/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | generate_subkey.c | 37 * Generate subkey, from keyblock 41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 42 * @param subkey returned new, free with krb5_free_keyblock(). 53 krb5_keyblock **subkey) 57 ALLOC(*subkey, 1); 58 if (*subkey == NULL) { 67 ret = krb5_generate_random_keyblock(context, etype, *subkey); 69 free(*subkey); 70 *subkey = NULL; 50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | rd_rep.c | 102 if ((*repl)->subkey) 103 krb5_auth_con_setremotesubkey(context, auth_context, (*repl)->subkey);
|
H A D | mk_rep.c | 67 &body.subkey); 75 body.subkey = NULL;
|
H A D | get_cred.c | 90 krb5_keyblock *subkey) 112 ret = krb5_crypto_init(context, subkey, 0, &crypto); 137 * subkey in `subkey'. 150 krb5_keyblock **subkey, 271 ret = krb5_auth_con_getlocalsubkey(context, ac, subkey); 330 const krb5_keyblock *subkey = skey; local 341 * start out with trying with subkey if we have one 343 if (subkey) { 344 ret = krb5_crypto_init(context, subkey, 87 set_auth_data(krb5_context context, KDC_REQ_BODY *req_body, krb5_authdata *authdata, krb5_keyblock *subkey) argument 141 init_tgs_req(krb5_context context, krb5_ccache ccache, krb5_addresses *addresses, krb5_kdc_flags flags, Ticket *second_ticket, krb5_creds *in_creds, krb5_creds *krbtgt, unsigned nonce, const METHOD_DATA *padata, krb5_keyblock **subkey, TGS_REQ *t) argument 413 krb5_keyblock *subkey = NULL; local [all...] |
H A D | auth_context.c | 328 krb5_keyblock *subkey; local 332 &subkey); 337 auth_context->local_subkey = subkey;
|
H A D | build_auth.c | 128 ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth.subkey);
|
H A D | deprecated.c | 587 krb5_keyblock **subkey) 590 return krb5_generate_subkey_extended(context, key, ETYPE_NULL, subkey);
|
H A D | rd_req.c | 457 if (ac->authenticator->subkey) { 459 ac->authenticator->subkey);
|
/freebsd-11.0-release/sys/crypto/camellia/ |
H A D | camellia.h | 38 uint32_t subkey[CAMELLIA_SUBKEYWORD]; /* encrypt/decrypt key schedule */ member in struct:__anon8900 48 uint32_t *subkey); 52 const uint32_t *subkey, 57 const uint32_t *subkey, 60 void camellia_setup128(const unsigned char *key, uint32_t *subkey); 61 void camellia_setup192(const unsigned char *key, uint32_t *subkey); 62 void camellia_setup256(const unsigned char *key, uint32_t *subkey); 63 void camellia_encrypt128(const uint32_t *subkey, uint32_t *io); 64 void camellia_encrypt256(const uint32_t *subkey, uint32_t *io); 65 void camellia_decrypt128(const uint32_t *subkey, uint32_ [all...] |
H A D | camellia-api.c | 42 Camellia_Ekeygen(bits, key, ctx->subkey); 50 Camellia_DecryptBlock(ctx->bits, src, ctx->subkey, dst); 57 Camellia_EncryptBlock(ctx->bits, src, ctx->subkey, dst);
|
H A D | camellia.c | 77 #define SUBL(INDEX) (subkey[(INDEX)*2+1]) 78 #define SUBR(INDEX) (subkey[(INDEX)*2]) 440 camellia_setup128(const unsigned char *key, uint32_t *subkey) argument 646 camellia_setup256(const unsigned char *key, uint32_t *subkey) argument 926 camellia_setup192(const unsigned char *key, uint32_t *subkey) argument 938 camellia_setup256(kk, subkey); 946 camellia_encrypt128(const uint32_t *subkey, uint32_t *io) argument 1013 camellia_decrypt128(const uint32_t *subkey, uint32_t *io) argument 1083 camellia_encrypt256(const uint32_t *subkey, uint32_t *io) argument 1166 camellia_decrypt256(const uint32_t *subkey, uint32_ argument 1249 Camellia_Ekeygen(const int keyBitLength, const unsigned char *rawKey, uint32_t *subkey) argument 1271 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const uint32_t *subkey, unsigned char *ciphertext) argument 1303 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const uint32_t *subkey, unsigned char *plaintext) argument [all...] |
/freebsd-11.0-release/contrib/jemalloc/include/jemalloc/internal/ |
H A D | rtree.h | 246 uintptr_t subkey; local 260 subkey = rtree_subkey(rtree, key, level - \ 262 node = rtree_child_tryread(&node[subkey], dependent); \ 269 subkey = rtree_subkey(rtree, key, level - \ 275 return (rtree_val_read(rtree, &node[subkey], \ 337 uintptr_t subkey; local 347 subkey = rtree_subkey(rtree, key, i); 353 rtree_val_write(rtree, &node[subkey], val); 357 child = rtree_child_read(rtree, &node[subkey], i, false);
|
/freebsd-11.0-release/usr.sbin/ndiscvt/ |
H A D | inf.c | 572 * Keys with an empty subkey are very easy to parse, 578 if (reg->subkey == NULL) { 584 } else if (strncasecmp(reg->subkey, 601 sprintf(enumkey, "%s\\enum", r->subkey); 605 if (reg->subkey == NULL || strcasecmp(reg->subkey, enumkey)) 621 if (reg->subkey == NULL || strcasecmp(reg->subkey, r->subkey)) 643 if (reg->subkey [all...] |
H A D | inf.h | 30 const char * subkey; member in struct:reg
|
/freebsd-11.0-release/sys/dev/bhnd/tools/ |
H A D | nvram_map_gen.awk | 236 offk = subkey(revk, OFF, offset"") 240 segk = subkey(offk, OFF_SEG, seg"") 273 revk = subkey(v, REV, rev"") 292 st_offk = subkey(st_revk, OFF, offset"") 293 offk = subkey(revk, OFF, offset"") 301 st_segk = subkey(st_offk, OFF_SEG, seg"") 302 segk = subkey(offk, OFF_SEG, seg"") 322 srevk = subkey(st, REV, st_rev"") 347 st_revk = subkey(st, REV, srev"") 354 offk = subkey(st_rev 594 function subkey (parent, selector, child) function [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 188 * subkey[6] EncryptionKey OPTIONAL, 200 KRB5_ENCKEY *subkey; member in struct:krb5_authenticator_st
|
H A D | krb5_asn.c | 149 ASN1_EXP_OPT(KRB5_AUTHENTBODY, subkey, KRB5_ENCKEY, 6),
|
/freebsd-11.0-release/sys/kgssapi/krb5/ |
H A D | kcrypto_des3.c | 109 int subkey; local 111 for (subkey = 0, outkey = ks->ks_key, inkey = in; subkey < 3; 112 subkey++, outkey += 8, inkey += 7) {
|
/freebsd-11.0-release/lib/libnv/tests/ |
H A D | nv_tests.cc | 200 const char *key, *subkey; local 206 subkey = "subkey"; 213 nvlist_add_null(sublist, subkey); 223 ATF_REQUIRE(nvlist_exists_null(value, subkey));
|
/freebsd-11.0-release/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 1160 krb5_keyblock *subkey = NULL; local 1312 ret = krb5_auth_con_getremotesubkey(context, ac, &subkey); 1316 kdc_log(context, config, 0, "Failed to get remote subkey: %s", msg); 1320 if(subkey == NULL){ 1324 ret = krb5_auth_con_getkey(context, ac, &subkey); 1333 if(subkey == NULL){ 1341 *replykey = subkey; 1346 ret = krb5_crypto_init(context, subkey, 0, &crypto);
|
/freebsd-11.0-release/sys/compat/ndis/ |
H A D | subr_ndis.c | 522 NdisOpenConfigurationKeyByName(status, cfg, subkey, subhandle) 525 unicode_string *subkey; 533 NdisOpenConfigurationKeyByIndex(status, cfg, idx, subkey, subhandle) 537 unicode_string *subkey;
|
/freebsd-11.0-release/contrib/ntp/sntp/libevent/ |
H A D | evdns.c | 3778 config_nameserver_from_reg_key(struct evdns_base *base, HKEY key, const TCHAR *subkey) argument 3785 if (RegQueryValueEx(key, subkey, 0, &type, NULL, &bufsz) 3791 if (RegQueryValueEx(key, subkey, 0, &type, (LPBYTE)buf, &bufsz)
|