Searched refs:tokey (Results 1 – 4 of 4) sorted by relevance
/freebsd/crypto/openssl/test/ |
H A D | tls-provider.c | 488 XORKEY *tokey = xor_newdata(NULL); in xor_dup() 492 if (tokey != NULL && fromkey != NULL) { in xor_dup() 497 memcpy(tokey->pubkey, fromkey->pubkey, XOR_KEY_SIZE); in xor_dup() 498 tokey->haspubkey = 1; in xor_dup() 500 tokey->haspubkey = 0; in xor_dup() 505 memcpy(tokey->privkey, fromkey->privkey, XOR_KEY_SIZE); in xor_dup() 506 tokey->hasprivkey = 1; in xor_dup() 508 tokey->hasprivkey = 0; in xor_dup() 513 xor_freedata(tokey); in xor_get_params() 514 tokey in xor_get_params() 482 XORKEY *tokey = xor_newdata(NULL); xor_dup() local [all...] |
/freebsd/crypto/heimdal/kdc/ |
H A D | string2key.c | 71 tokey(krb5_context context, in tokey() function 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); in main() 175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerberos 4"); in main() 181 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "AFS"); in main()
|
/freebsd/crypto/openssh/ |
H A D | ssh-agent.c | 432 const struct sshkey *tokey, Identity *id, const char *user, in permitted_by_dest_constraints() argument 460 if (tokey != NULL && match_key_hop("to", tokey, &d->to) != 0) in permitted_by_dest_constraints()
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2006 | 1747 * kdc/string2key.c (tokey): catch warnings, free memory after use.
|