keys 189 lib/tdb/tools/tdbtest.c char keys[5][2];
keys 194 lib/tdb/tools/tdbtest.c snprintf(keys[i],2, "%d", i);
keys 195 lib/tdb/tools/tdbtest.c key.dptr = keys[i];
keys 206 lib/tdb/tools/tdbtest.c key.dptr = keys[0];
keys 208 lib/tdb/tools/tdbtest.c key.dptr = keys[4];
keys 210 lib/tdb/tools/tdbtest.c key.dptr = keys[2];
keys 212 lib/tdb/tools/tdbtest.c key.dptr = keys[1];
keys 214 lib/tdb/tools/tdbtest.c key.dptr = keys[3];
keys 149 lib/zlib/contrib/minizip/unzip.c unsigned long keys[3]; /* keys defining the pseudo-random sequence */
keys 1171 lib/zlib/contrib/minizip/unzip.c init_keys(password,s->keys,s->pcrc_32_tab);
keys 1181 lib/zlib/contrib/minizip/unzip.c zdecode(s->keys,s->pcrc_32_tab,source[i]);
keys 1292 lib/zlib/contrib/minizip/unzip.c zdecode(s->keys,s->pcrc_32_tab,
keys 132 lib/zlib/contrib/minizip/zip.c unsigned long keys[3]; /* keys defining the pseudo-random sequence */
keys 886 lib/zlib/contrib/minizip/zip.c sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
keys 955 lib/zlib/contrib/minizip/zip.c zi->ci.buffered_data[i] = zencode(zi->ci.keys, zi->ci.pcrc_32_tab,
keys 208 librpc/gen_ndr/drsblobs.h struct package_PrimaryKerberosKey3 *keys;
keys 234 librpc/gen_ndr/drsblobs.h struct package_PrimaryKerberosKey4 *keys;
keys 1642 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey3(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys 1656 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey3(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys 1676 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys);
keys 1678 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys 1680 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey3(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys 1699 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys 1701 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey3(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys 1728 librpc/gen_ndr/ndr_drsblobs.c ndr_print_package_PrimaryKerberosKey3(ndr, "keys", &r->keys[cntr_keys_0]);
keys 1870 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey4(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys 1882 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_package_PrimaryKerberosKey4(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys 1912 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys);
keys 1914 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys 1916 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey4(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys 1944 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys 1946 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_package_PrimaryKerberosKey4(ndr, NDR_BUFFERS, &r->keys[cntr_keys_0]));
keys 1990 librpc/gen_ndr/ndr_drsblobs.c ndr_print_package_PrimaryKerberosKey4(ndr, "keys", &r->keys[cntr_keys_0]);
keys 2364 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_USER_KEY_UNION(ndr, NDR_SCALARS, &r->keys));
keys 2376 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_USER_KEY_UNION(ndr, NDR_SCALARS, &r->keys));
keys 2388 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_USER_KEY_UNION(ndr, "keys", &r->keys);
keys 296 librpc/gen_ndr/netlogon.h struct netr_USER_KEY_UNION keys;
keys 254 source3/include/nt_printing.h NT_PRINTER_KEY *keys;
keys 406 source3/libads/ldap_printer.c REGVAL_CTR *ctr = data->keys[key].values;
keys 436 source3/libnet/libnet_dssync_keytab.c if (!pkb4->keys[i].value) {
keys 442 source3/libnet/libnet_dssync_keytab.c pkb4->keys[i].keytype,
keys 443 source3/libnet/libnet_dssync_keytab.c *pkb4->keys[i].value);
keys 478 source3/libnet/libnet_dssync_keytab.c if (!pkb3->keys[i].value) {
keys 483 source3/libnet/libnet_dssync_keytab.c pkb3->keys[i].keytype,
keys 484 source3/libnet/libnet_dssync_keytab.c *pkb3->keys[i].value);
keys 71 source3/libnet/libnet_samsync.c struct netr_USER_KEYS keys;
keys 79 source3/libnet/libnet_samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, NULL, &keys,
keys 89 source3/libnet/libnet_samsync.c if (keys.keys.keys2.lmpassword.length == 16) {
keys 90 source3/libnet/libnet_samsync.c if (memcmp(keys.keys.keys2.lmpassword.pwd.hash,
keys 93 source3/libnet/libnet_samsync.c keys.keys.keys2.lmpassword.pwd.hash,
keys 101 source3/libnet/libnet_samsync.c if (keys.keys.keys2.ntpassword.length == 16) {
keys 102 source3/libnet/libnet_samsync.c if (memcmp(keys.keys.keys2.ntpassword.pwd.hash,
keys 105 source3/libnet/libnet_samsync.c keys.keys.keys2.ntpassword.pwd.hash,
keys 143 source3/librpc/gen_ndr/messaging.h DATA_BLOB *keys;
keys 206 source3/librpc/gen_ndr/ndr_messaging.c NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->keys[cntr_keys_0]));
keys 233 source3/librpc/gen_ndr/ndr_messaging.c NDR_PULL_ALLOC_N(ndr, r->keys, r->num_keys);
keys 235 source3/librpc/gen_ndr/ndr_messaging.c NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
keys 237 source3/librpc/gen_ndr/ndr_messaging.c NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
keys 263 source3/librpc/gen_ndr/ndr_messaging.c ndr_print_DATA_BLOB(ndr, "keys", r->keys[cntr_keys_0]);
keys 2431 source3/printing/nt_printing.c val_ctr = data->keys[i].values;
keys 2437 source3/printing/nt_printing.c &data->keys[i].name,
keys 2438 source3/printing/nt_printing.c data->keys[i].name,
keys 2450 source3/printing/nt_printing.c data->keys[i].name,
keys 2804 source3/printing/nt_printing.c if ( !(d = TALLOC_REALLOC_ARRAY( data, data->keys, NT_PRINTER_KEY, data->num_keys+1)) ) {
keys 2809 source3/printing/nt_printing.c data->keys = d;
keys 2815 source3/printing/nt_printing.c data->keys[key_index].name = talloc_strdup( data, name );
keys 2817 source3/printing/nt_printing.c if ( !(data->keys[key_index].values = TALLOC_ZERO_P( data, REGVAL_CTR )) )
keys 2836 source3/printing/nt_printing.c if ( strequal( data->keys[i].name, name ) ) {
keys 2840 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].name );
keys 2841 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].values );
keys 2847 source3/printing/nt_printing.c memmove( &data->keys[i], &data->keys[i+1], sizeof(NT_PRINTER_KEY)*(data->num_keys-i) );
keys 2874 source3/printing/nt_printing.c if ( strequal(data->keys[i].name, name) ) {
keys 2918 source3/printing/nt_printing.c fstrcpy( subkeys_ptr[num_subkeys], data->keys[i].name );
keys 2929 source3/printing/nt_printing.c if ( StrnCaseCmp(data->keys[i].name, key, strlen(key)) == 0 ) {
keys 2933 source3/printing/nt_printing.c if ( strlen(data->keys[i].name) == key_len )
keys 2938 source3/printing/nt_printing.c p = data->keys[i].name + key_len;
keys 3061 source3/printing/nt_printing.c ctr = info2->data->keys[i].values;
keys 3130 source3/printing/nt_printing.c ctr = info2->data->keys[i].values;
keys 3427 source3/printing/nt_printing.c !(ctr = printer->info_2->data->keys[i].values) ||
keys 3516 source3/printing/nt_printing.c if ( StrnCaseCmp( data->keys[i].name, key, strlen(key)) == 0 ) {
keys 3518 source3/printing/nt_printing.c data->keys[i].name));
keys 3520 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].name );
keys 3521 source3/printing/nt_printing.c TALLOC_FREE( data->keys[i].values );
keys 3525 source3/printing/nt_printing.c ZERO_STRUCTP( &data->keys[i] );
keys 3532 source3/printing/nt_printing.c if ( !data->keys[i].name ) {
keys 3546 source3/printing/nt_printing.c if ( data->keys[i].name ) {
keys 3547 source3/printing/nt_printing.c memcpy( &data->keys[empty_slot], &data->keys[i], sizeof(NT_PRINTER_KEY) );
keys 3548 source3/printing/nt_printing.c ZERO_STRUCTP( &data->keys[i] );
keys 3563 source3/printing/nt_printing.c SAFE_FREE( data->keys );
keys 3591 source3/printing/nt_printing.c if ( !regval_ctr_getvalue( p2->data->keys[key_index].values, value ) )
keys 3594 source3/printing/nt_printing.c regval_ctr_delvalue( p2->data->keys[key_index].values, value );
keys 3625 source3/printing/nt_printing.c regval_ctr_addvalue( p2->data->keys[key_index].values, value,
keys 3647 source3/printing/nt_printing.c return regval_ctr_getvalue( p2->data->keys[key_index].values, value );
keys 3754 source3/printing/nt_printing.c regval_ctr_addvalue( printer_data->keys[key_index].values,
keys 3762 source3/printing/nt_printing.c regval_ctr_addvalue( printer_data->keys[key_index].values,
keys 520 source3/registry/reg_backend_printing.c num_values = regval_ctr_numvals( p_data->keys[key_index].values );
keys 522 source3/registry/reg_backend_printing.c regval_ctr_copyvalue( values, regval_ctr_specific_value(p_data->keys[key_index].values, i) );
keys 7982 source3/rpc_server/srv_spoolss_nt.c num_values = regval_ctr_numvals( p_data->keys[key_index].values );
keys 7986 source3/rpc_server/srv_spoolss_nt.c val = regval_ctr_specific_value( p_data->keys[key_index].values, i );
keys 8017 source3/rpc_server/srv_spoolss_nt.c val = regval_ctr_specific_value(p_data->keys[key_index].values,
keys 9479 source3/rpc_server/srv_spoolss_nt.c count = regval_ctr_numvals(p_data->keys[key_index].values);
keys 9505 source3/rpc_server/srv_spoolss_nt.c val = regval_ctr_specific_value(p_data->keys[key_index].values, i);
keys 455 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys = talloc_array(io->ac,
keys 458 source4/dsdb/samdb/ldb_modules/password_hash.c if (!pkb3->keys) {
keys 463 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[0].keytype = ENCTYPE_DES_CBC_MD5;
keys 464 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[0].value = &io->g.des_md5;
keys 465 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[1].keytype = ENCTYPE_DES_CBC_CRC;
keys 466 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->keys[1].value = &io->g.des_crc;
keys 529 source4/dsdb/samdb/ldb_modules/password_hash.c pkb3->old_keys = old_pkb3->keys;
keys 561 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys = talloc_array(io->ac,
keys 564 source4/dsdb/samdb/ldb_modules/password_hash.c if (!pkb4->keys) {
keys 569 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[0].iteration_count = 4096;
keys 570 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[0].keytype = ENCTYPE_AES256_CTS_HMAC_SHA1_96;
keys 571 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[0].value = &io->g.aes_256;
keys 572 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[1].iteration_count = 4096;
keys 573 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[1].keytype = ENCTYPE_AES128_CTS_HMAC_SHA1_96;
keys 574 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[1].value = &io->g.aes_128;
keys 575 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[2].iteration_count = 4096;
keys 576 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[2].keytype = ENCTYPE_DES_CBC_MD5;
keys 577 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[2].value = &io->g.des_md5;
keys 578 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[3].iteration_count = 4096;
keys 579 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[3].keytype = ENCTYPE_DES_CBC_CRC;
keys 580 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->keys[3].value = &io->g.des_crc;
keys 647 source4/dsdb/samdb/ldb_modules/password_hash.c pkb4->old_keys = old_pkb4->keys;
keys 475 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len;
keys 483 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
keys 485 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype)
keys 488 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) {
keys 497 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
keys 506 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
keys 509 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j])
keys 512 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
keys 520 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
keys 636 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len;
keys 644 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
keys 646 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype)
keys 649 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) {
keys 655 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
keys 665 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
keys 668 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j])
keys 671 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
keys 676 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
keys 1115 source4/heimdal/lib/hcrypto/des.c uint32_t *keys;
keys 1123 source4/heimdal/lib/hcrypto/des.c keys = &ks->ks[0];
keys 1127 source4/heimdal/lib/hcrypto/des.c work ^= *keys++;
keys 1132 source4/heimdal/lib/hcrypto/des.c work = right ^ *keys++;
keys 1139 source4/heimdal/lib/hcrypto/des.c work ^= *keys++;
keys 1144 source4/heimdal/lib/hcrypto/des.c work = left ^ *keys++;
keys 1152 source4/heimdal/lib/hcrypto/des.c keys = &ks->ks[30];
keys 1156 source4/heimdal/lib/hcrypto/des.c work ^= *keys++;
keys 1161 source4/heimdal/lib/hcrypto/des.c work = right ^ *keys++;
keys 1168 source4/heimdal/lib/hcrypto/des.c keys -= 4;
keys 1169 source4/heimdal/lib/hcrypto/des.c work ^= *keys++;
keys 1174 source4/heimdal/lib/hcrypto/des.c work = left ^ *keys++;
keys 1180 source4/heimdal/lib/hcrypto/des.c keys -= 4;
keys 76 source4/heimdal/lib/hdb/hdb.c for (k = *key ? (*key) + 1 : e->keys.val;
keys 77 source4/heimdal/lib/hdb/hdb.c k < e->keys.val + e->keys.len;
keys 148 source4/heimdal/lib/hdb/hdb.c for(i = 0; i < ent->entry.keys.len; ++i) {
keys 149 source4/heimdal/lib/hdb/hdb.c Key *k = &ent->entry.keys.val[i];
keys 43 source4/heimdal/lib/hdb/keys.c hdb_free_keys (krb5_context context, int len, Key *keys)
keys 48 source4/heimdal/lib/hdb/keys.c free(keys[i].mkvno);
keys 49 source4/heimdal/lib/hdb/keys.c keys[i].mkvno = NULL;
keys 50 source4/heimdal/lib/hdb/keys.c if (keys[i].salt != NULL) {
keys 51 source4/heimdal/lib/hdb/keys.c free_Salt(keys[i].salt);
keys 52 source4/heimdal/lib/hdb/keys.c free(keys[i].salt);
keys 53 source4/heimdal/lib/hdb/keys.c keys[i].salt = NULL;
keys 55 source4/heimdal/lib/hdb/keys.c krb5_free_keyblock_contents(context, &keys[i].key);
keys 57 source4/heimdal/lib/hdb/keys.c free (keys);
keys 369 source4/heimdal/lib/hdb/keys.c Key **keys, size_t *num_keys)
keys 375 source4/heimdal/lib/hdb/keys.c keys, num_keys, 0);
keys 382 source4/heimdal/lib/hdb/keys.c salt.salttype = (*keys)[i].salt->type;
keys 383 source4/heimdal/lib/hdb/keys.c salt.saltvalue.length = (*keys)[i].salt->salt.length;
keys 384 source4/heimdal/lib/hdb/keys.c salt.saltvalue.data = (*keys)[i].salt->salt.data;
keys 387 source4/heimdal/lib/hdb/keys.c (*keys)[i].key.keytype,
keys 390 source4/heimdal/lib/hdb/keys.c &(*keys)[i].key);
keys 397 source4/heimdal/lib/hdb/keys.c hdb_free_keys (context, *num_keys, *keys);
keys 240 source4/heimdal/lib/hdb/keytab.c if(ent.entry.keys.len > 0)
keys 241 source4/heimdal/lib/hdb/keytab.c enctype = ent.entry.keys.val[0].key.keytype;
keys 243 source4/heimdal/lib/hdb/keytab.c for(i = 0; i < ent.entry.keys.len; i++) {
keys 244 source4/heimdal/lib/hdb/keytab.c if(ent.entry.keys.val[i].key.keytype == enctype) {
keys 248 source4/heimdal/lib/hdb/keytab.c &ent.entry.keys.val[i].key,
keys 462 source4/heimdal/lib/hdb/mkey.c for(i = 0; i < ent->keys.len; i++){
keys 465 source4/heimdal/lib/hdb/mkey.c ret = hdb_unseal_key_mkey(context, &ent->keys.val[i], mkey);
keys 528 source4/heimdal/lib/hdb/mkey.c for(i = 0; i < ent->keys.len; i++){
keys 531 source4/heimdal/lib/hdb/mkey.c ret = hdb_seal_key_mkey(context, &ent->keys.val[i], mkey);
keys 287 source4/heimdal/lib/hx509/collector.c hx509_private_key **keys)
keys 291 source4/heimdal/lib/hx509/collector.c *keys = NULL;
keys 297 source4/heimdal/lib/hx509/collector.c *keys = calloc(nkeys + 1, sizeof(**keys));
keys 298 source4/heimdal/lib/hx509/collector.c if (*keys == NULL) {
keys 305 source4/heimdal/lib/hx509/collector.c (*keys)[nkeys++] = c->val.data[i]->private_key;
keys 309 source4/heimdal/lib/hx509/collector.c (*keys)[nkeys++] = NULL;
keys 644 source4/heimdal/lib/hx509/keyset.c hx509_private_key **keys)
keys 647 source4/heimdal/lib/hx509/keyset.c *keys = NULL;
keys 650 source4/heimdal/lib/hx509/keyset.c return (*certs->ops->getkeys)(context, certs, certs->ops_data, keys);
keys 671 source4/heimdal/lib/hx509/keyset.c hx509_private_key *keys)
keys 674 source4/heimdal/lib/hx509/keyset.c for (i = 0; keys[i]; i++)
keys 675 source4/heimdal/lib/hx509/keyset.c _hx509_private_key_free(&keys[i]);
keys 676 source4/heimdal/lib/hx509/keyset.c free(keys);
keys 335 source4/heimdal/lib/hx509/ks_file.c hx509_private_key *keys = NULL;
keys 426 source4/heimdal/lib/hx509/ks_file.c ret = _hx509_collector_collect_private_keys(context, pem_ctx.c, &keys);
keys 430 source4/heimdal/lib/hx509/ks_file.c for (i = 0; keys[i]; i++)
keys 431 source4/heimdal/lib/hx509/ks_file.c _hx509_certs_keys_add(context, f->certs, keys[i]);
keys 432 source4/heimdal/lib/hx509/ks_file.c _hx509_certs_keys_free(context, keys);
keys 574 source4/heimdal/lib/hx509/ks_file.c hx509_private_key **keys)
keys 577 source4/heimdal/lib/hx509/ks_file.c return _hx509_certs_keys_get(context, f->certs, keys);
keys 49 source4/heimdal/lib/hx509/ks_mem.c hx509_private_key *keys;
keys 81 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++)
keys 82 source4/heimdal/lib/hx509/ks_mem.c _hx509_private_key_free(&mem->keys[i]);
keys 83 source4/heimdal/lib/hx509/ks_mem.c free(mem->keys);
keys 159 source4/heimdal/lib/hx509/ks_mem.c hx509_private_key **keys)
keys 164 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++)
keys 166 source4/heimdal/lib/hx509/ks_mem.c *keys = calloc(i + 1, sizeof(**keys));
keys 167 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++) {
keys 168 source4/heimdal/lib/hx509/ks_mem.c (*keys)[i] = _hx509_private_key_ref(mem->keys[i]);
keys 169 source4/heimdal/lib/hx509/ks_mem.c if ((*keys)[i] == NULL) {
keys 171 source4/heimdal/lib/hx509/ks_mem.c _hx509_private_key_free(&(*keys)[i]);
keys 176 source4/heimdal/lib/hx509/ks_mem.c (*keys)[i] = NULL;
keys 190 source4/heimdal/lib/hx509/ks_mem.c for (i = 0; mem->keys && mem->keys[i]; i++)
keys 192 source4/heimdal/lib/hx509/ks_mem.c ptr = realloc(mem->keys, (i + 2) * sizeof(*mem->keys));
keys 197 source4/heimdal/lib/hx509/ks_mem.c mem->keys = ptr;
keys 198 source4/heimdal/lib/hx509/ks_mem.c mem->keys[i] = _hx509_private_key_ref(key);
keys 199 source4/heimdal/lib/hx509/ks_mem.c mem->keys[i + 1] = NULL;
keys 436 source4/heimdal/lib/krb5/crypto.c DES_cblock keys[3];
keys 461 source4/heimdal/lib/krb5/crypto.c memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
keys 462 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity(keys + i);
keys 463 source4/heimdal/lib/krb5/crypto.c if(DES_is_weak_key(keys + i))
keys 464 source4/heimdal/lib/krb5/crypto.c xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
keys 465 source4/heimdal/lib/krb5/crypto.c DES_set_key_unchecked(keys + i, &s[i]);
keys 474 source4/heimdal/lib/krb5/crypto.c memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
keys 475 source4/heimdal/lib/krb5/crypto.c DES_set_odd_parity(keys + i);
keys 476 source4/heimdal/lib/krb5/crypto.c if(DES_is_weak_key(keys + i))
keys 477 source4/heimdal/lib/krb5/crypto.c xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
keys 482 source4/heimdal/lib/krb5/crypto.c krb5_data_copy(&key->keyvalue, keys, sizeof(keys));
keys 483 source4/heimdal/lib/krb5/crypto.c memset(keys, 0, sizeof(keys));
keys 221 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = NULL;
keys 222 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0;
keys 327 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0;
keys 328 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = calloc(allocated_keys, sizeof(Key));
keys 329 source4/kdc/hdb-samba4.c if (entry_ex->entry.keys.val == NULL) {
keys 348 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys 349 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++;
keys 357 source4/kdc/hdb-samba4.c if (!pkb4->keys[i].value) continue;
keys 360 source4/kdc/hdb-samba4.c switch (pkb4->keys[i].keytype) {
keys 399 source4/kdc/hdb-samba4.c pkb4->keys[i].keytype,
keys 400 source4/kdc/hdb-samba4.c pkb4->keys[i].value->data,
keys 401 source4/kdc/hdb-samba4.c pkb4->keys[i].value->length,
keys 412 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys 413 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++;
keys 420 source4/kdc/hdb-samba4.c if (!pkb3->keys[i].value) continue;
keys 423 source4/kdc/hdb-samba4.c switch (pkb3->keys[i].keytype) {
keys 460 source4/kdc/hdb-samba4.c pkb3->keys[i].keytype,
keys 461 source4/kdc/hdb-samba4.c pkb3->keys[i].value->data,
keys 462 source4/kdc/hdb-samba4.c pkb3->keys[i].value->length,
keys 473 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys 474 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++;
keys 480 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0;
keys 482 source4/kdc/hdb-samba4.c if (entry_ex->entry.keys.len == 0 && entry_ex->entry.keys.val) {
keys 483 source4/kdc/hdb-samba4.c free(entry_ex->entry.keys.val);
keys 484 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = NULL;
keys 670 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->len = entry_ex->entry.keys.len;
keys 678 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;
keys 790 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len = 0;
keys 791 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = NULL;
keys 796 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val = calloc(1, sizeof(Key));
keys 801 source4/kdc/hdb-samba4.c if (entry_ex->entry.keys.val == NULL) {
keys 811 source4/kdc/hdb-samba4.c entry_ex->entry.keys.val[entry_ex->entry.keys.len] = key;
keys 812 source4/kdc/hdb-samba4.c entry_ex->entry.keys.len++;
keys 859 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->len = entry_ex->entry.keys.len;
keys 867 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;
keys 67 source4/libnet/libnet_samsync.c struct netr_USER_KEYS keys;
keys 75 source4/libnet/libnet_samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, NULL, &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS);
keys 82 source4/libnet/libnet_samsync.c if (keys.keys.keys2.lmpassword.length == 16) {
keys 84 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, keys.keys.keys2.lmpassword.pwd.hash, lm_hash.hash, 0);
keys 87 source4/libnet/libnet_samsync.c user->lmpassword = keys.keys.keys2.lmpassword.pwd;
keys 91 source4/libnet/libnet_samsync.c if (keys.keys.keys2.ntpassword.length == 16) {
keys 93 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, keys.keys.keys2.ntpassword.pwd.hash, nt_hash.hash, 0);
keys 96 source4/libnet/libnet_samsync.c user->ntpassword = keys.keys.keys2.ntpassword.pwd;
keys 577 source4/torture/rpc/samsync.c struct netr_USER_KEYS keys;
keys 582 source4/torture/rpc/samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, lp_iconv_convenience(tctx->lp_ctx), &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS);
keys 584 source4/torture/rpc/samsync.c if (keys.keys.keys2.lmpassword.length == 16) {
keys 585 source4/torture/rpc/samsync.c sam_rid_crypt(rid, keys.keys.keys2.lmpassword.pwd.hash, lm_hash.hash, 0);
keys 588 source4/torture/rpc/samsync.c if (keys.keys.keys2.ntpassword.length == 16) {
keys 589 source4/torture/rpc/samsync.c sam_rid_crypt(rid, keys.keys.keys2.ntpassword.pwd.hash, nt_hash.hash, 0);