/freebsd-10.0-release/contrib/apr-util/dbm/ |
H A D | apr_dbm_berkeleydb.c | 218 DBT ckey = { 0 }; local 222 ckey.data = key.dptr; 223 ckey.size = key.dsize; 225 dberr = do_fetch(GET_BDB(dbm->file), ckey, rd); 251 DBT ckey = { 0 }; local 254 ckey.data = key.dptr; 255 ckey.size = key.dsize; 262 &ckey, 273 DBT ckey = { 0 }; local 275 ckey 289 DBT ckey = { 0 }; /* converted key */ local 340 DBT ckey = { 0 }; local [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_cryptoapi.c | 158 HCRYPTKEY ckey; local 190 &ckey)) { 197 if (!CryptSetKeyParam(ckey, KP_MODE, (BYTE *) &mode, 0)) { 200 CryptDestroyKey(ckey); 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 213 CryptDestroyKey(ckey); 232 HCRYPTKEY ckey; member in struct:aes_context 270 0, 0, &akey->ckey)) { 278 if (!CryptSetKeyParam(akey->ckey, KP_MODE, (BYTE *) &mode, 0)) { 281 CryptDestroyKey(akey->ckey); [all...] |
/freebsd-10.0-release/lib/libc/rpc/ |
H A D | auth_des.c | 123 ckey: optional conversation key to use 128 const char *timehost, const des_block *ckey) 144 ckey, NULL); 155 const char *timehost, const des_block *ckey, nis_server *srvr) 210 if (ckey == NULL) { 217 auth->ah_key = *ckey; 127 authdes_seccreate(const char *servername, const u_int win, const char *timehost, const des_block *ckey) argument 154 authdes_pk_seccreate(const char *servername, netobj *pkey, u_int window, const char *timehost, const des_block *ckey, nis_server *srvr) argument
|
H A D | rpc_soc.c | 426 authdes_create(servername, window, syncaddr, ckey) 430 des_block *ckey; /* optional conversation key to use */ 445 nauth = authdes_seccreate(servername, window, hostname, ckey); 449 dummy = authdes_seccreate(servername, window, NULL, ckey);
|
/freebsd-10.0-release/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 524 METHOD_DATA *md, Key *ckey) 537 ret = make_etype_info_entry(context, &pa.val[0], ckey); 637 METHOD_DATA *md, Key *ckey) 649 ret = make_etype_info2_entry(&pa.val[0], ckey); 979 Key *ckey, *skey; local 1400 client, b->etype.val, b->etype.len, NULL, &ckey); 1415 if (older_enctype(ckey->key.keytype)) { 1417 &method_data, ckey); 1424 &method_data, ckey); 522 get_pa_etype_info(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument 635 get_pa_etype_info2(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | config.c | 1145 const void *ckey; 1151 apr_hash_this(cidx, &ckey, &ckeyLength, &cval); 1157 apr_pstrdup(pool, (const char*)ckey), 1130 const void *ckey; local
|
/freebsd-10.0-release/contrib/ntp/ntpd/ |
H A D | ntp_config.c | 1468 keyid_t ckey; local 1470 ckey = atol(tokens[1]); 1471 if (ckey == 0) { 1476 ctl_auth_keyid = ckey;
|