Home
last modified time | relevance | path

Searched refs:client_key (Results 1 – 25 of 25) sorted by relevance

/freebsd/crypto/openssh/
H A Dkexecdh.c52 EC_KEY *client_key = NULL; in kex_ecdh_keypair() local
58 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_keypair()
62 if (EC_KEY_generate_key(client_key) != 1) { in kex_ecdh_keypair()
66 group = EC_KEY_get0_group(client_key); in kex_ecdh_keypair()
67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair()
78 sshkey_dump_ec_key(client_key); in kex_ecdh_keypair()
80 kex->ec_client_key = client_key; in kex_ecdh_keypair()
82 client_key = NULL; /* owned by the kex */ in kex_ecdh_keypair()
86 EC_KEY_free(client_key); in kex_ecdh_keypair()
/freebsd/crypto/krb5/src/plugins/preauth/securid_sam2/
H A Dgrail.c156 krb5_keyblock *client_key, krb5_sam_challenge_2 *sc2_out) in get_grail_edata() argument
177 sc2b.sam_etype = client_key->enctype; in get_grail_edata()
190 ret = sam_make_challenge(context, &sc2b, client_key, sc2_out); in get_grail_edata()
204 krb5_keyblock client_key; in verify_grail_data() local
209 memset(&client_key, 0, sizeof(client_key)); in verify_grail_data()
223 &client_key, NULL); in verify_grail_data()
229 ret = krb5_c_decrypt(context, &client_key, KRB5_KEYUSAGE_PA_SAM_RESPONSE, in verify_grail_data()
266 krb5_free_keyblock_contents(context, &client_key); in verify_grail_data()
H A Dsecurid2.c208 krb5_keyblock *client_key, krb5_sam_challenge_2 *sc2) in get_securid_edata_2() argument
258 sc2b.sam_etype = client_key->enctype; in get_securid_edata_2()
260 retval = sam_make_challenge(context, &sc2b, client_key, sc2); in get_securid_edata_2()
282 krb5_keyblock client_key; in verify_securid_data_2() local
294 memset(&client_key, 0, sizeof(client_key)); in verify_securid_data_2()
326 &client_key, NULL); in verify_securid_data_2()
338 retval = krb5_c_decrypt(context, &client_key, in verify_securid_data_2()
471 sc2b.sam_etype = client_key.enctype; in verify_securid_data_2()
498 retval = sam_make_challenge(context, &sc2b, &client_key, sc2p); in verify_securid_data_2()
586 sc2b.sam_etype = client_key.enctype; in verify_securid_data_2()
[all …]
H A Dsecurid_sam2_main.c177 krb5_keyblock *client_key = NULL; in kdc_include_padata() local
191 retval = cb->client_keys(context, rock, &client_key); in kdc_include_padata()
194 if (client_key->enctype == 0) { in kdc_include_padata()
215 retval = get_securid_edata_2(context, client, client_key, &sc2); in kdc_include_padata()
222 retval = get_grail_edata(context, client, client_key, &sc2); in kdc_include_padata()
252 cb->free_keys(context, rock, client_key); in kdc_include_padata()
H A Dextern.h42 krb5_keyblock *client_key,
53 krb5_keyblock *client_key,
/freebsd/contrib/wpa/hs20/client/
H A Dosu_client.h81 const char *client_cert, const char *client_key,
86 const char *client_cert, const char *client_key,
99 const char *client_cert, const char *client_key,
104 const char *client_cert, const char *client_key,
H A Doma_dm_client.c943 const char *client_key) in oma_dm_send_recv() argument
960 client_cert, client_key, NULL); in oma_dm_send_recv()
1251 const char *client_cert, const char *client_key, in oma_dm_pol_upd() argument
1270 cred_password, client_cert, client_key); in oma_dm_pol_upd()
1298 const char *client_cert, const char *client_key, in oma_dm_sub_rem() argument
1317 cred_password, client_cert, client_key); in oma_dm_sub_rem()
H A Dest.c656 const char *client_cert = NULL, *client_key = NULL; in est_simple_enroll() local
687 client_key = client_key_buf; in est_simple_enroll()
696 ctx->ca_fname, user, pw, client_cert, client_key, in est_simple_enroll()
H A Dspp_client.c786 const char *client_cert, const char *client_key, in spp_sub_rem() argument
798 client_key) == 0) { in spp_sub_rem()
933 const char *client_cert, const char *client_key, in spp_pol_upd() argument
944 cred_password, client_cert, client_key) == 0) { in spp_pol_upd()
H A Dosu_client.c2601 char *client_key = NULL; in cmd_sub_rem() local
2704 client_key = client_key_buf; in cmd_sub_rem()
2732 client_cert, client_key, in cmd_sub_rem()
2736 client_cert, client_key, in cmd_sub_rem()
2760 char *client_key = NULL; in cmd_pol_upd() local
2869 client_key = client_key_buf; in cmd_pol_upd()
2887 client_cert, client_key, in cmd_pol_upd()
2891 client_cert, client_key, in cmd_pol_upd()
/freebsd/crypto/krb5/src/kdc/
H A Dkdc_preauth_encts.c59 krb5_key_data * client_key; in enc_ts_verify() local
78 -1, 0, &client_key))) in enc_ts_verify()
81 if ((retval = krb5_dbe_decrypt_key_data(context, NULL, client_key, in enc_ts_verify()
H A Dkdc_preauth.c112 krb5_principal client, krb5_key_data *client_key,
776 if (rock->client_key == NULL) in add_etype_info()
782 rock->client_key, rock->client_keyblock->enctype, in add_etype_info()
793 ret = make_etype_info(context, TRUE, rock->client->princ, rock->client_key, in add_etype_info()
813 if (rock->client_key == NULL || requires_info2(rock->request)) in add_pw_salt()
816 ret = krb5_dbe_compute_salt(context, rock->client_key, in add_pw_salt()
1154 if (rock->client_key == NULL) in maybe_add_etype_info2()
1163 ret = make_etype_info(context, TRUE, rock->client->princ, rock->client_key, in maybe_add_etype_info2()
1510 krb5_principal client_princ, krb5_key_data *client_key, in _make_etype_info_entry() argument
1529 retval = krb5_dbe_compute_salt(context, client_key, client_princ, in _make_etype_info_entry()
[all …]
H A Dkdc_authdata.c236 copy_request_authdata(krb5_context context, krb5_keyblock *client_key, in copy_request_authdata() argument
262 ret = krb5_c_decrypt(context, client_key, in copy_request_authdata()
580 krb5_keyblock *client_key, krb5_keyblock *server_key, in handle_authdata() argument
596 ret = copy_request_authdata(context, client_key, req, enc_tkt_req, in handle_authdata()
607 subject_server, client_key, server_key, in handle_authdata()
H A Ddo_as_req.c168 krb5_key_data *client_key; member
329 if (state->client_key != NULL) in finish_process_as_req()
330 state->reply.enc_part.kvno = state->client_key->key_data_kvno; in finish_process_as_req()
738 &state->client_keyblock, &state->client_key); in process_as_req()
743 if (state->client_key != NULL) in process_as_req()
744 state->rock.client_key = state->client_key; in process_as_req()
H A Dkdc_util.h237 krb5_keyblock *client_key, krb5_keyblock *server_key,
428 krb5_key_data *client_key; member
/freebsd/contrib/wpa/src/utils/
H A Dhttp-utils.h42 const char *client_key);
56 const char *client_cert, const char *client_key,
H A Dhttp_curl.c1330 const char *client_key) in setup_curl_post() argument
1368 if (client_cert && client_key) { in setup_curl_post()
1370 curl_easy_setopt(curl, CURLOPT_SSLKEY, client_key); in setup_curl_post()
1393 const char *client_key) in post_init_client() argument
1403 clone_str(&ctx->svc_client_key, client_key); in post_init_client()
1417 password, client_cert, client_key); in post_init_client()
1428 const char *client_key) in soap_init_client() argument
1431 client_cert, client_key) < 0) in soap_init_client()
1451 char *client_key = NULL; in soap_reinit_client() local
1461 clone_str(&client_key, ctx->svc_client_key); in soap_reinit_client()
[all …]
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dencode_kdc.c46 int using_subkey, const krb5_keyblock *client_key, in krb5_encode_kdc_rep() argument
95 retval = krb5_encrypt_helper(context, client_key, usage, scratch, in krb5_encode_kdc_rep()
/freebsd/crypto/openssl/test/
H A Dcmp_client_test.c36 static EVP_PKEY *client_key = NULL; variable
78 || !OSSL_CMP_CTX_set1_pkey(ctx, client_key) in set_up()
278 EVP_PKEY *key = raverified /* wrong key */ ? server_key : client_key; in test_exec_KUR_ses()
516 EVP_PKEY_free(client_key); in cleanup_tests()
547 || !TEST_ptr(client_key = load_pkey_pem(client_key_f, libctx)) in OPT_TEST_DECLARE_USAGE()
/freebsd/crypto/krb5/src/include/krb5/
H A Dkdcauthdata_plugin.h111 krb5_keyblock *client_key,
/freebsd/crypto/krb5/src/plugins/authdata/greet_server/
H A Dgreet_auth.c101 krb5_keyblock *client_key, in greet_authdata() argument
/freebsd/crypto/openssl/doc/man1/
H A Dtsget.pod169 client authentication (it will ask for the passphrase if F<client_key.pem> is
173 -k client_key.pem -c client_cert.pem file1.tsq
180 -k client_key.pem -c client_cert.pem'
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_clnt.c511 unsigned char *client_key = NULL, *kdc_hostname = NULL; in pkinit_as_rep_parse() local
609 kdc_dh->subjectPublicKey.length, &client_key, in pkinit_as_rep_parse()
616 secret = make_data(client_key, client_key_len); in pkinit_as_rep_parse()
630 free(client_key); in pkinit_as_rep_parse()
H A Dpkinit_crypto_openssl.c2972 uint8_t *client_key = NULL; in client_process_dh() local
2988 &client_key, &client_key_len)) in client_process_dh()
2994 print_buffer(client_key, client_key_len); in client_process_dh()
2997 *client_key_out = client_key; in client_process_dh()
2999 client_key = NULL; in client_process_dh()
3005 free(client_key); in client_process_dh()
/freebsd/crypto/krb5/src/lib/rpc/
H A Dsvc_auth_gssapi.c698 static int client_key = 1; in create_client() local
718 client_data->key = client_key++; in create_client()