newkey
char *newmap = NULL, *newkey = NULL, *newval = NULL;
(newkey = malloc(keylen)) == NULL ||
free(newkey);
free(newkey);
(void)memcpy(newkey, key, keylen);
ep->key = newkey;
struct tls_ticket_key newkey;
sizeof(newkey.aes_key) + sizeof(newkey.hmac_key) > keylen) {
memset(&newkey, 0, sizeof(newkey));
memcpy(newkey.key_name, &keyrev, sizeof(keyrev));
memcpy(newkey.aes_key, key, sizeof(newkey.aes_key));
memcpy(newkey.hmac_key, key + sizeof(newkey.aes_key),
sizeof(newkey.hmac_key));
newkey.time = time(NULL);
if (memcmp(newkey.key_name, tk->key_name,
if (i == 0 && memcmp(newkey.aes_key, tk->aes_key,
sizeof(tk->aes_key)) == 0 && memcmp(newkey.hmac_key,
config->ticket_keys[0] = newkey;
struct ipsec_key *newkey;
if ((newkey = calloc(1, sizeof(struct ipsec_key))) == NULL)
if ((newkey->data = calloc(key->len, sizeof(u_int8_t))) == NULL)
memcpy(newkey->data, key->data, key->len);
newkey->len = key->len;
return (newkey);
long newkey;
cfg.newkey = -1;
if (!NCONF_get_number(req_conf, SECTION, BITS, &cfg.newkey)) {
cfg.newkey = DEFAULT_KEY_LENGTH;
genctx = set_keygen_ctx(bio_err, cfg.keyalg, &pkey_type, &cfg.newkey,
if (cfg.newkey < MIN_KEY_LENGTH && (pkey_type == EVP_PKEY_RSA || pkey_type == EVP_PKEY_DSA)) {
BIO_printf(bio_err, "it needs to be at least %d bits, not %ld\n", MIN_KEY_LENGTH, cfg.newkey);
genctx = set_keygen_ctx(bio_err, NULL, &pkey_type, &cfg.newkey,
cfg.newkey, keyalgstr);
struct newkeys *newkey;
if ((newkey = ssh->state->newkeys[mode]) == NULL)
enc = &newkey->enc;
mac = &newkey->mac;
comp = &newkey->comp;
struct newkeys *newkey = NULL;
if ((newkey = calloc(1, sizeof(*newkey))) == NULL) {
enc = &newkey->enc;
mac = &newkey->mac;
comp = &newkey->comp;
ssh->kex->newkeys[mode] = newkey;
newkey = NULL;
free(newkey);
key_code newkey;
newkey = options_get_number(global_options, "backspace");
key, newkey);
if ((newkey & KEYC_MASK_MODIFIERS) == 0)
ud.data[0] = newkey;
else if ((newkey & KEYC_MASK_MODIFIERS) == KEYC_CTRL) {
newkey &= KEYC_MASK_KEY;
if (newkey == '?')
else if (newkey >= '@' && newkey <= '_')
ud.data[0] = newkey - 0x40;
else if (newkey >= 'a' && newkey <= 'z')
ud.data[0] = newkey - 0x60;
key = newkey|(key & (KEYC_MASK_FLAGS|KEYC_MASK_MODIFIERS));
newkey = 1;
if (newkey) {
int len, rc = 0, cc, nid, newkey = 0, first;
struct btval *newkey, struct btval *newdata, pgno_t newpgno)
unsigned int *newindxp, struct btval *newkey,
(int)newkey->size, (char *)newkey->data, *newindxp);
sepkey.size = newkey->size;
sepkey.data = newkey->data;
rkey.data = newkey->data;
rkey.size = newkey->size;
testkey_type* k = newkey(12);
testkey_type* k2 = newkey(14);
testkey_type* k = newkey(12);
testkey_type* k2 = newkey(14);
testkey_type* key = newkey(numtoadd);
testkey_type* key = newkey(num);
testkey_type* key = newkey(num);
testkey_type* key = newkey(numtoadd);
testkey_type* key = newkey(num);
testkey_type* key = newkey(num);
testkey_type* k = newkey(12);
testkey_type* k2 = newkey(12 + 1024);
testkey_type* k3 = newkey(14);
testkey_type* k4 = newkey(12 + 1024*2);
testkey_type* key = newkey(numtoadd);
testkey_type* key = newkey(num);
testkey_type* key = newkey(num);
testkey_type* key = newkey(numtoadd);
testkey_type* key = newkey(num);
testkey_type* key = newkey(num);
testkey_type* k = newkey(12);
testkey_type* k2 = newkey(14);