/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_enc.c | 67 /* Return BIO based on EncryptedContentInfo and key */ 96 /* If not keeping key set cipher to NULL so subsequent calls 99 if (ec->key) 142 if (enc && !ec->key) 144 /* Generate random key */ 147 ec->key = OPENSSL_malloc(ec->keylen); 148 if (!ec->key) 154 if (EVP_CIPHER_CTX_rand_key(ctx, ec->key) <= 0) 160 /* If necessary set key length */ 169 if (EVP_CipherInit_ex(ctx, NULL, NULL, ec->key, pi 207 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument 225 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument [all...] |
/barrelfish-2018-10-04/lib/libc/yp/ |
H A D | xdryp.c | 66 char *key, *val; local 84 key = (char *)malloc(out.ypresp_all_u.val.key.keydat_len + 1); 85 if (key == NULL) { 90 bcopy(out.ypresp_all_u.val.key.keydat_val, key, 91 out.ypresp_all_u.val.key.keydat_len); 92 key[out.ypresp_all_u.val.key.keydat_len] = '\0'; 95 free(key); [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/ |
H A D | str2key.c | 62 void DES_string_to_key(const char *str, DES_cblock *key) argument 68 memset(key,0,8); 72 (*key)[i%8]^=(str[i]<<1); 78 (*key)[i%8]^=(j<<1); 85 (*key)[7-(i%8)]^=j; 89 DES_set_odd_parity(key); 91 if(DES_is_weak_key(key)) 92 (*key)[7] ^= 0xF0; 93 DES_set_key(key,&ks); 95 DES_set_key_unchecked(key, [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/ |
H A D | evp_pkey.c | 66 /* Extract a private key from a PKCS8 structure */ 117 /* Turn a private key into a PKCS8 structure */ 184 int EVP_PKEY_get_attr_count(const EVP_PKEY *key) argument 186 return X509at_get_attr_count(key->attributes); 189 int EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid, argument 192 return X509at_get_attr_by_NID(key->attributes, nid, lastpos); 195 int EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, ASN1_OBJECT *obj, argument 198 return X509at_get_attr_by_OBJ(key->attributes, obj, lastpos); 201 X509_ATTRIBUTE *EVP_PKEY_get_attr(const EVP_PKEY *key, int loc) argument 203 return X509at_get_attr(key 206 EVP_PKEY_delete_attr(EVP_PKEY *key, int loc) argument 211 EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr) argument 217 EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key, const ASN1_OBJECT *obj, int type, const unsigned char *bytes, int len) argument 226 EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key, int nid, int type, const unsigned char *bytes, int len) argument 235 EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key, const char *attrname, int type, const unsigned char *bytes, int len) argument [all...] |
H A D | e_bf.c | 67 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 81 static int bf_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 84 BF_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key);
|
H A D | e_cast.c | 68 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 83 static int cast_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 86 CAST_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),key);
|
H A D | e_seed.c | 65 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); 76 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 79 SEED_set_key(key, ctx->cipher_data);
|
/barrelfish-2018-10-04/lib/libc/db/test/hash.tests/ |
H A D | tverify.c | 62 DBT key, res; local 82 key.data = wp1; 89 key.size = strlen(wp1); 91 stat = (dbp->get)(dbp, &key, &res,0); 93 fprintf ( stderr, "Error retrieving %s\n", key.data ); 96 fprintf ( stderr, "%s not found\n", key.data ); 100 fprintf ( stderr, "data for %s is incorrect. Data was %s. Should have been %s\n", key.data, res.data, wp2 );
|
/barrelfish-2018-10-04/lib/libc/stdlib/ |
H A D | lsearch.c | 22 void *lsearch(const void *key, void *base, size_t *nelp, size_t width, argument 26 return (lwork(key, base, nelp, width, compar, 1)); 29 void *lfind(const void *key, const void *base, size_t *nelp, size_t width, argument 33 return (lwork(key, base, nelp, width, compar, 0)); 37 lwork(const void *key, const void *base, size_t *nelp, size_t width, argument 44 if (compar(key, ep) == 0) 48 /* lfind() shall return when the key was not found. */ 53 * lsearch() adds the key to the end of the table and increments 56 memcpy(endp, key, width);
|
/barrelfish-2018-10-04/lib/libc/iconv/ |
H A D | citrus_lookup.h | 52 _citrus_lookup_alias(const char *path, const char *key, char *buf, size_t n, argument 57 ret = _citrus_lookup_simple(path, key, buf, n, ignore_case); 59 ret = key;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bf/ |
H A D | bf_ecb.c | 82 const BF_KEY *key, int encrypt) 89 BF_encrypt(d,key); 91 BF_decrypt(d,key); 81 BF_ecb_encrypt(const unsigned char *in, unsigned char *out, const BF_KEY *key, int encrypt) argument
|
H A D | blowfish.h | 108 void BF_set_key(BF_KEY *key, int len, const unsigned char *data); 110 void BF_encrypt(BF_LONG *data,const BF_KEY *key); 111 void BF_decrypt(BF_LONG *data,const BF_KEY *key); 114 const BF_KEY *key, int enc);
|
/barrelfish-2018-10-04/usr/tests/shm/ |
H A D | shm_client.c | 15 key_t key; local 22 key = 5678; 27 if ((shmid = shmget(key, SHMSZ, 0666)) < 0) {
|
H A D | shm_server.c | 13 key_t key; local 20 key = 5678; 25 if ((shmid = shmget(key, SHMSZ, IPC_CREAT | 0666)) < 0) {
|
/barrelfish-2018-10-04/usr/replay/ |
H A D | hash.c | 33 printf("[%lu] => %lu", curr->key, curr->val); 53 void hash_insert(hash_t *hash, unsigned long key, unsigned long val) argument 58 bucket = hash_fn(hash, key); 62 /* found key */ 63 if (curr->key == key){ 70 /* key does not exist, allocate a new entry */ 72 new_entry->key = key; 80 unsigned long hash_lookup(hash_t *hash, unsigned long key) argument 102 hash_delete(hash_t *hash, unsigned long key) argument [all...] |
/barrelfish-2018-10-04/lib/libc/db/test/btree.tests/ |
H A D | main.c | 87 "a", 2, 1, append, "append key def", "append key with data def", 90 "delc", 0, 0, delcur, "delcur", "delete key the cursor references", 94 "g", 1, 1, get, "get key", "locate key", 96 "ia", 2, 1, iafter, "iafter key data", "insert data after key", 97 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key", 98 "ic", 2, 1, icursor, "icursor key dat 275 DBT key, data; local 305 DBT data, key; local 345 DBT key; local 380 DBT data, key; local 403 DBT data, key; local 445 DBT key, data; local 475 DBT key, data; local 506 DBT data, key; local 535 DBT data, key; local 563 DBT data, key; local 586 DBT data, key; local 611 DBT data, key; local 664 DBT data, key; local 687 DBT data, key; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc4/asm/ |
H A D | rc4-s390x.pl | 23 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 27 $key="%r2"; 43 llgc $XX[0],0($key) 44 llgc $YY,1($key) 49 llgc $TX[0],2($XX[0],$key) 64 llgc $acc,2($TY,$key) 68 ic $acc,2($TY,$key) 71 llgc $TY,2($YY,$key) 72 stc $TX[0],2($YY,$key) 73 llgc $TX[1],2($XX[1],$key) [all...] |
/barrelfish-2018-10-04/lib/collections/ |
H A D | hash_table.c | 28 uint64_t key = *((uint64_t *)arg); local 30 return (elem->key == key); 109 static collections_hash_elem* collections_hash_find_elem(collections_hash_table *t, uint64_t key) argument 115 bucket_num = key % t->num_buckets; 117 elem = (collections_hash_elem*) collections_list_find_if(bucket, match_key, &key); 124 void collections_hash_insert(collections_hash_table *t, uint64_t key, void *data) argument 130 elem = collections_hash_find_elem(t, key); 132 printf("Error: key %" PRIu64 " already present in hash table %" PRIu64 "\n", 133 key, ele 150 collections_hash_find(collections_hash_table *t, uint64_t key) argument 159 collections_hash_delete(collections_hash_table *t, uint64_t key) argument 228 collections_hash_traverse_next(collections_hash_table* t, uint64_t *key) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cast/ |
H A D | cast.h | 83 int short_key; /* Use reduced rounds for short key */ 87 void CAST_set_key(CAST_KEY *key, int len, const unsigned char *data); 88 void CAST_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAST_KEY *key, 90 void CAST_encrypt(CAST_LONG *data, const CAST_KEY *key); 91 void CAST_decrypt(CAST_LONG *data, const CAST_KEY *key);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc2/ |
H A D | rc2.h | 83 void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data,int bits); 84 void RC2_ecb_encrypt(const unsigned char *in,unsigned char *out,RC2_KEY *key, 86 void RC2_encrypt(unsigned long *data,RC2_KEY *key); 87 void RC2_decrypt(unsigned long *data,RC2_KEY *key);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc5/ |
H A D | rc5.h | 98 void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, 100 void RC5_32_ecb_encrypt(const unsigned char *in,unsigned char *out,RC5_32_KEY *key, 102 void RC5_32_encrypt(unsigned long *data,RC5_32_KEY *key); 103 void RC5_32_decrypt(unsigned long *data,RC5_32_KEY *key);
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | rc2.h | 83 void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data,int bits); 84 void RC2_ecb_encrypt(const unsigned char *in,unsigned char *out,RC2_KEY *key, 86 void RC2_encrypt(unsigned long *data,RC2_KEY *key); 87 void RC2_decrypt(unsigned long *data,RC2_KEY *key);
|
H A D | blowfish.h | 108 void BF_set_key(BF_KEY *key, int len, const unsigned char *data); 110 void BF_encrypt(BF_LONG *data,const BF_KEY *key); 111 void BF_decrypt(BF_LONG *data,const BF_KEY *key); 114 const BF_KEY *key, int enc);
|
H A D | cast.h | 83 int short_key; /* Use reduced rounds for short key */ 87 void CAST_set_key(CAST_KEY *key, int len, const unsigned char *data); 88 void CAST_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAST_KEY *key, 90 void CAST_encrypt(CAST_LONG *data, const CAST_KEY *key); 91 void CAST_decrypt(CAST_LONG *data, const CAST_KEY *key);
|
/barrelfish-2018-10-04/include/lwip2/netif/ppp/polarssl/ |
H A D | arc4.h | 58 * \brief ARC4 key schedule 61 * \param key the secret key 62 * \param keylen length of the key 64 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen );
|