Searched refs:ckey (Results 1 - 7 of 7) sorted by relevance
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_cryptoapi.c | 164 HCRYPTKEY ckey; local 196 &ckey)) { 203 if (!CryptSetKeyParam(ckey, KP_MODE, (BYTE *) &mode, 0)) { 206 CryptDestroyKey(ckey); 213 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 219 CryptDestroyKey(ckey); 238 HCRYPTKEY ckey; member in struct:aes_context 276 0, 0, &akey->ckey)) { 284 if (!CryptSetKeyParam(akey->ckey, KP_MODE, (BYTE *) &mode, 0)) { 287 CryptDestroyKey(akey->ckey); [all...] |
/freebsd-9.3-release/lib/libc/rpc/ |
H A D | auth_des.c | 122 ckey: optional conversation key to use 127 const char *timehost, const des_block *ckey) 143 ckey, NULL); 154 const char *timehost, const des_block *ckey, nis_server *srvr) 209 if (ckey == NULL) { 216 auth->ah_key = *ckey; 126 authdes_seccreate(const char *servername, const u_int win, const char *timehost, const des_block *ckey) argument 153 authdes_pk_seccreate(const char *servername, netobj *pkey, u_int window, const char *timehost, const des_block *ckey, nis_server *srvr) argument
|
H A D | rpc_soc.c | 425 authdes_create(servername, window, syncaddr, ckey) 429 des_block *ckey; /* optional conversation key to use */ 444 nauth = authdes_seccreate(servername, window, hostname, ckey); 448 dummy = authdes_seccreate(servername, window, NULL, ckey);
|
/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-digest.in | 256 ckey=`grep session-key= cdigest-reply | cut -f2- -d=` 277 if test "X$skey" != "X$ckey" ; then
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | kerberos4.c | 139 Key *ckey, *skey; local 253 ret = _kdc_get_des_key(context, client, FALSE, FALSE, &ckey); 264 while(ckey->salt == NULL || ckey->salt->salt.length != 0) 265 ret = hdb_next_keytype2key(context, &client->entry, KEYTYPE_DES, &ckey); 329 &ckey->key,
|
H A D | kaserver.c | 450 Key *ckey = NULL; local 506 ret = _kdc_get_des_key(context, client_entry, FALSE, TRUE, &ckey); 526 memcpy (&key, ckey->key.keyvalue.data, sizeof(key)); 574 &ckey->key, reply);
|
H A D | kerberos5.c | 244 int ckvno, const EncryptionKey *ckey, 305 ret = krb5_crypto_init(context, ckey, 0, &crypto); 967 Key *ckey, *skey; local 1354 &ckey, &cetype); 1621 reply_key = &ckey->key; 1638 set_salt_padata (rep.padata, ckey->salt); 239 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *ckey, const char **e_text, krb5_data *reply) argument
|
Completed in 84 milliseconds