| /src/external/bsd/wpa/dist/src/crypto/ |
| sha384.c | 30 unsigned char tk[48]; local 44 if (sha384_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
| sha512.c | 30 unsigned char tk[64]; local 44 if (sha512_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
| md5.c | 30 u8 tk[16]; local 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 91 os_memset(tk, 0, sizeof(tk));
|
| sha1.c | 30 unsigned char tk[20]; local 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk; 90 forced_memzero(tk, sizeof(tk));
|
| sha256.c | 30 unsigned char tk[32]; local 45 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key = tk; 94 forced_memzero(tk, sizeof(tk));
|
| crypto_internal.c | 44 u8 tk[32]; local 79 MD5Final(tk, &ctx->u.md5); 80 key = tk; 98 SHA1Final(tk, &ctx->u.sha1); 99 key = tk; 118 sha256_done(&ctx->u.sha256, tk); 119 key = tk;
|
| /src/sys/netinet/ |
| sctp_hashdriver.c | 81 unsigned char tk[20]; local 89 MD5Final(tk, &tctx); 90 key = tk; 96 SHA1Final(tk, &tctx); 97 key = tk; 168 unsigned char tk[20]; local 176 MD5Final(tk, &tctx); 177 key = tk; 183 SHA1Final(tk, &tctx); 184 key = tk; [all...] |
| /src/external/bsd/tcpdump/dist/ |
| signature.c | 60 unsigned char tk[16]; local 70 MD5_Final(tk, &tctx); 72 key = tk;
|
| /src/external/mpl/dhcp/dist/omapip/ |
| auth.c | 80 omapi_auth_key_t *tk; local 87 tk = (omapi_auth_key_t *)0; 89 omapi_auth_key_hash_lookup (&tk, auth_key_hash, 91 if (tk == a) { 92 omapi_auth_key_dereference (&tk, MDL); 95 if (tk) { 97 tk -> name, 0, MDL); 98 omapi_auth_key_dereference (&tk, MDL);
|
| /src/crypto/dist/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
| rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[0][3] ^= S[tk[KC-1][0]] 100 #undef tk macro [all...] |
| /src/lib/libcrypt/ |
| hmac.c | 77 unsigned char tk[HASH_LENGTH]; local 89 HASH_Final(tk, &tctx); 91 key = tk;
|
| /src/lib/libresolv/ |
| hmac_link.c | 218 u_char tk[MD5_LEN]; local 233 MD5Final(tk, &ctx); 235 key = tk;
|
| /src/external/bsd/libbind/dist/dst/ |
| hmac_link.c | 228 u_char tk[MD5_LEN]; local 243 MD5Final(tk, &ctx); 245 key = tk;
|
| /src/sys/arch/sparc64/sparc64/ |
| clock.c | 628 int64_t tk = t; local 635 (long long)t, (long long)clk, (long long)tk, (long long)tick_base);
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/ppm/ |
| ppm.c | 468 char * tk; local 495 tk = strtok(val, ATTR_TOKENS_DELIMITERS); 497 while (tk != NULL) 499 if (strlen(tk) > 2) 503 tk, 507 reti = regcomp(®ex, tk, REG_ICASE); 509 ppm_log(LOG_ERR, "ppm: Cannot compile regex: %s", tk); 528 tk, 532 tk = strtok(NULL, ATTR_TOKENS_DELIMITERS);
|
| /src/external/bsd/ppp/dist/pppd/ |
| peap.c | 88 u_char tk[PEAP_TLV_TK_LEN]; member in struct:peap_state 193 generate_cmk(psm->ipmk, psm->tk, nonce, out_buf, 0); 304 SSL_export_keying_material(psm->ssl, psm->tk, PEAP_TLV_TK_LEN, 315 generate_cmk(psm->ipmk, psm->tk, psm->nonce, outp, 1);
|
| /src/external/bsd/wpa/dist/src/common/ |
| common_module_tests.c | 637 const u8 tk[] = { local 665 if (ptk.tk_len != sizeof(tk) || 666 os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) { 667 wpa_printf(MSG_ERROR, "PASN: Mismatched TK"); 716 const u8 tk[] = { local 750 if (ptk.tk_len != sizeof(tk) || 751 os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) [all...] |
| /src/external/bsd/tmux/dist/ |
| tty-keys.c | 436 struct tty_key *tk; local 441 if ((tk = tty_keys_find(tty, s, strlen(s), &size)) == NULL) { 446 tk->key = key; 454 struct tty_key *tk; local 457 tk = *tkp; 458 if (tk == NULL) { 459 tk = *tkp = xcalloc(1, sizeof *tk); 460 tk->ch = *s; 461 tk->key = KEYC_UNKNOWN 614 struct tty_key *tk, *tk1; local [all...] |
| /src/external/bsd/unbound/dist/validator/ |
| val_anchor.c | 864 struct ta_key* tk; local 915 for(tk = ta->keylist; tk; tk = tk->next) { 916 if(tk->type != type) 918 pd->rr_len[i] = tk->len; 920 pd->rr_data[i] = tk->data;
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_peap.c | 269 u8 *tk; local 274 * Tunnel key (TK) is the first 60 octets of the key generated by 277 tk = data->key_data; 278 if (tk == NULL) 280 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 288 /* Fast-connect: IPMK|CMK = TK */ 289 os_memcpy(data->ipmk, tk, 40); 290 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 292 os_memcpy(data->cmk, tk + 40, 20) [all...] |
| /src/external/gpl2/groff/dist/src/preproc/eqn/ |
| lex.cpp | 1087 int tk = get_token(1); local 1088 switch(tk) { 1146 return tk;
|
| /src/external/gpl2/xcvs/dist/lib/ |
| mktime.c | 558 check_result (time_t tk, struct tm tmk, time_t tl, const struct tm *lt) 560 if (tk != tl || !lt || not_equal_tm (&tmk, lt)) 566 printf (") == %ld, should be %ld\n", (long int) tk, (long int) tl); 579 time_t tk, tl, tl1; 619 tk = mktime (&tmk); 620 status |= check_result (tk, tmk, tl, &tml); 639 tk = tl; 640 status |= check_result (tk, tmk, tl, &tml); 578 time_t tk, tl, tl1; local
|
| /src/games/adventure/ |
| init.c | 123 int tk[21], stick, dtotal, attack; variable
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_peap.c | 329 u8 *tk; local 347 * Tunnel key (TK) is the first 60 octets of the key generated by 350 tk = eap_server_tls_derive_key(sm, &data->ssl, label, 353 if (tk == NULL) 355 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 358 /* Fast-connect: IPMK|CMK = TK */ 359 os_memcpy(data->ipmk, tk, 40); 360 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 362 os_memcpy(data->cmk, tk + 40, 20) [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/d/ |
| typeinfo.cc | 160 make_internal_typeinfo (tinfo_kind tk, Identifier *ident, ...) 186 tinfo_types[tk] = type; 1548 tinfo_kind tk = get_typeinfo_kind (t); local 1549 switch (tk) 1560 if (tk == TK_SHARED_TYPE) 1566 else if (tk == TK_CONST_TYPE) 1571 else if (tk == TK_IMMUTABLE_TYPE) 1576 else if (tk == TK_INOUT_TYPE) 1581 else if (tk == TK_POINTER_TYPE) 1586 else if (tk == TK_ARRAY_TYPE [all...] |