/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cast/ |
H A D | cast_lcl.h | 169 #define E_CAST(n,key,L,R,OP1,OP2,OP3) \ 172 t=(key[n*2] OP1 R)&0xffffffffL; \ 173 i=key[n*2+1]; \ 185 #define E_CAST(n,key,L,R,OP1,OP2,OP3) \ 189 w=(key[n*2] OP1 R)&0xffffffffL; \ 190 i=key[n*2+1]; \ 207 #define E_CAST(n,key,L,R,OP1,OP2,OP3) \ 210 t=(key[n*2] OP1 R)&0xffffffff; \ 211 t=ROTL(t,(key[n*2+1])); \
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/ |
H A D | des.h | 217 void DES_set_odd_parity(DES_cblock *key); 218 int DES_check_key_parity(const_DES_cblock *key); 219 int DES_is_weak_key(const_DES_cblock *key); 223 int DES_set_key(const_DES_cblock *key,DES_key_schedule *schedule); 224 int DES_key_sched(const_DES_cblock *key,DES_key_schedule *schedule); 225 int DES_set_key_checked(const_DES_cblock *key,DES_key_schedule *schedule); 226 void DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule); 227 void DES_string_to_key(const char *str,DES_cblock *key); 235 int DES_read_password(DES_cblock *key, const char *prompt, int verify);
|
H A D | set_key.c | 88 void DES_set_odd_parity(DES_cblock *key) argument 93 (*key)[i]=odd_parity[(*key)[i]]; 96 int DES_check_key_parity(const_DES_cblock *key) argument 102 if ((*key)[i] != odd_parity[(*key)[i]]) 138 int DES_is_weak_key(const_DES_cblock *key) argument 149 if (memcmp(weak_keys[i],key,sizeof(DES_cblock)) == 0) return(1); 310 int DES_set_key(const_DES_cblock *key, DES_key_schedule *schedule) argument 314 return DES_set_key_checked(key, schedul 327 DES_set_key_checked(const_DES_cblock *key, DES_key_schedule *schedule) argument 337 DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule) argument 397 DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ecdh/ |
H A D | ech_locl.h | 68 int (*compute_key)(void *key, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh,
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/ |
H A D | evp_enc.c | 86 const unsigned char *key, const unsigned char *iv, int enc) 90 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc); 94 const unsigned char *key, const unsigned char *iv, int enc) 223 if(key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) { 224 if(!ctx->cipher->init(ctx,key,iv,enc)) return 0; 255 const unsigned char *key, const unsigned char *iv) 257 return EVP_CipherInit(ctx, cipher, key, iv, 1); 261 const unsigned char *key, const unsigned char *iv) 263 return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1); 267 const unsigned char *key, cons 85 EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc) argument 93 EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv, int enc) argument 254 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 260 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 266 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 272 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 561 EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key) argument [all...] |
H A D | p5_crpt.c | 78 unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH]; local 123 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 127 EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); 129 OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/hmac/ |
H A D | hmactest.c | 84 unsigned char key[16]; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | hmactest.c | 84 unsigned char key[16]; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/barrelfish-2018-10-04/include/hashtable/ |
H A D | hashtable.h | 27 const void* key; member in struct:_ht_entry
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | des.h | 217 void DES_set_odd_parity(DES_cblock *key); 218 int DES_check_key_parity(const_DES_cblock *key); 219 int DES_is_weak_key(const_DES_cblock *key); 223 int DES_set_key(const_DES_cblock *key,DES_key_schedule *schedule); 224 int DES_key_sched(const_DES_cblock *key,DES_key_schedule *schedule); 225 int DES_set_key_checked(const_DES_cblock *key,DES_key_schedule *schedule); 226 void DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule); 227 void DES_string_to_key(const char *str,DES_cblock *key); 235 int DES_read_password(DES_cblock *key, const char *prompt, int verify);
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/include/linux/ |
H A D | srcu.h | 60 srcu_read_unlock(struct srcu_struct *srcu, int key) argument
|
/barrelfish-2018-10-04/usr/proc_mgmt/ |
H A D | domain.c | 146 uint64_t key; local 147 errval_t err = domain_cap_hash(domain_cap, &key); 152 void *table_entry = collections_hash_find(domain_table, key); 167 uint64_t key; local 168 void* ele = collections_hash_traverse_next(domain_table, &key); 180 ele = collections_hash_traverse_next(domain_table, &key); 267 uint64_t key; local 268 void* ele = collections_hash_traverse_next(domain_table, &key); 278 ele = collections_hash_traverse_next(domain_table, &key);
|
/barrelfish-2018-10-04/lib/libc/gen/ |
H A D | getgrent.c | 86 union key { union 90 static struct group *getgr(int (*)(union key, struct group *, char *, size_t, 91 struct group **), union key); 92 static int wrap_getgrnam_r(union key, struct group *, char *, size_t, 94 static int wrap_getgrgid_r(union key, struct group *, char *, size_t, 96 static int wrap_getgrent_r(union key, struct group *, char *, size_t, 124 char *key; member in struct:nis_state 680 getgr(int (*fn)(union key, struct group *, char *, size_t, struct group **), argument 681 union key key) 714 wrap_getgrnam_r(union key key, struct group *grp, char *buffer, size_t bufsize, struct group **res) argument 722 wrap_getgrgid_r(union key key, struct group *grp, char *buffer, size_t bufsize, struct group **res) argument 740 union key key; local 750 union key key; local 760 union key key; local 1080 char *buffer, *key, *result; local [all...] |
/barrelfish-2018-10-04/lib/libc/db/hash/ |
H A D | hash_page.c | 96 putpair(char *p, const DBT *key, const DBT *val) argument 102 /* Enter the key first. */ 105 off = OFFSET(bp) - key->size; 106 memmove(p + off, key->data, key->size); 188 DBT key, val; local 219 key.data = (u_char *)op + ino[n]; 220 key.size = off - ino[n]; 222 if (__call_hash(hashp, key.data, key 290 DBT key, val; local 398 __addel(HTAB *hashp, BUFHEAD *bufp, const DBT *key, const DBT *val) argument 877 squeeze_key(u_int16_t *sp, const DBT *key, const DBT *val) argument [all...] |
/barrelfish-2018-10-04/usr/eclipseclp/Mercury/ |
H A D | m_map.pl | 93 key/value pairs which allows you to look up any data item given its 94 key. 129 "Key":"The key to look for"], 130 summary: "Check whether a map contains a key.", 137 entry with key Key. 151 "Key":"A key from Map", 153 summary: "Succeeds if Key and Value unify with a key/value pair from Map.", 154 fail_if: "Fails if Key and Value do not unify with a key/value pair from Map.", 159 Tries to unify Key and Value with key/value pairs from the map Map. 178 "Key":"A key t [all...] |
/barrelfish-2018-10-04/lib/libc/db/btree/ |
H A D | bt_get.c | 53 * key: key to find 58 * RET_ERROR, RET_SUCCESS and RET_SPECIAL if the key not found. 61 __bt_get(const DB *dbp, const DBT *key, DBT *data, u_int flags) argument 81 if ((e = __bt_search(t, key, &exact)) == NULL) 92 * key/data, toss the page.
|
H A D | bt_utils.c | 50 * Build return key/data pair. 54 * e: key/data pair to be returned 55 * key: user's key structure (NULL if not to be filled in) 56 * rkey: memory area to hold key 59 * copy: always copy the key/data item 65 __bt_ret(BTREE *t, EPG *e, DBT *key, DBT *rkey, DBT *data, DBT *rdata, int copy) argument 77 if (key == NULL) 82 &key->size, &rkey->data, &rkey->size)) 84 key [all...] |
/barrelfish-2018-10-04/lib/lua/src/ |
H A D | lvm.h | 33 LUAI_FUNC void luaV_gettable (lua_State *L, const TValue *t, TValue *key, 35 LUAI_FUNC void luaV_settable (lua_State *L, const TValue *t, TValue *key,
|
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/polarssl/ |
H A D | arc4.c | 46 * ARC4 key schedule 48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen ) argument 67 j = ( j + a + key[k] ) & 0xFF;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/engine/ |
H A D | eng_openssl.c | 225 unsigned char key[TEST_RC4_KEY_SIZE]; member in struct:__anon1236 229 static int test_rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 235 memcpy(&test(ctx)->key[0],key,EVP_CIPHER_CTX_key_length(ctx)); 237 test(ctx)->key); 375 EVP_PKEY *key; local 376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); 380 key = PEM_read_bio_PrivateKey(in, NULL, 0, NULL); 382 return key;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc5/ |
H A D | rc5_enc.c | 138 void RC5_32_encrypt(unsigned long *d, RC5_32_KEY *key) argument 142 s=key->data; 154 if (key->rounds == 12) 161 else if (key->rounds == 16) 177 void RC5_32_decrypt(unsigned long *d, RC5_32_KEY *key) argument 181 s=key->data; 185 if (key->rounds == 16) 197 else if (key->rounds == 12)
|
/barrelfish-2018-10-04/include/sys/ |
H A D | ipc.h | 82 key_t key; /* user specified msg/sem/shm key */ member in struct:ipc_perm_old 93 key_t key; /* user specified msg/sem/shm key */ member in struct:ipc_perm 104 #define IPC_CREAT 001000 /* create entry if key does not exist */ 105 #define IPC_EXCL 002000 /* fail if key exists */ 108 #define IPC_PRIVATE (key_t)0 /* private key */
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost94_keyx.c | 22 /* Common functions for both 94 and 2001 key exchange schemes */ 23 /* Implementation of the Diffi-Hellman key agreement scheme based on 26 /* Computes Diffie-Hellman key and stores it into buffer in 45 * Computes 256 bit Key exchange key as specified in RFC 4357 73 int pkey_gost94_derive(EVP_PKEY_CTX *ctx,unsigned char *key,size_t *keylen) argument 78 if (key == NULL) return 1; 80 return make_cp_exchange_key(gost_get0_priv_key(mykey), pubk, key); 88 int pkey_GOST94cp_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char* key, size_t key_len ) argument 107 /* If key already set, it is not ephemeral */ 118 /* Otherwise generate ephemeral key */ 212 pkey_GOST94cp_decrypt(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *key_len,const unsigned char *in, size_t in_len) argument [all...] |
/barrelfish-2018-10-04/include/collections/ |
H A D | list.h | 101 collections_list_predicate p, void *key); 104 void *key);
|