/netbsd-current/external/gpl3/gcc.old/dist/libobjc/objc-private/ |
H A D | hash.h | 170 const char *ckey = (const char *) key; local 172 while (*ckey) { 173 ret ^= *ckey++ << ctr;
|
/netbsd-current/external/gpl3/gcc/dist/libobjc/objc-private/ |
H A D | hash.h | 170 const char *ckey = (const char *) key; local 172 while (*ckey) { 173 ret ^= *ckey++ << ctr;
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | test_engine_dso.c | 84 void *skey, *ckey; local 88 ckey = emalloc(DH_size(client)); 93 csize = DH_compute_key(ckey, server->pub_key, client); 100 if (memcmp(skey, ckey, csize) != 0) 104 free(ckey);
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/apps/ |
H A D | mkacerts.sh | 18 -key ckey.pem -out creq.pem -new 42 cat ckey.pem >>client.pem
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/apps/ |
H A D | mkacerts.sh | 18 -key ckey.pem -out creq.pem -new 42 cat ckey.pem >>client.pem
|
/netbsd-current/sys/net/ |
H A D | if_wg.c | 896 wg_init_key_and_hash(uint8_t ckey[WG_CHAINING_KEY_LEN], argument 905 blake2s(ckey, WG_CHAINING_KEY_LEN, NULL, 0, 909 memcpy(hash, ckey, WG_CHAINING_KEY_LEN); 912 blake2s_update(&state, ckey, WG_CHAINING_KEY_LEN); 916 WG_DUMP_HASH("ckey", ckey); 1044 uint8_t out3[WG_KDF_OUTPUT_LEN], const uint8_t ckey[WG_CHAINING_KEY_LEN], 1056 WG_DUMP_HASH("ckey", ckey); 1059 wg_algo_hmac(tmp1, sizeof(tmp1), ckey, WG_CHAINING_KEY_LE 1043 wg_algo_kdf(uint8_t out1[WG_KDF_OUTPUT_LEN], uint8_t out2[WG_KDF_OUTPUT_LEN], uint8_t out3[WG_KDF_OUTPUT_LEN], const uint8_t ckey[WG_CHAINING_KEY_LEN], const uint8_t input[], const size_t inputlen) argument 1083 wg_algo_dh_kdf(uint8_t ckey[WG_CHAINING_KEY_LEN], uint8_t cipher_key[WG_CIPHER_KEY_LEN], const uint8_t local_key[WG_STATIC_KEY_LEN], const uint8_t remote_key[WG_STATIC_KEY_LEN]) argument 1325 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.2: Ci */ local 1418 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.2: Ci */ local 1745 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.3: Cr */ local 1856 uint8_t ckey[WG_CHAINING_KEY_LEN]; /* [W] 5.4.3: Cr */ local [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/tests/kdc/ |
H A D | check-digest.in | 252 ckey=`grep session-key= cdigest-reply | cut -f2- -d=` 273 if test "X$skey" != "X$ckey" ; then
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
H A D | ec_kmeth.c | 198 int (*ckey)(unsigned char **psec, 203 meth->compute_key = ckey;
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/ec/ |
H A D | ec_kmeth.c | 225 int (*ckey)(unsigned char **psec, 230 meth->compute_key = ckey;
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_clnt.c | 3069 EVP_PKEY *ckey = NULL, *skey = NULL; local 3079 ckey = ssl_generate_pkey(skey); 3080 if (ckey == NULL) { 3086 dh_clnt = EVP_PKEY_get0_DH(ckey); 3094 if (ssl_derive(s, ckey, skey, 0) == 0) { 3109 EVP_PKEY_free(ckey); 3113 EVP_PKEY_free(ckey); 3127 EVP_PKEY *ckey = NULL, *skey = NULL; local 3137 ckey = ssl_generate_pkey(skey); 3138 if (ckey [all...] |
H A D | statem_srvr.c | 3176 EVP_PKEY *ckey = NULL; local 3202 ckey = EVP_PKEY_new(); 3203 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { 3209 cdh = EVP_PKEY_get0_DH(ckey); 3218 if (ssl_derive(s, skey, ckey, 1) == 0) { 3227 EVP_PKEY_free(ckey); 3241 EVP_PKEY *ckey = NULL; local 3271 ckey = EVP_PKEY_new(); 3272 if (ckey [all...] |
H A D | extensions_srvr.c | 1687 EVP_PKEY *ckey = s->s3->peer_tmp, *skey = NULL; local 1690 if (ckey != NULL) { 1707 if (ckey == NULL) { 1732 skey = ssl_generate_pkey(ckey); 1760 if (ssl_derive(s, skey, ckey, 1) == 0) {
|
H A D | extensions_clnt.c | 1815 EVP_PKEY *ckey = s->s3->tmp.pkey, *skey = NULL; local 1818 if (ckey == NULL || s->s3->peer_tmp != NULL) { 1887 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { 1901 if (ssl_derive(s, ckey, skey, 1) == 0) {
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/ |
H A D | mkcerts.sh | 26 -keyout ckey.pem -out creq.pem -newkey rsa:1024
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/ |
H A D | mkcerts.sh | 26 -keyout ckey.pem -out creq.pem -newkey rsa:1024
|
/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | kerberos5.c | 1113 METHOD_DATA *md, Key *ckey) 1126 ret = make_etype_info_entry(context, &pa.val[0], ckey); 1232 METHOD_DATA *md, Key *ckey) 1244 ret = make_etype_info2_entry(&pa.val[0], ckey); 1877 Key *ckey = NULL; local 1894 r->client, b->etype.val, b->etype.len, NULL, &ckey); 1909 if (older_enctype(ckey->key.keytype)) { 1911 &error_method, ckey); 1916 &error_method, ckey); 1931 if (ckey 1111 get_pa_etype_info(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument 1230 get_pa_etype_info2(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument [all...] |
/netbsd-current/sys/external/bsd/drm2/dist/drm/i915/display/ |
H A D | intel_sprite.c | 567 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; 916 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; 1022 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; 1304 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; 1436 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; 1615 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; 1748 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; 2182 if (!plane_state->ckey.flags && intel_fb_scalable(fb)) { 2245 struct drm_intel_sprite_colorkey *key = &plane_state->ckey;
|
H A D | intel_display_types.h | 612 struct drm_intel_sprite_colorkey ckey; member in struct:intel_plane_state
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_clnt.c | 2907 EVP_PKEY *ckey = NULL, *skey = NULL; local 2920 ckey = ssl_generate_pkey(s, skey); 2921 if (ckey == NULL) { 2926 if (ssl_derive(s, ckey, skey, 0) == 0) { 2934 encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub); 2937 EVP_PKEY_free(ckey); 2946 prime_len = EVP_PKEY_get_size(ckey); 2964 EVP_PKEY_free(ckey); 2972 EVP_PKEY *ckey = NULL, *skey = NULL; local 2981 ckey [all...] |
H A D | statem_srvr.c | 2959 EVP_PKEY *ckey = NULL; local 2981 ckey = EVP_PKEY_new(); 2982 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { 2987 if (!EVP_PKEY_set1_encoded_public_key(ckey, data, i)) { 2992 if (ssl_derive(s, skey, ckey, 1) == 0) { 3001 EVP_PKEY_free(ckey); 3008 EVP_PKEY *ckey = NULL; local 3035 ckey = EVP_PKEY_new(); 3036 if (ckey [all...] |
H A D | extensions_srvr.c | 1594 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; local 1598 if (ckey != NULL) { 1613 if (ckey == NULL) { 1643 skey = ssl_generate_pkey(s, ckey); 1670 if (ssl_derive(s, skey, ckey, 1) == 0) { 1685 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) {
|
H A D | extensions_clnt.c | 1743 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; local 1747 if (ckey == NULL || s->s3.peer_tmp != NULL) { 1840 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { 1853 if (ssl_derive(s, ckey, skey, 1) == 0) { 1864 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) {
|
/netbsd-current/external/gpl3/gcc/dist/gcc/analyzer/ |
H A D | store.cc | 920 if (const concrete_binding *ckey 926 if (ckey->overlaps_p (*iter_ckey)) 2006 if (const concrete_binding *ckey 2012 ckey->get_start_bit_offset (), 2013 ckey->get_size_in_bits (),
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/openssl/ |
H A D | ec.h | 1299 int (*ckey)(unsigned char **psec,
|
/netbsd-current/crypto/external/bsd/openssl/dist/include/openssl/ |
H A D | ec.h | 1477 int (*ckey)(unsigned char **psec, size_t *pseclen,
|