/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cast/ |
H A D | cast_spd.c | 178 static unsigned char key[] ={ local 195 CAST_set_key(&sch,16,key); 224 CAST_set_key(&sch,16,key); 225 CAST_set_key(&sch,16,key); 226 CAST_set_key(&sch,16,key); 227 CAST_set_key(&sch,16,key); 264 &(key[0]),CAST_ENCRYPT);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc2/ |
H A D | rc2speed.c | 178 static unsigned char key[] ={ local 195 RC2_set_key(&sch,16,key,128); 224 RC2_set_key(&sch,16,key,128); 225 RC2_set_key(&sch,16,key,128); 226 RC2_set_key(&sch,16,key,128); 227 RC2_set_key(&sch,16,key,128); 264 &(key[0]),RC2_ENCRYPT);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc5/ |
H A D | rc5speed.c | 178 static unsigned char key[] ={ local 195 RC5_32_set_key(&sch,16,key,12); 224 RC5_32_set_key(&sch,16,key,12); 225 RC5_32_set_key(&sch,16,key,12); 226 RC5_32_set_key(&sch,16,key,12); 227 RC5_32_set_key(&sch,16,key,12); 264 &(key[0]),RC5_ENCRYPT);
|
H A D | rc5_skey.c | 62 void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, argument 73 key->rounds=rounds; 74 S= &(key->data[0]);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_wrap.c | 62 int AES_wrap_key(AES_KEY *key, const unsigned char *iv, argument 84 AES_encrypt(B, B, key); 99 int AES_unwrap_key(AES_KEY *key, const unsigned char *iv, argument 127 AES_decrypt(B, B, key); 146 const unsigned char *key, int keylen) 157 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); 168 if (memcmp(key, ptmp, keylen)) 195 static const unsigned char key[] = { local 244 ret = AES_wrap_unwrap_test(kek, 128, NULL, e1, key, 16); 246 ret = AES_wrap_unwrap_test(kek, 192, NULL, e2, key, 1 143 AES_wrap_unwrap_test(const unsigned char *kek, int keybits, const unsigned char *iv, const unsigned char *eout, const unsigned char *key, int keylen) argument [all...] |
H A D | aes_ige.c | 80 size_t length, const AES_KEY *key, 86 OPENSSL_assert(in && out && key && ivec); 107 AES_encrypt((unsigned char *)outp->data, (unsigned char *)outp->data, key); 133 AES_encrypt((unsigned char *)tmp2.data, (unsigned char *)tmp2.data, key); 163 AES_decrypt((unsigned char *)tmp.data, (unsigned char *)outp->data, key); 190 AES_decrypt((unsigned char *)tmp.data, (unsigned char *)tmp.data, key); 214 size_t length, const AES_KEY *key, 227 OPENSSL_assert(in && out && key && ivec); 243 AES_encrypt(out, out, key); 266 AES_encrypt(out, out, key); 79 AES_ige_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, const int enc) argument 213 AES_bi_ige_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, const AES_KEY *key2, const unsigned char *ivec, const int enc) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/engines/ |
H A D | e_capi.c | 134 void capi_free_key(CAPI_KEY *key); 206 /* Dump pseudo key (if possible) */ 208 /* Dump key info (if possible) */ 283 "32=private key info)", 287 "Set key lookup method (1=substring, 2=friendlyname, 3=container name)", 369 CAPI_trace(ctx, "Setting key type to %d\n", ctx->keytype); 507 /* CryptoAPI key application data. This contains 508 * a handle to the private key container (for sign operations) 509 * and a handle to the key (for decrypt operations). 517 HCRYPTKEY key; member in struct:CAPI_KEY_st 601 capi_get_pkey(ENGINE *eng, CAPI_KEY *key) argument 754 CAPI_KEY *key; local 1424 CAPI_KEY *key; local 1452 CAPI_KEY *key = NULL; local 1479 CAPI_KEY *key = NULL; local 1505 capi_free_key(CAPI_KEY *key) argument 1619 CAPI_KEY *key; local 1748 CAPI_KEY *key; local [all...] |
/barrelfish-2018-10-04/lib/libc/net/ |
H A D | getservent.c | 142 struct key { struct 150 static int wrap_getservbyname_r(struct key, struct servent *, char *, size_t, 152 static int wrap_getservbyport_r(struct key, struct servent *, char *, size_t, 154 static int wrap_getservent_r(struct key, struct servent *, char *, size_t, 156 static struct servent *getserv(int (*fn)(struct key, struct servent *, char *, 157 size_t, struct servent **), struct key); 491 DBT key, data, *result; local 552 key.data = buf; 554 key.size = snprintf(buf, sizeof(buf), 557 key 1278 wrap_getservbyname_r(struct key key, struct servent *serv, char *buffer, size_t bufsize, struct servent **res) argument 1286 wrap_getservbyport_r(struct key key, struct servent *serv, char *buffer, size_t bufsize, struct servent **res) argument 1294 wrap_getservent_r(struct key key, struct servent *serv, char *buffer, size_t bufsize, struct servent **res) argument 1301 getserv(int (*fn)(struct key, struct servent *, char *, size_t, struct servent **), struct key key) argument 1344 struct key key; local 1355 struct key key; local 1366 struct key key; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/util/ |
H A D | bat.sh | 11 ($key,$val)=/^([^=]+)=(.*)/; 12 if ($key eq "RELATIVE_DIRECTORY") 28 if ($key eq "TEST") 31 if (($key eq "PROGS") || ($key eq "E_OBJ")) 34 if ($key eq "LIB") 40 if ($key eq "EXHEADER") 43 if ($key eq "HEADER") 46 if ($key eq "LIBSRC")
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc4/ |
H A D | rc4_enc.c | 70 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata, argument 77 x=key->x; 78 y=key->y; 79 d=key->data; 206 key->x=x; 207 key->y=y; 259 key->x=x; 260 key->y=y; 313 key->x=x; 314 key [all...] |
H A D | rc4test.c | 120 RC4_KEY key; local 125 RC4_set_key(&key,keys[i][0],&(keys[i][1])); 127 RC4(&key,data_len[i],&(data[i][0]),obuf); 148 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 150 RC4(&key,i,&(data[3][0]),obuf); 175 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 177 RC4(&key,i,&(data[3][0]),obuf); 178 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])); 207 RC4_set_key(&key,keys[0][0],&(keys[3][1])); 211 RC4(&key,sizeo [all...] |
H A D | rc4speed.c | 178 static unsigned char key[] ={ local 195 RC4_set_key(&sch,16,key); 223 RC4_set_key(&sch,16,key); 224 RC4_set_key(&sch,16,key); 225 RC4_set_key(&sch,16,key); 226 RC4_set_key(&sch,16,key);
|
H A D | rc4.c | 70 " -key key - password\n", 78 RC4_KEY key; local 98 else if (strcmp(*argv,"-key") == 0) 155 { /* get key */ 168 RC4_set_key(&key,MD5_DIGEST_LENGTH,md); 179 RC4(&key,(unsigned int)i,(unsigned char *)buf,
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost2001_keyx.c | 6 * VK0 34.10-2001 key exchange and GOST R 34.10-2001 * 28 const BIGNUM* key=EC_KEY_get0_private_key(priv_key); local 45 BN_mod_mul(p,key,UKM,order,ctx); 50 * key */ 75 int pkey_gost2001_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument 77 /* Public key of peer in the ctx field peerkey 78 * Our private key in the ctx pkey 90 if (key == NULL) { 95 *keylen=VKO_compute_key(key, 32, EC_KEY_get0_public_key(EVP_PKEY_get0(peer_key)), 105 * Implementation of GOST2001 key transpor 117 pkey_GOST01cp_encrypt(EVP_PKEY_CTX *pctx, unsigned char *out, size_t *out_len, const unsigned char *key,size_t key_len) argument 228 pkey_GOST01cp_decrypt(EVP_PKEY_CTX *pctx, unsigned char *key, size_t * key_len, const unsigned char *in, size_t in_len) argument [all...] |
H A D | gost89.h | 35 /* Cipher context includes key and preprocessed substitution block */ 58 /* Set key into context */ 59 void gost_key(gost_ctx *ctx, const byte *key); 60 /* Get key from context */ 61 void gost_get_key(gost_ctx *ctx, byte *key); 67 void gost_enc_with_key(gost_ctx *,byte *key,byte *inblock,byte *outblock); 72 * IV (non-standard, for use in CryptoPro key transport only */ 79 /* Implements cryptopro key meshing algorithm. Expect IV to be 8-byte size*/
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | rc4test.c | 120 RC4_KEY key; local 125 RC4_set_key(&key,keys[i][0],&(keys[i][1])); 127 RC4(&key,data_len[i],&(data[i][0]),obuf); 148 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 150 RC4(&key,i,&(data[3][0]),obuf); 175 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 177 RC4(&key,i,&(data[3][0]),obuf); 178 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])); 207 RC4_set_key(&key,keys[0][0],&(keys[3][1])); 211 RC4(&key,sizeo [all...] |
/barrelfish-2018-10-04/lib/posixcompat/ |
H A D | shm.c | 25 key_t key; member in struct:_shm 105 int shmget(key_t key, size_t size, int shmflg) argument 110 // XXX: Private key not supported yet 111 assert(key != IPC_PRIVATE); 113 POSIXCOMPAT_DEBUG("key is not ipc_private\n"); 115 if(shms[i].used && shms[i].key == key) { 139 snprintf(skey, 128, "%lu", key); 179 s->key = key; [all...] |
/barrelfish-2018-10-04/usr/bcached/ |
H A D | main.c | 32 char *key; member in struct:lru_queue 124 key_state_t cache_lookup(const char *key, size_t key_len, argument 131 et = cache_hash->d.get(&cache_hash->d, key, key_len, &val); 155 /* printf("cache_lookup(\"%s\", %" PRIuPTR ") = %s\n", key, *idx, */ 204 uintptr_t cache_allocate(const char *key, size_t key_len) argument 212 int r = cache_hash->d.remove(&cache_hash->d, e->key, e->key_len); 214 free(e->key); 227 e->key = strdup(key); 228 assert(e->key); [all...] |
/barrelfish-2018-10-04/lib/libc/gen/ |
H A D | getpwent.c | 99 union key { union 104 static struct passwd *getpw(int (*fn)(union key, struct passwd *, char *, 105 size_t, struct passwd **), union key); 106 static int wrap_getpwnam_r(union key, struct passwd *, char *, 108 static int wrap_getpwuid_r(union key, struct passwd *, char *, size_t, 110 static int wrap_getpwent_r(union key, struct passwd *, char *, size_t, 163 char *key; member in struct:nis_state 641 getpw(int (*fn)(union key, struct passwd *, char *, size_t, struct passwd **), argument 642 union key key) 675 wrap_getpwnam_r(union key key, struct passwd *pwd, char *buffer, size_t bufsize, struct passwd **res) argument 683 wrap_getpwuid_r(union key key, struct passwd *pwd, char *buffer, size_t bufsize, struct passwd **res) argument 701 union key key; local 711 union key key; local 721 union key key; local 735 DBT key, entry; local 809 DBT key, entry; local 1306 char *buffer, *key, *result; local 1560 DBT key, data; local 1579 DBT key, data; local 1745 DBT key, entry; local [all...] |
/barrelfish-2018-10-04/lib/libc/db/btree/ |
H A D | bt_delete.c | 56 * Delete the item(s) referenced by a key. 58 * Return RET_SPECIAL if the key is not found. 61 __bt_delete(const DB *dbp, const DBT *key, u_int flags) argument 84 status = __bt_bdelete(t, key); 151 * Find the first occurrence of the key in the tree. Toss the 156 if ((e = __bt_search(t, &c->key, &exact)) == NULL) 215 if ((e = __bt_search(t, &c->key, &exact)) == NULL) 273 * Delete all key/data pairs matching the specified key. 277 * key 283 __bt_bdelete(BTREE *t, const DBT *key) argument 462 __bt_dleaf(BTREE *t, const DBT *key, PAGE *h, u_int idx) argument 523 __bt_curdel(BTREE *t, const DBT *key, PAGE *h, u_int idx) argument [all...] |
H A D | bt_close.c | 86 if (t->bt_cursor.key.data != NULL) { 87 free(t->bt_cursor.key.data); 88 t->bt_cursor.key.size = 0; 89 t->bt_cursor.key.data = NULL;
|
/barrelfish-2018-10-04/lib/libc/db/recno/ |
H A D | rec_seq.c | 52 * key: key for positioning and return value 57 * RET_ERROR, RET_SUCCESS or RET_SPECIAL if there's no next key. 60 __rec_seq(const DB *dbp, DBT *key, DBT *data, u_int flags) argument 77 if ((nrec = *(recno_t *)key->data) == 0) 121 status = __rec_ret(t, e, nrec, key, data);
|
/barrelfish-2018-10-04/lib/libc/iconv/ |
H A D | citrus_memstream.c | 70 const char * __restrict key, size_t * __restrict rlen, int iscasesensitive) 75 keylen = strlen(key); 97 if (memcmp(key, p, keylen) == 0) 100 if (_bcs_strncasecmp(key, p, keylen) == 0) 69 _citrus_memory_stream_matchline(struct _citrus_memory_stream * __restrict ms, const char * __restrict key, size_t * __restrict rlen, int iscasesensitive) argument
|
/barrelfish-2018-10-04/lib/lua/src/ |
H A D | loslib.c | 136 static void setfield (lua_State *L, const char *key, int value) { argument 138 lua_setfield(L, -2, key); 141 static void setboolfield (lua_State *L, const char *key, int value) { argument 145 lua_setfield(L, -2, key); 148 static int getboolfield (lua_State *L, const char *key) { argument 150 lua_getfield(L, -1, key); 157 static int getfield (lua_State *L, const char *key, int d) { argument 159 lua_getfield(L, -1, key); 163 return luaL_error(L, "field " LUA_QS " missing in date table", key);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | p8_pkey.c | 64 /* Minor tweak to operation: zero private key data */ 70 PKCS8_PRIV_KEY_INFO *key = (PKCS8_PRIV_KEY_INFO *)*pval; local 71 if (key->pkey->value.octet_string) 72 OPENSSL_cleanse(key->pkey->value.octet_string->data, 73 key->pkey->value.octet_string->length);
|