rc5
if (rc5) return rc5;
int rc5 = 0;
rc = rc5 = Leash_changepwd_v5(principal, password, newpassword,
0, rc5, 0, error_str,
int rc5 = 0;
int rc5,
rc5 = Leash_krb5_kinit(ctx, hParent,
custom_msg = (rc5 == KRB5KRB_AP_ERR_BAD_INTEGRITY) ? "Password incorrect" : NULL;
rcL, rc5, rcA, custom_msg,
if (!rc5 && !rcL)
if (rc5 && !result_string)
perror_message(rc5),
rc5
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_START(rc5)
CIPHER_DEFAULT_GETTABLE_CTX_PARAMS_END(rc5)
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_START(rc5)
CIPHER_DEFAULT_SETTABLE_CTX_PARAMS_END(rc5)
IMPLEMENT_cipher(rc5, RC5, ecb, ECB, RC5_FLAGS, 128, 64, 0, block)
IMPLEMENT_cipher(rc5, RC5, cbc, CBC, RC5_FLAGS, 128, 64, 64, block)
IMPLEMENT_cipher(rc5, RC5, ofb64, OFB, RC5_FLAGS, 128, 8, 64, stream)
IMPLEMENT_cipher(rc5, RC5, cfb64, CFB, RC5_FLAGS, 128, 8, 64, stream)
IMPLEMENT_CIPHER_HW_##UCMODE(mode, rc5, PROV_RC5_CTX, RC5_32_KEY, \
rc5 = -1.57625662981714582753490610560037638e5L, /* 0xc01033dc, 0xd4dc95b6, 0xfd4da93b, 0xf355b4a9 */
R=rc0+s*(rc1+s*(rc2+s*(rc3+s*(rc4+s*(rc5+s*(rc6+s*(rc7+
R=rc0+s*(rc1+s*(rc2+s*(rc3+s*(rc4+s*rc5))));