key 40 examples/perfcounter/perf_writer.c char key[NAME_LEN]; key 43 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, obj.index, "inst"); key 46 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, sdata, TDB_INSERT); key 53 examples/perfcounter/perf_writer.c char key[NAME_LEN]; key 57 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, counter.index, NULL); key 58 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, counter.name, TDB_INSERT); key 60 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, counter.index + 1, NULL); key 61 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, counter.help, TDB_INSERT); key 63 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, counter.index, "rel"); key 64 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, counter.relationships, TDB_INSERT); key 68 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, counter.index, "type"); key 71 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, sdata, TDB_INSERT); key 111 examples/perfcounter/perf_writer.c char key[NAME_LEN]; key 115 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, counter.index, NULL); key 125 examples/perfcounter/perf_writer.c add_key(rt.cdata, key, sdata, tdb_flags); key 138 examples/perfcounter/perf_writer.c char key[NAME_LEN]; key 141 examples/perfcounter/perf_writer.c memset(key, 0, NAME_LEN); key 142 examples/perfcounter/perf_writer.c sprintf(key, "%di%d", parentObjInd, instanceInd); key 143 examples/perfcounter/perf_writer.c add_key_raw(rt.cdata, key, instData, dsize, tdb_flags); key 146 examples/perfcounter/perf_writer.c memset(key, 0, NAME_LEN); key 147 examples/perfcounter/perf_writer.c sprintf(key, "%di%dname", parentObjInd, instanceInd); key 148 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, name, tdb_flags); key 156 examples/perfcounter/perf_writer.c char key[NAME_LEN]; key 160 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, 1, NULL); key 163 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, sdata, tdb_flags); key 166 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, 0, "PerfTime"); key 168 examples/perfcounter/perf_writer.c add_key(rt.cdata, key, sdata, tdb_flags); key 169 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, 0, "PerfTime100nSec"); key 172 examples/perfcounter/perf_writer.c add_key(rt.cdata, key, sdata, tdb_flags); key 174 examples/perfcounter/perf_writer.c make_key(key, NAME_LEN, 0, "PerfFreq"); key 176 examples/perfcounter/perf_writer.c add_key(rt.cnames, key, sdata, tdb_flags); key 33 examples/perfcounter/perf_writer_util.c TDB_DATA key, data; key 35 examples/perfcounter/perf_writer_util.c key.dptr = keystring; key 36 examples/perfcounter/perf_writer_util.c key.dsize = strlen(keystring); key 40 examples/perfcounter/perf_writer_util.c tdb_store(db, key, data, flags); key 45 examples/perfcounter/perf_writer_util.c TDB_DATA key, data; key 47 examples/perfcounter/perf_writer_util.c key.dptr = keystring; key 48 examples/perfcounter/perf_writer_util.c key.dsize = strlen(keystring); key 52 examples/perfcounter/perf_writer_util.c tdb_store(db, key, data, flags); key 129 examples/printing/prtpub.c void map_generic_boolean(HANDLE ph, TCHAR *printer, TCHAR *port, WORD cap, TCHAR *key) key 134 examples/printing/prtpub.c printf("%s: %s\n", key, boolval ? "TRUE" : "FALSE"); key 135 examples/printing/prtpub.c SetPrinterDataEx(ph, SPLDS_DRIVER_KEY, key, REG_BINARY, &boolval, sizeof(boolval)); key 138 examples/printing/prtpub.c void map_generic_dword(HANDLE ph, TCHAR *printer, TCHAR *port, WORD cap, TCHAR *key) key 146 examples/printing/prtpub.c printf("%s: %d\n", key, dword); key 147 examples/printing/prtpub.c SetPrinterDataEx(ph, SPLDS_DRIVER_KEY, key, REG_DWORD, (BYTE *) &dword, sizeof(dword)); key 150 examples/printing/prtpub.c void map_generic_multi_sz(HANDLE ph, TCHAR *printer, TCHAR *port, WORD cap, TCHAR *key, int size) key 162 examples/printing/prtpub.c printf("%s:\n", key); key 169 examples/printing/prtpub.c SetPrinterDataEx(ph, SPLDS_DRIVER_KEY, key, REG_MULTI_SZ, strings_out, key 26 lib/crypto/arcfour.c _PUBLIC_ void arcfour_init(struct arcfour_state *state, const DATA_BLOB *key) key 37 lib/crypto/arcfour.c j += (state->sbox[ind] + key->data[ind%key->length]); key 71 lib/crypto/arcfour.c _PUBLIC_ void arcfour_crypt_blob(uint8_t *data, int len, const DATA_BLOB *key) key 74 lib/crypto/arcfour.c arcfour_init(&state, key); key 84 lib/crypto/arcfour.c DATA_BLOB key = data_blob(keystr, 16); key 86 lib/crypto/arcfour.c arcfour_crypt_blob(data, len, &key); key 88 lib/crypto/arcfour.c data_blob_free(&key); key 10 lib/crypto/arcfour.h void arcfour_init(struct arcfour_state *state, const DATA_BLOB *key); key 12 lib/crypto/arcfour.h void arcfour_crypt_blob(uint8_t *data, int len, const DATA_BLOB *key); key 31 lib/crypto/hmacmd5.c _PUBLIC_ void hmac_md5_init_rfc2104(const uint8_t *key, int key_len, HMACMD5Context *ctx) key 42 lib/crypto/hmacmd5.c MD5Update(&tctx, key, key_len); key 45 lib/crypto/hmacmd5.c key = tk; key 52 lib/crypto/hmacmd5.c memcpy( ctx->k_ipad, key, key_len); key 53 lib/crypto/hmacmd5.c memcpy( ctx->k_opad, key, key_len); key 69 lib/crypto/hmacmd5.c _PUBLIC_ void hmac_md5_init_limK_to_64(const uint8_t *key, int key_len, key 78 lib/crypto/hmacmd5.c hmac_md5_init_rfc2104(key, key_len, ctx); key 108 lib/crypto/hmacmd5.c _PUBLIC_ void hmac_md5(const uint8_t key[16], const uint8_t *data, int data_len, uint8_t *digest) key 111 lib/crypto/hmacmd5.c hmac_md5_init_limK_to_64(key, 16, &ctx); key 34 lib/crypto/hmacmd5.h void hmac_md5_init_limK_to_64(const uint8_t *key, int key_len, key 38 lib/crypto/hmacmd5.h void hmac_md5(const uint8_t key[16], const uint8_t *data, int data_len, uint8_t *digest); key 39 lib/crypto/hmacmd5.h void hmac_md5_init_rfc2104(const uint8_t *key, int key_len, HMACMD5Context *ctx); key 39 lib/crypto/hmacmd5test.c DATA_BLOB key; key 47 lib/crypto/hmacmd5test.c testarray[0].key = data_blob_repeat_byte(0x0b, 16); key 51 lib/crypto/hmacmd5test.c testarray[1].key = data_blob_string_const("Jefe"); key 55 lib/crypto/hmacmd5test.c testarray[2].key = data_blob_repeat_byte(0xaa, 16); key 59 lib/crypto/hmacmd5test.c testarray[3].key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f10111213141516171819"); key 63 lib/crypto/hmacmd5test.c testarray[4].key = data_blob_repeat_byte(0x0c, 16); key 67 lib/crypto/hmacmd5test.c testarray[5].key = data_blob_repeat_byte(0xaa, 80); key 71 lib/crypto/hmacmd5test.c testarray[6].key = data_blob_repeat_byte(0xaa, 80); key 76 lib/crypto/hmacmd5test.c testarray[7].key = data_blob(NULL, 0); key 78 lib/crypto/hmacmd5test.c for (i=0; testarray[i].key.data; i++) { key 83 lib/crypto/hmacmd5test.c hmac_md5_init_rfc2104(testarray[i].key.data, testarray[i].key.length, &ctx); key 92 lib/crypto/hmacmd5test.c dump_data(0, testarray[i].key.data, testarray[i].key.length); key 35 lib/crypto/hmacsha256.c _PUBLIC_ void hmac_sha256_init(const uint8_t *key, size_t key_len, struct HMACSHA256Context *ctx) key 46 lib/crypto/hmacsha256.c SHA256_Update(&tctx, key, key_len); key 49 lib/crypto/hmacsha256.c key = tk; key 56 lib/crypto/hmacsha256.c memcpy( ctx->k_ipad, key, key_len); key 57 lib/crypto/hmacsha256.c memcpy( ctx->k_opad, key, key_len); key 34 lib/crypto/hmacsha256.h void hmac_sha256_init(const uint8_t *key, size_t key_len, struct HMACSHA256Context *ctx); key 25 lib/popt/popthelp.c struct poptOption * key, key 30 lib/popt/popthelp.c if (key->shortName == '?') key 540 lib/replace/crypt.c static void ufc_mk_keytab(char *key) key 552 lib/replace/crypt.c v1 |= k1[*key & 0x7f]; k1 += 128; key 553 lib/replace/crypt.c v2 |= k1[*key++ & 0x7f]; k1 += 128; key 655 lib/replace/crypt.c char *ufc_crypt(const char *key,const char *salt) key 668 lib/replace/crypt.c StrnCpy(ktab, key, 8); key 683 lib/replace/replace.h char *ufc_crypt(const char *key, const char *salt); key 195 lib/replace/test/testsuite.c #define TEST_SETENV(key, value, overwrite, result) do { \ key 198 lib/replace/test/testsuite.c _ret = setenv(key, value, overwrite); \ key 203 lib/replace/test/testsuite.c key, value, overwrite); \ key 206 lib/replace/test/testsuite.c _v=getenv(key); \ key 211 lib/replace/test/testsuite.c key); \ key 218 lib/replace/test/testsuite.c key, result, _v); \ key 223 lib/replace/test/testsuite.c #define TEST_UNSETENV(key) do { \ key 225 lib/replace/test/testsuite.c unsetenv(key); \ key 226 lib/replace/test/testsuite.c _v=getenv(key); \ key 38 lib/tdb/common/freelistcheck.c TDB_DATA key, data; key 41 lib/tdb/common/freelistcheck.c key.dptr = (unsigned char *)&rec_ptr; key 42 lib/tdb/common/freelistcheck.c key.dsize = sizeof(rec_ptr); key 43 lib/tdb/common/freelistcheck.c return tdb_store(mem_tdb, key, data, TDB_INSERT); key 406 lib/tdb/common/io.c int tdb_parse_data(struct tdb_context *tdb, TDB_DATA key, key 408 lib/tdb/common/io.c int (*parser)(TDB_DATA key, TDB_DATA data, key 426 lib/tdb/common/io.c return parser(key, data, private_data); key 433 lib/tdb/common/io.c result = parser(key, data, private_data); key 463 lib/tdb/common/lock.c int tdb_chainlock(struct tdb_context *tdb, TDB_DATA key) key 465 lib/tdb/common/lock.c return tdb_lock(tdb, BUCKET(tdb->hash_fn(&key)), F_WRLCK); key 471 lib/tdb/common/lock.c int tdb_chainlock_nonblock(struct tdb_context *tdb, TDB_DATA key) key 473 lib/tdb/common/lock.c return tdb_lock_nonblock(tdb, BUCKET(tdb->hash_fn(&key)), F_WRLCK); key 477 lib/tdb/common/lock.c int tdb_chainlock_mark(struct tdb_context *tdb, TDB_DATA key) key 479 lib/tdb/common/lock.c return tdb_lock(tdb, BUCKET(tdb->hash_fn(&key)), F_WRLCK | TDB_MARK_LOCK); key 483 lib/tdb/common/lock.c int tdb_chainlock_unmark(struct tdb_context *tdb, TDB_DATA key) key 485 lib/tdb/common/lock.c return tdb_unlock(tdb, BUCKET(tdb->hash_fn(&key)), F_WRLCK | TDB_MARK_LOCK); key 488 lib/tdb/common/lock.c int tdb_chainunlock(struct tdb_context *tdb, TDB_DATA key) key 490 lib/tdb/common/lock.c return tdb_unlock(tdb, BUCKET(tdb->hash_fn(&key)), F_WRLCK); key 493 lib/tdb/common/lock.c int tdb_chainlock_read(struct tdb_context *tdb, TDB_DATA key) key 495 lib/tdb/common/lock.c return tdb_lock(tdb, BUCKET(tdb->hash_fn(&key)), F_RDLCK); key 498 lib/tdb/common/lock.c int tdb_chainunlock_read(struct tdb_context *tdb, TDB_DATA key) key 500 lib/tdb/common/lock.c return tdb_unlock(tdb, BUCKET(tdb->hash_fn(&key)), F_RDLCK); key 35 lib/tdb/common/open.c static unsigned int default_tdb_hash(TDB_DATA *key) key 41 lib/tdb/common/open.c for (value = 0x238F13AF * key->dsize, i=0; i < key->dsize; i++) key 42 lib/tdb/common/open.c value = (value + (key->dptr[i] << (i*5 % 24))); key 71 lib/tdb/common/tdb.c static int tdb_key_compare(TDB_DATA key, TDB_DATA data, void *private_data) key 73 lib/tdb/common/tdb.c return memcmp(data.dptr, key.dptr, data.dsize); key 78 lib/tdb/common/tdb.c static tdb_off_t tdb_find(struct tdb_context *tdb, TDB_DATA key, uint32_t hash, key 93 lib/tdb/common/tdb.c && key.dsize==r->key_len key 94 lib/tdb/common/tdb.c && tdb_parse_data(tdb, key, rec_ptr + sizeof(*r), key 110 lib/tdb/common/tdb.c tdb_off_t tdb_find_lock_hash(struct tdb_context *tdb, TDB_DATA key, uint32_t hash, int locktype, key 117 lib/tdb/common/tdb.c if (!(rec_ptr = tdb_find(tdb, key, hash, rec))) key 127 lib/tdb/common/tdb.c static int tdb_update_hash(struct tdb_context *tdb, TDB_DATA key, uint32_t hash, TDB_DATA dbuf) key 133 lib/tdb/common/tdb.c if (!(rec_ptr = tdb_find(tdb, key, hash, &rec))) key 137 lib/tdb/common/tdb.c if (rec.rec_len < key.dsize + dbuf.dsize + sizeof(tdb_off_t)) { key 161 lib/tdb/common/tdb.c TDB_DATA tdb_fetch(struct tdb_context *tdb, TDB_DATA key) key 169 lib/tdb/common/tdb.c hash = tdb->hash_fn(&key); key 170 lib/tdb/common/tdb.c if (!(rec_ptr = tdb_find_lock_hash(tdb,key,hash,F_RDLCK,&rec))) key 196 lib/tdb/common/tdb.c int tdb_parse_record(struct tdb_context *tdb, TDB_DATA key, key 197 lib/tdb/common/tdb.c int (*parser)(TDB_DATA key, TDB_DATA data, key 207 lib/tdb/common/tdb.c hash = tdb->hash_fn(&key); key 209 lib/tdb/common/tdb.c if (!(rec_ptr = tdb_find_lock_hash(tdb,key,hash,F_RDLCK,&rec))) { key 213 lib/tdb/common/tdb.c ret = tdb_parse_data(tdb, key, rec_ptr + sizeof(rec) + rec.key_len, key 227 lib/tdb/common/tdb.c static int tdb_exists_hash(struct tdb_context *tdb, TDB_DATA key, uint32_t hash) key 231 lib/tdb/common/tdb.c if (tdb_find_lock_hash(tdb, key, hash, F_RDLCK, &rec) == 0) key 237 lib/tdb/common/tdb.c int tdb_exists(struct tdb_context *tdb, TDB_DATA key) key 239 lib/tdb/common/tdb.c uint32_t hash = tdb->hash_fn(&key); key 240 lib/tdb/common/tdb.c return tdb_exists_hash(tdb, key, hash); key 340 lib/tdb/common/tdb.c static int tdb_delete_hash(struct tdb_context *tdb, TDB_DATA key, uint32_t hash) key 364 lib/tdb/common/tdb.c if (!(rec_ptr = tdb_find(tdb, key, hash, &rec))) { key 376 lib/tdb/common/tdb.c if (!(rec_ptr = tdb_find_lock_hash(tdb, key, hash, F_WRLCK, key 392 lib/tdb/common/tdb.c int tdb_delete(struct tdb_context *tdb, TDB_DATA key) key 394 lib/tdb/common/tdb.c uint32_t hash = tdb->hash_fn(&key); key 395 lib/tdb/common/tdb.c return tdb_delete_hash(tdb, key, hash); key 432 lib/tdb/common/tdb.c int tdb_store(struct tdb_context *tdb, TDB_DATA key, TDB_DATA dbuf, int flag) key 446 lib/tdb/common/tdb.c hash = tdb->hash_fn(&key); key 452 lib/tdb/common/tdb.c if (tdb_exists_hash(tdb, key, hash)) { key 458 lib/tdb/common/tdb.c if (tdb_update_hash(tdb, key, hash, dbuf) == 0) { key 475 lib/tdb/common/tdb.c tdb_delete_hash(tdb, key, hash); key 480 lib/tdb/common/tdb.c if (!(p = (char *)malloc(key.dsize + dbuf.dsize))) { key 485 lib/tdb/common/tdb.c memcpy(p, key.dptr, key.dsize); key 487 lib/tdb/common/tdb.c memcpy(p+key.dsize, dbuf.dptr, dbuf.dsize); key 498 lib/tdb/common/tdb.c key.dsize + dbuf.dsize + sizeof(tdb_off_t)); key 501 lib/tdb/common/tdb.c rec.key_len = key.dsize; key 508 lib/tdb/common/tdb.c p, key.dsize + dbuf.dsize) == -1) { key 532 lib/tdb/common/tdb.c rec_ptr = tdb_allocate(tdb, key.dsize + dbuf.dsize, &rec); key 544 lib/tdb/common/tdb.c rec.key_len = key.dsize; key 551 lib/tdb/common/tdb.c || tdb->methods->tdb_write(tdb, rec_ptr+sizeof(rec), p, key.dsize+dbuf.dsize)==-1 key 571 lib/tdb/common/tdb.c int tdb_append(struct tdb_context *tdb, TDB_DATA key, TDB_DATA new_dbuf) key 578 lib/tdb/common/tdb.c hash = tdb->hash_fn(&key); key 582 lib/tdb/common/tdb.c dbuf = tdb_fetch(tdb, key); key 603 lib/tdb/common/tdb.c ret = tdb_store(tdb, key, dbuf, 0); key 817 lib/tdb/common/tdb.c static int repack_traverse(struct tdb_context *tdb, TDB_DATA key, TDB_DATA data, void *private) key 820 lib/tdb/common/tdb.c if (tdb_store(state->dest_db, key, data, TDB_INSERT) != 0) { key 162 lib/tdb/common/tdb_private.h unsigned int (*hash_fn)(TDB_DATA *key); key 201 lib/tdb/common/tdb_private.h int tdb_parse_data(struct tdb_context *tdb, TDB_DATA key, key 203 lib/tdb/common/tdb_private.h int (*parser)(TDB_DATA key, TDB_DATA data, key 206 lib/tdb/common/tdb_private.h tdb_off_t tdb_find_lock_hash(struct tdb_context *tdb, TDB_DATA key, uint32_t hash, int locktype, key 142 lib/tdb/common/traverse.c TDB_DATA key, dbuf; key 158 lib/tdb/common/traverse.c key.dptr = tdb_alloc_read(tdb, tl->off + sizeof(rec), key 160 lib/tdb/common/traverse.c if (!key.dptr) { key 168 lib/tdb/common/traverse.c key.dsize = rec.key_len; key 169 lib/tdb/common/traverse.c dbuf.dptr = key.dptr + rec.key_len; key 175 lib/tdb/common/traverse.c SAFE_FREE(key.dptr); key 178 lib/tdb/common/traverse.c if (fn && fn(tdb, key, dbuf, private_data)) { key 185 lib/tdb/common/traverse.c SAFE_FREE(key.dptr); key 188 lib/tdb/common/traverse.c SAFE_FREE(key.dptr); key 267 lib/tdb/common/traverse.c TDB_DATA key; key 280 lib/tdb/common/traverse.c key.dsize = rec.key_len; key 281 lib/tdb/common/traverse.c key.dptr =tdb_alloc_read(tdb,tdb->travlocks.off+sizeof(rec),key.dsize); key 286 lib/tdb/common/traverse.c return key; key 293 lib/tdb/common/traverse.c TDB_DATA key = tdb_null; key 336 lib/tdb/common/traverse.c key.dsize = rec.key_len; key 337 lib/tdb/common/traverse.c key.dptr = tdb_alloc_read(tdb, tdb->travlocks.off+sizeof(rec), key 338 lib/tdb/common/traverse.c key.dsize); key 346 lib/tdb/common/traverse.c return key; key 85 lib/tdb/include/tdb.h typedef unsigned int (*tdb_hash_func)(TDB_DATA *key); key 105 lib/tdb/include/tdb.h TDB_DATA tdb_fetch(struct tdb_context *tdb, TDB_DATA key); key 106 lib/tdb/include/tdb.h int tdb_parse_record(struct tdb_context *tdb, TDB_DATA key, key 107 lib/tdb/include/tdb.h int (*parser)(TDB_DATA key, TDB_DATA data, key 110 lib/tdb/include/tdb.h int tdb_delete(struct tdb_context *tdb, TDB_DATA key); key 111 lib/tdb/include/tdb.h int tdb_store(struct tdb_context *tdb, TDB_DATA key, TDB_DATA dbuf, int flag); key 112 lib/tdb/include/tdb.h int tdb_append(struct tdb_context *tdb, TDB_DATA key, TDB_DATA new_dbuf); key 115 lib/tdb/include/tdb.h TDB_DATA tdb_nextkey(struct tdb_context *tdb, TDB_DATA key); key 118 lib/tdb/include/tdb.h int tdb_exists(struct tdb_context *tdb, TDB_DATA key); key 145 lib/tdb/include/tdb.h int tdb_chainlock(struct tdb_context *tdb, TDB_DATA key); key 146 lib/tdb/include/tdb.h int tdb_chainlock_nonblock(struct tdb_context *tdb, TDB_DATA key); key 147 lib/tdb/include/tdb.h int tdb_chainunlock(struct tdb_context *tdb, TDB_DATA key); key 148 lib/tdb/include/tdb.h int tdb_chainlock_read(struct tdb_context *tdb, TDB_DATA key); key 149 lib/tdb/include/tdb.h int tdb_chainunlock_read(struct tdb_context *tdb, TDB_DATA key); key 150 lib/tdb/include/tdb.h int tdb_chainlock_mark(struct tdb_context *tdb, TDB_DATA key); key 151 lib/tdb/include/tdb.h int tdb_chainlock_unmark(struct tdb_context *tdb, TDB_DATA key); key 177 lib/tdb/pytdb.c TDB_DATA key; key 182 lib/tdb/pytdb.c key = PyString_AsTDB_DATA(py_key); key 184 lib/tdb/pytdb.c return PyString_FromTDB_DATA(tdb_fetch(self->ctx, key)); key 189 lib/tdb/pytdb.c TDB_DATA key, data; key 195 lib/tdb/pytdb.c key = PyString_AsTDB_DATA(py_key); key 198 lib/tdb/pytdb.c ret = tdb_append(self->ctx, key, data); key 210 lib/tdb/pytdb.c TDB_DATA key; key 215 lib/tdb/pytdb.c key = PyString_AsTDB_DATA(py_key); key 217 lib/tdb/pytdb.c return PyString_FromTDB_DATA(tdb_nextkey(self->ctx, key)); key 222 lib/tdb/pytdb.c TDB_DATA key; key 228 lib/tdb/pytdb.c key = PyString_AsTDB_DATA(py_key); key 229 lib/tdb/pytdb.c ret = tdb_delete(self->ctx, key); key 236 lib/tdb/pytdb.c TDB_DATA key; key 242 lib/tdb/pytdb.c key = PyString_AsTDB_DATA(py_key); key 243 lib/tdb/pytdb.c ret = tdb_exists(self->ctx, key); key 253 lib/tdb/pytdb.c TDB_DATA key, value; key 261 lib/tdb/pytdb.c key = PyString_AsTDB_DATA(py_key); key 264 lib/tdb/pytdb.c ret = tdb_store(self->ctx, key, value, flag); key 409 lib/tdb/pytdb.c static PyObject *obj_getitem(PyTdbObject *self, PyObject *key) key 412 lib/tdb/pytdb.c if (!PyString_Check(key)) { key 417 lib/tdb/pytdb.c tkey.dptr = (unsigned char *)PyString_AsString(key); key 418 lib/tdb/pytdb.c tkey.dsize = PyString_Size(key); key 429 lib/tdb/pytdb.c static int obj_setitem(PyTdbObject *self, PyObject *key, PyObject *value) key 433 lib/tdb/pytdb.c if (!PyString_Check(key)) { key 438 lib/tdb/pytdb.c tkey = PyString_AsTDB_DATA(key); key 69 lib/tdb/tools/tdbbackup.c static int copy_fn(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 73 lib/tdb/tools/tdbbackup.c if (tdb_store(tdb_new, key, dbuf, TDB_INSERT) != 0) { key 82 lib/tdb/tools/tdbbackup.c static int test_fn(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 41 lib/tdb/tools/tdbdump.c static int traverse_fn(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 44 lib/tdb/tools/tdbdump.c printf("key(%d) = \"", (int)key.dsize); key 45 lib/tdb/tools/tdbdump.c print_data(key); key 57 lib/tdb/tools/tdbdump.c TDB_DATA key, value; key 68 lib/tdb/tools/tdbdump.c key.dptr = discard_const_p(uint8_t,keyname); key 69 lib/tdb/tools/tdbdump.c key.dsize = strlen( keyname); key 70 lib/tdb/tools/tdbdump.c value = tdb_fetch(tdb, key); key 52 lib/tdb/tools/tdbtest.c TDB_DATA d, key, nextkey; key 55 lib/tdb/tools/tdbtest.c key = tdb_firstkey(db); key 56 lib/tdb/tools/tdbtest.c while (key.dptr) { key 57 lib/tdb/tools/tdbtest.c d = tdb_fetch(db, key); key 58 lib/tdb/tools/tdbtest.c gkey.dptr = key.dptr; key 59 lib/tdb/tools/tdbtest.c gkey.dsize = key.dsize; key 69 lib/tdb/tools/tdbtest.c nextkey = tdb_nextkey(db, key); key 70 lib/tdb/tools/tdbtest.c free(key.dptr); key 73 lib/tdb/tools/tdbtest.c key = nextkey; key 79 lib/tdb/tools/tdbtest.c key.dptr = gkey.dptr; key 80 lib/tdb/tools/tdbtest.c key.dsize = gkey.dsize; key 82 lib/tdb/tools/tdbtest.c d = tdb_fetch(db, key); key 115 lib/tdb/tools/tdbtest.c TDB_DATA key, data; key 123 lib/tdb/tools/tdbtest.c key.dptr = k; key 124 lib/tdb/tools/tdbtest.c key.dsize = klen+1; key 130 lib/tdb/tools/tdbtest.c tdb_delete(db, key); key 132 lib/tdb/tools/tdbtest.c if (tdb_store(db, key, data, TDB_REPLACE) != 0) { key 136 lib/tdb/tools/tdbtest.c data = tdb_fetch(db, key); key 148 lib/tdb/tools/tdbtest.c datum key, data; key 156 lib/tdb/tools/tdbtest.c key.dptr = k; key 157 lib/tdb/tools/tdbtest.c key.dsize = klen+1; key 163 lib/tdb/tools/tdbtest.c gdbm_delete(gdbm, key); key 165 lib/tdb/tools/tdbtest.c if (gdbm_store(gdbm, key, data, GDBM_REPLACE) != 0) { key 169 lib/tdb/tools/tdbtest.c data = gdbm_fetch(gdbm, key); key 177 lib/tdb/tools/tdbtest.c static int traverse_fn(struct tdb_context *tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 180 lib/tdb/tools/tdbtest.c printf("[%s] [%s]\n", key.dptr, dbuf.dptr); key 182 lib/tdb/tools/tdbtest.c tdb_delete(tdb, key); key 191 lib/tdb/tools/tdbtest.c TDB_DATA key, data; key 195 lib/tdb/tools/tdbtest.c key.dptr = keys[i]; key 196 lib/tdb/tools/tdbtest.c key.dsize = 2; key 201 lib/tdb/tools/tdbtest.c if (tdb_store(db, key, data, TDB_REPLACE) != 0) { key 206 lib/tdb/tools/tdbtest.c key.dptr = keys[0]; key 207 lib/tdb/tools/tdbtest.c tdb_delete(db, key); key 208 lib/tdb/tools/tdbtest.c key.dptr = keys[4]; key 209 lib/tdb/tools/tdbtest.c tdb_delete(db, key); key 210 lib/tdb/tools/tdbtest.c key.dptr = keys[2]; key 211 lib/tdb/tools/tdbtest.c tdb_delete(db, key); key 212 lib/tdb/tools/tdbtest.c key.dptr = keys[1]; key 213 lib/tdb/tools/tdbtest.c tdb_delete(db, key); key 214 lib/tdb/tools/tdbtest.c key.dptr = keys[3]; key 215 lib/tdb/tools/tdbtest.c tdb_delete(db, key); key 116 lib/tdb/tools/tdbtool.c static int print_rec(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state); key 117 lib/tdb/tools/tdbtool.c static int print_key(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state); key 118 lib/tdb/tools/tdbtool.c static int print_hexkey(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state); key 219 lib/tdb/tools/tdbtool.c TDB_DATA key, dbuf; key 226 lib/tdb/tools/tdbtool.c key.dptr = (unsigned char *)keyname; key 227 lib/tdb/tools/tdbtool.c key.dsize = keylen; key 231 lib/tdb/tools/tdbtool.c if (tdb_store(tdb, key, dbuf, TDB_INSERT) == -1) { key 238 lib/tdb/tools/tdbtool.c TDB_DATA key, dbuf; key 250 lib/tdb/tools/tdbtool.c key.dptr = (unsigned char *)keyname; key 251 lib/tdb/tools/tdbtool.c key.dsize = keylen; key 256 lib/tdb/tools/tdbtool.c print_rec(tdb, key, dbuf, NULL); key 258 lib/tdb/tools/tdbtool.c if (tdb_store(tdb, key, dbuf, TDB_REPLACE) == -1) { key 265 lib/tdb/tools/tdbtool.c TDB_DATA key, dbuf; key 272 lib/tdb/tools/tdbtool.c key.dptr = (unsigned char *)keyname; key 273 lib/tdb/tools/tdbtool.c key.dsize = keylen; key 275 lib/tdb/tools/tdbtool.c dbuf = tdb_fetch(tdb, key); key 281 lib/tdb/tools/tdbtool.c print_rec(tdb, key, dbuf, NULL); key 290 lib/tdb/tools/tdbtool.c TDB_DATA key; key 297 lib/tdb/tools/tdbtool.c key.dptr = (unsigned char *)keyname; key 298 lib/tdb/tools/tdbtool.c key.dsize = keylen; key 300 lib/tdb/tools/tdbtool.c if (tdb_delete(tdb, key) != 0) { key 307 lib/tdb/tools/tdbtool.c TDB_DATA key, dbuf; key 320 lib/tdb/tools/tdbtool.c key.dptr = (unsigned char *)keyname; key 321 lib/tdb/tools/tdbtool.c key.dsize = keylen; key 323 lib/tdb/tools/tdbtool.c dbuf = tdb_fetch(tdb, key); key 329 lib/tdb/tools/tdbtool.c print_rec(tdb, key, dbuf, NULL); key 337 lib/tdb/tools/tdbtool.c if ( tdb_store( dst_tdb, key, dbuf, TDB_REPLACE ) == -1 ) { key 348 lib/tdb/tools/tdbtool.c static int print_rec(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 350 lib/tdb/tools/tdbtool.c printf("\nkey %d bytes\n", (int)key.dsize); key 351 lib/tdb/tools/tdbtool.c print_asc((const char *)key.dptr, key.dsize); key 357 lib/tdb/tools/tdbtool.c static int print_key(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 359 lib/tdb/tools/tdbtool.c printf("key %d bytes: ", (int)key.dsize); key 360 lib/tdb/tools/tdbtool.c print_asc((const char *)key.dptr, key.dsize); key 365 lib/tdb/tools/tdbtool.c static int print_hexkey(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 367 lib/tdb/tools/tdbtool.c printf("key %d bytes\n", (int)key.dsize); key 368 lib/tdb/tools/tdbtool.c print_data((const char *)key.dptr, key.dsize); key 375 lib/tdb/tools/tdbtool.c static int traverse_fn(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 428 lib/tdb/tools/tdbtool.c static int do_delete_fn(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, key 431 lib/tdb/tools/tdbtool.c return tdb_delete(the_tdb, key); key 458 lib/tdb/tools/tdbtool.c static int test_fn(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf, void *state) key 74 lib/tdb/tools/tdbtorture.c static int cull_traverse(struct tdb_context *tdb, TDB_DATA key, TDB_DATA dbuf, key 79 lib/tdb/tools/tdbtorture.c tdb_delete(tdb, key); key 89 lib/tdb/tools/tdbtorture.c TDB_DATA key, data; key 97 lib/tdb/tools/tdbtorture.c key.dptr = (unsigned char *)k; key 98 lib/tdb/tools/tdbtorture.c key.dsize = klen+1; key 136 lib/tdb/tools/tdbtorture.c tdb_delete(db, key); key 143 lib/tdb/tools/tdbtorture.c if (tdb_store(db, key, data, TDB_REPLACE) != 0) { key 152 lib/tdb/tools/tdbtorture.c if (tdb_append(db, key, data) != 0) { key 161 lib/tdb/tools/tdbtorture.c tdb_chainlock(db, key); key 162 lib/tdb/tools/tdbtorture.c data = tdb_fetch(db, key); key 163 lib/tdb/tools/tdbtorture.c if (tdb_store(db, key, data, TDB_REPLACE) != 0) { key 167 lib/tdb/tools/tdbtorture.c tdb_chainunlock(db, key); key 186 lib/tdb/tools/tdbtorture.c data = tdb_fetch(db, key); key 194 lib/tdb/tools/tdbtorture.c static int traverse_fn(struct tdb_context *tdb, TDB_DATA key, TDB_DATA dbuf, key 197 lib/tdb/tools/tdbtorture.c tdb_delete(tdb, key); key 57 lib/util/util_tdb.c TDB_DATA key = string_term_tdb_data(keyval); key 59 lib/util/util_tdb.c return tdb_chainlock(tdb, key); key 68 lib/util/util_tdb.c TDB_DATA key = string_term_tdb_data(keyval); key 70 lib/util/util_tdb.c tdb_chainunlock(tdb, key); key 79 lib/util/util_tdb.c TDB_DATA key = string_term_tdb_data(keyval); key 81 lib/util/util_tdb.c return tdb_chainlock_read(tdb, key); key 90 lib/util/util_tdb.c TDB_DATA key = string_term_tdb_data(keyval); key 92 lib/util/util_tdb.c tdb_chainunlock_read(tdb, key); key 101 lib/util/util_tdb.c int32_t tdb_fetch_int32_byblob(struct tdb_context *tdb, TDB_DATA key) key 106 lib/util/util_tdb.c data = tdb_fetch(tdb, key); key 132 lib/util/util_tdb.c int tdb_store_int32_byblob(struct tdb_context *tdb, TDB_DATA key, int32_t v) key 141 lib/util/util_tdb.c return tdb_store(tdb, key, data, TDB_REPLACE); key 159 lib/util/util_tdb.c bool tdb_fetch_uint32_byblob(struct tdb_context *tdb, TDB_DATA key, uint32_t *value) key 163 lib/util/util_tdb.c data = tdb_fetch(tdb, key); key 189 lib/util/util_tdb.c bool tdb_store_uint32_byblob(struct tdb_context *tdb, TDB_DATA key, uint32_t value) key 199 lib/util/util_tdb.c if (tdb_store(tdb, key, data, TDB_REPLACE) == -1) key 221 lib/util/util_tdb.c TDB_DATA key = string_term_tdb_data(keystr); key 223 lib/util/util_tdb.c return tdb_store(tdb, key, data, flags); key 233 lib/util/util_tdb.c TDB_DATA key = string_term_tdb_data(keystr); key 235 lib/util/util_tdb.c return tdb_fetch(tdb, key); key 244 lib/util/util_tdb.c TDB_DATA key = string_term_tdb_data(keystr); key 246 lib/util/util_tdb.c return tdb_delete(tdb, key); key 336 lib/util/util_tdb.c int tdb_traverse_delete_fn(struct tdb_context *the_tdb, TDB_DATA key, TDB_DATA dbuf, key 339 lib/util/util_tdb.c return tdb_delete(the_tdb, key); key 36 lib/util/util_tdb.h int32_t tdb_fetch_int32_byblob(struct tdb_context *tdb, TDB_DATA key); key 48 lib/util/util_tdb.h int tdb_store_int32_byblob(struct tdb_context *tdb, TDB_DATA key, int32_t v); key 60 lib/util/util_tdb.h bool tdb_fetch_uint32_byblob(struct tdb_context *tdb, TDB_DATA key, uint32_t *value); key 72 lib/util/util_tdb.h bool tdb_store_uint32_byblob(struct tdb_context *tdb, TDB_DATA key, uint32_t value); key 110 lib/util/util_tdb.h int tdb_traverse_delete_fn(struct tdb_context *the_tdb, TDB_DATA key, TDB_DATA dbuf, key 351 librpc/gen_ndr/cli_winreg.c struct winreg_String key /* [in] */, key 359 librpc/gen_ndr/cli_winreg.c r.in.key = key; key 52 librpc/gen_ndr/cli_winreg.h struct winreg_String key /* [in] */, key 987 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->key, 16)); key 1003 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->key, 16)); key 1019 librpc/gen_ndr/ndr_netlogon.c ndr_print_array_uint8(ndr, "key", r->key, 16); key 1032 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->key, 8)); key 1048 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->key, 8)); key 1064 librpc/gen_ndr/ndr_netlogon.c ndr_print_array_uint8(ndr, "key", r->key, 8); key 1125 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_UserSessionKey(ndr, NDR_SCALARS, &r->key)); key 1177 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_UserSessionKey(ndr, NDR_SCALARS, &r->key)); key 1235 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_UserSessionKey(ndr, "key", &r->key); key 1221 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_winreg_String(ndr, NDR_SCALARS|NDR_BUFFERS, &r->in.key)); key 1240 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_winreg_String(ndr, NDR_SCALARS|NDR_BUFFERS, &r->in.key)); key 1262 librpc/gen_ndr/ndr_winreg.c ndr_print_winreg_String(ndr, "key", &r->in.key); key 125 librpc/gen_ndr/netlogon.h uint8_t key[16]; key 129 librpc/gen_ndr/netlogon.h uint8_t key[8]; key 164 librpc/gen_ndr/netlogon.h struct netr_UserSessionKey key; key 230 librpc/gen_ndr/winreg.h struct winreg_String key; key 45 librpc/ndr/libndr.h const void *key; key 420 librpc/ndr/libndr.h const void *key, key 422 librpc/ndr/libndr.h enum ndr_err_code ndr_token_retrieve_cmp_fn(struct ndr_token_list **list, const void *key, uint32_t *v, comparison_fn_t _cmp_fn, bool _remove_tok); key 423 librpc/ndr/libndr.h enum ndr_err_code ndr_token_retrieve(struct ndr_token_list **list, const void *key, uint32_t *v); key 424 librpc/ndr/libndr.h uint32_t ndr_token_peek(struct ndr_token_list **list, const void *key); key 660 librpc/ndr/ndr.c const void *key, key 666 librpc/ndr/ndr.c tok->key = key; key 675 librpc/ndr/ndr.c _PUBLIC_ enum ndr_err_code ndr_token_retrieve_cmp_fn(struct ndr_token_list **list, const void *key, uint32_t *v, key 680 librpc/ndr/ndr.c if (_cmp_fn && _cmp_fn(tok->key,key)==0) goto found; key 681 librpc/ndr/ndr.c else if (!_cmp_fn && tok->key == key) goto found; key 696 librpc/ndr/ndr.c _PUBLIC_ enum ndr_err_code ndr_token_retrieve(struct ndr_token_list **list, const void *key, uint32_t *v) key 698 librpc/ndr/ndr.c return ndr_token_retrieve_cmp_fn(list, key, v, NULL, true); key 704 librpc/ndr/ndr.c _PUBLIC_ uint32_t ndr_token_peek(struct ndr_token_list **list, const void *key) key 709 librpc/ndr/ndr.c status = ndr_token_retrieve_cmp_fn(list, key, &v, NULL, false); key 305 nsswitch/pam_winbind.c const char *key, key 312 nsswitch/pam_winbind.c pam_get_data(ctx->pamh, key, &data); key 319 nsswitch/pam_winbind.c ctx->pamh, type, key, (const char *)data, key 324 nsswitch/pam_winbind.c ctx->pamh, type, key, data); key 2282 nsswitch/pam_winbind.c char *key = NULL; key 2284 nsswitch/pam_winbind.c key = talloc_asprintf(ctx, "global:%s", item); key 2285 nsswitch/pam_winbind.c if (!key) { key 2289 nsswitch/pam_winbind.c parm_opt = iniparser_getstr(ctx->dict, key); key 2290 nsswitch/pam_winbind.c TALLOC_FREE(key); key 2330 nsswitch/pam_winbind.c char *key = NULL; key 2332 nsswitch/pam_winbind.c key = talloc_asprintf(ctx, "global:%s", item); key 2333 nsswitch/pam_winbind.c if (!key) { key 2337 nsswitch/pam_winbind.c parm_opt = iniparser_getint(ctx->dict, key, -1); key 2338 nsswitch/pam_winbind.c TALLOC_FREE(key); key 616 nsswitch/winbind_nss_aix.c static int wb_aix_user_attrib(const char *key, char *attributes[], key 622 nsswitch/winbind_nss_aix.c pwd = wb_aix_getpwnam(key); key 664 nsswitch/winbind_nss_aix.c static int wb_aix_group_attrib(const char *key, char *attributes[], key 670 nsswitch/winbind_nss_aix.c grp = wb_aix_getgrnam(key); key 698 nsswitch/winbind_nss_aix.c static int wb_aix_getentry(char *key, char *table, char *attributes[], key 702 nsswitch/winbind_nss_aix.c key, table, size, attributes[0]); key 704 nsswitch/winbind_nss_aix.c if (strcmp(key, "ALL") == 0 && key 709 nsswitch/winbind_nss_aix.c if (strcmp(key, "ALL") == 0 && key 715 nsswitch/winbind_nss_aix.c return wb_aix_user_attrib(key, attributes, results, size); key 719 nsswitch/winbind_nss_aix.c return wb_aix_group_attrib(key, attributes, results, size); key 722 nsswitch/winbind_nss_aix.c logit("Unknown getentry operation key='%s' table='%s'\n", key, table); key 986 nsswitch/winbind_nss_aix.c static int wb_aix_putentry(char *key, char *table, char *attributes[], key 990 nsswitch/winbind_nss_aix.c key, table, size>=1?attributes[0]:"<null>"); key 995 nsswitch/winbind_nss_aix.c static int wb_aix_commit(char *key, char *table) key 129 nsswitch/winbind_nss_hpux.h union nss_XbyY_key key; key 487 nsswitch/winbind_nss_irix.c char *key; key 495 nsswitch/winbind_nss_irix.c key = nsd_attr_fetch_string(rq->f_attrs, "key", (char*)0); key 496 nsswitch/winbind_nss_irix.c if (! map || ! key) { key 512 nsswitch/winbind_nss_irix.c request->data.uid = atoi(key); key 515 nsswitch/winbind_nss_irix.c strncpy(request->data.username, key, key 520 nsswitch/winbind_nss_irix.c strncpy(request->data.groupname, key, key 525 nsswitch/winbind_nss_irix.c request->data.gid = atoi(key); key 528 nsswitch/winbind_nss_irix.c strncpy(request->data.winsreq, key, sizeof(request->data.winsreq) - 1); key 532 nsswitch/winbind_nss_irix.c strncpy(request->data.winsreq, key, sizeof(request->data.winsreq) - 1); key 134 nsswitch/winbind_nss_solaris.c ret = _nss_winbind_getpwnam_r (NSS_ARGS(args)->key.name, key 152 nsswitch/winbind_nss_solaris.c ret = _nss_winbind_getpwuid_r (NSS_ARGS(args)->key.uid, key 248 nsswitch/winbind_nss_solaris.c ret = _nss_winbind_getgrnam_r(NSS_ARGS(args)->key.name, key 267 nsswitch/winbind_nss_solaris.c ret = _nss_winbind_getgrgid_r (NSS_ARGS(args)->key.gid, key 499 nsswitch/winbind_nss_solaris.c af = argp->key.ipnode.af_family; key 500 nsswitch/winbind_nss_solaris.c if(af == AF_INET6 && argp->key.ipnode.flags == 0) { key 510 nsswitch/winbind_nss_solaris.c strncpy(request.data.winsreq, argp->key.name, sizeof(request.data.winsreq) - 1); key 533 nsswitch/winbind_nss_solaris.c strncpy(request.data.winsreq, argp->key.name, sizeof(request.data.winsreq) - 1); key 559 nsswitch/winbind_nss_solaris.c if(argp->key.hostaddr.type == AF_INET6) { key 564 nsswitch/winbind_nss_solaris.c p = inet_ntop(argp->key.hostaddr.type, argp->key.hostaddr.addr, key 569 nsswitch/winbind_nss_solaris.c ((unsigned char *)argp->key.hostaddr.addr)[0], key 570 nsswitch/winbind_nss_solaris.c ((unsigned char *)argp->key.hostaddr.addr)[1], key 571 nsswitch/winbind_nss_solaris.c ((unsigned char *)argp->key.hostaddr.addr)[2], key 572 nsswitch/winbind_nss_solaris.c ((unsigned char *)argp->key.hostaddr.addr)[3]); key 578 nsswitch/winbind_nss_solaris.c parse_response(argp->key.hostaddr.type, argp, &response); key 201 nsswitch/wins.c char *key; key 219 nsswitch/wins.c key = nsd_attr_fetch_string(rq->f_attrs, "key", (char*)0); key 220 nsswitch/wins.c if (! key || ! *key) { key 233 nsswitch/wins.c if ( status = lookup_byaddr_backend(key, &count)) { key 234 nsswitch/wins.c size = strlen(key) + 1; key 240 nsswitch/wins.c strncat(response,key,size); key 261 nsswitch/wins.c if (ip_list = lookup_byname_backend(key, &count)) { key 275 nsswitch/wins.c size = strlen(key) + 1; key 280 nsswitch/wins.c strncat(response,key,size); key 304 source3/auth/auth_util.c unsigned char key[16]; key 306 source3/auth/auth_util.c memcpy(key, dc_sess_key, 16); key 316 source3/auth/auth_util.c dump_data(100, key, sizeof(key)); key 326 source3/auth/auth_util.c SamOEMhash(lm_pwd, key, sizeof(lm_pwd)); key 329 source3/auth/auth_util.c SamOEMhash(nt_pwd, key, sizeof(nt_pwd)); key 348 source3/auth/auth_util.c ZERO_STRUCT(key); key 1840 source3/auth/auth_util.c if (memcmp(info3->base.key.key, zeros, sizeof(zeros)) == 0) { key 1844 source3/auth/auth_util.c result, info3->base.key.key, key 1845 source3/auth/auth_util.c sizeof(info3->base.key.key)); key 1848 source3/auth/auth_util.c if (memcmp(info3->base.LMSessKey.key, zeros, 8) == 0) { key 1852 source3/auth/auth_util.c result, info3->base.LMSessKey.key, key 1853 source3/auth/auth_util.c sizeof(info3->base.LMSessKey.key)); key 205 source3/auth/pass_check.c sec_passwd_rec_t *key; key 230 source3/auth/pass_check.c (void **)&key, &err); key 240 source3/auth/pass_check.c sec_login_valid_and_cert_ident(my_dce_sec_context, key, key 251 source3/auth/pass_check.c sec_key_mgmt_free_key(key, &err); key 323 source3/auth/pass_check.c passwd_rec.key.key_type = sec_passwd_plain; key 324 source3/auth/pass_check.c passwd_rec.key.tagged_union.plain = (idl_char *) password; key 342 source3/client/cifs.upcall.c cifs_resolver(const key_serial_t key, const char *key_descr) key 381 source3/client/cifs.upcall.c c = keyctl_instantiate(key, ip, strlen(ip)+1, 0); key 465 source3/client/cifs.upcall.c key_serial_t key = 0; key 504 source3/client/cifs.upcall.c key = strtol(argv[optind], NULL, 10); key 506 source3/client/cifs.upcall.c key = 0; key 511 source3/client/cifs.upcall.c rc = keyctl_describe_alloc(key, &buf); key 523 source3/client/cifs.upcall.c rc = cifs_resolver(key, buf); key 627 source3/client/cifs.upcall.c rc = keyctl_instantiate(key, keydata, datalen, 0); key 642 source3/client/cifs.upcall.c if (rc != 0 && key == 0) key 643 source3/client/cifs.upcall.c keyctl_negate(key, 1, KEY_REQKEY_DEFL_DEFAULT); key 546 source3/groupdb/mapping_ldb.c static int upgrade_map_record(TDB_CONTEXT *tdb_ctx, TDB_DATA key, key 552 source3/groupdb/mapping_ldb.c if (strncmp((char *)key.dptr, GROUP_PREFIX, key 553 source3/groupdb/mapping_ldb.c MIN(key.dsize, strlen(GROUP_PREFIX))) != 0) { key 557 source3/groupdb/mapping_ldb.c if (!string_to_sid(&map.sid, strlen(GROUP_PREFIX) + (const char *)key.dptr)) { key 558 source3/groupdb/mapping_ldb.c DEBUG(0,("Bad sid key '%s' during upgrade\n", (const char *)key.dptr)); key 590 source3/groupdb/mapping_ldb.c static int upgrade_alias_record(TDB_CONTEXT *tdb_ctx, TDB_DATA key, key 598 source3/groupdb/mapping_ldb.c if (strncmp((char *)key.dptr, MEMBEROF_PREFIX, key 599 source3/groupdb/mapping_ldb.c MIN(key.dsize, strlen(MEMBEROF_PREFIX))) != 0) { key 603 source3/groupdb/mapping_ldb.c if (!string_to_sid(&member, strlen(MEMBEROF_PREFIX) + (const char *)key.dptr)) { key 605 source3/groupdb/mapping_ldb.c (const char *)key.dptr)); key 124 source3/groupdb/mapping_tdb.c char *key, *buf; key 128 source3/groupdb/mapping_tdb.c key = group_mapping_key(talloc_tos(), &map->sid); key 129 source3/groupdb/mapping_tdb.c if (key == NULL) { key 136 source3/groupdb/mapping_tdb.c buf = TALLOC_ARRAY(key, char, len); key 138 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 145 source3/groupdb/mapping_tdb.c db, string_term_tdb_data(key), key 148 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 161 source3/groupdb/mapping_tdb.c char *key; key 166 source3/groupdb/mapping_tdb.c key = group_mapping_key(talloc_tos(), &sid); key 167 source3/groupdb/mapping_tdb.c if (key == NULL) { key 171 source3/groupdb/mapping_tdb.c dbuf = dbwrap_fetch_bystring(db, key, key); key 173 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 181 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 195 source3/groupdb/mapping_tdb.c if ((rec->key.dsize < strlen(GROUP_PREFIX)) key 196 source3/groupdb/mapping_tdb.c || (strncmp((char *)rec->key.dptr, GROUP_PREFIX, key 201 source3/groupdb/mapping_tdb.c if (!string_to_sid(&map->sid, (const char *)rec->key.dptr key 284 source3/groupdb/mapping_tdb.c char *key; key 287 source3/groupdb/mapping_tdb.c key = group_mapping_key(talloc_tos(), sid); key 288 source3/groupdb/mapping_tdb.c if (key == NULL) { key 292 source3/groupdb/mapping_tdb.c status = dbwrap_trans_delete(db, string_term_tdb_data(key)); key 294 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 384 source3/groupdb/mapping_tdb.c fstring key; key 391 source3/groupdb/mapping_tdb.c slprintf(key, sizeof(key), "%s%s", MEMBEROF_PREFIX, key 394 source3/groupdb/mapping_tdb.c dbuf = dbwrap_fetch_bystring(db, frame, key); key 459 source3/groupdb/mapping_tdb.c char *key; key 477 source3/groupdb/mapping_tdb.c key = talloc_asprintf(talloc_tos(), "%s%s", MEMBEROF_PREFIX, key 479 source3/groupdb/mapping_tdb.c if (key == NULL) { key 488 source3/groupdb/mapping_tdb.c rec = db->fetch_locked(db, key, string_term_tdb_data(key)); key 492 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 501 source3/groupdb/mapping_tdb.c key, "%s %s", (char *)(rec->value.dptr), string_sid); key 503 source3/groupdb/mapping_tdb.c new_memberstring = talloc_strdup(key, string_sid); key 507 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 514 source3/groupdb/mapping_tdb.c TALLOC_FREE(key); key 550 source3/groupdb/mapping_tdb.c if (strncmp((const char *)rec->key.dptr, MEMBEROF_PREFIX, key 572 source3/groupdb/mapping_tdb.c member_string = strchr((const char *)rec->key.dptr, '/'); key 626 source3/groupdb/mapping_tdb.c char *key; key 660 source3/groupdb/mapping_tdb.c key = talloc_asprintf(sids, "%s%s", MEMBEROF_PREFIX, sid_string); key 661 source3/groupdb/mapping_tdb.c if (key == NULL) { key 668 source3/groupdb/mapping_tdb.c status = dbwrap_delete_bystring(db, key); key 694 source3/groupdb/mapping_tdb.c db, key, string_term_tdb_data(member_string), 0); key 389 source3/include/ads.h #define KRB5_KT_KEY(k) (&(k)->key) key 29 source3/include/adt_tree.h char *key; key 54 source3/include/adt_tree.h void* pathtree_find( SORTED_TREE *tree, char *key ); key 49 source3/include/ctdbd_conn.h TDB_DATA key); key 52 source3/include/ctdbd_conn.h TDB_DATA key, TALLOC_CTX *mem_ctx, TDB_DATA *data); key 55 source3/include/ctdbd_conn.h void (*fn)(TDB_DATA key, TDB_DATA data, key 68 source3/include/ctdbd_conn.h NTSTATUS ctdbd_persistent_store(struct ctdbd_connection *conn, uint32_t db_id, TDB_DATA key, TDB_DATA data); key 69 source3/include/ctdbd_conn.h NTSTATUS ctdbd_start_persistent_update(struct ctdbd_connection *conn, uint32_t db_id, TDB_DATA key, TDB_DATA data); key 70 source3/include/ctdbd_conn.h NTSTATUS ctdbd_cancel_persistent_update(struct ctdbd_connection *conn, uint32_t db_id, TDB_DATA key, TDB_DATA data); key 24 source3/include/dbwrap.h TDB_DATA key, value; key 33 source3/include/dbwrap.h TDB_DATA key); key 35 source3/include/dbwrap.h TDB_DATA key, TDB_DATA *data); key 49 source3/include/dbwrap.h int (*parse_record)(struct db_context *db, TDB_DATA key, key 50 source3/include/dbwrap.h int (*parser)(TDB_DATA key, TDB_DATA data, key 92 source3/include/dbwrap.h NTSTATUS dbwrap_delete(struct db_context *db, TDB_DATA key); key 93 source3/include/dbwrap.h NTSTATUS dbwrap_store(struct db_context *db, TDB_DATA key, key 96 source3/include/dbwrap.h TDB_DATA key); key 97 source3/include/dbwrap.h NTSTATUS dbwrap_delete_bystring(struct db_context *db, const char *key); key 98 source3/include/dbwrap.h NTSTATUS dbwrap_store_bystring(struct db_context *db, const char *key, key 101 source3/include/dbwrap.h const char *key); key 126 source3/include/gpo.h const char *key; key 138 source3/include/gpo.h const char *key; key 938 source3/include/includes.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype, bool no_salt); key 60 source3/include/locking.h struct file_id key; key 70 source3/include/memcache.h DATA_BLOB key, DATA_BLOB value); key 84 source3/include/memcache.h DATA_BLOB key, void *ptr); key 91 source3/include/memcache.h DATA_BLOB key); key 99 source3/include/memcache.h DATA_BLOB key, DATA_BLOB *value); key 107 source3/include/memcache.h DATA_BLOB key); key 426 source3/include/proto.h TDB_DATA key); key 434 source3/include/proto.h const struct connections_key *key, key 451 source3/include/proto.h NTSTATUS dbwrap_trans_store(struct db_context *db, TDB_DATA key, TDB_DATA dbuf, key 453 source3/include/proto.h NTSTATUS dbwrap_trans_delete(struct db_context *db, TDB_DATA key); key 458 source3/include/proto.h NTSTATUS dbwrap_trans_store_bystring(struct db_context *db, const char *key, key 460 source3/include/proto.h NTSTATUS dbwrap_trans_delete_bystring(struct db_context *db, const char *key); key 528 source3/include/proto.h void gencache_iterate(void (*fn)(const char* key, const char *value, time_t timeout, void* dptr), key 530 source3/include/proto.h int gencache_lock_entry( const char *key ); key 531 source3/include/proto.h void gencache_unlock_entry( const char *key ); key 2109 source3/include/proto.h struct registry_key **key); key 2111 source3/include/proto.h struct registry_key *key, key 2115 source3/include/proto.h struct registry_key *key, key 2129 source3/include/proto.h struct registry_key *key, key 2132 source3/include/proto.h const char *key, const char *subkey, key 3210 source3/include/proto.h void des_crypt56(unsigned char *out, const unsigned char *in, const unsigned char *key, int forw); key 3215 source3/include/proto.h void des_crypt128(unsigned char out[8], const unsigned char in[8], const unsigned char key[16]); key 3216 source3/include/proto.h void des_crypt64(unsigned char out[8], const unsigned char in[8], const unsigned char key[8]); key 3217 source3/include/proto.h void des_crypt112(unsigned char out[8], const unsigned char in[8], const unsigned char key[14], int forw); key 3218 source3/include/proto.h void cred_hash3(unsigned char *out, const unsigned char *in, const unsigned char *key, int forw); key 3219 source3/include/proto.h void des_crypt112_16(unsigned char out[16], unsigned char in[16], const unsigned char key[14], int forw); key 3220 source3/include/proto.h void SamOEMhash( unsigned char *data, const unsigned char key[16], size_t len); key 3221 source3/include/proto.h void SamOEMhashBlob( unsigned char *data, size_t len, DATA_BLOB *key); key 4673 source3/include/proto.h void *secrets_fetch(const char *key, size_t *size); key 4674 source3/include/proto.h bool secrets_store(const char *key, const void *data, size_t size); key 4675 source3/include/proto.h bool secrets_delete(const char *key); key 4714 source3/include/proto.h bool secrets_store_generic(const char *owner, const char *key, const char *secret); key 4715 source3/include/proto.h char *secrets_fetch_generic(const char *owner, const char *key); key 4813 source3/include/proto.h int get_printer_subkeys( NT_PRINTER_DATA *data, const char* key, fstring **subkeys ); key 4822 source3/include/proto.h WERROR delete_all_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key ); key 4823 source3/include/proto.h WERROR delete_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key, const char *value ); key 4824 source3/include/proto.h WERROR add_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key, const char *value, key 4826 source3/include/proto.h REGISTRY_VALUE* get_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key, const char *value ); key 4956 source3/include/proto.h WERROR reg_enumkey(TALLOC_CTX *mem_ctx, struct registry_key *key, key 4958 source3/include/proto.h WERROR reg_enumvalue(TALLOC_CTX *mem_ctx, struct registry_key *key, key 4960 source3/include/proto.h WERROR reg_queryvalue(TALLOC_CTX *mem_ctx, struct registry_key *key, key 4962 source3/include/proto.h WERROR reg_queryinfokey(struct registry_key *key, uint32_t *num_subkeys, key 4972 source3/include/proto.h WERROR reg_setvalue(struct registry_key *key, const char *name, key 4974 source3/include/proto.h WERROR reg_deletevalue(struct registry_key *key, const char *name); key 4975 source3/include/proto.h WERROR reg_getkeysecurity(TALLOC_CTX *mem_ctx, struct registry_key *key, key 4977 source3/include/proto.h WERROR reg_setkeysecurity(struct registry_key *key, key 4980 source3/include/proto.h WERROR reg_restorekey(struct registry_key *key, const char *fname); key 4981 source3/include/proto.h WERROR reg_savekey(struct registry_key *key, const char *fname); key 4982 source3/include/proto.h WERROR reg_deleteallvalues(struct registry_key *key); key 5014 source3/include/proto.h bool regdb_store_keys(const char *key, struct regsubkey_ctr *ctr); key 5015 source3/include/proto.h int regdb_fetch_keys(const char *key, struct regsubkey_ctr *ctr); key 5016 source3/include/proto.h int regdb_fetch_values( const char* key, REGVAL_CTR *values ); key 5017 source3/include/proto.h bool regdb_store_values( const char *key, REGVAL_CTR *values ); key 5054 source3/include/proto.h bool store_reg_keys( REGISTRY_KEY *key, struct regsubkey_ctr *subkeys ); key 5055 source3/include/proto.h bool store_reg_values( REGISTRY_KEY *key, REGVAL_CTR *val ); key 5056 source3/include/proto.h WERROR create_reg_subkey(REGISTRY_KEY *key, const char *subkey); key 5057 source3/include/proto.h WERROR delete_reg_subkey(REGISTRY_KEY *key, const char *subkey); key 5058 source3/include/proto.h int fetch_reg_keys( REGISTRY_KEY *key, struct regsubkey_ctr *subkey_ctr ); key 5059 source3/include/proto.h int fetch_reg_values( REGISTRY_KEY *key, REGVAL_CTR *val ); key 5060 source3/include/proto.h bool regkey_access_check( REGISTRY_KEY *key, uint32 requested, uint32 *granted, key 5062 source3/include/proto.h WERROR regkey_get_secdesc(TALLOC_CTX *mem_ctx, REGISTRY_KEY *key, key 5064 source3/include/proto.h WERROR regkey_set_secdesc(REGISTRY_KEY *key, key 5066 source3/include/proto.h bool reg_subkeys_need_update(REGISTRY_KEY *key, struct regsubkey_ctr *subkeys); key 5067 source3/include/proto.h bool reg_values_need_update(REGISTRY_KEY *key, REGVAL_CTR *values); key 5127 source3/include/proto.h bool _reg_perfcount_get_counter_data(TDB_DATA key, TDB_DATA *data); key 5146 source3/include/proto.h bool reg_split_key(char *path, char **base, char **key); key 5148 source3/include/proto.h void normalize_dbkey(char *key); key 5149 source3/include/proto.h char *reg_remaining_path(TALLOC_CTX *ctx, const char *key); key 5619 source3/include/proto.h struct netr_UserSessionKey key, key 5644 source3/include/proto.h struct netr_UserSessionKey key, key 5979 source3/include/proto.h const char *key, const char *value, key 6250 source3/include/proto.h char *dptr_path(int key); key 6251 source3/include/proto.h char *dptr_wcard(int key); key 6252 source3/include/proto.h uint16 dptr_attr(int key); key 6253 source3/include/proto.h void dptr_close(int *key); key 6271 source3/include/proto.h bool dptr_fill(char *buf1,unsigned int key); key 7042 source3/include/proto.h unsigned int fast_string_hash(TDB_DATA *key); key 131 source3/include/reg_objects.h int (*fetch_subkeys)( const char *key, struct regsubkey_ctr *subkeys); key 132 source3/include/reg_objects.h int (*fetch_values) ( const char *key, REGVAL_CTR *val ); key 133 source3/include/reg_objects.h bool (*store_subkeys)( const char *key, struct regsubkey_ctr *subkeys ); key 134 source3/include/reg_objects.h WERROR (*create_subkey)(const char *key, const char *subkey); key 135 source3/include/reg_objects.h WERROR (*delete_subkey)(const char *key, const char *subkey); key 136 source3/include/reg_objects.h bool (*store_values)( const char *key, REGVAL_CTR *val ); key 140 source3/include/reg_objects.h WERROR (*get_secdesc)(TALLOC_CTX *mem_ctx, const char *key, key 142 source3/include/reg_objects.h WERROR (*set_secdesc)(const char *key, key 164 source3/include/reg_objects.h REGISTRY_KEY *key; key 92 source3/include/secrets.h char key[8]; key 137 source3/include/smbldap.h const char* get_attr_key2string( ATTRIB_MAP_ENTRY table[], int key ); key 35 source3/include/util_tdb.h int tdb_chainlock_with_timeout( struct tdb_context *tdb, TDB_DATA key, key 44 source3/include/util_tdb.h int tdb_trans_store(struct tdb_context *tdb, TDB_DATA key, TDB_DATA dbuf, key 46 source3/include/util_tdb.h int tdb_trans_delete(struct tdb_context *tdb, TDB_DATA key); key 79 source3/iniparser/src/dictionary.c unsigned dictionary_hash(char * key) key 85 source3/iniparser/src/dictionary.c len = strlen(key); key 87 source3/iniparser/src/dictionary.c hash += (unsigned)key[i] ; key 122 source3/iniparser/src/dictionary.c d->key = (char **)calloc(size, sizeof(char*)); key 144 source3/iniparser/src/dictionary.c if (d->key[i]!=NULL) key 145 source3/iniparser/src/dictionary.c free(d->key[i]); key 150 source3/iniparser/src/dictionary.c free(d->key); key 172 source3/iniparser/src/dictionary.c char * dictionary_get(dictionary * d, char * key, char * def) key 177 source3/iniparser/src/dictionary.c hash = dictionary_hash(key); key 179 source3/iniparser/src/dictionary.c if (d->key==NULL) key 184 source3/iniparser/src/dictionary.c if (!strcmp(key, d->key[i])) { key 204 source3/iniparser/src/dictionary.c char dictionary_getchar(dictionary * d, char * key, char def) key 208 source3/iniparser/src/dictionary.c if ((v=dictionary_get(d,key,DICT_INVALID_KEY))==DICT_INVALID_KEY) { key 229 source3/iniparser/src/dictionary.c int dictionary_getint(dictionary * d, char * key, int def) key 233 source3/iniparser/src/dictionary.c if ((v=dictionary_get(d,key,DICT_INVALID_KEY))==DICT_INVALID_KEY) { key 253 source3/iniparser/src/dictionary.c double dictionary_getdouble(dictionary * d, char * key, double def) key 257 source3/iniparser/src/dictionary.c if ((v=dictionary_get(d,key,DICT_INVALID_KEY))==DICT_INVALID_KEY) { key 290 source3/iniparser/src/dictionary.c void dictionary_set(dictionary * d, char * key, char * val) key 295 source3/iniparser/src/dictionary.c if (d==NULL || key==NULL) return ; key 298 source3/iniparser/src/dictionary.c hash = dictionary_hash(key) ; key 302 source3/iniparser/src/dictionary.c if (d->key[i]==NULL) key 305 source3/iniparser/src/dictionary.c if (!strcmp(key, d->key[i])) { /* Same key */ key 322 source3/iniparser/src/dictionary.c d->key = (char **)mem_double(d->key, d->size * sizeof(char*)) ; key 331 source3/iniparser/src/dictionary.c if (d->key[i]==NULL) { key 337 source3/iniparser/src/dictionary.c d->key[i] = strdup(key); key 355 source3/iniparser/src/dictionary.c void dictionary_unset(dictionary * d, char * key) key 360 source3/iniparser/src/dictionary.c if (key == NULL) { key 364 source3/iniparser/src/dictionary.c hash = dictionary_hash(key); key 366 source3/iniparser/src/dictionary.c if (d->key[i]==NULL) key 371 source3/iniparser/src/dictionary.c if (!strcmp(key, d->key[i])) { key 381 source3/iniparser/src/dictionary.c free(d->key[i]); key 382 source3/iniparser/src/dictionary.c d->key[i] = NULL ; key 407 source3/iniparser/src/dictionary.c void dictionary_setint(dictionary * d, char * key, int val) key 411 source3/iniparser/src/dictionary.c dictionary_set(d, key, sval); key 429 source3/iniparser/src/dictionary.c void dictionary_setdouble(dictionary * d, char * key, double val) key 433 source3/iniparser/src/dictionary.c dictionary_set(d, key, sval); key 461 source3/iniparser/src/dictionary.c if (d->key[i]) { key 463 source3/iniparser/src/dictionary.c d->key[i], key 54 source3/iniparser/src/dictionary.h char ** key ; /** List of string keys */ key 75 source3/iniparser/src/dictionary.h unsigned dictionary_hash(char * key); key 115 source3/iniparser/src/dictionary.h char * dictionary_get(dictionary * d, char * key, char * def); key 130 source3/iniparser/src/dictionary.h char dictionary_getchar(dictionary * d, char * key, char def) ; key 145 source3/iniparser/src/dictionary.h int dictionary_getint(dictionary * d, char * key, int def); key 160 source3/iniparser/src/dictionary.h double dictionary_getdouble(dictionary * d, char * key, double def); key 186 source3/iniparser/src/dictionary.h void dictionary_set(dictionary * vd, char * key, char * val); key 199 source3/iniparser/src/dictionary.h void dictionary_unset(dictionary * d, char * key); key 214 source3/iniparser/src/dictionary.h void dictionary_setint(dictionary * d, char * key, int val); key 228 source3/iniparser/src/dictionary.h void dictionary_setdouble(dictionary * d, char * key, double val); key 37 source3/iniparser/src/iniparser.c char * key, key 43 source3/iniparser/src/iniparser.c if (key!=NULL) { key 44 source3/iniparser/src/iniparser.c sprintf(longkey, "%s:%s", sec, key); key 82 source3/iniparser/src/iniparser.c if (d->key[i]==NULL) key 84 source3/iniparser/src/iniparser.c if (strchr(d->key[i], ':')==NULL) { key 115 source3/iniparser/src/iniparser.c if (d->key[i]==NULL) key 117 source3/iniparser/src/iniparser.c if (strchr(d->key[i], ':')==NULL) { key 126 source3/iniparser/src/iniparser.c return d->key[i] ; key 149 source3/iniparser/src/iniparser.c if (d->key[i]==NULL) key 152 source3/iniparser/src/iniparser.c fprintf(f, "[%s]=[%s]\n", d->key[i], d->val[i]); key 154 source3/iniparser/src/iniparser.c fprintf(f, "[%s]=UNDEF\n", d->key[i]); key 186 source3/iniparser/src/iniparser.c if (d->key[i]==NULL) key 188 source3/iniparser/src/iniparser.c fprintf(f, "%s = %s\n", d->key[i], d->val[i]); key 198 source3/iniparser/src/iniparser.c if (d->key[j]==NULL) key 200 source3/iniparser/src/iniparser.c if (!strncmp(d->key[j], keym, seclen+1)) { key 203 source3/iniparser/src/iniparser.c d->key[j]+seclen+1, key 233 source3/iniparser/src/iniparser.c char * iniparser_getstr(dictionary * d, const char * key) key 235 source3/iniparser/src/iniparser.c return iniparser_getstring(d, key, NULL); key 254 source3/iniparser/src/iniparser.c char * iniparser_getstring(dictionary * d, const char * key, char * def) key 259 source3/iniparser/src/iniparser.c if (d==NULL || key==NULL) key 262 source3/iniparser/src/iniparser.c if (!(lc_key = strdup(strlwc(key)))) { key 299 source3/iniparser/src/iniparser.c int iniparser_getint(dictionary * d, const char * key, int notfound) key 303 source3/iniparser/src/iniparser.c str = iniparser_getstring(d, key, INI_INVALID_KEY); key 322 source3/iniparser/src/iniparser.c double iniparser_getdouble(dictionary * d, char * key, double notfound) key 326 source3/iniparser/src/iniparser.c str = iniparser_getstring(d, key, INI_INVALID_KEY); key 365 source3/iniparser/src/iniparser.c int iniparser_getboolean(dictionary * d, const char * key, int notfound) key 370 source3/iniparser/src/iniparser.c c = iniparser_getstring(d, key, INI_INVALID_KEY); key 466 source3/iniparser/src/iniparser.c char key[ASCIILINESZ+1]; key 496 source3/iniparser/src/iniparser.c } else if (sscanf (where, "%[^=] = \"%[^\"]\"", key, val) == 2 key 497 source3/iniparser/src/iniparser.c || sscanf (where, "%[^=] = '%[^\']'", key, val) == 2 key 498 source3/iniparser/src/iniparser.c || sscanf (where, "%[^=] = %[^;#]", key, val) == 2) { key 499 source3/iniparser/src/iniparser.c strcpy(key, strlwc(strcrop(key))); key 509 source3/iniparser/src/iniparser.c iniparser_add_entry(d, sec, key, val); key 126 source3/iniparser/src/iniparser.h char * iniparser_getstr(dictionary * d, const char * key); key 144 source3/iniparser/src/iniparser.h char * iniparser_getstring(dictionary * d, const char * key, char * def); key 173 source3/iniparser/src/iniparser.h int iniparser_getint(dictionary * d, const char * key, int notfound); key 188 source3/iniparser/src/iniparser.h double iniparser_getdouble(dictionary * d, char * key, double notfound); key 222 source3/iniparser/src/iniparser.h int iniparser_getboolean(dictionary * d, const char * key, int notfound); key 78 source3/lib/adt_tree.c static TREE_NODE* pathtree_birth_child( TREE_NODE *node, char* key ) key 87 source3/lib/adt_tree.c infant->key = talloc_strdup( infant, key ); key 101 source3/lib/adt_tree.c node->key ? node->key : "NULL", infant->key )); key 118 source3/lib/adt_tree.c infant->key, node->children[i-1]->key)); key 123 source3/lib/adt_tree.c if ( StrCaseCmp( infant->key, node->children[i-1]->key ) > 0 ) { key 151 source3/lib/adt_tree.c static TREE_NODE* pathtree_find_child( TREE_NODE *node, char* key ) key 161 source3/lib/adt_tree.c if ( !key ) { key 169 source3/lib/adt_tree.c node->children[i]->key)); key 171 source3/lib/adt_tree.c result = StrCaseCmp( node->children[i]->key, key ); key 185 source3/lib/adt_tree.c next ? "Found" : "Did not find", key )); key 293 source3/lib/adt_tree.c if ( node->key ) key 294 source3/lib/adt_tree.c DEBUG(debug,("%s: [%s] (%s)\n", path ? path : "NULL", node->key, key 307 source3/lib/adt_tree.c node->key ? node->key : "NULL"); key 327 source3/lib/adt_tree.c if ( tree->root->key ) key 328 source3/lib/adt_tree.c DEBUG(debug,("ROOT/: [%s] (%s)\n", tree->root->key, key 334 source3/lib/adt_tree.c tree->root->key ? tree->root->key : "ROOT/" ); key 346 source3/lib/adt_tree.c void* pathtree_find( SORTED_TREE *tree, char *key ) key 352 source3/lib/adt_tree.c DEBUG(10,("pathtree_find: Enter [%s]\n", key ? key : "NULL" )); key 356 source3/lib/adt_tree.c if ( !key ) { key 363 source3/lib/adt_tree.c key ? key : "NULL" )); key 372 source3/lib/adt_tree.c if ( *key == '/' ) key 373 source3/lib/adt_tree.c keystr = SMB_STRDUP( key+1 ); key 375 source3/lib/adt_tree.c keystr = SMB_STRDUP( key ); key 378 source3/lib/adt_tree.c DEBUG(0,("pathtree_find: strdup() failed on string [%s]!?!?!\n", key)); key 48 source3/lib/afs.c DATA_BLOB key = data_blob(ct->HandShakeKey, 8); key 60 source3/lib/afs.c base64_key = base64_encode_data_blob(mem_ctx, key); key 87 source3/lib/afs.c struct afs_key key; key 93 source3/lib/afs.c if (!secrets_fetch_afs_key(cell, &key)) { key 98 source3/lib/afs.c ct->AuthHandle = key.kvno; key 173 source3/lib/afs.c des_key_sched((const_des_cblock *)key.key, key_schedule); key 175 source3/lib/afs.c len, key_schedule, (C_Block *)key.key, 1); key 177 source3/lib/afs.c ZERO_STRUCT(key); key 44 source3/lib/conn_tdb.c TDB_DATA key) key 52 source3/lib/conn_tdb.c return ctx->fetch_locked(ctx, mem_ctx, key); key 60 source3/lib/conn_tdb.c TDB_DATA key; key 67 source3/lib/conn_tdb.c key.dsize = sizeof(ckey); key 68 source3/lib/conn_tdb.c key.dptr = (uint8 *)&ckey; key 70 source3/lib/conn_tdb.c return connections_fetch_record(mem_ctx, key); key 75 source3/lib/conn_tdb.c const struct connections_key *key, key 86 source3/lib/conn_tdb.c if ((rec->key.dsize != sizeof(struct connections_key)) key 91 source3/lib/conn_tdb.c return state->fn(rec, (const struct connections_key *)rec->key.dptr, key 110 source3/lib/conn_tdb.c const struct connections_key *key, key 891 source3/lib/ctdbd_conn.c TDB_DATA key) key 899 source3/lib/ctdbd_conn.c req.hdr.length = offsetof(struct ctdb_req_call, data) + key.dsize; key 907 source3/lib/ctdbd_conn.c req.keylen = key.dsize; key 915 source3/lib/ctdbd_conn.c data_blob_const(key.dptr, key.dsize)); key 953 source3/lib/ctdbd_conn.c TDB_DATA key, TALLOC_CTX *mem_ctx, TDB_DATA *data) key 961 source3/lib/ctdbd_conn.c req.hdr.length = offsetof(struct ctdb_req_call, data) + key.dsize; key 969 source3/lib/ctdbd_conn.c req.keylen = key.dsize; key 974 source3/lib/ctdbd_conn.c data_blob_const(key.dptr, key.dsize)); key 1023 source3/lib/ctdbd_conn.c void (*fn)(TDB_DATA key, TDB_DATA data, void *private_data); key 1039 source3/lib/ctdbd_conn.c TDB_DATA key, data; key 1057 source3/lib/ctdbd_conn.c key.dsize = d->keylen; key 1058 source3/lib/ctdbd_conn.c key.dptr = &d->data[0]; key 1062 source3/lib/ctdbd_conn.c if (key.dsize == 0 && data.dsize == 0) { key 1077 source3/lib/ctdbd_conn.c state->fn(key, data, state->private_data); key 1091 source3/lib/ctdbd_conn.c void (*fn)(TDB_DATA key, TDB_DATA data, key 31 source3/lib/dbwrap.c TDB_DATA key, TDB_DATA *data) key 35 source3/lib/dbwrap.c if (!(rec = db->fetch_locked(db, mem_ctx, key))) { key 49 source3/lib/dbwrap.c static int dbwrap_fallback_parse_record(struct db_context *db, TDB_DATA key, key 50 source3/lib/dbwrap.c int (*parser)(TDB_DATA key, key 58 source3/lib/dbwrap.c res = db->fetch(db, talloc_tos(), key, &data); key 63 source3/lib/dbwrap.c res = parser(key, data, private_data); key 161 source3/lib/dbwrap.c NTSTATUS dbwrap_delete(struct db_context *db, TDB_DATA key) key 166 source3/lib/dbwrap.c rec = db->fetch_locked(db, talloc_tos(), key); key 175 source3/lib/dbwrap.c NTSTATUS dbwrap_store(struct db_context *db, TDB_DATA key, key 181 source3/lib/dbwrap.c rec = db->fetch_locked(db, talloc_tos(), key); key 192 source3/lib/dbwrap.c TDB_DATA key) key 196 source3/lib/dbwrap.c if (db->fetch(db, mem_ctx, key, &result) == -1) { key 203 source3/lib/dbwrap.c NTSTATUS dbwrap_delete_bystring(struct db_context *db, const char *key) key 205 source3/lib/dbwrap.c return dbwrap_delete(db, string_term_tdb_data(key)); key 208 source3/lib/dbwrap.c NTSTATUS dbwrap_store_bystring(struct db_context *db, const char *key, key 211 source3/lib/dbwrap.c return dbwrap_store(db, string_term_tdb_data(key), data, flags); key 215 source3/lib/dbwrap.c const char *key) key 217 source3/lib/dbwrap.c return dbwrap_fetch(db, mem_ctx, string_term_tdb_data(key)); key 52 source3/lib/dbwrap_ctdb.c TDB_DATA key, key 84 source3/lib/dbwrap_ctdb.c TDB_DATA key, key 91 source3/lib/dbwrap_ctdb.c length = offsetof(struct ctdb_rec_data, data) + key.dsize + key 99 source3/lib/dbwrap_ctdb.c d->keylen = key.dsize; key 100 source3/lib/dbwrap_ctdb.c memcpy(&d->data[0], key.dptr, key.dsize); key 103 source3/lib/dbwrap_ctdb.c memcpy(&d->data[key.dsize], header, sizeof(*header)); key 104 source3/lib/dbwrap_ctdb.c memcpy(&d->data[key.dsize+sizeof(*header)], data.dptr, data.dsize); key 107 source3/lib/dbwrap_ctdb.c memcpy(&d->data[key.dsize], data.dptr, data.dsize); key 118 source3/lib/dbwrap_ctdb.c TDB_DATA key, key 126 source3/lib/dbwrap_ctdb.c r = db_ctdb_marshall_record(talloc_tos(), reqid, key, header, data); key 178 source3/lib/dbwrap_ctdb.c TDB_DATA *key, TDB_DATA *data) key 190 source3/lib/dbwrap_ctdb.c if (key != NULL) { key 191 source3/lib/dbwrap_ctdb.c key->dptr = &r->data[0]; key 192 source3/lib/dbwrap_ctdb.c key->dsize = r->keylen; key 226 source3/lib/dbwrap_ctdb.c TDB_DATA key; key 233 source3/lib/dbwrap_ctdb.c key.dptr = (uint8_t *)discard_const(keyname); key 234 source3/lib/dbwrap_ctdb.c key.dsize = strlen(keyname); key 239 source3/lib/dbwrap_ctdb.c rh = fetch_locked_internal(ctx, tmp_ctx, key, true); key 254 source3/lib/dbwrap_ctdb.c data = tdb_fetch(ctx->wtdb->tdb, key); key 320 source3/lib/dbwrap_ctdb.c TDB_DATA key, TDB_DATA *data) key 324 source3/lib/dbwrap_ctdb.c *data = tdb_fetch(h->ctx->wtdb->tdb, key); key 344 source3/lib/dbwrap_ctdb.c h->m_all = db_ctdb_marshall_add(h, h->m_all, h->ctx->db_id, 1, key, NULL, *data); key 362 source3/lib/dbwrap_ctdb.c TDB_DATA key) key 374 source3/lib/dbwrap_ctdb.c result->key.dsize = key.dsize; key 375 source3/lib/dbwrap_ctdb.c result->key.dptr = (uint8 *)talloc_memdup(result, key.dptr, key.dsize); key 376 source3/lib/dbwrap_ctdb.c if (result->key.dptr == NULL) { key 385 source3/lib/dbwrap_ctdb.c ctdb_data = tdb_fetch(ctx->wtdb->tdb, key); key 425 source3/lib/dbwrap_ctdb.c TDB_DATA key) key 435 source3/lib/dbwrap_ctdb.c rec = db_ctdb_fetch_locked_transaction(ctx, mem_ctx, key); key 458 source3/lib/dbwrap_ctdb.c TDB_DATA key, TDB_DATA data) key 466 source3/lib/dbwrap_ctdb.c rec = tdb_fetch(h->ctx->wtdb->tdb, key); key 489 source3/lib/dbwrap_ctdb.c h->m_all = db_ctdb_marshall_add(h, h->m_all, h->ctx->db_id, 0, key, NULL, data); key 497 source3/lib/dbwrap_ctdb.c h->m_write = db_ctdb_marshall_add(h, h->m_write, h->ctx->db_id, 0, key, &header, data); key 514 source3/lib/dbwrap_ctdb.c ret = tdb_store(h->ctx->wtdb->tdb, key, rec, TDB_REPLACE); key 531 source3/lib/dbwrap_ctdb.c ret = db_ctdb_transaction_store(h, rec->key, data); key 547 source3/lib/dbwrap_ctdb.c ret = db_ctdb_transaction_store(h, rec->key, tdb_null); key 573 source3/lib/dbwrap_ctdb.c TDB_DATA key, data; key 575 source3/lib/dbwrap_ctdb.c rec = db_ctdb_marshall_loop_next(h->m_all, rec, NULL, NULL, &key, &data); key 583 source3/lib/dbwrap_ctdb.c if (db_ctdb_transaction_store(h, key, data) != 0) { key 590 source3/lib/dbwrap_ctdb.c if (db_ctdb_transaction_fetch(h->ctx, tmp_ctx, key, &data2) != 0) { key 790 source3/lib/dbwrap_ctdb.c ret = tdb_store(crec->ctdb_ctx->wtdb->tdb, rec->key, cdata, TDB_REPLACE); key 824 source3/lib/dbwrap_ctdb.c hex_encode_talloc(data, (unsigned char *)data->key.dptr, key 825 source3/lib/dbwrap_ctdb.c data->key.dsize))); key 827 source3/lib/dbwrap_ctdb.c if (tdb_chainunlock(crec->ctdb_ctx->wtdb->tdb, data->key) != 0) { key 837 source3/lib/dbwrap_ctdb.c TDB_DATA key, key 860 source3/lib/dbwrap_ctdb.c result->key.dsize = key.dsize; key 861 source3/lib/dbwrap_ctdb.c result->key.dptr = (uint8 *)talloc_memdup(result, key.dptr, key.dsize); key 862 source3/lib/dbwrap_ctdb.c if (result->key.dptr == NULL) { key 874 source3/lib/dbwrap_ctdb.c char *keystr = hex_encode_talloc(result, key.dptr, key.dsize); key 882 source3/lib/dbwrap_ctdb.c if (tdb_chainlock(ctx->wtdb->tdb, key) != 0) { key 892 source3/lib/dbwrap_ctdb.c ctdb_data = tdb_fetch(ctx->wtdb->tdb, key); key 907 source3/lib/dbwrap_ctdb.c tdb_chainunlock(ctx->wtdb->tdb, key); key 917 source3/lib/dbwrap_ctdb.c status = ctdbd_migrate(messaging_ctdbd_connection(),ctx->db_id, key); key 953 source3/lib/dbwrap_ctdb.c TDB_DATA key) key 959 source3/lib/dbwrap_ctdb.c return db_ctdb_fetch_locked_transaction(ctx, mem_ctx, key); key 963 source3/lib/dbwrap_ctdb.c return db_ctdb_fetch_locked_persistent(ctx, mem_ctx, key); key 966 source3/lib/dbwrap_ctdb.c return fetch_locked_internal(ctx, mem_ctx, key, db->persistent); key 973 source3/lib/dbwrap_ctdb.c TDB_DATA key, TDB_DATA *data) key 981 source3/lib/dbwrap_ctdb.c return db_ctdb_transaction_fetch(ctx, mem_ctx, key, data); key 985 source3/lib/dbwrap_ctdb.c ctdb_data = tdb_fetch(ctx->wtdb->tdb, key); key 1020 source3/lib/dbwrap_ctdb.c status = ctdbd_fetch(messaging_ctdbd_connection(),ctx->db_id, key, mem_ctx, data); key 1035 source3/lib/dbwrap_ctdb.c static void traverse_callback(TDB_DATA key, TDB_DATA data, void *private_data) key 1041 source3/lib/dbwrap_ctdb.c rec = db_ctdb_fetch_locked(state->db, tmp_ctx, key); key 1098 source3/lib/dbwrap_ctdb.c static void traverse_read_callback(TDB_DATA key, TDB_DATA data, void *private_data) key 1102 source3/lib/dbwrap_ctdb.c rec.key = key; key 1115 source3/lib/dbwrap_ctdb.c rec.key = kbuf; key 69 source3/lib/dbwrap_file.c TDB_DATA key) key 98 source3/lib/dbwrap_file.c result->key.dsize = key.dsize; key 99 source3/lib/dbwrap_file.c result->key.dptr = (uint8 *)talloc_memdup(result, key.dptr, key.dsize); key 100 source3/lib/dbwrap_file.c if (result->key.dptr == NULL) { key 107 source3/lib/dbwrap_file.c file->hash = fsh(key.dptr, key.dsize); key 108 source3/lib/dbwrap_file.c file->name = hex_encode_talloc(file, (unsigned char *)key.dptr, key.dsize); key 282 source3/lib/dbwrap_file.c TDB_DATA key; key 298 source3/lib/dbwrap_file.c key.dptr = keyblob.data; key 299 source3/lib/dbwrap_file.c key.dsize = keyblob.length; key 302 source3/lib/dbwrap_file.c (key.dsize == ctx->locked_record->key.dsize) && key 303 source3/lib/dbwrap_file.c (memcmp(key.dptr, ctx->locked_record->key.dptr, key 304 source3/lib/dbwrap_file.c key.dsize) == 0)) { key 314 source3/lib/dbwrap_file.c rec = db_file_fetch_locked(db, mem_ctx, key); key 82 source3/lib/dbwrap_rbt.c TDB_DATA *key, TDB_DATA *value) key 84 source3/lib/dbwrap_rbt.c key->dptr = ((uint8 *)node) + offsetof(struct db_rbt_node, data); key 85 source3/lib/dbwrap_rbt.c key->dsize = node->keysize; key 86 source3/lib/dbwrap_rbt.c value->dptr = key->dptr + node->keysize; key 108 source3/lib/dbwrap_rbt.c SMB_ASSERT(this_key.dsize == rec->key.dsize); key 109 source3/lib/dbwrap_rbt.c SMB_ASSERT(memcmp(this_key.dptr, rec->key.dptr, key 135 source3/lib/dbwrap_rbt.c offsetof(struct db_rbt_node, data) + rec->key.dsize key 145 source3/lib/dbwrap_rbt.c node->keysize = rec->key.dsize; key 150 source3/lib/dbwrap_rbt.c memcpy(this_key.dptr, rec->key.dptr, node->keysize); key 204 source3/lib/dbwrap_rbt.c TDB_DATA key) key 226 source3/lib/dbwrap_rbt.c res = db_rbt_compare(key, search_key); key 253 source3/lib/dbwrap_rbt.c size += key.dsize; key 271 source3/lib/dbwrap_rbt.c result->key = search_key; key 276 source3/lib/dbwrap_rbt.c result->key.dptr = (uint8 *) key 278 source3/lib/dbwrap_rbt.c result->key.dsize = key.dsize; key 279 source3/lib/dbwrap_rbt.c memcpy(result->key.dptr, key.dptr, key.dsize); key 288 source3/lib/dbwrap_rbt.c TDB_DATA key, TDB_DATA *data) key 308 source3/lib/dbwrap_rbt.c res = db_rbt_compare(key, search_key); key 41 source3/lib/dbwrap_tdb.c hex_encode_talloc(data, (unsigned char *)data->key.dptr, key 42 source3/lib/dbwrap_tdb.c data->key.dsize))); key 44 source3/lib/dbwrap_tdb.c if (tdb_chainunlock(ctx->wtdb->tdb, data->key) != 0) { key 56 source3/lib/dbwrap_tdb.c static int db_tdb_fetchlock_parse(TDB_DATA key, TDB_DATA data, key 64 source3/lib/dbwrap_tdb.c sizeof(struct db_record) + key.dsize + data.dsize); key 70 source3/lib/dbwrap_tdb.c state->result->key.dsize = key.dsize; key 71 source3/lib/dbwrap_tdb.c state->result->key.dptr = ((uint8 *)state->result) key 73 source3/lib/dbwrap_tdb.c memcpy(state->result->key.dptr, key.dptr, key.dsize); key 78 source3/lib/dbwrap_tdb.c state->result->value.dptr = state->result->key.dptr+key.dsize; key 89 source3/lib/dbwrap_tdb.c TALLOC_CTX *mem_ctx, TDB_DATA key) key 97 source3/lib/dbwrap_tdb.c char *keystr = hex_encode_talloc(NULL, (unsigned char*)key.dptr, key.dsize); key 104 source3/lib/dbwrap_tdb.c if (tdb_chainlock(ctx->wtdb->tdb, key) != 0) { key 112 source3/lib/dbwrap_tdb.c tdb_parse_record(ctx->wtdb->tdb, key, db_tdb_fetchlock_parse, &state); key 115 source3/lib/dbwrap_tdb.c db_tdb_fetchlock_parse(key, tdb_null, &state); key 119 source3/lib/dbwrap_tdb.c tdb_chainunlock(ctx->wtdb->tdb, key); key 140 source3/lib/dbwrap_tdb.c static int db_tdb_fetch_parse(TDB_DATA key, TDB_DATA data, key 158 source3/lib/dbwrap_tdb.c TDB_DATA key, TDB_DATA *pdata) key 169 source3/lib/dbwrap_tdb.c tdb_parse_record(ctx->wtdb->tdb, key, db_tdb_fetch_parse, &state); key 179 source3/lib/dbwrap_tdb.c static int db_tdb_parse(struct db_context *db, TDB_DATA key, key 180 source3/lib/dbwrap_tdb.c int (*parser)(TDB_DATA key, TDB_DATA data, key 187 source3/lib/dbwrap_tdb.c return tdb_parse_record(ctx->wtdb->tdb, key, parser, private_data); key 201 source3/lib/dbwrap_tdb.c return (tdb_store(ctx->wtdb->tdb, rec->key, data, flag) == 0) ? key 210 source3/lib/dbwrap_tdb.c if (tdb_delete(ctx->wtdb->tdb, rec->key) == 0) { key 234 source3/lib/dbwrap_tdb.c rec.key = kbuf; key 274 source3/lib/dbwrap_tdb.c rec.key = kbuf; key 181 source3/lib/dbwrap_util.c NTSTATUS dbwrap_trans_store(struct db_context *db, TDB_DATA key, TDB_DATA dbuf, key 194 source3/lib/dbwrap_util.c rec = db->fetch_locked(db, talloc_tos(), key); key 228 source3/lib/dbwrap_util.c NTSTATUS dbwrap_trans_delete(struct db_context *db, TDB_DATA key) key 240 source3/lib/dbwrap_util.c rec = db->fetch_locked(db, talloc_tos(), key); key 300 source3/lib/dbwrap_util.c NTSTATUS dbwrap_trans_store_bystring(struct db_context *db, const char *key, key 303 source3/lib/dbwrap_util.c return dbwrap_trans_store(db, string_term_tdb_data(key), data, flags); key 306 source3/lib/dbwrap_util.c NTSTATUS dbwrap_trans_delete_bystring(struct db_context *db, const char *key) key 308 source3/lib/dbwrap_util.c return dbwrap_trans_delete(db, string_term_tdb_data(key)); key 89 source3/lib/eventlog/eventlog.c static int eventlog_tdb_size_fn( TDB_CONTEXT * tdb, TDB_DATA key, TDB_DATA data, key 151 source3/lib/eventlog/eventlog.c TDB_DATA key, ret; key 186 source3/lib/eventlog/eventlog.c key.dsize = sizeof(int32_t); key 187 source3/lib/eventlog/eventlog.c key.dptr = (unsigned char *)&i; key 188 source3/lib/eventlog/eventlog.c ret = tdb_fetch( the_tdb, key ); key 232 source3/lib/eventlog/eventlog.c key.dsize = sizeof(int32_t); key 233 source3/lib/eventlog/eventlog.c key.dptr = (unsigned char *)&i; key 234 source3/lib/eventlog/eventlog.c tdb_delete( the_tdb, key ); key 654 source3/lib/eventlog/eventlog.c TDB_DATA data, key; key 661 source3/lib/eventlog/eventlog.c key.dptr = (unsigned char *)&srecno; key 662 source3/lib/eventlog/eventlog.c key.dsize = sizeof(int32_t); key 664 source3/lib/eventlog/eventlog.c data = tdb_fetch(tdb, key); key 400 source3/lib/gencache.c void (*fn)(const char *key, const char *value, time_t timeout, key 406 source3/lib/gencache.c static int gencache_iterate_fn(struct tdb_context *tdb, TDB_DATA key, key 419 source3/lib/gencache.c if (key.dptr[key.dsize-1] == '\0') { key 420 source3/lib/gencache.c keystr = (char *)key.dptr; key 423 source3/lib/gencache.c keystr = SMB_STRNDUP((char *)key.dptr, key.dsize); key 463 source3/lib/gencache.c void gencache_iterate(void (*fn)(const char* key, const char *value, time_t timeout, void* dptr), key 485 source3/lib/gencache.c int gencache_lock_entry( const char *key ) key 490 source3/lib/gencache.c return tdb_lock_bystring(cache, key); key 497 source3/lib/gencache.c void gencache_unlock_entry( const char *key ) key 502 source3/lib/gencache.c tdb_unlock_bystring(cache, key); key 36 source3/lib/idmap_cache.c char *key; key 43 source3/lib/idmap_cache.c key = talloc_asprintf(talloc_tos(), "IDMAP/SID2UID/%s", key 45 source3/lib/idmap_cache.c if (key == NULL) { key 48 source3/lib/idmap_cache.c ret = gencache_get(key, &value, &timeout); key 49 source3/lib/idmap_cache.c TALLOC_FREE(key); key 75 source3/lib/idmap_cache.c char *key; key 80 source3/lib/idmap_cache.c key = talloc_asprintf(talloc_tos(), "IDMAP/UID2SID/%d", (int)uid); key 81 source3/lib/idmap_cache.c if (key == NULL) { key 84 source3/lib/idmap_cache.c ret = gencache_get(key, &value, &timeout); key 85 source3/lib/idmap_cache.c TALLOC_FREE(key); key 116 source3/lib/idmap_cache.c fstring sidstr, key, value; key 119 source3/lib/idmap_cache.c fstr_sprintf(key, "IDMAP/SID2UID/%s", key 125 source3/lib/idmap_cache.c gencache_set(key, value, now + timeout); key 128 source3/lib/idmap_cache.c fstr_sprintf(key, "IDMAP/UID2SID/%d", (int)uid); key 138 source3/lib/idmap_cache.c gencache_set(key, value, now + timeout); key 156 source3/lib/idmap_cache.c char *key; key 163 source3/lib/idmap_cache.c key = talloc_asprintf(talloc_tos(), "IDMAP/SID2GID/%s", key 165 source3/lib/idmap_cache.c if (key == NULL) { key 168 source3/lib/idmap_cache.c ret = gencache_get(key, &value, &timeout); key 169 source3/lib/idmap_cache.c TALLOC_FREE(key); key 195 source3/lib/idmap_cache.c char *key; key 200 source3/lib/idmap_cache.c key = talloc_asprintf(talloc_tos(), "IDMAP/GID2SID/%d", (int)gid); key 201 source3/lib/idmap_cache.c if (key == NULL) { key 204 source3/lib/idmap_cache.c ret = gencache_get(key, &value, &timeout); key 205 source3/lib/idmap_cache.c TALLOC_FREE(key); key 236 source3/lib/idmap_cache.c fstring sidstr, key, value; key 239 source3/lib/idmap_cache.c fstr_sprintf(key, "IDMAP/SID2GID/%s", key 245 source3/lib/idmap_cache.c gencache_set(key, value, now + timeout); key 248 source3/lib/idmap_cache.c fstr_sprintf(key, "IDMAP/GID2SID/%d", (int)gid); key 258 source3/lib/idmap_cache.c gencache_set(key, value, now + timeout); key 158 source3/lib/ldb/ldb_tdb/ldb_index.c unsigned int *v_idx, const char *key) key 162 source3/lib/ldb/ldb_tdb/ldb_index.c if (ldb_attr_cmp(msg->elements[i].name, key) == 0) { key 1084 source3/lib/ldb/ldb_tdb/ldb_index.c static int delete_index(struct tdb_context *tdb, TDB_DATA key, TDB_DATA data, void *state) key 1087 source3/lib/ldb/ldb_tdb/ldb_index.c if (strncmp((char *)key.dptr, dn, strlen(dn)) == 0) { key 1088 source3/lib/ldb/ldb_tdb/ldb_index.c return tdb_delete(tdb, key); key 1096 source3/lib/ldb/ldb_tdb/ldb_index.c static int re_index(struct tdb_context *tdb, TDB_DATA key, TDB_DATA data, void *state) key 1104 source3/lib/ldb/ldb_tdb/ldb_index.c if (strncmp((char *)key.dptr, "DN=@", 4) == 0 || key 1105 source3/lib/ldb/ldb_tdb/ldb_index.c strncmp((char *)key.dptr, "DN=", 3) != 0) { key 1130 source3/lib/ldb/ldb_tdb/ldb_index.c if (strcmp((char *)key2.dptr, (char *)key.dptr) != 0) { key 1131 source3/lib/ldb/ldb_tdb/ldb_index.c tdb_delete(tdb, key); key 1137 source3/lib/ldb/ldb_tdb/ldb_index.c dn = (char *)key.dptr + 3; key 364 source3/lib/ldb/ldb_tdb/ldb_search.c static int search_func(struct tdb_context *tdb, TDB_DATA key, TDB_DATA data, void *state) key 371 source3/lib/ldb/ldb_tdb/ldb_search.c if (key.dsize < 4 || key 372 source3/lib/ldb/ldb_tdb/ldb_search.c strncmp((char *)key.dptr, "DN=", 3) != 0) { key 399 source3/lib/ldb/ldb_tdb/ldb_search.c ares->message->dn = ldb_dn_explode(ares->message, (char *)key.dptr + 3); key 124 source3/lib/ldb/ldb_tdb/ldb_tdb.c TDB_DATA key; key 153 source3/lib/ldb/ldb_tdb/ldb_tdb.c key.dptr = (uint8_t *)key_str; key 154 source3/lib/ldb/ldb_tdb/ldb_tdb.c key.dsize = strlen(key_str) + 1; key 156 source3/lib/ldb/ldb_tdb/ldb_tdb.c return key; key 160 source3/lib/ldb/ldb_tdb/ldb_tdb.c key.dptr = NULL; key 161 source3/lib/ldb/ldb_tdb/ldb_tdb.c key.dsize = 0; key 162 source3/lib/ldb/ldb_tdb/ldb_tdb.c return key; key 41 source3/lib/memcache.c DATA_BLOB *key, DATA_BLOB *value); key 97 source3/lib/memcache.c DATA_BLOB *key, DATA_BLOB *value) key 99 source3/lib/memcache.c key->data = ((uint8 *)e) + offsetof(struct memcache_element, data); key 100 source3/lib/memcache.c key->length = e->keylength; key 101 source3/lib/memcache.c value->data = key->data + e->keylength; key 111 source3/lib/memcache.c DATA_BLOB key) key 118 source3/lib/memcache.c if (e->keylength < key.length) return 1; key 119 source3/lib/memcache.c if (e->keylength > key.length) return -1; key 122 source3/lib/memcache.c return memcmp(this_key.data, key.data, key.length); key 126 source3/lib/memcache.c struct memcache *cache, enum memcache_number n, DATA_BLOB key) key 136 source3/lib/memcache.c cmp = memcache_compare(elem, n, key); key 147 source3/lib/memcache.c DATA_BLOB key, DATA_BLOB *value) key 158 source3/lib/memcache.c e = memcache_find(cache, n, key); key 176 source3/lib/memcache.c memcache_element_parse(e, &key, value); key 181 source3/lib/memcache.c DATA_BLOB key) key 186 source3/lib/memcache.c if (!memcache_lookup(cache, n, key, &value)) { key 236 source3/lib/memcache.c DATA_BLOB key) key 247 source3/lib/memcache.c e = memcache_find(cache, n, key); key 256 source3/lib/memcache.c DATA_BLOB key, DATA_BLOB value) key 271 source3/lib/memcache.c if (key.length == 0) { key 275 source3/lib/memcache.c e = memcache_find(cache, n, key); key 298 source3/lib/memcache.c element_size = memcache_element_size(key.length, value.length); key 309 source3/lib/memcache.c e->keylength = key.length; key 313 source3/lib/memcache.c memcpy(cache_key.data, key.data, key.length); key 325 source3/lib/memcache.c cmp = memcache_compare(elem, n, key); key 343 source3/lib/memcache.c DATA_BLOB key, void *pptr) key 356 source3/lib/memcache.c memcache_add(cache, n, key, data_blob_const(&p, sizeof(p))); key 145 source3/lib/messages_local.c char *key; key 148 source3/lib/messages_local.c key = talloc_asprintf(talloc_tos(), "PID/%s", procid_str_static(&pid)); key 150 source3/lib/messages_local.c SMB_ASSERT(key != NULL); key 152 source3/lib/messages_local.c kbuf.dptr = (uint8 *)key; key 153 source3/lib/messages_local.c kbuf.dsize = strlen(key)+1; key 162 source3/lib/messages_local.c TDB_DATA key, key 175 source3/lib/messages_local.c data = tdb_fetch(msg_tdb, key); key 209 source3/lib/messages_local.c TDB_DATA key, key 219 source3/lib/messages_local.c tdb_delete(msg_tdb, key); key 244 source3/lib/messages_local.c ret = tdb_store(msg_tdb, key, data, TDB_REPLACE); key 319 source3/lib/messages_local.c TDB_DATA key; key 335 source3/lib/messages_local.c key = message_key_pid(frame, pid); key 337 source3/lib/messages_local.c if (tdb_chainlock(tdb->tdb, key) == -1) { key 342 source3/lib/messages_local.c status = messaging_tdb_fetch(tdb->tdb, key, talloc_tos(), &msg_array); key 372 source3/lib/messages_local.c status = messaging_tdb_store(tdb->tdb, key, msg_array); key 387 source3/lib/messages_local.c tdb_chainunlock(tdb->tdb, key); key 401 source3/lib/messages_local.c TDB_DATA key = message_key_pid(mem_ctx, procid_self()); key 404 source3/lib/messages_local.c if (tdb_chainlock(msg_tdb, key) == -1) { key 405 source3/lib/messages_local.c TALLOC_FREE(key.dptr); key 409 source3/lib/messages_local.c status = messaging_tdb_fetch(msg_tdb, key, mem_ctx, &result); key 414 source3/lib/messages_local.c tdb_delete(msg_tdb, key); key 415 source3/lib/messages_local.c tdb_chainunlock(msg_tdb, key); key 421 source3/lib/messages_local.c TALLOC_FREE(key.dptr); key 157 source3/lib/privileges.c if ( strncmp((char *)rec->key.dptr, PRIVPREFIX, prefixlen) != 0) key 174 source3/lib/privileges.c fstrcpy( sid_string, (char *)&(rec->key.dptr[strlen(PRIVPREFIX)]) ); key 159 source3/lib/sharesec.c char *key; key 168 source3/lib/sharesec.c if (!(key = talloc_asprintf(ctx, "SECDESC/%s", servicename))) { key 173 source3/lib/sharesec.c data = dbwrap_fetch_bystring(share_db, talloc_tos(), key); key 175 source3/lib/sharesec.c TALLOC_FREE(key); key 205 source3/lib/sharesec.c char *key; key 224 source3/lib/sharesec.c if (!(key = talloc_asprintf(frame, "SECDESC/%s", share_name))) { key 229 source3/lib/sharesec.c status = dbwrap_trans_store(share_db, string_term_tdb_data(key), blob, key 252 source3/lib/sharesec.c char *key; key 259 source3/lib/sharesec.c if (!(key = talloc_asprintf(talloc_tos(), "SECDESC/%s", key 263 source3/lib/sharesec.c kbuf = string_term_tdb_data(key); key 81 source3/lib/smbconf/smbconf_reg.c struct registry_key **key) key 86 source3/lib/smbconf/smbconf_reg.c *key = rpd(ctx)->base_key; key 90 source3/lib/smbconf/smbconf_reg.c desired_access, key); key 102 source3/lib/smbconf/smbconf_reg.c static bool smbconf_value_exists(struct registry_key *key, const char *param) key 109 source3/lib/smbconf/smbconf_reg.c werr = reg_queryvalue(ctx, key, param, &value); key 153 source3/lib/smbconf/smbconf_reg.c static WERROR smbconf_reg_set_value(struct registry_key *key, key 185 source3/lib/smbconf/smbconf_reg.c subkeyname = strrchr_m(key->key->name, '\\'); key 188 source3/lib/smbconf/smbconf_reg.c "smbconf section.\n", key->key->name)); key 209 source3/lib/smbconf/smbconf_reg.c werr = reg_setvalue(key, canon_valname, &val); key 213 source3/lib/smbconf/smbconf_reg.c canon_valname, key->key->name, win_errstr(werr))); key 220 source3/lib/smbconf/smbconf_reg.c static WERROR smbconf_reg_set_multi_sz_value(struct registry_key *key, key 254 source3/lib/smbconf/smbconf_reg.c werr = reg_setvalue(key, valname, value); key 257 source3/lib/smbconf/smbconf_reg.c valname, key->key->name, win_errstr(werr))); key 314 source3/lib/smbconf/smbconf_reg.c struct registry_key *key, key 324 source3/lib/smbconf/smbconf_reg.c if (!smbconf_value_exists(key, INCLUDES_VALNAME)) { key 332 source3/lib/smbconf/smbconf_reg.c werr = reg_queryvalue(tmp_ctx, key, INCLUDES_VALNAME, &value); key 375 source3/lib/smbconf/smbconf_reg.c struct registry_key *key, key 401 source3/lib/smbconf/smbconf_reg.c werr = reg_enumvalue(tmp_ctx, key, count, &valname, &valvalue), key 431 source3/lib/smbconf/smbconf_reg.c werr = smbconf_reg_get_includes_internal(tmp_ctx, key, &num_includes, key 467 source3/lib/smbconf/smbconf_reg.c static bool smbconf_reg_key_has_values(struct registry_key *key) key 479 source3/lib/smbconf/smbconf_reg.c werr = reg_queryinfokey(key, &num_subkeys, &max_subkeylen, key 493 source3/lib/smbconf/smbconf_reg.c static WERROR smbconf_reg_delete_values(struct registry_key *key) key 502 source3/lib/smbconf/smbconf_reg.c werr = reg_enumvalue(mem_ctx, key, count, &valname, &valvalue), key 506 source3/lib/smbconf/smbconf_reg.c werr = reg_deletevalue(key, valname); key 514 source3/lib/smbconf/smbconf_reg.c key->key->name, key 791 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 794 source3/lib/smbconf/smbconf_reg.c REG_KEY_READ, &key); key 810 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 817 source3/lib/smbconf/smbconf_reg.c servicename, &key); key 819 source3/lib/smbconf/smbconf_reg.c talloc_free(key); key 832 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 837 source3/lib/smbconf/smbconf_reg.c REG_KEY_READ, &key); key 856 source3/lib/smbconf/smbconf_reg.c werr = smbconf_reg_get_values(tmp_service, key, key 899 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 903 source3/lib/smbconf/smbconf_reg.c REG_KEY_WRITE, &key); key 908 source3/lib/smbconf/smbconf_reg.c werr = smbconf_reg_set_value(key, param, valstr); key 925 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 929 source3/lib/smbconf/smbconf_reg.c REG_KEY_READ, &key); key 939 source3/lib/smbconf/smbconf_reg.c if (!smbconf_value_exists(key, param)) { key 944 source3/lib/smbconf/smbconf_reg.c werr = reg_queryvalue(mem_ctx, key, param, &value); key 956 source3/lib/smbconf/smbconf_reg.c talloc_free(key); key 968 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 973 source3/lib/smbconf/smbconf_reg.c REG_KEY_ALL, &key); key 983 source3/lib/smbconf/smbconf_reg.c if (!smbconf_value_exists(key, param)) { key 988 source3/lib/smbconf/smbconf_reg.c werr = reg_deletevalue(key, param); key 1002 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 1006 source3/lib/smbconf/smbconf_reg.c REG_KEY_READ, &key); key 1011 source3/lib/smbconf/smbconf_reg.c werr = smbconf_reg_get_includes_internal(mem_ctx, key, num_includes, key 1025 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 1029 source3/lib/smbconf/smbconf_reg.c REG_KEY_ALL, &key); key 1035 source3/lib/smbconf/smbconf_reg.c if (!smbconf_value_exists(key, INCLUDES_VALNAME)) { key 1038 source3/lib/smbconf/smbconf_reg.c werr = reg_deletevalue(key, INCLUDES_VALNAME); key 1040 source3/lib/smbconf/smbconf_reg.c werr = smbconf_reg_set_multi_sz_value(key, INCLUDES_VALNAME, key 1053 source3/lib/smbconf/smbconf_reg.c struct registry_key *key = NULL; key 1057 source3/lib/smbconf/smbconf_reg.c REG_KEY_ALL, &key); key 1062 source3/lib/smbconf/smbconf_reg.c if (!smbconf_value_exists(key, INCLUDES_VALNAME)) { key 1066 source3/lib/smbconf/smbconf_reg.c werr = reg_deletevalue(key, INCLUDES_VALNAME); key 217 source3/lib/smbldap.c const char* get_attr_key2string( ATTRIB_MAP_ENTRY table[], int key ) key 222 source3/lib/smbldap.c if ( table[i].attrib == key ) key 207 source3/lib/tdb_validate.c static int traverse_copy_fn(struct tdb_context *tdb, TDB_DATA key, key 212 source3/lib/tdb_validate.c if (tdb_store(data->dst, key, dbuf, TDB_INSERT) != 0) { key 46 source3/lib/util_tdb.c static int tdb_chainlock_with_timeout_internal( TDB_CONTEXT *tdb, TDB_DATA key, unsigned int timeout, int rw_type) key 59 source3/lib/util_tdb.c ret = tdb_chainlock_read(tdb, key); key 61 source3/lib/util_tdb.c ret = tdb_chainlock(tdb, key); key 69 source3/lib/util_tdb.c timeout, key.dptr, tdb_name(tdb))); key 85 source3/lib/util_tdb.c int tdb_chainlock_with_timeout( TDB_CONTEXT *tdb, TDB_DATA key, unsigned int timeout) key 87 source3/lib/util_tdb.c return tdb_chainlock_with_timeout_internal(tdb, key, timeout, F_WRLCK); key 93 source3/lib/util_tdb.c TDB_DATA key = string_term_tdb_data(keyval); key 95 source3/lib/util_tdb.c return tdb_chainlock_with_timeout(tdb, key, timeout); key 104 source3/lib/util_tdb.c TDB_DATA key = string_term_tdb_data(keyval); key 106 source3/lib/util_tdb.c return tdb_chainlock_with_timeout_internal(tdb, key, timeout, F_RDLCK); key 115 source3/lib/util_tdb.c TDB_DATA key = string_term_tdb_data(keystr); key 117 source3/lib/util_tdb.c return tdb_trans_store(tdb, key, data, flags); key 430 source3/lib/util_tdb.c int tdb_trans_store(struct tdb_context *tdb, TDB_DATA key, TDB_DATA dbuf, key 440 source3/lib/util_tdb.c if ((res = tdb_store(tdb, key, dbuf, flag)) != 0) { key 460 source3/lib/util_tdb.c int tdb_trans_delete(struct tdb_context *tdb, TDB_DATA key) key 469 source3/lib/util_tdb.c if ((res = tdb_delete(tdb, key)) != 0) { key 361 source3/libaddns/dns.h uint8 *key; key 436 source3/libaddns/dns.h uint16 key_length, const uint8 *key, key 188 source3/libaddns/dnsgss.c input_desc.value = talloc_move(mem_ctx, &tkey->key); key 277 source3/libaddns/dnsgss.c struct dns_domain_name *key, *algorithm; key 285 source3/libaddns/dnsgss.c err = dns_domain_name_from_string(buf, keyname, &key); key 291 source3/libaddns/dnsgss.c dns_marshall_domain_name(buf, key); key 181 source3/libaddns/dnsrecord.c uint16 key_length, const uint8 *key, key 201 source3/libaddns/dnsrecord.c dns_marshall_buffer(buf, key, key_length); key 243 source3/libaddns/dnsrecord.c if (!(tkey->key = TALLOC_ARRAY(tkey, uint8, tkey->key_length))) { key 248 source3/libaddns/dnsrecord.c tkey->key = NULL; key 251 source3/libaddns/dnsrecord.c dns_unmarshall_buffer(&buf, tkey->key, tkey->key_length); key 755 source3/libads/dns.c char *key; key 766 source3/libads/dns.c key = sitename_key(realm); key 770 source3/libads/dns.c ret = gencache_del(key); key 771 source3/libads/dns.c SAFE_FREE(key); key 780 source3/libads/dns.c ret = gencache_set( key, sitename, expire ); key 781 source3/libads/dns.c SAFE_FREE(key); key 796 source3/libads/dns.c char *key; key 808 source3/libads/dns.c key = sitename_key(query_realm); key 810 source3/libads/dns.c ret = gencache_get( key, &sitename, &timeout ); key 811 source3/libads/dns.c SAFE_FREE(key); key 383 source3/libads/kerberos.c char *key = NULL; key 386 source3/libads/kerberos.c if (asprintf(&key, "%s/%s/enctype=%d", key 390 source3/libads/kerberos.c ret = (char *)secrets_fetch(key, NULL); key 391 source3/libads/kerberos.c SAFE_FREE(key); key 415 source3/libads/kerberos.c char *key; key 417 source3/libads/kerberos.c if (asprintf(&key, "%s/DES/%s", SECRETS_SALTING_PRINCIPAL, key 422 source3/libads/kerberos.c return key; key 430 source3/libads/kerberos.c char* key; key 433 source3/libads/kerberos.c if ( (key = des_salt_key()) == NULL ) { key 440 source3/libads/kerberos.c secrets_delete( key ); key 446 source3/libads/kerberos.c ret = secrets_store( key, salt, strlen(salt)+1 ); key 448 source3/libads/kerberos.c SAFE_FREE( key ); key 458 source3/libads/kerberos.c char *salt, *key; key 460 source3/libads/kerberos.c if ( (key = des_salt_key()) == NULL ) { key 465 source3/libads/kerberos.c salt = (char*)secrets_fetch( key, NULL ); key 467 source3/libads/kerberos.c SAFE_FREE( key ); key 579 source3/libads/kerberos.c char *key = NULL; key 610 source3/libads/kerberos.c if (asprintf(&key, "%s/%s/enctype=%d", key 617 source3/libads/kerberos.c ret = secrets_store(key, principal, strlen(principal) + 1); key 619 source3/libads/kerberos.c ret = secrets_delete(key); key 624 source3/libads/kerberos.c SAFE_FREE(key); key 76 source3/libads/kerberos_verify.c enctype = dec_ticket->ticket.key.keytype; key 350 source3/libads/kerberos_verify.c krb5_keyblock *key = NULL; key 352 source3/libads/kerberos_verify.c if (!(key = SMB_MALLOC_P(krb5_keyblock))) { key 357 source3/libads/kerberos_verify.c if (create_kerberos_key_from_string(context, host_princ, &password, key, enctypes[i], false)) { key 358 source3/libads/kerberos_verify.c SAFE_FREE(key); key 362 source3/libads/kerberos_verify.c krb5_auth_con_setuseruserkey(context, auth_context, key); key 370 source3/libads/kerberos_verify.c krb5_copy_keyblock(context, key, keyblock); key 371 source3/libads/kerberos_verify.c krb5_free_keyblock(context, key); key 383 source3/libads/kerberos_verify.c krb5_free_keyblock(context, key); key 387 source3/libads/kerberos_verify.c krb5_free_keyblock(context, key); key 403 source3/libads/ldap_printer.c uint32 key,val; key 405 source3/libads/ldap_printer.c for (key=0; key < data->num_keys; key++) { key 406 source3/libads/ldap_printer.c REGVAL_CTR *ctr = data->keys[key].values; key 397 source3/libgpo/gpext/gpext.c struct registry_key *key, key 405 source3/libgpo/gpext/gpext.c werr = reg_setvalue(key, key 422 source3/libgpo/gpext/gpext.c struct registry_key *key = NULL; key 437 source3/libgpo/gpext/gpext.c &key); key 441 source3/libgpo/gpext/gpext.c key, key 40 source3/libgpo/gpext/registry.c UNISTR key; key 146 source3/libgpo/gpext/registry.c if (!prs_unistr("key", ps, depth, &entry->key)) key 258 source3/libgpo/gpext/registry.c char *key = NULL; key 269 source3/libgpo/gpext/registry.c if (strlen_w((const smb_ucs2_t *)file_entry->key.buffer) <= 0) key 272 source3/libgpo/gpext/registry.c if (!pull_ucs2_talloc(mem_ctx, &key, file_entry->key.buffer, key 329 source3/libgpo/gpext/registry.c entry->key = key; key 77 source3/libgpo/gpext/scripts.c const char *key, key 106 source3/libgpo/gpext/scripts.c entry->key = key; key 131 source3/libgpo/gpext/scripts.c const char *key = NULL; key 139 source3/libgpo/gpext/scripts.c key = talloc_asprintf(ini_ctx->mem_ctx, "%s:%s%s", key 142 source3/libgpo/gpext/scripts.c NT_STATUS_HAVE_NO_MEMORY(key); key 144 source3/libgpo/gpext/scripts.c script = iniparser_getstring(ini_ctx->dict, key, NULL); key 149 source3/libgpo/gpext/scripts.c key = talloc_asprintf(ini_ctx->mem_ctx, "%s:%s%s", key 152 source3/libgpo/gpext/scripts.c NT_STATUS_HAVE_NO_MEMORY(key); key 154 source3/libgpo/gpext/scripts.c parameters = iniparser_getstring(ini_ctx->dict, key, NULL); key 218 source3/libgpo/gpext/scripts.c struct registry_key *key, key 223 source3/libgpo/gpext/scripts.c if (!key || !gpo) { key 227 source3/libgpo/gpext/scripts.c werr = gp_store_reg_val_sz(mem_ctx, key, "DisplayName", key 231 source3/libgpo/gpext/scripts.c werr = gp_store_reg_val_sz(mem_ctx, key, "FileSysPath", key 235 source3/libgpo/gpext/scripts.c werr = gp_store_reg_val_sz(mem_ctx, key, "GPO-ID", key 239 source3/libgpo/gpext/scripts.c werr = gp_store_reg_val_sz(mem_ctx, key, "GPOName", key 243 source3/libgpo/gpext/scripts.c werr = gp_store_reg_val_sz(mem_ctx, key, "SOM-ID", key 140 source3/libgpo/gpo_reg.c struct registry_key **key) key 144 source3/libgpo/gpo_reg.c if (!reg_ctx || !subkeyname || !key) { key 152 source3/libgpo/gpo_reg.c reg_ctx->token, key); key 159 source3/libgpo/gpo_reg.c struct registry_key *key, key 174 source3/libgpo/gpo_reg.c return reg_setvalue(key, val_name, ®_val); key 181 source3/libgpo/gpo_reg.c struct registry_key *key, key 191 source3/libgpo/gpo_reg.c return reg_setvalue(key, val_name, ®_val); key 198 source3/libgpo/gpo_reg.c struct registry_key *key, key 205 source3/libgpo/gpo_reg.c werr = reg_queryvalue(mem_ctx, key, val_name, ®_val); key 222 source3/libgpo/gpo_reg.c struct registry_key *key, key 229 source3/libgpo/gpo_reg.c werr = reg_queryvalue(mem_ctx, key, val_name, ®_val); key 245 source3/libgpo/gpo_reg.c struct registry_key *key, key 250 source3/libgpo/gpo_reg.c if (!key || !gpo) { key 254 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_dword(mem_ctx, key, "Version", key 258 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_dword(mem_ctx, key, "WQLFilterPass", key 262 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_dword(mem_ctx, key, "AccessDenied", key 266 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_dword(mem_ctx, key, "GPO-Disabled", key 270 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_dword(mem_ctx, key, "Options", key 274 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_sz(mem_ctx, key, "GPOID", key 278 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_sz(mem_ctx, key, "SOM", key 282 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_sz(mem_ctx, key, "DisplayName", key 286 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_sz(mem_ctx, key, "WQL-Id", key 312 source3/libgpo/gpo_reg.c struct registry_key *key, key 322 source3/libgpo/gpo_reg.c return reg_deletekey_recursive(mem_ctx, key, path); key 334 source3/libgpo/gpo_reg.c struct registry_key *key = NULL; key 349 source3/libgpo/gpo_reg.c reg_ctx->curr_key, &key); key 359 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_sz(mem_ctx, key, valname, val); key 363 source3/libgpo/gpo_reg.c werr = gp_store_reg_val_dword(mem_ctx, key, "Count", count); key 379 source3/libgpo/gpo_reg.c struct registry_key *key = NULL; key 395 source3/libgpo/gpo_reg.c werr = gp_read_reg_subkey(mem_ctx, reg_ctx, path, &key); key 398 source3/libgpo/gpo_reg.c werr = gp_read_reg_val_dword(mem_ctx, key, "Count", &count); key 406 source3/libgpo/gpo_reg.c werr = gp_read_reg_val_sz(mem_ctx, key, valname, &val); key 440 source3/libgpo/gpo_reg.c struct registry_key *key, key 443 source3/libgpo/gpo_reg.c return reg_deletesubkeys_recursive(mem_ctx, key, path); key 460 source3/libgpo/gpo_reg.c struct registry_key *key; key 506 source3/libgpo/gpo_reg.c reg_ctx->curr_key, &key); key 528 source3/libgpo/gpo_reg.c reg_ctx->curr_key, &key); key 533 source3/libgpo/gpo_reg.c werr = gp_store_reg_gpovals(mem_ctx, key, gpo); key 550 source3/libgpo/gpo_reg.c struct registry_key *key, key 555 source3/libgpo/gpo_reg.c if (!key || !gpo) { key 559 source3/libgpo/gpo_reg.c werr = gp_read_reg_val_dword(mem_ctx, key, "Version", key 563 source3/libgpo/gpo_reg.c werr = gp_read_reg_val_dword(mem_ctx, key, "Options", key 567 source3/libgpo/gpo_reg.c werr = gp_read_reg_val_sz(mem_ctx, key, "GPOID", key 571 source3/libgpo/gpo_reg.c werr = gp_read_reg_val_sz(mem_ctx, key, "SOM", key 575 source3/libgpo/gpo_reg.c werr = gp_read_reg_val_sz(mem_ctx, key, "DisplayName", key 586 source3/libgpo/gpo_reg.c struct registry_key *key, key 592 source3/libgpo/gpo_reg.c if (!gpo_ret || !key) { key 599 source3/libgpo/gpo_reg.c werr = gp_read_reg_gpovals(mem_ctx, key, gpo); key 620 source3/libgpo/gpo_reg.c struct registry_key *key = NULL; key 658 source3/libgpo/gpo_reg.c werr = gp_read_reg_subkey(mem_ctx, reg_ctx, subkeyname, &key); key 670 source3/libgpo/gpo_reg.c werr = gp_read_reg_gpo(mem_ctx, key, &gpo); key 757 source3/libgpo/gpo_reg.c struct registry_key *key, key 772 source3/libgpo/gpo_reg.c return reg_setkeysecurity(key, sd); key 779 source3/libgpo/gpo_reg.c const char *key, const char *subkey, key 793 source3/libgpo/gpo_reg.c direction, key, subkey, type_str)); key 842 source3/libgpo/gpo_reg.c entry->key, key 883 source3/libgpo/gpo_reg.c (*entries)[*num].key = entry->key; key 931 source3/libgpo/gpo_reg.c struct registry_key *key = NULL; key 934 source3/libgpo/gpo_reg.c printf("about to store key: [%s]\n", entry->key); key 940 source3/libgpo/gpo_reg.c werr = gp_store_reg_subkey(mem_ctx, entry->key, key 941 source3/libgpo/gpo_reg.c root_key, &key); key 955 source3/libgpo/gpo_reg.c key, key 965 source3/libgpo/gpo_reg.c werr = reg_setvalue(key, entry->value, entry->data); key 975 source3/libgpo/gpo_reg.c werr = reg_deletevalue(key, entry->value); key 985 source3/libgpo/gpo_reg.c werr = reg_deleteallvalues(key); key 219 source3/libsmb/clikrb5.c krb5_keyblock *key, key 232 source3/libsmb/clikrb5.c ret = krb5_string_to_key(context, &eblock, key, password, &salt); key 241 source3/libsmb/clikrb5.c krb5_keyblock *key, key 253 source3/libsmb/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key); key 265 source3/libsmb/clikrb5.c krb5_keyblock *key, key 277 source3/libsmb/clikrb5.c KRB5_KEY_DATA(key) = (KRB5_KEY_DATA_CAST *)SMB_MALLOC(password->length); key 278 source3/libsmb/clikrb5.c if (!KRB5_KEY_DATA(key)) { key 281 source3/libsmb/clikrb5.c memcpy(KRB5_KEY_DATA(key), password->data, password->length); key 282 source3/libsmb/clikrb5.c KRB5_KEY_LENGTH(key) = password->length; key 283 source3/libsmb/clikrb5.c KRB5_KEY_TYPE(key) = enctype; key 287 source3/libsmb/clikrb5.c ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype); key 121 source3/libsmb/conncache.c static void delete_matches(const char *key, const char *value, key 124 source3/libsmb/conncache.c gencache_del(key); key 139 source3/libsmb/conncache.c char *key = NULL; key 142 source3/libsmb/conncache.c key = negative_conn_cache_keystr(domain, server); key 143 source3/libsmb/conncache.c if (key == NULL) key 146 source3/libsmb/conncache.c if (gencache_get(key, &value, (time_t *) NULL)) key 151 source3/libsmb/conncache.c TALLOC_FREE(key); key 164 source3/libsmb/conncache.c char *key = NULL; key 166 source3/libsmb/conncache.c key = negative_conn_cache_keystr(domain, server); key 167 source3/libsmb/conncache.c if (key == NULL) key 170 source3/libsmb/conncache.c gencache_del(key); key 174 source3/libsmb/conncache.c TALLOC_FREE(key); key 189 source3/libsmb/conncache.c char *key = NULL; key 194 source3/libsmb/conncache.c key = negative_conn_cache_keystr(domain, server); key 195 source3/libsmb/conncache.c if (key == NULL) { key 206 source3/libsmb/conncache.c if (gencache_set(key, value, key 217 source3/libsmb/conncache.c TALLOC_FREE(key); key 134 source3/libsmb/dsgetdcname.c char *key; key 140 source3/libsmb/dsgetdcname.c key = dsgetdcname_cache_key(mem_ctx, domain_name); key 141 source3/libsmb/dsgetdcname.c if (!key) { key 145 source3/libsmb/dsgetdcname.c if (!gencache_del(key)) { key 160 source3/libsmb/dsgetdcname.c char *key; key 167 source3/libsmb/dsgetdcname.c key = dsgetdcname_cache_key(mem_ctx, domain_name); key 168 source3/libsmb/dsgetdcname.c if (!key) { key 174 source3/libsmb/dsgetdcname.c if (gencache_lock_entry(key) != 0) { key 178 source3/libsmb/dsgetdcname.c ret = gencache_set_data_blob(key, blob, expire_time); key 180 source3/libsmb/dsgetdcname.c gencache_unlock_entry(key); key 359 source3/libsmb/dsgetdcname.c char *key; key 370 source3/libsmb/dsgetdcname.c key = dsgetdcname_cache_key(mem_ctx, domain_name); key 371 source3/libsmb/dsgetdcname.c if (!key) { key 375 source3/libsmb/dsgetdcname.c if (!gencache_get_data_blob(key, &blob, expired)) { key 101 source3/libsmb/namecache.c char *key, *value_string; key 138 source3/libsmb/namecache.c key = namecache_key(name, name_type); key 139 source3/libsmb/namecache.c if (!key) { key 151 source3/libsmb/namecache.c SAFE_FREE(key); key 157 source3/libsmb/namecache.c ret = gencache_set(key, value_string, expiry); key 158 source3/libsmb/namecache.c SAFE_FREE(key); key 181 source3/libsmb/namecache.c char *key, *value; key 202 source3/libsmb/namecache.c key = namecache_key(name, name_type); key 203 source3/libsmb/namecache.c if (!key) { key 207 source3/libsmb/namecache.c if (!gencache_get(key, &value, &timeout)) { key 209 source3/libsmb/namecache.c SAFE_FREE(key); key 220 source3/libsmb/namecache.c SAFE_FREE(key); key 234 source3/libsmb/namecache.c char *key; key 243 source3/libsmb/namecache.c key = namecache_key(name, name_type); key 244 source3/libsmb/namecache.c if (!key) { key 247 source3/libsmb/namecache.c ret = gencache_del(key); key 248 source3/libsmb/namecache.c SAFE_FREE(key); key 258 source3/libsmb/namecache.c static void flush_netbios_name(const char *key, key 263 source3/libsmb/namecache.c gencache_del(key); key 264 source3/libsmb/namecache.c DEBUG(5, ("Deleting entry %s\n", key)); key 311 source3/libsmb/namecache.c char *key; key 319 source3/libsmb/namecache.c key = namecache_status_record_key(keyname, keyname_type, key 321 source3/libsmb/namecache.c if (!key) key 325 source3/libsmb/namecache.c ret = gencache_set(key, srvname, expiry); key 329 source3/libsmb/namecache.c key, srvname )); key 332 source3/libsmb/namecache.c key )); key 335 source3/libsmb/namecache.c SAFE_FREE(key); key 347 source3/libsmb/namecache.c char *key = NULL; key 354 source3/libsmb/namecache.c key = namecache_status_record_key(keyname, keyname_type, key 356 source3/libsmb/namecache.c if (!key) key 359 source3/libsmb/namecache.c if (!gencache_get(key, &value, &timeout)) { key 361 source3/libsmb/namecache.c key)); key 362 source3/libsmb/namecache.c SAFE_FREE(key); key 366 source3/libsmb/namecache.c key, value )); key 370 source3/libsmb/namecache.c SAFE_FREE(key); key 63 source3/libsmb/namequery.c char *key; key 82 source3/libsmb/namequery.c key = saf_key( domain ); key 88 source3/libsmb/namequery.c ret = gencache_set( key, servername, expire ); key 90 source3/libsmb/namequery.c SAFE_FREE( key ); key 97 source3/libsmb/namequery.c char *key; key 114 source3/libsmb/namequery.c key = saf_join_key( domain ); key 120 source3/libsmb/namequery.c ret = gencache_set( key, servername, expire ); key 122 source3/libsmb/namequery.c SAFE_FREE( key ); key 129 source3/libsmb/namequery.c char *key; key 140 source3/libsmb/namequery.c key = saf_join_key(domain); key 141 source3/libsmb/namequery.c ret = gencache_del(key); key 142 source3/libsmb/namequery.c SAFE_FREE(key); key 148 source3/libsmb/namequery.c key = saf_key(domain); key 149 source3/libsmb/namequery.c ret = gencache_del(key); key 150 source3/libsmb/namequery.c SAFE_FREE(key); key 167 source3/libsmb/namequery.c char *key = NULL; key 177 source3/libsmb/namequery.c key = saf_join_key( domain ); key 179 source3/libsmb/namequery.c ret = gencache_get( key, &server, &timeout ); key 181 source3/libsmb/namequery.c SAFE_FREE( key ); key 189 source3/libsmb/namequery.c key = saf_key( domain ); key 191 source3/libsmb/namequery.c ret = gencache_get( key, &server, &timeout ); key 193 source3/libsmb/namequery.c SAFE_FREE( key ); key 236 source3/libsmb/samlogon_cache.c tdb_delete( netsamlogon_tdb, key ); key 181 source3/libsmb/smbdes.c static void dohash(char *out, char *in, char *key, int forw) key 193 source3/libsmb/smbdes.c permute(pk1, key, perm1, 56); key 261 source3/libsmb/smbdes.c static void str_to_key(const unsigned char str[7], unsigned char key[8]) key 265 source3/libsmb/smbdes.c key[0] = str[0]>>1; key 266 source3/libsmb/smbdes.c key[1] = ((str[0]&0x01)<<6) | (str[1]>>2); key 267 source3/libsmb/smbdes.c key[2] = ((str[1]&0x03)<<5) | (str[2]>>3); key 268 source3/libsmb/smbdes.c key[3] = ((str[2]&0x07)<<4) | (str[3]>>4); key 269 source3/libsmb/smbdes.c key[4] = ((str[3]&0x0F)<<3) | (str[4]>>5); key 270 source3/libsmb/smbdes.c key[5] = ((str[4]&0x1F)<<2) | (str[5]>>6); key 271 source3/libsmb/smbdes.c key[6] = ((str[5]&0x3F)<<1) | (str[6]>>7); key 272 source3/libsmb/smbdes.c key[7] = str[6]&0x7F; key 274 source3/libsmb/smbdes.c key[i] = (key[i]<<1); key 279 source3/libsmb/smbdes.c void des_crypt56(unsigned char *out, const unsigned char *in, const unsigned char *key, int forw) key 287 source3/libsmb/smbdes.c str_to_key(key, key2); key 334 source3/libsmb/smbdes.c void des_crypt128(unsigned char out[8], const unsigned char in[8], const unsigned char key[16]) key 338 source3/libsmb/smbdes.c des_crypt56(buf, in, key, 1); key 339 source3/libsmb/smbdes.c des_crypt56(out, buf, key+9, 1); key 343 source3/libsmb/smbdes.c void des_crypt64(unsigned char out[8], const unsigned char in[8], const unsigned char key[8]) key 349 source3/libsmb/smbdes.c des_crypt56(buf, in, key, 1); key 350 source3/libsmb/smbdes.c key2[0] = key[7]; key 358 source3/libsmb/smbdes.c void des_crypt112(unsigned char out[8], const unsigned char in[8], const unsigned char key[14], int forw) key 361 source3/libsmb/smbdes.c des_crypt56(buf, in, key, forw); key 362 source3/libsmb/smbdes.c des_crypt56(out, buf, key+7, forw); key 365 source3/libsmb/smbdes.c void cred_hash3(unsigned char *out, const unsigned char *in, const unsigned char *key, int forw) key 370 source3/libsmb/smbdes.c des_crypt56(out, in, key, forw); key 371 source3/libsmb/smbdes.c key2[0] = key[7]; key 379 source3/libsmb/smbdes.c void des_crypt112_16(unsigned char out[16], unsigned char in[16], const unsigned char key[14], int forw) key 381 source3/libsmb/smbdes.c des_crypt56(out, in, key, forw); key 382 source3/libsmb/smbdes.c des_crypt56(out + 8, in + 8, key+7, forw); key 389 source3/libsmb/smbdes.c void SamOEMhash( unsigned char *data, const unsigned char key[16], size_t len) key 392 source3/libsmb/smbdes.c const DATA_BLOB keyblob = data_blob_const(key, 16); key 398 source3/libsmb/smbdes.c void SamOEMhashBlob( unsigned char *data, size_t len, DATA_BLOB *key) key 402 source3/libsmb/smbdes.c arcfour_init(&arc4_state, key); key 617 source3/libsmb/smbencrypt.c uint8 bin[8], bout[8], key[7]; key 625 source3/libsmb/smbencrypt.c memcpy(key, &session_key->data[k], 7); key 627 source3/libsmb/smbencrypt.c des_crypt56(bout, bin, key, forward?1:0); key 114 source3/libsmb/trustdom_cache.c char *key, *alt_key; key 128 source3/libsmb/trustdom_cache.c key = trustdom_cache_key(name); key 140 source3/libsmb/trustdom_cache.c ret = gencache_set(key, sid_string, timeout); key 143 source3/libsmb/trustdom_cache.c SAFE_FREE(key); key 147 source3/libsmb/trustdom_cache.c ret = gencache_set(key, sid_string, timeout); key 148 source3/libsmb/trustdom_cache.c SAFE_FREE(key); key 166 source3/libsmb/trustdom_cache.c char *key = NULL, *value = NULL; key 178 source3/libsmb/trustdom_cache.c key = trustdom_cache_key(name); key 179 source3/libsmb/trustdom_cache.c if (!key) key 182 source3/libsmb/trustdom_cache.c if (!gencache_get(key, &value, &timeout)) { key 184 source3/libsmb/trustdom_cache.c SAFE_FREE(key); key 187 source3/libsmb/trustdom_cache.c SAFE_FREE(key); key 258 source3/libsmb/trustdom_cache.c static void flush_trustdom_name(const char* key, const char *value, time_t timeout, void* dptr) key 260 source3/libsmb/trustdom_cache.c gencache_del(key); key 261 source3/libsmb/trustdom_cache.c DEBUG(5, ("Deleting entry %s\n", key)); key 42 source3/libsmb/unexpected.c struct unexpected_key key; key 66 source3/libsmb/unexpected.c ZERO_STRUCT(key); /* needed for potential alignment */ key 68 source3/libsmb/unexpected.c key.packet_type = p->packet_type; key 69 source3/libsmb/unexpected.c key.timestamp = p->timestamp; key 70 source3/libsmb/unexpected.c key.count = count++; key 72 source3/libsmb/unexpected.c kbuf.dptr = (uint8_t *)&key; key 73 source3/libsmb/unexpected.c kbuf.dsize = sizeof(key); key 89 source3/libsmb/unexpected.c struct unexpected_key key; key 91 source3/libsmb/unexpected.c if (kbuf.dsize != sizeof(key)) { key 95 source3/libsmb/unexpected.c memcpy(&key, kbuf.dptr, sizeof(key)); key 97 source3/libsmb/unexpected.c if (lastt - key.timestamp > NMBD_UNEXPECTED_TIMEOUT) { key 137 source3/libsmb/unexpected.c struct unexpected_key key; key 143 source3/libsmb/unexpected.c if (kbuf.dsize != sizeof(key)) { key 147 source3/libsmb/unexpected.c memcpy(&key, kbuf.dptr, sizeof(key)); key 149 source3/libsmb/unexpected.c if (key.packet_type != state->match_type) return 0; key 1633 source3/locking/brlock.c struct file_id *key; key 1647 source3/locking/brlock.c key = (struct file_id *)rec->key.dptr; key 1670 source3/locking/brlock.c cb->fn(*key, key 1760 source3/locking/brlock.c TDB_DATA key, data; key 1770 source3/locking/brlock.c memset(&br_lck->key, '\0', sizeof(struct file_id)); key 1771 source3/locking/brlock.c br_lck->key = fsp->file_id; key 1773 source3/locking/brlock.c key.dptr = (uint8 *)&br_lck->key; key 1774 source3/locking/brlock.c key.dsize = sizeof(struct file_id); key 1783 source3/locking/brlock.c if (brlock_db->fetch(brlock_db, br_lck, key, &data) == -1) { key 1791 source3/locking/brlock.c br_lck->record = brlock_db->fetch_locked(brlock_db, br_lck, key); key 843 source3/locking/locking.c TDB_DATA key = locking_key(&id, &tmp); key 850 source3/locking/locking.c if (!(lck->record = lock_db->fetch_locked(lock_db, lck, key))) { key 875 source3/locking/locking.c TDB_DATA key = locking_key(&id, &tmp); key 883 source3/locking/locking.c if (lock_db->fetch(lock_db, lck, key, &data) == -1) { key 1483 source3/locking/locking.c if (rec->key.dsize != sizeof(struct file_id)) key 1097 source3/modules/vfs_default.c struct file_id key; key 1101 source3/modules/vfs_default.c ZERO_STRUCT(key); key 1103 source3/modules/vfs_default.c key.devid = sbuf->st_dev; key 1104 source3/modules/vfs_default.c key.inode = sbuf->st_ino; key 1107 source3/modules/vfs_default.c return key; key 112 source3/modules/vfs_onefs.c struct file_id key; key 116 source3/modules/vfs_onefs.c ZERO_STRUCT(key); key 118 source3/modules/vfs_onefs.c key.devid = sbuf->st_dev; key 119 source3/modules/vfs_onefs.c key.inode = sbuf->st_ino; key 120 source3/modules/vfs_onefs.c key.extid = sbuf->st_snapid; key 122 source3/modules/vfs_onefs.c return key; key 37 source3/modules/vfs_streams_depot.c static uint32_t hash_fn(DATA_BLOB key) key 43 source3/modules/vfs_streams_depot.c for (value = 0x238F13AF * key.length, i=0; i < key.length; i++) key 44 source3/modules/vfs_streams_depot.c value = (value + (key.data[i] << (i*5 % 24))); key 58 source3/nmbd/nmbd_winsserver.c static struct name_record *wins_record_to_name_record(TDB_DATA key, TDB_DATA data) key 105 source3/nmbd/nmbd_winsserver.c push_ascii_nstring(namerec->name.name, (const char *)key.dptr); key 106 source3/nmbd/nmbd_winsserver.c namerec->name.name_type = key.dptr[sizeof(unstring)]; key 192 source3/nmbd/nmbd_winsserver.c TDB_DATA key; key 199 source3/nmbd/nmbd_winsserver.c key.dptr = (uint8 *)keydata; key 200 source3/nmbd/nmbd_winsserver.c key.dsize = sizeof(keydata); key 202 source3/nmbd/nmbd_winsserver.c return key; key 212 source3/nmbd/nmbd_winsserver.c TDB_DATA data, key; key 220 source3/nmbd/nmbd_winsserver.c key = name_to_key(nmbname); key 221 source3/nmbd/nmbd_winsserver.c data = tdb_fetch(wins_tdb, key); key 227 source3/nmbd/nmbd_winsserver.c namerec = wins_record_to_name_record(key, data); key 267 source3/nmbd/nmbd_winsserver.c TDB_DATA key, data; key 274 source3/nmbd/nmbd_winsserver.c key = name_to_key(&namerec->name); key 281 source3/nmbd/nmbd_winsserver.c ret = tdb_store(wins_tdb, key, data, tdb_flag); key 312 source3/nmbd/nmbd_winsserver.c TDB_DATA key; key 319 source3/nmbd/nmbd_winsserver.c key = name_to_key(&namerec->name); key 320 source3/nmbd/nmbd_winsserver.c ret = tdb_delete(wins_tdb, key); key 105 source3/param/loadparm.c char *key; key 5660 source3/param/loadparm.c if (strwicmp(data->key, param_key) == 0) { key 5672 source3/param/loadparm.c if (strwicmp(data->key, param_key) == 0) { key 5903 source3/param/loadparm.c string_free(&opt->key); key 6632 source3/param/loadparm.c if (strwicmp(opt->key, opt_name) == 0) { key 6643 source3/param/loadparm.c new_opt->key = SMB_STRDUP(opt_name); key 6713 source3/param/loadparm.c set_param_opt(&pserviceDest->param_opt, data->key, data->value); key 7800 source3/param/loadparm.c fprintf(f, "\t%s = %s\n", data->key, data->value); key 7865 source3/param/loadparm.c fprintf(f, "\t%s = %s\n", data->key, data->value); key 95 source3/passdb/pdb_ldap.c static const char* get_userattr_key2string( int schema_ver, int key ) key 99 source3/passdb/pdb_ldap.c return get_attr_key2string( attrib_map_v22, key ); key 102 source3/passdb/pdb_ldap.c return get_attr_key2string( attrib_map_v30, key ); key 70 source3/passdb/pdb_tdb.c if (rec->key.dsize < USERPREFIX_LEN) { key 73 source3/passdb/pdb_tdb.c if (strncmp((char *)rec->key.dptr, USERPREFIX, USERPREFIX_LEN) != 0) { key 85 source3/passdb/pdb_tdb.c "(version:%d)\n", rec->key.dptr, state->from)); key 119 source3/passdb/pdb_tdb.c "from TDB (key:%s) (version:%d)\n", rec->key.dptr, key 162 source3/passdb/pdb_tdb.c new_rec = bs->new_db->fetch_locked(bs->new_db, talloc_tos(), orig_rec->key); key 1114 source3/passdb/pdb_tdb.c if ((rec->key.dsize < prefixlen) key 1115 source3/passdb/pdb_tdb.c || (strncmp((char *)rec->key.dptr, RIDPREFIX, prefixlen))) { key 1119 source3/passdb/pdb_tdb.c rid = strtoul((char *)rec->key.dptr+prefixlen, NULL, 16); key 112 source3/passdb/secrets.c void *secrets_fetch(const char *key, size_t *size) key 121 source3/passdb/secrets.c if (db_ctx->fetch(db_ctx, talloc_tos(), string_tdb_data(key), key 141 source3/passdb/secrets.c bool secrets_store(const char *key, const void *data, size_t size) key 149 source3/passdb/secrets.c status = dbwrap_trans_store(db_ctx, string_tdb_data(key), key 158 source3/passdb/secrets.c bool secrets_delete(const char *key) key 165 source3/passdb/secrets.c status = dbwrap_trans_delete(db_ctx, string_tdb_data(key)); key 221 source3/passdb/secrets.c fstring key; key 223 source3/passdb/secrets.c slprintf(key, sizeof(key)-1, "%s/%s", SECRETS_DOMAIN_GUID, domain); key 224 source3/passdb/secrets.c strupper_m(key); key 225 source3/passdb/secrets.c return secrets_store(key, guid, sizeof(struct GUID)); key 231 source3/passdb/secrets.c fstring key; key 235 source3/passdb/secrets.c slprintf(key, sizeof(key)-1, "%s/%s", SECRETS_DOMAIN_GUID, domain); key 236 source3/passdb/secrets.c strupper_m(key); key 237 source3/passdb/secrets.c dyn_guid = (struct GUID *)secrets_fetch(key, &size); key 244 source3/passdb/secrets.c dyn_guid = (struct GUID *)secrets_fetch(key, &size); key 270 source3/passdb/secrets.c uint8_t *key; key 272 source3/passdb/secrets.c key = (uint8_t *)secrets_fetch(SECRETS_LOCAL_SCHANNEL_KEY, &size); key 273 source3/passdb/secrets.c if (key == NULL) { key 278 source3/passdb/secrets.c SAFE_FREE(key); key 282 source3/passdb/secrets.c memcpy(schannel_key, key, 16); key 283 source3/passdb/secrets.c SAFE_FREE(key); key 864 source3/passdb/secrets.c char *key = NULL; key 867 source3/passdb/secrets.c if (asprintf(&key, "%s/%s", SECRETS_LDAP_BIND_PW, dn) < 0) { key 872 source3/passdb/secrets.c ret = secrets_store(key, pw, strlen(pw)+1); key 874 source3/passdb/secrets.c SAFE_FREE(key); key 884 source3/passdb/secrets.c char *key = NULL; key 889 source3/passdb/secrets.c if (asprintf(&key, "%s/%s", SECRETS_LDAP_BIND_PW, *dn) < 0) { key 894 source3/passdb/secrets.c *pw=(char *)secrets_fetch(key, &size); key 895 source3/passdb/secrets.c SAFE_FREE(key); key 964 source3/passdb/secrets.c if ((rec->key.dsize < prefix_len) key 965 source3/passdb/secrets.c || (strncmp((char *)rec->key.dptr, SECRETS_DOMTRUST_ACCT_PASS, key 1046 source3/passdb/secrets.c fstring key; key 1054 source3/passdb/secrets.c slprintf(key, sizeof(key)-1, "%s/%s", SECRETS_AFS_KEYFILE, cell); key 1055 source3/passdb/secrets.c return secrets_store(key, keyfile, sizeof(struct afs_keyfile)); key 1063 source3/passdb/secrets.c fstring key; key 1068 source3/passdb/secrets.c slprintf(key, sizeof(key)-1, "%s/%s", SECRETS_AFS_KEYFILE, cell); key 1070 source3/passdb/secrets.c keyfile = (struct afs_keyfile *)secrets_fetch(key, &size); key 1351 source3/passdb/secrets.c bool secrets_store_generic(const char *owner, const char *key, const char *secret) key 1356 source3/passdb/secrets.c if (asprintf(&tdbkey, "SECRETS/GENERIC/%s/%s", owner, key) < 0) { key 1371 source3/passdb/secrets.c char *secrets_fetch_generic(const char *owner, const char *key) key 1376 source3/passdb/secrets.c if (( ! owner) || ( ! key)) { key 1381 source3/passdb/secrets.c if (asprintf(&tdbkey, "SECRETS/GENERIC/%s/%s", owner, key) < 0) { key 228 source3/printing/nt_printing.c TDB_DATA key; key 234 source3/printing/nt_printing.c key = string_term_tdb_data(keystr ? keystr : ""); key 236 source3/printing/nt_printing.c return key; key 248 source3/printing/nt_printing.c TDB_DATA key; key 254 source3/printing/nt_printing.c key = string_term_tdb_data(keystr ? keystr : ""); key 256 source3/printing/nt_printing.c return key; key 329 source3/printing/nt_printing.c static int sec_desc_upg_fn( TDB_CONTEXT *the_tdb, TDB_DATA key, key 345 source3/printing/nt_printing.c if ( strncmp((const char *) key.dptr, SECDESC_PREFIX, strlen(SECDESC_PREFIX) ) != 0 ) { key 355 source3/printing/nt_printing.c (const char *)key.dptr )); key 356 source3/printing/nt_printing.c tdb_delete( tdb_printers, key ); key 406 source3/printing/nt_printing.c DEBUG(0,("sec_desc_upg_fn: Failed to update sec_desc for %s\n", key.dptr )); key 417 source3/printing/nt_printing.c DEBUG(0,("sec_desc_upg_fn: Failed to parse new sec_desc for %s\n", key.dptr )); key 421 source3/printing/nt_printing.c result = tdb_store( tdb_printers, key, data, TDB_REPLACE ); key 456 source3/printing/nt_printing.c static int normalize_printers_fn( TDB_CONTEXT *the_tdb, TDB_DATA key, key 467 source3/printing/nt_printing.c if ( strncmp((const char *) key.dptr, PRINTERS_PREFIX, strlen(PRINTERS_PREFIX) ) == 0 ) { key 468 source3/printing/nt_printing.c new_key = make_printer_tdbkey(ctx, (const char *)key.dptr+strlen(PRINTERS_PREFIX) ); key 470 source3/printing/nt_printing.c else if ( strncmp((const char *) key.dptr, SECDESC_PREFIX, strlen(SECDESC_PREFIX) ) == 0 ) { key 471 source3/printing/nt_printing.c new_key = make_printers_secdesc_tdbkey(ctx, (const char *)key.dptr+strlen(SECDESC_PREFIX) ); key 480 source3/printing/nt_printing.c if ( tdb_delete( the_tdb, key ) != 0 ) { key 482 source3/printing/nt_printing.c key.dptr)); key 488 source3/printing/nt_printing.c key.dptr)); key 662 source3/printing/nt_printing.c static int traverse_counting_printers(TDB_CONTEXT *t, TDB_DATA key, key 667 source3/printing/nt_printing.c if (memcmp(PRINTERS_PREFIX, key.dptr, sizeof(PRINTERS_PREFIX)-1) == 0) { key 669 source3/printing/nt_printing.c DEBUG(10,("traverse_counting_printers: printer = [%s] printer_count = %d\n", key.dptr, *printer_count)); key 810 source3/printing/nt_printing.c char *key = NULL; key 832 source3/printing/nt_printing.c key = talloc_asprintf(ctx, "%s%s", FORMS_PREFIX, (*list)[i].name); key 833 source3/printing/nt_printing.c if (!key) { key 838 source3/printing/nt_printing.c if (tdb_store_bystring(tdb_forms, key, dbuf, TDB_REPLACE) != 0) { key 839 source3/printing/nt_printing.c TALLOC_FREE(key); key 843 source3/printing/nt_printing.c TALLOC_FREE(key); key 902 source3/printing/nt_printing.c char *key = NULL; key 920 source3/printing/nt_printing.c if (asprintf(&key, "%s%s", FORMS_PREFIX, (*list)[n].name) < 0) { key 924 source3/printing/nt_printing.c if (tdb_delete_bystring(tdb_forms, key) != 0) { key 925 source3/printing/nt_printing.c SAFE_FREE(key); key 929 source3/printing/nt_printing.c SAFE_FREE(key); key 967 source3/printing/nt_printing.c char *key = NULL; key 975 source3/printing/nt_printing.c if (asprintf(&key, "%s%s/%d/", DRIVERS_PREFIX, key 984 source3/printing/nt_printing.c if (strncmp((const char *)kbuf.dptr, key, strlen(key)) != 0) key 989 source3/printing/nt_printing.c SAFE_FREE(key); key 993 source3/printing/nt_printing.c fstrcpy((*list)[total], (const char *)kbuf.dptr+strlen(key)); key 997 source3/printing/nt_printing.c SAFE_FREE(key); key 2057 source3/printing/nt_printing.c char *key = NULL; key 2111 source3/printing/nt_printing.c key = talloc_asprintf(ctx, "%s%s/%d/%s", DRIVERS_PREFIX, key 2113 source3/printing/nt_printing.c if (!key) { key 2117 source3/printing/nt_printing.c DEBUG(5,("add_a_printer_driver_3: Adding driver with key %s\n", key )); key 2156 source3/printing/nt_printing.c ret = tdb_store_bystring(tdb_drivers, key, dbuf, TDB_REPLACE); key 2160 source3/printing/nt_printing.c DEBUG(0,("add_a_printer_driver_3: Adding driver with key %s failed.\n", key )); key 2230 source3/printing/nt_printing.c char *key = NULL; key 2246 source3/printing/nt_printing.c if (asprintf(&key, "%s%s/%d/%s", DRIVERS_PREFIX, key 2251 source3/printing/nt_printing.c dbuf = tdb_fetch_bystring(tdb_drivers, key); key 2253 source3/printing/nt_printing.c SAFE_FREE(key); key 2285 source3/printing/nt_printing.c SAFE_FREE(key); key 2888 source3/printing/nt_printing.c int get_printer_subkeys( NT_PRINTER_DATA *data, const char* key, fstring **subkeys ) key 2902 source3/printing/nt_printing.c if ( !key ) key 2907 source3/printing/nt_printing.c if ( strlen(key) == 0 ) { key 2929 source3/printing/nt_printing.c if ( StrnCaseCmp(data->keys[i].name, key, strlen(key)) == 0 ) { key 2932 source3/printing/nt_printing.c key_len = strlen( key ); key 3486 source3/printing/nt_printing.c WERROR delete_all_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key ) key 3496 source3/printing/nt_printing.c if ( !key ) key 3501 source3/printing/nt_printing.c if ( !strlen(key) ) { key 3516 source3/printing/nt_printing.c if ( StrnCaseCmp( data->keys[i].name, key, strlen(key)) == 0 ) { key 3573 source3/printing/nt_printing.c WERROR delete_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key, const char *value ) key 3580 source3/printing/nt_printing.c if ( !key || !*key|| !value || !*value ) key 3585 source3/printing/nt_printing.c key_index = lookup_printerkey( p2->data, key ); key 3597 source3/printing/nt_printing.c key, value )); key 3605 source3/printing/nt_printing.c WERROR add_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key, const char *value, key 3613 source3/printing/nt_printing.c if ( !key || !*key|| !value || !*value ) key 3618 source3/printing/nt_printing.c key_index = lookup_printerkey( p2->data, key ); key 3620 source3/printing/nt_printing.c key_index = add_new_printer_key( p2->data, key ); key 3629 source3/printing/nt_printing.c key, value, type, real_len )); key 3637 source3/printing/nt_printing.c REGISTRY_VALUE* get_printer_data( NT_PRINTER_INFO_LEVEL_2 *p2, const char *key, const char *value ) key 3641 source3/printing/nt_printing.c if ( (key_index = lookup_printerkey( p2->data, key )) == -1 ) key 3645 source3/printing/nt_printing.c key, value )); key 4248 source3/printing/nt_printing.c char *key = NULL; key 4264 source3/printing/nt_printing.c if (asprintf(&key, "%s%s", DRIVER_INIT_PREFIX, key 4269 source3/printing/nt_printing.c dbuf = tdb_fetch_bystring(tdb_drivers, key); key 4276 source3/printing/nt_printing.c SAFE_FREE(key); key 4280 source3/printing/nt_printing.c SAFE_FREE(key); key 4362 source3/printing/nt_printing.c char *key; key 4370 source3/printing/nt_printing.c if (asprintf(&key, "%s%s", DRIVER_INIT_PREFIX, drivername) < 0) { key 4377 source3/printing/nt_printing.c ret = (tdb_delete_bystring(tdb_drivers, key) == 0); key 4378 source3/printing/nt_printing.c SAFE_FREE(key); key 4392 source3/printing/nt_printing.c char *key = NULL; key 4423 source3/printing/nt_printing.c SAFE_FREE(key); key 4424 source3/printing/nt_printing.c if (asprintf(&key, "%s%s", DRIVER_INIT_PREFIX, info->drivername) < 0) { key 4432 source3/printing/nt_printing.c ret = tdb_store_bystring(tdb_drivers, key, dbuf, TDB_REPLACE); key 5232 source3/printing/nt_printing.c char *key = NULL; key 5243 source3/printing/nt_printing.c if (asprintf(&key, "%s%s/%d/%s", DRIVERS_PREFIX, key 5249 source3/printing/nt_printing.c key, delete_files ? "TRUE" : "FALSE" )); key 5256 source3/printing/nt_printing.c dbuf = tdb_fetch_bystring( tdb_drivers, key ); key 5258 source3/printing/nt_printing.c DEBUG(8,("delete_printer_driver: Driver unknown [%s]\n", key)); key 5259 source3/printing/nt_printing.c SAFE_FREE(key); key 5267 source3/printing/nt_printing.c if (tdb_delete_bystring(tdb_drivers, key) == -1) { key 5268 source3/printing/nt_printing.c DEBUG (0,("delete_printer_driver: fail to delete %s!\n", key)); key 5269 source3/printing/nt_printing.c SAFE_FREE(key); key 5282 source3/printing/nt_printing.c DEBUG(5,("delete_printer_driver: driver delete successful [%s]\n", key)); key 5283 source3/printing/nt_printing.c SAFE_FREE(key); key 60 source3/printing/printing.c TDB_DATA data, key; key 76 source3/printing/printing.c key.dptr = (uint8 *)&jinfo; key 77 source3/printing/printing.c key.dsize = sizeof(jinfo); key 79 source3/printing/printing.c data = tdb_fetch(rap_tdb, key); key 95 source3/printing/printing.c tdb_store(rap_tdb, key, data, TDB_REPLACE); key 96 source3/printing/printing.c tdb_store(rap_tdb, data, key, TDB_REPLACE); key 105 source3/printing/printing.c TDB_DATA data, key; key 114 source3/printing/printing.c key.dptr = buf; key 115 source3/printing/printing.c key.dsize = sizeof(rap_jobid); key 116 source3/printing/printing.c data = tdb_fetch(rap_tdb, key); key 138 source3/printing/printing.c TDB_DATA key, data; key 151 source3/printing/printing.c key.dptr = (uint8 *)&jinfo; key 152 source3/printing/printing.c key.dsize = sizeof(jinfo); key 154 source3/printing/printing.c data = tdb_fetch(rap_tdb, key); key 170 source3/printing/printing.c tdb_delete(rap_tdb, key); key 381 source3/printing/printing.c static int unixjob_traverse_fn(TDB_CONTEXT *the_tdb, TDB_DATA key, key 392 source3/printing/printing.c if (key.dsize != sizeof(uint32)) key 396 source3/printing/printing.c uint32 jobid = IVAL(key.dptr,0); key 717 source3/printing/printing.c static int traverse_fn_delete(TDB_CONTEXT *t, TDB_DATA key, TDB_DATA data, void *state) key 724 source3/printing/printing.c if ( key.dsize != sizeof(jobid) ) key 727 source3/printing/printing.c jobid = IVAL(key.dptr, 0); key 852 source3/printing/printing.c fstring key; key 857 source3/printing/printing.c slprintf(key, sizeof(key)-1, "CACHE/%s", sharename); key 858 source3/printing/printing.c tdb_store_int32(pdb->tdb, key, -1); key 869 source3/printing/printing.c TDB_DATA data, key; key 876 source3/printing/printing.c key = string_tdb_data(keystr); key 878 source3/printing/printing.c data = tdb_fetch(pdb->tdb, key); key 902 source3/printing/printing.c TDB_DATA key; key 913 source3/printing/printing.c key = string_tdb_data(keystr); key 920 source3/printing/printing.c tdb_delete(pdb->tdb, key); key 929 source3/printing/printing.c tdb_store(pdb->tdb, key, data, TDB_REPLACE); key 1054 source3/printing/printing.c fstring key; key 1062 source3/printing/printing.c snprintf(key, sizeof(key), "CACHE/%s", sharename); key 1063 source3/printing/printing.c last_qscan_time = (time_t)tdb_fetch_int32(pdb->tdb, key); key 1092 source3/printing/printing.c snprintf(key, sizeof(key), "MSG_PENDING/%s", sharename); key 1095 source3/printing/printing.c && tdb_fetch_uint32( pdb->tdb, key, &u ) key 1127 source3/printing/printing.c TDB_DATA data, key; key 1240 source3/printing/printing.c key = string_tdb_data(keystr); key 1245 source3/printing/printing.c tdb_store(pdb->tdb, key, data, TDB_REPLACE); key 1485 source3/printing/printing.c fstring key; key 1589 source3/printing/printing.c snprintf(key, sizeof(key), "MSG_PENDING/%s", sharename); key 1591 source3/printing/printing.c if ( !tdb_store_uint32( pdb->tdb, key, time(NULL) ) ) { key 1888 source3/printing/printing.c TDB_DATA data, key; key 1899 source3/printing/printing.c key = string_tdb_data("INFO/jobs_changed"); key 1901 source3/printing/printing.c if (tdb_chainlock_with_timeout(pdb->tdb, key, 5) == -1) key 1906 source3/printing/printing.c data = tdb_fetch(pdb->tdb, key); key 1920 source3/printing/printing.c if (tdb_store(pdb->tdb, key, data, TDB_REPLACE) == -1) key 1930 source3/printing/printing.c tdb_chainunlock(pdb->tdb, key); key 2749 source3/printing/printing.c TDB_DATA data, key; key 2777 source3/printing/printing.c key = string_tdb_data(keystr); key 2779 source3/printing/printing.c data = tdb_fetch(pdb->tdb, key); key 76 source3/registry/reg_api.c static WERROR fill_value_cache(struct registry_key *key) key 78 source3/registry/reg_api.c if (key->values != NULL) { key 79 source3/registry/reg_api.c if (!reg_values_need_update(key->key, key->values)) { key 84 source3/registry/reg_api.c if (!(key->values = TALLOC_ZERO_P(key, REGVAL_CTR))) { key 87 source3/registry/reg_api.c if (fetch_reg_values(key->key, key->values) == -1) { key 88 source3/registry/reg_api.c TALLOC_FREE(key->values); key 95 source3/registry/reg_api.c static WERROR fill_subkey_cache(struct registry_key *key) key 99 source3/registry/reg_api.c if (key->subkeys != NULL) { key 100 source3/registry/reg_api.c if (!reg_subkeys_need_update(key->key, key->subkeys)) { key 105 source3/registry/reg_api.c werr = regsubkey_ctr_init(key, &(key->subkeys)); key 108 source3/registry/reg_api.c if (fetch_reg_keys(key->key, key->subkeys) == -1) { key 109 source3/registry/reg_api.c TALLOC_FREE(key->subkeys); key 116 source3/registry/reg_api.c static int regkey_destructor(REGISTRY_KEY *key) key 130 source3/registry/reg_api.c REGISTRY_KEY *key; key 139 source3/registry/reg_api.c !(regkey->key = TALLOC_ZERO_P(regkey, REGISTRY_KEY))) { key 148 source3/registry/reg_api.c key = regkey->key; key 149 source3/registry/reg_api.c talloc_set_destructor(key, regkey_destructor); key 153 source3/registry/reg_api.c key->type = REG_KEY_GENERIC; key 163 source3/registry/reg_api.c key->name = talloc_strdup(key, parent->key->name); key 169 source3/registry/reg_api.c key->name = talloc_asprintf(key, "%s%s%s", key 170 source3/registry/reg_api.c parent ? parent->key->name : "", key 175 source3/registry/reg_api.c if (key->name == NULL) { key 182 source3/registry/reg_api.c if( StrnCaseCmp(key->name, KEY_HKPD, strlen(KEY_HKPD)) == 0 ) key 183 source3/registry/reg_api.c key->type = REG_KEY_HKPD; key 187 source3/registry/reg_api.c if ( !(key->ops = reghook_cache_find( key->name )) ) { key 189 source3/registry/reg_api.c "REGISTRY_OPS to [%s]\n", key->name )); key 197 source3/registry/reg_api.c result = regsubkey_ctr_init(key, &subkeys); key 202 source3/registry/reg_api.c if ( fetch_reg_keys( key, subkeys ) == -1 ) { key 209 source3/registry/reg_api.c if ( !regkey_access_check( key, access_desired, &key->access_granted, key 299 source3/registry/reg_api.c WERROR reg_enumkey(TALLOC_CTX *mem_ctx, struct registry_key *key, key 304 source3/registry/reg_api.c if (!(key->key->access_granted & KEY_ENUMERATE_SUB_KEYS)) { key 308 source3/registry/reg_api.c if (!W_ERROR_IS_OK(err = fill_subkey_cache(key))) { key 312 source3/registry/reg_api.c if (idx >= regsubkey_ctr_numkeys(key->subkeys)) { key 317 source3/registry/reg_api.c regsubkey_ctr_specific_key(key->subkeys, idx)))) key 329 source3/registry/reg_api.c WERROR reg_enumvalue(TALLOC_CTX *mem_ctx, struct registry_key *key, key 335 source3/registry/reg_api.c if (!(key->key->access_granted & KEY_QUERY_VALUE)) { key 339 source3/registry/reg_api.c if (!(W_ERROR_IS_OK(err = fill_value_cache(key)))) { key 343 source3/registry/reg_api.c if (idx >= key->values->num_values) { key 348 source3/registry/reg_api.c key->values->values[idx]->type, key 349 source3/registry/reg_api.c key->values->values[idx]->data_p, key 350 source3/registry/reg_api.c key->values->values[idx]->size, key 351 source3/registry/reg_api.c key->values->values[idx]->size); key 358 source3/registry/reg_api.c mem_ctx, key->values->values[idx]->valuename))) { key 367 source3/registry/reg_api.c WERROR reg_queryvalue(TALLOC_CTX *mem_ctx, struct registry_key *key, key 373 source3/registry/reg_api.c if (!(key->key->access_granted & KEY_QUERY_VALUE)) { key 377 source3/registry/reg_api.c if (!(W_ERROR_IS_OK(err = fill_value_cache(key)))) { key 381 source3/registry/reg_api.c for (i=0; i<key->values->num_values; i++) { key 382 source3/registry/reg_api.c if (strequal(key->values->values[i]->valuename, name)) { key 383 source3/registry/reg_api.c return reg_enumvalue(mem_ctx, key, i, NULL, pval); key 390 source3/registry/reg_api.c WERROR reg_queryinfokey(struct registry_key *key, uint32_t *num_subkeys, key 402 source3/registry/reg_api.c if (!(key->key->access_granted & KEY_QUERY_VALUE)) { key 406 source3/registry/reg_api.c if (!W_ERROR_IS_OK(fill_subkey_cache(key)) || key 407 source3/registry/reg_api.c !W_ERROR_IS_OK(fill_value_cache(key))) { key 412 source3/registry/reg_api.c for (i=0; i< regsubkey_ctr_numkeys(key->subkeys); i++) { key 414 source3/registry/reg_api.c strlen(regsubkey_ctr_specific_key(key->subkeys, i))); key 417 source3/registry/reg_api.c *num_subkeys = regsubkey_ctr_numkeys(key->subkeys); key 423 source3/registry/reg_api.c for (i=0; i<key->values->num_values; i++) { key 425 source3/registry/reg_api.c strlen(key->values->values[i]->valuename)); key 426 source3/registry/reg_api.c max_size = MAX(max_size, key->values->values[i]->size); key 429 source3/registry/reg_api.c *num_values = key->values->num_values; key 433 source3/registry/reg_api.c if (!(mem_ctx = talloc_new(key))) { key 437 source3/registry/reg_api.c err = regkey_get_secdesc(mem_ctx, key->key, &secdesc); key 456 source3/registry/reg_api.c struct registry_key *key = parent; key 485 source3/registry/reg_api.c err = reg_createkey(mem_ctx, key, path, key 491 source3/registry/reg_api.c if (key != parent) { key 492 source3/registry/reg_api.c TALLOC_FREE(key); key 495 source3/registry/reg_api.c key = tmp; key 504 source3/registry/reg_api.c err = reg_openkey(ctx, key, path, desired_access, pkey); key 524 source3/registry/reg_api.c err = reg_openkey(mem_ctx, key, "", KEY_CREATE_SUB_KEY, key 537 source3/registry/reg_api.c err = create_reg_subkey(key->key, path); key 558 source3/registry/reg_api.c struct registry_key *tmp_key, *key; key 568 source3/registry/reg_api.c err = reg_openkey(mem_ctx, parent, name, REG_KEY_READ, &key); key 571 source3/registry/reg_api.c err = fill_subkey_cache(key); key 574 source3/registry/reg_api.c if (regsubkey_ctr_numkeys(key->subkeys) > 0) { key 597 source3/registry/reg_api.c err = delete_reg_subkey(parent->key, name); key 604 source3/registry/reg_api.c WERROR reg_setvalue(struct registry_key *key, const char *name, key 611 source3/registry/reg_api.c if (!(key->key->access_granted & KEY_SET_VALUE)) { key 615 source3/registry/reg_api.c if (!W_ERROR_IS_OK(err = fill_value_cache(key))) { key 619 source3/registry/reg_api.c err = registry_push_value(key, val, &value_data); key 624 source3/registry/reg_api.c res = regval_ctr_addvalue(key->values, name, val->type, key 629 source3/registry/reg_api.c TALLOC_FREE(key->values); key 633 source3/registry/reg_api.c if (!store_reg_values(key->key, key->values)) { key 634 source3/registry/reg_api.c TALLOC_FREE(key->values); key 641 source3/registry/reg_api.c static WERROR reg_value_exists(struct registry_key *key, const char *name) key 645 source3/registry/reg_api.c for (i=0; i<key->values->num_values; i++) { key 646 source3/registry/reg_api.c if (strequal(key->values->values[i]->valuename, name)) { key 654 source3/registry/reg_api.c WERROR reg_deletevalue(struct registry_key *key, const char *name) key 658 source3/registry/reg_api.c if (!(key->key->access_granted & KEY_SET_VALUE)) { key 662 source3/registry/reg_api.c if (!W_ERROR_IS_OK(err = fill_value_cache(key))) { key 666 source3/registry/reg_api.c err = reg_value_exists(key, name); key 671 source3/registry/reg_api.c regval_ctr_delvalue(key->values, name); key 673 source3/registry/reg_api.c if (!store_reg_values(key->key, key->values)) { key 674 source3/registry/reg_api.c TALLOC_FREE(key->values); key 681 source3/registry/reg_api.c WERROR reg_getkeysecurity(TALLOC_CTX *mem_ctx, struct registry_key *key, key 684 source3/registry/reg_api.c return regkey_get_secdesc(mem_ctx, key->key, psecdesc); key 687 source3/registry/reg_api.c WERROR reg_setkeysecurity(struct registry_key *key, key 690 source3/registry/reg_api.c return regkey_set_secdesc(key->key, psecdesc); key 709 source3/registry/reg_api.c REGF_NK_REC *key) key 746 source3/registry/reg_api.c for (i=0; i<key->num_values; i++) { key 747 source3/registry/reg_api.c regval_ctr_addvalue(values, key->values[i].valuename, key 748 source3/registry/reg_api.c key->values[i].type, key 749 source3/registry/reg_api.c (char*)key->values[i].data, key 750 source3/registry/reg_api.c (key->values[i].data_size & ~VK_DATA_IN_OFFSET)); key 755 source3/registry/reg_api.c key->subkey_index = 0; key 756 source3/registry/reg_api.c while ((subkey = regfio_fetch_subkey( regfile, key ))) { key 781 source3/registry/reg_api.c key->subkey_index = 0; key 782 source3/registry/reg_api.c while ((subkey = regfio_fetch_subkey(regfile, key))) { key 834 source3/registry/reg_api.c WERROR reg_restorekey(struct registry_key *key, const char *fname) key 836 source3/registry/reg_api.c return restore_registry_key(key->key, fname); key 845 source3/registry/reg_api.c REGF_NK_REC *key; key 913 source3/registry/reg_api.c key = regfio_write_key(regfile, keyname, values, subkeys, sec_desc, key 915 source3/registry/reg_api.c if (key == NULL) { key 931 source3/registry/reg_api.c result = reg_write_tree(regfile, subkeypath, key); key 971 source3/registry/reg_api.c WERROR reg_savekey(struct registry_key *key, const char *fname) key 973 source3/registry/reg_api.c return backup_registry_key(key->key, fname); key 980 source3/registry/reg_api.c WERROR reg_deleteallvalues(struct registry_key *key) key 985 source3/registry/reg_api.c if (!(key->key->access_granted & KEY_SET_VALUE)) { key 989 source3/registry/reg_api.c if (!W_ERROR_IS_OK(err = fill_value_cache(key))) { key 993 source3/registry/reg_api.c for (i=0; i<key->values->num_values; i++) { key 994 source3/registry/reg_api.c regval_ctr_delvalue(key->values, key->values->values[i]->valuename); key 997 source3/registry/reg_api.c if (!store_reg_values(key->key, key->values)) { key 998 source3/registry/reg_api.c TALLOC_FREE(key->values); key 1013 source3/registry/reg_api.c struct registry_key *hive, *key; key 1048 source3/registry/reg_api.c err = reg_openkey(mem_ctx, hive, p+1, desired_access, &key); key 1057 source3/registry/reg_api.c *pkey = key; key 1073 source3/registry/reg_api.c struct registry_key *key; key 1084 source3/registry/reg_api.c werr = reg_openkey(mem_ctx, parent, path, REG_KEY_ALL, &key); key 1089 source3/registry/reg_api.c werr = fill_subkey_cache(key); key 1096 source3/registry/reg_api.c for (i = regsubkey_ctr_numkeys(key->subkeys) ; i > 0; i--) { key 1097 source3/registry/reg_api.c subkey_name = regsubkey_ctr_specific_key(key->subkeys, i-1); key 1098 source3/registry/reg_api.c werr = reg_deletekey_recursive_internal(mem_ctx, key, key 1133 source3/registry/reg_api.c "'%s': %s\n", path, parent->key->name, key 36 source3/registry/reg_backend_current_version.c static int current_version_fetch_values(const char *key, REGVAL_CTR *values) key 45 source3/registry/reg_backend_current_version.c path = talloc_strdup(ctx, key); key 55 source3/registry/reg_backend_current_version.c return regdb_ops.fetch_values(key, values); key 72 source3/registry/reg_backend_current_version.c static int current_version_fetch_subkeys(const char *key, key 75 source3/registry/reg_backend_current_version.c return regdb_ops.fetch_subkeys(key, subkey_ctr); key 30 source3/registry/reg_backend_db.c static bool regdb_key_exists(const char *key); key 31 source3/registry/reg_backend_db.c static bool regdb_key_is_base_key(const char *key); key 603 source3/registry/reg_backend_db.c static bool regdb_store_keys_internal(const char *key, struct regsubkey_ctr *ctr) key 615 source3/registry/reg_backend_db.c if (!key) { key 619 source3/registry/reg_backend_db.c keyname = talloc_strdup(ctx, key); key 704 source3/registry/reg_backend_db.c bool regdb_store_keys(const char *key, struct regsubkey_ctr *ctr) key 713 source3/registry/reg_backend_db.c if (!regdb_key_is_base_key(key) && !regdb_key_exists(key)) { key 728 source3/registry/reg_backend_db.c regdb_fetch_keys(key, old_subkeys); key 770 source3/registry/reg_backend_db.c regdb_fetch_keys(key, old_subkeys); key 807 source3/registry/reg_backend_db.c path = talloc_asprintf(ctx, "%s/%s", key, oldkeyname); key 822 source3/registry/reg_backend_db.c if (!regdb_store_keys_internal(key, ctr) ) { key 824 source3/registry/reg_backend_db.c "for parent [%s]\n", key)); key 839 source3/registry/reg_backend_db.c if (!regdb_store_keys_internal(key, subkeys)) { key 841 source3/registry/reg_backend_db.c "new record for key [%s]\n", key)); key 850 source3/registry/reg_backend_db.c key, key 893 source3/registry/reg_backend_db.c static WERROR regdb_create_subkey(const char *key, const char *subkey) key 899 source3/registry/reg_backend_db.c if (!regdb_key_is_base_key(key) && !regdb_key_exists(key)) { key 907 source3/registry/reg_backend_db.c if (regdb_fetch_keys(key, subkeys) < 0) { key 925 source3/registry/reg_backend_db.c if (regdb_fetch_keys(key, subkeys) < 0) { key 933 source3/registry/reg_backend_db.c if (!regdb_store_keys_internal(key, subkeys)) { key 935 source3/registry/reg_backend_db.c "parent key %s\n", key)); key 960 source3/registry/reg_backend_db.c static WERROR regdb_delete_subkey(const char *key, const char *subkey) key 967 source3/registry/reg_backend_db.c if (!regdb_key_is_base_key(key) && !regdb_key_exists(key)) { key 972 source3/registry/reg_backend_db.c path = talloc_asprintf(mem_ctx, "%s/%s", key, subkey); key 992 source3/registry/reg_backend_db.c if (regdb_fetch_keys(key, subkeys) < 0) { key 1000 source3/registry/reg_backend_db.c if (!regdb_store_keys_internal(key, subkeys)) { key 1002 source3/registry/reg_backend_db.c "parent key %s\n", key)); key 1027 source3/registry/reg_backend_db.c static TDB_DATA regdb_fetch_key_internal(TALLOC_CTX *mem_ctx, const char *key) key 1032 source3/registry/reg_backend_db.c path = normalize_reg_path(mem_ctx, key); key 1048 source3/registry/reg_backend_db.c static bool regdb_key_is_base_key(const char *key) key 1054 source3/registry/reg_backend_db.c if (key == NULL) { key 1058 source3/registry/reg_backend_db.c path = normalize_reg_path(mem_ctx, key); key 1103 source3/registry/reg_backend_db.c static bool create_sorted_subkeys(const char *key, const char *sorted_keyname) key 1127 source3/registry/reg_backend_db.c res = regdb_fetch_keys(key, ctr); key 1207 source3/registry/reg_backend_db.c static int parent_subkey_scanner(TDB_DATA key, TDB_DATA data, key 1247 source3/registry/reg_backend_db.c char *key = NULL; key 1259 source3/registry/reg_backend_db.c key = talloc_asprintf(talloc_tos(), "%s/%s", key 1261 source3/registry/reg_backend_db.c if (key == NULL) { key 1271 source3/registry/reg_backend_db.c res = regdb->parse_record(regdb, string_term_tdb_data(key), key 1277 source3/registry/reg_backend_db.c if (!create_sorted_subkeys(path, key)) { key 1280 source3/registry/reg_backend_db.c res = regdb->parse_record(regdb, string_term_tdb_data(key), key 1301 source3/registry/reg_backend_db.c static bool regdb_key_exists(const char *key) key 1308 source3/registry/reg_backend_db.c if (key == NULL) { key 1312 source3/registry/reg_backend_db.c path = normalize_reg_path(mem_ctx, key); key 1343 source3/registry/reg_backend_db.c int regdb_fetch_keys(const char *key, struct regsubkey_ctr *ctr) key 1355 source3/registry/reg_backend_db.c DEBUG(11,("regdb_fetch_keys: Enter key => [%s]\n", key ? key : "NULL")); key 1357 source3/registry/reg_backend_db.c if (!regdb_key_exists(key)) { key 1366 source3/registry/reg_backend_db.c value = regdb_fetch_key_internal(frame, key); key 1370 source3/registry/reg_backend_db.c key)); key 1481 source3/registry/reg_backend_db.c int regdb_fetch_values( const char* key, REGVAL_CTR *values ) key 1488 source3/registry/reg_backend_db.c DEBUG(10,("regdb_fetch_values: Looking for value of key [%s] \n", key)); key 1490 source3/registry/reg_backend_db.c if (!regdb_key_exists(key)) { key 1494 source3/registry/reg_backend_db.c keystr = talloc_asprintf(ctx, "%s/%s", REG_VALUE_PREFIX, key); key 1516 source3/registry/reg_backend_db.c bool regdb_store_values( const char *key, REGVAL_CTR *values ) key 1525 source3/registry/reg_backend_db.c DEBUG(10,("regdb_store_values: Looking for value of key [%s] \n", key)); key 1527 source3/registry/reg_backend_db.c if (!regdb_key_exists(key)) { key 1546 source3/registry/reg_backend_db.c keystr = talloc_asprintf(ctx, "%s/%s", REG_VALUE_PREFIX, key ); key 1574 source3/registry/reg_backend_db.c static WERROR regdb_get_secdesc(TALLOC_CTX *mem_ctx, const char *key, key 1583 source3/registry/reg_backend_db.c DEBUG(10, ("regdb_get_secdesc: Getting secdesc of key [%s]\n", key)); key 1585 source3/registry/reg_backend_db.c if (!regdb_key_exists(key)) { key 1590 source3/registry/reg_backend_db.c tdbkey = talloc_asprintf(tmp_ctx, "%s/%s", REG_SECDESC_PREFIX, key); key 1617 source3/registry/reg_backend_db.c static WERROR regdb_set_secdesc(const char *key, key 1625 source3/registry/reg_backend_db.c if (!regdb_key_exists(key)) { key 1630 source3/registry/reg_backend_db.c tdbkey = talloc_asprintf(mem_ctx, "%s/%s", REG_SECDESC_PREFIX, key); key 34 source3/registry/reg_backend_hkpt_params.c static int hkpt_params_fetch_values(const char *key, REGVAL_CTR *regvals) key 61 source3/registry/reg_backend_hkpt_params.c static int hkpt_params_fetch_subkeys(const char *key, key 64 source3/registry/reg_backend_hkpt_params.c return regdb_ops.fetch_subkeys(key, subkey_ctr); key 34 source3/registry/reg_backend_netlogon_params.c static int netlogon_params_fetch_values(const char *key, REGVAL_CTR *regvals) key 48 source3/registry/reg_backend_netlogon_params.c static int netlogon_params_fetch_subkeys(const char *key, key 51 source3/registry/reg_backend_netlogon_params.c return regdb_ops.fetch_subkeys(key, subkey_ctr); key 74 source3/registry/reg_backend_perflib.c static int perflib_fetch_values(const char *key, REGVAL_CTR *regvals) key 79 source3/registry/reg_backend_perflib.c path = talloc_strdup(ctx, key); key 97 source3/registry/reg_backend_perflib.c static int perflib_fetch_subkeys(const char *key, key 100 source3/registry/reg_backend_perflib.c return regdb_ops.fetch_subkeys(key, subkey_ctr); key 80 source3/registry/reg_backend_printing.c static int key_forms_fetch_keys(const char *key, struct regsubkey_ctr *subkeys) key 82 source3/registry/reg_backend_printing.c char *p = reg_remaining_path(talloc_tos(), key + strlen(KEY_FORMS)); key 96 source3/registry/reg_backend_printing.c static int key_forms_fetch_values( const char *key, REGVAL_CTR *values ) key 103 source3/registry/reg_backend_printing.c DEBUG(10,("print_values_forms: key=>[%s]\n", key ? key : "NULL" )); key 169 source3/registry/reg_backend_printing.c static char *strip_printers_prefix(const char *key) key 175 source3/registry/reg_backend_printing.c path = talloc_strdup(ctx, key); key 187 source3/registry/reg_backend_printing.c subkeypath = reg_remaining_path(ctx, key + strlen(KEY_WINNT_PRINTERS)); key 189 source3/registry/reg_backend_printing.c subkeypath = reg_remaining_path(ctx, key + strlen(KEY_CONTROL_PRINTERS)); key 199 source3/registry/reg_backend_printing.c static int key_printers_fetch_keys( const char *key, struct regsubkey_ctr *subkeys ) key 211 source3/registry/reg_backend_printing.c DEBUG(10,("key_printers_fetch_keys: key=>[%s]\n", key ? key : "NULL" )); key 213 source3/registry/reg_backend_printing.c printers_key = strip_printers_prefix( key ); key 313 source3/registry/reg_backend_printing.c static bool key_printers_store_keys( const char *key, struct regsubkey_ctr *subkeys ) key 322 source3/registry/reg_backend_printing.c printers_key = strip_printers_prefix( key ); key 478 source3/registry/reg_backend_printing.c static int key_printers_fetch_values( const char *key, REGVAL_CTR *values ) key 487 source3/registry/reg_backend_printing.c printers_key = strip_printers_prefix( key ); key 674 source3/registry/reg_backend_printing.c static bool key_printers_store_values( const char *key, REGVAL_CTR *values ) key 681 source3/registry/reg_backend_printing.c printers_key = strip_printers_prefix( key ); key 739 source3/registry/reg_backend_printing.c static int key_driver_fetch_keys( const char *key, struct regsubkey_ctr *subkeys ) key 758 source3/registry/reg_backend_printing.c DEBUG(10,("key_driver_fetch_keys key=>[%s]\n", key ? key : "NULL" )); key 760 source3/registry/reg_backend_printing.c keystr = reg_remaining_path(ctx, key + strlen(KEY_ENVIRONMENTS) ); key 882 source3/registry/reg_backend_printing.c key, subkeypath )); key 970 source3/registry/reg_backend_printing.c static int driver_arch_fetch_values( char *key, REGVAL_CTR *values ) key 979 source3/registry/reg_backend_printing.c if (!reg_split_path( key, &base, &subkeypath )) { key 1057 source3/registry/reg_backend_printing.c static int key_driver_fetch_values( const char *key, REGVAL_CTR *values ) key 1063 source3/registry/reg_backend_printing.c DEBUG(8,("key_driver_fetch_values: Enter key => [%s]\n", key ? key : "NULL")); key 1067 source3/registry/reg_backend_printing.c if (!(keystr = reg_remaining_path(ctx, key + strlen(KEY_ENVIRONMENTS)))) key 1086 source3/registry/reg_backend_printing.c static int key_print_fetch_keys( const char *key, struct regsubkey_ctr *subkeys ) key 1088 source3/registry/reg_backend_printing.c int key_len = strlen(key); key 1164 source3/registry/reg_backend_printing.c static int match_registry_path(const char *key) key 1170 source3/registry/reg_backend_printing.c if ( !key ) key 1173 source3/registry/reg_backend_printing.c path = talloc_strdup(ctx, key); key 1193 source3/registry/reg_backend_printing.c static int regprint_fetch_reg_keys( const char *key, struct regsubkey_ctr *subkeys ) key 1195 source3/registry/reg_backend_printing.c int i = match_registry_path( key ); key 1203 source3/registry/reg_backend_printing.c return print_registry[i].fetch_subkeys( key, subkeys ); key 1209 source3/registry/reg_backend_printing.c static bool regprint_store_reg_keys( const char *key, struct regsubkey_ctr *subkeys ) key 1211 source3/registry/reg_backend_printing.c int i = match_registry_path( key ); key 1219 source3/registry/reg_backend_printing.c return print_registry[i].store_subkeys( key, subkeys ); key 1225 source3/registry/reg_backend_printing.c static int regprint_fetch_reg_values( const char *key, REGVAL_CTR *values ) key 1227 source3/registry/reg_backend_printing.c int i = match_registry_path( key ); key 1238 source3/registry/reg_backend_printing.c return print_registry[i].fetch_values( key, values ); key 1244 source3/registry/reg_backend_printing.c static bool regprint_store_reg_values( const char *key, REGVAL_CTR *values ) key 1246 source3/registry/reg_backend_printing.c int i = match_registry_path( key ); key 1254 source3/registry/reg_backend_printing.c return print_registry[i].store_values( key, values ); key 34 source3/registry/reg_backend_prod_options.c static int prod_options_fetch_values(const char *key, REGVAL_CTR *regvals) key 61 source3/registry/reg_backend_prod_options.c static int prod_options_fetch_subkeys(const char *key, key 64 source3/registry/reg_backend_prod_options.c return regdb_ops.fetch_subkeys(key, subkey_ctr); key 69 source3/registry/reg_backend_shares.c static int shares_subkey_info( const char *key, struct regsubkey_ctr *subkey_ctr ) key 75 source3/registry/reg_backend_shares.c DEBUG(10,("printing_subkey_info: key=>[%s]\n", key)); key 77 source3/registry/reg_backend_shares.c path = trim_reg_path( key ); key 103 source3/registry/reg_backend_shares.c static int shares_value_info( const char *key, REGVAL_CTR *val ) key 109 source3/registry/reg_backend_shares.c DEBUG(10,("printing_value_info: key=>[%s]\n", key)); key 111 source3/registry/reg_backend_shares.c path = trim_reg_path( key ); key 137 source3/registry/reg_backend_shares.c static bool shares_store_subkey( const char *key, struct regsubkey_ctr *subkeys ) key 148 source3/registry/reg_backend_shares.c static bool shares_store_value( const char *key, REGVAL_CTR *val ) key 28 source3/registry/reg_backend_smbconf.c static int smbconf_fetch_keys( const char *key, struct regsubkey_ctr *subkey_ctr ) key 30 source3/registry/reg_backend_smbconf.c return regdb_ops.fetch_subkeys(key, subkey_ctr); key 33 source3/registry/reg_backend_smbconf.c static bool smbconf_store_keys( const char *key, struct regsubkey_ctr *subkeys ) key 35 source3/registry/reg_backend_smbconf.c return regdb_ops.store_subkeys(key, subkeys); key 38 source3/registry/reg_backend_smbconf.c static WERROR smbconf_create_subkey(const char *key, const char *subkey) key 40 source3/registry/reg_backend_smbconf.c return regdb_ops.create_subkey(key, subkey); key 43 source3/registry/reg_backend_smbconf.c static WERROR smbconf_delete_subkey(const char *key, const char *subkey) key 45 source3/registry/reg_backend_smbconf.c return regdb_ops.delete_subkey(key, subkey); key 48 source3/registry/reg_backend_smbconf.c static int smbconf_fetch_values( const char *key, REGVAL_CTR *val ) key 50 source3/registry/reg_backend_smbconf.c return regdb_ops.fetch_values(key, val); key 53 source3/registry/reg_backend_smbconf.c static bool smbconf_store_values( const char *key, REGVAL_CTR *val ) key 55 source3/registry/reg_backend_smbconf.c return regdb_ops.store_values(key, val); key 70 source3/registry/reg_backend_smbconf.c static WERROR smbconf_get_secdesc(TALLOC_CTX *mem_ctx, const char *key, key 73 source3/registry/reg_backend_smbconf.c return regdb_ops.get_secdesc(mem_ctx, key, psecdesc); key 76 source3/registry/reg_backend_smbconf.c static WERROR smbconf_set_secdesc(const char *key, key 79 source3/registry/reg_backend_smbconf.c return regdb_ops.set_secdesc(key, secdesc); key 34 source3/registry/reg_backend_tcpip_params.c static int tcpip_params_fetch_values(const char *key, REGVAL_CTR *regvals) key 58 source3/registry/reg_backend_tcpip_params.c static int tcpip_params_fetch_subkeys(const char *key, key 61 source3/registry/reg_backend_tcpip_params.c return regdb_ops.fetch_subkeys(key, subkey_ctr); key 85 source3/registry/reg_cachehook.c char *key = NULL; key 91 source3/registry/reg_cachehook.c werr = keyname_to_path(talloc_tos(), keyname, &key); key 97 source3/registry/reg_cachehook.c (void *)ops, key)); key 99 source3/registry/reg_cachehook.c werr = pathtree_add(cache_tree, key, ops); key 102 source3/registry/reg_cachehook.c TALLOC_FREE(key); key 113 source3/registry/reg_cachehook.c char *key = NULL; key 120 source3/registry/reg_cachehook.c werr = keyname_to_path(talloc_tos(), keyname, &key); key 125 source3/registry/reg_cachehook.c DEBUG(10,("reghook_cache_find: Searching for keyname [%s]\n", key)); key 127 source3/registry/reg_cachehook.c ops = (REGISTRY_OPS *)pathtree_find(cache_tree, key); key 130 source3/registry/reg_cachehook.c ops ? (void *)ops : 0, key)); key 133 source3/registry/reg_cachehook.c TALLOC_FREE(key); key 83 source3/registry/reg_dispatcher.c bool store_reg_keys( REGISTRY_KEY *key, struct regsubkey_ctr *subkeys ) key 85 source3/registry/reg_dispatcher.c if (key->ops && key->ops->store_subkeys) key 86 source3/registry/reg_dispatcher.c return key->ops->store_subkeys(key->name, subkeys); key 95 source3/registry/reg_dispatcher.c bool store_reg_values( REGISTRY_KEY *key, REGVAL_CTR *val ) key 97 source3/registry/reg_dispatcher.c if (key->ops && key->ops->store_values) key 98 source3/registry/reg_dispatcher.c return key->ops->store_values(key->name, val); key 103 source3/registry/reg_dispatcher.c WERROR create_reg_subkey(REGISTRY_KEY *key, const char *subkey) key 105 source3/registry/reg_dispatcher.c if (key->ops && key->ops->create_subkey) { key 106 source3/registry/reg_dispatcher.c return key->ops->create_subkey(key->name, subkey); key 112 source3/registry/reg_dispatcher.c WERROR delete_reg_subkey(REGISTRY_KEY *key, const char *subkey) key 114 source3/registry/reg_dispatcher.c if (key->ops && key->ops->delete_subkey) { key 115 source3/registry/reg_dispatcher.c return key->ops->delete_subkey(key->name, subkey); key 126 source3/registry/reg_dispatcher.c int fetch_reg_keys( REGISTRY_KEY *key, struct regsubkey_ctr *subkey_ctr ) key 130 source3/registry/reg_dispatcher.c if (key->ops && key->ops->fetch_subkeys) key 131 source3/registry/reg_dispatcher.c result = key->ops->fetch_subkeys(key->name, subkey_ctr); key 140 source3/registry/reg_dispatcher.c int fetch_reg_values( REGISTRY_KEY *key, REGVAL_CTR *val ) key 144 source3/registry/reg_dispatcher.c DEBUG(10, ("fetch_reg_values called for key '%s' (ops %p)\n", key->name, key 145 source3/registry/reg_dispatcher.c (key->ops) ? (void *)key->ops : NULL)); key 147 source3/registry/reg_dispatcher.c if (key->ops && key->ops->fetch_values) key 148 source3/registry/reg_dispatcher.c result = key->ops->fetch_values(key->name, val); key 158 source3/registry/reg_dispatcher.c bool regkey_access_check( REGISTRY_KEY *key, uint32 requested, uint32 *granted, key 168 source3/registry/reg_dispatcher.c if (key->ops && key->ops->reg_access_check) { key 169 source3/registry/reg_dispatcher.c return key->ops->reg_access_check(key->name, requested, key 173 source3/registry/reg_dispatcher.c err = regkey_get_secdesc(talloc_tos(), key, &sec_desc); key 190 source3/registry/reg_dispatcher.c WERROR regkey_get_secdesc(TALLOC_CTX *mem_ctx, REGISTRY_KEY *key, key 196 source3/registry/reg_dispatcher.c if (key->ops && key->ops->get_secdesc) { key 197 source3/registry/reg_dispatcher.c werr = key->ops->get_secdesc(mem_ctx, key->name, psecdesc); key 212 source3/registry/reg_dispatcher.c WERROR regkey_set_secdesc(REGISTRY_KEY *key, key 215 source3/registry/reg_dispatcher.c if (key->ops && key->ops->set_secdesc) { key 216 source3/registry/reg_dispatcher.c return key->ops->set_secdesc(key->name, psecdesc); key 226 source3/registry/reg_dispatcher.c bool reg_subkeys_need_update(REGISTRY_KEY *key, struct regsubkey_ctr *subkeys) key 228 source3/registry/reg_dispatcher.c if (key->ops && key->ops->subkeys_need_update) key 230 source3/registry/reg_dispatcher.c return key->ops->subkeys_need_update(subkeys); key 240 source3/registry/reg_dispatcher.c bool reg_values_need_update(REGISTRY_KEY *key, REGVAL_CTR *values) key 242 source3/registry/reg_dispatcher.c if (key->ops && key->ops->values_need_update) key 244 source3/registry/reg_dispatcher.c return key->ops->values_need_update(values); key 77 source3/registry/reg_perfcount.c char key[] = "1"; key 101 source3/registry/reg_perfcount.c kbuf = string_tdb_data(key); key 298 source3/registry/reg_perfcount.c static void _reg_perfcount_make_key(TDB_DATA *key, key 310 source3/registry/reg_perfcount.c *key = string_tdb_data(buf); key 350 source3/registry/reg_perfcount.c TDB_DATA key, data; key 353 source3/registry/reg_perfcount.c _reg_perfcount_make_key(&key, buf, PERFCOUNT_MAX_LEN, objInd, "inst"); key 354 source3/registry/reg_perfcount.c data = tdb_fetch(names, key); key 410 source3/registry/reg_perfcount.c bool _reg_perfcount_get_counter_data(TDB_DATA key, TDB_DATA *data) key 423 source3/registry/reg_perfcount.c *data = tdb_fetch(counters, key); key 478 source3/registry/reg_perfcount.c TDB_DATA key, data; key 489 source3/registry/reg_perfcount.c _reg_perfcount_make_key(&key, buf, PERFCOUNT_MAX_LEN, CounterIndex, "type"); key 490 source3/registry/reg_perfcount.c data = tdb_fetch(names, key); key 504 source3/registry/reg_perfcount.c _reg_perfcount_make_key(&key, buf, PERFCOUNT_MAX_LEN, CounterIndex, ""); key 505 source3/registry/reg_perfcount.c _reg_perfcount_get_counter_data(key, &data); key 669 source3/registry/reg_perfcount.c TDB_DATA key, data; key 677 source3/registry/reg_perfcount.c _reg_perfcount_make_key(&key, buf, PERFCOUNT_MAX_LEN, obj->ObjectNameTitleIndex, temp); key 678 source3/registry/reg_perfcount.c if (!_reg_perfcount_get_counter_data(key, &data)) { key 702 source3/registry/reg_perfcount.c _reg_perfcount_make_key(&key, buf, PERFCOUNT_MAX_LEN, obj->ObjectNameTitleIndex, temp); key 703 source3/registry/reg_perfcount.c data = tdb_fetch(names, key); key 789 source3/registry/reg_perfcount.c TDB_DATA key, data; key 794 source3/registry/reg_perfcount.c _reg_perfcount_make_key(&key, keybuf, PERFCOUNT_MAX_LEN, j, "rel"); key 795 source3/registry/reg_perfcount.c data = tdb_fetch(names, key); key 828 source3/registry/reg_perfcount.c TDB_DATA key, data; key 831 source3/registry/reg_perfcount.c _reg_perfcount_make_key(&key, buf, PERFCOUNT_MAX_LEN, key_part1, key_part2); key 833 source3/registry/reg_perfcount.c data = tdb_fetch(tdb, key); key 836 source3/registry/reg_perfcount.c DEBUG(3,("_reg_perfcount_get_64: No data found for key [%s].\n", key.dptr)); key 64 source3/registry/reg_util.c bool reg_split_key(char *path, char **base, char **key) key 68 source3/registry/reg_util.c *key = *base = NULL; key 80 source3/registry/reg_util.c *key = p+1; key 124 source3/registry/reg_util.c void normalize_dbkey(char *key) key 126 source3/registry/reg_util.c size_t len = strlen(key); key 127 source3/registry/reg_util.c string_sub(key, "\\", "/", len+1); key 128 source3/registry/reg_util.c strupper_m(key); key 135 source3/registry/reg_util.c char *reg_remaining_path(TALLOC_CTX *ctx, const char *key) key 140 source3/registry/reg_util.c if (!key || !*key) { key 144 source3/registry/reg_util.c new_path = talloc_strdup(ctx, key); key 36 source3/registry/reg_util_legacy.c struct registry_key *key; key 39 source3/registry/reg_util_legacy.c err = reg_open_path(NULL, path, access_desired, token, &key); key 44 source3/registry/reg_util_legacy.c *regkey = talloc_move(ctx, &key->key); key 45 source3/registry/reg_util_legacy.c TALLOC_FREE(key); key 186 source3/rpc_client/cli_netlogon.c unsigned char key[16]; key 202 source3/rpc_client/cli_netlogon.c memset(key, 0, 16); key 203 source3/rpc_client/cli_netlogon.c memcpy(key, cli->dc->sess_key, 8); key 206 source3/rpc_client/cli_netlogon.c SamOEMhash(lm_owf, key, 16); key 208 source3/rpc_client/cli_netlogon.c SamOEMhash(nt_owf, key, 16); key 410 source3/rpc_client/cli_netlogon.c if (memcmp(zeros, validation.sam3->base.key.key, 16) != 0) { key 411 source3/rpc_client/cli_netlogon.c SamOEMhash(validation.sam3->base.key.key, key 415 source3/rpc_client/cli_netlogon.c if (memcmp(zeros, validation.sam3->base.LMSessKey.key, 8) != 0) { key 416 source3/rpc_client/cli_netlogon.c SamOEMhash(validation.sam3->base.LMSessKey.key, key 527 source3/rpc_client/cli_netlogon.c if (memcmp(zeros, validation.sam3->base.key.key, 16) != 0) { key 528 source3/rpc_client/cli_netlogon.c SamOEMhash(validation.sam3->base.key.key, key 532 source3/rpc_client/cli_netlogon.c if (memcmp(zeros, validation.sam3->base.LMSessKey.key, 8) != 0) { key 533 source3/rpc_client/cli_netlogon.c SamOEMhash(validation.sam3->base.LMSessKey.key, key 45 source3/rpc_client/init_netlogon.c struct netr_UserSessionKey key, key 70 source3/rpc_client/init_netlogon.c r->key = key; key 101 source3/rpc_client/init_netlogon.c struct netr_UserSessionKey key, key 129 source3/rpc_client/init_netlogon.c key, key 257 source3/rpc_client/init_netlogon.c memcpy(user_session_key.key, key 259 source3/rpc_client/init_netlogon.c MIN(sizeof(user_session_key.key), key 262 source3/rpc_client/init_netlogon.c SamOEMhash(user_session_key.key, pipe_session_key, 16); key 266 source3/rpc_client/init_netlogon.c memcpy(lm_session_key.key, key 268 source3/rpc_client/init_netlogon.c MIN(sizeof(lm_session_key.key), key 271 source3/rpc_client/init_netlogon.c SamOEMhash(lm_session_key.key, pipe_session_key, 8); key 289 source3/rpc_server/srv_eventlog_nt.c struct registry_key *key; key 318 source3/rpc_server/srv_eventlog_nt.c &key); key 327 source3/rpc_server/srv_eventlog_nt.c wresult = reg_queryvalue(key, key, "Retention", &value); key 335 source3/rpc_server/srv_eventlog_nt.c wresult = reg_queryvalue(key, key, "MaxSize", &value); key 2333 source3/rpc_server/srv_spoolss_nt.c static WERROR delete_printer_dataex( NT_PRINTER_INFO_LEVEL *printer, const char *key, const char *value ) key 2335 source3/rpc_server/srv_spoolss_nt.c return delete_printer_data( printer->info_2, key, value ); key 2343 source3/rpc_server/srv_spoolss_nt.c const char *key, const char *value, key 2348 source3/rpc_server/srv_spoolss_nt.c return add_printer_data( printer->info_2, key, value, type, data, real_len ); key 59 source3/rpc_server/srv_winreg_nt.c struct registry_key *key; key 63 source3/rpc_server/srv_winreg_nt.c p->server_info->ptok, &key); key 67 source3/rpc_server/srv_winreg_nt.c access_desired, &key); key 74 source3/rpc_server/srv_winreg_nt.c if ( !create_policy_hnd( p, hnd, key ) ) { key 229 source3/rpc_server/srv_winreg_nt.c DEBUG(7,("_reg_info: policy key name = [%s]\n", regkey->key->name)); key 230 source3/rpc_server/srv_winreg_nt.c DEBUG(7,("_reg_info: policy key type = [%08x]\n", regkey->key->type)); key 233 source3/rpc_server/srv_winreg_nt.c if(regkey->key->type == REG_KEY_HKPD) key 376 source3/rpc_server/srv_winreg_nt.c struct registry_key *key = find_regkey_by_hnd( p, r->in.handle ); key 378 source3/rpc_server/srv_winreg_nt.c if ( !key ) key 384 source3/rpc_server/srv_winreg_nt.c DEBUG(8,("_reg_enum_key: enumerating key [%s]\n", key->key->name)); key 386 source3/rpc_server/srv_winreg_nt.c err = reg_enumkey(p->mem_ctx, key, r->in.enum_index, (char **)&r->out.name->name, key 402 source3/rpc_server/srv_winreg_nt.c struct registry_key *key = find_regkey_by_hnd( p, r->in.handle ); key 407 source3/rpc_server/srv_winreg_nt.c if ( !key ) key 414 source3/rpc_server/srv_winreg_nt.c key->key->name)); key 416 source3/rpc_server/srv_winreg_nt.c err = reg_enumvalue(p->mem_ctx, key, r->in.enum_index, &valname, &val); key 670 source3/rpc_server/srv_winreg_nt.c "\"%s\"\n", regkey->key->name, fname)); key 681 source3/rpc_server/srv_winreg_nt.c regkey->key->name, fname, lp_servicename(snum) )); key 704 source3/rpc_server/srv_winreg_nt.c regkey->key->name, fname)); key 710 source3/rpc_server/srv_winreg_nt.c regkey->key->name, fname, lp_servicename(snum) )); key 740 source3/rpc_server/srv_winreg_nt.c "subkey name '%s'\n", parent->key->name, r->in.name.name)); key 761 source3/rpc_server/srv_winreg_nt.c struct registry_key *key = find_regkey_by_hnd(p, r->in.handle); key 765 source3/rpc_server/srv_winreg_nt.c if ( !key ) key 769 source3/rpc_server/srv_winreg_nt.c key->key->name, r->in.name.name)); key 777 source3/rpc_server/srv_winreg_nt.c return reg_setvalue(key, r->in.name.name, val); key 790 source3/rpc_server/srv_winreg_nt.c return reg_deletekey(parent, r->in.key.name); key 799 source3/rpc_server/srv_winreg_nt.c struct registry_key *key = find_regkey_by_hnd(p, r->in.handle); key 801 source3/rpc_server/srv_winreg_nt.c if ( !key ) key 804 source3/rpc_server/srv_winreg_nt.c return reg_deletevalue(key, r->in.value.name); key 812 source3/rpc_server/srv_winreg_nt.c struct registry_key *key = find_regkey_by_hnd(p, r->in.handle); key 818 source3/rpc_server/srv_winreg_nt.c if ( !key ) key 823 source3/rpc_server/srv_winreg_nt.c if ( !(key->key->access_granted & STD_RIGHT_READ_CONTROL_ACCESS) ) key 826 source3/rpc_server/srv_winreg_nt.c err = reg_getkeysecurity(p->mem_ctx, key, &secdesc); key 854 source3/rpc_server/srv_winreg_nt.c struct registry_key *key = find_regkey_by_hnd(p, r->in.handle); key 858 source3/rpc_server/srv_winreg_nt.c if ( !key ) key 863 source3/rpc_server/srv_winreg_nt.c if ( !(key->key->access_granted & STD_RIGHT_WRITE_DAC_ACCESS) ) key 872 source3/rpc_server/srv_winreg_nt.c return reg_setkeysecurity(key, secdesc); key 449 source3/services/services_db.c REGISTRY_KEY *key = NULL; key 454 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, KEY_SERVICES, key 465 source3/services/services_db.c wresult = regsubkey_ctr_init(key, &subkeys); key 468 source3/services/services_db.c TALLOC_FREE( key ); key 472 source3/services/services_db.c fetch_reg_keys( key, subkeys ); key 477 source3/services/services_db.c add_new_svc_name( key, subkeys, builtin_svcs[i].servicename ); key 487 source3/services/services_db.c add_new_svc_name( key, subkeys, service_list[i] ); key 490 source3/services/services_db.c TALLOC_FREE( key ); key 507 source3/services/services_db.c REGISTRY_KEY *key = NULL; key 520 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, key 528 source3/services/services_db.c if ( !(values = TALLOC_ZERO_P( key, REGVAL_CTR )) ) { key 533 source3/services/services_db.c if (fetch_reg_values( key, values ) == -1) { key 558 source3/services/services_db.c TALLOC_FREE(key); key 568 source3/services/services_db.c REGISTRY_KEY *key = NULL; key 581 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, key 591 source3/services/services_db.c if ( !(values = TALLOC_ZERO_P( key, REGVAL_CTR )) ) { key 593 source3/services/services_db.c TALLOC_FREE( key ); key 602 source3/services/services_db.c TALLOC_FREE( key ); key 607 source3/services/services_db.c ret = store_reg_values( key, values ); key 611 source3/services/services_db.c TALLOC_FREE( key); key 622 source3/services/services_db.c REGISTRY_KEY *key = NULL; key 633 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, key 643 source3/services/services_db.c if ( !(values = TALLOC_ZERO_P( key, REGVAL_CTR )) ) { key 645 source3/services/services_db.c TALLOC_FREE( key ); key 649 source3/services/services_db.c fetch_reg_values( key, values ); key 656 source3/services/services_db.c TALLOC_FREE( key ); key 662 source3/services/services_db.c TALLOC_FREE( key ); key 672 source3/services/services_db.c REGISTRY_KEY *key = NULL; key 683 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, key 693 source3/services/services_db.c if ( !(values = TALLOC_ZERO_P( key, REGVAL_CTR )) ) { key 695 source3/services/services_db.c TALLOC_FREE( key ); key 699 source3/services/services_db.c fetch_reg_values( key, values ); key 702 source3/services/services_db.c TALLOC_FREE( key ); key 706 source3/services/services_db.c TALLOC_FREE(key); key 717 source3/services/services_db.c REGISTRY_KEY *key = NULL; key 727 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, key 739 source3/services/services_db.c TALLOC_FREE( key ); key 742 source3/services/services_db.c fetch_reg_values( key, values ); key 744 source3/services/services_db.c TALLOC_FREE( key ); key 176 source3/smbd/dir.c static struct dptr_struct *dptr_get(int key, bool forclose) key 181 source3/smbd/dir.c if(dptr->dnum == key) { key 185 source3/smbd/dir.c DEBUG(4,("dptr_get: Reopening dptr key %d\n",key)); key 205 source3/smbd/dir.c char *dptr_path(int key) key 207 source3/smbd/dir.c struct dptr_struct *dptr = dptr_get(key, False); key 217 source3/smbd/dir.c char *dptr_wcard(int key) key 219 source3/smbd/dir.c struct dptr_struct *dptr = dptr_get(key, False); key 229 source3/smbd/dir.c uint16 dptr_attr(int key) key 231 source3/smbd/dir.c struct dptr_struct *dptr = dptr_get(key, False); key 271 source3/smbd/dir.c void dptr_close(int *key) key 275 source3/smbd/dir.c if(*key == INVALID_DPTR_KEY) key 279 source3/smbd/dir.c if (*key == -1) { key 285 source3/smbd/dir.c *key = INVALID_DPTR_KEY; key 289 source3/smbd/dir.c dptr = dptr_get(*key, True); key 292 source3/smbd/dir.c DEBUG(0,("Invalid key %d given to dptr_close\n", *key)); key 298 source3/smbd/dir.c *key = INVALID_DPTR_KEY; key 717 source3/smbd/dir.c bool dptr_fill(char *buf1,unsigned int key) key 720 source3/smbd/dir.c struct dptr_struct *dptr = dptr_get(key, False); key 723 source3/smbd/dir.c DEBUG(1,("filling null dirptr %d\n",key)); key 727 source3/smbd/dir.c DEBUG(6,("fill on key %u dirptr 0x%lx now at %d\n",key, key 729 source3/smbd/dir.c buf[0] = key; key 740 source3/smbd/dir.c unsigned int key = *(unsigned char *)buf; key 741 source3/smbd/dir.c struct dptr_struct *dptr = dptr_get(key, False); key 746 source3/smbd/dir.c DEBUG(3,("fetched null dirptr %d\n",key)); key 749 source3/smbd/dir.c *num = key; key 758 source3/smbd/dir.c key,dptr_path(key),(int)seekoff)); key 102 source3/smbd/mangle_hash2.c static unsigned int mangle_hash(const char *key, unsigned int length) key 113 source3/smbd/mangle_hash2.c strncpy(str, key, length); key 37 source3/smbd/notify_internal.c TDB_DATA key; key 107 source3/smbd/notify_internal.c notify->key = string_term_tdb_data(NOTIFY_KEY); key 126 source3/smbd/notify_internal.c *rec = notify->db->fetch_locked(notify->db, notify, notify->key); key 156 source3/smbd/notify_internal.c if (notify->db->fetch(notify->db, notify, notify->key, &dbuf) != 0) { key 112 source3/smbd/oplock_irix.c struct file_id key; key 116 source3/smbd/oplock_irix.c ZERO_STRUCT(key); key 118 source3/smbd/oplock_irix.c key.devid = dev; key 119 source3/smbd/oplock_irix.c key.inode = inode; key 121 source3/smbd/oplock_irix.c return key; key 62 source3/smbd/session.c TDB_DATA key, data; key 101 source3/smbd/session.c key = string_term_tdb_data(keystr); key 103 source3/smbd/session.c rec = ctx->fetch_locked(ctx, NULL, key); key 142 source3/smbd/session.c key = string_term_tdb_data(keystr); key 144 source3/smbd/session.c rec = ctx->fetch_locked(ctx, NULL, key); key 222 source3/smbd/session.c TDB_DATA key; key 233 source3/smbd/session.c key = string_term_tdb_data(vuser->session_keystr); key 235 source3/smbd/session.c if (!(rec = ctx->fetch_locked(ctx, NULL, key))) { key 1329 source3/smbd/sesssetup.c const struct connections_key *key, key 369 source3/smbd/statcache.c unsigned int fast_string_hash(TDB_DATA *key) key 373 source3/smbd/statcache.c for (p = (const char *)key->dptr; *p != '\0'; p++) { key 775 source3/smbd/vfs.c struct file_id key; key 795 source3/smbd/vfs.c key = vfs_file_id_from_sbuf(conn, &st); key 798 source3/smbd/vfs.c data_blob_const(&key, sizeof(key)), key 834 source3/smbd/vfs.c key = vfs_file_id_from_sbuf(conn, &st); key 837 source3/smbd/vfs.c data_blob_const(&key, sizeof(key)), key 5538 source3/torture/torture.c static bool rbt_testval(struct db_context *db, const char *key, key 5546 source3/torture/torture.c rec = db->fetch_locked(db, db, string_tdb_data(key)); key 5558 source3/torture/torture.c rec = db->fetch_locked(db, db, string_tdb_data(key)); key 5589 source3/torture/torture.c char *key, *value; key 5591 source3/torture/torture.c if (asprintf(&key, "key%ld", random()) == -1) { key 5595 source3/torture/torture.c SAFE_FREE(key); key 5599 source3/torture/torture.c if (!rbt_testval(db, key, value)) { key 5600 source3/torture/torture.c SAFE_FREE(key); key 5607 source3/torture/torture.c SAFE_FREE(key); key 5611 source3/torture/torture.c if (!rbt_testval(db, key, value)) { key 5612 source3/torture/torture.c SAFE_FREE(key); key 5617 source3/torture/torture.c SAFE_FREE(key); key 142 source3/utils/dbwrap_tool.c int length = rec->key.dsize; key 143 source3/utils/dbwrap_tool.c unsigned char *p = (unsigned char *)rec->key.dptr; key 34 source3/utils/net_idmap.c TDB_DATA key, key 38 source3/utils/net_idmap.c if (strcmp((char *)key.dptr, "USER HWM") == 0) { key 43 source3/utils/net_idmap.c if (strcmp((char *)key.dptr, "GROUP HWM") == 0) { key 48 source3/utils/net_idmap.c if (strncmp((char *)key.dptr, "S-", 2) != 0) key 51 source3/utils/net_idmap.c printf("%s %s\n", data.dptr, key.dptr); key 81 source3/utils/net_registry.c struct registry_key **key) key 88 source3/utils/net_registry.c if ((path == NULL) || (key == NULL)) { key 98 source3/utils/net_registry.c werr = reg_openkey(ctx, hive, subkey_name, desired_access, key); key 122 source3/utils/net_registry.c struct registry_key *key = NULL; key 138 source3/utils/net_registry.c werr = open_key(ctx, argv[0], REG_KEY_READ, &key); key 145 source3/utils/net_registry.c werr = reg_enumkey(ctx, key, count, &subkey_name, &modtime), key 156 source3/utils/net_registry.c werr = reg_enumvalue(ctx, key, count, &valname, &valvalue), key 271 source3/utils/net_registry.c struct registry_key *key = NULL; key 281 source3/utils/net_registry.c werr = open_key(ctx, argv[0], REG_KEY_READ, &key); key 287 source3/utils/net_registry.c werr = reg_queryvalue(ctx, key, argv[1], &value); key 320 source3/utils/net_registry.c struct registry_key *key = NULL; key 351 source3/utils/net_registry.c werr = open_key(ctx, argv[0], REG_KEY_WRITE, &key); key 357 source3/utils/net_registry.c werr = reg_setvalue(key, argv[1], &value); key 375 source3/utils/net_registry.c struct registry_key *key = NULL; key 385 source3/utils/net_registry.c werr = open_key(ctx, argv[0], REG_KEY_WRITE, &key); key 391 source3/utils/net_registry.c werr = reg_deletevalue(key, argv[1]); key 410 source3/utils/net_registry.c struct registry_key *key = NULL; key 434 source3/utils/net_registry.c werr = open_key(ctx, argv[0], access_mask, &key); key 440 source3/utils/net_registry.c werr = reg_getkeysecurity(ctx, key, &secdesc); key 86 source3/utils/net_rpc_registry.c struct winreg_String key; key 88 source3/utils/net_rpc_registry.c ZERO_STRUCT(key); key 90 source3/utils/net_rpc_registry.c if (!reg_hive_key(mem_ctx, name, &hive, &key.name)) { key 100 source3/utils/net_rpc_registry.c status = rpccli_winreg_OpenKey(pipe_hnd, mem_ctx, hive_hnd, key, 0, key 648 source3/utils/net_rpc_registry.c struct winreg_String key, keyclass; key 652 source3/utils/net_rpc_registry.c ZERO_STRUCT(key); key 655 source3/utils/net_rpc_registry.c if (!reg_hive_key(mem_ctx, argv[0], &hive, &key.name)) { key 669 source3/utils/net_rpc_registry.c status = rpccli_winreg_CreateKey(pipe_hnd, mem_ctx, &hive_hnd, key, key 720 source3/utils/net_rpc_registry.c struct winreg_String key; key 723 source3/utils/net_rpc_registry.c ZERO_STRUCT(key); key 725 source3/utils/net_rpc_registry.c if (!reg_hive_key(mem_ctx, argv[0], &hive, &key.name)) { key 736 source3/utils/net_rpc_registry.c status = rpccli_winreg_DeleteKey(pipe_hnd, mem_ctx, &hive_hnd, key, NULL); key 946 source3/utils/net_rpc_registry.c REGF_NK_REC *key; key 950 source3/utils/net_rpc_registry.c while ( (key = regfio_fetch_subkey( file, nk )) ) { key 952 source3/utils/net_rpc_registry.c if (asprintf(®path, "%s\\%s", parent, key->keyname) < 0) { key 956 source3/utils/net_rpc_registry.c dump_values( key ); key 958 source3/utils/net_rpc_registry.c dump_registry_tree( file, key, regpath ); key 972 source3/utils/net_rpc_registry.c REGF_NK_REC *key, *subkey; key 1005 source3/utils/net_rpc_registry.c key = regfio_write_key( outfile, nk->keyname, values, subkeys, nk->sec_desc->sec_desc, parent ); key 1021 source3/utils/net_rpc_registry.c write_registry_tree( infile, subkey, key, outfile, path ); key 103 source3/utils/net_status.c const struct connections_key *key, key 152 source3/utils/net_status.c const struct connections_key *key, key 118 source3/utils/profiles.c REGF_NK_REC *key, *subkey; key 161 source3/utils/profiles.c key = regfio_write_key( outfile, nk->keyname, values, subkeys, new_sd, parent ); key 174 source3/utils/profiles.c if (!copy_registry_tree( infile, subkey, key, outfile, path)) { key 263 source3/utils/smbcontrol.c const struct connections_key *key, key 226 source3/utils/status.c const struct connections_key *key, key 183 source3/web/statuspage.c const struct connections_key *key, key 200 source3/web/statuspage.c const struct connections_key *key, key 225 source3/web/statuspage.c const struct connections_key *key, key 54 source3/winbindd/idmap_hash/idmap_hash.h char **key); key 57 source3/winbindd/idmap_hash/idmap_hash.h const char *key, key 59 source3/winbindd/idmap_hash/mapfile.c static bool mapfile_read_line(fstring key, fstring value) key 88 source3/winbindd/idmap_hash/mapfile.c fstrcpy(key, buffer); key 93 source3/winbindd/idmap_hash/mapfile.c if (!trim_char(key, ' ', ' ')) key 120 source3/winbindd/idmap_hash/mapfile.c NTSTATUS mapfile_lookup_key(TALLOC_CTX *ctx, const char *value, char **key) key 134 source3/winbindd/idmap_hash/mapfile.c *key = talloc_strdup(ctx, r_key); key 135 source3/winbindd/idmap_hash/mapfile.c if (!*key) { key 150 source3/winbindd/idmap_hash/mapfile.c NTSTATUS mapfile_lookup_value(TALLOC_CTX *ctx, const char *key, char **value) key 160 source3/winbindd/idmap_hash/mapfile.c if (strequal(r_key, key)) { key 165 source3/winbindd/idmap_hash/mapfile.c if (!*key) { key 70 source3/winbindd/idmap_tdb.c DEBUG(10,("Converting %s\n", (const char *)rec->key.dptr)); key 72 source3/winbindd/idmap_tdb.c p = strchr((const char *)rec->key.dptr, '/'); key 77 source3/winbindd/idmap_tdb.c fstrcpy(dom_name, (const char *)rec->key.dptr); key 84 source3/winbindd/idmap_tdb.c DEBUG(0,("deleting record %s\n", (const char *)rec->key.dptr )); key 89 source3/winbindd/idmap_tdb.c (const char *)rec->key.dptr, key 127 source3/winbindd/idmap_tdb.c (const char *)rec->key.dptr, key 1138 source3/winbindd/idmap_tdb.c if (strncmp((const char *)rec->key.dptr, "S-", 2) == 0) { key 1154 source3/winbindd/idmap_tdb.c if (!string_to_sid(maps[num_maps].sid, (const char *)rec->key.dptr)) { key 1155 source3/winbindd/idmap_tdb.c DEBUG(10,("INVALID record %s\n", (const char *)rec->key.dptr)); key 1177 source3/winbindd/idmap_tdb.c (const char *)rec->key.dptr, key 393 source3/winbindd/winbindd_cache.c fstring key; key 401 source3/winbindd/winbindd_cache.c fstr_sprintf( key, "SEQNUM/%s", domain->name ); key 403 source3/winbindd/winbindd_cache.c data = tdb_fetch_bystring( wcache->tdb, key ); key 405 source3/winbindd/winbindd_cache.c DEBUG(10,("fetch_cache_seqnum: invalid data size key [%s]\n", key )); key 592 source3/winbindd/winbindd_cache.c TDB_DATA key; key 594 source3/winbindd/winbindd_cache.c key = string_tdb_data(kstr); key 595 source3/winbindd/winbindd_cache.c data = tdb_fetch(wcache->tdb, key); key 672 source3/winbindd/winbindd_cache.c TDB_DATA key; key 678 source3/winbindd/winbindd_cache.c key = string_tdb_data(kstr); key 680 source3/winbindd/winbindd_cache.c tdb_delete(wcache->tdb, key); key 834 source3/winbindd/winbindd_cache.c TDB_DATA key, data; key 844 source3/winbindd/winbindd_cache.c key = string_tdb_data(kstr); key 848 source3/winbindd/winbindd_cache.c tdb_store(wcache->tdb, key, data, TDB_REPLACE); key 2940 source3/winbindd/winbindd_cache.c TDB_DATA key; key 3880 source3/winbindd/winbindd_cache.c TDB_DATA key = { NULL, 0 }; key 3884 source3/winbindd/winbindd_cache.c return key; key 3889 source3/winbindd/winbindd_cache.c return key; key 3891 source3/winbindd/winbindd_cache.c key = string_term_tdb_data(keystr); key 3893 source3/winbindd/winbindd_cache.c return key; key 4024 source3/winbindd/winbindd_cache.c TDB_DATA key = make_tdc_key( lp_workgroup() ); key 4028 source3/winbindd/winbindd_cache.c if ( !key.dptr ) key 4034 source3/winbindd/winbindd_cache.c ret = tdb_delete( wcache->tdb, key ); key 4045 source3/winbindd/winbindd_cache.c ret = tdb_store( wcache->tdb, key, data, 0 ); key 4049 source3/winbindd/winbindd_cache.c SAFE_FREE( key.dptr ); key 4059 source3/winbindd/winbindd_cache.c TDB_DATA key = make_tdc_key( lp_workgroup() ); key 4065 source3/winbindd/winbindd_cache.c if ( !key.dptr ) key 4068 source3/winbindd/winbindd_cache.c data = tdb_fetch( wcache->tdb, key ); key 4070 source3/winbindd/winbindd_cache.c SAFE_FREE( key.dptr ); key 755 source3/winbindd/winbindd_pam.c info3->base.key.key, key 762 source3/winbindd/winbindd_pam.c info3->base.LMSessKey.key, key 92 source4/auth/auth_sam_reply.c ZERO_STRUCT(sam->key); key 93 source4/auth/auth_sam_reply.c if (server_info->user_session_key.length == sizeof(sam->key.key)) { key 94 source4/auth/auth_sam_reply.c memcpy(sam->key.key, server_info->user_session_key.data, sizeof(sam->key.key)); key 98 source4/auth/auth_sam_reply.c if (server_info->lm_session_key.length == sizeof(sam->LMSessKey.key)) { key 99 source4/auth/auth_sam_reply.c memcpy(sam->LMSessKey.key, server_info->lm_session_key.data, key 100 source4/auth/auth_sam_reply.c sizeof(sam->LMSessKey.key)); key 268 source4/auth/auth_sam_reply.c if (all_zero(base->key.key, sizeof(base->key.key))) { key 271 source4/auth/auth_sam_reply.c server_info->user_session_key = data_blob_talloc(server_info, base->key.key, sizeof(base->key.key)); key 275 source4/auth/auth_sam_reply.c if (all_zero(base->LMSessKey.key, sizeof(base->LMSessKey.key))) { key 278 source4/auth/auth_sam_reply.c server_info->lm_session_key = data_blob_talloc(server_info, base->LMSessKey.key, sizeof(base->LMSessKey.key)); key 34 source4/auth/kerberos/clikrb5.c krb5_keyblock *key, key 47 source4/auth/kerberos/clikrb5.c ret = krb5_string_to_key(context, &eblock, key, password, &salt); key 55 source4/auth/kerberos/clikrb5.c krb5_keyblock *key, key 67 source4/auth/kerberos/clikrb5.c salt, key); key 78 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); key 79 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); key 233 source4/dsdb/samdb/ldb_modules/password_hash.c krb5_keyblock key; key 337 source4/dsdb/samdb/ldb_modules/password_hash.c &key); key 346 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.data, key 347 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.length); key 348 source4/dsdb/samdb/ldb_modules/password_hash.c krb5_free_keyblock_contents(io->smb_krb5_context->krb5_context, &key); key 362 source4/dsdb/samdb/ldb_modules/password_hash.c &key); key 371 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.data, key 372 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.length); key 373 source4/dsdb/samdb/ldb_modules/password_hash.c krb5_free_keyblock_contents(io->smb_krb5_context->krb5_context, &key); key 387 source4/dsdb/samdb/ldb_modules/password_hash.c &key); key 396 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.data, key 397 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.length); key 398 source4/dsdb/samdb/ldb_modules/password_hash.c krb5_free_keyblock_contents(io->smb_krb5_context->krb5_context, &key); key 412 source4/dsdb/samdb/ldb_modules/password_hash.c &key); key 421 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.data, key 422 source4/dsdb/samdb/ldb_modules/password_hash.c key.keyvalue.length); key 423 source4/dsdb/samdb/ldb_modules/password_hash.c krb5_free_keyblock_contents(io->smb_krb5_context->krb5_context, &key); key 274 source4/heimdal/kdc/524.c &skey->key, ticket); key 328 source4/heimdal/kdc/524.c ret = krb5_crypto_init(context, &skey->key, 0, &crypto); key 65 source4/heimdal/kdc/digest.c Key *key; key 72 source4/heimdal/kdc/digest.c &key); key 75 source4/heimdal/kdc/digest.c return krb5_crypto_init(context, &key->key, 0, crypto); key 335 source4/heimdal/kdc/digest.c krb5_keyblock *key; key 337 source4/heimdal/kdc/digest.c ret = krb5_auth_con_getremotesubkey(context, ac, &key); key 340 source4/heimdal/kdc/digest.c if (key == NULL) { key 346 source4/heimdal/kdc/digest.c ret = krb5_crypto_init(context, key, 0, &crypto); key 347 source4/heimdal/kdc/digest.c krb5_free_keyblock (context, key); key 789 source4/heimdal/kdc/digest.c Key *key = NULL; key 862 source4/heimdal/kdc/digest.c ETYPE_ARCFOUR_HMAC_MD5, &key); key 871 source4/heimdal/kdc/digest.c ret = heim_ntlm_calculate_ntlm1(key->key.keyvalue.data, key 872 source4/heimdal/kdc/digest.c key->key.keyvalue.length, key 907 source4/heimdal/kdc/digest.c MD4_Update(&hctx, key->key.keyvalue.data, key 908 source4/heimdal/kdc/digest.c key->key.keyvalue.length); key 1110 source4/heimdal/kdc/digest.c Key *key = NULL; key 1177 source4/heimdal/kdc/digest.c ETYPE_ARCFOUR_HMAC_MD5, &key); key 1205 source4/heimdal/kdc/digest.c ret = heim_ntlm_verify_ntlm2(key->key.keyvalue.data, key 1206 source4/heimdal/kdc/digest.c key->key.keyvalue.length, key 1259 source4/heimdal/kdc/digest.c ret = heim_ntlm_calculate_ntlm1(key->key.keyvalue.data, key 1260 source4/heimdal/kdc/digest.c key->key.keyvalue.length, key 1282 source4/heimdal/kdc/digest.c key->key.keyvalue.data, key->key.keyvalue.length); key 1401 source4/heimdal/kdc/digest.c krb5_keyblock *key; key 1403 source4/heimdal/kdc/digest.c ret = krb5_auth_con_getlocalsubkey(context, ac, &key); key 1407 source4/heimdal/kdc/digest.c ret = krb5_crypto_init(context, key, 0, &crypto); key 1408 source4/heimdal/kdc/digest.c krb5_free_keyblock (context, key); key 294 source4/heimdal/kdc/kaserver.c krb5_keyblock *key, key 322 source4/heimdal/kdc/kaserver.c &skey->key, key 368 source4/heimdal/kdc/kaserver.c memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); key 522 source4/heimdal/kdc/kaserver.c DES_cblock key; key 526 source4/heimdal/kdc/kaserver.c memcpy (&key, ckey->key.keyvalue.data, sizeof(key)); key 527 source4/heimdal/kdc/kaserver.c DES_set_key_unchecked (&key, &schedule); key 532 source4/heimdal/kdc/kaserver.c &key, key 535 source4/heimdal/kdc/kaserver.c memset (&key, 0, sizeof(key)); key 574 source4/heimdal/kdc/kaserver.c &ckey->key, reply); key 667 source4/heimdal/kdc/kaserver.c DES_cblock key; key 730 source4/heimdal/kdc/kaserver.c memcpy (&key, kkey->key.keyvalue.data, sizeof(key)); key 737 source4/heimdal/kdc/kaserver.c ret = _krb5_krb_decomp_ticket(context, &aticket, &kkey->key, key 298 source4/heimdal/kdc/kerberos4.c &skey->key, key 316 source4/heimdal/kdc/kerberos4.c &ckey->key, key 419 source4/heimdal/kdc/kerberos4.c address, &tkey->key, &ad); key 566 source4/heimdal/kdc/kerberos4.c &skey->key, key 703 source4/heimdal/kdc/kerberos4.c if((et->key.keytype != ETYPE_DES_CBC_MD5 && key 704 source4/heimdal/kdc/kerberos4.c et->key.keytype != ETYPE_DES_CBC_MD4 && key 705 source4/heimdal/kdc/kerberos4.c et->key.keytype != ETYPE_DES_CBC_CRC) || key 706 source4/heimdal/kdc/kerberos4.c et->key.keyvalue.length != 8) key 708 source4/heimdal/kdc/kerberos4.c krb5_storage_write(sp, et->key.keyvalue.data, 8); key 749 source4/heimdal/kdc/kerberos4.c Key *key = NULL; key 750 source4/heimdal/kdc/kerberos4.c while(hdb_next_enctype2key(context, &principal->entry, etypes[i], &key) == 0) { key 751 source4/heimdal/kdc/kerberos4.c if(key->salt == NULL) { key 753 source4/heimdal/kdc/kerberos4.c v5_key = key; key 754 source4/heimdal/kdc/kerberos4.c } else if(key->salt->type == hdb_pw_salt && key 755 source4/heimdal/kdc/kerberos4.c key->salt->salt.length == 0) { key 757 source4/heimdal/kdc/kerberos4.c v4_key = key; key 758 source4/heimdal/kdc/kerberos4.c } else if(key->salt->type == hdb_afs3_salt) { key 760 source4/heimdal/kdc/kerberos4.c afs_key = key; key 762 source4/heimdal/kdc/kerberos4.c server_key = key; key 790 source4/heimdal/kdc/kerberos4.c if((*ret_key)->key.keyvalue.length == 0) key 110 source4/heimdal/kdc/kerberos5.c is_default_salt_p(const krb5_salt *default_salt, const Key *key) key 112 source4/heimdal/kdc/kerberos5.c if (key->salt == NULL) key 114 source4/heimdal/kdc/kerberos5.c if (default_salt->salttype != key->salt->type) key 116 source4/heimdal/kdc/kerberos5.c if (krb5_data_cmp(&default_salt->saltvalue, &key->salt->salt)) key 139 source4/heimdal/kdc/kerberos5.c Key *key = NULL; key 145 source4/heimdal/kdc/kerberos5.c while (hdb_next_enctype2key(context, &princ->entry, etypes[i], &key) == 0) { key 146 source4/heimdal/kdc/kerberos5.c if (key->key.keyvalue.length == 0) { key 150 source4/heimdal/kdc/kerberos5.c *ret_key = key; key 153 source4/heimdal/kdc/kerberos5.c if (is_default_salt_p(&def_salt, key)) { key 414 source4/heimdal/kdc/kerberos5.c make_etype_info_entry(krb5_context context, ETYPE_INFO_ENTRY *ent, Key *key) key 416 source4/heimdal/kdc/kerberos5.c ent->etype = key->key.keytype; key 417 source4/heimdal/kdc/kerberos5.c if(key->salt){ key 421 source4/heimdal/kdc/kerberos5.c if(key->salt->type == hdb_pw_salt) key 423 source4/heimdal/kdc/kerberos5.c else if(key->salt->type == hdb_afs3_salt) key 427 source4/heimdal/kdc/kerberos5.c key->salt->type); key 437 source4/heimdal/kdc/kerberos5.c *ent->salttype = key->salt->type; key 447 source4/heimdal/kdc/kerberos5.c krb5_copy_data(context, &key->salt->salt, key 485 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) key 488 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { key 509 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) key 512 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0) key 554 source4/heimdal/kdc/kerberos5.c make_etype_info2_entry(ETYPE_INFO2_ENTRY *ent, Key *key) key 556 source4/heimdal/kdc/kerberos5.c ent->etype = key->key.keytype; key 557 source4/heimdal/kdc/kerberos5.c if(key->salt) { key 561 source4/heimdal/kdc/kerberos5.c *ent->salt = malloc(key->salt->salt.length + 1); key 567 source4/heimdal/kdc/kerberos5.c memcpy(*ent->salt, key->salt->salt.data, key->salt->salt.length); key 568 source4/heimdal/kdc/kerberos5.c (*ent->salt)[key->salt->salt.length] = '\0'; key 574 source4/heimdal/kdc/kerberos5.c switch (key->key.keytype) { key 595 source4/heimdal/kdc/kerberos5.c if(key->salt && key->salt->type == hdb_afs3_salt){ key 646 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) key 649 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { key 668 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) key 671 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0) key 1195 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, &pa_key->key, 0, &crypto); key 1212 source4/heimdal/kdc/kerberos5.c pa_key->key.keytype, &str); key 1278 source4/heimdal/kdc/kerberos5.c ret = krb5_enctype_to_string(context,pa_key->key.keytype, &str); key 1503 source4/heimdal/kdc/kerberos5.c ret = krb5_generate_random_keyblock(context, sessionetype, &et.key); key 1571 source4/heimdal/kdc/kerberos5.c copy_EncryptionKey(&et.key, &ek.key); key 1640 source4/heimdal/kdc/kerberos5.c reply_key = &ckey->key; key 1680 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, &et.key, 0, &crypto); key 1730 source4/heimdal/kdc/kerberos5.c &skey->key, /* Server key */ key 1731 source4/heimdal/kdc/kerberos5.c &skey->key, /* FIXME: should be krbtgt key */ key 1765 source4/heimdal/kdc/kerberos5.c &skey->key, client->entry.kvno, key 140 source4/heimdal/kdc/krb5tgs.c Key *key; key 141 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key); key 143 source4/heimdal/kdc/krb5tgs.c ret = krb5_crypto_init(context, &key->key, 0, &crypto); key 230 source4/heimdal/kdc/krb5tgs.c Key *key; key 231 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key); key 233 source4/heimdal/kdc/krb5tgs.c ret = krb5_crypto_init(context, &key->key, 0, &crypto); key 836 source4/heimdal/kdc/krb5tgs.c ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key); key 842 source4/heimdal/kdc/krb5tgs.c ek.key = et.key; key 890 source4/heimdal/kdc/krb5tgs.c if (krb5_enctype_valid(context, et.key.keytype) != 0 key 891 source4/heimdal/kdc/krb5tgs.c && _kdc_is_weak_expection(server->entry.principal, et.key.keytype)) key 893 source4/heimdal/kdc/krb5tgs.c krb5_enctype_enable(context, et.key.keytype); key 909 source4/heimdal/kdc/krb5tgs.c &rep, &et, &ek, et.key.keytype, key 911 source4/heimdal/kdc/krb5tgs.c serverkey, 0, &tgt->key, e_text, reply); key 913 source4/heimdal/kdc/krb5tgs.c krb5_enctype_disable(context, et.key.keytype); key 927 source4/heimdal/kdc/krb5tgs.c memset(et.key.keyvalue.data, 0, et.key.keyvalue.length); key 928 source4/heimdal/kdc/krb5tgs.c free_EncryptionKey(&et.key); key 938 source4/heimdal/kdc/krb5tgs.c krb5_keyblock *key) key 983 source4/heimdal/kdc/krb5tgs.c ret = krb5_crypto_init(context, key, 0, &crypto); key 1160 source4/heimdal/kdc/krb5tgs.c &tkey->key, key 1197 source4/heimdal/kdc/krb5tgs.c ac, b, e_text, &(*ticket)->ticket.key); key 1440 source4/heimdal/kdc/krb5tgs.c ret = krb5_decrypt_ticket(context, t, &uukey->key, &adtkt, 0); key 1575 source4/heimdal/kdc/krb5tgs.c ekey = &adtkt.key; key 1577 source4/heimdal/kdc/krb5tgs.c if (b->etype.val[i] == adtkt.key.keytype) key 1597 source4/heimdal/kdc/krb5tgs.c ekey = &skey->key; key 1642 source4/heimdal/kdc/krb5tgs.c client, server, ekey, &tkey->key, key 1695 source4/heimdal/kdc/krb5tgs.c ret = krb5_crypto_init(context, &tgt->key, 0, &crypto); key 1798 source4/heimdal/kdc/krb5tgs.c ret = krb5_decrypt_ticket(context, t, &clientkey->key, &adtkt, 0); key 64 source4/heimdal/kdc/kx509.c krb5_keyblock *key) key 78 source4/heimdal/kdc/kx509.c key->keyvalue.data, key->keyvalue.length, key 97 source4/heimdal/kdc/kx509.c krb5_keyblock *key, key 105 source4/heimdal/kdc/kx509.c key->keyvalue.data, key->keyvalue.length, key 142 source4/heimdal/kdc/kx509.c const krb5_data *key, key 208 source4/heimdal/kdc/kx509.c spki.subjectPublicKey.data = key->data; key 209 source4/heimdal/kdc/kx509.c spki.subjectPublicKey.length = key->length * 8; key 304 source4/heimdal/kdc/kx509.c krb5_keyblock *key = NULL; key 366 source4/heimdal/kdc/kx509.c ret = krb5_auth_con_getkey(context, ac, &key); key 367 source4/heimdal/kdc/kx509.c if (ret == 0 && key == NULL) key 374 source4/heimdal/kdc/kx509.c ret = verify_req_hash(context, req, key); key 380 source4/heimdal/kdc/kx509.c RSAPublicKey key; key 384 source4/heimdal/kdc/kx509.c &key, &size); key 387 source4/heimdal/kdc/kx509.c free_RSAPublicKey(&key); key 407 source4/heimdal/kdc/kx509.c ret = calculate_reply_hash(context, key, &rep); key 453 source4/heimdal/kdc/kx509.c if (key) key 454 source4/heimdal/kdc/kx509.c krb5_free_keyblock (context, key); key 101 source4/heimdal/kdc/misc.c Key **key) key 112 source4/heimdal/kdc/misc.c ret = hdb_enctype2key(context, &h->entry, p[i], key); key 183 source4/heimdal/kdc/pkinit.c krb5_keyblock key; key 187 source4/heimdal/kdc/pkinit.c memset(&key, 0, sizeof(key)); key 231 source4/heimdal/kdc/pkinit.c if (key.keyvalue.data) key 232 source4/heimdal/kdc/pkinit.c krb5_free_keyblock_contents(context, &key); key 85 source4/heimdal/lib/asn1/hash.h #define hashtabdel(htab,key) _hashtabdel(htab,key,FALSE) key 87 source4/heimdal/lib/asn1/hash.h #define hashtabfree(htab,key) _hashtabdel(htab,key,TRUE) /* Do! */ key 78 source4/heimdal/lib/asn1/symbol.c Symbol key, *s; key 80 source4/heimdal/lib/asn1/symbol.c key.name = name; key 81 source4/heimdal/lib/asn1/symbol.c s = (Symbol *) hashtabsearch(htab, (void *) &key); key 79 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c krb5_keyblock *key; key 86 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c key = ctx->auth_context->local_subkey; key 88 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c key = ctx->auth_context->remote_subkey; key 91 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c key = ctx->auth_context->remote_subkey; key 93 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c key = ctx->auth_context->local_subkey; key 95 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c if (key == NULL) key 96 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c key = ctx->auth_context->keyblock; key 98 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c if (key == NULL) key 101 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c switch (key->keytype) { key 73 source4/heimdal/lib/gssapi/krb5/arcfour.c arcfour_mic_key(krb5_context context, krb5_keyblock *key, key 91 source4/heimdal/lib/gssapi/krb5/arcfour.c if (key->keytype == KEYTYPE_ARCFOUR_56) { key 96 source4/heimdal/lib/gssapi/krb5/arcfour.c L40, 14, 0, key, &cksum_k5); key 100 source4/heimdal/lib/gssapi/krb5/arcfour.c T, 4, 0, key, &cksum_k5); key 118 source4/heimdal/lib/gssapi/krb5/arcfour.c krb5_keyblock *key, unsigned usage, key 142 source4/heimdal/lib/gssapi/krb5/arcfour.c ret = krb5_crypto_init(context, key, 0, &crypto); key 172 source4/heimdal/lib/gssapi/krb5/arcfour.c krb5_keyblock *key) key 206 source4/heimdal/lib/gssapi/krb5/arcfour.c key, KRB5_KU_USAGE_SIGN, key 217 source4/heimdal/lib/gssapi/krb5/arcfour.c ret = arcfour_mic_key(context, key, key 258 source4/heimdal/lib/gssapi/krb5/arcfour.c krb5_keyblock *key, key 287 source4/heimdal/lib/gssapi/krb5/arcfour.c key, KRB5_KU_USAGE_SIGN, key 297 source4/heimdal/lib/gssapi/krb5/arcfour.c ret = arcfour_mic_key(context, key, key 353 source4/heimdal/lib/gssapi/krb5/arcfour.c krb5_keyblock *key) key 430 source4/heimdal/lib/gssapi/krb5/arcfour.c key, KRB5_KU_USAGE_SEAL, key 445 source4/heimdal/lib/gssapi/krb5/arcfour.c Klocal.keytype = key->keytype; key 450 source4/heimdal/lib/gssapi/krb5/arcfour.c Klocaldata[i] = ((u_char *)key->keyvalue.data)[i] ^ 0xF0; key 473 source4/heimdal/lib/gssapi/krb5/arcfour.c ret = arcfour_mic_key(context, key, key 505 source4/heimdal/lib/gssapi/krb5/arcfour.c krb5_keyblock *key) key 573 source4/heimdal/lib/gssapi/krb5/arcfour.c ret = arcfour_mic_key(context, key, key 605 source4/heimdal/lib/gssapi/krb5/arcfour.c Klocal.keytype = key->keytype; key 610 source4/heimdal/lib/gssapi/krb5/arcfour.c Klocaldata[i] = ((u_char *)key->keyvalue.data)[i] ^ 0xF0; key 655 source4/heimdal/lib/gssapi/krb5/arcfour.c key, KRB5_KU_USAGE_SEAL, key 738 source4/heimdal/lib/gssapi/krb5/arcfour.c krb5_keyblock *key) key 743 source4/heimdal/lib/gssapi/krb5/arcfour.c ret = krb5_crypto_init(context, key, 0, &crypto); key 172 source4/heimdal/lib/gssapi/krb5/cfx.c krb5_keyblock *key) key 177 source4/heimdal/lib/gssapi/krb5/cfx.c ret = krb5_crypto_init(context, key, 0, &crypto); key 248 source4/heimdal/lib/gssapi/krb5/cfx.c krb5_keyblock *key) key 260 source4/heimdal/lib/gssapi/krb5/cfx.c ret = krb5_crypto_init(context, key, 0, &crypto); key 474 source4/heimdal/lib/gssapi/krb5/cfx.c krb5_keyblock *key) key 553 source4/heimdal/lib/gssapi/krb5/cfx.c ret = krb5_crypto_init(context, key, 0, &crypto); key 696 source4/heimdal/lib/gssapi/krb5/cfx.c krb5_keyblock *key) key 707 source4/heimdal/lib/gssapi/krb5/cfx.c ret = krb5_crypto_init(context, key, 0, &crypto); key 788 source4/heimdal/lib/gssapi/krb5/cfx.c krb5_keyblock *key) key 854 source4/heimdal/lib/gssapi/krb5/cfx.c ret = krb5_crypto_init(context, key, 0, &crypto); key 46 source4/heimdal/lib/gssapi/krb5/get_mic.c krb5_keyblock *key key 90 source4/heimdal/lib/gssapi/krb5/get_mic.c memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); key 135 source4/heimdal/lib/gssapi/krb5/get_mic.c krb5_keyblock *key key 185 source4/heimdal/lib/gssapi/krb5/get_mic.c kret = krb5_crypto_init(context, key, 0, &crypto); key 228 source4/heimdal/lib/gssapi/krb5/get_mic.c kret = krb5_crypto_init(context, key, key 281 source4/heimdal/lib/gssapi/krb5/get_mic.c krb5_keyblock *key; key 288 source4/heimdal/lib/gssapi/krb5/get_mic.c ret = _gsskrb5i_get_token_key(ctx, context, &key); key 294 source4/heimdal/lib/gssapi/krb5/get_mic.c krb5_enctype_to_keytype (context, key->keytype, &keytype); key 299 source4/heimdal/lib/gssapi/krb5/get_mic.c message_buffer, message_token, key); key 303 source4/heimdal/lib/gssapi/krb5/get_mic.c message_buffer, message_token, key); key 308 source4/heimdal/lib/gssapi/krb5/get_mic.c message_buffer, message_token, key); key 312 source4/heimdal/lib/gssapi/krb5/get_mic.c message_buffer, message_token, key); key 315 source4/heimdal/lib/gssapi/krb5/get_mic.c krb5_free_keyblock (context, key); key 764 source4/heimdal/lib/gssapi/krb5/init_sec_context.c krb5_keyblock *key = NULL; key 768 source4/heimdal/lib/gssapi/krb5/init_sec_context.c &key); key 769 source4/heimdal/lib/gssapi/krb5/init_sec_context.c if (kret == 0 && key != NULL) { key 771 source4/heimdal/lib/gssapi/krb5/init_sec_context.c krb5_free_keyblock (context, key); key 113 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c krb5_keyblock *key = NULL; key 131 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = _gsskrb5i_get_acceptor_subkey(context_handle, context, &key); key 134 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = _gsskrb5i_get_initiator_subkey(context_handle, context, &key); key 137 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = _gsskrb5i_get_token_key(context_handle, context, &key); key 147 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c if (key == NULL) { key 153 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = krb5_store_keyblock(sp, *key); key 154 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c krb5_free_keyblock (context, key); key 276 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c krb5_keyblock *key = NULL; key 317 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = _gsskrb5i_get_token_key(context_handle, context, &key); key 323 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c switch (key->keytype) { key 350 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = krb5_store_keyblock(sp, *key); key 359 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = krb5_store_keyblock(sp, *key); key 363 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c ret = krb5_store_keyblock(sp, *key); key 383 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c if (key) key 384 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c krb5_free_keyblock (context, key); key 53 source4/heimdal/lib/gssapi/krb5/prf.c krb5_keyblock *key = NULL; key 69 source4/heimdal/lib/gssapi/krb5/prf.c _gsskrb5i_get_acceptor_subkey(ctx, context, &key); key 72 source4/heimdal/lib/gssapi/krb5/prf.c _gsskrb5i_get_initiator_subkey(ctx, context, &key); key 80 source4/heimdal/lib/gssapi/krb5/prf.c if (key == NULL) { key 86 source4/heimdal/lib/gssapi/krb5/prf.c ret = krb5_crypto_init(context, key, 0, &crypto); key 87 source4/heimdal/lib/gssapi/krb5/prf.c krb5_free_keyblock (context, key); key 46 source4/heimdal/lib/gssapi/krb5/unwrap.c krb5_keyblock *key key 99 source4/heimdal/lib/gssapi/krb5/unwrap.c memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); key 133 source4/heimdal/lib/gssapi/krb5/unwrap.c memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); key 195 source4/heimdal/lib/gssapi/krb5/unwrap.c krb5_keyblock *key key 249 source4/heimdal/lib/gssapi/krb5/unwrap.c ret = krb5_crypto_init(context, key, key 285 source4/heimdal/lib/gssapi/krb5/unwrap.c ret = krb5_crypto_init(context, key, key 349 source4/heimdal/lib/gssapi/krb5/unwrap.c ret = krb5_crypto_init(context, key, 0, &crypto); key 388 source4/heimdal/lib/gssapi/krb5/unwrap.c krb5_keyblock *key; key 402 source4/heimdal/lib/gssapi/krb5/unwrap.c ret = _gsskrb5i_get_token_key(ctx, context, &key); key 408 source4/heimdal/lib/gssapi/krb5/unwrap.c krb5_enctype_to_keytype (context, key->keytype, &keytype); key 416 source4/heimdal/lib/gssapi/krb5/unwrap.c conf_state, qop_state, key); key 421 source4/heimdal/lib/gssapi/krb5/unwrap.c conf_state, qop_state, key); key 427 source4/heimdal/lib/gssapi/krb5/unwrap.c conf_state, qop_state, key); key 432 source4/heimdal/lib/gssapi/krb5/unwrap.c conf_state, qop_state, key); key 435 source4/heimdal/lib/gssapi/krb5/unwrap.c krb5_free_keyblock (context, key); key 46 source4/heimdal/lib/gssapi/krb5/verify_mic.c krb5_keyblock *key, key 84 source4/heimdal/lib/gssapi/krb5/verify_mic.c memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); key 139 source4/heimdal/lib/gssapi/krb5/verify_mic.c krb5_keyblock *key, key 169 source4/heimdal/lib/gssapi/krb5/verify_mic.c ret = krb5_crypto_init(context, key, key 277 source4/heimdal/lib/gssapi/krb5/verify_mic.c krb5_keyblock *key; key 282 source4/heimdal/lib/gssapi/krb5/verify_mic.c ret = _gsskrb5i_get_token_key(context_handle, context, &key); key 289 source4/heimdal/lib/gssapi/krb5/verify_mic.c krb5_enctype_to_keytype (context, key->keytype, &keytype); key 293 source4/heimdal/lib/gssapi/krb5/verify_mic.c message_buffer, token_buffer, qop_state, key, key 298 source4/heimdal/lib/gssapi/krb5/verify_mic.c message_buffer, token_buffer, qop_state, key, key 306 source4/heimdal/lib/gssapi/krb5/verify_mic.c qop_state, key, type); key 312 source4/heimdal/lib/gssapi/krb5/verify_mic.c key); key 315 source4/heimdal/lib/gssapi/krb5/verify_mic.c krb5_free_keyblock (context, key); key 45 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_keyblock **key) key 48 source4/heimdal/lib/gssapi/krb5/wrap.c *key = NULL; key 53 source4/heimdal/lib/gssapi/krb5/wrap.c key); key 57 source4/heimdal/lib/gssapi/krb5/wrap.c key); key 59 source4/heimdal/lib/gssapi/krb5/wrap.c if (ret == 0 && *key == NULL) key 62 source4/heimdal/lib/gssapi/krb5/wrap.c key); key 63 source4/heimdal/lib/gssapi/krb5/wrap.c if (ret == 0 && *key == NULL) { key 73 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_keyblock **key) key 76 source4/heimdal/lib/gssapi/krb5/wrap.c *key = NULL; key 81 source4/heimdal/lib/gssapi/krb5/wrap.c key); key 85 source4/heimdal/lib/gssapi/krb5/wrap.c key); key 87 source4/heimdal/lib/gssapi/krb5/wrap.c if (ret == 0 && *key == NULL) { key 97 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_keyblock **key) key 99 source4/heimdal/lib/gssapi/krb5/wrap.c _gsskrb5i_get_acceptor_subkey(ctx, context, key); key 100 source4/heimdal/lib/gssapi/krb5/wrap.c if(*key == NULL) { key 106 source4/heimdal/lib/gssapi/krb5/wrap.c _gsskrb5i_get_initiator_subkey(ctx, context, key); key 108 source4/heimdal/lib/gssapi/krb5/wrap.c if (*key == NULL) { key 150 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_keyblock *key; key 158 source4/heimdal/lib/gssapi/krb5/wrap.c ret = _gsskrb5i_get_token_key(ctx, context, &key); key 164 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_enctype_to_keytype (context, key->keytype, &keytype); key 174 source4/heimdal/lib/gssapi/krb5/wrap.c req_output_size, max_input_size, key); key 182 source4/heimdal/lib/gssapi/krb5/wrap.c req_output_size, max_input_size, key); key 185 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_free_keyblock (context, key); key 200 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_keyblock *key key 270 source4/heimdal/lib/gssapi/krb5/wrap.c memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); key 304 source4/heimdal/lib/gssapi/krb5/wrap.c memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); key 336 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_keyblock *key key 396 source4/heimdal/lib/gssapi/krb5/wrap.c ret = krb5_crypto_init(context, key, 0, &crypto); key 442 source4/heimdal/lib/gssapi/krb5/wrap.c ret = krb5_crypto_init(context, key, ETYPE_DES3_CBC_NONE, key 487 source4/heimdal/lib/gssapi/krb5/wrap.c ret = krb5_crypto_init(context, key, key 528 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_keyblock *key; key 536 source4/heimdal/lib/gssapi/krb5/wrap.c ret = _gsskrb5i_get_token_key(ctx, context, &key); key 542 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_enctype_to_keytype (context, key->keytype, &keytype); key 548 source4/heimdal/lib/gssapi/krb5/wrap.c output_message_buffer, key); key 553 source4/heimdal/lib/gssapi/krb5/wrap.c output_message_buffer, key); key 559 source4/heimdal/lib/gssapi/krb5/wrap.c output_message_buffer, key); key 564 source4/heimdal/lib/gssapi/krb5/wrap.c output_message_buffer, key); key 567 source4/heimdal/lib/gssapi/krb5/wrap.c krb5_free_keyblock (context, key); key 244 source4/heimdal/lib/gssapi/mech/gss_krb5.c set_key(krb5_keyblock *keyblock, gss_krb5_lucid_key_t *key) key 246 source4/heimdal/lib/gssapi/mech/gss_krb5.c key->type = keyblock->keytype; key 247 source4/heimdal/lib/gssapi/mech/gss_krb5.c key->length = keyblock->keyvalue.length; key 248 source4/heimdal/lib/gssapi/mech/gss_krb5.c key->data = malloc(key->length); key 249 source4/heimdal/lib/gssapi/mech/gss_krb5.c if (key->data == NULL && key->length != 0) key 251 source4/heimdal/lib/gssapi/mech/gss_krb5.c memcpy(key->data, keyblock->keyvalue.data, key->length); key 256 source4/heimdal/lib/gssapi/mech/gss_krb5.c free_key(gss_krb5_lucid_key_t *key) key 258 source4/heimdal/lib/gssapi/mech/gss_krb5.c memset(key->data, 0, key->length); key 259 source4/heimdal/lib/gssapi/mech/gss_krb5.c free(key->data); key 260 source4/heimdal/lib/gssapi/mech/gss_krb5.c memset(key, 0, sizeof(*key)); key 347 source4/heimdal/lib/gssapi/mech/gss_krb5.c krb5_keyblock key; key 356 source4/heimdal/lib/gssapi/mech/gss_krb5.c ret = krb5_ret_keyblock(sp, &key); key 358 source4/heimdal/lib/gssapi/mech/gss_krb5.c ret = set_key(&key, &ctx->rfc1964_kd.ctx_key); key 359 source4/heimdal/lib/gssapi/mech/gss_krb5.c krb5_free_keyblock_contents(context, &key); key 362 source4/heimdal/lib/gssapi/mech/gss_krb5.c krb5_keyblock key; key 368 source4/heimdal/lib/gssapi/mech/gss_krb5.c ret = krb5_ret_keyblock(sp, &key); key 370 source4/heimdal/lib/gssapi/mech/gss_krb5.c ret = set_key(&key, &ctx->cfx_kd.ctx_key); key 371 source4/heimdal/lib/gssapi/mech/gss_krb5.c krb5_free_keyblock_contents(context, &key); key 375 source4/heimdal/lib/gssapi/mech/gss_krb5.c ret = krb5_ret_keyblock(sp, &key); key 377 source4/heimdal/lib/gssapi/mech/gss_krb5.c ret = set_key(&key, &ctx->cfx_kd.acceptor_subkey); key 378 source4/heimdal/lib/gssapi/mech/gss_krb5.c krb5_free_keyblock_contents(context, &key); key 50 source4/heimdal/lib/hcrypto/aes.c AES_set_encrypt_key(const unsigned char *userkey, const int bits, AES_KEY *key) key 52 source4/heimdal/lib/hcrypto/aes.c key->rounds = rijndaelKeySetupEnc(key->key, userkey, bits); key 53 source4/heimdal/lib/hcrypto/aes.c if (key->rounds == 0) key 59 source4/heimdal/lib/hcrypto/aes.c AES_set_decrypt_key(const unsigned char *userkey, const int bits, AES_KEY *key) key 61 source4/heimdal/lib/hcrypto/aes.c key->rounds = rijndaelKeySetupDec(key->key, userkey, bits); key 62 source4/heimdal/lib/hcrypto/aes.c if (key->rounds == 0) key 68 source4/heimdal/lib/hcrypto/aes.c AES_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key) key 70 source4/heimdal/lib/hcrypto/aes.c rijndaelEncrypt(key->key, key->rounds, in, out); key 74 source4/heimdal/lib/hcrypto/aes.c AES_decrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key) key 76 source4/heimdal/lib/hcrypto/aes.c rijndaelDecrypt(key->key, key->rounds, in, out); key 81 source4/heimdal/lib/hcrypto/aes.c unsigned long size, const AES_KEY *key, key 91 source4/heimdal/lib/hcrypto/aes.c AES_encrypt(tmp, out, key); key 102 source4/heimdal/lib/hcrypto/aes.c AES_encrypt(tmp, out, key); key 108 source4/heimdal/lib/hcrypto/aes.c AES_decrypt(tmp, out, key); key 118 source4/heimdal/lib/hcrypto/aes.c AES_decrypt(tmp, out, key); key 57 source4/heimdal/lib/hcrypto/aes.h uint32_t key[(AES_MAXNR+1)*4]; key 450 source4/heimdal/lib/hcrypto/camellia-ntt.c static void camellia_setup128(const unsigned char *key, u32 *subkey) key 461 source4/heimdal/lib/hcrypto/camellia-ntt.c kll = GETU32(key ); key 462 source4/heimdal/lib/hcrypto/camellia-ntt.c klr = GETU32(key + 4); key 463 source4/heimdal/lib/hcrypto/camellia-ntt.c krl = GETU32(key + 8); key 464 source4/heimdal/lib/hcrypto/camellia-ntt.c krr = GETU32(key + 12); key 661 source4/heimdal/lib/hcrypto/camellia-ntt.c static void camellia_setup256(const unsigned char *key, u32 *subkey) key 675 source4/heimdal/lib/hcrypto/camellia-ntt.c kll = GETU32(key ); key 676 source4/heimdal/lib/hcrypto/camellia-ntt.c klr = GETU32(key + 4); key 677 source4/heimdal/lib/hcrypto/camellia-ntt.c krl = GETU32(key + 8); key 678 source4/heimdal/lib/hcrypto/camellia-ntt.c krr = GETU32(key + 12); key 679 source4/heimdal/lib/hcrypto/camellia-ntt.c krll = GETU32(key + 16); key 680 source4/heimdal/lib/hcrypto/camellia-ntt.c krlr = GETU32(key + 20); key 681 source4/heimdal/lib/hcrypto/camellia-ntt.c krrl = GETU32(key + 24); key 682 source4/heimdal/lib/hcrypto/camellia-ntt.c krrr = GETU32(key + 28); key 947 source4/heimdal/lib/hcrypto/camellia-ntt.c static void camellia_setup192(const unsigned char *key, u32 *subkey) key 952 source4/heimdal/lib/hcrypto/camellia-ntt.c memcpy(kk, key, 24); key 953 source4/heimdal/lib/hcrypto/camellia-ntt.c memcpy((unsigned char *)&krll, key+16,4); key 954 source4/heimdal/lib/hcrypto/camellia-ntt.c memcpy((unsigned char *)&krlr, key+20,4); key 53 source4/heimdal/lib/hcrypto/camellia.c const int bits, CAMELLIA_KEY *key) key 55 source4/heimdal/lib/hcrypto/camellia.c key->bits = bits; key 56 source4/heimdal/lib/hcrypto/camellia.c Camellia_Ekeygen(bits, userkey, key->key); key 62 source4/heimdal/lib/hcrypto/camellia.c const CAMELLIA_KEY *key) key 64 source4/heimdal/lib/hcrypto/camellia.c Camellia_EncryptBlock(key->bits, in, key->key, out); key 70 source4/heimdal/lib/hcrypto/camellia.c const CAMELLIA_KEY *key) key 72 source4/heimdal/lib/hcrypto/camellia.c Camellia_DecryptBlock(key->bits, in, key->key, out); key 77 source4/heimdal/lib/hcrypto/camellia.c unsigned long size, const CAMELLIA_KEY *key, key 87 source4/heimdal/lib/hcrypto/camellia.c CAMELLIA_encrypt(tmp, out, key); key 98 source4/heimdal/lib/hcrypto/camellia.c CAMELLIA_encrypt(tmp, out, key); key 104 source4/heimdal/lib/hcrypto/camellia.c CAMELLIA_decrypt(tmp, out, key); key 114 source4/heimdal/lib/hcrypto/camellia.c CAMELLIA_decrypt(tmp, out, key); key 58 source4/heimdal/lib/hcrypto/camellia.h uint32_t key[CAMELLIA_TABLE_WORD_LEN]; key 123 source4/heimdal/lib/hcrypto/des.c DES_set_odd_parity(DES_cblock *key) key 127 source4/heimdal/lib/hcrypto/des.c (*key)[i] = odd_parity[(*key)[i]]; key 139 source4/heimdal/lib/hcrypto/des.c DES_check_key_parity(DES_cblock *key) key 144 source4/heimdal/lib/hcrypto/des.c if ((*key)[i] != odd_parity[(*key)[i]]) key 184 source4/heimdal/lib/hcrypto/des.c DES_is_weak_key(DES_cblock *key) key 189 source4/heimdal/lib/hcrypto/des.c if (memcmp(weak_keys[i], key, DES_CBLOCK_LEN) == 0) key 207 source4/heimdal/lib/hcrypto/des.c DES_set_key(DES_cblock *key, DES_key_schedule *ks) key 209 source4/heimdal/lib/hcrypto/des.c return DES_set_key_checked(key, ks); key 226 source4/heimdal/lib/hcrypto/des.c DES_set_key_unchecked(DES_cblock *key, DES_key_schedule *ks) key 234 source4/heimdal/lib/hcrypto/des.c t1 = (*key)[0] << 24 | (*key)[1] << 16 | (*key)[2] << 8 | (*key)[3]; key 235 source4/heimdal/lib/hcrypto/des.c t2 = (*key)[4] << 24 | (*key)[5] << 16 | (*key)[6] << 8 | (*key)[7]; key 297 source4/heimdal/lib/hcrypto/des.c DES_set_key_checked(DES_cblock *key, DES_key_schedule *ks) key 299 source4/heimdal/lib/hcrypto/des.c if (!DES_check_key_parity(key)) { key 303 source4/heimdal/lib/hcrypto/des.c if (DES_is_weak_key(key)) { key 307 source4/heimdal/lib/hcrypto/des.c return DES_set_key_unchecked(key, ks); key 322 source4/heimdal/lib/hcrypto/des.c DES_key_sched(DES_cblock *key, DES_key_schedule *ks) key 324 source4/heimdal/lib/hcrypto/des.c return DES_set_key_checked(key, ks); key 830 source4/heimdal/lib/hcrypto/des.c DES_string_to_key(const char *str, DES_cblock *key) key 837 source4/heimdal/lib/hcrypto/des.c memset(key, 0, sizeof(*key)); key 838 source4/heimdal/lib/hcrypto/des.c k = *key; key 848 source4/heimdal/lib/hcrypto/des.c DES_set_odd_parity(key); key 849 source4/heimdal/lib/hcrypto/des.c if (DES_is_weak_key(key)) key 851 source4/heimdal/lib/hcrypto/des.c DES_set_key(key, &ks); key 852 source4/heimdal/lib/hcrypto/des.c DES_cbc_cksum(s, key, len, &ks, key); key 854 source4/heimdal/lib/hcrypto/des.c DES_set_odd_parity(key); key 855 source4/heimdal/lib/hcrypto/des.c if (DES_is_weak_key(key)) key 872 source4/heimdal/lib/hcrypto/des.c DES_read_password(DES_cblock *key, char *prompt, int verify) key 879 source4/heimdal/lib/hcrypto/des.c DES_string_to_key(buf, key); key 79 source4/heimdal/lib/hcrypto/evp-aes-cts.c const unsigned char * key, key 85 source4/heimdal/lib/hcrypto/evp-aes-cts.c AES_set_encrypt_key(key, ctx->cipher->key_len * 8, k); key 87 source4/heimdal/lib/hcrypto/evp-aes-cts.c AES_set_decrypt_key(key, ctx->cipher->key_len * 8, k); key 93 source4/heimdal/lib/hcrypto/evp-aes-cts.c size_t len, const AES_KEY *key, key 109 source4/heimdal/lib/hcrypto/evp-aes-cts.c AES_encrypt(tmp, out, key); key 121 source4/heimdal/lib/hcrypto/evp-aes-cts.c AES_encrypt(tmp, out - AES_BLOCK_SIZE, key); key 132 source4/heimdal/lib/hcrypto/evp-aes-cts.c AES_decrypt(in, out, key); key 144 source4/heimdal/lib/hcrypto/evp-aes-cts.c AES_decrypt(in, tmp2, key); key 152 source4/heimdal/lib/hcrypto/evp-aes-cts.c AES_decrypt(tmp3, out, key); key 60 source4/heimdal/lib/hcrypto/evp-hcrypto.c const unsigned char * key, key 66 source4/heimdal/lib/hcrypto/evp-hcrypto.c AES_set_encrypt_key(key, ctx->cipher->key_len * 8, k); key 68 source4/heimdal/lib/hcrypto/evp-hcrypto.c AES_set_decrypt_key(key, ctx->cipher->key_len * 8, k); key 766 source4/heimdal/lib/hcrypto/evp.c const void *key, const void *iv, int encp) key 805 source4/heimdal/lib/hcrypto/evp.c if (key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) key 806 source4/heimdal/lib/hcrypto/evp.c ctx->cipher->init(ctx, key, iv, encp); key 965 source4/heimdal/lib/hcrypto/evp.c const unsigned char * key, key 1023 source4/heimdal/lib/hcrypto/evp.c RC2_KEY key; key 1028 source4/heimdal/lib/hcrypto/evp.c const unsigned char * key, key 1034 source4/heimdal/lib/hcrypto/evp.c RC2_set_key(&k->key, key 1036 source4/heimdal/lib/hcrypto/evp.c key, key 1048 source4/heimdal/lib/hcrypto/evp.c RC2_cbc_encrypt(in, out, size, &k->key, ctx->iv, ctx->encrypt); key 1184 source4/heimdal/lib/hcrypto/evp.c const unsigned char * key, key 1190 source4/heimdal/lib/hcrypto/evp.c memcpy(&deskey, key, sizeof(deskey)); key 1253 source4/heimdal/lib/hcrypto/evp.c const unsigned char * key, key 1260 source4/heimdal/lib/hcrypto/evp.c memcpy(&deskey, key, sizeof(deskey)); key 1264 source4/heimdal/lib/hcrypto/evp.c memcpy(&deskey, key + 8, sizeof(deskey)); key 1268 source4/heimdal/lib/hcrypto/evp.c memcpy(&deskey, key + 16, sizeof(deskey)); key 1368 source4/heimdal/lib/hcrypto/evp.c const unsigned char * key, key 1374 source4/heimdal/lib/hcrypto/evp.c CAMELLIA_set_key(key, ctx->cipher->key_len * 8, k); key 1561 source4/heimdal/lib/hcrypto/evp.c unsigned char *key = keydata; key 1604 source4/heimdal/lib/hcrypto/evp.c if (key) { key 1605 source4/heimdal/lib/hcrypto/evp.c memcpy(key, buf, sz); key 1606 source4/heimdal/lib/hcrypto/evp.c key += sz; key 1641 source4/heimdal/lib/hcrypto/evp.c EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, void *key) key 1644 source4/heimdal/lib/hcrypto/evp.c return EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_RAND_KEY, 0, key); key 1645 source4/heimdal/lib/hcrypto/evp.c if (RAND_bytes(key, ctx->key_len) != 1) key 78 source4/heimdal/lib/hcrypto/hmac.c const void *key, key 100 source4/heimdal/lib/hcrypto/hmac.c EVP_Digest(key, keylen, ctx->buf, NULL, ctx->md, engine); key 101 source4/heimdal/lib/hcrypto/hmac.c key = ctx->buf; key 120 source4/heimdal/lib/hcrypto/hmac.c p[i] ^= ((const unsigned char *)key)[i]; key 122 source4/heimdal/lib/hcrypto/hmac.c p[i] ^= ((const unsigned char *)key)[i]; key 149 source4/heimdal/lib/hcrypto/hmac.c const void *key, size_t key_size, key 156 source4/heimdal/lib/hcrypto/hmac.c HMAC_Init_ex(&ctx, key, key_size, md, NULL); key 79 source4/heimdal/lib/hcrypto/hmac.h void * HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, key 50 source4/heimdal/lib/hcrypto/pkcs12.c PKCS12_key_gen(const void *key, size_t keylen, key 90 source4/heimdal/lib/hcrypto/pkcs12.c if (key && keylen >= 0) { key 93 source4/heimdal/lib/hcrypto/pkcs12.c I[(i * 2) + size_I + 1] = ((unsigned char*)key)[i % (keylen + 1)]; key 72 source4/heimdal/lib/hcrypto/pkcs5.c size_t keylen, void *key) key 97 source4/heimdal/lib/hcrypto/pkcs5.c p = key; key 113 source4/heimdal/lib/hcrypto/rand-fortuna.c unsigned char key[BLOCK]; key 135 source4/heimdal/lib/hcrypto/rand-fortuna.c ciph_init(CIPH_CTX * ctx, const unsigned char *key, int klen) key 137 source4/heimdal/lib/hcrypto/rand-fortuna.c AES_set_encrypt_key(key, klen * 8, ctx); key 279 source4/heimdal/lib/hcrypto/rand-fortuna.c md_update(&key_md, st->key, BLOCK); key 285 source4/heimdal/lib/hcrypto/rand-fortuna.c md_result(&key_md, st->key); key 288 source4/heimdal/lib/hcrypto/rand-fortuna.c ciph_init(&st->ciph, st->key, BLOCK); key 305 source4/heimdal/lib/hcrypto/rand-fortuna.c rnd = st->key[st->rnd_pos] % NUM_POOLS; key 351 source4/heimdal/lib/hcrypto/rand-fortuna.c encrypt_counter(st, st->key); key 352 source4/heimdal/lib/hcrypto/rand-fortuna.c encrypt_counter(st, st->key + CIPH_BLOCK); key 353 source4/heimdal/lib/hcrypto/rand-fortuna.c ciph_init(&st->ciph, st->key, BLOCK); key 85 source4/heimdal/lib/hcrypto/rc2.c RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits) key 112 source4/heimdal/lib/hcrypto/rc2.c key->data[j] = k[(j * 2) + 0] | (k[(j * 2) + 1] << 8); key 120 source4/heimdal/lib/hcrypto/rc2.c RC2_encryptc(unsigned char *in, unsigned char *out, const RC2_KEY *key) key 133 source4/heimdal/lib/hcrypto/rc2.c t0 = (w0 + (w1 & ~w3) + (w2 & w3) + key->data[j + 0]) & 0xffff; key 135 source4/heimdal/lib/hcrypto/rc2.c t1 = (w1 + (w2 & ~w0) + (w3 & w0) + key->data[j + 1]) & 0xffff; key 137 source4/heimdal/lib/hcrypto/rc2.c t2 = (w2 + (w3 & ~w1) + (w0 & w1) + key->data[j + 2]) & 0xffff; key 139 source4/heimdal/lib/hcrypto/rc2.c t3 = (w3 + (w0 & ~w2) + (w1 & w2) + key->data[j + 3]) & 0xffff; key 142 source4/heimdal/lib/hcrypto/rc2.c w0 += key->data[w3 & 63]; key 143 source4/heimdal/lib/hcrypto/rc2.c w1 += key->data[w0 & 63]; key 144 source4/heimdal/lib/hcrypto/rc2.c w2 += key->data[w1 & 63]; key 145 source4/heimdal/lib/hcrypto/rc2.c w3 += key->data[w2 & 63]; key 160 source4/heimdal/lib/hcrypto/rc2.c RC2_decryptc(unsigned char *in, unsigned char *out, const RC2_KEY *key) key 175 source4/heimdal/lib/hcrypto/rc2.c w3 = (w3 - key->data[w2 & 63]) & 0xffff; key 176 source4/heimdal/lib/hcrypto/rc2.c w2 = (w2 - key->data[w1 & 63]) & 0xffff; key 177 source4/heimdal/lib/hcrypto/rc2.c w1 = (w1 - key->data[w0 & 63]) & 0xffff; key 178 source4/heimdal/lib/hcrypto/rc2.c w0 = (w0 - key->data[w3 & 63]) & 0xffff; key 182 source4/heimdal/lib/hcrypto/rc2.c w3 = (t3 - (w0 & ~w2) - (w1 & w2) - key->data[j + 3]) & 0xffff; key 184 source4/heimdal/lib/hcrypto/rc2.c w2 = (t2 - (w3 & ~w1) - (w0 & w1) - key->data[j + 2]) & 0xffff; key 186 source4/heimdal/lib/hcrypto/rc2.c w1 = (t1 - (w2 & ~w0) - (w3 & w0) - key->data[j + 1]) & 0xffff; key 188 source4/heimdal/lib/hcrypto/rc2.c w0 = (t0 - (w1 & ~w3) - (w2 & w3) - key->data[j + 0]) & 0xffff; key 203 source4/heimdal/lib/hcrypto/rc2.c RC2_KEY *key, unsigned char *iv, int forward_encrypt) key 212 source4/heimdal/lib/hcrypto/rc2.c RC2_encryptc(tmp, out, key); key 223 source4/heimdal/lib/hcrypto/rc2.c RC2_encryptc(tmp, out, key); key 229 source4/heimdal/lib/hcrypto/rc2.c RC2_decryptc(tmp, out, key); key 239 source4/heimdal/lib/hcrypto/rc2.c RC2_decryptc(tmp, out, key); key 52 source4/heimdal/lib/hcrypto/rc4.c RC4_set_key(RC4_KEY *key, const int len, unsigned char *data) key 57 source4/heimdal/lib/hcrypto/rc4.c key->state[i] = i; key 59 source4/heimdal/lib/hcrypto/rc4.c j = (j + key->state[i] + data[i % len]) % 256; key 60 source4/heimdal/lib/hcrypto/rc4.c SWAP(key, i, j); key 62 source4/heimdal/lib/hcrypto/rc4.c key->x = key->y = 0; key 66 source4/heimdal/lib/hcrypto/rc4.c RC4(RC4_KEY *key, const int len, const unsigned char *in, unsigned char *out) key 71 source4/heimdal/lib/hcrypto/rc4.c x = key->x; key 72 source4/heimdal/lib/hcrypto/rc4.c y = key->y; key 75 source4/heimdal/lib/hcrypto/rc4.c y = (y + key->state[x]) % 256; key 76 source4/heimdal/lib/hcrypto/rc4.c SWAP(key, x, y); key 77 source4/heimdal/lib/hcrypto/rc4.c t = (key->state[x] + key->state[y]) % 256; key 78 source4/heimdal/lib/hcrypto/rc4.c *out++ = key->state[t] ^ *in++; key 80 source4/heimdal/lib/hcrypto/rc4.c key->x = x; key 81 source4/heimdal/lib/hcrypto/rc4.c key->y = y; key 68 source4/heimdal/lib/hcrypto/rnd_keys.c DES_rand_data_key(DES_cblock *key); key 75 source4/heimdal/lib/hcrypto/rnd_keys.c DES_rand_data_key(DES_cblock *key) key 77 source4/heimdal/lib/hcrypto/rnd_keys.c DES_new_random_key(key); key 103 source4/heimdal/lib/hcrypto/rnd_keys.c DES_new_random_key(DES_cblock *key) key 106 source4/heimdal/lib/hcrypto/rnd_keys.c if (RAND_bytes(key, sizeof(*key)) != 1) key 108 source4/heimdal/lib/hcrypto/rnd_keys.c DES_set_odd_parity(key); key 109 source4/heimdal/lib/hcrypto/rnd_keys.c } while(DES_is_weak_key(key)); key 138 source4/heimdal/lib/hcrypto/rnd_keys.c DES_random_key(DES_cblock *key) key 140 source4/heimdal/lib/hcrypto/rnd_keys.c if (DES_new_random_key(key)) key 250 source4/heimdal/lib/hcrypto/rsa.c RSA_check_key(const RSA *key) key 253 source4/heimdal/lib/hcrypto/rsa.c RSA *rsa = rk_UNCONST(key); key 97 source4/heimdal/lib/hdb/db.c DBT key, value; key 106 source4/heimdal/lib/hdb/db.c code = (*d->seq)(d, &key, &value, flag); key 119 source4/heimdal/lib/hdb/db.c key_data.data = key.data; key 120 source4/heimdal/lib/hdb/db.c key_data.length = key.size; key 178 source4/heimdal/lib/hdb/db.c DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) key 184 source4/heimdal/lib/hdb/db.c k.data = key.data; key 185 source4/heimdal/lib/hdb/db.c k.size = key.length; key 208 source4/heimdal/lib/hdb/db.c krb5_data key, krb5_data value) key 214 source4/heimdal/lib/hdb/db.c k.data = key.data; key 215 source4/heimdal/lib/hdb/db.c k.size = key.length; key 237 source4/heimdal/lib/hdb/db.c DB__del(krb5_context context, HDB *db, krb5_data key) key 242 source4/heimdal/lib/hdb/db.c k.data = key.data; key 243 source4/heimdal/lib/hdb/db.c k.size = key.length; key 281 source4/heimdal/lib/hdb/ext.c hdb_master_key key; key 283 source4/heimdal/lib/hdb/ext.c key = _hdb_find_master_key(ext->data.u.password.mkvno, key 286 source4/heimdal/lib/hdb/ext.c if (key == NULL) { key 293 source4/heimdal/lib/hdb/ext.c ret = _hdb_mkey_decrypt(context, key, HDB_KU_MKEY, key 336 source4/heimdal/lib/hdb/ext.c hdb_master_key key; key 344 source4/heimdal/lib/hdb/ext.c key = _hdb_find_master_key(NULL, db->hdb_master_key); key 345 source4/heimdal/lib/hdb/ext.c if (key == NULL) { key 352 source4/heimdal/lib/hdb/ext.c ret = _hdb_mkey_encrypt(context, key, HDB_KU_MKEY, key 365 source4/heimdal/lib/hdb/ext.c *ext.data.u.password.mkvno = _hdb_mkey_version(key); key 72 source4/heimdal/lib/hdb/hdb.c Key **key) key 76 source4/heimdal/lib/hdb/hdb.c for (k = *key ? (*key) + 1 : e->keys.val; key 80 source4/heimdal/lib/hdb/hdb.c if(k->key.keytype == enctype){ key 81 source4/heimdal/lib/hdb/hdb.c *key = k; key 95 source4/heimdal/lib/hdb/hdb.c Key **key) key 97 source4/heimdal/lib/hdb/hdb.c *key = NULL; key 98 source4/heimdal/lib/hdb/hdb.c return hdb_next_enctype2key(context, e, enctype, key); key 102 source4/heimdal/lib/hdb/hdb.c hdb_free_key(Key *key) key 104 source4/heimdal/lib/hdb/hdb.c memset(key->key.keyvalue.data, key 106 source4/heimdal/lib/hdb/hdb.c key->key.keyvalue.length); key 107 source4/heimdal/lib/hdb/hdb.c free_Key(key); key 108 source4/heimdal/lib/hdb/hdb.c free(key); key 151 source4/heimdal/lib/hdb/hdb.c memset (k->key.keyvalue.data, 0, k->key.keyvalue.length); key 55 source4/heimdal/lib/hdb/keys.c krb5_free_keyblock_contents(context, &keys[i].key); key 84 source4/heimdal/lib/hdb/keys.c parse_key_set(krb5_context context, const char *key, key 96 source4/heimdal/lib/hdb/keys.c p = key; key 166 source4/heimdal/lib/hdb/keys.c krb5_set_error_message(context, EINVAL, "bad value for default_keys `%s'", key); key 205 source4/heimdal/lib/hdb/keys.c Key key, *tmp; key 207 source4/heimdal/lib/hdb/keys.c memset(&key, 0, sizeof(key)); key 215 source4/heimdal/lib/hdb/keys.c key.key.keytype = enctype; key 216 source4/heimdal/lib/hdb/keys.c key.key.keyvalue.length = 0; key 217 source4/heimdal/lib/hdb/keys.c key.key.keyvalue.data = NULL; key 220 source4/heimdal/lib/hdb/keys.c key.salt = malloc(sizeof(*key.salt)); key 221 source4/heimdal/lib/hdb/keys.c if (key.salt == NULL) { key 222 source4/heimdal/lib/hdb/keys.c free_Key(&key); key 226 source4/heimdal/lib/hdb/keys.c key.salt->type = salt->salttype; key 227 source4/heimdal/lib/hdb/keys.c krb5_data_zero (&key.salt->salt); key 229 source4/heimdal/lib/hdb/keys.c ret = krb5_data_copy(&key.salt->salt, key 233 source4/heimdal/lib/hdb/keys.c free_Key(&key); key 237 source4/heimdal/lib/hdb/keys.c key.salt = NULL; key 239 source4/heimdal/lib/hdb/keys.c (*key_set)[*nkeyset] = key; key 315 source4/heimdal/lib/hdb/keys.c if (k->key.keytype == enctypes[i]) { key 387 source4/heimdal/lib/hdb/keys.c (*keys)[i].key.keytype, key 390 source4/heimdal/lib/hdb/keys.c &(*keys)[i].key); key 241 source4/heimdal/lib/hdb/keytab.c enctype = ent.entry.keys.val[0].key.keytype; key 244 source4/heimdal/lib/hdb/keytab.c if(ent.entry.keys.val[i].key.keytype == enctype) { key 248 source4/heimdal/lib/hdb/keytab.c &ent.entry.keys.val[i].key, key 63 source4/heimdal/lib/hdb/mkey.c int kvno, krb5_keyblock *key, krb5_enctype etype, key 77 source4/heimdal/lib/hdb/mkey.c ret = krb5_copy_keyblock_contents(context, key, &(*mkey)->keytab.keyblock); key 83 source4/heimdal/lib/hdb/mkey.c ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto); key 94 source4/heimdal/lib/hdb/mkey.c hdb_add_master_key(krb5_context context, krb5_keyblock *key, key 104 source4/heimdal/lib/hdb/mkey.c ret = hdb_process_master_key(context, vno, key, 0, &p); key 157 source4/heimdal/lib/hdb/mkey.c krb5_keyblock key; key 175 source4/heimdal/lib/hdb/mkey.c ret = krb5_ret_keyblock(sp, &key); key 184 source4/heimdal/lib/hdb/mkey.c key.keytype = enctype; key 185 source4/heimdal/lib/hdb/mkey.c ret = krb5_ret_data(sp, &key.keyvalue); key 189 source4/heimdal/lib/hdb/mkey.c ret = hdb_process_master_key(context, 0, &key, 0, mkey); key 190 source4/heimdal/lib/hdb/mkey.c krb5_free_keyblock_contents(context, &key); key 203 source4/heimdal/lib/hdb/mkey.c krb5_keyblock key; key 226 source4/heimdal/lib/hdb/mkey.c ret = decode_EncryptionKey(buf, len, &key, &ret_len); key 236 source4/heimdal/lib/hdb/mkey.c if(key.keytype == KEYTYPE_DES || key.keytype == ETYPE_DES_CBC_MD5) key 237 source4/heimdal/lib/hdb/mkey.c key.keytype = ETYPE_DES_CFB64_NONE; key 239 source4/heimdal/lib/hdb/mkey.c ret = hdb_process_master_key(context, 0, &key, 0, mkey); key 240 source4/heimdal/lib/hdb/mkey.c krb5_free_keyblock_contents(context, &key); key 250 source4/heimdal/lib/hdb/mkey.c krb5_keyblock key; key 277 source4/heimdal/lib/hdb/mkey.c memset(&key, 0, sizeof(key)); key 278 source4/heimdal/lib/hdb/mkey.c key.keytype = ETYPE_DES_PCBC_NONE; key 279 source4/heimdal/lib/hdb/mkey.c ret = krb5_data_copy(&key.keyvalue, buf, len); key 284 source4/heimdal/lib/hdb/mkey.c ret = hdb_process_master_key(context, 0, &key, 0, mkey); key 285 source4/heimdal/lib/hdb/mkey.c krb5_free_keyblock_contents(context, &key); key 387 source4/heimdal/lib/hdb/mkey.c _hdb_mkey_decrypt(krb5_context context, hdb_master_key key, key 391 source4/heimdal/lib/hdb/mkey.c return krb5_decrypt(context, key->crypto, usage, key 396 source4/heimdal/lib/hdb/mkey.c _hdb_mkey_encrypt(krb5_context context, hdb_master_key key, key 400 source4/heimdal/lib/hdb/mkey.c return krb5_encrypt(context, key->crypto, usage, key 412 source4/heimdal/lib/hdb/mkey.c hdb_master_key key; key 417 source4/heimdal/lib/hdb/mkey.c key = _hdb_find_master_key(k->mkvno, mkey); key 419 source4/heimdal/lib/hdb/mkey.c if (key == NULL) key 422 source4/heimdal/lib/hdb/mkey.c ret = _hdb_mkey_decrypt(context, key, HDB_KU_MKEY, key 423 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue.data, key 424 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue.length, key 428 source4/heimdal/lib/hdb/mkey.c ret = _hdb_mkey_decrypt(context, key, 0, key 429 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue.data, key 430 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue.length, key 437 source4/heimdal/lib/hdb/mkey.c ret = krb5_enctype_keysize(context, k->key.keytype, &keysize); key 447 source4/heimdal/lib/hdb/mkey.c memset(k->key.keyvalue.data, 0, k->key.keyvalue.length); key 448 source4/heimdal/lib/hdb/mkey.c free(k->key.keyvalue.data); key 449 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue = res; key 450 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue.length = keysize; key 493 source4/heimdal/lib/hdb/mkey.c hdb_master_key key; key 498 source4/heimdal/lib/hdb/mkey.c key = _hdb_find_master_key(k->mkvno, mkey); key 500 source4/heimdal/lib/hdb/mkey.c if (key == NULL) key 503 source4/heimdal/lib/hdb/mkey.c ret = _hdb_mkey_encrypt(context, key, HDB_KU_MKEY, key 504 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue.data, key 505 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue.length, key 510 source4/heimdal/lib/hdb/mkey.c memset(k->key.keyvalue.data, 0, k->key.keyvalue.length); key 511 source4/heimdal/lib/hdb/mkey.c free(k->key.keyvalue.data); key 512 source4/heimdal/lib/hdb/mkey.c k->key.keyvalue = res; key 519 source4/heimdal/lib/hdb/mkey.c *k->mkvno = key->keytab.vno; key 559 source4/heimdal/lib/hdb/mkey.c krb5_keyblock *key) key 564 source4/heimdal/lib/hdb/mkey.c ret = hdb_process_master_key(context, 0, key, 0, &mkey); key 569 source4/heimdal/lib/hdb/mkey.c des_set_random_generator_seed(key.keyvalue.data); key 580 source4/heimdal/lib/hdb/mkey.c hdb_master_key key; key 583 source4/heimdal/lib/hdb/mkey.c ret = hdb_read_master_key(context, keyfile, &key); key 590 source4/heimdal/lib/hdb/mkey.c db->hdb_master_key = key; key 84 source4/heimdal/lib/hdb/ndbm.c datum key, value; key 89 source4/heimdal/lib/hdb/ndbm.c key = dbm_firstkey(d->db); key 91 source4/heimdal/lib/hdb/ndbm.c key = dbm_nextkey(d->db); key 92 source4/heimdal/lib/hdb/ndbm.c if(key.dptr == NULL) key 94 source4/heimdal/lib/hdb/ndbm.c key_data.data = key.dptr; key 95 source4/heimdal/lib/hdb/ndbm.c key_data.length = key.dsize; key 98 source4/heimdal/lib/hdb/ndbm.c value = dbm_fetch(d->db, key); key 204 source4/heimdal/lib/hdb/ndbm.c NDBM__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) key 210 source4/heimdal/lib/hdb/ndbm.c k.dptr = key.data; key 211 source4/heimdal/lib/hdb/ndbm.c k.dsize = key.length; key 226 source4/heimdal/lib/hdb/ndbm.c krb5_data key, krb5_data value) key 232 source4/heimdal/lib/hdb/ndbm.c k.dptr = key.data; key 233 source4/heimdal/lib/hdb/ndbm.c k.dsize = key.length; key 250 source4/heimdal/lib/hdb/ndbm.c NDBM__del(krb5_context context, HDB *db, krb5_data key) key 257 source4/heimdal/lib/hdb/ndbm.c k.dptr = key.data; key 258 source4/heimdal/lib/hdb/ndbm.c k.dsize = key.length; key 54 source4/heimdal/lib/hx509/ca.c unsigned int key:1; key 261 source4/heimdal/lib/hx509/ca.c tbs->flags.key = !ret; key 380 source4/heimdal/lib/hx509/ca.c tbs->flags.key = !ret; key 993 source4/heimdal/lib/hx509/ca.c if (tbs->flags.key == 0) { key 358 source4/heimdal/lib/hx509/cms.c heim_octet_string key; key 369 source4/heimdal/lib/hx509/cms.c memset(&key, 0, sizeof(key)); key 427 source4/heimdal/lib/hx509/cms.c cert, &key); key 485 source4/heimdal/lib/hx509/cms.c ret = hx509_crypto_set_key_data(crypto, key.data, key.length); key 510 source4/heimdal/lib/hx509/cms.c der_free_octet_string(&key); key 556 source4/heimdal/lib/hx509/cms.c heim_octet_string key; key 563 source4/heimdal/lib/hx509/cms.c memset(&key, 0, sizeof(key)); key 578 source4/heimdal/lib/hx509/cms.c ret = hx509_crypto_set_random_key(crypto, &key); key 652 source4/heimdal/lib/hx509/cms.c &key, cert, key 694 source4/heimdal/lib/hx509/cms.c der_free_octet_string(&key); key 105 source4/heimdal/lib/hx509/collector.c free_private_key(struct private_key *key) key 107 source4/heimdal/lib/hx509/collector.c free_AlgorithmIdentifier(&key->alg); key 108 source4/heimdal/lib/hx509/collector.c if (key->private_key) key 109 source4/heimdal/lib/hx509/collector.c _hx509_private_key_free(&key->private_key); key 110 source4/heimdal/lib/hx509/collector.c der_free_octet_string(&key->localKeyId); key 111 source4/heimdal/lib/hx509/collector.c free(key); key 122 source4/heimdal/lib/hx509/collector.c struct private_key *key; key 126 source4/heimdal/lib/hx509/collector.c key = calloc(1, sizeof(*key)); key 127 source4/heimdal/lib/hx509/collector.c if (key == NULL) key 132 source4/heimdal/lib/hx509/collector.c free(key); key 138 source4/heimdal/lib/hx509/collector.c ret = copy_AlgorithmIdentifier(alg, &key->alg); key 145 source4/heimdal/lib/hx509/collector.c key->private_key = private_key; key 149 source4/heimdal/lib/hx509/collector.c &key->private_key); key 154 source4/heimdal/lib/hx509/collector.c ret = der_copy_octet_string(localKeyId, &key->localKeyId); key 161 source4/heimdal/lib/hx509/collector.c memset(&key->localKeyId, 0, sizeof(key->localKeyId)); key 163 source4/heimdal/lib/hx509/collector.c c->val.data[c->val.len] = key; key 168 source4/heimdal/lib/hx509/collector.c free_private_key(key); key 513 source4/heimdal/lib/hx509/crypto.c const hx509_private_key key, key 521 source4/heimdal/lib/hx509/crypto.c ret = i2d_RSAPrivateKey(key->private_key.rsa, NULL); key 539 source4/heimdal/lib/hx509/crypto.c i2d_RSAPrivateKey(key->private_key.rsa, &p); key 546 source4/heimdal/lib/hx509/crypto.c rsa_get_internal(hx509_context context, hx509_private_key key, const char *type) key 549 source4/heimdal/lib/hx509/crypto.c return BN_dup(key->private_key.rsa->n); key 551 source4/heimdal/lib/hx509/crypto.c return BN_dup(key->private_key.rsa->e); key 1579 source4/heimdal/lib/hx509/crypto.c _hx509_private_key_init(hx509_private_key *key, key 1583 source4/heimdal/lib/hx509/crypto.c *key = calloc(1, sizeof(**key)); key 1584 source4/heimdal/lib/hx509/crypto.c if (*key == NULL) key 1586 source4/heimdal/lib/hx509/crypto.c (*key)->ref = 1; key 1587 source4/heimdal/lib/hx509/crypto.c (*key)->ops = ops; key 1588 source4/heimdal/lib/hx509/crypto.c (*key)->private_key.keydata = keydata; key 1593 source4/heimdal/lib/hx509/crypto.c _hx509_private_key_ref(hx509_private_key key) key 1595 source4/heimdal/lib/hx509/crypto.c if (key->ref == 0) key 1597 source4/heimdal/lib/hx509/crypto.c key->ref++; key 1598 source4/heimdal/lib/hx509/crypto.c if (key->ref == UINT_MAX) key 1600 source4/heimdal/lib/hx509/crypto.c return key; key 1604 source4/heimdal/lib/hx509/crypto.c _hx509_private_pem_name(hx509_private_key key) key 1606 source4/heimdal/lib/hx509/crypto.c return key->ops->pemtype; key 1610 source4/heimdal/lib/hx509/crypto.c _hx509_private_key_free(hx509_private_key *key) key 1612 source4/heimdal/lib/hx509/crypto.c if (key == NULL || *key == NULL) key 1615 source4/heimdal/lib/hx509/crypto.c if ((*key)->ref == 0) key 1617 source4/heimdal/lib/hx509/crypto.c if (--(*key)->ref > 0) key 1620 source4/heimdal/lib/hx509/crypto.c if ((*key)->private_key.rsa) key 1621 source4/heimdal/lib/hx509/crypto.c RSA_free((*key)->private_key.rsa); key 1622 source4/heimdal/lib/hx509/crypto.c (*key)->private_key.rsa = NULL; key 1623 source4/heimdal/lib/hx509/crypto.c free(*key); key 1624 source4/heimdal/lib/hx509/crypto.c *key = NULL; key 1629 source4/heimdal/lib/hx509/crypto.c _hx509_private_key_assign_rsa(hx509_private_key key, void *ptr) key 1631 source4/heimdal/lib/hx509/crypto.c if (key->private_key.rsa) key 1632 source4/heimdal/lib/hx509/crypto.c RSA_free(key->private_key.rsa); key 1633 source4/heimdal/lib/hx509/crypto.c key->private_key.rsa = ptr; key 1634 source4/heimdal/lib/hx509/crypto.c key->signature_alg = oid_id_pkcs1_sha1WithRSAEncryption(); key 1635 source4/heimdal/lib/hx509/crypto.c key->md = &pkcs1_rsa_sha1_alg; key 1640 source4/heimdal/lib/hx509/crypto.c const hx509_private_key key, key 1644 source4/heimdal/lib/hx509/crypto.c ret = der_copy_oid((*key->ops->key_oid)(), data); key 1651 source4/heimdal/lib/hx509/crypto.c _hx509_private_key_exportable(hx509_private_key key) key 1653 source4/heimdal/lib/hx509/crypto.c if (key->ops->export == NULL) key 1660 source4/heimdal/lib/hx509/crypto.c hx509_private_key key, key 1663 source4/heimdal/lib/hx509/crypto.c if (key->ops->get_internal == NULL) key 1665 source4/heimdal/lib/hx509/crypto.c return (*key->ops->get_internal)(context, key, type); key 1670 source4/heimdal/lib/hx509/crypto.c const hx509_private_key key, key 1673 source4/heimdal/lib/hx509/crypto.c if (key->ops->export == NULL) { key 1677 source4/heimdal/lib/hx509/crypto.c return (*key->ops->export)(context, key, data); key 1699 source4/heimdal/lib/hx509/crypto.c heim_octet_string key; key 2003 source4/heimdal/lib/hx509/crypto.c if (crypto->key.data) key 2004 source4/heimdal/lib/hx509/crypto.c free(crypto->key.data); key 2024 source4/heimdal/lib/hx509/crypto.c if (crypto->key.data) { key 2025 source4/heimdal/lib/hx509/crypto.c free(crypto->key.data); key 2026 source4/heimdal/lib/hx509/crypto.c crypto->key.data = NULL; key 2027 source4/heimdal/lib/hx509/crypto.c crypto->key.length = 0; key 2029 source4/heimdal/lib/hx509/crypto.c crypto->key.data = malloc(length); key 2030 source4/heimdal/lib/hx509/crypto.c if (crypto->key.data == NULL) key 2032 source4/heimdal/lib/hx509/crypto.c memcpy(crypto->key.data, data, length); key 2033 source4/heimdal/lib/hx509/crypto.c crypto->key.length = length; key 2039 source4/heimdal/lib/hx509/crypto.c hx509_crypto_set_random_key(hx509_crypto crypto, heim_octet_string *key) key 2041 source4/heimdal/lib/hx509/crypto.c if (crypto->key.data) { key 2042 source4/heimdal/lib/hx509/crypto.c free(crypto->key.data); key 2043 source4/heimdal/lib/hx509/crypto.c crypto->key.length = 0; key 2046 source4/heimdal/lib/hx509/crypto.c crypto->key.length = EVP_CIPHER_key_length(crypto->c); key 2047 source4/heimdal/lib/hx509/crypto.c crypto->key.data = malloc(crypto->key.length); key 2048 source4/heimdal/lib/hx509/crypto.c if (crypto->key.data == NULL) { key 2049 source4/heimdal/lib/hx509/crypto.c crypto->key.length = 0; key 2052 source4/heimdal/lib/hx509/crypto.c if (RAND_bytes(crypto->key.data, crypto->key.length) <= 0) { key 2053 source4/heimdal/lib/hx509/crypto.c free(crypto->key.data); key 2054 source4/heimdal/lib/hx509/crypto.c crypto->key.data = NULL; key 2055 source4/heimdal/lib/hx509/crypto.c crypto->key.length = 0; key 2058 source4/heimdal/lib/hx509/crypto.c if (key) key 2059 source4/heimdal/lib/hx509/crypto.c return der_copy_octet_string(&crypto->key, key); key 2119 source4/heimdal/lib/hx509/crypto.c crypto->key.data, ivec->data, 1); key 2195 source4/heimdal/lib/hx509/crypto.c if (crypto->key.data == NULL) key 2204 source4/heimdal/lib/hx509/crypto.c crypto->key.data, idata, 0); key 2271 source4/heimdal/lib/hx509/crypto.c heim_octet_string *key, heim_octet_string *iv, key 2300 source4/heimdal/lib/hx509/crypto.c PKCS12_KEY_ID, iter, key->length, key->data, md)) { key 2315 source4/heimdal/lib/hx509/crypto.c ret = hx509_crypto_set_key_data(c, key->data, key->length); key 2392 source4/heimdal/lib/hx509/crypto.c heim_octet_string key, iv; key 2399 source4/heimdal/lib/hx509/crypto.c memset(&key, 0, sizeof(key)); key 2412 source4/heimdal/lib/hx509/crypto.c key.length = EVP_CIPHER_key_length(c); key 2413 source4/heimdal/lib/hx509/crypto.c key.data = malloc(key.length); key 2414 source4/heimdal/lib/hx509/crypto.c if (key.data == NULL) { key 2443 source4/heimdal/lib/hx509/crypto.c &key, &iv, enc_oid, md); key 2458 source4/heimdal/lib/hx509/crypto.c if (key.data) key 2459 source4/heimdal/lib/hx509/crypto.c der_free_octet_string(&key); key 2527 source4/heimdal/lib/hx509/crypto.c find_keytype(const hx509_private_key key) key 2531 source4/heimdal/lib/hx509/crypto.c if (key == NULL) key 2534 source4/heimdal/lib/hx509/crypto.c md = find_sig_alg(key->signature_alg); key 58 source4/heimdal/lib/hx509/env.c const char *key, const char *value) key 70 source4/heimdal/lib/hx509/env.c n->name = strdup(key); key 109 source4/heimdal/lib/hx509/env.c const char *key, hx509_env list) key 121 source4/heimdal/lib/hx509/env.c n->name = strdup(key); key 156 source4/heimdal/lib/hx509/env.c const char *key, size_t len) key 159 source4/heimdal/lib/hx509/env.c if (strncmp(key, env->name ,len) == 0 key 180 source4/heimdal/lib/hx509/env.c hx509_env_find(hx509_context context, hx509_env env, const char *key) key 183 source4/heimdal/lib/hx509/env.c if (strcmp(key, env->name) == 0 && env->type == env_string) key 205 source4/heimdal/lib/hx509/env.c const char *key) key 208 source4/heimdal/lib/hx509/env.c if (strcmp(key, env->name) == 0 && env->type == env_list) key 656 source4/heimdal/lib/hx509/keyset.c hx509_private_key key) key 665 source4/heimdal/lib/hx509/keyset.c return (*certs->ops->addkey)(context, certs, certs->ops_data, key); key 80 source4/heimdal/lib/hx509/ks_file.c void *key; key 85 source4/heimdal/lib/hx509/ks_file.c key = malloc(keylen); key 86 source4/heimdal/lib/hx509/ks_file.c if (key == NULL) { key 93 source4/heimdal/lib/hx509/ks_file.c 1, key, NULL); key 112 source4/heimdal/lib/hx509/ks_file.c EVP_CipherInit_ex(&ctx, c, NULL, key, ivdata, 0); key 127 source4/heimdal/lib/hx509/ks_file.c memset(key, 0, keylen); key 128 source4/heimdal/lib/hx509/ks_file.c free(key); key 501 source4/heimdal/lib/hx509/ks_file.c hx509_private_key key = _hx509_cert_private_key(c); key 502 source4/heimdal/lib/hx509/ks_file.c ret = _hx509_private_key_export(context, key, &data); key 505 source4/heimdal/lib/hx509/ks_file.c hx509_pem_write(context, _hx509_private_pem_name(key), NULL, sc->f, key 584 source4/heimdal/lib/hx509/ks_file.c hx509_private_key key) key 587 source4/heimdal/lib/hx509/ks_file.c return _hx509_certs_keys_add(context, f->certs, key); key 201 source4/heimdal/lib/hx509/ks_keychain.c hx509_private_key key; key 205 source4/heimdal/lib/hx509/ks_keychain.c ret = _hx509_private_key_init(&key, NULL, NULL); key 248 source4/heimdal/lib/hx509/ks_keychain.c _hx509_private_key_assign_rsa(key, rsa); key 249 source4/heimdal/lib/hx509/ks_keychain.c _hx509_cert_assign_key(cert, key); key 184 source4/heimdal/lib/hx509/ks_mem.c hx509_private_key key) key 198 source4/heimdal/lib/hx509/ks_mem.c mem->keys[i] = _hx509_private_key_ref(key); key 131 source4/heimdal/lib/hx509/ks_p11.c CK_OBJECT_HANDLE key = p11rsa->private_key; key 149 source4/heimdal/lib/hx509/ks_p11.c ret = P11FUNC(p11rsa->p, SignInit, (session, &mechanism, key)); key 169 source4/heimdal/lib/hx509/ks_p11.c CK_OBJECT_HANDLE key = p11rsa->private_key; key 187 source4/heimdal/lib/hx509/ks_p11.c ret = P11FUNC(p11rsa->p, DecryptInit, (session, &mechanism, key)); key 608 source4/heimdal/lib/hx509/ks_p11.c hx509_private_key key; key 617 source4/heimdal/lib/hx509/ks_p11.c ret = _hx509_private_key_init(&key, NULL, NULL); key 652 source4/heimdal/lib/hx509/ks_p11.c _hx509_private_key_assign_rsa(key, rsa); key 657 source4/heimdal/lib/hx509/ks_p11.c key, key 662 source4/heimdal/lib/hx509/ks_p11.c _hx509_private_key_free(&key); key 523 source4/heimdal/lib/hx509/ks_p12.c hx509_private_key key = _hx509_cert_private_key(c); key 531 source4/heimdal/lib/hx509/ks_p12.c ret = _hx509_private_key_oid(context, key, key 40 source4/heimdal/lib/hx509/req.c SubjectPublicKeyInfo key; key 64 source4/heimdal/lib/hx509/req.c free_SubjectPublicKeyInfo(&(*req)->key); key 102 source4/heimdal/lib/hx509/req.c const SubjectPublicKeyInfo *key) key 104 source4/heimdal/lib/hx509/req.c free_SubjectPublicKeyInfo(&req->key); key 105 source4/heimdal/lib/hx509/req.c return copy_SubjectPublicKeyInfo(key, &req->key); key 111 source4/heimdal/lib/hx509/req.c SubjectPublicKeyInfo *key) key 113 source4/heimdal/lib/hx509/req.c return copy_SubjectPublicKeyInfo(&req->key, key); key 194 source4/heimdal/lib/hx509/req.c ret = copy_SubjectPublicKeyInfo(&req->key, key 324 source4/heimdal/lib/krb5/auth_context.c krb5_keyblock *key) key 329 source4/heimdal/lib/krb5/auth_context.c ret = krb5_generate_subkey_extended (context, key, key 56 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key; key 62 source4/heimdal/lib/krb5/crypto.c struct key_data key; key 67 source4/heimdal/lib/krb5/crypto.c struct key_data key; key 111 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 116 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 133 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 154 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 185 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 187 source4/heimdal/lib/krb5/crypto.c DES_cblock *k = key->keyvalue.data; key 197 source4/heimdal/lib/krb5/crypto.c struct key_data *key) key 199 source4/heimdal/lib/krb5/crypto.c DES_set_key_unchecked(key->key->keyvalue.data, key->schedule->data); key 216 source4/heimdal/lib/krb5/crypto.c DES_cblock *key) key 229 source4/heimdal/lib/krb5/crypto.c memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); key 235 source4/heimdal/lib/krb5/crypto.c ((unsigned char*)key)[i] <<= 1; key 236 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity (key); key 245 source4/heimdal/lib/krb5/crypto.c DES_cblock *key) key 272 source4/heimdal/lib/krb5/crypto.c DES_cbc_cksum ((void*)password, key, passlen, &schedule, &ivec); key 278 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity (key); key 287 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 294 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; key 295 source4/heimdal/lib/krb5/crypto.c krb5_data_copy(&key->keyvalue, tmp, sizeof(tmp)); key 296 source4/heimdal/lib/krb5/crypto.c memset(&key, 0, sizeof(key)); key 302 source4/heimdal/lib/krb5/crypto.c DES_string_to_key_int(unsigned char *data, size_t length, DES_cblock *key) key 311 source4/heimdal/lib/krb5/crypto.c memset(key, 0, 8); key 313 source4/heimdal/lib/krb5/crypto.c p = (unsigned char*)key; key 323 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity(key); key 324 source4/heimdal/lib/krb5/crypto.c if(DES_is_weak_key(key)) key 325 source4/heimdal/lib/krb5/crypto.c (*key)[7] ^= 0xF0; key 326 source4/heimdal/lib/krb5/crypto.c DES_set_key_unchecked(key, &schedule); key 327 source4/heimdal/lib/krb5/crypto.c DES_cbc_cksum((void*)data, key, length, &schedule, key); key 329 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity(key); key 330 source4/heimdal/lib/krb5/crypto.c if(DES_is_weak_key(key)) key 331 source4/heimdal/lib/krb5/crypto.c (*key)[7] ^= 0xF0; key 340 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 352 source4/heimdal/lib/krb5/crypto.c salt, opaque, key); key 365 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; key 366 source4/heimdal/lib/krb5/crypto.c krb5_data_copy(&key->keyvalue, tmp, sizeof(tmp)); key 375 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key, key 379 source4/heimdal/lib/krb5/crypto.c DES_cblock *k = key->keyvalue.data; key 380 source4/heimdal/lib/krb5/crypto.c memcpy(k, data, key->keyvalue.length); key 393 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 395 source4/heimdal/lib/krb5/crypto.c DES_cblock *k = key->keyvalue.data; key 411 source4/heimdal/lib/krb5/crypto.c xor (DES_cblock *key, const unsigned char *b) key 413 source4/heimdal/lib/krb5/crypto.c unsigned char *a = (unsigned char*)key; key 431 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 481 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; key 482 source4/heimdal/lib/krb5/crypto.c krb5_data_copy(&key->keyvalue, keys, sizeof(keys)); key 496 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 513 source4/heimdal/lib/krb5/crypto.c key); key 521 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key, key 525 source4/heimdal/lib/krb5/crypto.c unsigned char *x = key->keyvalue.data; key 545 source4/heimdal/lib/krb5/crypto.c k = key->keyvalue.data; key 563 source4/heimdal/lib/krb5/crypto.c kd->key->keyvalue.length, kd->key->keyvalue.data); key 572 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 619 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; key 620 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc (&key->keyvalue, 16); key 625 source4/heimdal/lib/krb5/crypto.c EVP_DigestFinal_ex (m, key->keyvalue.data, NULL); key 647 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 668 source4/heimdal/lib/krb5/crypto.c ALLOC(kd.key, 1); key 669 source4/heimdal/lib/krb5/crypto.c if(kd.key == NULL) { key 673 source4/heimdal/lib/krb5/crypto.c kd.key->keytype = enctype; key 674 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); key 683 source4/heimdal/lib/krb5/crypto.c et->keytype->size, kd.key->keyvalue.data); key 693 source4/heimdal/lib/krb5/crypto.c ret = krb5_copy_keyblock_contents(context, kd.key, key); key 702 source4/heimdal/lib/krb5/crypto.c struct evp_schedule *key = kd->schedule->data; key 705 source4/heimdal/lib/krb5/crypto.c EVP_CIPHER_CTX_init(&key->ectx); key 706 source4/heimdal/lib/krb5/crypto.c EVP_CIPHER_CTX_init(&key->dctx); key 708 source4/heimdal/lib/krb5/crypto.c EVP_CipherInit_ex(&key->ectx, c, NULL, kd->key->keyvalue.data, NULL, 1); key 709 source4/heimdal/lib/krb5/crypto.c EVP_CipherInit_ex(&key->dctx, c, NULL, kd->key->keyvalue.data, NULL, 0); key 715 source4/heimdal/lib/krb5/crypto.c struct evp_schedule *key = kd->schedule->data; key 716 source4/heimdal/lib/krb5/crypto.c EVP_CIPHER_CTX_cleanup(&key->ectx); key 717 source4/heimdal/lib/krb5/crypto.c EVP_CIPHER_CTX_cleanup(&key->dctx); key 993 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 1001 source4/heimdal/lib/krb5/crypto.c ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); key 1011 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 1016 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data(context, enctype, pw, principal, key); key 1024 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 1029 source4/heimdal/lib/krb5/crypto.c salt, opaque, key); key 1044 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 1057 source4/heimdal/lib/krb5/crypto.c salt, opaque, key); key 1075 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 1080 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt(context, enctype, pw, salt, key); key 1089 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 1095 source4/heimdal/lib/krb5/crypto.c pw, salt, opaque, key); key 1133 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 1143 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); key 1146 source4/heimdal/lib/krb5/crypto.c key->keytype = type; key 1148 source4/heimdal/lib/krb5/crypto.c (*et->keytype->random_key)(context, key); key 1150 source4/heimdal/lib/krb5/crypto.c krb5_generate_random_block(key->keyvalue.data, key 1151 source4/heimdal/lib/krb5/crypto.c key->keyvalue.length); key 1157 source4/heimdal/lib/krb5/crypto.c struct key_data *key) key 1160 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(key->key->keytype); key 1165 source4/heimdal/lib/krb5/crypto.c if (key->schedule != NULL) key 1167 source4/heimdal/lib/krb5/crypto.c ALLOC(key->schedule, 1); key 1168 source4/heimdal/lib/krb5/crypto.c if(key->schedule == NULL) { key 1172 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(key->schedule, kt->schedule_size); key 1174 source4/heimdal/lib/krb5/crypto.c free(key->schedule); key 1175 source4/heimdal/lib/krb5/crypto.c key->schedule = NULL; key 1178 source4/heimdal/lib/krb5/crypto.c (*kt->schedule)(context, kt, key); key 1188 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1199 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1218 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1232 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1237 source4/heimdal/lib/krb5/crypto.c struct evp_schedule *ctx = key->schedule->data; key 1265 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1270 source4/heimdal/lib/krb5/crypto.c struct evp_schedule *ctx = key->schedule->data; key 1303 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1309 source4/heimdal/lib/krb5/crypto.c return des_checksum(context, EVP_md4(), key, data, len, cksum); key 1314 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1320 source4/heimdal/lib/krb5/crypto.c return des_verify(context, EVP_md5(), key, data, len, C); key 1325 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1338 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1344 source4/heimdal/lib/krb5/crypto.c return des_checksum(context, EVP_md5(), key, data, len, C); key 1349 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1355 source4/heimdal/lib/krb5/crypto.c return des_verify(context, EVP_md5(), key, data, len, C); key 1361 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1367 source4/heimdal/lib/krb5/crypto.c return des_checksum(context, EVP_md5(), key, data, len, C); key 1372 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1378 source4/heimdal/lib/krb5/crypto.c return des_verify(context, EVP_md5(), key, data, len, C); key 1384 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1406 source4/heimdal/lib/krb5/crypto.c unsigned char *key; key 1421 source4/heimdal/lib/krb5/crypto.c if(keyblock->key->keyvalue.length > cm->blocksize){ key 1424 source4/heimdal/lib/krb5/crypto.c keyblock->key->keyvalue.data, key 1425 source4/heimdal/lib/krb5/crypto.c keyblock->key->keyvalue.length, key 1428 source4/heimdal/lib/krb5/crypto.c key = result->checksum.data; key 1431 source4/heimdal/lib/krb5/crypto.c key = keyblock->key->keyvalue.data; key 1432 source4/heimdal/lib/krb5/crypto.c key_len = keyblock->key->keyvalue.length; key 1435 source4/heimdal/lib/krb5/crypto.c ipad[i] ^= key[i]; key 1436 source4/heimdal/lib/krb5/crypto.c opad[i] ^= key[i]; key 1459 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key, key 1473 source4/heimdal/lib/krb5/crypto.c kd.key = key; key 1486 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1500 source4/heimdal/lib/krb5/crypto.c ret = hmac(context, c, data, len, usage, key, &res); key 1513 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 1537 source4/heimdal/lib/krb5/crypto.c ret = hmac(context, c, signature, sizeof(signature), 0, key, &ksign_c); key 1542 source4/heimdal/lib/krb5/crypto.c ksign.key = &kb; key 1708 source4/heimdal/lib/krb5/crypto.c struct key_data **key) key 1713 source4/heimdal/lib/krb5/crypto.c ret = _get_derived_key(context, crypto, usage, key); key 1717 source4/heimdal/lib/krb5/crypto.c *key = _new_derived_key(crypto, 0xff/* KRB5_KU_RFC1510_VARIANT */); key 1718 source4/heimdal/lib/krb5/crypto.c if(*key == NULL) { key 1722 source4/heimdal/lib/krb5/crypto.c ret = krb5_copy_keyblock(context, crypto->key.key, &(*key)->key); key 1725 source4/heimdal/lib/krb5/crypto.c for(i = 0; i < (*key)->key->keyvalue.length; i++) key 1726 source4/heimdal/lib/krb5/crypto.c ((unsigned char*)(*key)->key->keyvalue.data)[i] ^= 0xF0; key 1728 source4/heimdal/lib/krb5/crypto.c *key = &crypto->key; key 1731 source4/heimdal/lib/krb5/crypto.c ret = _key_schedule(context, *key); key 1777 source4/heimdal/lib/krb5/crypto.c (crypto->key.key->keytype == KEYTYPE_ARCFOUR); key 2003 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2015 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2022 source4/heimdal/lib/krb5/crypto.c struct evp_schedule *ctx = key->schedule->data; key 2045 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2052 source4/heimdal/lib/krb5/crypto.c struct evp_schedule *ctx = key->schedule->data; key 2064 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2071 source4/heimdal/lib/krb5/crypto.c struct evp_schedule *ctx = key->schedule->data; key 2074 source4/heimdal/lib/krb5/crypto.c memcpy(&ivec, key->key->keyvalue.data, sizeof(ivec)); key 2083 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2092 source4/heimdal/lib/krb5/crypto.c DES_key_schedule *s = key->schedule->data; key 2101 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2109 source4/heimdal/lib/krb5/crypto.c DES_key_schedule *s = key->schedule->data; key 2110 source4/heimdal/lib/krb5/crypto.c memcpy(&ivec, key->key->keyvalue.data, sizeof(ivec)); key 2125 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2149 source4/heimdal/lib/krb5/crypto.c ret = hmac(NULL, c, t, sizeof(t), 0, key, &k1_c); key 2158 source4/heimdal/lib/krb5/crypto.c ke.key = &kb; key 2168 source4/heimdal/lib/krb5/crypto.c ke.key = &kb; key 2188 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2213 source4/heimdal/lib/krb5/crypto.c ret = hmac(NULL, c, t, sizeof(t), 0, key, &k1_c); key 2222 source4/heimdal/lib/krb5/crypto.c ke.key = &kb; key 2235 source4/heimdal/lib/krb5/crypto.c ke.key = &kb; key 2287 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 2301 source4/heimdal/lib/krb5/crypto.c return ARCFOUR_subencrypt (context, key, data, len, keyusage, ivec); key 2303 source4/heimdal/lib/krb5/crypto.c return ARCFOUR_subdecrypt (context, key, data, len, keyusage, ivec); key 2339 source4/heimdal/lib/krb5/crypto.c ret = krb5_derive_key(context, crypto->key.key, key 2882 source4/heimdal/lib/krb5/crypto.c ret = _key_schedule(context, &crypto->key); key 2885 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, block_sz, 1, 0, ivec); key 2926 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, tmp, sz, TRUE, usage, ivec); key 3045 source4/heimdal/lib/krb5/crypto.c ret = _key_schedule(context, &crypto->key); key 3050 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, len, 0, 0, ivec); key 3107 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, len, FALSE, usage, ivec); key 3770 source4/heimdal/lib/krb5/crypto.c unsigned char *k, size_t len, struct key_data *key) key 3772 source4/heimdal/lib/krb5/crypto.c DES3_random_to_key(context, key->key, k, len); key 3774 source4/heimdal/lib/krb5/crypto.c if (key->schedule) { key 3775 source4/heimdal/lib/krb5/crypto.c krb5_free_data(context, key->schedule); key 3776 source4/heimdal/lib/krb5/crypto.c key->schedule = NULL; key 3783 source4/heimdal/lib/krb5/crypto.c struct key_data *key, key 3792 source4/heimdal/lib/krb5/crypto.c ret = _key_schedule(context, key); key 3813 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize, key 3826 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, c, len, 1, 0, NULL); key 3845 source4/heimdal/lib/krb5/crypto.c DES3_postproc(context, k, nblocks * et->blocksize, key); key 3849 source4/heimdal/lib/krb5/crypto.c memcpy(key->key->keyvalue.data, k, key->key->keyvalue.length); key 3858 source4/heimdal/lib/krb5/crypto.c if (key->schedule) { key 3859 source4/heimdal/lib/krb5/crypto.c krb5_free_data(context, key->schedule); key 3860 source4/heimdal/lib/krb5/crypto.c key->schedule = NULL; key 3878 source4/heimdal/lib/krb5/crypto.c return &d->key; key 3883 source4/heimdal/lib/krb5/crypto.c const krb5_keyblock *key, key 3903 source4/heimdal/lib/krb5/crypto.c ret = krb5_copy_keyblock(context, key, &d.key); key 3910 source4/heimdal/lib/krb5/crypto.c ret = krb5_copy_keyblock(context, d.key, derived_key); key 3919 source4/heimdal/lib/krb5/crypto.c struct key_data **key) key 3927 source4/heimdal/lib/krb5/crypto.c *key = &crypto->key_usage[i].key; key 3935 source4/heimdal/lib/krb5/crypto.c krb5_copy_keyblock(context, crypto->key.key, &d->key); key 3938 source4/heimdal/lib/krb5/crypto.c *key = d; key 3945 source4/heimdal/lib/krb5/crypto.c const krb5_keyblock *key, key 3956 source4/heimdal/lib/krb5/crypto.c etype = key->keytype; key 3966 source4/heimdal/lib/krb5/crypto.c if((*crypto)->et->keytype->size != key->keyvalue.length) { key 3973 source4/heimdal/lib/krb5/crypto.c ret = krb5_copy_keyblock(context, key, &(*crypto)->key.key); key 3979 source4/heimdal/lib/krb5/crypto.c (*crypto)->key.schedule = NULL; key 3986 source4/heimdal/lib/krb5/crypto.c free_key_data(krb5_context context, struct key_data *key, key 3989 source4/heimdal/lib/krb5/crypto.c krb5_free_keyblock(context, key->key); key 3990 source4/heimdal/lib/krb5/crypto.c if(key->schedule) { key 3992 source4/heimdal/lib/krb5/crypto.c (*et->keytype->cleanup)(context, key); key 3993 source4/heimdal/lib/krb5/crypto.c memset(key->schedule->data, 0, key->schedule->length); key 3994 source4/heimdal/lib/krb5/crypto.c krb5_free_data(context, key->schedule); key 4002 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &ku->key, et); key 4014 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &crypto->key, crypto->et); key 4116 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 4132 source4/heimdal/lib/krb5/crypto.c ALLOC(kd.key, 1); key 4133 source4/heimdal/lib/krb5/crypto.c if(kd.key == NULL) { key 4138 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); key 4140 source4/heimdal/lib/krb5/crypto.c free(kd.key); key 4143 source4/heimdal/lib/krb5/crypto.c kd.key->keytype = etype; key 4146 source4/heimdal/lib/krb5/crypto.c krb5_free_keyblock(context, kd.key); key 4169 source4/heimdal/lib/krb5/crypto.c ret = krb5_copy_keyblock_contents(context, kd.key, key); key 4271 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 4289 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); key 4292 source4/heimdal/lib/krb5/crypto.c key->keytype = type; key 4294 source4/heimdal/lib/krb5/crypto.c (*et->keytype->random_to_key)(context, key, data, size); key 4296 source4/heimdal/lib/krb5/crypto.c memcpy(key->keyvalue.data, data, et->keytype->size); key 4308 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 4354 source4/heimdal/lib/krb5/crypto.c ret = krb5_random_to_key(context, type, keydata, keylen, key); key 4458 source4/heimdal/lib/krb5/crypto.c krb5_keyblock *key) key 4529 source4/heimdal/lib/krb5/crypto.c ret = krb5_random_to_key(context, enctype, keydata, keylen, key); key 40 source4/heimdal/lib/krb5/generate_seq_number.c const krb5_keyblock *key, key 49 source4/heimdal/lib/krb5/generate_seq_number.c ret = krb5_generate_subkey (context, key, &subkey); key 40 source4/heimdal/lib/krb5/generate_subkey.c const krb5_keyblock *key, key 43 source4/heimdal/lib/krb5/generate_subkey.c return krb5_generate_subkey_extended(context, key, key->keytype, subkey); key 48 source4/heimdal/lib/krb5/generate_subkey.c const krb5_keyblock *key, key 61 source4/heimdal/lib/krb5/generate_subkey.c etype = key->keytype; /* use session key etype */ key 84 source4/heimdal/lib/krb5/get_cred.c krb5_keyblock *key) key 106 source4/heimdal/lib/krb5/get_cred.c ret = krb5_crypto_init(context, key, 0, &crypto); key 245 source4/heimdal/lib/krb5/get_cred.c krb5_keyblock *key = NULL; key 257 source4/heimdal/lib/krb5/get_cred.c ret = krb5_generate_subkey (context, &krbtgt->session, &key); key 263 source4/heimdal/lib/krb5/get_cred.c ret = krb5_auth_con_setlocalsubkey(context, ac, key); key 265 source4/heimdal/lib/krb5/get_cred.c if (key) key 266 source4/heimdal/lib/krb5/get_cred.c krb5_free_keyblock (context, key); key 273 source4/heimdal/lib/krb5/get_cred.c key ? key : &krbtgt->session); key 275 source4/heimdal/lib/krb5/get_cred.c if (key) key 276 source4/heimdal/lib/krb5/get_cred.c krb5_free_keyblock (context, key); key 287 source4/heimdal/lib/krb5/get_cred.c if (key) key 288 source4/heimdal/lib/krb5/get_cred.c krb5_free_keyblock (context, key); key 292 source4/heimdal/lib/krb5/get_cred.c *subkey = key; key 344 source4/heimdal/lib/krb5/get_cred.c krb5_keyblock *key, key 354 source4/heimdal/lib/krb5/get_cred.c ret = krb5_crypto_init(context, key, 0, &crypto); key 368 source4/heimdal/lib/krb5/get_for_creds.c copy_EncryptionKey (&out_creds->session, &krb_cred_info->key); key 81 source4/heimdal/lib/krb5/get_in_tkt.c const krb5_keyblock const * key) key 117 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_crypto_init(context, key, 0, &session); key 209 source4/heimdal/lib/krb5/get_in_tkt.c krb5_keyblock const * key) key 247 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_crypto_init(context, key, 0, &crypto); key 305 source4/heimdal/lib/krb5/get_in_tkt.c krb5_keyblock *key, key 315 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_crypto_init(context, key, 0, &crypto); key 350 source4/heimdal/lib/krb5/get_in_tkt.c krb5_keyblock *key, key 370 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*decrypt_proc)(context, key, key_usage, decryptarg, rep); key 378 source4/heimdal/lib/krb5/get_in_tkt.c creds->session.keytype = rep->enc_part.key.keytype; key 380 source4/heimdal/lib/krb5/get_in_tkt.c rep->enc_part.key.keyvalue.data, key 381 source4/heimdal/lib/krb5/get_in_tkt.c rep->enc_part.key.keyvalue.length); key 552 source4/heimdal/lib/krb5/get_in_tkt.c memset (rep->enc_part.key.keyvalue.data, 0, key 553 source4/heimdal/lib/krb5/get_in_tkt.c rep->enc_part.key.keyvalue.length); key 560 source4/heimdal/lib/krb5/get_in_tkt.c krb5_enctype etype, krb5_keyblock *key) key 581 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_crypto_init(context, key, 0, &crypto); key 645 source4/heimdal/lib/krb5/get_in_tkt.c krb5_keyblock *key; key 647 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*key_proc)(context, enctypes[i], *salt, keyseed, &key); key 651 source4/heimdal/lib/krb5/get_in_tkt.c enctypes[i], key); key 652 source4/heimdal/lib/krb5/get_in_tkt.c krb5_free_keyblock (context, key); key 901 source4/heimdal/lib/krb5/get_in_tkt.c krb5_keyblock *key; key 1003 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*key_proc)(context, etype, salt, keyseed, &key); key 1010 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*key_proc)(context, etype, salt, keyseed, &key); key 1024 source4/heimdal/lib/krb5/get_in_tkt.c key, key 1033 source4/heimdal/lib/krb5/get_in_tkt.c memset (key->keyvalue.data, 0, key->keyvalue.length); key 1034 source4/heimdal/lib/krb5/get_in_tkt.c krb5_free_keyblock_contents (context, key); key 1035 source4/heimdal/lib/krb5/get_in_tkt.c free (key); key 43 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c krb5_keyblock **key) key 66 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c ret = krb5_copy_keyblock (context, &entry.keyblock, key); key 65 source4/heimdal/lib/krb5/init_creds_pw.c krb5_keyblock **key) key 78 source4/heimdal/lib/krb5/init_creds_pw.c *key = malloc(sizeof(**key)); key 79 source4/heimdal/lib/krb5/init_creds_pw.c if (*key == NULL) key 82 source4/heimdal/lib/krb5/init_creds_pw.c salt, opaque, *key); key 84 source4/heimdal/lib/krb5/init_creds_pw.c free(*key); key 85 source4/heimdal/lib/krb5/init_creds_pw.c *key = NULL; key 483 source4/heimdal/lib/krb5/init_creds_pw.c krb5_keyblock **key) key 485 source4/heimdal/lib/krb5/init_creds_pw.c return krb5_copy_keyblock (context, keyseed, key); key 871 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype, krb5_keyblock *key) key 893 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_crypto_init(context, key, 0, &crypto); key 952 source4/heimdal/lib/krb5/init_creds_pw.c krb5_keyblock *key; key 955 source4/heimdal/lib/krb5/init_creds_pw.c *salt, s2kparams, &key); key 958 source4/heimdal/lib/krb5/init_creds_pw.c ret = make_pa_enc_timestamp (context, md, enctypes[i], key); key 959 source4/heimdal/lib/krb5/init_creds_pw.c krb5_free_keyblock (context, key); key 1011 source4/heimdal/lib/krb5/init_creds_pw.c krb5_keyblock **key) key 1016 source4/heimdal/lib/krb5/init_creds_pw.c salt, s2kparams, key); key 1142 source4/heimdal/lib/krb5/init_creds_pw.c krb5_keyblock **key) key 1191 source4/heimdal/lib/krb5/init_creds_pw.c key); key 1198 source4/heimdal/lib/krb5/init_creds_pw.c paid.salt, paid.s2kparams, etype, key); key 1349 source4/heimdal/lib/krb5/init_creds_pw.c krb5_keyblock *key = NULL; key 1362 source4/heimdal/lib/krb5/init_creds_pw.c &ctx->as_req, &rep, hi, &key); key 1369 source4/heimdal/lib/krb5/init_creds_pw.c key, key 1377 source4/heimdal/lib/krb5/init_creds_pw.c krb5_free_keyblock(context, key); key 1561 source4/heimdal/lib/krb5/init_creds_pw.c krb5_keyblock **key) key 1563 source4/heimdal/lib/krb5/init_creds_pw.c return krb5_copy_keyblock (context, keyseed, key); key 1061 source4/heimdal/lib/krb5/kcm.c krb5_keyblock *key) key 1091 source4/heimdal/lib/krb5/kcm.c ret = krb5_store_keyblock(request, *key); key 107 source4/heimdal/lib/krb5/keyblock.c krb5_keyblock *key) key 112 source4/heimdal/lib/krb5/keyblock.c memset(key, 0, sizeof(*key)); key 125 source4/heimdal/lib/krb5/keyblock.c ret = krb5_data_copy(&key->keyvalue, data, len); key 130 source4/heimdal/lib/krb5/keyblock.c key->keytype = type; key 192 source4/heimdal/lib/krb5/keytab.c krb5_keyblock **key) key 210 source4/heimdal/lib/krb5/keytab.c ret = krb5_copy_keyblock (context, &entry.keyblock, key); key 46 source4/heimdal/lib/krb5/mit_glue.c const krb5_keyblock *key, key 54 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, key, 0, &crypto); key 66 source4/heimdal/lib/krb5/mit_glue.c krb5_c_verify_checksum(krb5_context context, const krb5_keyblock *key, key 76 source4/heimdal/lib/krb5/mit_glue.c key, usage, data, &data_cksum); key 190 source4/heimdal/lib/krb5/mit_glue.c krb5_keyblock key; key 192 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_generate_random_keyblock(context, enctype, &key); key 196 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, &key, 0, &crypto); key 197 source4/heimdal/lib/krb5/mit_glue.c krb5_free_keyblock_contents(context, &key); key 208 source4/heimdal/lib/krb5/mit_glue.c const krb5_keyblock key, key 217 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, &key, input->enctype, &crypto); key 248 source4/heimdal/lib/krb5/mit_glue.c const krb5_keyblock *key, key 257 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, key, 0, &crypto); key 296 source4/heimdal/lib/krb5/mit_glue.c krb5_keyblock key; key 298 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_generate_random_keyblock(context, enctype, &key); key 302 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, &key, 0, &crypto); key 303 source4/heimdal/lib/krb5/mit_glue.c krb5_free_keyblock_contents(context, &key); key 356 source4/heimdal/lib/krb5/mit_glue.c const krb5_keyblock *key, key 363 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, key, 0, &crypto); key 53 source4/heimdal/lib/krb5/mk_priv.c krb5_keyblock *key; key 62 source4/heimdal/lib/krb5/mk_priv.c key = auth_context->local_subkey; key 64 source4/heimdal/lib/krb5/mk_priv.c key = auth_context->remote_subkey; key 66 source4/heimdal/lib/krb5/mk_priv.c key = auth_context->keyblock; key 109 source4/heimdal/lib/krb5/mk_priv.c s.enc_part.etype = key->keytype; key 112 source4/heimdal/lib/krb5/mk_priv.c ret = krb5_crypto_init(context, key, 0, &crypto); key 102 source4/heimdal/lib/krb5/n-fold.c _krb5_n_fold(const void *str, size_t len, void *key, size_t size) key 116 source4/heimdal/lib/krb5/n-fold.c memset(key, 0, size); key 124 source4/heimdal/lib/krb5/n-fold.c add1(key, tmp, size); key 415 source4/heimdal/lib/krb5/pac.c const krb5_keyblock *key) key 457 source4/heimdal/lib/krb5/pac.c ret = krb5_crypto_init(context, key, 0, &crypto); key 481 source4/heimdal/lib/krb5/pac.c const krb5_keyblock *key, key 489 source4/heimdal/lib/krb5/pac.c ret = krb5_crypto_init(context, key, 0, &crypto); key 831 source4/heimdal/lib/krb5/pac.c const krb5_keyblock *key, key 839 source4/heimdal/lib/krb5/pac.c ret = krb5_crypto_init(context, key, 0, &crypto); key 784 source4/heimdal/lib/krb5/pkinit.c krb5_keyblock **key) key 808 source4/heimdal/lib/krb5/pkinit.c *key = malloc (sizeof (**key)); key 809 source4/heimdal/lib/krb5/pkinit.c if (*key == NULL) { key 816 source4/heimdal/lib/krb5/pkinit.c ret = copy_EncryptionKey(&key_pack.replyKey, *key); key 821 source4/heimdal/lib/krb5/pkinit.c free(*key); key 822 source4/heimdal/lib/krb5/pkinit.c *key = NULL; key 832 source4/heimdal/lib/krb5/pkinit.c krb5_keyblock **key) key 873 source4/heimdal/lib/krb5/pkinit.c *key = malloc (sizeof (**key)); key 874 source4/heimdal/lib/krb5/pkinit.c if (*key == NULL) { key 881 source4/heimdal/lib/krb5/pkinit.c ret = copy_EncryptionKey(&key_pack.replyKey, *key); key 886 source4/heimdal/lib/krb5/pkinit.c free(*key); key 887 source4/heimdal/lib/krb5/pkinit.c *key = NULL; key 992 source4/heimdal/lib/krb5/pkinit.c krb5_keyblock **key) key 1098 source4/heimdal/lib/krb5/pkinit.c ret = get_reply_key(context, &content, req_buffer, key); key 1100 source4/heimdal/lib/krb5/pkinit.c ret = get_reply_key_win(context, &content, nonce, key); key 1103 source4/heimdal/lib/krb5/pkinit.c ret = get_reply_key(context, &content, req_buffer, key); key 1132 source4/heimdal/lib/krb5/pkinit.c krb5_keyblock **key) key 1264 source4/heimdal/lib/krb5/pkinit.c *key = malloc (sizeof (**key)); key 1265 source4/heimdal/lib/krb5/pkinit.c if (*key == NULL) { key 1276 source4/heimdal/lib/krb5/pkinit.c *key); key 1280 source4/heimdal/lib/krb5/pkinit.c free(*key); key 1281 source4/heimdal/lib/krb5/pkinit.c *key = NULL; key 1311 source4/heimdal/lib/krb5/pkinit.c krb5_keyblock **key) key 1367 source4/heimdal/lib/krb5/pkinit.c nonce, pa, key); key 1371 source4/heimdal/lib/krb5/pkinit.c ctx, etype, hi, nonce, req_buffer, pa, key); key 1423 source4/heimdal/lib/krb5/pkinit.c ctx, etype, hi, nonce, req_buffer, pa, key); key 276 source4/heimdal/lib/krb5/rd_cred.c copy_EncryptionKey (&kci->key, &creds->session); key 50 source4/heimdal/lib/krb5/rd_priv.c krb5_keyblock *key; key 85 source4/heimdal/lib/krb5/rd_priv.c key = auth_context->remote_subkey; key 87 source4/heimdal/lib/krb5/rd_priv.c key = auth_context->local_subkey; key 89 source4/heimdal/lib/krb5/rd_priv.c key = auth_context->keyblock; key 91 source4/heimdal/lib/krb5/rd_priv.c ret = krb5_crypto_init(context, key, 0, &crypto); key 40 source4/heimdal/lib/krb5/rd_req.c krb5_keyblock *key, key 49 source4/heimdal/lib/krb5/rd_req.c ret = krb5_crypto_init(context, key, 0, &crypto); key 69 source4/heimdal/lib/krb5/rd_req.c EncryptionKey *key, key 79 source4/heimdal/lib/krb5/rd_req.c ret = krb5_crypto_init(context, key, 0, &crypto); key 222 source4/heimdal/lib/krb5/rd_req.c krb5_keyblock *key, key 228 source4/heimdal/lib/krb5/rd_req.c ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); key 275 source4/heimdal/lib/krb5/rd_req.c krb5_keyblock *key; key 288 source4/heimdal/lib/krb5/rd_req.c ret = krb5_auth_con_getkey(context, ac, &key); key 293 source4/heimdal/lib/krb5/rd_req.c ret = krb5_crypto_init(context, key, 0, &crypto); key 305 source4/heimdal/lib/krb5/rd_req.c krb5_free_keyblock(context, key); key 393 source4/heimdal/lib/krb5/rd_req.c &t->ticket.key, key 478 source4/heimdal/lib/krb5/rd_req.c ret = krb5_copy_keyblock(context, &t->ticket.key, &ac->keyblock); key 292 source4/heimdal/lib/krb5/ticket.c &ticket->ticket.key, ad, 0); key 321 source4/heimdal/lib/krb5/v4_glue.c decrypt_etext(krb5_context context, const krb5_keyblock *key, key 327 source4/heimdal/lib/krb5/v4_glue.c ret = krb5_crypto_init(context, key, ETYPE_DES_PCBC_NONE, &crypto); key 347 source4/heimdal/lib/krb5/v4_glue.c const krb5_keyblock *key, key 370 source4/heimdal/lib/krb5/v4_glue.c ret = krb5_crypto_init(context, key, ETYPE_DES_PCBC_NONE, &crypto); key 419 source4/heimdal/lib/krb5/v4_glue.c const krb5_keyblock *key, key 451 source4/heimdal/lib/krb5/v4_glue.c ret = storage_to_etext(context, sp, key, enc_data); key 476 source4/heimdal/lib/krb5/v4_glue.c const krb5_keyblock *key, key 511 source4/heimdal/lib/krb5/v4_glue.c ret = storage_to_etext(context, sp, key, enc_data); key 649 source4/heimdal/lib/krb5/v4_glue.c const krb5_keyblock *key, key 667 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, decrypt_etext(context, key, enc_ticket, &ticket), error); key 747 source4/heimdal/lib/krb5/v4_glue.c const krb5_keyblock *key, key 828 source4/heimdal/lib/krb5/v4_glue.c ret = _krb5_krb_decomp_ticket(context, &ticket, key, local_realm, key 877 source4/heimdal/lib/ntlm/ntlm.c DES_cblock key; key 880 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[0] = hash[0]; key 881 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[1] = (hash[0] << 7) | (hash[1] >> 1); key 882 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[2] = (hash[1] << 6) | (hash[2] >> 2); key 883 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[3] = (hash[2] << 5) | (hash[3] >> 3); key 884 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[4] = (hash[3] << 4) | (hash[4] >> 4); key 885 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[5] = (hash[4] << 3) | (hash[5] >> 5); key 886 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[6] = (hash[5] << 2) | (hash[6] >> 6); key 887 source4/heimdal/lib/ntlm/ntlm.c ((unsigned char*)key)[7] = (hash[6] << 1); key 889 source4/heimdal/lib/ntlm/ntlm.c DES_set_odd_parity(&key); key 890 source4/heimdal/lib/ntlm/ntlm.c DES_set_key_unchecked(&key, &sched); key 893 source4/heimdal/lib/ntlm/ntlm.c memset(key, 0, sizeof(key)); key 909 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_nt_key(const char *password, struct ntlm_buf *key) key 915 source4/heimdal/lib/ntlm/ntlm.c key->data = malloc(MD5_DIGEST_LENGTH); key 916 source4/heimdal/lib/ntlm/ntlm.c if (key->data == NULL) key 918 source4/heimdal/lib/ntlm/ntlm.c key->length = MD5_DIGEST_LENGTH; key 922 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_free_buf(key); key 927 source4/heimdal/lib/ntlm/ntlm.c MD4_Final(key->data, &ctx); key 947 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_calculate_ntlm1(void *key, size_t len, key 956 source4/heimdal/lib/ntlm/ntlm.c memcpy(res, key, len); key 986 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_build_ntlm1_master(void *key, size_t len, key 1017 source4/heimdal/lib/ntlm/ntlm.c MD4_Update(&ctx, key, len); key 1048 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_ntlmv2_key(const void *key, size_t len, key 1057 source4/heimdal/lib/ntlm/ntlm.c HMAC_Init_ex(&c, key, len, EVP_md5(), NULL); key 1117 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_calculate_ntlm2(const void *key, size_t len, key 1141 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2); key 1220 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_verify_ntlm2(const void *key, size_t len, key 1251 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2); key 70 source4/heimdal/lib/roken/resolve.c DECL(key), key 259 source4/heimdal/lib/roken/resolve.c rr->u.key = malloc (sizeof(*rr->u.key) + key_len - 1); key 260 source4/heimdal/lib/roken/resolve.c if (rr->u.key == NULL) { key 265 source4/heimdal/lib/roken/resolve.c rr->u.key->flags = (p[0] << 8) | p[1]; key 266 source4/heimdal/lib/roken/resolve.c rr->u.key->protocol = p[2]; key 267 source4/heimdal/lib/roken/resolve.c rr->u.key->algorithm = p[3]; key 268 source4/heimdal/lib/roken/resolve.c rr->u.key->key_len = key_len; key 269 source4/heimdal/lib/roken/resolve.c memcpy (rr->u.key->key_data, p + 4, key_len); key 251 source4/heimdal/lib/roken/resolve.h struct key_record *key; key 41 source4/heimdal/lib/wind/combining.c translation_cmp(const void *key, const void *data) key 43 source4/heimdal/lib/wind/combining.c const struct translation *t1 = (const struct translation *)key; key 46 source4/heimdal/lib/wind/combining.c return t1->key - t2->key; key 46 source4/heimdal/lib/wind/map.c translation_cmp(const void *key, const void *data) key 48 source4/heimdal/lib/wind/map.c const struct translation *t1 = (const struct translation *)key; key 51 source4/heimdal/lib/wind/map.c return t1->key - t2->key; key 48 source4/heimdal/lib/wind/normalize.c translation_cmp(const void *key, const void *data) key 50 source4/heimdal/lib/wind/normalize.c const struct translation *t1 = (const struct translation *)key; key 53 source4/heimdal/lib/wind/normalize.c return t1->key - t2->key; key 335 source4/kdc/hdb-samba4.c Key key; key 337 source4/kdc/hdb-samba4.c key.mkvno = 0; key 338 source4/kdc/hdb-samba4.c key.salt = NULL; /* No salt for this enc type */ key 343 source4/kdc/hdb-samba4.c &key.key); key 348 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; key 355 source4/kdc/hdb-samba4.c Key key; key 372 source4/kdc/hdb-samba4.c key.mkvno = 0; key 373 source4/kdc/hdb-samba4.c key.salt = NULL; key 380 source4/kdc/hdb-samba4.c key.salt = calloc(1, sizeof(*key.salt)); key 381 source4/kdc/hdb-samba4.c if (key.salt == NULL) { key 386 source4/kdc/hdb-samba4.c key.salt->type = hdb_pw_salt; key 388 source4/kdc/hdb-samba4.c ret = krb5_data_copy(&key.salt->salt, salt.data, salt.length); key 390 source4/kdc/hdb-samba4.c free(key.salt); key 391 source4/kdc/hdb-samba4.c key.salt = NULL; key 402 source4/kdc/hdb-samba4.c &key.key); key 404 source4/kdc/hdb-samba4.c if (key.salt) { key 405 source4/kdc/hdb-samba4.c free_Salt(key.salt); key 406 source4/kdc/hdb-samba4.c free(key.salt); key 407 source4/kdc/hdb-samba4.c key.salt = NULL; key 412 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; key 418 source4/kdc/hdb-samba4.c Key key; key 435 source4/kdc/hdb-samba4.c key.mkvno = 0; key 436 source4/kdc/hdb-samba4.c key.salt = NULL; key 443 source4/kdc/hdb-samba4.c key.salt = calloc(1, sizeof(*key.salt)); key 444 source4/kdc/hdb-samba4.c if (key.salt == NULL) { key 449 source4/kdc/hdb-samba4.c key.salt->type = hdb_pw_salt; key 451 source4/kdc/hdb-samba4.c ret = krb5_data_copy(&key.salt->salt, salt.data, salt.length); key 453 source4/kdc/hdb-samba4.c free(key.salt); key 454 source4/kdc/hdb-samba4.c key.salt = NULL; key 463 source4/kdc/hdb-samba4.c &key.key); key 465 source4/kdc/hdb-samba4.c if (key.salt) { key 466 source4/kdc/hdb-samba4.c free_Salt(key.salt); key 467 source4/kdc/hdb-samba4.c free(key.salt); key 468 source4/kdc/hdb-samba4.c key.salt = NULL; key 473 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; key 678 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype; key 794 source4/kdc/hdb-samba4.c Key key; key 798 source4/kdc/hdb-samba4.c key.mkvno = 0; key 799 source4/kdc/hdb-samba4.c key.salt = NULL; /* No salt for this enc type */ key 809 source4/kdc/hdb-samba4.c &key.key); key 811 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key; key 867 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype; key 576 source4/kdc/kdc.c Key *key; key 635 source4/kdc/kdc.c ret = hdb_enctype2key(kdc->smb_krb5_context->krb5_context, &ent.entry, etype, &key); key 643 source4/kdc/kdc.c keyblock = key->key; key 475 source4/lib/ldb/ldb_tdb/ldb_index.c unsigned int *v_idx, const char *key) key 479 source4/lib/ldb/ldb_tdb/ldb_index.c if (ldb_attr_cmp(msg->elements[i].name, key) == 0) { key 869 source4/lib/ldb/ldb_tdb/ldb_index.c struct ldb_dn *key; key 885 source4/lib/ldb/ldb_tdb/ldb_index.c key = ltdb_index_key(ldb, LTDB_IDXONE, &val); key 886 source4/lib/ldb/ldb_tdb/ldb_index.c if (!key) { key 897 source4/lib/ldb/ldb_tdb/ldb_index.c ret = ltdb_search_dn1_index(module, key, msg); key 898 source4/lib/ldb/ldb_tdb/ldb_index.c talloc_free(key); key 1505 source4/lib/ldb/ldb_tdb/ldb_index.c static int delete_index(struct tdb_context *tdb, TDB_DATA key, TDB_DATA data, void *state) key 1508 source4/lib/ldb/ldb_tdb/ldb_index.c if (strncmp((char *)key.dptr, dn, strlen(dn)) == 0) { key 1509 source4/lib/ldb/ldb_tdb/ldb_index.c return tdb_delete(tdb, key); key 1517 source4/lib/ldb/ldb_tdb/ldb_index.c static int re_index(struct tdb_context *tdb, TDB_DATA key, TDB_DATA data, void *state) key 1528 source4/lib/ldb/ldb_tdb/ldb_index.c if (strncmp((char *)key.dptr, "DN=@", 4) == 0 || key 1529 source4/lib/ldb/ldb_tdb/ldb_index.c strncmp((char *)key.dptr, "DN=", 3) != 0) { key 1554 source4/lib/ldb/ldb_tdb/ldb_index.c if (strcmp((char *)key2.dptr, (char *)key.dptr) != 0) { key 1555 source4/lib/ldb/ldb_tdb/ldb_index.c tdb_delete(tdb, key); key 1561 source4/lib/ldb/ldb_tdb/ldb_index.c dn = (char *)key.dptr + 3; key 374 source4/lib/ldb/ldb_tdb/ldb_search.c static int search_func(struct tdb_context *tdb, TDB_DATA key, TDB_DATA data, void *state) key 384 source4/lib/ldb/ldb_tdb/ldb_search.c if (key.dsize < 4 || key 385 source4/lib/ldb/ldb_tdb/ldb_search.c strncmp((char *)key.dptr, "DN=", 3) != 0) { key 403 source4/lib/ldb/ldb_tdb/ldb_search.c (char *)key.dptr + 3); key 117 source4/lib/ldb/ldb_tdb/ldb_tdb.c TDB_DATA key; key 148 source4/lib/ldb/ldb_tdb/ldb_tdb.c key.dptr = (uint8_t *)key_str; key 149 source4/lib/ldb/ldb_tdb/ldb_tdb.c key.dsize = strlen(key_str) + 1; key 151 source4/lib/ldb/ldb_tdb/ldb_tdb.c return key; key 155 source4/lib/ldb/ldb_tdb/ldb_tdb.c key.dptr = NULL; key 156 source4/lib/ldb/ldb_tdb/ldb_tdb.c key.dsize = 0; key 157 source4/lib/ldb/ldb_tdb/ldb_tdb.c return key; key 604 source4/lib/ldb/pyldb.c PyObject *key, *value; key 625 source4/lib/ldb/pyldb.c while (PyDict_Next(py_msg, &dict_pos, &key, &value)) { key 626 source4/lib/ldb/pyldb.c char *key_str = PyString_AsString(key); key 26 source4/lib/registry/dir.c struct hive_key key; key 45 source4/lib/registry/dir.c struct dir_key *key = talloc(mem_ctx, struct dir_key); key 46 source4/lib/registry/dir.c key->key.ops = ®_backend_dir; key 47 source4/lib/registry/dir.c key->path = talloc_steal(key, path); key 48 source4/lib/registry/dir.c *result = (struct hive_key *)key; key 148 source4/lib/registry/dir.c ret->key.ops = ®_backend_dir; key 206 source4/lib/registry/dir.c const char *location, struct hive_key **key) key 214 source4/lib/registry/dir.c dk->key.ops = ®_backend_dir; key 216 source4/lib/registry/dir.c *key = (struct hive_key *)dk; key 221 source4/lib/registry/dir.c const char *location, struct hive_key **key) key 224 source4/lib/registry/dir.c *key = NULL; key 228 source4/lib/registry/dir.c return reg_open_directory(parent_ctx, location, key); key 231 source4/lib/registry/dir.c static WERROR reg_dir_get_info(TALLOC_CTX *ctx, const struct hive_key *key, key 241 source4/lib/registry/dir.c const struct dir_key *dk = talloc_get_type(key, struct dir_key); key 245 source4/lib/registry/dir.c SMB_ASSERT(key != NULL); key 307 source4/lib/registry/dir.c static WERROR reg_dir_set_value(struct hive_key *key, const char *name, key 310 source4/lib/registry/dir.c const struct dir_key *dk = talloc_get_type(key, struct dir_key); key 322 source4/lib/registry/dir.c struct hive_key *key, const char *name, key 325 source4/lib/registry/dir.c const struct dir_key *dk = talloc_get_type(key, struct dir_key); key 345 source4/lib/registry/dir.c struct hive_key *key, int idx, key 349 source4/lib/registry/dir.c const struct dir_key *dk = talloc_get_type(key, struct dir_key); key 369 source4/lib/registry/dir.c W_ERROR_NOT_OK_RETURN(reg_dir_get_value(mem_ctx, key, key 383 source4/lib/registry/dir.c static WERROR reg_dir_del_value (struct hive_key *key, const char *name) key 385 source4/lib/registry/dir.c const struct dir_key *dk = talloc_get_type(key, struct dir_key); key 386 source4/lib/registry/dir.c char *path = talloc_asprintf(key, "%s/%s", dk->path, name); key 68 source4/lib/registry/hive.c const struct hive_key *key, key 76 source4/lib/registry/hive.c return key->ops->get_key_info(mem_ctx, key, classname, num_subkeys, key 86 source4/lib/registry/hive.c struct hive_key **key) key 91 source4/lib/registry/hive.c desc, key); key 94 source4/lib/registry/hive.c _PUBLIC_ WERROR hive_key_del(const struct hive_key *key, const char *name) key 96 source4/lib/registry/hive.c return key->ops->del_key(key, name); key 100 source4/lib/registry/hive.c const struct hive_key *key, key 104 source4/lib/registry/hive.c return key->ops->get_key_by_name(mem_ctx, key, name, subkey); key 108 source4/lib/registry/hive.c const struct hive_key *key, uint32_t idx, key 113 source4/lib/registry/hive.c return key->ops->enum_key(mem_ctx, key, idx, name, classname, key 117 source4/lib/registry/hive.c WERROR hive_key_set_value(struct hive_key *key, const char *name, uint32_t type, key 120 source4/lib/registry/hive.c if (key->ops->set_value == NULL) key 123 source4/lib/registry/hive.c return key->ops->set_value(key, name, type, data); key 127 source4/lib/registry/hive.c struct hive_key *key, const char *name, key 130 source4/lib/registry/hive.c if (key->ops->get_value_by_name == NULL) key 133 source4/lib/registry/hive.c return key->ops->get_value_by_name(mem_ctx, key, name, type, data); key 137 source4/lib/registry/hive.c struct hive_key *key, uint32_t idx, key 141 source4/lib/registry/hive.c if (key->ops->enum_value == NULL) key 144 source4/lib/registry/hive.c return key->ops->enum_value(mem_ctx, key, idx, name, type, data); key 148 source4/lib/registry/hive.c struct hive_key *key, key 151 source4/lib/registry/hive.c if (key->ops->get_sec_desc == NULL) key 154 source4/lib/registry/hive.c return key->ops->get_sec_desc(mem_ctx, key, security); key 157 source4/lib/registry/hive.c WERROR hive_set_sec_desc(struct hive_key *key, key 160 source4/lib/registry/hive.c if (key->ops->set_sec_desc == NULL) key 163 source4/lib/registry/hive.c return key->ops->set_sec_desc(key, security); key 166 source4/lib/registry/hive.c WERROR hive_key_del_value(struct hive_key *key, const char *name) key 168 source4/lib/registry/hive.c if (key->ops->delete_value == NULL) key 171 source4/lib/registry/hive.c return key->ops->delete_value(key, name); key 174 source4/lib/registry/hive.c WERROR hive_key_flush(struct hive_key *key) key 176 source4/lib/registry/hive.c if (key->ops->flush_key == NULL) key 179 source4/lib/registry/hive.c return key->ops->flush_key(key); key 59 source4/lib/registry/interface.c struct registry_key **key) key 67 source4/lib/registry/interface.c key); key 77 source4/lib/registry/interface.c uint32_t hkey, struct registry_key **key) key 79 source4/lib/registry/interface.c return ctx->ops->get_predefined_key(ctx, hkey, key); key 108 source4/lib/registry/interface.c const struct registry_key *key, key 112 source4/lib/registry/interface.c if (key == NULL) key 115 source4/lib/registry/interface.c if (key->context->ops->enum_value == NULL) key 118 source4/lib/registry/interface.c return key->context->ops->enum_value(mem_ctx, key, idx, name, key 126 source4/lib/registry/interface.c const struct registry_key *key, key 135 source4/lib/registry/interface.c if (key == NULL) key 138 source4/lib/registry/interface.c if (key->context->ops->get_key_info == NULL) key 141 source4/lib/registry/interface.c return key->context->ops->get_key_info(mem_ctx, key 142 source4/lib/registry/interface.c key, classname, num_subkeys, key 152 source4/lib/registry/interface.c const struct registry_key *key, key 157 source4/lib/registry/interface.c if (key == NULL) key 160 source4/lib/registry/interface.c if (key->context->ops->enum_key == NULL) key 163 source4/lib/registry/interface.c return key->context->ops->enum_key(mem_ctx, key, idx, name, key 171 source4/lib/registry/interface.c const struct registry_key *key, key 176 source4/lib/registry/interface.c if (key == NULL) key 179 source4/lib/registry/interface.c if (key->context->ops->get_value == NULL) key 182 source4/lib/registry/interface.c return key->context->ops->get_value(mem_ctx, key, name, type, data); key 224 source4/lib/registry/interface.c _PUBLIC_ WERROR reg_val_set(struct registry_key *key, const char *value, key 227 source4/lib/registry/interface.c if (key == NULL) key 231 source4/lib/registry/interface.c if (key->context->ops->set_value == NULL) { key 233 source4/lib/registry/interface.c key->context->ops->name)); key 237 source4/lib/registry/interface.c return key->context->ops->set_value(key, value, type, data); key 244 source4/lib/registry/interface.c const struct registry_key *key, key 247 source4/lib/registry/interface.c if (key == NULL) key 251 source4/lib/registry/interface.c if (key->context->ops->get_sec_desc == NULL) key 254 source4/lib/registry/interface.c return key->context->ops->get_sec_desc(ctx, key, secdesc); key 260 source4/lib/registry/interface.c _PUBLIC_ WERROR reg_del_value(struct registry_key *key, const char *valname) key 262 source4/lib/registry/interface.c if (key == NULL) key 265 source4/lib/registry/interface.c if (key->context->ops->delete_value == NULL) key 268 source4/lib/registry/interface.c return key->context->ops->delete_value(key, valname); key 274 source4/lib/registry/interface.c _PUBLIC_ WERROR reg_key_flush(struct registry_key *key) key 276 source4/lib/registry/interface.c if (key == NULL) key 279 source4/lib/registry/interface.c if (key->context->ops->flush_key == NULL) key 282 source4/lib/registry/interface.c return key->context->ops->flush_key(key); key 285 source4/lib/registry/interface.c _PUBLIC_ WERROR reg_set_sec_desc(struct registry_key *key, key 288 source4/lib/registry/interface.c if (key == NULL) key 291 source4/lib/registry/interface.c if (key->context->ops->set_sec_desc == NULL) key 294 source4/lib/registry/interface.c return key->context->ops->set_sec_desc(key, security); key 33 source4/lib/registry/ldb.c struct hive_key key; key 151 source4/lib/registry/ldb.c static int reg_close_ldb_key(struct ldb_key_data *key) key 153 source4/lib/registry/ldb.c if (key->subkeys != NULL) { key 154 source4/lib/registry/ldb.c talloc_free(key->subkeys); key 155 source4/lib/registry/ldb.c key->subkeys = NULL; key 158 source4/lib/registry/ldb.c if (key->values != NULL) { key 159 source4/lib/registry/ldb.c talloc_free(key->values); key 160 source4/lib/registry/ldb.c key->values = NULL; key 395 source4/lib/registry/ldb.c const char *name, struct hive_key **key) key 420 source4/lib/registry/ldb.c newkd->key.ops = ®_backend_ldb; key 424 source4/lib/registry/ldb.c *key = (struct hive_key *)newkd; key 463 source4/lib/registry/ldb.c kd->key.ops = ®_backend_ldb; key 506 source4/lib/registry/ldb.c newkd->key.ops = ®_backend_ldb; key 518 source4/lib/registry/ldb.c static WERROR ldb_del_value (struct hive_key *key, const char *child) key 521 source4/lib/registry/ldb.c struct ldb_key_data *kd = talloc_get_type(key, struct ldb_key_data); key 572 source4/lib/registry/ldb.c static WERROR ldb_del_key(const struct hive_key *key, const char *name) key 575 source4/lib/registry/ldb.c struct ldb_key_data *parentkd = talloc_get_type(key, struct ldb_key_data); key 585 source4/lib/registry/ldb.c werr = ldb_open_key(mem_ctx, key, name, &hk); key 591 source4/lib/registry/ldb.c ldap_path = reg_path_to_ldb(mem_ctx, key, name, NULL); key 736 source4/lib/registry/ldb.c const struct hive_key *key, key 745 source4/lib/registry/ldb.c struct ldb_key_data *kd = talloc_get_type(key, struct ldb_key_data); key 36 source4/lib/registry/local.c struct hive_key *key; key 126 source4/lib/registry/local.c uint32_t key_id, struct registry_key **key) key 141 source4/lib/registry/local.c *key = reg_import_hive_key(ctx, mp->key, key 149 source4/lib/registry/local.c const struct registry_key *key, uint32_t idx, key 154 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 165 source4/lib/registry/local.c struct registry_key **key) key 203 source4/lib/registry/local.c *key = reg_import_hive_key(local_parent->global.context, hivekey, key 210 source4/lib/registry/local.c static WERROR local_set_value(struct registry_key *key, const char *name, key 213 source4/lib/registry/local.c struct local_key *local = (struct local_key *)key; key 219 source4/lib/registry/local.c const struct registry_key *key, key 222 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 228 source4/lib/registry/local.c const struct registry_key *key, uint32_t idx, key 233 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 239 source4/lib/registry/local.c static WERROR local_delete_key(struct registry_key *key, const char *name) key 241 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 246 source4/lib/registry/local.c static WERROR local_delete_value(struct registry_key *key, const char *name) key 248 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 253 source4/lib/registry/local.c static WERROR local_flush_key(struct registry_key *key) key 255 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 261 source4/lib/registry/local.c const struct registry_key *key, key 270 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 278 source4/lib/registry/local.c const struct registry_key *key, key 281 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 285 source4/lib/registry/local.c static WERROR local_set_sec_desc(struct registry_key *key, key 288 source4/lib/registry/local.c const struct local_key *local = (const struct local_key *)key; key 335 source4/lib/registry/local.c mp->key = hive_key; key 452 source4/lib/registry/patchfile.c struct registry_key *key; key 456 source4/lib/registry/patchfile.c error = reg_open_key_abs(ctx, ctx, key_name, &key); key 463 source4/lib/registry/patchfile.c W_ERROR_NOT_OK_RETURN(reg_key_get_info(ctx, key, NULL, key 467 source4/lib/registry/patchfile.c ctx, key, 0, &value_name, NULL, NULL))) { key 468 source4/lib/registry/patchfile.c error = reg_del_value(key, value_name); key 203 source4/lib/registry/patchfile_preg.c char *key = NULL; key 247 source4/lib/registry/patchfile_preg.c key = talloc_strdup(mem_ctx, buf); key 307 source4/lib/registry/patchfile_preg.c callbacks->del_all_values(callback_data, key); key 311 source4/lib/registry/patchfile_preg.c callbacks->del_value(callback_data, key, p); key 321 source4/lib/registry/patchfile_preg.c callbacks->del_value(callback_data, key, p); key 325 source4/lib/registry/patchfile_preg.c callbacks->del_value(callback_data, key, p); key 336 source4/lib/registry/patchfile_preg.c key, p); key 342 source4/lib/registry/patchfile_preg.c full_key = talloc_asprintf(mem_ctx, "%s\\%s", key, p); key 346 source4/lib/registry/patchfile_preg.c callbacks->add_key(callback_data, key); key 347 source4/lib/registry/patchfile_preg.c callbacks->set_value(callback_data, key, value_name, key 354 source4/lib/registry/patchfile_preg.c talloc_free(key); key 48 source4/lib/registry/pyregistry.c struct registry_key *key; key 53 source4/lib/registry/pyregistry.c result = reg_get_predefined_key_by_name(ctx, name, &key); key 56 source4/lib/registry/pyregistry.c return py_talloc_import(&PyRegistryKey, key); key 79 source4/lib/registry/pyregistry.c struct registry_key *key; key 84 source4/lib/registry/pyregistry.c result = reg_get_predefined_key(ctx, hkey, &key); key 87 source4/lib/registry/pyregistry.c return py_talloc_import(&PyRegistryKey, key); key 173 source4/lib/registry/pyregistry.c struct hive_key *key = PyHiveKey_AsHiveKey(self); key 179 source4/lib/registry/pyregistry.c result = hive_key_del(key, name); key 189 source4/lib/registry/pyregistry.c struct hive_key *key = PyHiveKey_AsHiveKey(self); key 191 source4/lib/registry/pyregistry.c result = hive_key_flush(key); key 201 source4/lib/registry/pyregistry.c struct hive_key *key = PyHiveKey_AsHiveKey(self); key 206 source4/lib/registry/pyregistry.c result = hive_key_del_value(key, name); key 219 source4/lib/registry/pyregistry.c struct hive_key *key = PyHiveKey_AsHiveKey(self); key 225 source4/lib/registry/pyregistry.c result = hive_key_set_value(key, name, type, value); key 227 source4/lib/registry/pyregistry.c result = hive_key_del_value(key, name); key 309 source4/lib/registry/pyregistry.c struct hive_key *key; key 314 source4/lib/registry/pyregistry.c result = reg_open_directory(NULL, location, &key); key 317 source4/lib/registry/pyregistry.c return py_talloc_import(&PyHiveKey, key); key 324 source4/lib/registry/pyregistry.c struct hive_key *key; key 329 source4/lib/registry/pyregistry.c result = reg_create_directory(NULL, location, &key); key 332 source4/lib/registry/pyregistry.c return py_talloc_import(&PyHiveKey, key); key 343 source4/lib/registry/pyregistry.c struct hive_key *key; key 368 source4/lib/registry/pyregistry.c tevent_context_init(NULL), lp_ctx, &key); key 371 source4/lib/registry/pyregistry.c return py_talloc_import(&PyHiveKey, key); key 58 source4/lib/registry/regf.c struct hive_key key; key 428 source4/lib/registry/regf.c const struct hive_key *key, key 438 source4/lib/registry/regf.c (const struct regf_key_data *)key; key 476 source4/lib/registry/regf.c ret->key.ops = ®_backend_regf; key 501 source4/lib/registry/regf.c static WERROR regf_get_value(TALLOC_CTX *ctx, struct hive_key *key, key 506 source4/lib/registry/regf.c (const struct regf_key_data *)key; key 562 source4/lib/registry/regf.c struct hive_key *key, const char *name, key 571 source4/lib/registry/regf.c for (i = 0; W_ERROR_IS_OK(error = regf_get_value(mem_ctx, key, i, key 586 source4/lib/registry/regf.c const struct hive_key *key, key 593 source4/lib/registry/regf.c const struct regf_key_data *private_data = (const struct regf_key_data *)key; key 787 source4/lib/registry/regf.c const struct hive_key *key, key 795 source4/lib/registry/regf.c (const struct regf_key_data *)key; key 828 source4/lib/registry/regf.c const struct hive_key *key, key 834 source4/lib/registry/regf.c (const struct regf_key_data *)key; key 866 source4/lib/registry/regf.c W_ERROR_NOT_OK_RETURN(regf_match_subkey_by_name(nk, key, key 901 source4/lib/registry/regf.c key, key 938 source4/lib/registry/regf.c key, key 988 source4/lib/registry/regf.c W_ERROR_NOT_OK_RETURN(regf_match_subkey_by_name(nk, key, key 1013 source4/lib/registry/regf.c W_ERROR_NOT_OK_RETURN(regf_match_subkey_by_name(nk, key, key 1037 source4/lib/registry/regf.c static WERROR regf_set_sec_desc(struct hive_key *key, key 1041 source4/lib/registry/regf.c (const struct regf_key_data *)key; key 1182 source4/lib/registry/regf.c static WERROR regf_get_sec_desc(TALLOC_CTX *ctx, const struct hive_key *key, key 1186 source4/lib/registry/regf.c (const struct regf_key_data *)key; key 1540 source4/lib/registry/regf.c static WERROR regf_del_value (struct hive_key *key, const char *name) key 1542 source4/lib/registry/regf.c struct regf_key_data *private_data = (struct regf_key_data *)key; key 1602 source4/lib/registry/regf.c struct regf_key_data *key; key 1617 source4/lib/registry/regf.c (struct hive_key **)&key))) { key 1622 source4/lib/registry/regf.c if (key->nk->subkeys_offset != -1) { key 1624 source4/lib/registry/regf.c struct hive_key *sk = (struct hive_key *)key; key 1625 source4/lib/registry/regf.c int i = key->nk->num_subkeys; key 1647 source4/lib/registry/regf.c if (key->nk->values_offset != -1) { key 1649 source4/lib/registry/regf.c struct hive_key *sk = (struct hive_key *)key; key 1651 source4/lib/registry/regf.c int i = key->nk->num_values; key 1675 source4/lib/registry/regf.c key->offset, &parent_nk->subkeys_offset); key 1687 source4/lib/registry/regf.c if (key->nk->clsname_offset != -1) { key 1688 source4/lib/registry/regf.c hbin_free(private_data->hive, key->nk->clsname_offset); key 1690 source4/lib/registry/regf.c hbin_free(private_data->hive, key->offset); key 1757 source4/lib/registry/regf.c static WERROR regf_set_value(struct hive_key *key, const char *name, key 1760 source4/lib/registry/regf.c struct regf_key_data *private_data = (struct regf_key_data *)key; key 1915 source4/lib/registry/regf.c int minor_version, struct hive_key **key) key 2026 source4/lib/registry/regf.c *key = (struct hive_key *)regf_get_key(parent_ctx, regf, key 2041 source4/lib/registry/regf.c struct smb_iconv_convenience *iconv_convenience, struct hive_key **key) key 2142 source4/lib/registry/regf.c *key = (struct hive_key *)regf_get_key(parent_ctx, regf, key 57 source4/lib/registry/registry.h const struct hive_key *key, uint32_t idx, key 66 source4/lib/registry/registry.h const struct hive_key *key, const char *name, key 76 source4/lib/registry/registry.h struct hive_key **key); key 80 source4/lib/registry/registry.h WERROR (*del_key) (const struct hive_key *key, const char *name); key 85 source4/lib/registry/registry.h WERROR (*flush_key) (struct hive_key *key); key 91 source4/lib/registry/registry.h struct hive_key *key, int idx, key 99 source4/lib/registry/registry.h struct hive_key *key, const char *name, key 105 source4/lib/registry/registry.h WERROR (*set_value) (struct hive_key *key, const char *name, key 111 source4/lib/registry/registry.h WERROR (*delete_value) (struct hive_key *key, const char *name); key 122 source4/lib/registry/registry.h WERROR (*set_sec_desc) (struct hive_key *key, key 133 source4/lib/registry/registry.h const struct hive_key *key, key 140 source4/lib/registry/registry.h const struct hive_key *key, key 160 source4/lib/registry/registry.h WERROR hive_key_get_info(TALLOC_CTX *mem_ctx, const struct hive_key *key, key 168 source4/lib/registry/registry.h struct hive_key **key); key 169 source4/lib/registry/registry.h WERROR hive_key_del(const struct hive_key *key, const char *name); key 171 source4/lib/registry/registry.h const struct hive_key *key, const char *name, key 174 source4/lib/registry/registry.h const struct hive_key *key, uint32_t idx, key 179 source4/lib/registry/registry.h WERROR hive_key_set_value(struct hive_key *key, const char *name, key 183 source4/lib/registry/registry.h struct hive_key *key, const char *name, key 186 source4/lib/registry/registry.h struct hive_key *key, uint32_t idx, key 190 source4/lib/registry/registry.h struct hive_key *key, key 193 source4/lib/registry/registry.h WERROR hive_set_sec_desc(struct hive_key *key, key 196 source4/lib/registry/registry.h WERROR hive_key_del_value(struct hive_key *key, const char *name); key 198 source4/lib/registry/registry.h WERROR hive_key_flush(struct hive_key *key); key 203 source4/lib/registry/registry.h const char *location, struct hive_key **key); key 206 source4/lib/registry/registry.h struct hive_key **key); key 216 source4/lib/registry/registry.h const char *location, struct hive_key **key); key 221 source4/lib/registry/registry.h struct hive_key **key); key 280 source4/lib/registry/registry.h const struct registry_key *key, key 289 source4/lib/registry/registry.h WERROR (*flush_key) (struct registry_key *key); key 293 source4/lib/registry/registry.h struct registry_key **key); key 298 source4/lib/registry/registry.h struct registry_key **key); key 305 source4/lib/registry/registry.h struct registry_key **key); key 307 source4/lib/registry/registry.h WERROR (*delete_key) (struct registry_key *key, const char *name); key 309 source4/lib/registry/registry.h WERROR (*delete_value) (struct registry_key *key, const char *name); key 312 source4/lib/registry/registry.h const struct registry_key *key, uint32_t idx, key 318 source4/lib/registry/registry.h const struct registry_key *key, uint32_t idx, key 324 source4/lib/registry/registry.h const struct registry_key *key, key 327 source4/lib/registry/registry.h WERROR (*set_sec_desc) (struct registry_key *key, key 330 source4/lib/registry/registry.h WERROR (*load_key) (struct registry_key *key, key 334 source4/lib/registry/registry.h WERROR (*unload_key) (struct registry_key *key, const char *name); key 336 source4/lib/registry/registry.h WERROR (*notify_value_change) (struct registry_key *key, key 340 source4/lib/registry/registry.h const struct registry_key *key, key 345 source4/lib/registry/registry.h WERROR (*set_value) (struct registry_key *key, key 390 source4/lib/registry/registry.h struct registry_key **key); key 393 source4/lib/registry/registry.h struct registry_key **key); key 399 source4/lib/registry/registry.h const struct registry_key *key, uint32_t idx, key 404 source4/lib/registry/registry.h const struct registry_key *key, key 413 source4/lib/registry/registry.h const struct registry_key *key, key 419 source4/lib/registry/registry.h const struct registry_key *key, key 423 source4/lib/registry/registry.h const struct registry_key *key, key 433 source4/lib/registry/registry.h WERROR reg_val_set(struct registry_key *key, const char *value, key 435 source4/lib/registry/registry.h WERROR reg_get_sec_desc(TALLOC_CTX *ctx, const struct registry_key *key, key 437 source4/lib/registry/registry.h WERROR reg_del_value(struct registry_key *key, const char *valname); key 438 source4/lib/registry/registry.h WERROR reg_key_flush(struct registry_key *key); key 444 source4/lib/registry/registry.h struct registry_key **key); key 460 source4/lib/registry/registry.h WERROR reg_load_key(struct registry_context *ctx, struct registry_key *key, key 472 source4/lib/registry/registry.h WERROR reg_set_sec_desc(struct registry_key *key, key 523 source4/lib/registry/registry.h uint32_t key_id, struct registry_key **key); key 28 source4/lib/registry/rpc.c struct registry_key key; key 120 source4/lib/registry/rpc.c mykeydata->key.context = ctx; key 155 source4/lib/registry/rpc.c const char *name, struct registry_key **key) key 163 source4/lib/registry/rpc.c mykeydata->key.context = parentkeydata->key.context; key 167 source4/lib/registry/rpc.c *key = (struct registry_key *)mykeydata; key 335 source4/lib/registry/rpc.c struct registry_key **key) key 363 source4/lib/registry/rpc.c *key = (struct registry_key *)rpck; key 411 source4/lib/registry/rpc.c r.in.key.name = name; key 425 source4/lib/registry/rpc.c static WERROR rpc_get_info(TALLOC_CTX *mem_ctx, const struct registry_key *key, key 434 source4/lib/registry/rpc.c struct rpc_key *mykeydata = talloc_get_type(key, struct rpc_key); key 438 source4/lib/registry/rpc.c error = rpc_query_key(mem_ctx, key); key 71 source4/lib/registry/tests/diff.c struct registry_key *key; key 77 source4/lib/registry/tests/diff.c error = td->r1_ctx->ops->get_predefined_key(td->r1_ctx, HKEY_LOCAL_MACHINE, &key); key 82 source4/lib/registry/tests/diff.c error = td->r1_ctx->ops->open_key(td->r1_ctx, key, "Software", &key); key 84 source4/lib/registry/tests/diff.c error = td->r1_ctx->ops->open_key(td->r1_ctx, key, "Microsoft", &key); key 86 source4/lib/registry/tests/diff.c error = td->r1_ctx->ops->open_key(td->r1_ctx, key, "Windows", &key); key 88 source4/lib/registry/tests/diff.c error = td->r1_ctx->ops->open_key(td->r1_ctx, key, "CurrentVersion", &key); key 90 source4/lib/registry/tests/diff.c error = td->r1_ctx->ops->open_key(td->r1_ctx, key, "Policies", &key); key 92 source4/lib/registry/tests/diff.c error = td->r1_ctx->ops->open_key(td->r1_ctx, key, "Explorer", &key); key 162 source4/lib/registry/tests/diff.c struct registry_key *key, *newkey; key 208 source4/lib/registry/tests/diff.c error = r1_ctx->ops->get_predefined_key(r1_ctx, HKEY_CURRENT_USER, &key); key 210 source4/lib/registry/tests/diff.c error = r1_ctx->ops->create_key(r1_ctx, key, "Network", NULL, NULL, &newkey); key 215 source4/lib/registry/tests/diff.c error = r2_ctx->ops->get_predefined_key(r2_ctx, HKEY_LOCAL_MACHINE, &key); key 217 source4/lib/registry/tests/diff.c error = r2_ctx->ops->create_key(r2_ctx, key, "Software", NULL, NULL, &newkey); key 393 source4/lib/registry/tests/hive.c struct hive_key *key; key 404 source4/lib/registry/tests/hive.c error = reg_create_directory(tctx, dirname, &key); key 410 source4/lib/registry/tests/hive.c *data = key; key 417 source4/lib/registry/tests/hive.c struct hive_key *key; key 428 source4/lib/registry/tests/hive.c error = reg_open_ldb_file(tctx, dirname, NULL, NULL, tctx->ev, tctx->lp_ctx, &key); key 434 source4/lib/registry/tests/hive.c *data = key; key 441 source4/lib/registry/tests/hive.c struct hive_key *key; key 453 source4/lib/registry/tests/hive.c dirname, 5, &key); key 459 source4/lib/registry/tests/hive.c *data = key; key 24 source4/lib/registry/wine.c static WERROR wine_open_reg (struct registry_hive *h, struct registry_key **key) key 45 source4/lib/tls/tlscert.c gnutls_x509_privkey key, cakey; key 78 source4/lib/tls/tlscert.c TLSCHECK(gnutls_x509_privkey_init(&key)); key 79 source4/lib/tls/tlscert.c TLSCHECK(gnutls_x509_privkey_generate(key, GNUTLS_PK_RSA, DH_BITS, 0)); key 122 source4/lib/tls/tlscert.c TLSCHECK(gnutls_x509_crt_set_key(crt, key)); key 135 source4/lib/tls/tlscert.c TLSCHECK(gnutls_x509_crt_sign(crt, crt, key)); key 148 source4/lib/tls/tlscert.c TLSCHECK(gnutls_x509_privkey_export(key, GNUTLS_X509_FMT_PEM, buf, &bufsize)); key 151 source4/lib/tls/tlscert.c gnutls_x509_privkey_deinit(key); key 2134 source4/lib/wmi/wmi_wrap.c PyObject *key = SWIG_This(); key 2135 source4/lib/wmi/wmi_wrap.c PyObject_SetAttr(inst, key, swig_this); key 2343 source4/lib/wmi/wmi_wrap.c PyObject *key = PyString_FromString(type); key 2344 source4/lib/wmi/wmi_wrap.c PyObject *obj = PyDict_GetItem(cache, key); key 2353 source4/lib/wmi/wmi_wrap.c PyDict_SetItem(cache, key, obj); key 2357 source4/lib/wmi/wmi_wrap.c Py_DECREF(key); key 134 source4/libcli/auth/credentials.c void creds_des_encrypt_LMKey(struct creds_CredentialState *creds, struct netr_LMSessionKey *key) key 137 source4/libcli/auth/credentials.c des_crypt56(tmp.key, key->key, creds->session_key, 1); key 138 source4/libcli/auth/credentials.c *key = tmp; key 144 source4/libcli/auth/credentials.c void creds_des_decrypt_LMKey(struct creds_CredentialState *creds, struct netr_LMSessionKey *key) key 147 source4/libcli/auth/credentials.c des_crypt56(tmp.key, key->key, creds->session_key, 0); key 148 source4/libcli/auth/credentials.c *key = tmp; key 355 source4/libcli/auth/credentials.c if (memcmp(base->key.key, zeros, key 356 source4/libcli/auth/credentials.c sizeof(base->key.key)) != 0) { key 358 source4/libcli/auth/credentials.c base->key.key, key 359 source4/libcli/auth/credentials.c sizeof(base->key.key)); key 362 source4/libcli/auth/credentials.c if (memcmp(base->LMSessKey.key, zeros, key 363 source4/libcli/auth/credentials.c sizeof(base->LMSessKey.key)) != 0) { key 365 source4/libcli/auth/credentials.c base->LMSessKey.key, key 366 source4/libcli/auth/credentials.c sizeof(base->LMSessKey.key)); key 369 source4/libcli/auth/credentials.c if (memcmp(base->LMSessKey.key, zeros, key 370 source4/libcli/auth/credentials.c sizeof(base->LMSessKey.key)) != 0) { key 40 source4/libcli/auth/session.c uint8_t bin[8], bout[8], key[7]; key 48 source4/libcli/auth/session.c memcpy(key, &session_key->data[k], 7); key 50 source4/libcli/auth/session.c des_crypt56(bout, bin, key, forward?1:0); key 180 source4/libcli/auth/smbdes.c static void dohash(char *out, char *in, char *key, int forw) key 192 source4/libcli/auth/smbdes.c permute(pk1, key, perm1, 56); key 259 source4/libcli/auth/smbdes.c static void str_to_key(const uint8_t *str,uint8_t *key) key 263 source4/libcli/auth/smbdes.c key[0] = str[0]>>1; key 264 source4/libcli/auth/smbdes.c key[1] = ((str[0]&0x01)<<6) | (str[1]>>2); key 265 source4/libcli/auth/smbdes.c key[2] = ((str[1]&0x03)<<5) | (str[2]>>3); key 266 source4/libcli/auth/smbdes.c key[3] = ((str[2]&0x07)<<4) | (str[3]>>4); key 267 source4/libcli/auth/smbdes.c key[4] = ((str[3]&0x0F)<<3) | (str[4]>>5); key 268 source4/libcli/auth/smbdes.c key[5] = ((str[4]&0x1F)<<2) | (str[5]>>6); key 269 source4/libcli/auth/smbdes.c key[6] = ((str[5]&0x3F)<<1) | (str[6]>>7); key 270 source4/libcli/auth/smbdes.c key[7] = str[6]&0x7F; key 272 source4/libcli/auth/smbdes.c key[i] = (key[i]<<1); key 279 source4/libcli/auth/smbdes.c void des_crypt56(uint8_t out[8], const uint8_t in[8], const uint8_t key[7], int forw) key 287 source4/libcli/auth/smbdes.c str_to_key(key, key2); key 334 source4/libcli/auth/smbdes.c void des_crypt128(uint8_t out[8], const uint8_t in[8], const uint8_t key[16]) key 337 source4/libcli/auth/smbdes.c des_crypt56(buf, in, key, 1); key 338 source4/libcli/auth/smbdes.c des_crypt56(out, buf, key+9, 1); key 342 source4/libcli/auth/smbdes.c void des_crypt64(uint8_t out[8], const uint8_t in[8], const uint8_t key[8], int forw) key 347 source4/libcli/auth/smbdes.c des_crypt56(buf, in, key, forw); key 348 source4/libcli/auth/smbdes.c key2[0] = key[7]; key 353 source4/libcli/auth/smbdes.c void des_crypt112(uint8_t out[8], const uint8_t in[8], const uint8_t key[14], int forw) key 356 source4/libcli/auth/smbdes.c des_crypt56(buf, in, key, forw); key 357 source4/libcli/auth/smbdes.c des_crypt56(out, buf, key+7, forw); key 361 source4/libcli/auth/smbdes.c void des_crypt112_16(uint8_t out[16], uint8_t in[16], const uint8_t key[14], int forw) key 363 source4/libcli/auth/smbdes.c des_crypt56(out, in, key, forw); key 364 source4/libcli/auth/smbdes.c des_crypt56(out + 8, in + 8, key+7, forw); key 78 source4/ntvfs/common/brlock_tdb.c DATA_BLOB key; key 121 source4/ntvfs/common/brlock_tdb.c brlh->key = *file_key; key 299 source4/ntvfs/common/brlock_tdb.c kbuf.dptr = brlh->key.data; key 300 source4/ntvfs/common/brlock_tdb.c kbuf.dsize = brlh->key.length; key 449 source4/ntvfs/common/brlock_tdb.c kbuf.dptr = brlh->key.data; key 450 source4/ntvfs/common/brlock_tdb.c kbuf.dsize = brlh->key.length; key 549 source4/ntvfs/common/brlock_tdb.c kbuf.dptr = brlh->key.data; key 550 source4/ntvfs/common/brlock_tdb.c kbuf.dsize = brlh->key.length; key 620 source4/ntvfs/common/brlock_tdb.c kbuf.dptr = brlh->key.data; key 621 source4/ntvfs/common/brlock_tdb.c kbuf.dsize = brlh->key.length; key 663 source4/ntvfs/common/brlock_tdb.c kbuf.dptr = brlh->key.data; key 664 source4/ntvfs/common/brlock_tdb.c kbuf.dsize = brlh->key.length; key 172 source4/ntvfs/common/opendb.c NTSTATUS odb_get_file_infos(struct odb_context *odb, DATA_BLOB *key, key 175 source4/ntvfs/common/opendb.c return ops->odb_get_file_infos(odb, key, del_on_close, write_time); key 42 source4/ntvfs/common/opendb.h NTSTATUS (*odb_get_file_infos)(struct odb_context *odb, DATA_BLOB *key, key 67 source4/ntvfs/common/opendb_tdb.c TDB_DATA key; key 119 source4/ntvfs/common/opendb_tdb.c tdb_chainunlock(lck->odb->w->tdb, lck->key); key 141 source4/ntvfs/common/opendb_tdb.c lck->key.dptr = talloc_memdup(lck, file_key->data, file_key->length); key 142 source4/ntvfs/common/opendb_tdb.c lck->key.dsize = file_key->length; key 143 source4/ntvfs/common/opendb_tdb.c if (lck->key.dptr == NULL) { key 148 source4/ntvfs/common/opendb_tdb.c if (tdb_chainlock(odb->w->tdb, lck->key) != 0) { key 171 source4/ntvfs/common/opendb_tdb.c return data_blob_talloc(mem_ctx, lck->key.dptr, lck->key.dsize); key 241 source4/ntvfs/common/opendb_tdb.c dbuf = tdb_fetch(odb->w->tdb, lck->key); key 270 source4/ntvfs/common/opendb_tdb.c ret = tdb_delete(odb->w->tdb, lck->key); key 285 source4/ntvfs/common/opendb_tdb.c ret = tdb_store(odb->w->tdb, lck->key, dbuf, TDB_REPLACE); key 815 source4/ntvfs/common/opendb_tdb.c static NTSTATUS odb_tdb_get_file_infos(struct odb_context *odb, DATA_BLOB *key, key 827 source4/ntvfs/common/opendb_tdb.c lck = odb_lock(odb, odb, key); key 76 source4/ntvfs/ipc/vfs_ipc.c static struct pipe_state *pipe_state_find_key(struct ipc_private *ipriv, struct ntvfs_request *req, const DATA_BLOB *key) key 80 source4/ntvfs/ipc/vfs_ipc.c h = ntvfs_handle_search_by_wire_key(ipriv->ntvfs, req, key); key 58 source4/ntvfs/nbench/vfs_nbench.c DATA_BLOB key; key 61 source4/ntvfs/nbench/vfs_nbench.c key = ntvfs_handle_get_wire_key(h, req); key 63 source4/ntvfs/nbench/vfs_nbench.c switch (key.length) { key 65 source4/ntvfs/nbench/vfs_nbench.c fnum = SVAL(key.data, 0); key 69 source4/ntvfs/nbench/vfs_nbench.c __FUNCTION__, (unsigned)key.length)); key 222 source4/ntvfs/ntvfs.h struct ntvfs_handle *(*search_by_wire_key)(void *private_data, struct ntvfs_request *req, const DATA_BLOB *key); key 174 source4/ntvfs/ntvfs_util.c const DATA_BLOB *key) key 179 source4/ntvfs/ntvfs_util.c return ntvfs->ctx->handles.search_by_wire_key(ntvfs->ctx->handles.private_data, req, key); key 191 source4/ntvfs/ntvfs_util.c struct ntvfs_handle *(*search_by_wire_key)(void *private_data, struct ntvfs_request *req, const DATA_BLOB *key), key 150 source4/ntvfs/posix/pvfs_open.c TALLOC_CTX *mem_ctx, DATA_BLOB *key) key 161 source4/ntvfs/posix/pvfs_open.c *key = data_blob_talloc(mem_ctx, &lock_context, sizeof(lock_context)); key 162 source4/ntvfs/posix/pvfs_open.c if (key->data == NULL) { key 571 source4/ntvfs/posix/pvfs_open.c DATA_BLOB odb_key, key; key 579 source4/ntvfs/posix/pvfs_open.c key = odb_key; key 581 source4/ntvfs/posix/pvfs_open.c key = data_blob_talloc(mem_ctx, NULL, key 583 source4/ntvfs/posix/pvfs_open.c NT_STATUS_HAVE_NO_MEMORY(key.data); key 584 source4/ntvfs/posix/pvfs_open.c memcpy(key.data, odb_key.data, odb_key.length); key 585 source4/ntvfs/posix/pvfs_open.c memcpy(key.data + odb_key.length, key 590 source4/ntvfs/posix/pvfs_open.c h = brl_create_handle(mem_ctx, ntvfs, &key); key 1778 source4/ntvfs/posix/pvfs_open.c DATA_BLOB key; key 1784 source4/ntvfs/posix/pvfs_open.c status = pvfs_locking_key(name, name, &key); key 1789 source4/ntvfs/posix/pvfs_open.c lck = odb_lock(req, pvfs->odb_context, &key); key 1843 source4/ntvfs/posix/pvfs_open.c DATA_BLOB key; key 1849 source4/ntvfs/posix/pvfs_open.c status = pvfs_locking_key(name, name, &key); key 1854 source4/ntvfs/posix/pvfs_open.c lck = odb_lock(req, pvfs->odb_context, &key); key 1903 source4/ntvfs/posix/pvfs_open.c DATA_BLOB key; key 1910 source4/ntvfs/posix/pvfs_open.c status = pvfs_locking_key(name, name, &key); key 1915 source4/ntvfs/posix/pvfs_open.c lck = odb_lock(req, pvfs->odb_context, &key); key 1974 source4/ntvfs/posix/pvfs_open.c DATA_BLOB key; key 1980 source4/ntvfs/posix/pvfs_open.c status = pvfs_locking_key(name, name, &key); key 1985 source4/ntvfs/posix/pvfs_open.c lck = odb_lock(req, pvfs->odb_context, &key); key 119 source4/ntvfs/posix/pvfs_shortname.c const char *key, size_t length) key 121 source4/ntvfs/posix/pvfs_shortname.c return pvfs_name_hash(key, length) % ctx->mangle_modulus; key 176 source4/ntvfs/posix/pvfs_util.c uint32_t pvfs_name_hash(const char *key, size_t length) key 182 source4/ntvfs/posix/pvfs_util.c while (*key && length--) { key 184 source4/ntvfs/posix/pvfs_util.c codepoint_t c = next_codepoint(key, &c_size); key 188 source4/ntvfs/posix/pvfs_util.c key += c_size; key 83 source4/ntvfs/posix/xattr_tdb.c TDB_DATA *key) key 98 source4/ntvfs/posix/xattr_tdb.c key->dptr = talloc_array(mem_ctx, uint8_t, 16 + len); key 99 source4/ntvfs/posix/xattr_tdb.c if (key->dptr == NULL) { key 102 source4/ntvfs/posix/xattr_tdb.c key->dsize = 16 + len; key 104 source4/ntvfs/posix/xattr_tdb.c SBVAL(key->dptr, 0, st.st_dev); key 105 source4/ntvfs/posix/xattr_tdb.c SBVAL(key->dptr, 8, st.st_ino); key 106 source4/ntvfs/posix/xattr_tdb.c memcpy(key->dptr+16, attr_name, len); key 46 source4/param/generic.c if (strcasecmp_m(p->key, name) == 0) key 95 source4/param/generic.c p->key = talloc_strdup(p, name); key 214 source4/param/generic.c p->key = talloc_strdup(p, name); key 254 source4/param/generic.c lp_do_global_parameter(lp_ctx, param->key, key 261 source4/param/generic.c lp_do_service_parameter(lp_ctx, service, param->key, param->value); key 286 source4/param/generic.c fdprintf(file, "\t%s = %s\n", param->key, param->value); key 763 source4/param/loadparm.c if (strcmp(data->key, vfskey) == 0) { key 775 source4/param/loadparm.c if (strcmp(data->key, vfskey) == 0) { key 1321 source4/param/loadparm.c if (strcmp(pdata->key, data->key) == 0) { key 1334 source4/param/loadparm.c paramo->key = talloc_reference(paramo, data->key); key 1572 source4/param/loadparm.c if (strcmp(paramo->key, name) == 0) { key 1589 source4/param/loadparm.c paramo->key = talloc_strdup(paramo, name); key 2068 source4/param/loadparm.c fprintf(f, "\t%s = %s\n", data->key, data->value); key 2110 source4/param/loadparm.c fprintf(f, "\t%s = %s\n", data->key, data->value); key 25 source4/param/param.h char *key; key 631 source4/rpc_server/netlogon/dcerpc_netlogon.c memcmp(sam->key.key, zeros, sizeof(sam->key.key)) != 0) { key 635 source4/rpc_server/netlogon/dcerpc_netlogon.c sam->key.key, key 636 source4/rpc_server/netlogon/dcerpc_netlogon.c sizeof(sam->key.key)); key 643 source4/rpc_server/netlogon/dcerpc_netlogon.c memcmp(sam->LMSessKey.key, zeros, sizeof(sam->LMSessKey.key)) != 0) { key 646 source4/rpc_server/netlogon/dcerpc_netlogon.c sam->LMSessKey.key, key 647 source4/rpc_server/netlogon/dcerpc_netlogon.c sizeof(sam->LMSessKey.key)); key 118 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 122 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 146 source4/rpc_server/winreg/rpc_winreg.c result = reg_key_add_name(newh, key, r->in.name.name, NULL, key 169 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 172 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 178 source4/rpc_server/winreg/rpc_winreg.c return reg_key_del(key, r->in.key.name); key 193 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 196 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 202 source4/rpc_server/winreg/rpc_winreg.c return reg_del_value(key, r->in.value.name); key 217 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 223 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 226 source4/rpc_server/winreg/rpc_winreg.c key, r->in.enum_index, &name, &classname, &last_mod); key 266 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 273 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 275 source4/rpc_server/winreg/rpc_winreg.c result = reg_key_get_value_by_index(mem_ctx, key, key 336 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 339 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 345 source4/rpc_server/winreg/rpc_winreg.c return reg_key_flush(key); key 397 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 401 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 413 source4/rpc_server/winreg/rpc_winreg.c result = reg_open_key(newh, key, r->in.keyname.name, key 438 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 443 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 450 source4/rpc_server/winreg/rpc_winreg.c result = reg_key_get_info(mem_ctx, key, &classname, key 479 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 485 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 492 source4/rpc_server/winreg/rpc_winreg.c result = reg_key_get_value_by_name(mem_ctx, key, key 578 source4/rpc_server/winreg/rpc_winreg.c struct registry_key *key; key 583 source4/rpc_server/winreg/rpc_winreg.c key = h->data; key 591 source4/rpc_server/winreg/rpc_winreg.c result = reg_val_set(key, r->in.name.name, r->in.type, data); key 761 source4/smb_server/smb/request.c struct ntvfs_handle *smbsrv_handle_search_by_wire_key(void *private_data, struct ntvfs_request *ntvfs, const DATA_BLOB *key) key 766 source4/smb_server/smb/request.c if (key->length != 2) return NULL; key 768 source4/smb_server/smb/request.c return smbsrv_pull_fnum(req, key->data, 0); key 773 source4/smb_server/smb/request.c uint8_t key[2]; key 775 source4/smb_server/smb/request.c smbsrv_push_fnum(key, 0, handle); key 777 source4/smb_server/smb/request.c return data_blob_talloc(mem_ctx, key, sizeof(key)); key 230 source4/smb_server/smb2/tcon.c static struct ntvfs_handle *smb2srv_handle_search_by_wire_key(void *private_data, struct ntvfs_request *ntvfs, const DATA_BLOB *key) key 37 source4/torture/local/dbspeed.c TDB_DATA key, data; key 39 source4/torture/local/dbspeed.c key.dptr = (uint8_t *)talloc_asprintf(tdbw, fmt1, i); key 40 source4/torture/local/dbspeed.c key.dsize = strlen((char *)key.dptr)+1; key 44 source4/torture/local/dbspeed.c ret = tdb_store(tdbw->tdb, key, data, TDB_INSERT); key 46 source4/torture/local/dbspeed.c talloc_free(key.dptr); key 96 source4/torture/local/dbspeed.c TDB_DATA key, data; key 98 source4/torture/local/dbspeed.c key.dptr = (uint8_t *)talloc_asprintf(tmp_ctx, "S-1-5-21-53173311-3623041448-2049097239-%u", i); key 99 source4/torture/local/dbspeed.c key.dsize = strlen((char *)key.dptr)+1; key 100 source4/torture/local/dbspeed.c data = tdb_fetch(tdbw->tdb, key); key 101 source4/torture/local/dbspeed.c talloc_free(key.dptr); key 107 source4/torture/local/dbspeed.c key.dptr = (uint8_t *)talloc_asprintf(tmp_ctx, "UID %u", i); key 108 source4/torture/local/dbspeed.c key.dsize = strlen((char *)key.dptr)+1; key 109 source4/torture/local/dbspeed.c data = tdb_fetch(tdbw->tdb, key); key 110 source4/torture/local/dbspeed.c talloc_free(key.dptr); key 357 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.key.name, "spottyfoot", "key name"); key 3410 source4/torture/rpc/samba3rpc.c d.in.key.name = talloc_asprintf( key 3412 source4/torture/rpc/samba3rpc.c if (d.in.key.name == NULL) { key 256 source4/torture/rpc/samlogon.c memcpy(user_session_key, base->key.key, 16); key 259 source4/torture/rpc/samlogon.c memcpy(lm_key, base->LMSessKey.key, 8); key 382 source4/torture/rpc/spoolss_win.c const char* key, key 390 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumPrinterKey(%s)\n", key); key 393 source4/torture/rpc/spoolss_win.c epk.in.key_name = talloc_strdup(tctx, key); key 419 source4/torture/rpc/spoolss_win.c const char *key, key 429 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumPrinterDataEx(%s)\n", key); key 432 source4/torture/rpc/spoolss_win.c epde.in.key_name = talloc_strdup(tctx, key); key 389 source4/torture/rpc/winreg.c struct policy_handle *handle, const char *key) key 396 source4/torture/rpc/winreg.c init_winreg_String(&r.in.key, key); key 424 source4/torture/rpc/winreg.c const char *key) key 431 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 451 source4/torture/rpc/winreg.c const char *key, key 460 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, access_mask, &new_handle, key 509 source4/torture/rpc/winreg.c const char *key, key 515 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 555 source4/torture/rpc/winreg.c const char *key, key 561 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, SEC_FLAG_SYSTEM_SECURITY, key 595 source4/torture/rpc/winreg.c const char *key, key 601 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 634 source4/torture/rpc/winreg.c const char *key, key 640 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 706 source4/torture/rpc/winreg.c const char *key, key 712 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 730 source4/torture/rpc/winreg.c const char *key, key 736 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 754 source4/torture/rpc/winreg.c const char *key) key 781 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 859 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig); key 867 source4/torture/rpc/winreg.c const char *key) key 893 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { key 981 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig); key 989 source4/torture/rpc/winreg.c const char *key) key 1029 source4/torture/rpc/winreg.c sd_mask_tests[i].access_mask, key, key 1049 source4/torture/rpc/winreg.c const char *key, key 1070 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, key 1099 source4/torture/rpc/winreg.c present = fn(p, tctx, handle, key, sid); key 1120 source4/torture/rpc/winreg.c const char *key) key 1236 source4/torture/rpc/winreg.c if (!test_BackupSecurity(p, tctx, handle, key, &sd_orig)) { key 1247 source4/torture/rpc/winreg.c key, key 1271 source4/torture/rpc/winreg.c key, key 1295 source4/torture/rpc/winreg.c key, key 1319 source4/torture/rpc/winreg.c key, key 1337 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig); key 1345 source4/torture/rpc/winreg.c const char *key) key 1349 source4/torture/rpc/winreg.c if (!test_SecurityDescriptor(p, tctx, handle, key)) { key 1354 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorInheritance(p, tctx, handle, key)) { key 1359 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorBlockInheritance(p, tctx, handle, key)) { key 1364 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorsSecInfo(p, tctx, handle, key)) { key 1369 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorsMasks(p, tctx, handle, key)) { key 1378 source4/torture/rpc/winreg.c struct policy_handle *handle, const char *key) key 1384 source4/torture/rpc/winreg.c init_winreg_String(&r.in.key, key); key 165 source4/winbind/wb_pam_auth.c state->user_session_key = base->key; key 537 source4/winbind/wb_samba3_cmd.c &user_session_key.key, key 548 source4/winbind/wb_samba3_cmd.c lm_key.key,