HomeSort by: relevance | last modified time | path
    Searched defs:skey (Results 1 - 25 of 58) sorted by relevancy

1 2 3

  /src/usr.bin/skeyinfo/
skeyinfo.c 44 #include <skey.h> /* requires stdio.h */
49 struct skey skey; local
80 if (getskeyprompt(&skey, name, prompt) == -1) {
  /src/crypto/external/apache2/openssl/dist/demos/cms/
cms_sign.c 19 EVP_PKEY *skey = NULL; local
44 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
46 if (!scert || !skey)
57 cms = CMS_sign(scert, skey, NULL, in, flags);
84 EVP_PKEY_free(skey);
cms_sign2.c 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
36 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
67 if (!CMS_add1_signer(cms, scert, skey, NULL, 0))
93 EVP_PKEY_free(skey);
  /src/crypto/external/apache2/openssl/dist/demos/smime/
smsign.c 19 EVP_PKEY *skey = NULL; local
44 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
46 if (!scert || !skey)
57 p7 = PKCS7_sign(scert, skey, NULL, in, flags);
85 EVP_PKEY_free(skey);
smsign2.c 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
36 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
67 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0))
92 EVP_PKEY_free(skey);
  /src/crypto/external/bsd/openssh/dist/
auth-skey.c 1 /* $NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $ */
2 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
27 __RCSID("$NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $");
29 #ifdef SKEY
36 #include <skey.h>
62 struct skey skey; local
64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1)
98 "skey",
106 "skey",
    [all...]
  /src/crypto/external/bsd/openssl/dist/demos/cms/
cms_sign.c 19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 cms = CMS_sign(scert, skey, NULL, in, flags);
83 EVP_PKEY_free(skey);
cms_sign2.c 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0))
91 EVP_PKEY_free(skey);
  /src/crypto/external/bsd/openssl/dist/demos/smime/
smsign.c 19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 p7 = PKCS7_sign(scert, skey, NULL, in, flags);
81 EVP_PKEY_free(skey);
smsign2.c 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0))
89 EVP_PKEY_free(skey);
  /src/crypto/external/bsd/openssl.old/dist/demos/cms/
cms_sign.c 19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 cms = CMS_sign(scert, skey, NULL, in, flags);
83 EVP_PKEY_free(skey);
cms_sign2.c 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0))
91 EVP_PKEY_free(skey);
  /src/crypto/external/bsd/openssl.old/dist/demos/smime/
smsign.c 19 EVP_PKEY *skey = NULL; local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
45 if (!scert || !skey)
56 p7 = PKCS7_sign(scert, skey, NULL, in, flags);
81 EVP_PKEY_free(skey);
smsign2.c 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL);
65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0))
89 EVP_PKEY_free(skey);
  /src/lib/libskey/
skey.h 1 /* $NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $ */
4 * S/KEY v1.1b (skey.h)
21 struct skey { struct
79 int skeychallenge(struct skey *, const char *, char *, size_t);
80 int skeylookup(struct skey *, const char *);
81 int skeyverify(struct skey *, char *);
91 int getskeyprompt(struct skey *, char *, char *);
97 int skeygetnext(struct skey *);
98 int skeyzero(struct skey *, char *);
  /src/sbin/scsictl/
scsi_sense.c 421 unsigned char skey; local
424 skey = 0;
427 skey = snsbuf[2] & 0xf;
429 (void) strlcpy(rqsbuf, sense_keys[skey], rqsbuflen);
436 (void) snprintf(rqsbuf, rqsbuflen, "%s, %s", sense_keys[skey],
443 switch (skey) {
  /src/usr.sbin/mmcformat/
uscsi_sense.c 755 unsigned char skey; local
758 skey = 0;
762 skey = snsbuf[2] & 0xf;
764 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf));
773 sense_keys[skey], localbuf);
779 switch (skey) {
  /src/sys/dev/scsipi/
scsipi_verbose.c 1010 unsigned char skey; local
1013 skey = 0;
1017 skey = snsbuf[2] & 0xf;
1019 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf));
1028 sense_keys[skey], localbuf);
1034 switch (skey) {
  /src/crypto/external/apache2/openssl/dist/apps/
skeyutl.c 49 EVP_SKEY *skey = NULL; local
106 skey = EVP_SKEY_generate(app_get0_libctx(),
110 if (skey == NULL) {
115 const char *key_name = EVP_SKEY_get0_key_id(skey);
119 BIO_printf(bio_out, "Provider: %s\n", EVP_SKEY_get0_provider_name(skey));
120 BIO_printf(bio_out, "Key management: %s\n", EVP_SKEY_get0_skeymgmt_name(skey));
132 EVP_SKEY_free(skey);
  /src/sys/net/
toeplitz.c 139 * a 16x16 circulant Toeplitz matrix T generated by skey.
148 stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey)
157 column[b] = skey << b | skey >> (NBSK - b);
221 uint16_t skey = htons(stoeplitz_keyseed); local
226 for (i = 0; i < klen; i += sizeof(skey)) {
227 k[i + 0] = skey >> 8;
228 k[i + 1] = skey;
  /src/usr.bin/skeyinit/
skeyinit.c 39 #include <skey.h>
57 struct skey skey; local
171 rval = skeylookup(&skey, pp->pw_name);
178 exit(skeyzero(&skey, pp->pw_name));
181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed);
184 * lets be nice if they have a skey.seed that
187 l = strlen(skey.seed);
189 lastc = skey.seed[l - 1];
191 (void)strlcpy(defaultseed, skey.seed
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
s_lib.c 21 int EVP_SKEY_export(const EVP_SKEY *skey, int selection,
24 if (skey == NULL) {
29 return evp_skeymgmt_export(skey->skeymgmt, skey->keydata, selection, export_cb, export_cbarg);
34 EVP_SKEY *skey; local
39 if ((skey = OPENSSL_zalloc(sizeof(*skey))) == NULL)
42 if (!CRYPTO_NEW_REF(&skey->references, 1))
45 skey->lock = CRYPTO_THREAD_lock_new();
46 if (skey->lock == NULL)
65 EVP_SKEY *skey; local
90 EVP_SKEY *skey = evp_skey_alloc_fetch(libctx, skeymgmtname, propquery); local
109 EVP_SKEY *skey = evp_skey_alloc_fetch(libctx, skeymgmtname, propquery); local
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/ocsp/
ocsp_vfy.c 79 EVP_PKEY *skey; local
83 if ((skey = X509_get0_pubkey(signer)) == NULL) {
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq);
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq);
  /src/crypto/external/apache2/openssl/dist/test/
evp_skey_test.c 128 EVP_SKEY *skey = NULL; local
148 skey = EVP_SKEY_import_raw_key(libctx, "AES-128", aes_key, KEY_SIZE, NULL);
149 if (!TEST_ptr(skey))
152 if (!TEST_int_gt(EVP_SKEY_get0_raw_key(skey, &export_key, &export_length), 0)
159 || !TEST_int_gt(EVP_CipherInit_SKEY(ctx, aes_cbc, skey, aes_iv, IV_SIZE, 1, NULL), 0)
179 EVP_SKEY_free(skey);
187 /* DES is used to test a "skey-unware" cipher provider */
206 EVP_SKEY *skey = NULL; local
224 skey = EVP_SKEY_import_raw_key(libctx, "DES", des_key, sizeof(des_key),
226 if (!TEST_ptr(skey))
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
test_engine_dso.c 84 void *skey, *ckey; local
87 skey = emalloc(DH_size(server));
90 ssize = DH_compute_key(skey, client->pub_key, server);
100 if (memcmp(skey, ckey, csize) != 0)
103 free(skey);

Completed in 40 milliseconds

1 2 3