/freebsd-11-stable/sys/opencrypto/ |
H A D | xform_rijndael.c | 77 rijndael128_encrypt(caddr_t key, u_int8_t *blk) argument 79 rijndael_encrypt((rijndael_ctx *) key, (u_char *) blk, (u_char *) blk); 83 rijndael128_decrypt(caddr_t key, u_int8_t *blk) argument 85 rijndael_decrypt(((rijndael_ctx *) key), (u_char *) blk, 90 rijndael128_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 99 rijndael_set_key((rijndael_ctx *) *sched, (u_char *) key,
|
H A D | xform_skipjack.c | 76 skipjack_encrypt(caddr_t key, u_int8_t *blk) argument 78 skipjack_forwards(blk, blk, (u_int8_t **) key); 82 skipjack_decrypt(caddr_t key, u_int8_t *blk) argument 84 skipjack_backwards(blk, blk, (u_int8_t **) key); 88 skipjack_setkey(u_int8_t **sched, u_int8_t *key, int len) argument 104 subkey_table_gen(key, (u_int8_t **) *sched);
|
H A D | cast.c | 27 t = ROL(key->xkey[i] + r, key->xkey[i+16]); \ 31 t = ROL(key->xkey[i] ^ r, key->xkey[i+16]); \ 35 t = ROL(key->xkey[i] - r, key->xkey[i+16]); \ 42 void cast_encrypt(cast_key* key, u_int8_t* inblock, u_int8_t* outblock) argument 64 /* Only do full 16 rounds if key length > 80 bits */ 65 if (key->rounds > 12) { 87 void cast_decrypt(cast_key* key, u_int8_ argument 132 cast_setkey(cast_key* key, u_int8_t* rawkey, int keybytes) argument [all...] |
/freebsd-11-stable/contrib/llvm-project/llvm/include/llvm/DebugInfo/GSYM/ |
H A D | FileEntry.h | 36 // Implement operator== so that FileEntry can be used as key in 50 uint32_t key = DenseMapInfo<uint32_t>::getEmptyKey(); local 51 return gsym::FileEntry(key, key); 54 uint32_t key = DenseMapInfo<uint32_t>::getTombstoneKey(); local 55 return gsym::FileEntry(key, key);
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | prefix_string.c | 71 svn_prefix_string__t key; member in struct:node_t 74 * 0 for the root node. Only then will key.prefix be NULL. */ 108 return node->key.data[7] == 0; 141 unsigned char key, 152 if ((unsigned char)sub_nodes[current]->key.data[0] < key) 168 tree->root->key.data[7] = '\xff'; /* This is not a leaf. See is_leaf(). */ 199 || node->sub_nodes[idx]->key.data[0] != s[node->length]) 208 if (strcmp(sub_node->key.data, s + node->length) == 0) 209 return &sub_node->key; 140 search_lower_bound(node_t **sub_nodes, unsigned char key, int count) argument [all...] |
/freebsd-11-stable/contrib/libreadline/ |
H A D | text.c | 237 The second is the key which invoked this command. 253 rl_forward_byte (count, key) 254 int count, key; 257 return (rl_backward_byte (-count, key)); 286 rl_forward_char (count, key) 287 int count, key; 292 return (rl_forward_byte (count, key)); 295 return (rl_backward_char (-count, key)); 319 rl_forward_char (count, key) 320 int count, key; [all...] |
/freebsd-11-stable/contrib/ntp/lib/isc/ |
H A D | hmacsha.c | 39 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key, argument 42 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha1()); 70 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key, argument 73 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha224()); 101 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key, argument 104 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha256()); 132 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key, argument 135 HMAC_Init(ctx, (const void *) key, (int) len, EVP_sha384()); 163 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key, argument 166 HMAC_Init(ctx, (const void *) key, (in 202 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key, unsigned int len) argument 270 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key, unsigned int len) argument 336 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key, unsigned int len) argument 402 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key, unsigned int len) argument 468 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key, unsigned int len) argument [all...] |
/freebsd-11-stable/crypto/heimdal/base/ |
H A D | dict.c | 41 heim_object_t key; member in struct:hashentry 59 heim_release(g->key); 155 if (heim_cmp(ptr, p->key) == 0) 165 * @value key the key to search for 167 * @return a retained copy of the value for key or NULL if not found 171 heim_dict_copy_value(heim_dict_t dict, heim_object_t key) argument 174 p = _search(dict, key); 182 * Add key and value to dict 185 * @value key th 192 heim_dict_add_value(heim_dict_t dict, heim_object_t key, heim_object_t value) argument 231 heim_dict_delete_key(heim_dict_t dict, heim_object_t key) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 61 int kvno, krb5_keyblock *key, krb5_enctype etype, 75 ret = krb5_copy_keyblock_contents(context, key, &(*mkey)->keytab.keyblock); 81 ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto); 92 hdb_add_master_key(krb5_context context, krb5_keyblock *key, argument 102 ret = hdb_process_master_key(context, vno, key, 0, &p); 155 krb5_keyblock key; local 179 key.keytype = enctype; 180 ret = krb5_ret_data(sp, &key.keyvalue); 184 ret = hdb_process_master_key(context, 1, &key, 0, mkey); 185 krb5_free_keyblock_contents(context, &key); 60 hdb_process_master_key(krb5_context context, int kvno, krb5_keyblock *key, krb5_enctype etype, hdb_master_key *mkey) argument 198 krb5_keyblock key; local 245 krb5_keyblock key; local 389 _hdb_mkey_decrypt(krb5_context context, hdb_master_key key, krb5_key_usage usage, void *ptr, size_t size, krb5_data *res) argument 398 _hdb_mkey_encrypt(krb5_context context, hdb_master_key key, krb5_key_usage usage, const void *ptr, size_t size, krb5_data *res) argument 414 hdb_master_key key; local 495 hdb_master_key key; local 559 hdb_set_master_key(krb5_context context, HDB *db, krb5_keyblock *key) argument 582 hdb_master_key key; local [all...] |
/freebsd-11-stable/usr.bin/cap_mkdb/ |
H A D | cap_mkdb.c | 77 * capability record whereas a reference contains the name (key) under which 159 DBT key, data; local 166 key.data = NULL; 203 key.data = bp; 204 key.size = p - bp; 206 switch(capdbp->put(capdbp, &key, &data, R_NOOVERWRITE)) { 212 (int)key.size, (char *)key.data); 225 memmove(&((u_char *)(data.data))[1], key.data, key [all...] |
/freebsd-11-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/lua/ |
H A D | ltable.c | 73 {{NILCONSTANT, NULL}} /* key */ 97 static Node *mainposition (const Table *t, const TValue *key) { argument 98 switch (ttype(key)) { 100 return hashnum(t, nvalue(key)); 102 TString *s = rawtsvalue(key); 107 return hashstr(t, rawtsvalue(key)); 110 return hashstr(t, rawtsvalue(key)); 112 return hashboolean(t, bvalue(key)); 114 return hashpointer(t, pvalue(key)); 116 return hashpointer(t, fvalue(key)); 127 arrayindex(const TValue *key) argument 144 findindex(lua_State *L, Table *t, StkId key) argument 169 luaH_next(lua_State *L, Table *t, StkId key) argument 218 countint(const TValue *key, int *nums) argument 405 luaH_newkey(lua_State *L, Table *t, const TValue *key) argument 446 luaH_getint(Table *t, int key) argument 466 luaH_getstr(Table *t, TString *key) argument 481 luaH_get(Table *t, const TValue *key) argument 511 luaH_set(lua_State *L, Table *t, const TValue *key) argument 519 luaH_setint(lua_State *L, Table *t, int key, TValue *value) argument 583 luaH_mainposition(const Table *t, const TValue *key) argument [all...] |
/freebsd-11-stable/contrib/apr-util/crypto/ |
H A D | apr_crypto_nss.c | 78 apr_crypto_key_t *key; member in struct:apr_crypto_block_t 95 /* sufficient space to wrap a key */ 270 apr_crypto_key_t *key = data; local 271 if (key->symKey) { 272 PK11_FreeSymKey(key->symKey); 273 key->symKey = NULL; 353 * @brief Get a hash table of key types, keyed by the name of the type against 356 * @param types - hashtable of key types keyed to constants. 368 * @brief Get a hash table of key modes, keyed by the name of the mode against 371 * @param modes - hashtable of key mode 385 crypto_cipher_mechanism(apr_crypto_key_t *key, const apr_crypto_block_key_type_e type, const apr_crypto_block_key_mode_e mode, const int doPad) argument 486 apr_crypto_key_t *key; local 683 apr_crypto_key_t *key = *k; local 756 crypto_block_encrypt_init(apr_crypto_block_t **ctx, const unsigned char **iv, const apr_crypto_key_t *key, apr_size_t *blockSize, apr_pool_t *p) argument 936 crypto_block_decrypt_init(apr_crypto_block_t **ctx, apr_size_t *blockSize, const unsigned char *iv, const apr_crypto_key_t *key, apr_pool_t *p) argument [all...] |
/freebsd-11-stable/sys/dev/gpio/ |
H A D | gpiokeys.c | 130 int sc_state; /* shift/lock key state */ 131 int sc_accents; /* accent key index (> 0) */ 156 gpiokeys_put_key(struct gpiokeys_softc *sc, uint32_t key) argument 162 sc->sc_input[sc->sc_inputtail] = key; 176 uint32_t key; local 179 key = keycode & SCAN_KEYCODE_MASK; 182 key |= KEY_RELEASE; 190 gpiokeys_put_key(sc, key); 199 struct gpiokey *key; local 201 key 215 struct gpiokey *key; local 242 struct gpiokey *key; local 258 gpiokeys_attach_key(struct gpiokeys_softc *sc, phandle_t node, struct gpiokey *key) argument 352 gpiokeys_detach_key(struct gpiokeys_softc *sc, struct gpiokey *key) argument [all...] |
/freebsd-11-stable/contrib/ntp/lib/isc/include/isc/ |
H A D | hmacsha.h | 52 unsigned char key[ISC_HMACSHA1_KEYLENGTH]; member in struct:__anon4824 57 unsigned char key[ISC_HMACSHA224_KEYLENGTH]; member in struct:__anon4825 62 unsigned char key[ISC_HMACSHA256_KEYLENGTH]; member in struct:__anon4826 67 unsigned char key[ISC_HMACSHA384_KEYLENGTH]; member in struct:__anon4827 72 unsigned char key[ISC_HMACSHA512_KEYLENGTH]; member in struct:__anon4828 79 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key, 97 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key, 115 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key, 133 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key, 151 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key, [all...] |
/freebsd-11-stable/lib/librpcsvc/ |
H A D | xcrypt.c | 54 * Encrypt a secret key given passwd 55 * The secret key is passed and returned in hex notation. 61 char key[8]; local 73 passwd2des(passwd, key); 76 err = cbc_crypt(key, buf, len, DES_ENCRYPT | DES_HW, ivec); 87 * Decrypt secret key using passwd 88 * The secret key is passed and returned in hex notation. 94 char key[8]; local 106 passwd2des(passwd, key); 109 err = cbc_crypt(key, bu 124 passwd2des(char *pw, char *key) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-eax.c | 18 * @key: Key for encryption (16 bytes) 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 59 if (omac1_aes_128(key, buf, 16 + hdr_len, hdr_mac)) 62 if (aes_128_ctr_encrypt(key, nonce_mac, data, data_len)) 66 if (omac1_aes_128(key, buf, 16 + data_len, data_mac)) 82 * @key: Key for decryption (16 bytes) 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 118 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) { 125 if (omac1_aes_128(key, bu [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | env.c | 43 * Add a new key/value pair to the hx509_env. 47 * @param key key to add 57 const char *key, const char *value) 69 n->name = strdup(key); 94 * Add a new key/binding pair to the hx509_env. 98 * @param key key to add 108 const char *key, hx509_env list) 120 n->name = strdup(key); 56 hx509_env_add(hx509_context context, hx509_env *env, const char *key, const char *value) argument 107 hx509_env_add_binding(hx509_context context, hx509_env *env, const char *key, hx509_env list) argument 154 hx509_env_lfind(hx509_context context, hx509_env env, const char *key, size_t len) argument 179 hx509_env_find(hx509_context context, hx509_env env, const char *key) argument 202 hx509_env_find_binding(hx509_context context, hx509_env env, const char *key) argument [all...] |
/freebsd-11-stable/stand/libsa/geli/ |
H A D | geliboot_crypto.c | 39 const u_char *key, size_t keysize, u_char *iv) 50 (const char *)key); 81 rijndael_set_key(&ctxp->key1, key, xts_len / 2); 82 rijndael_set_key(&ctxp->key2, key + (xts_len / 16), xts_len / 2); 109 const u_char *key, size_t keysize) 114 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); 119 const u_char *key, size_t keysize) 126 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); 131 const u_char *key, size_t keysize) 138 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysiz 38 geliboot_crypt(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize, u_char *iv) argument 108 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 118 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 130 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
/freebsd-11-stable/contrib/llvm-project/lld/lib/ReaderWriter/MachO/ |
H A D | LayoutPass.h | 44 SortKey(SortKey &&key) : _atom(std::move(key._atom)), _root(key._root), argument 45 _override(key._override) { 46 key._root = nullptr; 49 SortKey &operator=(SortKey &&key) { argument 50 _atom = std::move(key._atom); 51 _root = key._root; 52 key._root = nullptr; 53 _override = key [all...] |
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | hostkey-agent.sh | 6 rm -f $OBJ/agent-key.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig 17 for k in `${SSH} -Q key-plain` ; do 18 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" 21 cat $OBJ/agent-key.$k.pub 23 ${SSHADD} $OBJ/agent-key.$k >/dev/null 2>&1 || \ 24 fatal "couldn't load key $OBJ/agent-key.$k" 25 echo "Hostkey $OBJ/agent-key.${k}" >> $OBJ/sshd_proxy.orig 26 # Remove private key so the server can't use it. 27 rm $OBJ/agent-key [all...] |
/freebsd-11-stable/contrib/nvi/ex/ |
H A D | ex_usage.c | 46 "For a vi key usage statement enter \":viusage [key]<CR>\"\n"); 133 * ex_viusage -- :viusage [key] 143 int key; local 152 key = cmdp->argv[0]->bp[0]; 153 if (key > MAXVIKEY) 157 if ((key == '[' || key == ']') && cmdp->argv[0]->bp[1] != key) 161 if (key [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | ssh-ecdsa.c | 48 ssh_ecdsa_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, argument 63 if (key == NULL || key->ecdsa == NULL || 64 sshkey_type_plain(key->type) != KEY_ECDSA) 67 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || 74 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) { 86 if ((ret = sshbuf_put_cstring(b, sshkey_ssh_name_plain(key))) != 0 || 111 ssh_ecdsa_verify(const struct sshkey *key, argument 123 if (key == NULL || key [all...] |
/freebsd-11-stable/lib/libnv/tests/ |
H A D | nv_tests.cc | 68 const char *key; local 71 key = "key"; 75 ATF_REQUIRE(!nvlist_exists(nvl, key)); 77 nvlist_add_null(nvl, key); 80 ATF_REQUIRE(nvlist_exists(nvl, key)); 81 ATF_REQUIRE(nvlist_exists_null(nvl, key)); 82 ATF_REQUIRE(nvlist_exists_null(nvl, "key")); 84 /* Iterate over the nvlist; ensure that it has only our one key. */ 86 ATF_REQUIRE_EQ(strcmp(nvlist_next(nvl, &type, &it), key), 98 const char *key; local 130 const char *key; local 163 const char *key; local 200 const char *key, *subkey; local 259 const char *key; local 320 const char *key; local 665 const char *key; local 714 const char *key; local 734 const char *key; local 1037 const char *key; local 1053 const char *key; local 1069 const char *key; local 1085 const char *key; local 1101 const char *key; local 1117 const char *key; local 1133 const char *key; local 1149 const char *key; local 1165 const char *key; local 1181 const char *key; local 1197 const char *key; local 1213 const char *key; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | test_pkinit_dh2key.c | 47 krb5_keyblock key; local 54 &key); 58 if (key.keyvalue.length != result->length || 59 memcmp(key.keyvalue.data, result->data, result->length) != 0) 60 krb5_errx(context, 1, "resulting key wrong: %d", i); 62 krb5_free_keyblock_contents(context, &key); 69 krb5_data key; member in struct:__anon6045 210 tests[i].type, &tests[i].key);
|
/freebsd-11-stable/lib/libc/db/test/hash.tests/ |
H A D | tdel.c | 59 DBT item, key; local 82 key.data = wp1; 90 key.size = strlen(wp1); 94 * enter key/data pair into the table 96 if ((dbp->put)(dbp, &key, &item, R_NOOVERWRITE) != NULL) { 97 fprintf(stderr, "cannot enter: key %s\n", 109 key.size = strlen(wp1); 110 stat = (dbp->del)(dbp, &key, 0); 112 fprintf ( stderr, "Error retrieving %s\n", key.data );
|