ck_data
free(decrypt_init.di_key.ck_data);
decrypt_init.di_key.ck_data =
if (decrypt_init.di_key.ck_data == NULL) {
rv = do_soft_hmac_init(get_spp(opp), pMechanism, keyp->ck_data,
if (encrypt_init.ei_key.ck_data == NULL) {
free(encrypt_init.ei_key.ck_data);
encrypt_init.ei_key.ck_data =
free(sign_init.si_key.ck_data);
sign_init.si_key.ck_data =
if (sign_init.si_key.ck_data == NULL) {
free(verify_init.vi_key.ck_data);
verify_init.vi_key.ck_data =
if (verify_init.vi_key.ck_data == NULL) {
init.mi_key.ck_data = op->key;
init.ei_key.ck_data = op->key;
init.di_key.ck_data = op->key;
aes_init_keysched(key->ck_data, key->ck_length, newbie);
arcfour_key_init(keystream, key->ck_data,
blowfish_init_keysched(key->ck_data, key->ck_length, keysched);
if (key->ck_length == 0 || key->ck_data == NULL)
bzero(key->ck_data, len);
kmem_free(key->ck_data, len);
out_key->ck_data = kmem_alloc(key_bytes, KM_SLEEP);
if (copyin((char *)STRUCT_FGETP(key, ck_data),
out_key->ck_data, key_bytes) != 0) {
kmem_free(out_key->ck_data, key_bytes);
out_key->ck_data = NULL;
value = (uchar_t *)key->ck_data;
data.cd_raw.iov_base = key.ck_data;
data.cd_raw.iov_base = base_keyp->ck_data;
ret_key->ck_data = key->ck_data;
ret_key->ck_data = value;
ret_key->ck_data = value;
key->ck_data, keylen_in_bytes, digest);
md5_mac_init_ctx(&md5_hmac_ctx, key->ck_data,
key->ck_data, keylen_in_bytes, digest);
md5_mac_init_ctx(&md5_hmac_ctx, key->ck_data,
key->ck_data, keylen_in_bytes, digested_key);
md5_mac_init_ctx(md5_hmac_ctx_tmpl, key->ck_data,
key->ck_data, keylen_in_bytes, digested_key);
key->ck_data, keylen_in_bytes);
key->ck_data, keylen_in_bytes, digest);
sha1_mac_init_ctx(&sha1_hmac_ctx, key->ck_data,
key->ck_data, keylen_in_bytes, digest);
sha1_mac_init_ctx(&sha1_hmac_ctx, key->ck_data,
key->ck_data, keylen_in_bytes, digested_key);
sha1_mac_init_ctx(sha1_hmac_ctx_tmpl, key->ck_data,
key->ck_data, keylen_in_bytes, digested_key);
key->ck_data, keylen_in_bytes);
key->ck_data, keylen_in_bytes, digested_key);
key->ck_data, keylen_in_bytes);
key->ck_data, keylen_in_bytes, digest);
sha2_mac_init_ctx(&sha2_hmac_ctx, key->ck_data,
key->ck_data, keylen_in_bytes, digest);
sha2_mac_init_ctx(&sha2_hmac_ctx, key->ck_data,
key->ck_data, keylen_in_bytes, digested_key);
sha2_mac_init_ctx(sha2_hmac_ctx_tmpl, key->ck_data,
SKEIN_OP(ctx, InitExt, ctx->sc_digest_bitlen, 0, key->ck_data,
bcopy(key->ck_data, keydata, CRYPTO_BITS2BYTES(expectedkeylen));
if (des_keycheck(keydata, strength, key->ck_data) == B_FALSE)
if (key->ck_data == NULL)
des_parity_fix(key->ck_data, strength, corrected_key);
ctxp->ckey.ck_data = key;
ctxp->ckey.ck_data = key;
ckey.ck_data = key;
ckey.ck_data = key;
ckey.ck_data = key;
ctxp->ckey.ck_data = key;
ctxp->ckey.ck_data = key;
.ck_data = key,
if (wkey->wk_key.ck_data) {
bzero(wkey->wk_key.ck_data,
kmem_free(wkey->wk_key.ck_data,
wkey->wk_key.ck_data = kmem_alloc(WRAPPING_KEY_LEN, KM_SLEEP);
if (!wkey->wk_key.ck_data) {
bcopy(wkeydata, wkey->wk_key.ck_data, WRAPPING_KEY_LEN);
key.ck_data = salt;
key.ck_data = extract_key;
tmp_ckey.ck_data = enc_keydata;
key->zk_current_key.ck_data = key->zk_current_keydata;
key->zk_hmac_key.ck_data = &key->zk_hmac_key;
key->zk_current_key.ck_data = key->zk_current_keydata;
key->zk_hmac_key.ck_data = key->zk_hmac_keydata;
if (key->kef_key.ck_data == NULL)
if (key->kef_key.ck_data == NULL &&
key->kef_key.ck_data = NULL;
key->kef_key.ck_data = NULL;
key->kef_key.ck_data = NULL;
key->kef_key.ck_data = NULL;
if (key->kef_key.ck_data == NULL) {
if (key->kef_key.ck_data == NULL) {
key->kef_key.ck_data = key->contents;
newkey.kef_key.ck_data = NULL;
newkey.kef_key.ck_data = NULL;
if (key->kef_key.ck_data == NULL) {
if (key->kef_key.ck_data == NULL) {
to->kef_key.ck_data = NULL;
newbie->ipsa_kcfauthkey.ck_data = newbie->ipsa_authkey;
newbie->ipsa_kcfencrkey.ck_data = newbie->ipsa_encrkey;
crypto_key.ck_data = sadb_key + 1;
newbie->ipsa_kcfauthkey.ck_data =
newbie->ipsa_kcfencrkey.ck_data =
crkey.ck_data = cdata->key;
k1.ck_data = k1data;
if (tmi->dec_data.d_encr_key.ck_data == NULL)
tmi->dec_data.d_encr_key.ck_data = kmem_zalloc(
(char *)tmi->dec_data.d_encr_key.ck_data,
k2.ck_data = k2data;
k2.ck_data = k2data;
k1.ck_data = k1data;
if (key->ck_data == NULL)
key->ck_data = kmem_zalloc(
(char *)key->ck_data, CRYPT_ARCFOUR_KEYBYTES);
if (cd->d_encr_key.ck_data != NULL) {
bzero(cd->d_encr_key.ck_data, cd->keylen);
kmem_free(cd->d_encr_key.ck_data, cd->keylen);
if (cd->d_hmac_key.ck_data != NULL) {
bzero(cd->d_hmac_key.ck_data, cd->keylen);
kmem_free(cd->d_hmac_key.ck_data, cd->keylen);
cd->ckey->ck_data = cd->key;
if (cd->d_encr_key.ck_data != NULL) {
bzero(cd->d_encr_key.ck_data, cd->keylen);
kmem_free(cd->d_encr_key.ck_data, cd->keylen);
if (cd->d_hmac_key.ck_data != NULL) {
bzero(cd->d_hmac_key.ck_data, cd->keylen);
kmem_free(cd->d_hmac_key.ck_data, cd->keylen);
enckey->ck_data = kmem_zalloc(cdata->keylen, KM_SLEEP);
enckey->ck_data, keybytes, cdata->blocklen);
hmackey->ck_data = kmem_zalloc(cdata->keylen, KM_SLEEP);
hmackey->ck_data, keybytes,
lsp->ls_key.ck_data = kmem_alloc(
bcopy(klip->li_key, lsp->ls_key.ck_data,
if (lsp->ls_key.ck_data != NULL) {
bzero(lsp->ls_key.ck_data,
kmem_free(lsp->ls_key.ck_data,
lsp->ls_key.ck_data = NULL;
crkey.ck_data = (char *)key;
crkey.ck_data = (char *)key;
crkey.ck_data = (char *)key;