keys              189 lib/tdb/tools/tdbtest.c 	char keys[5][2];
keys              194 lib/tdb/tools/tdbtest.c 		snprintf(keys[i],2, "%d", i);
keys              195 lib/tdb/tools/tdbtest.c 		key.dptr = keys[i];
keys              206 lib/tdb/tools/tdbtest.c 	key.dptr = keys[0];
keys              208 lib/tdb/tools/tdbtest.c 	key.dptr = keys[4];
keys              210 lib/tdb/tools/tdbtest.c 	key.dptr = keys[2];
keys              212 lib/tdb/tools/tdbtest.c 	key.dptr = keys[1];
keys              214 lib/tdb/tools/tdbtest.c 	key.dptr = keys[3];
keys              149 lib/zlib/contrib/minizip/unzip.c     unsigned long keys[3];     /* keys defining the pseudo-random sequence */
keys             1171 lib/zlib/contrib/minizip/unzip.c         init_keys(password,s->keys,s->pcrc_32_tab);
keys             1181 lib/zlib/contrib/minizip/unzip.c             zdecode(s->keys,s->pcrc_32_tab,source[i]);
keys             1292 lib/zlib/contrib/minizip/unzip.c                       zdecode(s->keys,s->pcrc_32_tab,
keys              132 lib/zlib/contrib/minizip/zip.c     unsigned long keys[3];     /* keys defining the pseudo-random sequence */
keys              886 lib/zlib/contrib/minizip/zip.c         sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
keys              955 lib/zlib/contrib/minizip/zip.c             zi->ci.buffered_data[i] = zencode(zi->ci.keys, zi->ci.pcrc_32_tab,
keys              208 librpc/gen_ndr/drsblobs.h 	struct package_PrimaryKerberosKey3 *keys;
keys              234 librpc/gen_ndr/drsblobs.h 	struct package_PrimaryKerberosKey4 *keys;
keys             1642 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_push_package_PrimaryKerberosKey3(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys             1656 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_push_package_PrimaryKerberosKey3(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys             1676 librpc/gen_ndr/ndr_drsblobs.c 		NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys);
keys             1678 librpc/gen_ndr/ndr_drsblobs.c 		NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys             1680 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_pull_package_PrimaryKerberosKey3(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys             1699 librpc/gen_ndr/ndr_drsblobs.c 		NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys             1701 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_pull_package_PrimaryKerberosKey3(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys             1728 librpc/gen_ndr/ndr_drsblobs.c 			ndr_print_package_PrimaryKerberosKey3(ndr, "keys", &r->keys[cntr_keys_0]);
keys             1870 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_push_package_PrimaryKerberosKey4(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys             1882 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_push_package_PrimaryKerberosKey4(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys             1912 librpc/gen_ndr/ndr_drsblobs.c 		NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys);
keys             1914 librpc/gen_ndr/ndr_drsblobs.c 		NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys             1916 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_pull_package_PrimaryKerberosKey4(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys             1944 librpc/gen_ndr/ndr_drsblobs.c 		NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys             1946 librpc/gen_ndr/ndr_drsblobs.c 			NDR_CHECK(ndr_pull_package_PrimaryKerberosKey4(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys             1990 librpc/gen_ndr/ndr_drsblobs.c 			ndr_print_package_PrimaryKerberosKey4(ndr, "keys", &r->keys[cntr_keys_0]);
keys             2364 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_netr_USER_KEY_UNION(ndr, NDR_SCALARS, &r->keys));
keys             2376 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_pull_netr_USER_KEY_UNION(ndr, NDR_SCALARS, &r->keys));
keys             2388 librpc/gen_ndr/ndr_netlogon.c 	ndr_print_netr_USER_KEY_UNION(ndr, "keys", &r->keys);
keys              296 librpc/gen_ndr/netlogon.h 	struct netr_USER_KEY_UNION keys;
keys              254 source3/include/nt_printing.h 	NT_PRINTER_KEY	*keys;
keys              406 source3/libads/ldap_printer.c 		REGVAL_CTR *ctr = data->keys[key].values;
keys              436 source3/libnet/libnet_dssync_keytab.c 			if (!pkb4->keys[i].value) {
keys              442 source3/libnet/libnet_dssync_keytab.c 								     pkb4->keys[i].keytype,
keys              443 source3/libnet/libnet_dssync_keytab.c 								     *pkb4->keys[i].value);
keys              478 source3/libnet/libnet_dssync_keytab.c 			if (!pkb3->keys[i].value) {
keys              483 source3/libnet/libnet_dssync_keytab.c 								     pkb3->keys[i].keytype,
keys              484 source3/libnet/libnet_dssync_keytab.c 								     *pkb3->keys[i].value);
keys               71 source3/libnet/libnet_samsync.c 		struct netr_USER_KEYS keys;
keys               79 source3/libnet/libnet_samsync.c 		ndr_err = ndr_pull_struct_blob(&data, mem_ctx, NULL, &keys,
keys               89 source3/libnet/libnet_samsync.c 		if (keys.keys.keys2.lmpassword.length == 16) {
keys               90 source3/libnet/libnet_samsync.c 			if (memcmp(keys.keys.keys2.lmpassword.pwd.hash,
keys               93 source3/libnet/libnet_samsync.c 					keys.keys.keys2.lmpassword.pwd.hash,
keys              101 source3/libnet/libnet_samsync.c 		if (keys.keys.keys2.ntpassword.length == 16) {
keys              102 source3/libnet/libnet_samsync.c 			if (memcmp(keys.keys.keys2.ntpassword.pwd.hash,
keys              105 source3/libnet/libnet_samsync.c 					keys.keys.keys2.ntpassword.pwd.hash,
keys              143 source3/librpc/gen_ndr/messaging.h 	DATA_BLOB *keys;
keys              206 source3/librpc/gen_ndr/ndr_messaging.c 			NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->keys[cntr_keys_0]));
keys              233 source3/librpc/gen_ndr/ndr_messaging.c 		NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys);
keys              235 source3/librpc/gen_ndr/ndr_messaging.c 		NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys              237 source3/librpc/gen_ndr/ndr_messaging.c 			NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys              263 source3/librpc/gen_ndr/ndr_messaging.c 			ndr_print_DATA_BLOB(ndr, "keys", r->keys[cntr_keys_0]);
keys             2431 source3/printing/nt_printing.c 		val_ctr = data->keys[i].values;
keys             2437 source3/printing/nt_printing.c 				&data->keys[i].name,
keys             2438 source3/printing/nt_printing.c 				data->keys[i].name,
keys             2450 source3/printing/nt_printing.c 					data->keys[i].name,
keys             2804 source3/printing/nt_printing.c 	if ( !(d = TALLOC_REALLOC_ARRAY( data, data->keys, NT_PRINTER_KEY, data->num_keys+1)) ) {
keys             2809 source3/printing/nt_printing.c 	data->keys = d;
keys             2815 source3/printing/nt_printing.c 	data->keys[key_index].name = talloc_strdup( data, name );
keys             2817 source3/printing/nt_printing.c 	if ( !(data->keys[key_index].values = TALLOC_ZERO_P( data, REGVAL_CTR )) )
keys             2836 source3/printing/nt_printing.c 		if ( strequal( data->keys[i].name, name ) ) {
keys             2840 source3/printing/nt_printing.c 			TALLOC_FREE( data->keys[i].name );
keys             2841 source3/printing/nt_printing.c 			TALLOC_FREE( data->keys[i].values );
keys             2847 source3/printing/nt_printing.c 				memmove( &data->keys[i], &data->keys[i+1], sizeof(NT_PRINTER_KEY)*(data->num_keys-i) );
keys             2874 source3/printing/nt_printing.c 		if ( strequal(data->keys[i].name, name) ) {
keys             2918 source3/printing/nt_printing.c 			fstrcpy( subkeys_ptr[num_subkeys], data->keys[i].name );
keys             2929 source3/printing/nt_printing.c 		if ( StrnCaseCmp(data->keys[i].name, key, strlen(key)) == 0 ) {
keys             2933 source3/printing/nt_printing.c 			if ( strlen(data->keys[i].name) == key_len )
keys             2938 source3/printing/nt_printing.c 			p = data->keys[i].name + key_len;
keys             3061 source3/printing/nt_printing.c 	ctr = info2->data->keys[i].values;
keys             3130 source3/printing/nt_printing.c 	ctr = info2->data->keys[i].values;
keys             3427 source3/printing/nt_printing.c 	    !(ctr = printer->info_2->data->keys[i].values) ||
keys             3516 source3/printing/nt_printing.c 		if ( StrnCaseCmp( data->keys[i].name, key, strlen(key)) == 0 ) {
keys             3518 source3/printing/nt_printing.c 				data->keys[i].name));
keys             3520 source3/printing/nt_printing.c 			TALLOC_FREE( data->keys[i].name );
keys             3521 source3/printing/nt_printing.c 			TALLOC_FREE( data->keys[i].values );
keys             3525 source3/printing/nt_printing.c 			ZERO_STRUCTP( &data->keys[i] );
keys             3532 source3/printing/nt_printing.c 		if ( !data->keys[i].name ) {
keys             3546 source3/printing/nt_printing.c 		if ( data->keys[i].name ) {
keys             3547 source3/printing/nt_printing.c 			memcpy( &data->keys[empty_slot], &data->keys[i], sizeof(NT_PRINTER_KEY) );
keys             3548 source3/printing/nt_printing.c 			ZERO_STRUCTP( &data->keys[i] );
keys             3563 source3/printing/nt_printing.c 		SAFE_FREE( data->keys );
keys             3591 source3/printing/nt_printing.c 	if ( !regval_ctr_getvalue( p2->data->keys[key_index].values, value ) )
keys             3594 source3/printing/nt_printing.c 	regval_ctr_delvalue( p2->data->keys[key_index].values, value );
keys             3625 source3/printing/nt_printing.c 	regval_ctr_addvalue( p2->data->keys[key_index].values, value,
keys             3647 source3/printing/nt_printing.c 	return regval_ctr_getvalue( p2->data->keys[key_index].values, value );
keys             3754 source3/printing/nt_printing.c 			regval_ctr_addvalue( printer_data->keys[key_index].values,
keys             3762 source3/printing/nt_printing.c 			regval_ctr_addvalue( printer_data->keys[key_index].values,
keys              520 source3/registry/reg_backend_printing.c 	num_values = regval_ctr_numvals( p_data->keys[key_index].values );	
keys              522 source3/registry/reg_backend_printing.c 		regval_ctr_copyvalue( values, regval_ctr_specific_value(p_data->keys[key_index].values, i) );
keys             7982 source3/rpc_server/srv_spoolss_nt.c 		num_values = regval_ctr_numvals( p_data->keys[key_index].values );
keys             7986 source3/rpc_server/srv_spoolss_nt.c 			val = regval_ctr_specific_value( p_data->keys[key_index].values, i );
keys             8017 source3/rpc_server/srv_spoolss_nt.c 		val = regval_ctr_specific_value(p_data->keys[key_index].values,
keys             9479 source3/rpc_server/srv_spoolss_nt.c 	count = regval_ctr_numvals(p_data->keys[key_index].values);
keys             9505 source3/rpc_server/srv_spoolss_nt.c 		val = regval_ctr_specific_value(p_data->keys[key_index].values, i);
keys              455 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->keys		= talloc_array(io->ac,
keys              458 source4/dsdb/samdb/ldb_modules/password_hash.c 	if (!pkb3->keys) {
keys              463 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->keys[0].keytype	= ENCTYPE_DES_CBC_MD5;
keys              464 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->keys[0].value	= &io->g.des_md5;
keys              465 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->keys[1].keytype	= ENCTYPE_DES_CBC_CRC;
keys              466 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->keys[1].value	= &io->g.des_crc;
keys              529 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->old_keys		= old_pkb3->keys;
keys              561 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys = talloc_array(io->ac,
keys              564 source4/dsdb/samdb/ldb_modules/password_hash.c 	if (!pkb4->keys) {
keys              569 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[0].iteration_count	= 4096;
keys              570 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[0].keytype		= ENCTYPE_AES256_CTS_HMAC_SHA1_96;
keys              571 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[0].value		= &io->g.aes_256;
keys              572 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[1].iteration_count	= 4096;
keys              573 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[1].keytype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96;
keys              574 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[1].value		= &io->g.aes_128;
keys              575 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[2].iteration_count	= 4096;
keys              576 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[2].keytype		= ENCTYPE_DES_CBC_MD5;
keys              577 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[2].value		= &io->g.des_md5;
keys              578 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[3].iteration_count	= 4096;
keys              579 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[3].keytype		= ENCTYPE_DES_CBC_CRC;
keys              580 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[3].value		= &io->g.des_crc;
keys              647 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->old_keys		= old_pkb4->keys;
keys              475 source4/heimdal/kdc/kerberos5.c     pa.len = client->keys.len;
keys              483 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
keys              485 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
keys              488 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
keys              497 source4/heimdal/kdc/kerberos5.c 						&client->keys.val[i])) != 0) {
keys              506 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
keys              509 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
keys              512 source4/heimdal/kdc/kerberos5.c 	if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
keys              520 source4/heimdal/kdc/kerberos5.c 					&client->keys.val[i])) != 0) {
keys              636 source4/heimdal/kdc/kerberos5.c     pa.len = client->keys.len;
keys              644 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
keys              646 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
keys              649 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
keys              655 source4/heimdal/kdc/kerberos5.c 						 &client->keys.val[i])) != 0) {
keys              665 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
keys              668 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
keys              671 source4/heimdal/kdc/kerberos5.c 	if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
keys              676 source4/heimdal/kdc/kerberos5.c 					 &client->keys.val[i])) != 0) {
keys             1115 source4/heimdal/lib/hcrypto/des.c     uint32_t *keys;
keys             1123 source4/heimdal/lib/hcrypto/des.c 	keys = &ks->ks[0];
keys             1127 source4/heimdal/lib/hcrypto/des.c 	    work ^= *keys++;
keys             1132 source4/heimdal/lib/hcrypto/des.c 	    work  = right ^ *keys++;
keys             1139 source4/heimdal/lib/hcrypto/des.c 	    work ^= *keys++;
keys             1144 source4/heimdal/lib/hcrypto/des.c 	    work  = left ^ *keys++;
keys             1152 source4/heimdal/lib/hcrypto/des.c 	keys = &ks->ks[30];
keys             1156 source4/heimdal/lib/hcrypto/des.c 	    work ^= *keys++;
keys             1161 source4/heimdal/lib/hcrypto/des.c 	    work  = right ^ *keys++;
keys             1168 source4/heimdal/lib/hcrypto/des.c 	    keys -= 4;
keys             1169 source4/heimdal/lib/hcrypto/des.c 	    work ^= *keys++;
keys             1174 source4/heimdal/lib/hcrypto/des.c 	    work  = left ^ *keys++;
keys             1180 source4/heimdal/lib/hcrypto/des.c 	    keys -= 4;
keys               76 source4/heimdal/lib/hdb/hdb.c     for (k = *key ? (*key) + 1 : e->keys.val;
keys               77 source4/heimdal/lib/hdb/hdb.c 	 k < e->keys.val + e->keys.len;
keys              148 source4/heimdal/lib/hdb/hdb.c     for(i = 0; i < ent->entry.keys.len; ++i) {
keys              149 source4/heimdal/lib/hdb/hdb.c 	Key *k = &ent->entry.keys.val[i];
keys               43 source4/heimdal/lib/hdb/keys.c hdb_free_keys (krb5_context context, int len, Key *keys)
keys               48 source4/heimdal/lib/hdb/keys.c 	free(keys[i].mkvno);
keys               49 source4/heimdal/lib/hdb/keys.c 	keys[i].mkvno = NULL;
keys               50 source4/heimdal/lib/hdb/keys.c 	if (keys[i].salt != NULL) {
keys               51 source4/heimdal/lib/hdb/keys.c 	    free_Salt(keys[i].salt);
keys               52 source4/heimdal/lib/hdb/keys.c 	    free(keys[i].salt);
keys               53 source4/heimdal/lib/hdb/keys.c 	    keys[i].salt = NULL;
keys               55 source4/heimdal/lib/hdb/keys.c 	krb5_free_keyblock_contents(context, &keys[i].key);
keys               57 source4/heimdal/lib/hdb/keys.c     free (keys);
keys              369 source4/heimdal/lib/hdb/keys.c 			      Key **keys, size_t *num_keys)
keys              375 source4/heimdal/lib/hdb/keys.c 				keys, num_keys, 0);
keys              382 source4/heimdal/lib/hdb/keys.c 	salt.salttype = (*keys)[i].salt->type;
keys              383 source4/heimdal/lib/hdb/keys.c 	salt.saltvalue.length = (*keys)[i].salt->salt.length;
keys              384 source4/heimdal/lib/hdb/keys.c 	salt.saltvalue.data = (*keys)[i].salt->salt.data;
keys              387 source4/heimdal/lib/hdb/keys.c 				       (*keys)[i].key.keytype,
keys              390 source4/heimdal/lib/hdb/keys.c 				       &(*keys)[i].key);
keys              397 source4/heimdal/lib/hdb/keys.c 	hdb_free_keys (context, *num_keys, *keys);
keys              240 source4/heimdal/lib/hdb/keytab.c 	if(ent.entry.keys.len > 0)
keys              241 source4/heimdal/lib/hdb/keytab.c 	    enctype = ent.entry.keys.val[0].key.keytype;
keys              243 source4/heimdal/lib/hdb/keytab.c     for(i = 0; i < ent.entry.keys.len; i++) {
keys              244 source4/heimdal/lib/hdb/keytab.c 	if(ent.entry.keys.val[i].key.keytype == enctype) {
keys              248 source4/heimdal/lib/hdb/keytab.c 					&ent.entry.keys.val[i].key,
keys              462 source4/heimdal/lib/hdb/mkey.c     for(i = 0; i < ent->keys.len; i++){
keys              465 source4/heimdal/lib/hdb/mkey.c 	ret = hdb_unseal_key_mkey(context, &ent->keys.val[i], mkey);
keys              528 source4/heimdal/lib/hdb/mkey.c     for(i = 0; i < ent->keys.len; i++){
keys              531 source4/heimdal/lib/hdb/mkey.c 	ret = hdb_seal_key_mkey(context, &ent->keys.val[i], mkey);
keys              287 source4/heimdal/lib/hx509/collector.c 				      hx509_private_key **keys)
keys              291 source4/heimdal/lib/hx509/collector.c     *keys = NULL;
keys              297 source4/heimdal/lib/hx509/collector.c     *keys = calloc(nkeys + 1, sizeof(**keys));
keys              298 source4/heimdal/lib/hx509/collector.c     if (*keys == NULL) {
keys              305 source4/heimdal/lib/hx509/collector.c 	    (*keys)[nkeys++] = c->val.data[i]->private_key;
keys              309 source4/heimdal/lib/hx509/collector.c     (*keys)[nkeys++] = NULL;
keys              644 source4/heimdal/lib/hx509/keyset.c 		      hx509_private_key **keys)
keys              647 source4/heimdal/lib/hx509/keyset.c 	*keys = NULL;
keys              650 source4/heimdal/lib/hx509/keyset.c     return (*certs->ops->getkeys)(context, certs, certs->ops_data, keys);
keys              671 source4/heimdal/lib/hx509/keyset.c 		       hx509_private_key *keys)
keys              674 source4/heimdal/lib/hx509/keyset.c     for (i = 0; keys[i]; i++)
keys              675 source4/heimdal/lib/hx509/keyset.c 	_hx509_private_key_free(&keys[i]);
keys              676 source4/heimdal/lib/hx509/keyset.c     free(keys);
keys              335 source4/heimdal/lib/hx509/ks_file.c     hx509_private_key *keys = NULL;
keys              426 source4/heimdal/lib/hx509/ks_file.c     ret = _hx509_collector_collect_private_keys(context, pem_ctx.c, &keys);
keys              430 source4/heimdal/lib/hx509/ks_file.c 	for (i = 0; keys[i]; i++)
keys              431 source4/heimdal/lib/hx509/ks_file.c 	    _hx509_certs_keys_add(context, f->certs, keys[i]);
keys              432 source4/heimdal/lib/hx509/ks_file.c 	_hx509_certs_keys_free(context, keys);
keys              574 source4/heimdal/lib/hx509/ks_file.c 	     hx509_private_key **keys)
keys              577 source4/heimdal/lib/hx509/ks_file.c     return _hx509_certs_keys_get(context, f->certs, keys);
keys               49 source4/heimdal/lib/hx509/ks_mem.c     hx509_private_key *keys;
keys               81 source4/heimdal/lib/hx509/ks_mem.c     for (i = 0; mem->keys && mem->keys[i]; i++)
keys               82 source4/heimdal/lib/hx509/ks_mem.c 	_hx509_private_key_free(&mem->keys[i]);
keys               83 source4/heimdal/lib/hx509/ks_mem.c     free(mem->keys);
keys              159 source4/heimdal/lib/hx509/ks_mem.c 	     hx509_private_key **keys)
keys              164 source4/heimdal/lib/hx509/ks_mem.c     for (i = 0; mem->keys && mem->keys[i]; i++)
keys              166 source4/heimdal/lib/hx509/ks_mem.c     *keys = calloc(i + 1, sizeof(**keys));
keys              167 source4/heimdal/lib/hx509/ks_mem.c     for (i = 0; mem->keys && mem->keys[i]; i++) {
keys              168 source4/heimdal/lib/hx509/ks_mem.c 	(*keys)[i] = _hx509_private_key_ref(mem->keys[i]);
keys              169 source4/heimdal/lib/hx509/ks_mem.c 	if ((*keys)[i] == NULL) {
keys              171 source4/heimdal/lib/hx509/ks_mem.c 		_hx509_private_key_free(&(*keys)[i]);
keys              176 source4/heimdal/lib/hx509/ks_mem.c     (*keys)[i] = NULL;
keys              190 source4/heimdal/lib/hx509/ks_mem.c     for (i = 0; mem->keys && mem->keys[i]; i++)
keys              192 source4/heimdal/lib/hx509/ks_mem.c     ptr = realloc(mem->keys, (i + 2) * sizeof(*mem->keys));
keys              197 source4/heimdal/lib/hx509/ks_mem.c     mem->keys = ptr;
keys              198 source4/heimdal/lib/hx509/ks_mem.c     mem->keys[i] = _hx509_private_key_ref(key);
keys              199 source4/heimdal/lib/hx509/ks_mem.c     mem->keys[i + 1] = NULL;
keys              436 source4/heimdal/lib/krb5/crypto.c     DES_cblock keys[3];
keys              461 source4/heimdal/lib/krb5/crypto.c 	    memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
keys              462 source4/heimdal/lib/krb5/crypto.c 	    DES_set_odd_parity(keys + i);
keys              463 source4/heimdal/lib/krb5/crypto.c 	    if(DES_is_weak_key(keys + i))
keys              464 source4/heimdal/lib/krb5/crypto.c 		xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
keys              465 source4/heimdal/lib/krb5/crypto.c 	    DES_set_key_unchecked(keys + i, &s[i]);
keys              474 source4/heimdal/lib/krb5/crypto.c 	    memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
keys              475 source4/heimdal/lib/krb5/crypto.c 	    DES_set_odd_parity(keys + i);
keys              476 source4/heimdal/lib/krb5/crypto.c 	    if(DES_is_weak_key(keys + i))
keys              477 source4/heimdal/lib/krb5/crypto.c 		xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
keys              482 source4/heimdal/lib/krb5/crypto.c     krb5_data_copy(&key->keyvalue, keys, sizeof(keys));
keys              483 source4/heimdal/lib/krb5/crypto.c     memset(keys, 0, sizeof(keys));
keys              221 source4/kdc/hdb-samba4.c 	entry_ex->entry.keys.val = NULL;
keys              222 source4/kdc/hdb-samba4.c 	entry_ex->entry.keys.len = 0;
keys              327 source4/kdc/hdb-samba4.c 	entry_ex->entry.keys.len = 0;
keys              328 source4/kdc/hdb-samba4.c 	entry_ex->entry.keys.val = calloc(allocated_keys, sizeof(Key));
keys              329 source4/kdc/hdb-samba4.c 	if (entry_ex->entry.keys.val == NULL) {
keys              348 source4/kdc/hdb-samba4.c 		entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys              349 source4/kdc/hdb-samba4.c 		entry_ex->entry.keys.len++;
keys              357 source4/kdc/hdb-samba4.c 			if (!pkb4->keys[i].value) continue;
keys              360 source4/kdc/hdb-samba4.c 				switch (pkb4->keys[i].keytype) {
keys              399 source4/kdc/hdb-samba4.c 						 pkb4->keys[i].keytype,
keys              400 source4/kdc/hdb-samba4.c 						 pkb4->keys[i].value->data,
keys              401 source4/kdc/hdb-samba4.c 						 pkb4->keys[i].value->length,
keys              412 source4/kdc/hdb-samba4.c 			entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys              413 source4/kdc/hdb-samba4.c 			entry_ex->entry.keys.len++;
keys              420 source4/kdc/hdb-samba4.c 			if (!pkb3->keys[i].value) continue;
keys              423 source4/kdc/hdb-samba4.c 				switch (pkb3->keys[i].keytype) {
keys              460 source4/kdc/hdb-samba4.c 						 pkb3->keys[i].keytype,
keys              461 source4/kdc/hdb-samba4.c 						 pkb3->keys[i].value->data,
keys              462 source4/kdc/hdb-samba4.c 						 pkb3->keys[i].value->length,
keys              473 source4/kdc/hdb-samba4.c 			entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys              474 source4/kdc/hdb-samba4.c 			entry_ex->entry.keys.len++;
keys              480 source4/kdc/hdb-samba4.c 		entry_ex->entry.keys.len = 0;
keys              482 source4/kdc/hdb-samba4.c 	if (entry_ex->entry.keys.len == 0 && entry_ex->entry.keys.val) {
keys              483 source4/kdc/hdb-samba4.c 		free(entry_ex->entry.keys.val);
keys              484 source4/kdc/hdb-samba4.c 		entry_ex->entry.keys.val = NULL;
keys              670 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes->len = entry_ex->entry.keys.len;
keys              678 source4/kdc/hdb-samba4.c 		entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;
keys              790 source4/kdc/hdb-samba4.c 	entry_ex->entry.keys.len = 0;
keys              791 source4/kdc/hdb-samba4.c 	entry_ex->entry.keys.val = NULL;
keys              796 source4/kdc/hdb-samba4.c 		entry_ex->entry.keys.val = calloc(1, sizeof(Key));
keys              801 source4/kdc/hdb-samba4.c 		if (entry_ex->entry.keys.val == NULL) {
keys              811 source4/kdc/hdb-samba4.c 		entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys              812 source4/kdc/hdb-samba4.c 		entry_ex->entry.keys.len++;
keys              859 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes->len = entry_ex->entry.keys.len;
keys              867 source4/kdc/hdb-samba4.c 		entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;
keys               67 source4/libnet/libnet_samsync.c 		struct netr_USER_KEYS keys;
keys               75 source4/libnet/libnet_samsync.c 		ndr_err = ndr_pull_struct_blob(&data, mem_ctx, NULL, &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS);
keys               82 source4/libnet/libnet_samsync.c 		if (keys.keys.keys2.lmpassword.length == 16) {
keys               84 source4/libnet/libnet_samsync.c 				sam_rid_crypt(rid, keys.keys.keys2.lmpassword.pwd.hash, lm_hash.hash, 0);
keys               87 source4/libnet/libnet_samsync.c 				user->lmpassword = keys.keys.keys2.lmpassword.pwd;
keys               91 source4/libnet/libnet_samsync.c 		if (keys.keys.keys2.ntpassword.length == 16) {
keys               93 source4/libnet/libnet_samsync.c 				sam_rid_crypt(rid, keys.keys.keys2.ntpassword.pwd.hash, nt_hash.hash, 0);
keys               96 source4/libnet/libnet_samsync.c 				user->ntpassword = keys.keys.keys2.ntpassword.pwd;
keys              577 source4/torture/rpc/samsync.c 		struct netr_USER_KEYS keys;
keys              582 source4/torture/rpc/samsync.c 		ndr_err = ndr_pull_struct_blob(&data, mem_ctx, lp_iconv_convenience(tctx->lp_ctx), &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS);
keys              584 source4/torture/rpc/samsync.c 			if (keys.keys.keys2.lmpassword.length == 16) {
keys              585 source4/torture/rpc/samsync.c 				sam_rid_crypt(rid, keys.keys.keys2.lmpassword.pwd.hash, lm_hash.hash, 0);
keys              588 source4/torture/rpc/samsync.c 			if (keys.keys.keys2.ntpassword.length == 16) {
keys              589 source4/torture/rpc/samsync.c 				sam_rid_crypt(rid, keys.keys.keys2.ntpassword.pwd.hash, nt_hash.hash, 0);