Searched refs:ck (Results 1 - 25 of 40) sorted by relevance

12

/freebsd-11-stable/lib/libc/stdio/
H A Dfmemopen.c55 struct fmemopen_cookie *ck; local
86 ck = malloc(sizeof(struct fmemopen_cookie));
87 if (ck == NULL) {
91 ck->off = 0;
92 ck->size = size;
95 ck->own = ((ck->buf = buf) == NULL);
96 if (ck->own) {
97 ck->buf = malloc(size);
98 if (ck
167 struct fmemopen_cookie *ck = cookie; local
185 struct fmemopen_cookie *ck = cookie; local
215 struct fmemopen_cookie *ck = cookie; local
254 struct fmemopen_cookie *ck = cookie; local
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dmilenage.c82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len)
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, i
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dmilenage.h14 u8 *ck, u8 *res, size_t *res_len);
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
/freebsd-11-stable/sys/modules/ipfw/
H A DMakefile12 CFLAGS+= -DIPFIREWALL -I${SRCTOP}/sys/contrib/ck/include
/freebsd-11-stable/contrib/unbound/util/data/
H A Dpacked_rrset.c333 struct ub_packed_rrset_key* ck = regional_alloc(region, local
340 if(!ck)
342 ck->id = key->id;
343 memset(&ck->entry, 0, sizeof(ck->entry));
344 ck->entry.hash = key->entry.hash;
345 ck->entry.key = ck;
346 ck->rk = key->rk;
347 ck
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_pax_common.c124 * @ck: Buffer for the derived Confirmation Key
130 u8 *mk, u8 *ck, u8 *ick, u8 *mid)
136 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
129 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick, u8 *mid) argument
H A Deap_sim_common.h79 const u8 *ik, const u8 *ck, u8 *mk);
93 const u8 *ik, const u8 *ck, u8 *k_encr,
104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
110 const u8 *ik, const u8 *ck,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_pax_common.h90 u8 *mk, u8 *ck, u8 *ick, u8 *mid);
H A Deap_sim_common.c57 const u8 *ik, const u8 *ck, u8 *mk)
66 addr[2] = ck;
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
276 const u8 *ik, const u8 *ck, u8 *k_encr,
294 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN);
424 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument
458 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK", ck, EAP_AKA_CK_LEN);
465 os_memcpy(key, ck, EAP_AKA_CK_LEN);
487 os_memcpy(ck, hash, EAP_AKA_CK_LEN);
489 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK'", ck, EAP_AKA_CK_LE
56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument
275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/utils/
H A Dpcsc_funcs.h24 unsigned char *ik, unsigned char *ck, unsigned char *auts);
/freebsd-11-stable/sys/modules/linuxkpi/
H A DMakefile26 CFLAGS+= -I${SRCTOP}/sys/contrib/ck/include
/freebsd-11-stable/contrib/telnet/libtelnet/
H A Dsra.c59 DesData ck; variable
182 common_key(ska,pkb,&ik,&ck);
191 pk_decode(xuser,user,&ck);
203 pk_decode(xpass,pass,&ck);
210 skey.data = ck;
267 common_key(ska,pkb,&ik,&ck);
287 pk_encode(user,xuser,&ck);
308 pk_encode(pass,xpass,&ck);
328 skey.data = ck;
H A Dkerberos.c471 int ck = 0; local
488 ck ^= (int)*d++ << 24;
491 ck ^= (int)*d++ << 16;
494 ck ^= (int)*d++ << 8;
497 ck ^= (int)*d++;
500 return(ck);
H A Dpk.c62 extractideakey(MINT *ck, IdeaData *ideakey) argument
73 mp_madd(ck, z, a);
91 extractdeskey(MINT *ck, DesData *deskey) argument
102 mp_madd(ck, z, a);
/freebsd-11-stable/contrib/unbound/services/cache/
H A Ddns.c90 struct ub_packed_rrset_key* ck; local
94 ck = NULL;
95 else ck = packed_rrset_copy_region(
98 if(ck) {
100 qrep->rrsets[i] = ck;
647 struct ub_packed_rrset_key* ck; local
693 ck = (struct ub_packed_rrset_key*)regional_alloc(region,
695 if(!ck)
697 memset(&ck->entry, 0, sizeof(ck
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_sim_db.h86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
H A Deap_server_pax.c37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
152 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
409 data->rand.e, data->mk, data->ck,
418 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
/freebsd-11-stable/contrib/unbound/respip/
H A Drespip.c489 struct ub_packed_rrset_key* ck = regional_alloc(region, local
498 if(!ck)
500 ck->id = key->id;
501 memset(&ck->entry, 0, sizeof(ck->entry));
502 ck->entry.hash = key->entry.hash;
503 ck->entry.key = ck;
504 ck->rk = key->rk;
506 ck
[all...]
/freebsd-11-stable/contrib/ntp/ntpd/
H A Drefclock_mx4200.c669 u_char ck; local
741 ck = mx4200_cksum(&pp->a_lastcode[1], pp->lencode - 4);
742 if (char2hex[ck >> 4] != cp[1] || char2hex[ck & 0xf] != cp[2]) {
1118 register u_char ck; local
1120 for (ck = 0; n-- > 0; cp++)
1121 ck ^= *cp;
1122 return (ck);
1603 u_char ck; local
1622 ck
[all...]
/freebsd-11-stable/sys/i386/i386/
H A Dbios.c82 u_int8_t ck, *cv; local
95 for (cv = (u_int8_t *)sdh, ck = 0, i = 0; i < (sdh->len * 16); i++) {
96 ck += cv[i];
99 if ((ck == 0) && (BIOS_START <= sdh->entry ) &&
133 for (cv = (u_int8_t *)pt, ck = 0, i = 0; i < pt->len; i++) {
134 ck += cv[i];
137 if (ck == 0) {
/freebsd-11-stable/usr.sbin/keyserv/
H A Dsetkey.c274 extractdeskey(ck, deskey)
275 MINT *ck;
286 _mp_move(ck, a);
288 mp_move(ck, a);
/freebsd-11-stable/crypto/openssl/crypto/x509/
H A Dx509_trs.c178 int X509_TRUST_add(int id, int flags, int (*ck) (X509_TRUST *, X509 *, int),
215 trtmp->check_trust = ck;
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_pax.c39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick,
207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
278 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
H A Deap_aka.c23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
224 if (hexstr2bin(pos, data->ck, EAP_AKA_CK_LEN) < 0)
226 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN);
271 data->ik, data->ck, data->auts);
304 data->ik, data->ck,
318 os_memset(data->ck, '4', EAP_AKA_CK_LEN);
1033 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
1062 data->ck, data->k_encr, data->k_aut,
1065 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
/freebsd-11-stable/sys/i386/pci/
H A Dpci_pir.c138 uint8_t ck, *cv; local
156 for (cv = (u_int8_t *)pt, ck = 0, i = 0;
158 ck += cv[i];
159 if (ck != 0)

Completed in 152 milliseconds

12