HomeSort by: relevance | last modified time | path
    Searched defs:skey (Results 1 - 13 of 13) sorted by relevancy

  /src/usr.bin/skeyinfo/
skeyinfo.c 44 #include <skey.h> /* requires stdio.h */
49 struct skey skey; local in function:main
80 if (getskeyprompt(&skey, name, prompt) == -1) {
  /src/lib/libskey/
skey.h 1 /* $NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $ */
4 * S/KEY v1.1b (skey.h)
21 struct skey { struct
79 int skeychallenge(struct skey *, const char *, char *, size_t);
80 int skeylookup(struct skey *, const char *);
81 int skeyverify(struct skey *, char *);
91 int getskeyprompt(struct skey *, char *, char *);
97 int skeygetnext(struct skey *);
98 int skeyzero(struct skey *, char *);
skeylogin.c 38 #include "skey.h"
42 /* Issue a skey challenge for user 'name'. If successful,
43 * fill in the caller's skey structure and return 0. If unsuccessful
49 int getskeyprompt(struct skey *mp, char *name, char *prompt)
73 /* Return a skey challenge string for user 'name'. If successful,
74 * fill in the caller's skey structure and return 0. If unsuccessful
80 int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen)
126 int skeylookup(struct skey *mp, const char *name)
189 int skeygetnext(struct skey *mp)
241 int skeyverify(struct skey *mp, char *response
355 struct skey skey; local in function:skey_haskey
375 struct skey skey; local in function:skey_keyinfo
398 struct skey skey; local in function:skey_passcheck
447 struct skey skey; local in function:skey_authenticate
452 struct skey skey; local in function:skey_authenticate
    [all...]
  /src/sbin/scsictl/
scsi_sense.c 421 unsigned char skey; local in function:scsi_decode_sense
424 skey = 0;
427 skey = snsbuf[2] & 0xf;
429 (void) strlcpy(rqsbuf, sense_keys[skey], rqsbuflen);
436 (void) snprintf(rqsbuf, rqsbuflen, "%s, %s", sense_keys[skey],
443 switch (skey) {
  /src/sys/dev/scsipi/
scsipi_verbose.c 1010 unsigned char skey; local in function:scsipi_decode_sense
1013 skey = 0;
1017 skey = snsbuf[2] & 0xf;
1019 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf));
1028 sense_keys[skey], localbuf);
1034 switch (skey) {
  /src/usr.sbin/mmcformat/
uscsi_sense.c 755 unsigned char skey; local in function:uscsi_decode_sense
758 skey = 0;
762 skey = snsbuf[2] & 0xf;
764 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf));
773 sense_keys[skey], localbuf);
779 switch (skey) {
  /src/usr.bin/skeyinit/
skeyinit.c 39 #include <skey.h>
57 struct skey skey; local in function:main
171 rval = skeylookup(&skey, pp->pw_name);
178 exit(skeyzero(&skey, pp->pw_name));
181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed);
184 * lets be nice if they have a skey.seed that
187 l = strlen(skey.seed);
189 lastc = skey.seed[l - 1];
191 (void)strlcpy(defaultseed, skey.seed
    [all...]
  /src/sys/net/
toeplitz.c 139 * a 16x16 circulant Toeplitz matrix T generated by skey.
148 stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey)
157 column[b] = skey << b | skey >> (NBSK - b);
221 uint16_t skey = htons(stoeplitz_keyseed); local in function:stoeplitz_to_key
226 for (i = 0; i < klen; i += sizeof(skey)) {
227 k[i + 0] = skey >> 8;
228 k[i + 1] = skey;
  /src/lib/libtelnet/
kerberos5.c 414 Session_Key skey; local in function:kerberos5_is
416 skey.type = SK_DES;
417 skey.length = 8;
418 skey.data = key_block->keyvalue.data;
419 encrypt_session_key(&skey, 0);
523 Session_Key skey; local in function:kerberos5_reply
548 skey.type = SK_DES;
549 skey.length = 8;
550 skey.data = keyblock->keyvalue.data;
551 encrypt_session_key(&skey, 0)
    [all...]
sra.c 166 Session_Key skey; local in function:sra_is
224 skey.data = ck;
225 skey.type = SK_DES;
226 skey.length = 8;
227 encrypt_session_key(&skey, 1);
260 Session_Key skey; local in function:sra_reply
354 skey.data = ck;
355 skey.type = SK_DES;
356 skey.length = 8;
357 encrypt_session_key(&skey, 0)
    [all...]
  /src/usr.sbin/netgroup_mkdb/
netgroup_mkdb.c 591 struct string skey, sdata; local in function:ng_write
597 str_init(&skey);
601 str_prepend(&skey, e->n_name, k);
603 key.data = (u_char *) skey.s_str;
604 key.size = skey.s_len + 1;
620 str_free(&skey);
642 struct string skey, sdata; local in function:ng_rwrite
648 str_init(&skey);
651 str_prepend(&skey, (char *) key.data, k);
653 key.data = (u_char *) skey.s_str
    [all...]
  /src/sys/crypto/aes/
aes_ct.c 275 uint32_t skey[120]; local in function:br_aes_ct_keysched
296 skey[(i << 1) + 0] = tmp;
297 skey[(i << 1) + 1] = tmp;
306 tmp ^= skey[(i - nk) << 1];
307 skey[(i << 1) + 0] = tmp;
308 skey[(i << 1) + 1] = tmp;
315 br_aes_ct_ortho(skey + (i << 1));
318 comp_skey[i] = (skey[j + 0] & 0x55555555)
319 | (skey[j + 1] & 0xAAAAAAAA);
326 br_aes_ct_skey_expand(uint32_t *skey,
    [all...]
  /src/sys/crypto/aes/arch/x86/
aes_sse2.c 320 uint32_t skey[60]; local in function:aes_sse2_keysched
338 br_range_dec32le(skey, (key_len >> 2), key);
339 tmp = skey[(key_len >> 2) - 1];
347 tmp ^= skey[i - nk];
348 skey[i] = tmp;
359 w = _mm_loadu_epi8(skey + i);
377 aes_sse2_skey_expand(uint64_t *skey,
398 _mm_storeu_si64(&skey[v + 0], x0);
399 _mm_storeu_si64(&skey[v + 1], x1);
400 _mm_storeu_si64(&skey[v + 2], x2)
    [all...]

Completed in 19 milliseconds