skey
skey = X509_get0_pubkey(signer);
if (skey) {
ret = OCSP_BASICRESP_verify(bs, skey, 0);
if (!skey || ret <= 0) {
EVP_PKEY *skey;
if ((skey = X509_get0_pubkey(signer)) == NULL)
ret = OCSP_REQUEST_verify(req, skey);
EVP_PKEY *skey;
int skeychallenge(struct skey *, char *, char *);
int skeychallenge2(int, struct skey *, char *, char *);
int skeylookup(struct skey *, char *);
int skeyverify(struct skey *, char *);
int skeygetnext(struct skey *);
int skey_unlock(struct skey *);
skeylookup(struct skey *mp, char *name)
skeygetnext(struct skey *mp)
skeyverify(struct skey *mp, char *response)
struct skey skey;
i = skeylookup(&skey, username);
if (skey.keyfile != NULL) {
fclose(skey.keyfile);
skey.keyfile = NULL;
struct skey skey;
i = skeychallenge(&skey, username, str);
if (skey.keyfile != NULL) {
fclose(skey.keyfile);
skey.keyfile = NULL;
struct skey skey;
i = skeylookup(&skey, username);
if (skeyverify(&skey, passwd) == 0)
return (skey.n);
static int skeygetent(int, struct skey *, const char *);
skeychallenge2(int fd, struct skey *mp, char *name, char *ss)
struct skey skey;
i = skeychallenge(&skey, username, skeyprompt);
if (i == 0 && skeyverify(&skey, pbuf) == 0) {
if (skey.n < 5) {
skey.n);
skey_unlock(struct skey *mp)
skeychallenge(struct skey *mp, char *name, char *ss)
skeygetent(int fd, struct skey *mp, const char *name)
if ((skey = calloc(1, sizeof(*skey))) == NULL) {
skey->hash = hash;
if ((skey->rsa = EVP_PKEY_get1_RSA(pkey)) == NULL &&
(skey->ecdsa = EVP_PKEY_get1_EC_KEY(pkey)) == NULL) {
skey->next = signer->keys;
signer->keys = skey;
free(skey);
tls_sign_rsa(struct tls_signer *signer, struct tls_signer_key *skey,
if ((rsa_size = RSA_size(skey->rsa)) <= 0) {
signature, skey->rsa, rsa_padding)) <= 0) {
tls_sign_ecdsa(struct tls_signer *signer, struct tls_signer_key *skey,
if ((signature_len = ECDSA_size(skey->ecdsa)) <= 0) {
skey->ecdsa)) {
struct tls_signer_key *skey;
for (skey = signer->keys; skey; skey = skey->next)
if (!strcmp(pubkey_hash, skey->hash))
if (skey == NULL) {
if (skey->rsa != NULL)
return tls_sign_rsa(signer, skey, input, input_len,
if (skey->ecdsa != NULL)
return tls_sign_ecdsa(signer, skey, input, input_len,
struct tls_signer_key *skey;
skey = signer->keys;
signer->keys = skey->next;
RSA_free(skey->rsa);
EC_KEY_free(skey->ecdsa);
free(skey->hash);
free(skey);
struct tls_signer_key *skey = NULL;
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
haskey = (skeylookup(&skey, user) == 0);
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
if (haskey && skeyverify(&skey, response) == 0) {
if (skey.n <= 1)
else if (skey.n < 5)
skey_unlock(&skey);
*(int *)CMSG_DATA(cmp) = fileno(skey.keyfile);
struct skey skey;
char *ikey = NULL, *skey = NULL, *buf = NULL;
skey = kn_encode_key(&dc, INTERNAL_ENC_PKCS1, ENCODING_HEX,
if (!skey) {
if (asprintf(&buf, fmt, skey, ikey, timecomp, before, timecomp2,
free(skey);
skey = NULL;
free(skey);
aes_keysched_base(uint32_t *skey, const void *key, size_t key_len)
skey[i] = tmp;
tmp = skey[(key_len >> 2) - 1];
tmp ^= skey[i - nk];
skey[i] = tmp;
uint32_t skey[60];
num_rounds = aes_keysched_base(skey, key, key_len);
q[0] = q[1] = skey[(u << 2) + 0];
q[2] = q[3] = skey[(u << 2) + 1];
q[4] = q[5] = skey[(u << 2) + 2];
q[6] = q[7] = skey[(u << 2) + 3];
aes_ct_skey_expand(uint32_t *skey,
skey[v + 0] = x | (x << 1);
skey[v + 1] = y | (y >> 1);
const uint32_t *skey, uint32_t *q)
add_round_key(q, skey);
add_round_key(q, skey + (u << 3));
add_round_key(q, skey + (num_rounds << 3));
const uint32_t *skey, uint32_t *q)
add_round_key(q, skey + (num_rounds << 3));
add_round_key(q, skey + (u << 3));
add_round_key(q, skey);
AES_KeySetup_Encrypt(uint32_t *skey, const uint8_t *key, int len)
skey[u] = (w << 24)
AES_KeySetup_Decrypt(uint32_t *skey, const uint8_t *key, int len)
memcpy(skey + (r << 2), tkey, 4 * sizeof(uint32_t));
memcpy(skey, tkey + (r << 2), 4 * sizeof(uint32_t));
skey[((r - (u >> 2)) << 2) + (u & 3)] = tk;
struct pf_source skey = {
pfsr = pf_source_rb_find(&pfsrlim->pfsrlim_ioc_sources, &skey);
stoeplitz_cache_init(struct stoeplitz_cache *scache, stoeplitz_key skey)
column[b] = skey << b | skey >> (NBSK - b);
uint16_t skey = htons(stoeplitz_keyseed);
for (i = 0; i < klen; i += sizeof(skey)) {
k[i + 0] = skey >> 8;
k[i + 1] = skey;
u_int8_t skey = sense->flags & SSD_KEY;
switch(skey) {
u_int8_t serr, skey;
skey = sense->flags & SSD_KEY;
switch (skey) {
u_int8_t skey;
skey = sense->flags & SSD_KEY;
if (skey == SKEY_ILLEGAL_REQUEST && ASC_ASCQ(sense) == 0x9401)
if (skey == SKEY_UNIT_ATTENTION && ASC_ASCQ(sense) == 0x8b02)
u_int8_t serr, skey;
skey = 0xff; /* Invalid value, since key is 4 bit value. */
skey = sense->flags & SSD_KEY;
switch (skey) {
if (skey && !ISSET(xs->flags, SCSI_SILENT))
u_int8_t skey, spec_1;
skey = sense->flags & SSD_KEY;
strlcpy(rqsbuf, sense_keys[skey], sizeof(rqsbuf));
switch (skey) {
u_int8_t skey = sense->flags & SSD_KEY;
switch (skey) {
if (skey == SKEY_BLANK_CHECK) {
struct skey key;
struct skey key;
rval = skeylookup(&skey, pp->pw_name);
skey_get_algorithm(), skey.seed);
l = strlen(skey.seed);
for (p = skey.seed; *p; p++) {
memmove(p, p + 1, l - (p - skey.seed));
lastc = skey.seed[l - 1];
(void)strlcpy(seed, skey.seed,
(void)strlcpy(seed, skey.seed,
(skey.keyfile = fdopen(l, "r+")) == NULL)
if (fchown(fileno(skey.keyfile), pp->pw_uid, -1) != 0 ||
fchmod(fileno(skey.keyfile), S_IRUSR | S_IWUSR) != 0)
if ((skey.val = malloc(16 + 1)) == NULL)
btoa8(skey.val, key);
(void)fseek(skey.keyfile, 0L, SEEK_SET);
(void)fprintf(skey.keyfile, "%s\n%s\n%04d\n%s\n%s\n",
pp->pw_name, skey_get_algorithm(), n, seed, skey.val);
(void)fclose(skey.keyfile);
struct skey skey;
struct string skey, sdata;
str_init(&skey);
str_prepend(&skey, e->n_name, k);
key.data = (u_char *) skey.s_str;
key.size = skey.s_len + 1;
str_free(&skey);
struct string skey, sdata;
str_init(&skey);
str_prepend(&skey, (char *) key.data, k);
key.data = (u_char *) skey.s_str;
key.size = skey.s_len + 1;
str_free(&skey);