Searched refs:ckey (Results 1 - 7 of 7) sorted by relevance

/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dcrypto_cryptoapi.c164 HCRYPTKEY ckey; local
196 &ckey)) {
203 if (!CryptSetKeyParam(ckey, KP_MODE, (BYTE *) &mode, 0)) {
206 CryptDestroyKey(ckey);
213 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) {
219 CryptDestroyKey(ckey);
238 HCRYPTKEY ckey; member in struct:aes_context
276 0, 0, &akey->ckey)) {
284 if (!CryptSetKeyParam(akey->ckey, KP_MODE, (BYTE *) &mode, 0)) {
287 CryptDestroyKey(akey->ckey);
[all...]
/freebsd-9.3-release/lib/libc/rpc/
H A Dauth_des.c122 ckey: optional conversation key to use
127 const char *timehost, const des_block *ckey)
143 ckey, NULL);
154 const char *timehost, const des_block *ckey, nis_server *srvr)
209 if (ckey == NULL) {
216 auth->ah_key = *ckey;
126 authdes_seccreate(const char *servername, const u_int win, const char *timehost, const des_block *ckey) argument
153 authdes_pk_seccreate(const char *servername, netobj *pkey, u_int window, const char *timehost, const des_block *ckey, nis_server *srvr) argument
H A Drpc_soc.c425 authdes_create(servername, window, syncaddr, ckey)
429 des_block *ckey; /* optional conversation key to use */
444 nauth = authdes_seccreate(servername, window, hostname, ckey);
448 dummy = authdes_seccreate(servername, window, NULL, ckey);
/freebsd-9.3-release/crypto/heimdal/tests/kdc/
H A Dcheck-digest.in256 ckey=`grep session-key= cdigest-reply | cut -f2- -d=`
277 if test "X$skey" != "X$ckey" ; then
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dkerberos4.c139 Key *ckey, *skey; local
253 ret = _kdc_get_des_key(context, client, FALSE, FALSE, &ckey);
264 while(ckey->salt == NULL || ckey->salt->salt.length != 0)
265 ret = hdb_next_keytype2key(context, &client->entry, KEYTYPE_DES, &ckey);
329 &ckey->key,
H A Dkaserver.c450 Key *ckey = NULL; local
506 ret = _kdc_get_des_key(context, client_entry, FALSE, TRUE, &ckey);
526 memcpy (&key, ckey->key.keyvalue.data, sizeof(key));
574 &ckey->key, reply);
H A Dkerberos5.c244 int ckvno, const EncryptionKey *ckey,
305 ret = krb5_crypto_init(context, ckey, 0, &crypto);
967 Key *ckey, *skey; local
1354 &ckey, &cetype);
1621 reply_key = &ckey->key;
1638 set_salt_padata (rep.padata, ckey->salt);
239 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *ckey, const char **e_text, krb5_data *reply) argument

Completed in 84 milliseconds