Home | History | Annotate | Download | only in libntp

Lines Matching refs:sk

307 	symkey *	sk;
311 while (NULL != (sk = HEAD_DLIST(key_listhead, llink))) {
312 freesymkey(sk);
337 symkey * sk;
350 sk = eallocarrayxz(i, sizeof(*sk), MOREMEM_EXTRA_ALLOC);
352 base = sk;
356 for (; i > 0; i--, sk++) {
357 LINK_SLIST(authfreekeys, sk, llink.f);
361 allocrec = (void *)sk;
450 symkey * sk;
464 ITER_DLIST_BEGIN(key_listhead, sk, llink, symkey)
465 hash = KEYHASH(sk->keyid);
466 LINK_SLIST(key_hash[hash], sk, hlink);
489 symkey * sk;
497 UNLINK_HEAD_SLIST(sk, authfreekeys, llink.f);
498 DEBUG_ENSURE(sk != NULL);
499 sk->keyid = id;
500 sk->flags = flags;
501 sk->type = type;
502 sk->secretsize = secretsize;
503 sk->secret = secret;
504 sk->keyacclist = ka;
505 sk->lifetime = lifetime;
506 LINK_SLIST(*bucket, sk, hlink);
507 LINK_TAIL_DLIST(key_listhead, sk, llink);
518 symkey * sk
524 if (NULL == sk)
527 authcache_flush_id(sk->keyid);
528 keyacc_all_free(sk->keyacclist);
530 bucket = &key_hash[KEYHASH(sk->keyid)];
531 if (sk->secret != NULL) {
532 zero_mem(sk->secret, sk->secretsize);
533 free(sk->secret);
535 UNLINK_SLIST(unlinked, *bucket, sk, hlink, symkey);
536 DEBUG_ENSURE(sk == unlinked);
537 UNLINK_DLIST(sk, llink);
538 zero_mem((char *)sk + offsetof(symkey, symkey_payload),
539 sizeof(*sk) - offsetof(symkey, symkey_payload));
540 LINK_SLIST(authfreekeys, sk, llink.f);
554 symkey * sk;
556 for (sk = key_hash[KEYHASH(id)]; sk != NULL; sk = sk->hlink)
557 if (id == sk->keyid)
558 return sk;
588 symkey * sk;
600 sk = auth_findkey(id);
601 if ((sk == NULL) || (sk->type == 0)) {
609 if ( ! (KEY_TRUSTED & sk->flags)) {
617 * this code. Using a sk pointer would be even faster but more
620 cache_keyid = sk->keyid;
621 cache_type = sk->type;
622 cache_flags = sk->flags;
623 cache_secret = sk->secret;
624 cache_secretsize = sk->secretsize;
625 cache_keyacclist = sk->keyacclist;
640 symkey * sk;
648 sk = auth_findkey(id);
649 if (!trust && sk == NULL)
657 if (sk != NULL) {
666 sk->flags |= KEY_TRUSTED;
668 sk->lifetime = current_time + trust;
670 sk->lifetime = 0;
672 freesymkey(sk);
698 symkey * sk;
704 sk = auth_findkey(id);
705 if (sk == NULL || !(KEY_TRUSTED & sk->flags)) {
722 symkey * sk;
729 if (NULL != (sk = auth_findkey(keyno))) {
731 return (KEY_TRUSTED & sk->flags) &&
732 keyacc_contains(sk->keyacclist, sau, TRUE);
759 symkey * sk;
768 sk = auth_findkey(keyno);
769 if (sk != NULL && keyno == sk->keyid) {
771 if (NULL != sk->secret) {
772 memset(sk->secret, 0, sk->secretsize);
773 free(sk->secret);
775 sk->secret = emalloc(secretsize + 1);
776 sk->type = (u_short)keytype;
777 sk->secretsize = secretsize;
779 if (ka != sk->keyacclist) {
780 keyacc_all_free(sk->keyacclist);
781 sk->keyacclist = ka;
784 memcpy(sk->secret, key, secretsize);
787 strncpy((char *)sk->secret, (const char *)key,
829 symkey * sk;
831 ITER_DLIST_BEGIN(key_listhead, sk, llink, symkey)
832 if (sk->keyid > NTP_MAXKEY) { /* autokey */
840 if (KEY_TRUSTED & sk->flags) {
841 if (sk->secret != NULL) {
842 zero_mem(sk->secret, sk->secretsize);
843 free(sk->secret);
844 sk->secret = NULL; /* TALOS-CAN-0054 */
846 sk->keyacclist = keyacc_all_free(sk->keyacclist);
847 sk->secretsize = 0;
848 sk->lifetime = 0;
850 freesymkey(sk);
862 symkey * sk;
864 ITER_DLIST_BEGIN(key_listhead, sk, llink, symkey)
865 if (sk->lifetime > 0 && current_time > sk->lifetime) {
866 freesymkey(sk);