Searched refs:key (Results 201 - 225 of 536) sorted by relevance

1234567891011>>

/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cast/
H A Dcast_lcl.h169 #define E_CAST(n,key,L,R,OP1,OP2,OP3) \
172 t=(key[n*2] OP1 R)&0xffffffffL; \
173 i=key[n*2+1]; \
185 #define E_CAST(n,key,L,R,OP1,OP2,OP3) \
189 w=(key[n*2] OP1 R)&0xffffffffL; \
190 i=key[n*2+1]; \
207 #define E_CAST(n,key,L,R,OP1,OP2,OP3) \
210 t=(key[n*2] OP1 R)&0xffffffff; \
211 t=ROTL(t,(key[n*2+1])); \
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/
H A Ddes.h217 void DES_set_odd_parity(DES_cblock *key);
218 int DES_check_key_parity(const_DES_cblock *key);
219 int DES_is_weak_key(const_DES_cblock *key);
223 int DES_set_key(const_DES_cblock *key,DES_key_schedule *schedule);
224 int DES_key_sched(const_DES_cblock *key,DES_key_schedule *schedule);
225 int DES_set_key_checked(const_DES_cblock *key,DES_key_schedule *schedule);
226 void DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule);
227 void DES_string_to_key(const char *str,DES_cblock *key);
235 int DES_read_password(DES_cblock *key, const char *prompt, int verify);
H A Dset_key.c88 void DES_set_odd_parity(DES_cblock *key) argument
93 (*key)[i]=odd_parity[(*key)[i]];
96 int DES_check_key_parity(const_DES_cblock *key) argument
102 if ((*key)[i] != odd_parity[(*key)[i]])
138 int DES_is_weak_key(const_DES_cblock *key) argument
149 if (memcmp(weak_keys[i],key,sizeof(DES_cblock)) == 0) return(1);
310 int DES_set_key(const_DES_cblock *key, DES_key_schedule *schedule) argument
314 return DES_set_key_checked(key, schedul
327 DES_set_key_checked(const_DES_cblock *key, DES_key_schedule *schedule) argument
337 DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule) argument
397 DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule) argument
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ecdh/
H A Dech_locl.h68 int (*compute_key)(void *key, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh,
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/
H A Devp_enc.c86 const unsigned char *key, const unsigned char *iv, int enc)
90 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc);
94 const unsigned char *key, const unsigned char *iv, int enc)
223 if(key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) {
224 if(!ctx->cipher->init(ctx,key,iv,enc)) return 0;
255 const unsigned char *key, const unsigned char *iv)
257 return EVP_CipherInit(ctx, cipher, key, iv, 1);
261 const unsigned char *key, const unsigned char *iv)
263 return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1);
267 const unsigned char *key, cons
85 EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc) argument
93 EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv, int enc) argument
254 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
260 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
266 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
272 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
561 EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key) argument
[all...]
H A Dp5_crpt.c78 unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH]; local
123 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
127 EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de);
129 OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/hmac/
H A Dhmactest.c84 unsigned char key[16]; member in struct:test_st
139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
146 test[i].key, test[i].key_len,
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs7/
H A Dpk7_enc.c70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/
H A Dhmactest.c84 unsigned char key[16]; member in struct:test_st
139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
146 test[i].key, test[i].key_len,
/barrelfish-2018-10-04/include/hashtable/
H A Dhashtable.h27 const void* key; member in struct:_ht_entry
/barrelfish-2018-10-04/include/openssl/
H A Ddes.h217 void DES_set_odd_parity(DES_cblock *key);
218 int DES_check_key_parity(const_DES_cblock *key);
219 int DES_is_weak_key(const_DES_cblock *key);
223 int DES_set_key(const_DES_cblock *key,DES_key_schedule *schedule);
224 int DES_key_sched(const_DES_cblock *key,DES_key_schedule *schedule);
225 int DES_set_key_checked(const_DES_cblock *key,DES_key_schedule *schedule);
226 void DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule);
227 void DES_string_to_key(const char *str,DES_cblock *key);
235 int DES_read_password(DES_cblock *key, const char *prompt, int verify);
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/include/linux/
H A Dsrcu.h60 srcu_read_unlock(struct srcu_struct *srcu, int key) argument
/barrelfish-2018-10-04/usr/proc_mgmt/
H A Ddomain.c146 uint64_t key; local
147 errval_t err = domain_cap_hash(domain_cap, &key);
152 void *table_entry = collections_hash_find(domain_table, key);
167 uint64_t key; local
168 void* ele = collections_hash_traverse_next(domain_table, &key);
180 ele = collections_hash_traverse_next(domain_table, &key);
267 uint64_t key; local
268 void* ele = collections_hash_traverse_next(domain_table, &key);
278 ele = collections_hash_traverse_next(domain_table, &key);
/barrelfish-2018-10-04/lib/libc/gen/
H A Dgetgrent.c86 union key { union
90 static struct group *getgr(int (*)(union key, struct group *, char *, size_t,
91 struct group **), union key);
92 static int wrap_getgrnam_r(union key, struct group *, char *, size_t,
94 static int wrap_getgrgid_r(union key, struct group *, char *, size_t,
96 static int wrap_getgrent_r(union key, struct group *, char *, size_t,
124 char *key; member in struct:nis_state
680 getgr(int (*fn)(union key, struct group *, char *, size_t, struct group **), argument
681 union key key)
714 wrap_getgrnam_r(union key key, struct group *grp, char *buffer, size_t bufsize, struct group **res) argument
722 wrap_getgrgid_r(union key key, struct group *grp, char *buffer, size_t bufsize, struct group **res) argument
740 union key key; local
750 union key key; local
760 union key key; local
1080 char *buffer, *key, *result; local
[all...]
/barrelfish-2018-10-04/lib/libc/db/hash/
H A Dhash_page.c96 putpair(char *p, const DBT *key, const DBT *val) argument
102 /* Enter the key first. */
105 off = OFFSET(bp) - key->size;
106 memmove(p + off, key->data, key->size);
188 DBT key, val; local
219 key.data = (u_char *)op + ino[n];
220 key.size = off - ino[n];
222 if (__call_hash(hashp, key.data, key
290 DBT key, val; local
398 __addel(HTAB *hashp, BUFHEAD *bufp, const DBT *key, const DBT *val) argument
877 squeeze_key(u_int16_t *sp, const DBT *key, const DBT *val) argument
[all...]
/barrelfish-2018-10-04/usr/eclipseclp/Mercury/
H A Dm_map.pl93 key/value pairs which allows you to look up any data item given its
94 key.
129 "Key":"The key to look for"],
130 summary: "Check whether a map contains a key.",
137 entry with key Key.
151 "Key":"A key from Map",
153 summary: "Succeeds if Key and Value unify with a key/value pair from Map.",
154 fail_if: "Fails if Key and Value do not unify with a key/value pair from Map.",
159 Tries to unify Key and Value with key/value pairs from the map Map.
178 "Key":"A key t
[all...]
/barrelfish-2018-10-04/lib/libc/db/btree/
H A Dbt_get.c53 * key: key to find
58 * RET_ERROR, RET_SUCCESS and RET_SPECIAL if the key not found.
61 __bt_get(const DB *dbp, const DBT *key, DBT *data, u_int flags) argument
81 if ((e = __bt_search(t, key, &exact)) == NULL)
92 * key/data, toss the page.
H A Dbt_utils.c50 * Build return key/data pair.
54 * e: key/data pair to be returned
55 * key: user's key structure (NULL if not to be filled in)
56 * rkey: memory area to hold key
59 * copy: always copy the key/data item
65 __bt_ret(BTREE *t, EPG *e, DBT *key, DBT *rkey, DBT *data, DBT *rdata, int copy) argument
77 if (key == NULL)
82 &key->size, &rkey->data, &rkey->size))
84 key
[all...]
/barrelfish-2018-10-04/lib/lua/src/
H A Dlvm.h33 LUAI_FUNC void luaV_gettable (lua_State *L, const TValue *t, TValue *key,
35 LUAI_FUNC void luaV_settable (lua_State *L, const TValue *t, TValue *key,
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/polarssl/
H A Darc4.c46 * ARC4 key schedule
48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen ) argument
67 j = ( j + a + key[k] ) & 0xFF;
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/engine/
H A Deng_openssl.c225 unsigned char key[TEST_RC4_KEY_SIZE]; member in struct:__anon1236
229 static int test_rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
235 memcpy(&test(ctx)->key[0],key,EVP_CIPHER_CTX_key_length(ctx));
237 test(ctx)->key);
375 EVP_PKEY *key; local
376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id);
380 key = PEM_read_bio_PrivateKey(in, NULL, 0, NULL);
382 return key;
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc5/
H A Drc5_enc.c138 void RC5_32_encrypt(unsigned long *d, RC5_32_KEY *key) argument
142 s=key->data;
154 if (key->rounds == 12)
161 else if (key->rounds == 16)
177 void RC5_32_decrypt(unsigned long *d, RC5_32_KEY *key) argument
181 s=key->data;
185 if (key->rounds == 16)
197 else if (key->rounds == 12)
/barrelfish-2018-10-04/include/sys/
H A Dipc.h82 key_t key; /* user specified msg/sem/shm key */ member in struct:ipc_perm_old
93 key_t key; /* user specified msg/sem/shm key */ member in struct:ipc_perm
104 #define IPC_CREAT 001000 /* create entry if key does not exist */
105 #define IPC_EXCL 002000 /* fail if key exists */
108 #define IPC_PRIVATE (key_t)0 /* private key */
/barrelfish-2018-10-04/lib/openssl-1.0.0d/engines/ccgost/
H A Dgost94_keyx.c22 /* Common functions for both 94 and 2001 key exchange schemes */
23 /* Implementation of the Diffi-Hellman key agreement scheme based on
26 /* Computes Diffie-Hellman key and stores it into buffer in
45 * Computes 256 bit Key exchange key as specified in RFC 4357
73 int pkey_gost94_derive(EVP_PKEY_CTX *ctx,unsigned char *key,size_t *keylen) argument
78 if (key == NULL) return 1;
80 return make_cp_exchange_key(gost_get0_priv_key(mykey), pubk, key);
88 int pkey_GOST94cp_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char* key, size_t key_len ) argument
107 /* If key already set, it is not ephemeral */
118 /* Otherwise generate ephemeral key */
212 pkey_GOST94cp_decrypt(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *key_len,const unsigned char *in, size_t in_len) argument
[all...]
/barrelfish-2018-10-04/include/collections/
H A Dlist.h101 collections_list_predicate p, void *key);
104 void *key);

Completed in 230 milliseconds

1234567891011>>