/freebsd-13-stable/contrib/apr-util/dbm/ |
H A D | apr_dbm_berkeleydb.c | 218 DBT ckey = { 0 }; local 222 ckey.data = key.dptr; 223 ckey.size = key.dsize; 225 dberr = do_fetch(GET_BDB(dbm->file), ckey, rd); 251 DBT ckey = { 0 }; local 254 ckey.data = key.dptr; 255 ckey.size = key.dsize; 262 &ckey, 273 DBT ckey = { 0 }; local 275 ckey 289 DBT ckey = { 0 }; /* converted key */ local 340 DBT ckey = { 0 }; local [all...] |
/freebsd-13-stable/lib/libc/rpc/ |
H A D | auth_des.c | 124 ckey: optional conversation key to use 129 const char *timehost, const des_block *ckey) 145 ckey, NULL); 156 const char *timehost, const des_block *ckey, nis_server *srvr) 211 if (ckey == NULL) { 218 auth->ah_key = *ckey; 128 authdes_seccreate(const char *servername, const u_int win, const char *timehost, const des_block *ckey) argument 155 authdes_pk_seccreate(const char *servername, netobj *pkey, u_int window, const char *timehost, const des_block *ckey, nis_server *srvr) argument
|
H A D | rpc_soc.c | 392 des_block *ckey) 397 * des_block *ckey; // optional conversation key to use 413 nauth = authdes_seccreate(servername, window, hostname, ckey); 417 dummy = authdes_seccreate(servername, window, NULL, ckey); 391 authdes_create(char *servername, u_int window, struct sockaddr *syncaddr, des_block *ckey) argument
|
/freebsd-13-stable/crypto/openssl/crypto/ec/ |
H A D | ec_kmeth.c | 198 int (*ckey)(unsigned char **psec, 203 meth->compute_key = ckey;
|
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 3063 EVP_PKEY *ckey = NULL, *skey = NULL; local 3073 ckey = ssl_generate_pkey(skey); 3074 if (ckey == NULL) { 3080 dh_clnt = EVP_PKEY_get0_DH(ckey); 3088 if (ssl_derive(s, ckey, skey, 0) == 0) { 3103 EVP_PKEY_free(ckey); 3107 EVP_PKEY_free(ckey); 3121 EVP_PKEY *ckey = NULL, *skey = NULL; local 3131 ckey = ssl_generate_pkey(skey); 3132 if (ckey [all...] |
H A D | statem_srvr.c | 3176 EVP_PKEY *ckey = NULL; local 3202 ckey = EVP_PKEY_new(); 3203 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { 3209 cdh = EVP_PKEY_get0_DH(ckey); 3218 if (ssl_derive(s, skey, ckey, 1) == 0) { 3227 EVP_PKEY_free(ckey); 3241 EVP_PKEY *ckey = NULL; local 3271 ckey = EVP_PKEY_new(); 3272 if (ckey [all...] |
H A D | extensions_srvr.c | 1688 EVP_PKEY *ckey = s->s3->peer_tmp, *skey = NULL; local 1691 if (ckey != NULL) { 1708 if (ckey == NULL) { 1726 skey = ssl_generate_pkey(ckey); 1754 if (ssl_derive(s, skey, ckey, 1) == 0) {
|
H A D | extensions_clnt.c | 1800 EVP_PKEY *ckey = s->s3->tmp.pkey, *skey = NULL; local 1803 if (ckey == NULL || s->s3->peer_tmp != NULL) { 1872 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { 1885 if (ssl_derive(s, ckey, skey, 1) == 0) {
|
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 524 METHOD_DATA *md, Key *ckey) 537 ret = make_etype_info_entry(context, &pa.val[0], ckey); 637 METHOD_DATA *md, Key *ckey) 649 ret = make_etype_info2_entry(&pa.val[0], ckey); 979 Key *ckey, *skey; local 1400 client, b->etype.val, b->etype.len, NULL, &ckey); 1415 if (older_enctype(ckey->key.keytype)) { 1417 &method_data, ckey); 1424 &method_data, ckey); 522 get_pa_etype_info(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument 635 get_pa_etype_info2(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument
|
/freebsd-13-stable/sys/dev/safexcel/ |
H A D | safexcel.c | 1386 const uint8_t *ckey, const uint8_t *akey, struct safexcel_session *sess) 1404 memcpy(data, ckey, cklen); 1415 safexcel_setkey_ghash(ckey, cklen, (uint32_t *)(data + off)); 1419 safexcel_setkey_xcbcmac(ckey, cklen, (uint32_t *)(data + off)); 1423 safexcel_setkey_xts(ckey, cklen, data + off); 1884 const uint8_t *akey, *ckey; local 1894 ckey = crp->crp_cipher_key; 1895 if (akey != NULL || ckey != NULL) { 1902 if (ckey == NULL) 1903 ckey 1385 safexcel_set_context(struct safexcel_context_record *ctx, int op, const uint8_t *ckey, const uint8_t *akey, struct safexcel_session *sess) argument [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zio_crypt.c | 1877 crypto_key_t tmp_ckey, *ckey = NULL; local 1891 ckey = &key->zk_current_key; 1906 ckey = &tmp_ckey; 1929 dstbuf, NULL, 0, iv, mac, ckey, key->zk_crypt, datalen); 1952 ret = zio_do_crypt_uio(encrypt, key->zk_crypt, ckey, tmpl, iv, enc_len, 1964 if (ckey == &tmp_ckey) 1976 if (ckey == &tmp_ckey)
|
/freebsd-13-stable/sys/contrib/openzfs/module/os/freebsd/zfs/ |
H A D | zio_crypt.c | 1677 crypto_key_t tmp_ckey, *ckey = NULL; local 1717 ckey = &key->zk_current_key; 1731 ckey = &tmp_ckey; 1737 ckey, iv, enc_len, &cuio, auth_len); 1747 if (ckey == &tmp_ckey) 1766 if (ckey == &tmp_ckey)
|
/freebsd-13-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | config.c | 1278 const void *ckey; 1284 apr_hash_this(cidx, &ckey, &ckeyLength, &cval); 1290 apr_pstrdup(pool, (const char*)ckey), 1263 const void *ckey; local
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | ec.h | 1296 int (*ckey)(unsigned char **psec,
|
/freebsd-13-stable/crypto/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 951 call _${alg}${bits}_load_${dir}ckey
|