| /freebsd/crypto/openssh/ |
| H A D | kexecdh.c | 52 EC_KEY *client_key = NULL; in kex_ecdh_keypair() local 58 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_keypair() 62 if (EC_KEY_generate_key(client_key) != 1) { in kex_ecdh_keypair() 66 group = EC_KEY_get0_group(client_key); in kex_ecdh_keypair() 67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair() 78 sshkey_dump_ec_key(client_key); in kex_ecdh_keypair() 80 kex->ec_client_key = client_key; in kex_ecdh_keypair() 82 client_key = NULL; /* owned by the kex */ in kex_ecdh_keypair() 86 EC_KEY_free(client_key); in kex_ecdh_keypair()
|
| /freebsd/crypto/krb5/src/plugins/preauth/securid_sam2/ |
| H A D | grail.c | 156 krb5_keyblock *client_key, krb5_sam_challenge_2 *sc2_out) in get_grail_edata() argument 177 sc2b.sam_etype = client_key->enctype; in get_grail_edata() 190 ret = sam_make_challenge(context, &sc2b, client_key, sc2_out); in get_grail_edata() 204 krb5_keyblock client_key; in verify_grail_data() local 209 memset(&client_key, 0, sizeof(client_key)); in verify_grail_data() 223 &client_key, NULL); in verify_grail_data() 229 ret = krb5_c_decrypt(context, &client_key, KRB5_KEYUSAGE_PA_SAM_RESPONSE, in verify_grail_data() 266 krb5_free_keyblock_contents(context, &client_key); in verify_grail_data()
|
| H A D | securid2.c | 208 krb5_keyblock *client_key, krb5_sam_challenge_2 *sc2) in get_securid_edata_2() argument 258 sc2b.sam_etype = client_key->enctype; in get_securid_edata_2() 260 retval = sam_make_challenge(context, &sc2b, client_key, sc2); in get_securid_edata_2() 282 krb5_keyblock client_key; in verify_securid_data_2() local 294 memset(&client_key, 0, sizeof(client_key)); in verify_securid_data_2() 326 &client_key, NULL); in verify_securid_data_2() 338 retval = krb5_c_decrypt(context, &client_key, in verify_securid_data_2() 471 sc2b.sam_etype = client_key.enctype; in verify_securid_data_2() 498 retval = sam_make_challenge(context, &sc2b, &client_key, sc2p); in verify_securid_data_2() 586 sc2b.sam_etype = client_key.enctype; in verify_securid_data_2() [all …]
|
| H A D | securid_sam2_main.c | 177 krb5_keyblock *client_key = NULL; in kdc_include_padata() local 191 retval = cb->client_keys(context, rock, &client_key); in kdc_include_padata() 194 if (client_key->enctype == 0) { in kdc_include_padata() 215 retval = get_securid_edata_2(context, client, client_key, &sc2); in kdc_include_padata() 222 retval = get_grail_edata(context, client, client_key, &sc2); in kdc_include_padata() 252 cb->free_keys(context, rock, client_key); in kdc_include_padata()
|
| H A D | extern.h | 42 krb5_keyblock *client_key, 53 krb5_keyblock *client_key,
|
| /freebsd/contrib/wpa/hs20/client/ |
| H A D | osu_client.h | 81 const char *client_cert, const char *client_key, 86 const char *client_cert, const char *client_key, 99 const char *client_cert, const char *client_key, 104 const char *client_cert, const char *client_key,
|
| H A D | oma_dm_client.c | 943 const char *client_key) in oma_dm_send_recv() argument 960 client_cert, client_key, NULL); in oma_dm_send_recv() 1251 const char *client_cert, const char *client_key, in oma_dm_pol_upd() argument 1270 cred_password, client_cert, client_key); in oma_dm_pol_upd() 1298 const char *client_cert, const char *client_key, in oma_dm_sub_rem() argument 1317 cred_password, client_cert, client_key); in oma_dm_sub_rem()
|
| H A D | est.c | 656 const char *client_cert = NULL, *client_key = NULL; in est_simple_enroll() local 687 client_key = client_key_buf; in est_simple_enroll() 696 ctx->ca_fname, user, pw, client_cert, client_key, in est_simple_enroll()
|
| H A D | spp_client.c | 786 const char *client_cert, const char *client_key, in spp_sub_rem() argument 798 client_key) == 0) { in spp_sub_rem() 933 const char *client_cert, const char *client_key, in spp_pol_upd() argument 944 cred_password, client_cert, client_key) == 0) { in spp_pol_upd()
|
| H A D | osu_client.c | 2601 char *client_key = NULL; in cmd_sub_rem() local 2704 client_key = client_key_buf; in cmd_sub_rem() 2732 client_cert, client_key, in cmd_sub_rem() 2736 client_cert, client_key, in cmd_sub_rem() 2760 char *client_key = NULL; in cmd_pol_upd() local 2869 client_key = client_key_buf; in cmd_pol_upd() 2887 client_cert, client_key, in cmd_pol_upd() 2891 client_cert, client_key, in cmd_pol_upd()
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | kdc_preauth_encts.c | 59 krb5_key_data * client_key; in enc_ts_verify() local 78 -1, 0, &client_key))) in enc_ts_verify() 81 if ((retval = krb5_dbe_decrypt_key_data(context, NULL, client_key, in enc_ts_verify()
|
| H A D | kdc_preauth.c | 112 krb5_principal client, krb5_key_data *client_key, 776 if (rock->client_key == NULL) in add_etype_info() 782 rock->client_key, rock->client_keyblock->enctype, in add_etype_info() 793 ret = make_etype_info(context, TRUE, rock->client->princ, rock->client_key, in add_etype_info() 813 if (rock->client_key == NULL || requires_info2(rock->request)) in add_pw_salt() 816 ret = krb5_dbe_compute_salt(context, rock->client_key, in add_pw_salt() 1154 if (rock->client_key == NULL) in maybe_add_etype_info2() 1163 ret = make_etype_info(context, TRUE, rock->client->princ, rock->client_key, in maybe_add_etype_info2() 1510 krb5_principal client_princ, krb5_key_data *client_key, in _make_etype_info_entry() argument 1529 retval = krb5_dbe_compute_salt(context, client_key, client_princ, in _make_etype_info_entry() [all …]
|
| H A D | kdc_authdata.c | 236 copy_request_authdata(krb5_context context, krb5_keyblock *client_key, in copy_request_authdata() argument 262 ret = krb5_c_decrypt(context, client_key, in copy_request_authdata() 580 krb5_keyblock *client_key, krb5_keyblock *server_key, in handle_authdata() argument 596 ret = copy_request_authdata(context, client_key, req, enc_tkt_req, in handle_authdata() 607 subject_server, client_key, server_key, in handle_authdata()
|
| H A D | do_as_req.c | 168 krb5_key_data *client_key; member 329 if (state->client_key != NULL) in finish_process_as_req() 330 state->reply.enc_part.kvno = state->client_key->key_data_kvno; in finish_process_as_req() 738 &state->client_keyblock, &state->client_key); in process_as_req() 743 if (state->client_key != NULL) in process_as_req() 744 state->rock.client_key = state->client_key; in process_as_req()
|
| H A D | kdc_util.h | 237 krb5_keyblock *client_key, krb5_keyblock *server_key, 428 krb5_key_data *client_key; member
|
| /freebsd/contrib/wpa/src/utils/ |
| H A D | http-utils.h | 42 const char *client_key); 56 const char *client_cert, const char *client_key,
|
| H A D | http_curl.c | 1330 const char *client_key) in setup_curl_post() argument 1368 if (client_cert && client_key) { in setup_curl_post() 1370 curl_easy_setopt(curl, CURLOPT_SSLKEY, client_key); in setup_curl_post() 1393 const char *client_key) in post_init_client() argument 1403 clone_str(&ctx->svc_client_key, client_key); in post_init_client() 1417 password, client_cert, client_key); in post_init_client() 1428 const char *client_key) in soap_init_client() argument 1431 client_cert, client_key) < 0) in soap_init_client() 1451 char *client_key = NULL; in soap_reinit_client() local 1461 clone_str(&client_key, ctx->svc_client_key); in soap_reinit_client() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | encode_kdc.c | 46 int using_subkey, const krb5_keyblock *client_key, in krb5_encode_kdc_rep() argument 95 retval = krb5_encrypt_helper(context, client_key, usage, scratch, in krb5_encode_kdc_rep()
|
| /freebsd/crypto/openssl/test/ |
| H A D | cmp_client_test.c | 36 static EVP_PKEY *client_key = NULL; variable 78 || !OSSL_CMP_CTX_set1_pkey(ctx, client_key) in set_up() 278 EVP_PKEY *key = raverified /* wrong key */ ? server_key : client_key; in test_exec_KUR_ses() 516 EVP_PKEY_free(client_key); in cleanup_tests() 547 || !TEST_ptr(client_key = load_pkey_pem(client_key_f, libctx)) in OPT_TEST_DECLARE_USAGE()
|
| /freebsd/crypto/krb5/src/include/krb5/ |
| H A D | kdcauthdata_plugin.h | 111 krb5_keyblock *client_key,
|
| /freebsd/crypto/krb5/src/plugins/authdata/greet_server/ |
| H A D | greet_auth.c | 101 krb5_keyblock *client_key, in greet_authdata() argument
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | tsget.pod | 169 client authentication (it will ask for the passphrase if F<client_key.pem> is 173 -k client_key.pem -c client_cert.pem file1.tsq 180 -k client_key.pem -c client_cert.pem'
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_clnt.c | 511 unsigned char *client_key = NULL, *kdc_hostname = NULL; in pkinit_as_rep_parse() local 609 kdc_dh->subjectPublicKey.length, &client_key, in pkinit_as_rep_parse() 616 secret = make_data(client_key, client_key_len); in pkinit_as_rep_parse() 630 free(client_key); in pkinit_as_rep_parse()
|
| H A D | pkinit_crypto_openssl.c | 2972 uint8_t *client_key = NULL; in client_process_dh() local 2988 &client_key, &client_key_len)) in client_process_dh() 2994 print_buffer(client_key, client_key_len); in client_process_dh() 2997 *client_key_out = client_key; in client_process_dh() 2999 client_key = NULL; in client_process_dh() 3005 free(client_key); in client_process_dh()
|
| /freebsd/crypto/krb5/src/lib/rpc/ |
| H A D | svc_auth_gssapi.c | 698 static int client_key = 1; in create_client() local 718 client_data->key = client_key++; in create_client()
|