| /src/usr.bin/skeyinfo/ |
| skeyinfo.c | 44 #include <skey.h> /* requires stdio.h */ 49 struct skey skey; local 80 if (getskeyprompt(&skey, name, prompt) == -1) {
|
| /src/crypto/external/apache2/openssl/dist/demos/cms/ |
| cms_sign.c | 19 EVP_PKEY *skey = NULL; local 44 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 46 if (!scert || !skey) 57 cms = CMS_sign(scert, skey, NULL, in, flags); 84 EVP_PKEY_free(skey);
|
| cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 36 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 67 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) 93 EVP_PKEY_free(skey);
|
| /src/crypto/external/apache2/openssl/dist/demos/smime/ |
| smsign.c | 19 EVP_PKEY *skey = NULL; local 44 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 46 if (!scert || !skey) 57 p7 = PKCS7_sign(scert, skey, NULL, in, flags); 85 EVP_PKEY_free(skey);
|
| smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 36 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 67 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) 92 EVP_PKEY_free(skey);
|
| /src/crypto/external/bsd/openssh/dist/ |
| auth-skey.c | 1 /* $NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $ */ 2 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 27 __RCSID("$NetBSD: auth-skey.c,v 1.5 2017/04/18 18:41:46 christos Exp $"); 29 #ifdef SKEY 36 #include <skey.h> 62 struct skey skey; local 64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1) 98 "skey", 106 "skey", [all...] |
| /src/crypto/external/bsd/openssl/dist/demos/cms/ |
| cms_sign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 cms = CMS_sign(scert, skey, NULL, in, flags); 83 EVP_PKEY_free(skey);
|
| cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) 91 EVP_PKEY_free(skey);
|
| /src/crypto/external/bsd/openssl/dist/demos/smime/ |
| smsign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); 81 EVP_PKEY_free(skey);
|
| smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) 89 EVP_PKEY_free(skey);
|
| /src/crypto/external/bsd/openssl.old/dist/demos/cms/ |
| cms_sign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 cms = CMS_sign(scert, skey, NULL, in, flags); 83 EVP_PKEY_free(skey);
|
| cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) 91 EVP_PKEY_free(skey);
|
| /src/crypto/external/bsd/openssl.old/dist/demos/smime/ |
| smsign.c | 19 EVP_PKEY *skey = NULL; local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 45 if (!scert || !skey) 56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); 81 EVP_PKEY_free(skey);
|
| smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); 65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) 89 EVP_PKEY_free(skey);
|
| /src/lib/libskey/ |
| skey.h | 1 /* $NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $ */ 4 * S/KEY v1.1b (skey.h) 21 struct skey { struct 79 int skeychallenge(struct skey *, const char *, char *, size_t); 80 int skeylookup(struct skey *, const char *); 81 int skeyverify(struct skey *, char *); 91 int getskeyprompt(struct skey *, char *, char *); 97 int skeygetnext(struct skey *); 98 int skeyzero(struct skey *, char *);
|
| /src/sbin/scsictl/ |
| scsi_sense.c | 421 unsigned char skey; local 424 skey = 0; 427 skey = snsbuf[2] & 0xf; 429 (void) strlcpy(rqsbuf, sense_keys[skey], rqsbuflen); 436 (void) snprintf(rqsbuf, rqsbuflen, "%s, %s", sense_keys[skey], 443 switch (skey) {
|
| /src/usr.sbin/mmcformat/ |
| uscsi_sense.c | 755 unsigned char skey; local 758 skey = 0; 762 skey = snsbuf[2] & 0xf; 764 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf)); 773 sense_keys[skey], localbuf); 779 switch (skey) {
|
| /src/sys/dev/scsipi/ |
| scsipi_verbose.c | 1010 unsigned char skey; local 1013 skey = 0; 1017 skey = snsbuf[2] & 0xf; 1019 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf)); 1028 sense_keys[skey], localbuf); 1034 switch (skey) {
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| skeyutl.c | 49 EVP_SKEY *skey = NULL; local 106 skey = EVP_SKEY_generate(app_get0_libctx(), 110 if (skey == NULL) { 115 const char *key_name = EVP_SKEY_get0_key_id(skey); 119 BIO_printf(bio_out, "Provider: %s\n", EVP_SKEY_get0_provider_name(skey)); 120 BIO_printf(bio_out, "Key management: %s\n", EVP_SKEY_get0_skeymgmt_name(skey)); 132 EVP_SKEY_free(skey);
|
| /src/sys/net/ |
| toeplitz.c | 139 * a 16x16 circulant Toeplitz matrix T generated by skey. 148 stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey) 157 column[b] = skey << b | skey >> (NBSK - b); 221 uint16_t skey = htons(stoeplitz_keyseed); local 226 for (i = 0; i < klen; i += sizeof(skey)) { 227 k[i + 0] = skey >> 8; 228 k[i + 1] = skey;
|
| /src/usr.bin/skeyinit/ |
| skeyinit.c | 39 #include <skey.h> 57 struct skey skey; local 171 rval = skeylookup(&skey, pp->pw_name); 178 exit(skeyzero(&skey, pp->pw_name)); 181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed); 184 * lets be nice if they have a skey.seed that 187 l = strlen(skey.seed); 189 lastc = skey.seed[l - 1]; 191 (void)strlcpy(defaultseed, skey.seed [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| s_lib.c | 21 int EVP_SKEY_export(const EVP_SKEY *skey, int selection, 24 if (skey == NULL) { 29 return evp_skeymgmt_export(skey->skeymgmt, skey->keydata, selection, export_cb, export_cbarg); 34 EVP_SKEY *skey; local 39 if ((skey = OPENSSL_zalloc(sizeof(*skey))) == NULL) 42 if (!CRYPTO_NEW_REF(&skey->references, 1)) 45 skey->lock = CRYPTO_THREAD_lock_new(); 46 if (skey->lock == NULL) 65 EVP_SKEY *skey; local 90 EVP_SKEY *skey = evp_skey_alloc_fetch(libctx, skeymgmtname, propquery); local 109 EVP_SKEY *skey = evp_skey_alloc_fetch(libctx, skeymgmtname, propquery); local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ocsp/ |
| ocsp_vfy.c | 79 EVP_PKEY *skey; local 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_skey_test.c | 128 EVP_SKEY *skey = NULL; local 148 skey = EVP_SKEY_import_raw_key(libctx, "AES-128", aes_key, KEY_SIZE, NULL); 149 if (!TEST_ptr(skey)) 152 if (!TEST_int_gt(EVP_SKEY_get0_raw_key(skey, &export_key, &export_length), 0) 159 || !TEST_int_gt(EVP_CipherInit_SKEY(ctx, aes_cbc, skey, aes_iv, IV_SIZE, 1, NULL), 0) 179 EVP_SKEY_free(skey); 187 /* DES is used to test a "skey-unware" cipher provider */ 206 EVP_SKEY *skey = NULL; local 224 skey = EVP_SKEY_import_raw_key(libctx, "DES", des_key, sizeof(des_key), 226 if (!TEST_ptr(skey)) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| test_engine_dso.c | 84 void *skey, *ckey; local 87 skey = emalloc(DH_size(server)); 90 ssize = DH_compute_key(skey, client->pub_key, server); 100 if (memcmp(skey, ckey, csize) != 0) 103 free(skey);
|