Searched refs:ckey (Results 1 - 25 of 28) sorted by relevance

12

/netbsd-current/external/gpl3/gcc.old/dist/libobjc/objc-private/
H A Dhash.h170 const char *ckey = (const char *) key; local
172 while (*ckey) {
173 ret ^= *ckey++ << ctr;
/netbsd-current/external/gpl3/gcc/dist/libobjc/objc-private/
H A Dhash.h170 const char *ckey = (const char *) key; local
172 while (*ckey) {
173 ret ^= *ckey++ << ctr;
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/
H A Dtest_engine_dso.c84 void *skey, *ckey; local
88 ckey = emalloc(DH_size(client));
93 csize = DH_compute_key(ckey, server->pub_key, client);
100 if (memcmp(skey, ckey, csize) != 0)
104 free(ckey);
/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/apps/
H A Dmkacerts.sh18 -key ckey.pem -out creq.pem -new
42 cat ckey.pem >>client.pem
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/apps/
H A Dmkacerts.sh18 -key ckey.pem -out creq.pem -new
42 cat ckey.pem >>client.pem
/netbsd-current/sys/net/
H A Dif_wg.c896 wg_init_key_and_hash(uint8_t ckey[WG_CHAINING_KEY_LEN], argument
905 blake2s(ckey, WG_CHAINING_KEY_LEN, NULL, 0,
909 memcpy(hash, ckey, WG_CHAINING_KEY_LEN);
912 blake2s_update(&state, ckey, WG_CHAINING_KEY_LEN);
916 WG_DUMP_HASH("ckey", ckey);
1044 uint8_t out3[WG_KDF_OUTPUT_LEN], const uint8_t ckey[WG_CHAINING_KEY_LEN],
1056 WG_DUMP_HASH("ckey", ckey);
1059 wg_algo_hmac(tmp1, sizeof(tmp1), ckey, WG_CHAINING_KEY_LE
1043 wg_algo_kdf(uint8_t out1[WG_KDF_OUTPUT_LEN], uint8_t out2[WG_KDF_OUTPUT_LEN], uint8_t out3[WG_KDF_OUTPUT_LEN], const uint8_t ckey[WG_CHAINING_KEY_LEN], const uint8_t input[], const size_t inputlen) argument
1083 wg_algo_dh_kdf(uint8_t ckey[WG_CHAINING_KEY_LEN], uint8_t cipher_key[WG_CIPHER_KEY_LEN], const uint8_t local_key[WG_STATIC_KEY_LEN], const uint8_t remote_key[WG_STATIC_KEY_LEN]) argument
1325 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.2: Ci */ local
1418 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.2: Ci */ local
1745 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.3: Cr */ local
1856 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.3: Cr */ local
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/tests/kdc/
H A Dcheck-digest.in252 ckey=`grep session-key= cdigest-reply | cut -f2- -d=`
273 if test "X$skey" != "X$ckey" ; then
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/ec/
H A Dec_kmeth.c198 int (*ckey)(unsigned char **psec,
203 meth->compute_key = ckey;
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/ec/
H A Dec_kmeth.c225 int (*ckey)(unsigned char **psec,
230 meth->compute_key = ckey;
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/
H A Dstatem_clnt.c3069 EVP_PKEY *ckey = NULL, *skey = NULL; local
3079 ckey = ssl_generate_pkey(skey);
3080 if (ckey == NULL) {
3086 dh_clnt = EVP_PKEY_get0_DH(ckey);
3094 if (ssl_derive(s, ckey, skey, 0) == 0) {
3109 EVP_PKEY_free(ckey);
3113 EVP_PKEY_free(ckey);
3127 EVP_PKEY *ckey = NULL, *skey = NULL; local
3137 ckey = ssl_generate_pkey(skey);
3138 if (ckey
[all...]
H A Dstatem_srvr.c3176 EVP_PKEY *ckey = NULL; local
3202 ckey = EVP_PKEY_new();
3203 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) {
3209 cdh = EVP_PKEY_get0_DH(ckey);
3218 if (ssl_derive(s, skey, ckey, 1) == 0) {
3227 EVP_PKEY_free(ckey);
3241 EVP_PKEY *ckey = NULL; local
3271 ckey = EVP_PKEY_new();
3272 if (ckey
[all...]
H A Dextensions_srvr.c1687 EVP_PKEY *ckey = s->s3->peer_tmp, *skey = NULL; local
1690 if (ckey != NULL) {
1707 if (ckey == NULL) {
1732 skey = ssl_generate_pkey(ckey);
1760 if (ssl_derive(s, skey, ckey, 1) == 0) {
H A Dextensions_clnt.c1815 EVP_PKEY *ckey = s->s3->tmp.pkey, *skey = NULL; local
1818 if (ckey == NULL || s->s3->peer_tmp != NULL) {
1887 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) {
1901 if (ssl_derive(s, ckey, skey, 1) == 0) {
/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/
H A Dmkcerts.sh26 -keyout ckey.pem -out creq.pem -newkey rsa:1024
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/
H A Dmkcerts.sh26 -keyout ckey.pem -out creq.pem -newkey rsa:1024
/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/
H A Dkerberos5.c1113 METHOD_DATA *md, Key *ckey)
1126 ret = make_etype_info_entry(context, &pa.val[0], ckey);
1232 METHOD_DATA *md, Key *ckey)
1244 ret = make_etype_info2_entry(&pa.val[0], ckey);
1877 Key *ckey = NULL; local
1894 r->client, b->etype.val, b->etype.len, NULL, &ckey);
1909 if (older_enctype(ckey->key.keytype)) {
1911 &error_method, ckey);
1916 &error_method, ckey);
1931 if (ckey
1111 get_pa_etype_info(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument
1230 get_pa_etype_info2(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument
[all...]
/netbsd-current/sys/external/bsd/drm2/dist/drm/i915/display/
H A Dintel_sprite.c567 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
916 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
1022 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
1304 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
1436 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
1615 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
1748 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
2182 if (!plane_state->ckey.flags && intel_fb_scalable(fb)) {
2245 struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
H A Dintel_display_types.h612 struct drm_intel_sprite_colorkey ckey; member in struct:intel_plane_state
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/
H A Dstatem_clnt.c2907 EVP_PKEY *ckey = NULL, *skey = NULL; local
2920 ckey = ssl_generate_pkey(s, skey);
2921 if (ckey == NULL) {
2926 if (ssl_derive(s, ckey, skey, 0) == 0) {
2934 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub);
2937 EVP_PKEY_free(ckey);
2946 prime_len = EVP_PKEY_get_size(ckey);
2964 EVP_PKEY_free(ckey);
2972 EVP_PKEY *ckey = NULL, *skey = NULL; local
2981 ckey
[all...]
H A Dstatem_srvr.c2959 EVP_PKEY *ckey = NULL; local
2981 ckey = EVP_PKEY_new();
2982 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) {
2987 if (!EVP_PKEY_set1_encoded_public_key(ckey, data, i)) {
2992 if (ssl_derive(s, skey, ckey, 1) == 0) {
3001 EVP_PKEY_free(ckey);
3008 EVP_PKEY *ckey = NULL; local
3035 ckey = EVP_PKEY_new();
3036 if (ckey
[all...]
H A Dextensions_srvr.c1594 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; local
1598 if (ckey != NULL) {
1613 if (ckey == NULL) {
1643 skey = ssl_generate_pkey(s, ckey);
1670 if (ssl_derive(s, skey, ckey, 1) == 0) {
1685 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) {
H A Dextensions_clnt.c1743 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; local
1747 if (ckey == NULL || s->s3.peer_tmp != NULL) {
1840 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) {
1853 if (ssl_derive(s, ckey, skey, 1) == 0) {
1864 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) {
/netbsd-current/external/gpl3/gcc/dist/gcc/analyzer/
H A Dstore.cc920 if (const concrete_binding *ckey
926 if (ckey->overlaps_p (*iter_ckey))
2006 if (const concrete_binding *ckey
2012 ckey->get_start_bit_offset (),
2013 ckey->get_size_in_bits (),
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/openssl/
H A Dec.h1299 int (*ckey)(unsigned char **psec,
/netbsd-current/crypto/external/bsd/openssl/dist/include/openssl/
H A Dec.h1477 int (*ckey)(unsigned char **psec, size_t *pseclen,

Completed in 504 milliseconds

12