 #include <skey.h> 922 struct skey skey; local 926 success = _compat_skeychallenge(&skey, authctxt->user, challenge, 962 auth_submethod = "skey";
|
/freebsd-11-stable/sys/geom/bde/ |
H A D | g_bde_crypt.c | 112 * Security objective: Find the kkey, find the skey, decrypt the sector data. 122 u_char skey[G_BDE_SKEYLEN]; local 133 AES_decrypt(&ci, &ki, d, skey, sizeof skey); 135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey); 138 bzero(skey, sizeof skey); 146 * Security objective: Create random skey, encrypt sector data, 147 * encrypt skey with the kkey. 157 u_char skey[G_BDE_SKEYLE local 198 u_char skey[G_BDE_SKEYLEN]; local [all...] |
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_auth.c | 477 sctp_free_sharedkey(sctp_sharedkey_t *skey) argument 479 if (skey == NULL) 482 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) { 483 if (skey->key != NULL) 484 sctp_free_key(skey->key); 485 SCTP_FREE(skey, SCTP_M_AUTH_KY); 492 sctp_sharedkey_t *skey; local 494 LIST_FOREACH(skey, shared_keys, next) { 495 if (skey->keyid == key_id) 496 return (skey); 505 sctp_sharedkey_t *skey; local 551 sctp_sharedkey_t *skey; local 572 sctp_sharedkey_t *skey; local 597 sctp_copy_sharedkey(const sctp_sharedkey_t *skey) argument 617 sctp_sharedkey_t *skey, *new_skey; local 1231 sctp_sharedkey_t *skey; local 1265 sctp_sharedkey_t *skey; local 1297 sctp_sharedkey_t *skey = NULL; local 1325 sctp_sharedkey_t *skey; local 1344 sctp_sharedkey_t *skey; local 1378 sctp_sharedkey_t *skey; local 1549 sctp_sharedkey_t *skey; local 1640 sctp_sharedkey_t *skey; local [all...] |
H A D | sctp_auth.h | 138 extern void sctp_free_sharedkey(sctp_sharedkey_t *skey);
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 88 symmetric_key *skey; local 89 skey = os_malloc(sizeof(*skey)); 90 if (skey == NULL) 92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 93 os_free(skey); 102 symmetric_key *skey = ctx; local 109 symmetric_key *skey = ctx; local 117 symmetric_key *skey; local 131 symmetric_key *skey = ctx; local 138 symmetric_key *skey = ctx; local [all...] |
H A D | tls_openssl_ocsp.c | 508 EVP_PKEY *skey; local 627 skey = X509_get_pubkey(signer); 628 if (!skey) { 635 basic->tbsResponseData, skey) <= 0) {
|
/freebsd-11-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 98 EVP_PKEY *skey; local 99 skey = X509_get_pubkey(signer); 100 if (skey) { 101 ret = OCSP_BASICRESP_verify(bs, skey, 0); 102 EVP_PKEY_free(skey); 104 if (!skey || ret <= 0) { 400 EVP_PKEY *skey; local 401 skey = X509_get_pubkey(signer); 402 ret = OCSP_REQUEST_verify(req, skey); 403 EVP_PKEY_free(skey); [all...] |
/freebsd-11-stable/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 237 Session_Key skey; local 305 skey.type = SK_DES; 306 skey.length = 8; 307 skey.data = session_key; 308 encrypt_session_key(&skey, 1); 338 Session_Key skey; local 364 skey.type = SK_DES; 365 skey.length = 8; 366 skey.data = session_key; 367 encrypt_session_key(&skey, [all...] |
H A D | sra.c | 158 Session_Key skey; local 210 skey.data = ck; 211 skey.type = SK_DES; 212 skey.length = 8; 213 encrypt_session_key(&skey, 1); 249 Session_Key skey; local 328 skey.data = ck; 329 skey.type = SK_DES; 330 skey.length = 8; 331 encrypt_session_key(&skey, [all...] |
H A D | krb4encpwd.c | 154 C_Block skey; local 165 KEYFILE, (char *)skey)) { 198 Session_Key skey; local 275 Session_Key skey; local
|
H A D | kerberos5.c | 469 Session_Key skey; local 471 skey.type = SK_DES; 472 skey.length = 8; 473 skey.data = key_block->keyvalue.data; 474 encrypt_session_key(&skey, 0); 589 Session_Key skey; local 616 skey.type = SK_DES; 617 skey.length = 8; 618 skey.data = keyblock->keyvalue.data; 619 encrypt_session_key(&skey, [all...] |
H A D | rsaencpwd.c | 194 Session_Key skey; local 314 Session_Key skey; local
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libskey/ |
H A D | t_algorithms.c | 36 #include <skey.h>
|
/freebsd-11-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos5.c | 512 Session_Key skey; local 514 skey.type = SK_DES; 515 skey.length = 8; 516 skey.data = key_block->keyvalue.data; 517 encrypt_session_key(&skey, 0); 629 Session_Key skey; local 657 skey.type = SK_DES; 658 skey.length = 8; 659 skey.data = keyblock->keyvalue.data; 660 encrypt_session_key(&skey, [all...] |
H A D | rsaencpwd.c | 198 Session_Key skey; local 318 Session_Key skey; local
|
H A D | spx.c | 317 Session_Key skey; local 420 Session_Key skey; local
|
/freebsd-11-stable/sys/dev/sfxge/common/ |
H A D | ef10_vpd.c | 190 efx_vpd_keyword_t skey; local 236 enp->en_arch.ef10.ena_svpd_length, &stag, &skey, 242 if (stag == dtag && skey == dkey) {
|
H A D | siena_vpd.c | 295 efx_vpd_keyword_t skey; local 341 enp->en_u.siena.enu_svpd_length, &stag, &skey, 347 if (stag == dtag && skey == dkey) {
|
/freebsd-11-stable/secure/usr.sbin/sshd/ |
H A D | Makefile | 11 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
|
/freebsd-11-stable/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 62 EncryptionKey *skey, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
/freebsd-11-stable/usr.sbin/keyserv/ |
H A D | setkey.c | 94 pk_setkey(uid, skey) 96 keybuf skey; 98 if (!storesecretkey(uid, skey)) {
|
/freebsd-11-stable/sys/dev/mpr/ |
H A D | mpr_sas.c | 2394 int skey, asc, ascq; local 2399 skey = SSD_KEY_ILLEGAL_REQUEST; 2408 skey = SSD_KEY_NO_SENSE; 2414 skey = SSD_KEY_ILLEGAL_REQUEST; 2420 skey = SSD_KEY_ILLEGAL_REQUEST; 2426 skey = SSD_KEY_MEDIUM_ERROR; 2432 skey = SSD_KEY_ABORTED_COMMAND; 2438 skey = SSD_KEY_HARDWARE_ERROR; 2447 skey = SSD_KEY_ABORTED_COMMAND; 2453 skey [all...] |
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 326 int skvno, const EncryptionKey *skey, 352 ret = krb5_crypto_init(context, skey, etype, &crypto); 979 Key *ckey, *skey; local 1468 &setype, &skey); 1775 &skey->key, /* Server key */ 1776 &skey->key, /* FIXME: should be krbtgt key */ 1813 &skey->key, client->entry.kvno, 322 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *reply_key, int rk_is_subkey, const char **e_text, krb5_data *reply) argument
|
/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509_vfy.c | 2076 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) 2111 if (skey && (X509_CRL_verify(base, skey) <= 0 || 2112 X509_CRL_verify(newer, skey) <= 0)) { 2169 if (skey && md && !X509_CRL_sign(crl, skey, md)) 2075 X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) argument
|