HomeSort by: relevance | last modified time | path
    Searched refs:sesskey (Results 1 - 3 of 3) sorted by relevancy

  /src/crypto/external/bsd/netpgp/dist/src/lib/
create.c 294 uint8_t sesskey[CAST_KEY_LENGTH]; local
410 (void) memcpy(&sesskey[i * hashsize],
438 crypted.set_crypt_key(&crypted, sesskey);
443 hexdump(stderr, "key= ", sesskey, CAST_KEY_LENGTH);
824 \param sesskey Session Key to use
829 pgp_calc_sesskey_checksum(pgp_pk_sesskey_t *sesskey, uint8_t cs[2])
834 if (!pgp_is_sa_supported(sesskey->symm_alg)) {
838 for (i = 0; i < pgp_key_size(sesskey->symm_alg); i++) {
839 checksum += sesskey->key[i];
853 create_unencoded_m_buf(pgp_pk_sesskey_t *sesskey, pgp_crypt_t *cipherinfo, uint8_t *m_buf
950 pgp_pk_sesskey_t *sesskey; local
    [all...]
ssh2pgp.c 351 uint8_t sesskey[CAST_KEY_LENGTH]; local
412 (void) memcpy(&sesskey[i * PGP_SHA1_HASH_SIZE],
423 crypted.set_crypt_key(&crypted, sesskey);
packet-parse.c 2770 pgp_packet_t sesskey; local
2797 hexdump(stderr, "sesskey: pubkey id", pkt.u.pk_sesskey.key_id, sizeof(pkt.u.pk_sesskey.key_id));
2834 (void) memset(&sesskey, 0x0, sizeof(sesskey));
2836 sesskey.u.get_seckey.seckey = &secret;
2837 sesskey.u.get_seckey.pk_sesskey = &pkt.u.pk_sesskey;
2843 CALLBACK(PGP_GET_SECKEY, &stream->cbinfo, &sesskey);
2894 hexdump(stderr, "recovered sesskey", pkt.u.pk_sesskey.key, k);

Completed in 28 milliseconds