/macosx-10.10/apr-32/apr-util/apr-util/dbm/ |
H A D | apr_dbm_berkeleydb.c | 218 DBT ckey = { 0 }; local 222 ckey.data = key.dptr; 223 ckey.size = key.dsize; 225 dberr = do_fetch(GET_BDB(dbm->file), ckey, rd); 251 DBT ckey = { 0 }; local 254 ckey.data = key.dptr; 255 ckey.size = key.dsize; 262 &ckey, 273 DBT ckey = { 0 }; local 275 ckey 289 DBT ckey = { 0 }; /* converted key */ local 340 DBT ckey = { 0 }; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_pkcs12/ |
H A D | pkcs12Crypto.cpp | 144 CSSM_KEY ckey; local 158 crtn = p12KeyGen(cspHand, ckey, true, keyAlg, pbeHashAlg, 170 &ckey, 209 CSSM_FreeKey(cspHand, NULL, &ckey, CSSM_FALSE); 235 CSSM_KEY ckey; local 249 crtn = p12KeyGen(cspHand, ckey, true, keyAlg, pbeHashAlg, 261 &ckey, 300 CSSM_FreeKey(cspHand, NULL, &ckey, CSSM_FALSE); 402 CSSM_KEY ckey; local 423 crtn = p12KeyGen(cspHand, ckey, tru 563 CSSM_KEY ckey; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/ |
H A D | pkcs12Crypto.cpp | 144 CSSM_KEY ckey; local 158 crtn = p12KeyGen(cspHand, ckey, true, keyAlg, pbeHashAlg, 170 &ckey, 209 CSSM_FreeKey(cspHand, NULL, &ckey, CSSM_FALSE); 235 CSSM_KEY ckey; local 249 crtn = p12KeyGen(cspHand, ckey, true, keyAlg, pbeHashAlg, 261 &ckey, 300 CSSM_FreeKey(cspHand, NULL, &ckey, CSSM_FALSE); 402 CSSM_KEY ckey; local 423 crtn = p12KeyGen(cspHand, ckey, tru 563 CSSM_KEY ckey; local [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | test_engine_dso.c | 85 void *skey, *ckey; local 89 ckey = emalloc(DH_size(client)); 94 csize = DH_compute_key(ckey, server->pub_key, client); 101 if (memcmp(skey, ckey, csize) != 0) 105 free(ckey);
|
/macosx-10.10/OpenSSH-189/osslshim/tests/ |
H A D | test_engine_dso.c | 85 void *skey, *ckey; local 89 ckey = emalloc(DH_size(client)); 94 csize = DH_compute_key(ckey, server->pub_key, client); 101 if (memcmp(skey, ckey, csize) != 0) 105 free(ckey);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/ |
H A D | sslThrash.cpp | 179 CSSM_KEY ckey; local 216 &ckey); 237 &ckey,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/ |
H A D | p12Crypto.cpp | 147 CSSM_KEY ckey; local 159 crtn = p12KeyGen_app(cspHand, ckey, true, keyAlg, pbeHashAlg, 170 &ckey, 208 CSSM_FreeKey(cspHand, NULL, &ckey, CSSM_FALSE);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12Crypto.cpp | 134 CSSM_KEY ckey; local 146 crtn = p12KeyGen_app(cspHand, ckey, true, keyAlg, pbeHashAlg, 157 &ckey,
|
H A D | p12Decode.cpp | 170 CSSM_KEY_PTR ckey = key->key(); local 171 CSSM_KEYHEADER &hdr = ckey->KeyHeader;
|
/macosx-10.10/swig-12/Source/Swig/ |
H A D | typesys.c | 1752 String *ckey; local 1795 ckey = NewStringf("%s+%s", mprefix, mkey); 1796 if (!Getattr(conversions, ckey)) { 1817 Setattr(conversions, ckey, convname); 1818 Delete(ckey); 1835 ckey = NewStringf("%s+%s", rrk.key, rkeymangle); 1836 if (!Getattr(conversions, ckey)) { 1837 Setattr(conversions, ckey, convname); 1839 Delete(ckey); 1841 ckey 2010 String *ckey; local [all...] |
H A D | naming.c | 1003 static List *Swig_make_attrlist(const char *ckey) { argument 1005 const char *cattr = strchr(ckey, '$'); 1031 char *ckey = kname ? Char(kname) : 0; local 1032 if (ckey) { 1036 if ((strncmp(ckey, "match", 5) == 0) 1037 || (isnotmatch = (strncmp(ckey, "notmatch", 8) == 0)) 1038 || (isrxsmatch = (strncmp(ckey, "rxsmatch", 8) == 0)) 1039 || (isnotmatch = isrxsmatch = (strncmp(ckey, "notrxsmatch", 11) == 0))) { 1041 List *attrlist = Swig_make_attrlist(ckey); 1048 Printf(stdout, "rxsmatch to use: %s %s %s\n", ckey, Getatt [all...] |
H A D | typemap.c | 569 char *ckey = Char(ki.key); local 570 if (strncmp(ckey, "tmap:", 5) == 0) { 572 if ((na == narg) && strstr(ckey, ctsig)) {
|
/macosx-10.10/Heimdal-398.1.2/tests/kdc/ |
H A D | check-digest.in | 257 ckey=`grep session-key= cdigest-reply | cut -f2- -d=` 278 if test "X$skey" != "X$ckey" ; then
|
/macosx-10.10/Libnotify-133.1.1/ |
H A D | table.c | 180 _nc_table_insert_type(table_t *tin, int type, char *key, const char *ckey, void *datum) argument 187 if ((key == NULL) && (ckey == NULL)) return; 203 b = hash_key(t->bucket_count, ckey); 204 n->key.const_string = ckey;
|
/macosx-10.10/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs_gss.h | 116 des_cblock ckey[3]; member in struct:__anon14793::__anon14794::__anon14796
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccSymCompat/ |
H A D | ccSymCompat.c | 127 CSSM_DATA ckey = *key; local 128 ckey.Length = keySizeInBits / 8; 130 crtn = eayGenSymKey(encrAlg, forEncrypt, &ckey, &eayKey);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/symCompat/ |
H A D | symCompat.c | 137 CSSM_DATA ckey = *key; local 138 ckey.Length = keySizeInBits / 8; 140 crtn = eayGenSymKey(encrAlg, forEncrypt, &ckey, &eayKey);
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | kerberos5.c | 1423 METHOD_DATA *md, Key *ckey) 1436 ret = make_etype_info_entry(context, &pa.val[0], ckey); 1536 METHOD_DATA *md, Key *ckey) 1548 ret = make_etype_info2_entry(&pa.val[0], ckey); 2121 Key *ckey = NULL; local 2148 r->client, b->etype.val, b->etype.len, NULL, &ckey); 2163 if (older_enctype(ckey->key.keytype)) { 2165 &r->outpadata, ckey); 2170 &r->outpadata, ckey); 2186 if (ckey 1421 get_pa_etype_info(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument 1534 get_pa_etype_info2(krb5_context context, krb5_kdc_configuration *config, METHOD_DATA *md, Key *ckey) argument [all...] |
/macosx-10.10/swig-12/Source/CParse/ |
H A D | parser.y | 89 char *ckey = Char(key); 90 if ((strcmp(ckey,"nextSibling") == 0) || 91 (strcmp(ckey,"previousSibling") == 0) || 92 (strcmp(ckey,"parentNode") == 0) || 93 (strcmp(ckey,"lastChild") == 0)) { 98 if ((strcmp(ckey,"sym:name") == 0) || 99 (strcmp(ckey,"sym:weak") == 0) || 100 (strcmp(ckey,"sym:typename") == 0)) { 106 if (strcmp(ckey,"sym:symtab") == 0) { 110 if (strncmp(ckey,"sy [all...] |
H A D | parser.c | 403 char *ckey = Char(key); local 404 if ((strcmp(ckey,"nextSibling") == 0) || 405 (strcmp(ckey,"previousSibling") == 0) || 406 (strcmp(ckey,"parentNode") == 0) || 407 (strcmp(ckey,"lastChild") == 0)) { 412 if ((strcmp(ckey,"sym:name") == 0) || 413 (strcmp(ckey,"sym:weak") == 0) || 414 (strcmp(ckey,"sym:typename") == 0)) { 420 if (strcmp(ckey,"sym:symtab") == 0) { 424 if (strncmp(ckey,"sy [all...] |
/macosx-10.10/xnu-2782.1.97/iokit/Kernel/ |
H A D | IODeviceTreeSupport.cpp | 777 const char *ckey; local 798 ckey = key->getCStringNoCopy(); 806 matched = ((nlen >= (keyLen - 1)) && (0 == strncmp(ckey, names, keyLen - 1))); 808 matched = (keyLen == nlen) && (0 == strncmp(ckey, names, keyLen));
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_transform/lib/ |
H A D | SecSignVerifyTransform.c | 160 CFErrorRef pick_sign_alg(CFStringRef digest, int digest_length, const CSSM_KEY *ckey, struct digest_mapping **picked) { argument 209 search.kclass = ckey->KeyHeader.AlgorithmId; 221 switch (ckey->KeyHeader.AlgorithmId) {
|
/macosx-10.10/emacs-93/emacs/lisp/textmodes/ |
H A D | reftex-index.el | 1837 (ckey (nth 0 index-keys)) 1865 macro-fmt (match-string 0) ckey repeat mathp))) 1913 ckey repeat mathp))) 1930 (setq ckey (or index-key phrase) 1933 macro-fmt match ckey repeat mathp)))) 1936 (setq ckey (nth (1- (- char ?0)) index-keys) 1939 macro-fmt match ckey repeat mathp))))
|
/macosx-10.10/emacs-93/emacs/lisp/mail/ |
H A D | supercite.el | 1285 (let* ((ckey "sc-citation") 1287 (ckeyval (assoc ckey sc-mail-info)) 1291 (push (cons ckey citation) sc-mail-info))
|
/macosx-10.10/Heimdal-398.1.2/lib/heimcred/ |
H A D | server.m | 255 [creds enumerateKeysAndObjectsUsingBlock:^(id ckey, id cvalue, BOOL *cstop) { 256 CFUUIDRef cfkey = [HeimCredDecoder copyNS2CF:ckey];
|