Symbol: skey
lib/libcrypto/ocsp/ocsp_vfy.c
100
skey = X509_get0_pubkey(signer);
lib/libcrypto/ocsp/ocsp_vfy.c
101
if (skey) {
lib/libcrypto/ocsp/ocsp_vfy.c
102
ret = OCSP_BASICRESP_verify(bs, skey, 0);
lib/libcrypto/ocsp/ocsp_vfy.c
104
if (!skey || ret <= 0) {
lib/libcrypto/ocsp/ocsp_vfy.c
415
EVP_PKEY *skey;
lib/libcrypto/ocsp/ocsp_vfy.c
417
if ((skey = X509_get0_pubkey(signer)) == NULL)
lib/libcrypto/ocsp/ocsp_vfy.c
419
ret = OCSP_REQUEST_verify(req, skey);
lib/libcrypto/ocsp/ocsp_vfy.c
98
EVP_PKEY *skey;
lib/libskey/skey.h
70
int skeychallenge(struct skey *, char *, char *);
lib/libskey/skey.h
71
int skeychallenge2(int, struct skey *, char *, char *);
lib/libskey/skey.h
72
int skeylookup(struct skey *, char *);
lib/libskey/skey.h
73
int skeyverify(struct skey *, char *);
lib/libskey/skey.h
88
int skeygetnext(struct skey *);
lib/libskey/skey.h
89
int skey_unlock(struct skey *);
lib/libskey/skeylogin.c
193
skeylookup(struct skey *mp, char *name)
lib/libskey/skeylogin.c
208
skeygetnext(struct skey *mp)
lib/libskey/skeylogin.c
249
skeyverify(struct skey *mp, char *response)
lib/libskey/skeylogin.c
329
struct skey skey;
lib/libskey/skeylogin.c
332
i = skeylookup(&skey, username);
lib/libskey/skeylogin.c
333
if (skey.keyfile != NULL) {
lib/libskey/skeylogin.c
334
fclose(skey.keyfile);
lib/libskey/skeylogin.c
335
skey.keyfile = NULL;
lib/libskey/skeylogin.c
351
struct skey skey;
lib/libskey/skeylogin.c
354
i = skeychallenge(&skey, username, str);
lib/libskey/skeylogin.c
358
if (skey.keyfile != NULL) {
lib/libskey/skeylogin.c
359
fclose(skey.keyfile);
lib/libskey/skeylogin.c
360
skey.keyfile = NULL;
lib/libskey/skeylogin.c
377
struct skey skey;
lib/libskey/skeylogin.c
380
i = skeylookup(&skey, username);
lib/libskey/skeylogin.c
384
if (skeyverify(&skey, passwd) == 0)
lib/libskey/skeylogin.c
385
return (skey.n);
lib/libskey/skeylogin.c
41
static int skeygetent(int, struct skey *, const char *);
lib/libskey/skeylogin.c
51
skeychallenge2(int fd, struct skey *mp, char *name, char *ss)
lib/libskey/skeylogin.c
518
struct skey skey;
lib/libskey/skeylogin.c
522
i = skeychallenge(&skey, username, skeyprompt);
lib/libskey/skeylogin.c
532
if (i == 0 && skeyverify(&skey, pbuf) == 0) {
lib/libskey/skeylogin.c
533
if (skey.n < 5) {
lib/libskey/skeylogin.c
536
skey.n);
lib/libskey/skeylogin.c
551
skey_unlock(struct skey *mp)
lib/libskey/skeylogin.c
80
skeychallenge(struct skey *mp, char *name, char *ss)
lib/libskey/skeylogin.c
94
skeygetent(int fd, struct skey *mp, const char *name)
lib/libtls/tls_signer.c
139
if ((skey = calloc(1, sizeof(*skey))) == NULL) {
lib/libtls/tls_signer.c
144
skey->hash = hash;
lib/libtls/tls_signer.c
145
if ((skey->rsa = EVP_PKEY_get1_RSA(pkey)) == NULL &&
lib/libtls/tls_signer.c
146
(skey->ecdsa = EVP_PKEY_get1_EC_KEY(pkey)) == NULL) {
lib/libtls/tls_signer.c
152
skey->next = signer->keys;
lib/libtls/tls_signer.c
153
signer->keys = skey;
lib/libtls/tls_signer.c
164
free(skey);
lib/libtls/tls_signer.c
195
tls_sign_rsa(struct tls_signer *signer, struct tls_signer_key *skey,
lib/libtls/tls_signer.c
220
if ((rsa_size = RSA_size(skey->rsa)) <= 0) {
lib/libtls/tls_signer.c
232
signature, skey->rsa, rsa_padding)) <= 0) {
lib/libtls/tls_signer.c
247
tls_sign_ecdsa(struct tls_signer *signer, struct tls_signer_key *skey,
lib/libtls/tls_signer.c
268
if ((signature_len = ECDSA_size(skey->ecdsa)) <= 0) {
lib/libtls/tls_signer.c
280
skey->ecdsa)) {
lib/libtls/tls_signer.c
299
struct tls_signer_key *skey;
lib/libtls/tls_signer.c
304
for (skey = signer->keys; skey; skey = skey->next)
lib/libtls/tls_signer.c
305
if (!strcmp(pubkey_hash, skey->hash))
lib/libtls/tls_signer.c
308
if (skey == NULL) {
lib/libtls/tls_signer.c
313
if (skey->rsa != NULL)
lib/libtls/tls_signer.c
314
return tls_sign_rsa(signer, skey, input, input_len,
lib/libtls/tls_signer.c
317
if (skey->ecdsa != NULL)
lib/libtls/tls_signer.c
318
return tls_sign_ecdsa(signer, skey, input, input_len,
lib/libtls/tls_signer.c
64
struct tls_signer_key *skey;
lib/libtls/tls_signer.c
72
skey = signer->keys;
lib/libtls/tls_signer.c
73
signer->keys = skey->next;
lib/libtls/tls_signer.c
74
RSA_free(skey->rsa);
lib/libtls/tls_signer.c
75
EC_KEY_free(skey->ecdsa);
lib/libtls/tls_signer.c
76
free(skey->hash);
lib/libtls/tls_signer.c
77
free(skey);
lib/libtls/tls_signer.c
93
struct tls_signer_key *skey = NULL;
libexec/login_skey/login_skey.c
133
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
libexec/login_skey/login_skey.c
153
haskey = (skeylookup(&skey, user) == 0);
libexec/login_skey/login_skey.c
158
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
libexec/login_skey/login_skey.c
213
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
libexec/login_skey/login_skey.c
224
if (haskey && skeyverify(&skey, response) == 0) {
libexec/login_skey/login_skey.c
226
if (skey.n <= 1)
libexec/login_skey/login_skey.c
229
else if (skey.n < 5)
libexec/login_skey/login_skey.c
261
skey_unlock(&skey);
libexec/login_skey/login_skey.c
292
*(int *)CMSG_DATA(cmp) = fileno(skey.keyfile);
libexec/login_skey/login_skey.c
52
struct skey skey;
sbin/isakmpd/x509.c
106
char *ikey = NULL, *skey = NULL, *buf = NULL;
sbin/isakmpd/x509.c
205
skey = kn_encode_key(&dc, INTERNAL_ENC_PKCS1, ENCODING_HEX,
sbin/isakmpd/x509.c
214
if (!skey) {
sbin/isakmpd/x509.c
419
if (asprintf(&buf, fmt, skey, ikey, timecomp, before, timecomp2,
sbin/isakmpd/x509.c
428
free(skey);
sbin/isakmpd/x509.c
429
skey = NULL;
sbin/isakmpd/x509.c
475
free(skey);
sys/crypto/aes.c
334
aes_keysched_base(uint32_t *skey, const void *key, size_t key_len)
sys/crypto/aes.c
357
skey[i] = tmp;
sys/crypto/aes.c
359
tmp = skey[(key_len >> 2) - 1];
sys/crypto/aes.c
367
tmp ^= skey[i - nk];
sys/crypto/aes.c
368
skey[i] = tmp;
sys/crypto/aes.c
386
uint32_t skey[60];
sys/crypto/aes.c
389
num_rounds = aes_keysched_base(skey, key, key_len);
sys/crypto/aes.c
393
q[0] = q[1] = skey[(u << 2) + 0];
sys/crypto/aes.c
394
q[2] = q[3] = skey[(u << 2) + 1];
sys/crypto/aes.c
395
q[4] = q[5] = skey[(u << 2) + 2];
sys/crypto/aes.c
396
q[6] = q[7] = skey[(u << 2) + 3];
sys/crypto/aes.c
416
aes_ct_skey_expand(uint32_t *skey,
sys/crypto/aes.c
427
skey[v + 0] = x | (x << 1);
sys/crypto/aes.c
429
skey[v + 1] = y | (y >> 1);
sys/crypto/aes.c
508
const uint32_t *skey, uint32_t *q)
sys/crypto/aes.c
512
add_round_key(q, skey);
sys/crypto/aes.c
517
add_round_key(q, skey + (u << 3));
sys/crypto/aes.c
521
add_round_key(q, skey + (num_rounds << 3));
sys/crypto/aes.c
643
const uint32_t *skey, uint32_t *q)
sys/crypto/aes.c
647
add_round_key(q, skey + (num_rounds << 3));
sys/crypto/aes.c
651
add_round_key(q, skey + (u << 3));
sys/crypto/aes.c
656
add_round_key(q, skey);
sys/crypto/aes.c
769
AES_KeySetup_Encrypt(uint32_t *skey, const uint8_t *key, int len)
sys/crypto/aes.c
782
skey[u] = (w << 24)
sys/crypto/aes.c
840
AES_KeySetup_Decrypt(uint32_t *skey, const uint8_t *key, int len)
sys/crypto/aes.c
858
memcpy(skey + (r << 2), tkey, 4 * sizeof(uint32_t));
sys/crypto/aes.c
859
memcpy(skey, tkey + (r << 2), 4 * sizeof(uint32_t));
sys/crypto/aes.c
874
skey[((r - (u >> 2)) << 2) + (u & 3)] = tk;
sys/net/pf_ioctl.c
1799
struct pf_source skey = {
sys/net/pf_ioctl.c
1824
pfsr = pf_source_rb_find(&pfsrlim->pfsrlim_ioc_sources, &skey);
sys/net/toeplitz.c
119
stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey)
sys/net/toeplitz.c
128
column[b] = skey << b | skey >> (NBSK - b);
sys/net/toeplitz.c
201
uint16_t skey = htons(stoeplitz_keyseed);
sys/net/toeplitz.c
206
for (i = 0; i < klen; i += sizeof(skey)) {
sys/net/toeplitz.c
207
k[i + 0] = skey >> 8;
sys/net/toeplitz.c
208
k[i + 1] = skey;
sys/scsi/cd.c
2067
u_int8_t skey = sense->flags & SSD_KEY;
sys/scsi/cd.c
2086
switch(skey) {
sys/scsi/ch.c
800
u_int8_t serr, skey;
sys/scsi/ch.c
803
skey = sense->flags & SSD_KEY;
sys/scsi/ch.c
809
switch (skey) {
sys/scsi/mpath_rdac.c
270
u_int8_t skey;
sys/scsi/mpath_rdac.c
275
skey = sense->flags & SSD_KEY;
sys/scsi/mpath_rdac.c
280
if (skey == SKEY_ILLEGAL_REQUEST && ASC_ASCQ(sense) == 0x9401)
sys/scsi/mpath_rdac.c
283
if (skey == SKEY_UNIT_ATTENTION && ASC_ASCQ(sense) == 0x8b02)
sys/scsi/scsi_base.c
1641
u_int8_t serr, skey;
sys/scsi/scsi_base.c
1647
skey = 0xff; /* Invalid value, since key is 4 bit value. */
sys/scsi/scsi_base.c
1649
skey = sense->flags & SSD_KEY;
sys/scsi/scsi_base.c
1655
switch (skey) {
sys/scsi/scsi_base.c
1770
if (skey && !ISSET(xs->flags, SCSI_SILENT))
sys/scsi/scsi_base.c
2589
u_int8_t skey, spec_1;
sys/scsi/scsi_base.c
2594
skey = sense->flags & SSD_KEY;
sys/scsi/scsi_base.c
2600
strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf));
sys/scsi/scsi_base.c
2609
switch (skey) {
sys/scsi/st.c
1875
u_int8_t skey = sense->flags & SSD_KEY;
sys/scsi/st.c
1885
switch (skey) {
sys/scsi/st.c
2021
if (skey == SKEY_BLANK_CHECK) {
usr.bin/skeyaudit/skeyaudit.c
70
struct skey key;
usr.bin/skeyinfo/skeyinfo.c
41
struct skey key;
usr.bin/skeyinit/skeyinit.c
212
rval = skeylookup(&skey, pp->pw_name);
usr.bin/skeyinit/skeyinit.c
235
skey_get_algorithm(), skey.seed);
usr.bin/skeyinit/skeyinit.c
240
l = strlen(skey.seed);
usr.bin/skeyinit/skeyinit.c
241
for (p = skey.seed; *p; p++) {
usr.bin/skeyinit/skeyinit.c
246
memmove(p, p + 1, l - (p - skey.seed));
usr.bin/skeyinit/skeyinit.c
253
lastc = skey.seed[l - 1];
usr.bin/skeyinit/skeyinit.c
256
(void)strlcpy(seed, skey.seed,
usr.bin/skeyinit/skeyinit.c
262
(void)strlcpy(seed, skey.seed,
usr.bin/skeyinit/skeyinit.c
283
(skey.keyfile = fdopen(l, "r+")) == NULL)
usr.bin/skeyinit/skeyinit.c
287
if (fchown(fileno(skey.keyfile), pp->pw_uid, -1) != 0 ||
usr.bin/skeyinit/skeyinit.c
288
fchmod(fileno(skey.keyfile), S_IRUSR | S_IWUSR) != 0)
usr.bin/skeyinit/skeyinit.c
305
if ((skey.val = malloc(16 + 1)) == NULL)
usr.bin/skeyinit/skeyinit.c
307
btoa8(skey.val, key);
usr.bin/skeyinit/skeyinit.c
309
(void)fseek(skey.keyfile, 0L, SEEK_SET);
usr.bin/skeyinit/skeyinit.c
310
(void)fprintf(skey.keyfile, "%s\n%s\n%04d\n%s\n%s\n",
usr.bin/skeyinit/skeyinit.c
311
pp->pw_name, skey_get_algorithm(), n, seed, skey.val);
usr.bin/skeyinit/skeyinit.c
312
(void)fclose(skey.keyfile);
usr.bin/skeyinit/skeyinit.c
53
struct skey skey;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
596
struct string skey, sdata;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
602
str_init(&skey);
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
606
str_prepend(&skey, e->n_name, k);
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
608
key.data = (u_char *) skey.s_str;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
609
key.size = skey.s_len + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
627
str_free(&skey);
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
650
struct string skey, sdata;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
656
str_init(&skey);
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
659
str_prepend(&skey, (char *) key.data, k);
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
661
key.data = (u_char *) skey.s_str;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
662
key.size = skey.s_len + 1;
usr.sbin/netgroup_mkdb/netgroup_mkdb.c
680
str_free(&skey);