/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | generate_subkey.c | 39 * Generate subkey, from keyblock 43 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 44 * @param subkey returned new, free with krb5_free_keyblock(). 55 krb5_keyblock **subkey) 59 ALLOC(*subkey, 1); 60 if (*subkey == NULL) 67 ret = krb5_generate_random_keyblock(context, etype, *subkey); 69 free(*subkey); 70 *subkey = NULL; 52 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | fast.c | 85 krb5_keyblock *subkey, 91 subkey, 84 _krb5_fast_armor_key(krb5_context context, krb5_keyblock *subkey, krb5_keyblock *sessionkey, krb5_keyblock *armorkey, krb5_crypto *armor_crypto) argument
|
H A D | rd_rep.c | 102 if ((*repl)->subkey) 103 krb5_auth_con_setremotesubkey(context, auth_context, (*repl)->subkey);
|
H A D | mk_rep.c | 69 &body.subkey); 75 body.subkey = NULL;
|
H A D | config_reg.c | 536 HKEY subkey = NULL; local 546 rcode = RegOpenKeyEx(key, name, 0, KEY_READ, &subkey); 552 RegCloseKey(subkey); 556 code = parse_reg_values(context, subkey, §ion->u.list); 558 RegCloseKey(subkey); 562 code = parse_reg_subkeys(context, subkey, §ion->u.list); 564 RegCloseKey(subkey); 568 RegCloseKey(subkey);
|
H A D | get_cred.c | 92 krb5_keyblock *subkey) 112 ret = krb5_crypto_init(context, subkey, 0, &crypto); 137 * subkey in `subkey'. 150 krb5_keyblock **subkey, 282 ret = krb5_auth_con_getlocalsubkey(context, ac, subkey); 346 const krb5_keyblock *subkey = skey; local 357 * start out with trying with subkey if we have one 359 if (subkey) { 360 ret = krb5_crypto_init(context, subkey, 89 set_auth_data(krb5_context context, KDC_REQ_BODY *req_body, krb5_authdata *authdata, krb5_keyblock *subkey) argument 141 init_tgs_req(krb5_context context, krb5_ccache ccache, krb5_addresses *addresses, krb5_kdc_flags flags, Ticket *second_ticket, krb5_creds *in_creds, krb5_creds *krbtgt, unsigned nonce, const METHOD_DATA *padata, krb5_keyblock **subkey, TGS_REQ *t) argument 429 krb5_keyblock *subkey = NULL; local [all...] |
H A D | auth_context.c | 354 krb5_keyblock *subkey; local 358 &subkey); 363 auth_context->local_subkey = subkey;
|
/netbsd-current/sys/crypto/camellia/ |
H A D | camellia.h | 38 uint32_t subkey[CAMELLIA_SUBKEYWORD]; /* encrypt/decrypt key schedule */ member in struct:__anon9692 48 uint32_t *subkey); 52 const uint32_t *subkey, 57 const uint32_t *subkey, 60 void camellia_setup128(const unsigned char *key, uint32_t *subkey); 61 void camellia_setup192(const unsigned char *key, uint32_t *subkey); 62 void camellia_setup256(const unsigned char *key, uint32_t *subkey); 63 void camellia_encrypt128(const uint32_t *subkey, uint32_t *io); 64 void camellia_encrypt256(const uint32_t *subkey, uint32_t *io); 65 void camellia_decrypt128(const uint32_t *subkey, uint32_ [all...] |
H A D | camellia-api.c | 40 Camellia_Ekeygen(bits, key, ctx->subkey); 48 Camellia_DecryptBlock(ctx->bits, src, ctx->subkey, dst); 55 Camellia_EncryptBlock(ctx->bits, src, ctx->subkey, dst);
|
H A D | camellia.c | 74 #define SUBL(INDEX) (subkey[(INDEX)*2+1]) 75 #define SUBR(INDEX) (subkey[(INDEX)*2]) 437 camellia_setup128(const unsigned char *key, uint32_t *subkey) argument 643 camellia_setup256(const unsigned char *key, uint32_t *subkey) argument 923 camellia_setup192(const unsigned char *key, uint32_t *subkey) argument 935 camellia_setup256(kk, subkey); 943 camellia_encrypt128(const uint32_t *subkey, uint32_t *io) argument 1010 camellia_decrypt128(const uint32_t *subkey, uint32_t *io) argument 1080 camellia_encrypt256(const uint32_t *subkey, uint32_t *io) argument 1163 camellia_decrypt256(const uint32_t *subkey, uint32_ argument 1246 Camellia_Ekeygen(const int keyBitLength, const unsigned char *rawKey, uint32_t *subkey) argument 1267 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const uint32_t *subkey, unsigned char *ciphertext) argument 1299 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const uint32_t *subkey, unsigned char *plaintext) argument [all...] |
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_stream/xsalsa20/ |
H A D | stream_xsalsa20.c | 11 unsigned char subkey[32]; local 14 crypto_core_hsalsa20(subkey, n, k, NULL); 15 ret = crypto_stream_salsa20(c, clen, n + 16, subkey); 16 sodium_memzero(subkey, sizeof subkey); 26 unsigned char subkey[32]; local 29 crypto_core_hsalsa20(subkey, n, k, NULL); 30 ret = crypto_stream_salsa20_xor_ic(c, m, mlen, n + 16, ic, subkey); 31 sodium_memzero(subkey, sizeof subkey); [all...] |
/netbsd-current/sys/external/isc/libsodium/dist/test/default/ |
H A D | kdf.c | 9 unsigned char *subkey; local 21 subkey = (unsigned char *) sodium_malloc(crypto_kdf_BYTES_MAX); 23 ret = crypto_kdf_derive_from_key(subkey, crypto_kdf_BYTES_MAX, 26 sodium_bin2hex(hex, sizeof hex, subkey, crypto_kdf_BYTES_MAX); 29 sodium_free(subkey); 32 subkey = (unsigned char *) sodium_malloc(crypto_kdf_BYTES_MAX); 33 if (crypto_kdf_derive_from_key(subkey, (size_t) i, 35 sodium_bin2hex(hex, sizeof hex, subkey, (size_t) i); 41 sodium_free(subkey);
|
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/ |
H A D | crypto_kdf.c | 36 crypto_kdf_derive_from_key(unsigned char *subkey, size_t subkey_len, argument 41 return crypto_kdf_blake2b_derive_from_key(subkey, subkey_len,
|
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_secretbox/ |
H A D | crypto_secretbox_easy.c | 24 unsigned char subkey[crypto_stream_salsa20_KEYBYTES]; local 28 crypto_core_hsalsa20(subkey, n, k, NULL); 48 n + 16, subkey); 59 n + 16, 1U, subkey); 61 sodium_memzero(subkey, sizeof subkey); 90 unsigned char subkey[crypto_stream_salsa20_KEYBYTES]; local 94 crypto_core_hsalsa20(subkey, n, k, NULL); 96 n + 16, subkey); 98 sodium_memzero(subkey, sizeo [all...] |
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_secretbox/xchacha20poly1305/ |
H A D | secretbox_xchacha20poly1305.c | 28 unsigned char subkey[crypto_stream_chacha20_KEYBYTES]; local 32 crypto_core_hchacha20(subkey, n, k, NULL); 52 n + 16, subkey); 63 n + 16, 1U, subkey); 65 sodium_memzero(subkey, sizeof subkey); 97 unsigned char subkey[crypto_stream_chacha20_KEYBYTES]; local 101 crypto_core_hchacha20(subkey, n, k, NULL); 103 n + 16, subkey); 105 sodium_memzero(subkey, sizeo [all...] |
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_secretbox/xsalsa20poly1305/ |
H A D | secretbox_xsalsa20poly1305.c | 31 unsigned char subkey[32]; local 37 crypto_stream_xsalsa20(subkey, 32, n, k); 39 clen - 32, subkey) != 0) {
|
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/blake2b/ |
H A D | kdf_blake2b.c | 31 int crypto_kdf_blake2b_derive_from_key(unsigned char *subkey, size_t subkey_len, argument 48 return crypto_generichash_blake2b_salt_personal(subkey, subkey_len,
|
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/include/sodium/ |
H A D | crypto_kdf_blake2b.h | 34 int crypto_kdf_blake2b_derive_from_key(unsigned char *subkey, size_t subkey_len,
|
H A D | crypto_kdf.h | 39 int crypto_kdf_derive_from_key(unsigned char *subkey, size_t subkey_len,
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | validate.h | 61 pgp_pubkey_t subkey; member in struct:__anon358
|
/netbsd-current/external/bsd/jemalloc/dist/src/ |
H A D | rtree.c | 249 uintptr_t subkey = rtree_subkey(key, level); \ 253 &node[subkey], level, dependent) : \ 254 rtree_child_node_tryread(&node[subkey], \ 259 &node[subkey], level, dependent) : \ 260 rtree_child_leaf_tryread(&node[subkey], \ 288 uintptr_t subkey = rtree_subkey(key, level); \ 289 return &leaf[subkey]; \
|
/netbsd-current/tests/dev/cgd/ |
H A D | t_cgdconfig.sh | 140 subkey AAAAUPDx8vP09fb3+Pk=; 162 subkey AAACgLCxsrO0tba3uLm6u7y9vr/AwcLDxMXGx8jJ \ 186 subkey AAAAUPDx8vP09fb3+Pk=; 197 subkey AAAAQMxUtCBh7ha6mUU=; 235 subkey AAAAUPDx8vP09fb3+Pk=; 246 subkey AAAAQMxUtCBh7ha6mUU=;
|
/netbsd-current/sys/crypto/chacha/arch/arm/ |
H A D | chacha_neon.c | 334 uint8_t subkey[32]; 337 hchacha_neon(subkey, nonce/*[0:16)*/, k, chacha_const32, nr); 340 chacha_stream_neon(s, nbytes, blkno, subnonce, subkey, nr); 350 uint8_t subkey[32]; 353 hchacha_neon(subkey, nonce/*[0:16)*/, k, chacha_const32, nr); 356 chacha_stream_xor_neon(c, p, nbytes, blkno, subnonce, subkey, nr); 328 uint8_t subkey[32]; local 344 uint8_t subkey[32]; local
|
/netbsd-current/sbin/cgdconfig/ |
H A D | cgdlex.l | 111 subkey { RETTOKEN(SUBKEY); }
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
H A D | libverify.c | 252 pgpv_pubkey_t subkey; member in struct:pgpv_signed_subkey_t 1678 recog_subkey(pgpv_t *pgp, pgpv_signed_subkey_t *subkey) argument 1684 memset(subkey, 0x0, sizeof(*subkey)); 1685 read_pubkey(&subkey->subkey, pkt->s.data, pkt->s.size, 0); 1691 subkey->revoc_self_sig = signature; 1702 ARRAY_APPEND(subkey->signatures, ARRAY_COUNT(pgp->signatures)); 1706 subkey->subkey 1820 fmt_primary(obuf_t *obuf, pgpv_t *pgp, pgpv_primarykey_t *primary, unsigned subkey, const char *modifiers) argument 2457 pgpv_signed_subkey_t subkey; local 2907 pgpv_signed_subkey_t *subkey; local 3111 unsigned subkey; local [all...] |