| /src/external/gpl3/gcc/dist/libobjc/objc-private/ |
| hash.h | 170 const char *ckey = (const char *) key; local 172 while (*ckey) { 173 ret ^= *ckey++ << ctr;
|
| /src/external/gpl3/gcc.old/dist/libobjc/objc-private/ |
| hash.h | 170 const char *ckey = (const char *) key; local 172 while (*ckey) { 173 ret ^= *ckey++ << ctr;
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| test_engine_dso.c | 84 void *skey, *ckey; local 88 ckey = emalloc(DH_size(client)); 93 csize = DH_compute_key(ckey, server->pub_key, client); 100 if (memcmp(skey, ckey, csize) != 0) 104 free(ckey);
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| extensions_clnt.c | 1879 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; local 1885 if (ckey == NULL || s->s3.peer_tmp != NULL) { 1953 ckey = s->s3.tmp.ks_pkey[i]; 1955 s->s3.tmp.pkey = ckey; 2006 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { 2020 if (ssl_derive(s, ckey, skey, 1) == 0) { 2031 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) {
|
| extensions_srvr.c | 1931 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; local 1935 if (ckey != NULL) { 1950 if (ckey == NULL) { 1985 skey = ssl_generate_pkey(s, ckey); 2012 if (ssl_derive(s, skey, ckey, 1) == 0) { 2027 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) {
|
| statem_clnt.c | 3190 EVP_PKEY *ckey = NULL, *skey = NULL; local 3203 ckey = ssl_generate_pkey(s, skey); 3204 if (ckey == NULL) { 3209 if (ssl_derive(s, ckey, skey, 0) == 0) { 3217 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub); 3220 EVP_PKEY_free(ckey); 3229 prime_len = EVP_PKEY_get_size(ckey); 3247 EVP_PKEY_free(ckey); 3255 EVP_PKEY *ckey = NULL, *skey = NULL; local 3264 ckey = ssl_generate_pkey(s, skey) [all...] |
| statem_srvr.c | 3098 EVP_PKEY *ckey = NULL; local 3120 ckey = EVP_PKEY_new(); 3121 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { 3126 if (EVP_PKEY_set1_encoded_public_key(ckey, data, i) <= 0) { 3131 if (ssl_derive(s, skey, ckey, 1) == 0) { 3140 EVP_PKEY_free(ckey); 3147 EVP_PKEY *ckey = NULL; local 3174 ckey = EVP_PKEY_new(); 3175 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kerberos5.c | 1113 METHOD_DATA *md, Key *ckey) 1126 ret = make_etype_info_entry(context, &pa.val[0], ckey); 1232 METHOD_DATA *md, Key *ckey) 1244 ret = make_etype_info2_entry(&pa.val[0], ckey); 1877 Key *ckey = NULL; local 1894 r->client, b->etype.val, b->etype.len, NULL, &ckey); 1909 if (older_enctype(ckey->key.keytype)) { 1911 &error_method, ckey); 1916 &error_method, ckey); 1931 if (ckey == NULL) [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| extensions_clnt.c | 1768 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; local 1772 if (ckey == NULL || s->s3.peer_tmp != NULL) { 1865 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { 1878 if (ssl_derive(s, ckey, skey, 1) == 0) { 1889 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) {
|
| extensions_srvr.c | 1600 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; local 1604 if (ckey != NULL) { 1619 if (ckey == NULL) { 1649 skey = ssl_generate_pkey(s, ckey); 1676 if (ssl_derive(s, skey, ckey, 1) == 0) { 1691 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) {
|
| statem_clnt.c | 2907 EVP_PKEY *ckey = NULL, *skey = NULL; local 2920 ckey = ssl_generate_pkey(s, skey); 2921 if (ckey == NULL) { 2926 if (ssl_derive(s, ckey, skey, 0) == 0) { 2934 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub); 2937 EVP_PKEY_free(ckey); 2946 prime_len = EVP_PKEY_get_size(ckey); 2964 EVP_PKEY_free(ckey); 2972 EVP_PKEY *ckey = NULL, *skey = NULL; local 2981 ckey = ssl_generate_pkey(s, skey) [all...] |
| statem_srvr.c | 2959 EVP_PKEY *ckey = NULL; local 2981 ckey = EVP_PKEY_new(); 2982 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { 2987 if (!EVP_PKEY_set1_encoded_public_key(ckey, data, i)) { 2992 if (ssl_derive(s, skey, ckey, 1) == 0) { 3001 EVP_PKEY_free(ckey); 3008 EVP_PKEY *ckey = NULL; local 3035 ckey = EVP_PKEY_new(); 3036 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| extensions_clnt.c | 1815 EVP_PKEY *ckey = s->s3->tmp.pkey, *skey = NULL; local 1818 if (ckey == NULL || s->s3->peer_tmp != NULL) { 1887 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { 1901 if (ssl_derive(s, ckey, skey, 1) == 0) {
|
| extensions_srvr.c | 1687 EVP_PKEY *ckey = s->s3->peer_tmp, *skey = NULL; local 1690 if (ckey != NULL) { 1707 if (ckey == NULL) { 1732 skey = ssl_generate_pkey(ckey); 1760 if (ssl_derive(s, skey, ckey, 1) == 0) {
|
| statem_clnt.c | 3069 EVP_PKEY *ckey = NULL, *skey = NULL; local 3079 ckey = ssl_generate_pkey(skey); 3080 if (ckey == NULL) { 3086 dh_clnt = EVP_PKEY_get0_DH(ckey); 3094 if (ssl_derive(s, ckey, skey, 0) == 0) { 3109 EVP_PKEY_free(ckey); 3113 EVP_PKEY_free(ckey); 3127 EVP_PKEY *ckey = NULL, *skey = NULL; local 3137 ckey = ssl_generate_pkey(skey); 3138 if (ckey == NULL) [all...] |
| statem_srvr.c | 3176 EVP_PKEY *ckey = NULL; local 3202 ckey = EVP_PKEY_new(); 3203 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { 3209 cdh = EVP_PKEY_get0_DH(ckey); 3218 if (ssl_derive(s, skey, ckey, 1) == 0) { 3227 EVP_PKEY_free(ckey); 3241 EVP_PKEY *ckey = NULL; local 3271 ckey = EVP_PKEY_new(); 3272 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) [all...] |
| /src/sys/external/bsd/drm2/dist/drm/i915/display/ |
| intel_display_types.h | 612 struct drm_intel_sprite_colorkey ckey; member in struct:intel_plane_state
|
| /src/sys/net/ |
| if_wg.c | 991 wg_init_key_and_hash(uint8_t ckey[static WG_CHAINING_KEY_LEN], 1000 blake2s(ckey, WG_CHAINING_KEY_LEN, NULL, 0, 1004 memcpy(hash, ckey, WG_CHAINING_KEY_LEN); 1007 blake2s_update(&state, ckey, WG_CHAINING_KEY_LEN); 1011 WG_DUMP_HASH("ckey", ckey); 1141 const uint8_t ckey[static WG_CHAINING_KEY_LEN], 1153 WG_DUMP_HASH("ckey", ckey); 1156 wg_algo_hmac(tmp1, sizeof(tmp1), ckey, WG_CHAINING_KEY_LEN 1438 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.2: Ci *\/ local 1596 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.2: Ci *\/ local 2010 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.3: Cr *\/ local 2201 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.3: Cr *\/ local [all...] |
| /src/external/gpl3/gcc/dist/gcc/analyzer/ |
| region-model.cc | 6684 const concrete_binding *ckey local 6686 gcc_assert (ckey); 6687 result += ckey->get_size_in_bits (); 6736 const concrete_binding *ckey local 6738 gcc_assert (ckey); 6739 uninit_keys.safe_push (ckey); 6758 const concrete_binding *ckey; local 6759 FOR_EACH_VEC_ELT (uninit_keys, i, ckey) 6761 bit_offset_t start_bit = ckey->get_start_bit_offset (); 6762 bit_offset_t next_bit = ckey->get_next_bit_offset () [all...] |