/freebsd-11-stable/lib/libc/stdio/ |
H A D | fmemopen.c | 55 struct fmemopen_cookie *ck; local 86 ck = malloc(sizeof(struct fmemopen_cookie)); 87 if (ck == NULL) { 91 ck->off = 0; 92 ck->size = size; 95 ck->own = ((ck->buf = buf) == NULL); 96 if (ck->own) { 97 ck->buf = malloc(size); 98 if (ck 167 struct fmemopen_cookie *ck = cookie; local 185 struct fmemopen_cookie *ck = cookie; local 215 struct fmemopen_cookie *ck = cookie; local 254 struct fmemopen_cookie *ck = cookie; local [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len) 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, i 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/freebsd-11-stable/sys/modules/ipfw/ |
H A D | Makefile | 12 CFLAGS+= -DIPFIREWALL -I${SRCTOP}/sys/contrib/ck/include
|
/freebsd-11-stable/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 333 struct ub_packed_rrset_key* ck = regional_alloc(region, local 340 if(!ck) 342 ck->id = key->id; 343 memset(&ck->entry, 0, sizeof(ck->entry)); 344 ck->entry.hash = key->entry.hash; 345 ck->entry.key = ck; 346 ck->rk = key->rk; 347 ck [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_pax_common.c | 124 * @ck: Buffer for the derived Confirmation Key 130 u8 *mk, u8 *ck, u8 *ick, u8 *mid) 136 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 129 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick, u8 *mid) argument
|
H A D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_pax_common.h | 90 u8 *mk, u8 *ck, u8 *ick, u8 *mid);
|
H A D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 66 addr[2] = ck; 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 276 const u8 *ik, const u8 *ck, u8 *k_encr, 294 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN); 424 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument 458 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK", ck, EAP_AKA_CK_LEN); 465 os_memcpy(key, ck, EAP_AKA_CK_LEN); 487 os_memcpy(ck, hash, EAP_AKA_CK_LEN); 489 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK'", ck, EAP_AKA_CK_LE 56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/utils/ |
H A D | pcsc_funcs.h | 24 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/freebsd-11-stable/sys/modules/linuxkpi/ |
H A D | Makefile | 26 CFLAGS+= -I${SRCTOP}/sys/contrib/ck/include
|
/freebsd-11-stable/contrib/telnet/libtelnet/ |
H A D | sra.c | 59 DesData ck; variable 182 common_key(ska,pkb,&ik,&ck); 191 pk_decode(xuser,user,&ck); 203 pk_decode(xpass,pass,&ck); 210 skey.data = ck; 267 common_key(ska,pkb,&ik,&ck); 287 pk_encode(user,xuser,&ck); 308 pk_encode(pass,xpass,&ck); 328 skey.data = ck;
|
H A D | kerberos.c | 471 int ck = 0; local 488 ck ^= (int)*d++ << 24; 491 ck ^= (int)*d++ << 16; 494 ck ^= (int)*d++ << 8; 497 ck ^= (int)*d++; 500 return(ck);
|
H A D | pk.c | 62 extractideakey(MINT *ck, IdeaData *ideakey) argument 73 mp_madd(ck, z, a); 91 extractdeskey(MINT *ck, DesData *deskey) argument 102 mp_madd(ck, z, a);
|
/freebsd-11-stable/contrib/unbound/services/cache/ |
H A D | dns.c | 90 struct ub_packed_rrset_key* ck; local 94 ck = NULL; 95 else ck = packed_rrset_copy_region( 98 if(ck) { 100 qrep->rrsets[i] = ck; 647 struct ub_packed_rrset_key* ck; local 693 ck = (struct ub_packed_rrset_key*)regional_alloc(region, 695 if(!ck) 697 memset(&ck->entry, 0, sizeof(ck [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_server_pax.c | 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 152 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 409 data->rand.e, data->mk, data->ck, 418 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/freebsd-11-stable/contrib/unbound/respip/ |
H A D | respip.c | 489 struct ub_packed_rrset_key* ck = regional_alloc(region, local 498 if(!ck) 500 ck->id = key->id; 501 memset(&ck->entry, 0, sizeof(ck->entry)); 502 ck->entry.hash = key->entry.hash; 503 ck->entry.key = ck; 504 ck->rk = key->rk; 506 ck [all...] |
/freebsd-11-stable/contrib/ntp/ntpd/ |
H A D | refclock_mx4200.c | 669 u_char ck; local 741 ck = mx4200_cksum(&pp->a_lastcode[1], pp->lencode - 4); 742 if (char2hex[ck >> 4] != cp[1] || char2hex[ck & 0xf] != cp[2]) { 1118 register u_char ck; local 1120 for (ck = 0; n-- > 0; cp++) 1121 ck ^= *cp; 1122 return (ck); 1603 u_char ck; local 1622 ck [all...] |
/freebsd-11-stable/sys/i386/i386/ |
H A D | bios.c | 82 u_int8_t ck, *cv; local 95 for (cv = (u_int8_t *)sdh, ck = 0, i = 0; i < (sdh->len * 16); i++) { 96 ck += cv[i]; 99 if ((ck == 0) && (BIOS_START <= sdh->entry ) && 133 for (cv = (u_int8_t *)pt, ck = 0, i = 0; i < pt->len; i++) { 134 ck += cv[i]; 137 if (ck == 0) {
|
/freebsd-11-stable/usr.sbin/keyserv/ |
H A D | setkey.c | 274 extractdeskey(ck, deskey) 275 MINT *ck; 286 _mp_move(ck, a); 288 mp_move(ck, a);
|
/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509_trs.c | 178 int X509_TRUST_add(int id, int flags, int (*ck) (X509_TRUST *, X509 *, int), 215 trtmp->check_trust = ck;
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_pax.c | 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick, 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 278 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
H A D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 224 if (hexstr2bin(pos, data->ck, EAP_AKA_CK_LEN) < 0) 226 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN); 271 data->ik, data->ck, data->auts); 304 data->ik, data->ck, 318 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 1033 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 1062 data->ck, data->k_encr, data->k_aut, 1065 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/freebsd-11-stable/sys/i386/pci/ |
H A D | pci_pir.c | 138 uint8_t ck, *cv; local 156 for (cv = (u_int8_t *)pt, ck = 0, i = 0; 158 ck += cv[i]; 159 if (ck != 0)
|