/freebsd/lib/libc/rpc/ |
H A D | auth_des.c | 122 const char *timehost, const des_block *ckey) in authdes_seccreate() argument 138 ckey, NULL); in authdes_seccreate() 149 const char *timehost, const des_block *ckey, nis_server *srvr) in authdes_pk_seccreate() argument 204 if (ckey == NULL) { in authdes_pk_seccreate() 211 auth->ah_key = *ckey; in authdes_pk_seccreate()
|
H A D | rpc_soc.c | 384 des_block *ckey) in authdes_create() argument 405 nauth = authdes_seccreate(servername, window, hostname, ckey); in authdes_create() 409 dummy = authdes_seccreate(servername, window, NULL, ckey); in authdes_create()
|
/freebsd/crypto/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 18 -key ckey.pem -out creq.pem -new 42 cat ckey.pem >>client.pem
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 524 METHOD_DATA *md, Key *ckey) in get_pa_etype_info() argument 537 ret = make_etype_info_entry(context, &pa.val[0], ckey); in get_pa_etype_info() 637 METHOD_DATA *md, Key *ckey) in get_pa_etype_info2() argument 649 ret = make_etype_info2_entry(&pa.val[0], ckey); in get_pa_etype_info2() 979 Key *ckey, *skey; in _kdc_as_rep() local 1400 client, b->etype.val, b->etype.len, NULL, &ckey); in _kdc_as_rep() 1415 if (older_enctype(ckey->key.keytype)) { in _kdc_as_rep() 1417 &method_data, ckey); in _kdc_as_rep() 1424 &method_data, ckey); in _kdc_as_rep()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 2907 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local 2920 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe() 2921 if (ckey == NULL) { in tls_construct_cke_dhe() 2926 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe() 2934 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub); in tls_construct_cke_dhe() 2937 EVP_PKEY_free(ckey); in tls_construct_cke_dhe() 2946 prime_len = EVP_PKEY_get_size(ckey); in tls_construct_cke_dhe() 2964 EVP_PKEY_free(ckey); in tls_construct_cke_dhe() 2972 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local 2981 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe() [all …]
|
H A D | statem_srvr.c | 2959 EVP_PKEY *ckey = NULL; in tls_process_cke_dhe() local 2981 ckey = EVP_PKEY_new(); in tls_process_cke_dhe() 2982 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe() 2987 if (!EVP_PKEY_set1_encoded_public_key(ckey, data, i)) { in tls_process_cke_dhe() 2992 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe() 3001 EVP_PKEY_free(ckey); in tls_process_cke_dhe() 3008 EVP_PKEY *ckey = NULL; in tls_process_cke_ecdhe() local 3035 ckey = EVP_PKEY_new(); in tls_process_cke_ecdhe() 3036 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe() 3041 if (EVP_PKEY_set1_encoded_public_key(ckey, data, i) <= 0) { in tls_process_cke_ecdhe() [all …]
|
H A D | extensions_srvr.c | 1600 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local 1604 if (ckey != NULL) { in tls_construct_stoc_key_share() 1619 if (ckey == NULL) { in tls_construct_stoc_key_share() 1649 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share() 1676 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share() 1691 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) { in tls_construct_stoc_key_share()
|
H A D | extensions_clnt.c | 1768 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local 1772 if (ckey == NULL || s->s3.peer_tmp != NULL) { in tls_parse_stoc_key_share() 1865 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share() 1878 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share() 1889 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) { in tls_parse_stoc_key_share()
|
/freebsd/sys/dev/safexcel/ |
H A D | safexcel.c | 1383 const uint8_t *ckey, const uint8_t *akey, struct safexcel_session *sess) in safexcel_set_context() argument 1401 memcpy(data, ckey, cklen); in safexcel_set_context() 1412 safexcel_setkey_ghash(ckey, cklen, (uint32_t *)(data + off)); in safexcel_set_context() 1416 safexcel_setkey_xcbcmac(ckey, cklen, (uint32_t *)(data + off)); in safexcel_set_context() 1420 safexcel_setkey_xts(ckey, cklen, data + off); in safexcel_set_context() 1881 const uint8_t *akey, *ckey; in safexcel_set_token() local 1891 ckey = crp->crp_cipher_key; in safexcel_set_token() 1892 if (akey != NULL || ckey != NULL) { in safexcel_set_token() 1899 if (ckey == NULL) in safexcel_set_token() 1900 ckey = csp->csp_cipher_key; in safexcel_set_token() [all …]
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ec_kmeth.c | 225 int (*ckey)(unsigned char **psec, in EC_KEY_METHOD_set_compute_key() 230 meth->compute_key = ckey; in EC_KEY_METHOD_set_compute_key()
|
/freebsd/sys/contrib/openzfs/module/os/freebsd/zfs/ |
H A D | zio_crypt.c | 1685 crypto_key_t tmp_ckey, *ckey = NULL; in zio_do_crypt_data() local 1724 ckey = &key->zk_current_key; in zio_do_crypt_data() 1737 ckey = &tmp_ckey; in zio_do_crypt_data() 1743 ckey, iv, enc_len, &cuio, auth_len); in zio_do_crypt_data() 1752 if (ckey == &tmp_ckey) in zio_do_crypt_data() 1771 if (ckey == &tmp_ckey) in zio_do_crypt_data()
|
/freebsd/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zio_crypt.c | 1923 crypto_key_t tmp_ckey, *ckey = NULL; in zio_do_crypt_data() local 1940 ckey = &key->zk_current_key; in zio_do_crypt_data() 1954 ckey = &tmp_ckey; in zio_do_crypt_data() 1977 dstbuf, NULL, 0, iv, mac, ckey, key->zk_crypt, datalen); in zio_do_crypt_data() 1997 ret = zio_do_crypt_uio(encrypt, key->zk_crypt, ckey, tmpl, iv, enc_len, in zio_do_crypt_data() 2008 if (ckey == &tmp_ckey) in zio_do_crypt_data() 2020 if (ckey == &tmp_ckey) in zio_do_crypt_data()
|
/freebsd/crypto/openssl/demos/certs/ |
H A D | mkcerts.sh | 26 -keyout ckey.pem -out creq.pem -newkey rsa:1024
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ec.h | 1477 int (*ckey)(unsigned char **psec, size_t *pseclen,
|