| /src/lib/libc/rpc/ |
| H A D | auth_des.c | 122 const char *timehost, const des_block *ckey) in authdes_seccreate() argument 138 ckey, NULL); in authdes_seccreate() 149 const char *timehost, const des_block *ckey, nis_server *srvr) in authdes_pk_seccreate() argument 204 if (ckey == NULL) { in authdes_pk_seccreate() 211 auth->ah_key = *ckey; in authdes_pk_seccreate()
|
| H A D | rpc_soc.c | 372 des_block *ckey) in authdes_create() argument 393 nauth = authdes_seccreate(servername, window, hostname, ckey); in authdes_create() 397 dummy = authdes_seccreate(servername, window, NULL, ckey); in authdes_create()
|
| /src/crypto/openssl/demos/certs/apps/ |
| H A D | mkacerts.sh | 22 -key ckey.pem -out creq.pem -new 46 cat ckey.pem >>client.pem
|
| /src/crypto/heimdal/kdc/ |
| H A D | kerberos5.c | 524 METHOD_DATA *md, Key *ckey) in get_pa_etype_info() argument 537 ret = make_etype_info_entry(context, &pa.val[0], ckey); in get_pa_etype_info() 637 METHOD_DATA *md, Key *ckey) in get_pa_etype_info2() argument 649 ret = make_etype_info2_entry(&pa.val[0], ckey); in get_pa_etype_info2() 979 Key *ckey, *skey; in _kdc_as_rep() local 1400 client, b->etype.val, b->etype.len, NULL, &ckey); in _kdc_as_rep() 1415 if (older_enctype(ckey->key.keytype)) { in _kdc_as_rep() 1417 &method_data, ckey); in _kdc_as_rep() 1424 &method_data, ckey); in _kdc_as_rep()
|
| /src/crypto/openssl/crypto/ec/ |
| H A D | ec_kmeth.c | 219 int (*ckey)(unsigned char **psec, in EC_KEY_METHOD_set_compute_key() 224 meth->compute_key = ckey; in EC_KEY_METHOD_set_compute_key()
|
| /src/sys/dev/safexcel/ |
| H A D | safexcel.c | 1383 const uint8_t *ckey, const uint8_t *akey, struct safexcel_session *sess) in safexcel_set_context() argument 1401 memcpy(data, ckey, cklen); in safexcel_set_context() 1412 safexcel_setkey_ghash(ckey, cklen, (uint32_t *)(data + off)); in safexcel_set_context() 1416 safexcel_setkey_xcbcmac(ckey, cklen, (uint32_t *)(data + off)); in safexcel_set_context() 1420 safexcel_setkey_xts(ckey, cklen, data + off); in safexcel_set_context() 1881 const uint8_t *akey, *ckey; in safexcel_set_token() local 1891 ckey = crp->crp_cipher_key; in safexcel_set_token() 1892 if (akey != NULL || ckey != NULL) { in safexcel_set_token() 1899 if (ckey == NULL) in safexcel_set_token() 1900 ckey = csp->csp_cipher_key; in safexcel_set_token() [all …]
|
| /src/crypto/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 3098 EVP_PKEY *ckey = NULL; in tls_process_cke_dhe() local 3120 ckey = EVP_PKEY_new(); in tls_process_cke_dhe() 3121 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe() 3126 if (EVP_PKEY_set1_encoded_public_key(ckey, data, i) <= 0) { in tls_process_cke_dhe() 3131 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe() 3140 EVP_PKEY_free(ckey); in tls_process_cke_dhe() 3147 EVP_PKEY *ckey = NULL; in tls_process_cke_ecdhe() local 3174 ckey = EVP_PKEY_new(); in tls_process_cke_ecdhe() 3175 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe() 3180 if (EVP_PKEY_set1_encoded_public_key(ckey, data, i) <= 0) { in tls_process_cke_ecdhe() [all …]
|
| H A D | statem_clnt.c | 3190 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local 3203 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe() 3204 if (ckey == NULL) { in tls_construct_cke_dhe() 3209 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe() 3217 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub); in tls_construct_cke_dhe() 3220 EVP_PKEY_free(ckey); in tls_construct_cke_dhe() 3229 prime_len = EVP_PKEY_get_size(ckey); in tls_construct_cke_dhe() 3247 EVP_PKEY_free(ckey); in tls_construct_cke_dhe() 3255 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local 3264 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe() [all …]
|
| H A D | extensions_clnt.c | 1879 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local 1885 if (ckey == NULL || s->s3.peer_tmp != NULL) { in tls_parse_stoc_key_share() 1953 ckey = s->s3.tmp.ks_pkey[i]; in tls_parse_stoc_key_share() 1955 s->s3.tmp.pkey = ckey; in tls_parse_stoc_key_share() 2006 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share() 2020 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share() 2031 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) { in tls_parse_stoc_key_share()
|
| H A D | extensions_srvr.c | 1931 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local 1935 if (ckey != NULL) { in tls_construct_stoc_key_share() 1950 if (ckey == NULL) { in tls_construct_stoc_key_share() 1985 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share() 2012 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share() 2027 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) { in tls_construct_stoc_key_share()
|
| /src/sys/contrib/openzfs/module/os/freebsd/zfs/ |
| H A D | zio_crypt.c | 1682 crypto_key_t tmp_ckey, *ckey = NULL; in zio_do_crypt_data() local 1721 ckey = &key->zk_current_key; in zio_do_crypt_data() 1734 ckey = &tmp_ckey; in zio_do_crypt_data() 1740 ckey, iv, enc_len, &cuio, auth_len); in zio_do_crypt_data() 1749 if (ckey == &tmp_ckey) in zio_do_crypt_data() 1761 if (ckey == &tmp_ckey) in zio_do_crypt_data()
|
| /src/sys/contrib/openzfs/module/os/linux/zfs/ |
| H A D | zio_crypt.c | 1924 crypto_key_t tmp_ckey, *ckey = NULL; in zio_do_crypt_data() local 1941 ckey = &key->zk_current_key; in zio_do_crypt_data() 1955 ckey = &tmp_ckey; in zio_do_crypt_data() 1978 dstbuf, NULL, 0, iv, mac, ckey, key->zk_crypt, datalen); in zio_do_crypt_data() 1998 ret = zio_do_crypt_uio(encrypt, key->zk_crypt, ckey, tmpl, iv, enc_len, in zio_do_crypt_data() 2009 if (ckey == &tmp_ckey) in zio_do_crypt_data() 2021 if (ckey == &tmp_ckey) in zio_do_crypt_data()
|
| /src/crypto/openssl/demos/certs/ |
| H A D | mkcerts.sh | 31 -keyout ckey.pem -out creq.pem -newkey rsa:1024
|
| /src/crypto/openssl/include/openssl/ |
| H A D | ec.h | 1486 int (*ckey)(unsigned char **psec, size_t *pseclen,
|