keys 189 lib/tdb/tools/tdbtest.c char keys[5][2]; keys 194 lib/tdb/tools/tdbtest.c snprintf(keys[i],2, "%d", i); keys 195 lib/tdb/tools/tdbtest.c key.dptr = keys[i]; keys 206 lib/tdb/tools/tdbtest.c key.dptr = keys[0]; keys 208 lib/tdb/tools/tdbtest.c key.dptr = keys[4]; keys 210 lib/tdb/tools/tdbtest.c key.dptr = keys[2]; keys 212 lib/tdb/tools/tdbtest.c key.dptr = keys[1]; keys 214 lib/tdb/tools/tdbtest.c key.dptr = keys[3]; keys 149 lib/zlib/contrib/minizip/unzip.c unsigned long keys[3]; /* keys defining the pseudo-random sequence */ keys 1171 lib/zlib/contrib/minizip/unzip.c init_keys(password,s->keys,s->pcrc_32_tab); keys 1181 lib/zlib/contrib/minizip/unzip.c zdecode(s->keys,s->pcrc_32_tab,source[i]); keys 1292 lib/zlib/contrib/minizip/unzip.c zdecode(s->keys,s->pcrc_32_tab, keys 132 lib/zlib/contrib/minizip/zip.c unsigned long keys[3]; /* keys defining the pseudo-random sequence */ keys 886 lib/zlib/contrib/minizip/zip.c sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting); keys 955 lib/zlib/contrib/minizip/zip.c zi->ci.buffered_data[i] = zencode(zi->ci.keys, zi->ci.pcrc_32_tab, keys 208 librpc/gen_ndr/drsblobs.h struct package_PrimaryKerberosKey3 *keys; keys 234 librpc/gen_ndr/drsblobs.h struct package_PrimaryKerberosKey4 *keys; keys 1642 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey3(ndr, NDR_SCALARS, &r->keys[cntr_keys_0])); keys 1656 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey3(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0])); keys 1676 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys); keys 1678 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0); keys 1680 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey3(ndr, NDR_SCALARS, &r->keys[cntr_keys_0])); keys 1699 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0); keys 1701 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey3(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0])); keys 1728 librpc/gen_ndr/ndr_drsblobs.c ndr_print_package_PrimaryKerberosKey3(ndr, "keys", &r->keys[cntr_keys_0]); keys 1870 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey4(ndr, NDR_SCALARS, &r->keys[cntr_keys_0])); keys 1882 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey4(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0])); keys 1912 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys); keys 1914 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0); keys 1916 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey4(ndr, NDR_SCALARS, &r->keys[cntr_keys_0])); keys 1944 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0); keys 1946 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey4(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0])); keys 1990 librpc/gen_ndr/ndr_drsblobs.c ndr_print_package_PrimaryKerberosKey4(ndr, "keys", &r->keys[cntr_keys_0]); keys 2364 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_USER_KEY_UNION(ndr, NDR_SCALARS, &r->keys)); keys 2376 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_USER_KEY_UNION(ndr, NDR_SCALARS, &r->keys)); keys 2388 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_USER_KEY_UNION(ndr, "keys", &r->keys); keys 296 librpc/gen_ndr/netlogon.h struct netr_USER_KEY_UNION keys; keys 254 source3/include/nt_printing.h NT_PRINTER_KEY *keys; keys 406 source3/libads/ldap_printer.c REGVAL_CTR *ctr = data->keys[key].values; keys 436 source3/libnet/libnet_dssync_keytab.c if (!pkb4->keys[i].value) { keys 442 source3/libnet/libnet_dssync_keytab.c pkb4->keys[i].keytype, keys 443 source3/libnet/libnet_dssync_keytab.c *pkb4->keys[i].value); keys 478 source3/libnet/libnet_dssync_keytab.c if (!pkb3->keys[i].value) { keys 483 source3/libnet/libnet_dssync_keytab.c pkb3->keys[i].keytype, keys 484 source3/libnet/libnet_dssync_keytab.c *pkb3->keys[i].value); keys 71 source3/libnet/libnet_samsync.c struct netr_USER_KEYS keys; keys 79 source3/libnet/libnet_samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, NULL, &keys, keys 89 source3/libnet/libnet_samsync.c if (keys.keys.keys2.lmpassword.length == 16) { keys 90 source3/libnet/libnet_samsync.c if (memcmp(keys.keys.keys2.lmpassword.pwd.hash, keys 93 source3/libnet/libnet_samsync.c keys.keys.keys2.lmpassword.pwd.hash, keys 101 source3/libnet/libnet_samsync.c if (keys.keys.keys2.ntpassword.length == 16) { keys 102 source3/libnet/libnet_samsync.c if (memcmp(keys.keys.keys2.ntpassword.pwd.hash, keys 105 source3/libnet/libnet_samsync.c keys.keys.keys2.ntpassword.pwd.hash, keys 143 source3/librpc/gen_ndr/messaging.h DATA_BLOB *keys; keys 206 source3/librpc/gen_ndr/ndr_messaging.c NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->keys[cntr_keys_0])); keys 233 source3/librpc/gen_ndr/ndr_messaging.c NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys); keys 235 source3/librpc/gen_ndr/ndr_messaging.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0); keys 237 source3/librpc/gen_ndr/ndr_messaging.c NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->keys[cntr_keys_0])); keys 263 source3/librpc/gen_ndr/ndr_messaging.c ndr_print_DATA_BLOB(ndr, "keys", r->keys[cntr_keys_0]); keys 2431 source3/printing/nt_printing.c val_ctr = data->keys[i].values; keys 2437 source3/printing/nt_printing.c &data->keys[i].name, keys 2438 source3/printing/nt_printing.c data->keys[i].name, keys 2450 source3/printing/nt_printing.c data->keys[i].name, keys 2804 source3/printing/nt_printing.c if ( !(d = TALLOC_REALLOC_ARRAY( data, data->keys, NT_PRINTER_KEY, data->num_keys+1)) ) { keys 2809 source3/printing/nt_printing.c data->keys = d; keys 2815 source3/printing/nt_printing.c data->keys[key_index].name = talloc_strdup( data, name ); keys 2817 source3/printing/nt_printing.c if ( !(data->keys[key_index].values = TALLOC_ZERO_P( data, REGVAL_CTR )) ) keys 2836 source3/printing/nt_printing.c if ( strequal( data->keys[i].name, name ) ) { keys 2840 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].name ); keys 2841 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].values ); keys 2847 source3/printing/nt_printing.c memmove( &data->keys[i], &data->keys[i+1], sizeof(NT_PRINTER_KEY)*(data->num_keys-i) ); keys 2874 source3/printing/nt_printing.c if ( strequal(data->keys[i].name, name) ) { keys 2918 source3/printing/nt_printing.c fstrcpy( subkeys_ptr[num_subkeys], data->keys[i].name ); keys 2929 source3/printing/nt_printing.c if ( StrnCaseCmp(data->keys[i].name, key, strlen(key)) == 0 ) { keys 2933 source3/printing/nt_printing.c if ( strlen(data->keys[i].name) == key_len ) keys 2938 source3/printing/nt_printing.c p = data->keys[i].name + key_len; keys 3061 source3/printing/nt_printing.c ctr = info2->data->keys[i].values; keys 3130 source3/printing/nt_printing.c ctr = info2->data->keys[i].values; keys 3427 source3/printing/nt_printing.c !(ctr = printer->info_2->data->keys[i].values) || keys 3516 source3/printing/nt_printing.c if ( StrnCaseCmp( data->keys[i].name, key, strlen(key)) == 0 ) { keys 3518 source3/printing/nt_printing.c data->keys[i].name)); keys 3520 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].name ); keys 3521 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].values ); keys 3525 source3/printing/nt_printing.c ZERO_STRUCTP( &data->keys[i] ); keys 3532 source3/printing/nt_printing.c if ( !data->keys[i].name ) { keys 3546 source3/printing/nt_printing.c if ( data->keys[i].name ) { keys 3547 source3/printing/nt_printing.c memcpy( &data->keys[empty_slot], &data->keys[i], sizeof(NT_PRINTER_KEY) ); keys 3548 source3/printing/nt_printing.c ZERO_STRUCTP( &data->keys[i] ); keys 3563 source3/printing/nt_printing.c SAFE_FREE( data->keys ); keys 3591 source3/printing/nt_printing.c if ( !regval_ctr_getvalue( p2->data->keys[key_index].values, value ) ) keys 3594 source3/printing/nt_printing.c regval_ctr_delvalue( p2->data->keys[key_index].values, value ); keys 3625 source3/printing/nt_printing.c regval_ctr_addvalue( p2->data->keys[key_index].values, value, keys 3647 source3/printing/nt_printing.c return regval_ctr_getvalue( p2->data->keys[key_index].values, value ); keys 3754 source3/printing/nt_printing.c regval_ctr_addvalue( printer_data->keys[key_index].values, keys 3762 source3/printing/nt_printing.c regval_ctr_addvalue( printer_data->keys[key_index].values, keys 520 source3/registry/reg_backend_printing.c num_values = regval_ctr_numvals( p_data->keys[key_index].values ); keys 522 source3/registry/reg_backend_printing.c regval_ctr_copyvalue( values, regval_ctr_specific_value(p_data->keys[key_index].values, i) ); keys 7982 source3/rpc_server/srv_spoolss_nt.c num_values = regval_ctr_numvals( p_data->keys[key_index].values ); keys 7986 source3/rpc_server/srv_spoolss_nt.c val = regval_ctr_specific_value( p_data->keys[key_index].values, i ); keys 8017 source3/rpc_server/srv_spoolss_nt.c val = regval_ctr_specific_value(p_data->keys[key_index].values, keys 9479 source3/rpc_server/srv_spoolss_nt.c count = regval_ctr_numvals(p_data->keys[key_index].values); keys 9505 source3/rpc_server/srv_spoolss_nt.c val = regval_ctr_specific_value(p_data->keys[key_index].values, i); keys 455 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys = talloc_array(io->ac, keys 458 source4/dsdb/samdb/ldb_modules/password_hash.c if (!pkb3->keys) { keys 463 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[0].keytype = ENCTYPE_DES_CBC_MD5; keys 464 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[0].value = &io->g.des_md5; keys 465 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[1].keytype = ENCTYPE_DES_CBC_CRC; keys 466 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[1].value = &io->g.des_crc; keys 529 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->old_keys = old_pkb3->keys; keys 561 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys = talloc_array(io->ac, keys 564 source4/dsdb/samdb/ldb_modules/password_hash.c if (!pkb4->keys) { keys 569 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[0].iteration_count = 4096; keys 570 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[0].keytype = ENCTYPE_AES256_CTS_HMAC_SHA1_96; keys 571 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[0].value = &io->g.aes_256; keys 572 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[1].iteration_count = 4096; keys 573 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[1].keytype = ENCTYPE_AES128_CTS_HMAC_SHA1_96; keys 574 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[1].value = &io->g.aes_128; keys 575 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[2].iteration_count = 4096; keys 576 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[2].keytype = ENCTYPE_DES_CBC_MD5; keys 577 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[2].value = &io->g.des_md5; keys 578 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[3].iteration_count = 4096; keys 579 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[3].keytype = ENCTYPE_DES_CBC_CRC; keys 580 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[3].value = &io->g.des_crc; keys 647 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->old_keys = old_pkb4->keys; keys 475 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len; keys 483 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { keys 485 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) keys 488 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { keys 497 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { keys 506 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { keys 509 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) keys 512 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0) keys 520 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { keys 636 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len; keys 644 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { keys 646 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) keys 649 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { keys 655 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { keys 665 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { keys 668 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) keys 671 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0) keys 676 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { keys 1115 source4/heimdal/lib/hcrypto/des.c uint32_t *keys; keys 1123 source4/heimdal/lib/hcrypto/des.c keys = &ks->ks[0]; keys 1127 source4/heimdal/lib/hcrypto/des.c work ^= *keys++; keys 1132 source4/heimdal/lib/hcrypto/des.c work = right ^ *keys++; keys 1139 source4/heimdal/lib/hcrypto/des.c work ^= *keys++; keys 1144 source4/heimdal/lib/hcrypto/des.c work = left ^ *keys++; keys 1152 source4/heimdal/lib/hcrypto/des.c keys = &ks->ks[30]; keys 1156 source4/heimdal/lib/hcrypto/des.c work ^= *keys++; keys 1161 source4/heimdal/lib/hcrypto/des.c work = right ^ *keys++; keys 1168 source4/heimdal/lib/hcrypto/des.c keys -= 4; keys 1169 source4/heimdal/lib/hcrypto/des.c work ^= *keys++; keys 1174 source4/heimdal/lib/hcrypto/des.c work = left ^ *keys++; keys 1180 source4/heimdal/lib/hcrypto/des.c keys -= 4; keys 76 source4/heimdal/lib/hdb/hdb.c for (k = *key ? (*key) + 1 : e->keys.val; keys 77 source4/heimdal/lib/hdb/hdb.c k < e->keys.val + e->keys.len; keys 148 source4/heimdal/lib/hdb/hdb.c for(i = 0; i < ent->entry.keys.len; ++i) { keys 149 source4/heimdal/lib/hdb/hdb.c Key *k = &ent->entry.keys.val[i]; keys 43 source4/heimdal/lib/hdb/keys.c hdb_free_keys (krb5_context context, int len, Key *keys) keys 48 source4/heimdal/lib/hdb/keys.c free(keys[i].mkvno); keys 49 source4/heimdal/lib/hdb/keys.c keys[i].mkvno = NULL; keys 50 source4/heimdal/lib/hdb/keys.c if (keys[i].salt != NULL) { keys 51 source4/heimdal/lib/hdb/keys.c free_Salt(keys[i].salt); keys 52 source4/heimdal/lib/hdb/keys.c free(keys[i].salt); keys 53 source4/heimdal/lib/hdb/keys.c keys[i].salt = NULL; keys 55 source4/heimdal/lib/hdb/keys.c krb5_free_keyblock_contents(context, &keys[i].key); keys 57 source4/heimdal/lib/hdb/keys.c free (keys); keys 369 source4/heimdal/lib/hdb/keys.c Key **keys, size_t *num_keys) keys 375 source4/heimdal/lib/hdb/keys.c keys, num_keys, 0); keys 382 source4/heimdal/lib/hdb/keys.c salt.salttype = (*keys)[i].salt->type; keys 383 source4/heimdal/lib/hdb/keys.c salt.saltvalue.length = (*keys)[i].salt->salt.length; keys 384 source4/heimdal/lib/hdb/keys.c salt.saltvalue.data = (*keys)[i].salt->salt.data; keys 387 source4/heimdal/lib/hdb/keys.c (*keys)[i].key.keytype, keys 390 source4/heimdal/lib/hdb/keys.c &(*keys)[i].key); keys 397 source4/heimdal/lib/hdb/keys.c hdb_free_keys (context, *num_keys, *keys); keys 240 source4/heimdal/lib/hdb/keytab.c if(ent.entry.keys.len > 0) keys 241 source4/heimdal/lib/hdb/keytab.c enctype = ent.entry.keys.val[0].key.keytype; keys 243 source4/heimdal/lib/hdb/keytab.c for(i = 0; i < ent.entry.keys.len; i++) { keys 244 source4/heimdal/lib/hdb/keytab.c if(ent.entry.keys.val[i].key.keytype == enctype) { keys 248 source4/heimdal/lib/hdb/keytab.c &ent.entry.keys.val[i].key, keys 462 source4/heimdal/lib/hdb/mkey.c for(i = 0; i < ent->keys.len; i++){ keys 465 source4/heimdal/lib/hdb/mkey.c ret = hdb_unseal_key_mkey(context, &ent->keys.val[i], mkey); keys 528 source4/heimdal/lib/hdb/mkey.c for(i = 0; i < ent->keys.len; i++){ keys 531 source4/heimdal/lib/hdb/mkey.c ret = hdb_seal_key_mkey(context, &ent->keys.val[i], mkey); keys 287 source4/heimdal/lib/hx509/collector.c hx509_private_key **keys) keys 291 source4/heimdal/lib/hx509/collector.c *keys = NULL; keys 297 source4/heimdal/lib/hx509/collector.c *keys = calloc(nkeys + 1, sizeof(**keys)); keys 298 source4/heimdal/lib/hx509/collector.c if (*keys == NULL) { keys 305 source4/heimdal/lib/hx509/collector.c (*keys)[nkeys++] = c->val.data[i]->private_key; keys 309 source4/heimdal/lib/hx509/collector.c (*keys)[nkeys++] = NULL; keys 644 source4/heimdal/lib/hx509/keyset.c hx509_private_key **keys) keys 647 source4/heimdal/lib/hx509/keyset.c *keys = NULL; keys 650 source4/heimdal/lib/hx509/keyset.c return (*certs->ops->getkeys)(context, certs, certs->ops_data, keys); keys 671 source4/heimdal/lib/hx509/keyset.c hx509_private_key *keys) keys 674 source4/heimdal/lib/hx509/keyset.c for (i = 0; keys[i]; i++) keys 675 source4/heimdal/lib/hx509/keyset.c _hx509_private_key_free(&keys[i]); keys 676 source4/heimdal/lib/hx509/keyset.c free(keys); keys 335 source4/heimdal/lib/hx509/ks_file.c hx509_private_key *keys = NULL; keys 426 source4/heimdal/lib/hx509/ks_file.c ret = _hx509_collector_collect_private_keys(context, pem_ctx.c, &keys); keys 430 source4/heimdal/lib/hx509/ks_file.c for (i = 0; keys[i]; i++) keys 431 source4/heimdal/lib/hx509/ks_file.c _hx509_certs_keys_add(context, f->certs, keys[i]); keys 432 source4/heimdal/lib/hx509/ks_file.c _hx509_certs_keys_free(context, keys); keys 574 source4/heimdal/lib/hx509/ks_file.c hx509_private_key **keys) keys 577 source4/heimdal/lib/hx509/ks_file.c return _hx509_certs_keys_get(context, f->certs, keys); keys 49 source4/heimdal/lib/hx509/ks_mem.c hx509_private_key *keys; keys 81 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++) keys 82 source4/heimdal/lib/hx509/ks_mem.c _hx509_private_key_free(&mem->keys[i]); keys 83 source4/heimdal/lib/hx509/ks_mem.c free(mem->keys); keys 159 source4/heimdal/lib/hx509/ks_mem.c hx509_private_key **keys) keys 164 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++) keys 166 source4/heimdal/lib/hx509/ks_mem.c *keys = calloc(i + 1, sizeof(**keys)); keys 167 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++) { keys 168 source4/heimdal/lib/hx509/ks_mem.c (*keys)[i] = _hx509_private_key_ref(mem->keys[i]); keys 169 source4/heimdal/lib/hx509/ks_mem.c if ((*keys)[i] == NULL) { keys 171 source4/heimdal/lib/hx509/ks_mem.c _hx509_private_key_free(&(*keys)[i]); keys 176 source4/heimdal/lib/hx509/ks_mem.c (*keys)[i] = NULL; keys 190 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++) keys 192 source4/heimdal/lib/hx509/ks_mem.c ptr = realloc(mem->keys, (i + 2) * sizeof(*mem->keys)); keys 197 source4/heimdal/lib/hx509/ks_mem.c mem->keys = ptr; keys 198 source4/heimdal/lib/hx509/ks_mem.c mem->keys[i] = _hx509_private_key_ref(key); keys 199 source4/heimdal/lib/hx509/ks_mem.c mem->keys[i + 1] = NULL; keys 436 source4/heimdal/lib/krb5/crypto.c DES_cblock keys[3]; keys 461 source4/heimdal/lib/krb5/crypto.c memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); keys 462 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity(keys + i); keys 463 source4/heimdal/lib/krb5/crypto.c if(DES_is_weak_key(keys + i)) keys 464 source4/heimdal/lib/krb5/crypto.c xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); keys 465 source4/heimdal/lib/krb5/crypto.c DES_set_key_unchecked(keys + i, &s[i]); keys 474 source4/heimdal/lib/krb5/crypto.c memcpy(keys + i, tmp + i * 8, sizeof(keys[i])); keys 475 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity(keys + i); keys 476 source4/heimdal/lib/krb5/crypto.c if(DES_is_weak_key(keys + i)) keys 477 source4/heimdal/lib/krb5/crypto.c xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0"); keys 482 source4/heimdal/lib/krb5/crypto.c krb5_data_copy(&key->keyvalue, keys, sizeof(keys)); keys 483 source4/heimdal/lib/krb5/crypto.c memset(keys, 0, sizeof(keys)); keys 221 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = NULL; keys 222 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0; keys 327 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0; keys 328 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = calloc(allocated_keys, sizeof(Key)); keys 329 source4/kdc/hdb-samba4.c if (entry_ex->entry.keys.val == NULL) { keys 348 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; keys 349 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++; keys 357 source4/kdc/hdb-samba4.c if (!pkb4->keys[i].value) continue; keys 360 source4/kdc/hdb-samba4.c switch (pkb4->keys[i].keytype) { keys 399 source4/kdc/hdb-samba4.c pkb4->keys[i].keytype, keys 400 source4/kdc/hdb-samba4.c pkb4->keys[i].value->data, keys 401 source4/kdc/hdb-samba4.c pkb4->keys[i].value->length, keys 412 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; keys 413 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++; keys 420 source4/kdc/hdb-samba4.c if (!pkb3->keys[i].value) continue; keys 423 source4/kdc/hdb-samba4.c switch (pkb3->keys[i].keytype) { keys 460 source4/kdc/hdb-samba4.c pkb3->keys[i].keytype, keys 461 source4/kdc/hdb-samba4.c pkb3->keys[i].value->data, keys 462 source4/kdc/hdb-samba4.c pkb3->keys[i].value->length, keys 473 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; keys 474 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++; keys 480 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0; keys 482 source4/kdc/hdb-samba4.c if (entry_ex->entry.keys.len == 0 && entry_ex->entry.keys.val) { keys 483 source4/kdc/hdb-samba4.c free(entry_ex->entry.keys.val); keys 484 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = NULL; keys 670 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->len = entry_ex->entry.keys.len; keys 678 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype; keys 790 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0; keys 791 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = NULL; keys 796 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = calloc(1, sizeof(Key)); keys 801 source4/kdc/hdb-samba4.c if (entry_ex->entry.keys.val == NULL) { keys 811 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; keys 812 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++; keys 859 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->len = entry_ex->entry.keys.len; keys 867 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype; keys 67 source4/libnet/libnet_samsync.c struct netr_USER_KEYS keys; keys 75 source4/libnet/libnet_samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, NULL, &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS); keys 82 source4/libnet/libnet_samsync.c if (keys.keys.keys2.lmpassword.length == 16) { keys 84 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, keys.keys.keys2.lmpassword.pwd.hash, lm_hash.hash, 0); keys 87 source4/libnet/libnet_samsync.c user->lmpassword = keys.keys.keys2.lmpassword.pwd; keys 91 source4/libnet/libnet_samsync.c if (keys.keys.keys2.ntpassword.length == 16) { keys 93 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, keys.keys.keys2.ntpassword.pwd.hash, nt_hash.hash, 0); keys 96 source4/libnet/libnet_samsync.c user->ntpassword = keys.keys.keys2.ntpassword.pwd; keys 577 source4/torture/rpc/samsync.c struct netr_USER_KEYS keys; keys 582 source4/torture/rpc/samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, lp_iconv_convenience(tctx->lp_ctx), &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS); keys 584 source4/torture/rpc/samsync.c if (keys.keys.keys2.lmpassword.length == 16) { keys 585 source4/torture/rpc/samsync.c sam_rid_crypt(rid, keys.keys.keys2.lmpassword.pwd.hash, lm_hash.hash, 0); keys 588 source4/torture/rpc/samsync.c if (keys.keys.keys2.ntpassword.length == 16) { keys 589 source4/torture/rpc/samsync.c sam_rid_crypt(rid, keys.keys.keys2.ntpassword.pwd.hash, nt_hash.hash, 0);