Searched refs:skey (Results 1 - 25 of 32) sorted by relevance

12

/freebsd-11-stable/crypto/openssh/
H A Dauth-skey.c1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
35 #include <skey.h>
57 struct skey skey; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
94 "skey",
102 "skey",
H A Dmonitor.c60 #include <skey.h>
922 struct skey skey; local
926 success = _compat_skeychallenge(&skey, authctxt->user, challenge,
962 auth_submethod = "skey";
/freebsd-11-stable/sys/geom/bde/
H A Dg_bde_crypt.c112 * Security objective: Find the kkey, find the skey, decrypt the sector data.
122 u_char skey[G_BDE_SKEYLEN]; local
133 AES_decrypt(&ci, &ki, d, skey, sizeof skey);
135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey);
138 bzero(skey, sizeof skey);
146 * Security objective: Create random skey, encrypt sector data,
147 * encrypt skey with the kkey.
157 u_char skey[G_BDE_SKEYLE local
198 u_char skey[G_BDE_SKEYLEN]; local
[all...]
/freebsd-11-stable/sys/netinet/
H A Dsctp_auth.c477 sctp_free_sharedkey(sctp_sharedkey_t *skey) argument
479 if (skey == NULL)
482 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) {
483 if (skey->key != NULL)
484 sctp_free_key(skey->key);
485 SCTP_FREE(skey, SCTP_M_AUTH_KY);
492 sctp_sharedkey_t *skey; local
494 LIST_FOREACH(skey, shared_keys, next) {
495 if (skey->keyid == key_id)
496 return (skey);
505 sctp_sharedkey_t *skey; local
551 sctp_sharedkey_t *skey; local
572 sctp_sharedkey_t *skey; local
597 sctp_copy_sharedkey(const sctp_sharedkey_t *skey) argument
617 sctp_sharedkey_t *skey, *new_skey; local
1231 sctp_sharedkey_t *skey; local
1265 sctp_sharedkey_t *skey; local
1297 sctp_sharedkey_t *skey = NULL; local
1325 sctp_sharedkey_t *skey; local
1344 sctp_sharedkey_t *skey; local
1378 sctp_sharedkey_t *skey; local
1549 sctp_sharedkey_t *skey; local
1640 sctp_sharedkey_t *skey; local
[all...]
H A Dsctp_auth.h138 extern void sctp_free_sharedkey(sctp_sharedkey_t *skey);
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; local
53 des_setup(pkey, 8, 0, &skey);
54 des_ecb_encrypt(clear, cypher, &skey);
55 des_done(&skey);
88 symmetric_key *skey; local
89 skey = os_malloc(sizeof(*skey));
90 if (skey == NULL)
92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
93 os_free(skey);
102 symmetric_key *skey = ctx; local
109 symmetric_key *skey = ctx; local
117 symmetric_key *skey; local
131 symmetric_key *skey = ctx; local
138 symmetric_key *skey = ctx; local
[all...]
H A Dtls_openssl_ocsp.c508 EVP_PKEY *skey; local
627 skey = X509_get_pubkey(signer);
628 if (!skey) {
635 basic->tbsResponseData, skey) <= 0) {
/freebsd-11-stable/crypto/openssl/crypto/ocsp/
H A Docsp_vfy.c98 EVP_PKEY *skey; local
99 skey = X509_get_pubkey(signer);
100 if (skey) {
101 ret = OCSP_BASICRESP_verify(bs, skey, 0);
102 EVP_PKEY_free(skey);
104 if (!skey || ret <= 0) {
400 EVP_PKEY *skey; local
401 skey = X509_get_pubkey(signer);
402 ret = OCSP_REQUEST_verify(req, skey);
403 EVP_PKEY_free(skey);
[all...]
/freebsd-11-stable/contrib/telnet/libtelnet/
H A Dkerberos.c237 Session_Key skey; local
305 skey.type = SK_DES;
306 skey.length = 8;
307 skey.data = session_key;
308 encrypt_session_key(&skey, 1);
338 Session_Key skey; local
364 skey.type = SK_DES;
365 skey.length = 8;
366 skey.data = session_key;
367 encrypt_session_key(&skey,
[all...]
H A Dsra.c158 Session_Key skey; local
210 skey.data = ck;
211 skey.type = SK_DES;
212 skey.length = 8;
213 encrypt_session_key(&skey, 1);
249 Session_Key skey; local
328 skey.data = ck;
329 skey.type = SK_DES;
330 skey.length = 8;
331 encrypt_session_key(&skey,
[all...]
H A Dkrb4encpwd.c154 C_Block skey; local
165 KEYFILE, (char *)skey)) {
198 Session_Key skey; local
275 Session_Key skey; local
H A Dkerberos5.c469 Session_Key skey; local
471 skey.type = SK_DES;
472 skey.length = 8;
473 skey.data = key_block->keyvalue.data;
474 encrypt_session_key(&skey, 0);
589 Session_Key skey; local
616 skey.type = SK_DES;
617 skey.length = 8;
618 skey.data = keyblock->keyvalue.data;
619 encrypt_session_key(&skey,
[all...]
H A Drsaencpwd.c194 Session_Key skey; local
314 Session_Key skey; local
/freebsd-11-stable/contrib/netbsd-tests/lib/libskey/
H A Dt_algorithms.c36 #include <skey.h>
/freebsd-11-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Dkerberos5.c512 Session_Key skey; local
514 skey.type = SK_DES;
515 skey.length = 8;
516 skey.data = key_block->keyvalue.data;
517 encrypt_session_key(&skey, 0);
629 Session_Key skey; local
657 skey.type = SK_DES;
658 skey.length = 8;
659 skey.data = keyblock->keyvalue.data;
660 encrypt_session_key(&skey,
[all...]
H A Drsaencpwd.c198 Session_Key skey; local
318 Session_Key skey; local
H A Dspx.c317 Session_Key skey; local
420 Session_Key skey; local
/freebsd-11-stable/sys/dev/sfxge/common/
H A Def10_vpd.c190 efx_vpd_keyword_t skey; local
236 enp->en_arch.ef10.ena_svpd_length, &stag, &skey,
242 if (stag == dtag && skey == dkey) {
H A Dsiena_vpd.c295 efx_vpd_keyword_t skey; local
341 enp->en_u.siena.enu_svpd_length, &stag, &skey,
347 if (stag == dtag && skey == dkey) {
/freebsd-11-stable/secure/usr.sbin/sshd/
H A DMakefile11 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
/freebsd-11-stable/crypto/heimdal/kuser/
H A Dkimpersonate.c62 EncryptionKey *skey,
108 ret = krb5_crypto_init(context, skey, etype, &crypto);
61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
/freebsd-11-stable/usr.sbin/keyserv/
H A Dsetkey.c94 pk_setkey(uid, skey)
96 keybuf skey;
98 if (!storesecretkey(uid, skey)) {
/freebsd-11-stable/sys/dev/mpr/
H A Dmpr_sas.c2394 int skey, asc, ascq; local
2399 skey = SSD_KEY_ILLEGAL_REQUEST;
2408 skey = SSD_KEY_NO_SENSE;
2414 skey = SSD_KEY_ILLEGAL_REQUEST;
2420 skey = SSD_KEY_ILLEGAL_REQUEST;
2426 skey = SSD_KEY_MEDIUM_ERROR;
2432 skey = SSD_KEY_ABORTED_COMMAND;
2438 skey = SSD_KEY_HARDWARE_ERROR;
2447 skey = SSD_KEY_ABORTED_COMMAND;
2453 skey
[all...]
/freebsd-11-stable/crypto/heimdal/kdc/
H A Dkerberos5.c326 int skvno, const EncryptionKey *skey,
352 ret = krb5_crypto_init(context, skey, etype, &crypto);
979 Key *ckey, *skey; local
1468 &setype, &skey);
1775 &skey->key, /* Server key */
1776 &skey->key, /* FIXME: should be krbtgt key */
1813 &skey->key, client->entry.kvno,
322 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *reply_key, int rk_is_subkey, const char **e_text, krb5_data *reply) argument
/freebsd-11-stable/crypto/openssl/crypto/x509/
H A Dx509_vfy.c2076 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags)
2111 if (skey && (X509_CRL_verify(base, skey) <= 0 ||
2112 X509_CRL_verify(newer, skey) <= 0)) {
2169 if (skey && md && !X509_CRL_sign(crl, skey, md))
2075 X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) argument

Completed in 545 milliseconds

12