Lines Matching refs:srk
1139 struct sk_resident_key *srk = NULL, **tmp; in read_rks() local
1230 if ((srk = calloc(1, sizeof(*srk))) == NULL || in read_rks()
1231 (srk->key.key_handle = calloc(1, in read_rks()
1233 (srk->application = strdup(rp_id)) == NULL || in read_rks()
1235 (srk->user_id = calloc(1, user_id_len)) == NULL)) { in read_rks()
1240 srk->key.key_handle_len = fido_cred_id_len(cred); in read_rks()
1241 memcpy(srk->key.key_handle, fido_cred_id_ptr(cred), in read_rks()
1242 srk->key.key_handle_len); in read_rks()
1243 srk->user_id_len = user_id_len; in read_rks()
1244 if (srk->user_id_len != 0) in read_rks()
1245 memcpy(srk->user_id, user_id, srk->user_id_len); in read_rks()
1249 srk->alg = SSH_SK_ECDSA; in read_rks()
1252 srk->alg = SSH_SK_ED25519; in read_rks()
1262 srk->flags |= SSH_SK_USER_VERIFICATION_REQD; in read_rks()
1264 if ((r = pack_public_key(srk->alg, cred, in read_rks()
1265 &srk->key)) != 0) { in read_rks()
1276 (*rksp)[(*nrksp)++] = srk; in read_rks()
1277 srk = NULL; in read_rks()
1283 if (srk != NULL) { in read_rks()
1284 free(srk->application); in read_rks()
1285 freezero(srk->key.public_key, srk->key.public_key_len); in read_rks()
1286 freezero(srk->key.key_handle, srk->key.key_handle_len); in read_rks()
1287 freezero(srk->user_id, srk->user_id_len); in read_rks()
1288 freezero(srk, sizeof(*srk)); in read_rks()