Symbol: enckey
lib/libcrypto/cms/cms_kari.c
293
unsigned char *enckey = NULL, *cek = NULL;
lib/libcrypto/cms/cms_kari.c
299
enckey = rek->encryptedKey->data;
lib/libcrypto/cms/cms_kari.c
304
if (!cms_kek_cipher(&cek, &ceklen, enckey, enckeylen, ri->d.kari, 0))
lib/libcrypto/cms/cms_kari.c
478
unsigned char *enckey;
lib/libcrypto/cms/cms_kari.c
483
if (!cms_kek_cipher(&enckey, &enckeylen, ec->key, ec->keylen,
lib/libcrypto/cms/cms_kari.c
486
ASN1_STRING_set0(rek->encryptedKey, enckey, enckeylen);
sbin/ipsecctl/ipsecctl.c
244
if (rp->enckey) {
sbin/ipsecctl/ipsecctl.c
245
free(rp->enckey->data);
sbin/ipsecctl/ipsecctl.c
246
free(rp->enckey);
sbin/ipsecctl/ipsecctl.c
535
if (r->enckey && (opts & IPSECCTL_OPT_SHOWKEY)) {
sbin/ipsecctl/ipsecctl.c
541
ipsecctl_print_key(r->enckey);
sbin/ipsecctl/ipsecctl.h
199
struct ipsec_key *enckey;
sbin/ipsecctl/parse.y
2276
r->enckey = copykey(rule->enckey);
sbin/ipsecctl/parse.y
2338
struct ipsec_key *authkey, struct ipsec_key *enckey, u_int8_t tmode)
sbin/ipsecctl/parse.y
2424
if (!enckey && xfs->encxf != &encxfs[ENCXF_NULL]) {
sbin/ipsecctl/parse.y
2428
if (enckey) {
sbin/ipsecctl/parse.y
2429
if (enckey->len < xfs->encxf->keymin) {
sbin/ipsecctl/parse.y
2431
"minimum %zu bits", enckey->len * 8,
sbin/ipsecctl/parse.y
2435
if (xfs->encxf->keymax < enckey->len) {
sbin/ipsecctl/parse.y
2437
"maximum %zu bits", enckey->len * 8,
sbin/ipsecctl/parse.y
2485
struct ipsec_transforms *xfs, struct ipsec_key *authkey, struct ipsec_key *enckey)
sbin/ipsecctl/parse.y
2489
if (validate_sa(spi, satype, xfs, authkey, enckey, tmode) == 0)
sbin/ipsecctl/parse.y
2506
r->enckey = enckey;
sbin/ipsecctl/parse.y
2513
struct ipsec_key *enckey)
sbin/ipsecctl/parse.y
2517
if (validate_sa(spi, rule->satype, rule->xfs, authkey, enckey,
sbin/ipsecctl/parse.y
2535
reverse->enckey = enckey;
sbin/ipsecctl/parse.y
2740
struct ipsec_key *enckey, char *bundle)
sbin/ipsecctl/parse.y
2783
} else if (spi != 0 || authkey || enckey) {
sbin/ipsecctl/parse.y
2785
revr = reverse_sa(r, spi, authkey, enckey);
sbin/ipsecctl/pfkdump.c
722
struct ipsec_key enckey, authkey;
sbin/ipsecctl/pfkdump.c
779
bzero(&enckey, sizeof enckey);
sbin/ipsecctl/pfkdump.c
780
parse_key(extensions[SADB_EXT_KEY_ENCRYPT], &enckey);
sbin/ipsecctl/pfkdump.c
781
r.enckey = &enckey;
sbin/ipsecctl/pfkdump.c
788
switch (r.enckey->len) {
sbin/ipsecctl/pfkdump.c
801
switch (r.enckey->len) {
sbin/ipsecctl/pfkdump.c
814
switch (r.enckey->len) {
sbin/ipsecctl/pfkdump.c
827
switch (r.enckey->len) {
sbin/ipsecctl/pfkdump.c
881
bzero(&enckey, sizeof enckey);
sbin/ipsecctl/pfkey.c
1186
r->xfs, r->authkey, r->enckey, r->tmode);
sbin/ipsecctl/pfkey.c
394
struct ipsec_key *enckey, u_int8_t tmode)
sbin/ipsecctl/pfkey.c
550
if (action == SADB_ADD && !authkey && !enckey && satype !=
sbin/ipsecctl/pfkey.c
562
if (enckey) {
sbin/ipsecctl/pfkey.c
565
((enckey->len + 7) / 8) * 8) / 8;
sbin/ipsecctl/pfkey.c
567
sa_enckey.sadb_key_bits = 8 * enckey->len;
sbin/ipsecctl/pfkey.c
617
if (enckey) {
sbin/ipsecctl/pfkey.c
622
iov[iov_cnt].iov_base = enckey->data;
sbin/ipsecctl/pfkey.c
623
iov[iov_cnt].iov_len = ((enckey->len + 7) / 8) * 8;
usr.bin/signify/signify.c
308
struct enckey enckey;
usr.bin/signify/signify.c
309
uint8_t xorkey[sizeof(enckey.seckey)];
usr.bin/signify/signify.c
315
crypto_sign_ed25519_keypair(pubkey.pubkey, enckey.seckey);
usr.bin/signify/signify.c
319
SHA512Update(&ctx, enckey.seckey, sizeof(enckey.seckey));
usr.bin/signify/signify.c
322
memcpy(enckey.pkalg, PKALG, 2);
usr.bin/signify/signify.c
323
memcpy(enckey.kdfalg, KDFALG, 2);
usr.bin/signify/signify.c
324
enckey.kdfrounds = htonl(rounds);
usr.bin/signify/signify.c
325
memcpy(enckey.keynum, keynum, KEYNUMLEN);
usr.bin/signify/signify.c
326
arc4random_buf(enckey.salt, sizeof(enckey.salt));
usr.bin/signify/signify.c
327
kdf(enckey.salt, sizeof(enckey.salt), rounds, 1, 1, xorkey, sizeof(xorkey));
usr.bin/signify/signify.c
328
memcpy(enckey.checksum, digest, sizeof(enckey.checksum));
usr.bin/signify/signify.c
329
for (i = 0; i < sizeof(enckey.seckey); i++)
usr.bin/signify/signify.c
330
enckey.seckey[i] ^= xorkey[i];
usr.bin/signify/signify.c
337
writekeyfile(seckeyfile, commentbuf, &enckey,
usr.bin/signify/signify.c
338
sizeof(enckey), O_EXCL, 0600);
usr.bin/signify/signify.c
339
explicit_bzero(&enckey, sizeof(enckey));
usr.bin/signify/signify.c
388
struct enckey enckey;
usr.bin/signify/signify.c
389
uint8_t xorkey[sizeof(enckey.seckey)];
usr.bin/signify/signify.c
397
readb64file(seckeyfile, &enckey, sizeof(enckey), comment);
usr.bin/signify/signify.c
411
if (memcmp(enckey.kdfalg, KDFALG, 2) != 0)
usr.bin/signify/signify.c
413
rounds = ntohl(enckey.kdfrounds);
usr.bin/signify/signify.c
414
kdf(enckey.salt, sizeof(enckey.salt), rounds, strcmp(msgfile, "-") != 0,
usr.bin/signify/signify.c
416
for (i = 0; i < sizeof(enckey.seckey); i++)
usr.bin/signify/signify.c
417
enckey.seckey[i] ^= xorkey[i];
usr.bin/signify/signify.c
420
SHA512Update(&ctx, enckey.seckey, sizeof(enckey.seckey));
usr.bin/signify/signify.c
422
if (memcmp(enckey.checksum, digest, sizeof(enckey.checksum)) != 0)
usr.bin/signify/signify.c
426
signmsg(enckey.seckey, msg, msglen, sig.sig);
usr.bin/signify/signify.c
427
memcpy(sig.keynum, enckey.keynum, KEYNUMLEN);
usr.bin/signify/signify.c
428
explicit_bzero(&enckey, sizeof(enckey));