/freebsd-9.3-release/sys/netipsec/ |
H A D | keydb.h | 78 char *key_data; member in struct:seckey
|
H A D | xform_esp.c | 222 crie.cri_key = sav->key_enc->key_data; 255 bzero(sav->key_enc->key_data, _KEYLEN(sav->key_enc)); 404 crda->crd_key = sav->key_auth->key_data; 443 crde->crd_key = sav->key_enc->key_data; 862 crde->crd_key = sav->key_enc->key_data; 903 crda->crd_key = sav->key_auth->key_data;
|
H A D | xform_ah.c | 227 cria->cri_key = sav->key_auth->key_data; 258 bzero(sav->key_auth->key_data, _KEYLEN(sav->key_auth)); 648 crda->crd_key = sav->key_auth->key_data; 1040 crda->crd_key = sav->key_auth->key_data;
|
H A D | key.c | 2889 bzero(sav->key_auth->key_data, _KEYLEN(sav->key_auth)); 2891 bzero(sav->key_enc->key_data, _KEYLEN(sav->key_enc)); 2894 if (sav->key_auth->key_data != NULL) 2895 free(sav->key_auth->key_data, M_IPSEC_MISC); 2900 if (sav->key_enc->key_data != NULL) 2901 free(sav->key_enc->key_data, M_IPSEC_MISC); 3859 dst->key_data = (char *)malloc(len, type, M_NOWAIT); 3860 if (dst->key_data != NULL) { 3862 dst->key_data, len); 8038 bcopy(src->key_data, _KEYBU [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | admin.h | 156 krb5_key_data *key_data; member in struct:_kadm5_principal_ent_t
|
H A D | ent_setup.c | 190 princ->n_key_data, princ->key_data);
|
H A D | ad.c | 1330 krb5_key_data *key_data) 1327 kadm5_ad_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument
|
/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | resolve.h | 199 u_char key_data[1]; member in struct:key_record
|
H A D | resolve.c | 268 memcpy (rr->u.key->key_data, p + 4, key_len);
|
/freebsd-9.3-release/lib/libc/db/hash/ |
H A D | hash_bigkey.c | 92 char *cp, *key_data, *val_data; local 97 key_data = (char *)key->data; 107 memmove(cp + off, key_data, move_bytes); 109 key_data += move_bytes; 610 * pointer to the last page of the big key_data pair. Make sure that
|
/freebsd-9.3-release/crypto/openssl/crypto/des/ |
H A D | destest.c | 92 static unsigned char key_data[NUM_TESTS][8] = { variable 434 DES_set_key_unchecked(&key_data[i], &ks); 443 i + 1, pt(key_data[i]), pt(in), pt(cipher_data[i]), 449 i + 1, pt(key_data[i]), pt(out), pt(in), pt(outin)); 457 DES_set_key_unchecked(&key_data[i], &ks); 458 DES_set_key_unchecked(&key_data[i + 1], &ks2); 459 DES_set_key_unchecked(&key_data[i + 2], &ks3); 468 i + 1, pt(key_data[i]), pt(in), pt(cipher_ecb2[i]), 474 i + 1, pt(key_data[i]), pt(out), pt(in), pt(outin));
|
/freebsd-9.3-release/crypto/openssl/crypto/bf/ |
H A D | bftest.c | 251 static unsigned char key_data[8] = variable 321 printf("%02X", key_data[j]); 453 BF_ecb_encrypt(key_data, out, &key, BF_ENCRYPT);
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | config.c | 56 int key_data; member in struct:parse_data 115 data->key_data ? "[KEY DATA REMOVED]" : value); 119 if (data->key_data) { 1905 if (field->key_data && !get_keys) 1995 if (field->key_data) { 1998 "key_data field to be "
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | get.c | 237 format_keytype(&princ->key_data[i], &def_salt, buf2, sizeof(buf2));
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_fast.c | 61 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 254 eap_fast_derive_eap_msk(data->simck, data->key_data); 1660 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 121 u8 *key_data, size_t key_len) 166 os_memcpy((u8 *) (key + 1), key_data, key_len); 118 ieee802_1x_tx_key_one(struct hostapd_data *hapd, struct sta_info *sta, int idx, int broadcast, u8 *key_data, size_t key_len) argument
|
/freebsd-9.3-release/sys/netinet/ |
H A D | tcp_subr.c | 2026 MD5Update(&ctx, sav->key_auth->key_data, _KEYLEN(sav->key_auth));
|
/freebsd-9.3-release/crypto/openssl/crypto/x509/ |
H A D | x509.h | 461 char *key_data; member in struct:private_key_st 462 int key_free; /* true if we should auto free key_data */
|