HomeSort by: relevance | last modified time | path
    Searched defs:ckey (Results 1 - 19 of 19) sorted by relevancy

  /src/external/gpl3/gcc/dist/libobjc/objc-private/
hash.h 170 const char *ckey = (const char *) key; local
172 while (*ckey) {
173 ret ^= *ckey++ << ctr;
  /src/external/gpl3/gcc.old/dist/libobjc/objc-private/
hash.h 170 const char *ckey = (const char *) key; local
172 while (*ckey) {
173 ret ^= *ckey++ << ctr;
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
test_engine_dso.c 84 void *skey, *ckey; local
88 ckey = emalloc(DH_size(client));
93 csize = DH_compute_key(ckey, server->pub_key, client);
100 if (memcmp(skey, ckey, csize) != 0)
104 free(ckey);
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
extensions_clnt.c 1879 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; local
1885 if (ckey == NULL || s->s3.peer_tmp != NULL) {
1953 ckey = s->s3.tmp.ks_pkey[i];
1955 s->s3.tmp.pkey = ckey;
2006 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) {
2020 if (ssl_derive(s, ckey, skey, 1) == 0) {
2031 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) {
extensions_srvr.c 1931 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; local
1935 if (ckey != NULL) {
1950 if (ckey == NULL) {
1985 skey = ssl_generate_pkey(s, ckey);
2012 if (ssl_derive(s, skey, ckey, 1) == 0) {
2027 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) {
statem_clnt.c 3190 EVP_PKEY *ckey = NULL, *skey = NULL; local
3203 ckey = ssl_generate_pkey(s, skey);
3204 if (ckey == NULL) {
3209 if (ssl_derive(s, ckey, skey, 0) == 0) {
3217 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub);
3220 EVP_PKEY_free(ckey);
3229 prime_len = EVP_PKEY_get_size(ckey);
3247 EVP_PKEY_free(ckey);
3255 EVP_PKEY *ckey = NULL, *skey = NULL; local
3264 ckey = ssl_generate_pkey(s, skey)
    [all...]
statem_srvr.c 3098 EVP_PKEY *ckey = NULL; local
3120 ckey = EVP_PKEY_new();
3121 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) {
3126 if (EVP_PKEY_set1_encoded_public_key(ckey, data, i) <= 0) {
3131 if (ssl_derive(s, skey, ckey, 1) == 0) {
3140 EVP_PKEY_free(ckey);
3147 EVP_PKEY *ckey = NULL; local
3174 ckey = EVP_PKEY_new();
3175 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0)
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
kerberos5.c 1113 METHOD_DATA *md, Key *ckey)
1126 ret = make_etype_info_entry(context, &pa.val[0], ckey);
1232 METHOD_DATA *md, Key *ckey)
1244 ret = make_etype_info2_entry(&pa.val[0], ckey);
1877 Key *ckey = NULL; local
1894 r->client, b->etype.val, b->etype.len, NULL, &ckey);
1909 if (older_enctype(ckey->key.keytype)) {
1911 &error_method, ckey);
1916 &error_method, ckey);
1931 if (ckey == NULL)
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
extensions_clnt.c 1768 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; local
1772 if (ckey == NULL || s->s3.peer_tmp != NULL) {
1865 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) {
1878 if (ssl_derive(s, ckey, skey, 1) == 0) {
1889 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) {
extensions_srvr.c 1600 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; local
1604 if (ckey != NULL) {
1619 if (ckey == NULL) {
1649 skey = ssl_generate_pkey(s, ckey);
1676 if (ssl_derive(s, skey, ckey, 1) == 0) {
1691 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) {
statem_clnt.c 2907 EVP_PKEY *ckey = NULL, *skey = NULL; local
2920 ckey = ssl_generate_pkey(s, skey);
2921 if (ckey == NULL) {
2926 if (ssl_derive(s, ckey, skey, 0) == 0) {
2934 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub);
2937 EVP_PKEY_free(ckey);
2946 prime_len = EVP_PKEY_get_size(ckey);
2964 EVP_PKEY_free(ckey);
2972 EVP_PKEY *ckey = NULL, *skey = NULL; local
2981 ckey = ssl_generate_pkey(s, skey)
    [all...]
statem_srvr.c 2959 EVP_PKEY *ckey = NULL; local
2981 ckey = EVP_PKEY_new();
2982 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) {
2987 if (!EVP_PKEY_set1_encoded_public_key(ckey, data, i)) {
2992 if (ssl_derive(s, skey, ckey, 1) == 0) {
3001 EVP_PKEY_free(ckey);
3008 EVP_PKEY *ckey = NULL; local
3035 ckey = EVP_PKEY_new();
3036 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
extensions_clnt.c 1815 EVP_PKEY *ckey = s->s3->tmp.pkey, *skey = NULL; local
1818 if (ckey == NULL || s->s3->peer_tmp != NULL) {
1887 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) {
1901 if (ssl_derive(s, ckey, skey, 1) == 0) {
extensions_srvr.c 1687 EVP_PKEY *ckey = s->s3->peer_tmp, *skey = NULL; local
1690 if (ckey != NULL) {
1707 if (ckey == NULL) {
1732 skey = ssl_generate_pkey(ckey);
1760 if (ssl_derive(s, skey, ckey, 1) == 0) {
statem_clnt.c 3069 EVP_PKEY *ckey = NULL, *skey = NULL; local
3079 ckey = ssl_generate_pkey(skey);
3080 if (ckey == NULL) {
3086 dh_clnt = EVP_PKEY_get0_DH(ckey);
3094 if (ssl_derive(s, ckey, skey, 0) == 0) {
3109 EVP_PKEY_free(ckey);
3113 EVP_PKEY_free(ckey);
3127 EVP_PKEY *ckey = NULL, *skey = NULL; local
3137 ckey = ssl_generate_pkey(skey);
3138 if (ckey == NULL)
    [all...]
statem_srvr.c 3176 EVP_PKEY *ckey = NULL; local
3202 ckey = EVP_PKEY_new();
3203 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) {
3209 cdh = EVP_PKEY_get0_DH(ckey);
3218 if (ssl_derive(s, skey, ckey, 1) == 0) {
3227 EVP_PKEY_free(ckey);
3241 EVP_PKEY *ckey = NULL; local
3271 ckey = EVP_PKEY_new();
3272 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0)
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/i915/display/
intel_display_types.h 612 struct drm_intel_sprite_colorkey ckey; member in struct:intel_plane_state
  /src/sys/net/
if_wg.c 991 wg_init_key_and_hash(uint8_t ckey[static WG_CHAINING_KEY_LEN],
1000 blake2s(ckey, WG_CHAINING_KEY_LEN, NULL, 0,
1004 memcpy(hash, ckey, WG_CHAINING_KEY_LEN);
1007 blake2s_update(&state, ckey, WG_CHAINING_KEY_LEN);
1011 WG_DUMP_HASH("ckey", ckey);
1141 const uint8_t ckey[static WG_CHAINING_KEY_LEN],
1153 WG_DUMP_HASH("ckey", ckey);
1156 wg_algo_hmac(tmp1, sizeof(tmp1), ckey, WG_CHAINING_KEY_LEN
1438 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.2: Ci *\/ local
1596 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.2: Ci *\/ local
2010 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.3: Cr *\/ local
2201 uint8_t ckey[WG_CHAINING_KEY_LEN]; \/* [W] 5.4.3: Cr *\/ local
    [all...]
  /src/external/gpl3/gcc/dist/gcc/analyzer/
region-model.cc 6684 const concrete_binding *ckey local
6686 gcc_assert (ckey);
6687 result += ckey->get_size_in_bits ();
6736 const concrete_binding *ckey local
6738 gcc_assert (ckey);
6739 uninit_keys.safe_push (ckey);
6758 const concrete_binding *ckey; local
6759 FOR_EACH_VEC_ELT (uninit_keys, i, ckey)
6761 bit_offset_t start_bit = ckey->get_start_bit_offset ();
6762 bit_offset_t next_bit = ckey->get_next_bit_offset ()
    [all...]

Completed in 61 milliseconds