| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| ank.c | 74 krb5_key_data *key_data, 119 if(rand_key || key_data) { 186 } else if (key_data) { 188 3, key_data); 232 krb5_key_data key_data[3]; local 254 if (parse_des_key (opt->key_string, key_data, &error)) { 259 kdp = key_data; 282 kadm5_free_key_data (kadm_handle, &dummy, key_data);
|
| cpw.c | 44 krb5_key_data *key_data; member in struct:cpw_entry_data 120 set_key_data (krb5_principal principal, krb5_key_data *key_data, int keepold) 125 3, key_data); 138 else if (e->key_data) 139 return set_key_data (principal, e->key_data, e->keepold); 151 krb5_key_data key_data[3]; local 157 data.key_data = NULL; 178 if (parse_des_key (opt->key_string, key_data, &error)) { 183 data.key_data = key_data; [all...] |
| server.c | 363 krb5_key_data *key_data; local 382 (size_t)n_key_data > UINT_MAX/sizeof(*key_data)) { 388 key_data = malloc (n_key_data * sizeof(*key_data)); 389 if (key_data == NULL && n_key_data != 0) { 396 ret = kadm5_ret_key_data (sp, &key_data[i]); 400 kadm5_free_key_data (contextp, &dummy, key_data); 401 free (key_data); 419 kadm5_free_key_data (contextp, &dummy, key_data); 420 free (key_data); [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| db.c | 122 krb5_data key_data, data; local 137 key_data.data = key.data; 138 key_data.length = key.size; 156 hdb_key2principal(context, &key_data, entry->entry.principal);
|
| db3.c | 144 krb5_data key_data, data; local 155 key_data.data = key.data; 156 key_data.length = key.size; 174 hdb_key2principal(context, &key_data, entry->entry.principal);
|
| hdb-mdb.c | 115 krb5_data key_data, data; local 126 key_data.data = key.mv_data; 127 key_data.length = key.mv_size; 145 hdb_key2principal(context, &key_data, entry->entry.principal);
|
| ndbm.c | 85 krb5_data key_data, data; local 94 key_data.data = key.dptr; 95 key_data.length = key.dsize; 117 hdb_key2principal (context, &key_data, entry->entry.principal);
|
| hdb-mitdb.c | 89 version2 = salt in key_data->key_data_contents[1] 772 krb5_data key_data, data; local 793 key_data.data = key.data; 794 key_data.length = key.size; 1192 except if key_data length is 0
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| bftest.c | 197 static unsigned char key_data[8] = variable 248 printf("%02X", key_data[j]); 339 BF_ecb_encrypt(key_data, out, &key, BF_ENCRYPT);
|
| destest.c | 26 static unsigned char key_data[NUM_TESTS][8] = { variable 307 DES_set_key_unchecked(&key_data[i], &ks); 316 pt(key_data[i], b1), pt(in, b2)); 321 pt(key_data[i], b1), pt(out, b2)); 333 DES_set_key_unchecked(&key_data[i], &ks); 334 DES_set_key_unchecked(&key_data[i + 1], &ks2); 335 DES_set_key_unchecked(&key_data[i + 2], &ks3); 344 pt(key_data[i], b1), pt(in, b2)); 349 pt(key_data[i], b1), pt(out, b2));
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| verify-macos.c | 258 CFDataRef key_data, public_key = NULL; local 263 key_data = SecKeyCopyExternalRepresentation(key->public, &error); 265 data = CFDataGetBytePtr(key_data); 267 CFDataGetLength(key_data) - 1, kCFAllocatorNull); 291 if (key_data != NULL) { 292 CFRelease(key_data);
|
| /src/lib/libc/db/hash/ |
| hash_bigkey.c | 91 char *cp, *key_data, *val_data; local 97 key_data = (char *)key->data; 114 memmove(cp + off, key_data, (size_t)move_bytes); 116 key_data += move_bytes; 642 * pointer to the last page of the big key_data pair. Make sure that
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| bftest.c | 199 static unsigned char key_data[8] = { variable 251 printf("%02X", key_data[j]); 342 BF_ecb_encrypt(key_data, out, &key, BF_ENCRYPT);
|
| destest.c | 33 static unsigned char key_data[NUM_TESTS][8] = { variable 415 DES_set_key_unchecked(&key_data[i], &ks); 424 pt(key_data[i], b1), pt(in, b2)); 429 pt(key_data[i], b1), pt(out, b2)); 441 DES_set_key_unchecked(&key_data[i], &ks); 442 DES_set_key_unchecked(&key_data[i + 1], &ks2); 443 DES_set_key_unchecked(&key_data[i + 2], &ks3); 452 pt(key_data[i], b1), pt(in, b2)); 457 pt(key_data[i], b1), pt(out, b2));
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| bftest.c | 198 static unsigned char key_data[8] = variable 249 printf("%02X", key_data[j]); 340 BF_ecb_encrypt(key_data, out, &key, BF_ENCRYPT);
|
| destest.c | 33 static unsigned char key_data[NUM_TESTS][8] = { variable 314 DES_set_key_unchecked(&key_data[i], &ks); 323 pt(key_data[i], b1), pt(in, b2)); 328 pt(key_data[i], b1), pt(out, b2)); 340 DES_set_key_unchecked(&key_data[i], &ks); 341 DES_set_key_unchecked(&key_data[i + 1], &ks2); 342 DES_set_key_unchecked(&key_data[i + 2], &ks3); 351 pt(key_data[i], b1), pt(in, b2)); 356 pt(key_data[i], b1), pt(out, b2));
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 138 if (data->key_data) { 139 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 140 data->key_data = NULL; 212 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, 216 if (data->key_data) { 218 data->key_data, EAP_TLS_KEY_LEN); 220 data->key_data + EAP_TLS_KEY_LEN, 373 return data->key_data != NULL; 382 if (data->key_data == NULL [all...] |
| eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 186 if (data->key_data) { 187 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 188 data->key_data = NULL; 277 tk = data->key_data; 1151 data->key_data = 1156 if (data->key_data) { 1159 data->key_data, 1163 data->key_data + 1302 return data->key_data != NULL && data->phase2_success [all...] |
| eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || 1711 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 1762 key = os_memdup(data->key_data, EAP_FAST_KEY_LEN);
|
| eap_teap.c | 55 u8 key_data[EAP_TEAP_KEY_LEN]; member in struct:eap_teap_data 235 forced_memzero(data->key_data, EAP_TEAP_KEY_LEN); 282 data->key_data) < 0 || 2083 key = os_memdup(data->key_data, EAP_TEAP_KEY_LEN);
|
| eap_ttls.c | 57 u8 *key_data; member in struct:eap_ttls_data 207 if (data->key_data) { 208 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 209 data->key_data = NULL; 310 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, 314 if (!data->key_data) { 320 data->key_data, EAP_TLS_KEY_LEN); 322 data->key_data + EAP_TLS_KEY_LEN, 1823 return data->key_data != NULL && data->phase2_success; 1832 if (data->key_data == NULL || !data->phase2_success [all...] |
| /src/tests/lib/libdes/ |
| t_des.c | 70 static unsigned char key_data[NUM_TESTS][8] = { variable 531 des_set_key_unchecked(&key_data[i], ks); 541 pt(key_data[i]), pt(in), 547 pt(key_data[i]), pt(out), pt(in), 567 des_set_key_unchecked(&key_data[i], ks); 568 des_set_key_unchecked(&key_data[i + 1], ks2); 569 des_set_key_unchecked(&key_data[i + 2], ks3); 578 i + 1, pt(key_data[i]), pt(in), pt(cipher_ecb2[i]), 583 i + 1, pt(key_data[i]), pt(out), pt(in), pt(outin));
|
| /src/crypto/external/bsd/heimdal/dist/lib/base/ |
| db.c | 1571 const heim_octet_string *key_data = heim_data_get_data(key); local 1578 if (strnlen(key_data->data, key_data->length) != key_data->length) { 1608 key_string = heim_string_create_with_bytes(key_data->data, 1609 key_data->length); 1626 const heim_octet_string *key_data = heim_data_get_data(key); local 1632 if (strnlen(key_data->data, key_data->length) != key_data->length 1657 const heim_octet_string *key_data = heim_data_get_data(key); local 1690 heim_data_t key_data; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| admin.h | 170 krb5_key_data *key_data; member in struct:_kadm5_principal_ent_t
|
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| resolve.h | 146 u_char key_data[1]; member in struct:rk_key_record
|