/src/usr.bin/skeyinfo/ |
skeyinfo.c | 44 #include <skey.h> /* requires stdio.h */ 49 struct skey skey; local in function:main 80 if (getskeyprompt(&skey, name, prompt) == -1) {
|
/src/lib/libskey/ |
skey.h | 1 /* $NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $ */ 4 * S/KEY v1.1b (skey.h) 21 struct skey { struct 79 int skeychallenge(struct skey *, const char *, char *, size_t); 80 int skeylookup(struct skey *, const char *); 81 int skeyverify(struct skey *, char *); 91 int getskeyprompt(struct skey *, char *, char *); 97 int skeygetnext(struct skey *); 98 int skeyzero(struct skey *, char *);
|
skeylogin.c | 38 #include "skey.h" 42 /* Issue a skey challenge for user 'name'. If successful, 43 * fill in the caller's skey structure and return 0. If unsuccessful 49 int getskeyprompt(struct skey *mp, char *name, char *prompt) 73 /* Return a skey challenge string for user 'name'. If successful, 74 * fill in the caller's skey structure and return 0. If unsuccessful 80 int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen) 126 int skeylookup(struct skey *mp, const char *name) 189 int skeygetnext(struct skey *mp) 241 int skeyverify(struct skey *mp, char *response 355 struct skey skey; local in function:skey_haskey 375 struct skey skey; local in function:skey_keyinfo 398 struct skey skey; local in function:skey_passcheck 447 struct skey skey; local in function:skey_authenticate 452 struct skey skey; local in function:skey_authenticate [all...] |
/src/sbin/scsictl/ |
scsi_sense.c | 421 unsigned char skey; local in function:scsi_decode_sense 424 skey = 0; 427 skey = snsbuf[2] & 0xf; 429 (void) strlcpy(rqsbuf, sense_keys[skey], rqsbuflen); 436 (void) snprintf(rqsbuf, rqsbuflen, "%s, %s", sense_keys[skey], 443 switch (skey) {
|
/src/sys/dev/scsipi/ |
scsipi_verbose.c | 1010 unsigned char skey; local in function:scsipi_decode_sense 1013 skey = 0; 1017 skey = snsbuf[2] & 0xf; 1019 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf)); 1028 sense_keys[skey], localbuf); 1034 switch (skey) {
|
/src/usr.sbin/mmcformat/ |
uscsi_sense.c | 755 unsigned char skey; local in function:uscsi_decode_sense 758 skey = 0; 762 skey = snsbuf[2] & 0xf; 764 (void) strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf)); 773 sense_keys[skey], localbuf); 779 switch (skey) {
|
/src/usr.bin/skeyinit/ |
skeyinit.c | 39 #include <skey.h> 57 struct skey skey; local in function:main 171 rval = skeylookup(&skey, pp->pw_name); 178 exit(skeyzero(&skey, pp->pw_name)); 181 printf("Old key: [%s] %s\n", skey_get_algorithm(), skey.seed); 184 * lets be nice if they have a skey.seed that 187 l = strlen(skey.seed); 189 lastc = skey.seed[l - 1]; 191 (void)strlcpy(defaultseed, skey.seed [all...] |
/src/sys/net/ |
toeplitz.c | 139 * a 16x16 circulant Toeplitz matrix T generated by skey. 148 stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey) 157 column[b] = skey << b | skey >> (NBSK - b); 221 uint16_t skey = htons(stoeplitz_keyseed); local in function:stoeplitz_to_key 226 for (i = 0; i < klen; i += sizeof(skey)) { 227 k[i + 0] = skey >> 8; 228 k[i + 1] = skey;
|
/src/lib/libtelnet/ |
kerberos5.c | 414 Session_Key skey; local in function:kerberos5_is 416 skey.type = SK_DES; 417 skey.length = 8; 418 skey.data = key_block->keyvalue.data; 419 encrypt_session_key(&skey, 0); 523 Session_Key skey; local in function:kerberos5_reply 548 skey.type = SK_DES; 549 skey.length = 8; 550 skey.data = keyblock->keyvalue.data; 551 encrypt_session_key(&skey, 0) [all...] |
sra.c | 166 Session_Key skey; local in function:sra_is 224 skey.data = ck; 225 skey.type = SK_DES; 226 skey.length = 8; 227 encrypt_session_key(&skey, 1); 260 Session_Key skey; local in function:sra_reply 354 skey.data = ck; 355 skey.type = SK_DES; 356 skey.length = 8; 357 encrypt_session_key(&skey, 0) [all...] |
/src/usr.sbin/netgroup_mkdb/ |
netgroup_mkdb.c | 591 struct string skey, sdata; local in function:ng_write 597 str_init(&skey); 601 str_prepend(&skey, e->n_name, k); 603 key.data = (u_char *) skey.s_str; 604 key.size = skey.s_len + 1; 620 str_free(&skey); 642 struct string skey, sdata; local in function:ng_rwrite 648 str_init(&skey); 651 str_prepend(&skey, (char *) key.data, k); 653 key.data = (u_char *) skey.s_str [all...] |
/src/sys/crypto/aes/ |
aes_ct.c | 275 uint32_t skey[120]; local in function:br_aes_ct_keysched 296 skey[(i << 1) + 0] = tmp; 297 skey[(i << 1) + 1] = tmp; 306 tmp ^= skey[(i - nk) << 1]; 307 skey[(i << 1) + 0] = tmp; 308 skey[(i << 1) + 1] = tmp; 315 br_aes_ct_ortho(skey + (i << 1)); 318 comp_skey[i] = (skey[j + 0] & 0x55555555) 319 | (skey[j + 1] & 0xAAAAAAAA); 326 br_aes_ct_skey_expand(uint32_t *skey, [all...] |
/src/sys/crypto/aes/arch/x86/ |
aes_sse2.c | 320 uint32_t skey[60]; local in function:aes_sse2_keysched 338 br_range_dec32le(skey, (key_len >> 2), key); 339 tmp = skey[(key_len >> 2) - 1]; 347 tmp ^= skey[i - nk]; 348 skey[i] = tmp; 359 w = _mm_loadu_epi8(skey + i); 377 aes_sse2_skey_expand(uint64_t *skey, 398 _mm_storeu_si64(&skey[v + 0], x0); 399 _mm_storeu_si64(&skey[v + 1], x1); 400 _mm_storeu_si64(&skey[v + 2], x2) [all...] |