Lines Matching defs:sk
305 symkey * sk;
309 while (NULL != (sk = HEAD_DLIST(key_listhead, llink))) {
310 freesymkey(sk);
335 symkey * sk;
348 sk = eallocarrayxz(i, sizeof(*sk), MOREMEM_EXTRA_ALLOC);
350 base = sk;
354 for (; i > 0; i--, sk++) {
355 LINK_SLIST(authfreekeys, sk, llink.f);
359 allocrec = (void *)sk;
448 symkey * sk;
462 ITER_DLIST_BEGIN(key_listhead, sk, llink, symkey)
463 hash = KEYHASH(sk->keyid);
464 LINK_SLIST(key_hash[hash], sk, hlink);
487 symkey * sk;
495 UNLINK_HEAD_SLIST(sk, authfreekeys, llink.f);
496 DEBUG_ENSURE(sk != NULL);
497 sk->keyid = id;
498 sk->flags = flags;
499 sk->type = type;
500 sk->secretsize = secretsize;
501 sk->secret = secret;
502 sk->keyacclist = ka;
503 sk->lifetime = lifetime;
504 LINK_SLIST(*bucket, sk, hlink);
505 LINK_TAIL_DLIST(key_listhead, sk, llink);
516 symkey * sk
522 if (NULL == sk)
525 authcache_flush_id(sk->keyid);
526 keyacc_all_free(sk->keyacclist);
528 bucket = &key_hash[KEYHASH(sk->keyid)];
529 if (sk->secret != NULL) {
530 zero_mem(sk->secret, sk->secretsize);
531 free(sk->secret);
533 UNLINK_SLIST(unlinked, *bucket, sk, hlink, symkey);
534 DEBUG_ENSURE(sk == unlinked);
535 UNLINK_DLIST(sk, llink);
536 zero_mem((char *)sk + offsetof(symkey, symkey_payload),
537 sizeof(*sk) - offsetof(symkey, symkey_payload));
538 LINK_SLIST(authfreekeys, sk, llink.f);
552 symkey * sk;
554 for (sk = key_hash[KEYHASH(id)]; sk != NULL; sk = sk->hlink)
555 if (id == sk->keyid)
556 return sk;
586 symkey * sk;
598 sk = auth_findkey(id);
599 if ((sk == NULL) || (sk->type == 0)) {
607 if ( ! (KEY_TRUSTED & sk->flags)) {
615 * this code. Using a sk pointer would be even faster but more
618 cache_keyid = sk->keyid;
619 cache_type = sk->type;
620 cache_flags = sk->flags;
621 cache_secret = sk->secret;
622 cache_secretsize = sk->secretsize;
623 cache_keyacclist = sk->keyacclist;
638 symkey * sk;
646 sk = auth_findkey(id);
647 if (!trust && sk == NULL)
655 if (sk != NULL) {
664 sk->flags |= KEY_TRUSTED;
666 sk->lifetime = current_time + trust;
668 sk->lifetime = 0;
670 freesymkey(sk);
696 symkey * sk;
702 sk = auth_findkey(id);
703 if (sk == NULL || !(KEY_TRUSTED & sk->flags)) {
720 symkey * sk;
727 if (NULL != (sk = auth_findkey(keyno))) {
729 return (KEY_TRUSTED & sk->flags) &&
730 keyacc_contains(sk->keyacclist, sau, TRUE);
757 symkey * sk;
766 sk = auth_findkey(keyno);
767 if (sk != NULL && keyno == sk->keyid) {
769 if (NULL != sk->secret) {
770 memset(sk->secret, 0, sk->secretsize);
771 free(sk->secret);
773 sk->secret = emalloc(secretsize + 1);
774 sk->type = (u_short)keytype;
775 sk->secretsize = secretsize;
777 if (ka != sk->keyacclist) {
778 keyacc_all_free(sk->keyacclist);
779 sk->keyacclist = ka;
782 memcpy(sk->secret, key, secretsize);
785 strncpy((char *)sk->secret, (const char *)key,
827 symkey * sk;
829 ITER_DLIST_BEGIN(key_listhead, sk, llink, symkey)
830 if (sk->keyid > NTP_MAXKEY) { /* autokey */
838 if (KEY_TRUSTED & sk->flags) {
839 if (sk->secret != NULL) {
840 zero_mem(sk->secret, sk->secretsize);
841 free(sk->secret);
842 sk->secret = NULL; /* TALOS-CAN-0054 */
844 sk->keyacclist = keyacc_all_free(sk->keyacclist);
845 sk->secretsize = 0;
846 sk->lifetime = 0;
848 freesymkey(sk);
860 symkey * sk;
862 ITER_DLIST_BEGIN(key_listhead, sk, llink, symkey)
863 if (sk->lifetime > 0 && current_time > sk->lifetime) {
864 freesymkey(sk);