/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) argument 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[ 61 u32 *rk; local 152 u32 *rk = ctx; local [all...] |
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk 100 u32 *rk; local 117 u32 *rk = ctx; local [all...] |
H A D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) argument 784 rk[0] = GETU32(cipherKey ); 785 rk[1] = GETU32(cipherKey + 4); 786 rk[2] = GETU32(cipherKey + 8); 787 rk[3] = GETU32(cipherKey + 12); 791 temp = rk[3]; 792 rk[4] = rk[0] ^ TE421(temp) ^ TE432(temp) ^ 794 rk[5] = rk[ [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/aes/ |
H A D | aes_core.c | 631 u32 *rk; local 640 rk = key->rd_key; 649 rk[0] = GETU32(userKey ); 650 rk[1] = GETU32(userKey + 4); 651 rk[2] = GETU32(userKey + 8); 652 rk[3] = GETU32(userKey + 12); 655 temp = rk[3]; 656 rk[4] = rk[0] ^ 662 rk[ 732 u32 *rk; local 784 const u32 *rk; local 975 const u32 *rk; local 1206 u32 *rk; local 1307 u32 *rk; local [all...] |
H A D | aes_x86core.c | 473 u32 *rk; local 482 rk = key->rd_key; 491 rk[0] = GETU32(userKey ); 492 rk[1] = GETU32(userKey + 4); 493 rk[2] = GETU32(userKey + 8); 494 rk[3] = GETU32(userKey + 12); 497 temp = rk[3]; 498 rk[4] = rk[0] ^ 504 rk[ 574 u32 *rk; local 655 const u32 *rk; local 867 const u32 *rk; local [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | rijndael.c | 727 static int rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) { 731 rk[0] = GETU32(cipherKey ); 732 rk[1] = GETU32(cipherKey + 4); 733 rk[2] = GETU32(cipherKey + 8); 734 rk[3] = GETU32(cipherKey + 12); 737 temp = rk[3]; 738 rk[4] = rk[0] ^ 744 rk[5] = rk[ [all...] |
/freebsd-10.0-release/sys/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 735 int rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) { 741 rk[0] = GETU32(cipherKey ); 742 rk[1] = GETU32(cipherKey + 4); 743 rk[2] = GETU32(cipherKey + 8); 744 rk[3] = GETU32(cipherKey + 12); 747 temp = rk[3]; 748 rk[4] = rk[0] ^ 754 rk[5] = rk[ [all...] |
H A D | rijndael-api-fst.h | 47 u_int32_t rk[4*(RIJNDAEL_MAXNR + 1)]; /* key schedule */ member in struct:__anon7215
|
H A D | rijndael-api-fst.c | 63 key->Nr = rijndaelKeySetupEnc(key->rk, cipherKey, keyLen); 65 key->Nr = rijndaelKeySetupDec(key->rk, cipherKey, keyLen); 104 rijndaelEncrypt(key->rk, key->Nr, input, outBuffer); 124 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 141 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 219 rijndaelEncrypt(key->rk, key->Nr, input, outBuffer); 229 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 239 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 253 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 282 rijndaelDecrypt(key->rk, ke [all...] |
/freebsd-10.0-release/contrib/unbound/iterator/ |
H A D | iter_resptype.c | 78 if(ntohs(s->rk.type) == request->qtype && 79 ntohs(s->rk.rrset_class) == request->qclass && 80 query_dname_compare(mname, s->rk.dname) == 0) { 86 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 87 query_dname_compare(mname, s->rk.dname) == 0) { 125 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 127 s->rk.dname) == 0) { 162 ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 163 ntohs(s->rk.rrset_class) == request->qclass && 164 dname_strict_subdomain_c(s->rk [all...] |
H A D | iter_utils.c | 618 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 619 ntohs(s->rk.rrset_class) == dclass) { 620 int l = dname_count_labels(s->rk.dname); 622 dname_strict_subdomain(s->rk.dname, 659 if(k1->rk.dname_len != k2->rk.dname_len || 660 k1->rk.flags != k2->rk.flags || 661 k1->rk.type != k2->rk [all...] |
H A D | iter_delegpt.c | 321 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS) 353 if(!delegpt_set_name(dp, region, ns_rrset->rk.dname)) 366 if(ntohs(s->rk.type) == LDNS_RR_TYPE_A) { 369 } else if(ntohs(s->rk.type) == LDNS_RR_TYPE_AAAA) { 415 if(!delegpt_add_target(dp, region, ak->rk.dname, 416 ak->rk.dname_len, (struct sockaddr_storage*)&sa, 439 if(!delegpt_add_target(dp, region, ak->rk.dname, 440 ak->rk.dname_len, (struct sockaddr_storage*)&sa, 453 if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_NS) 455 else if(ntohs(rrset->rk [all...] |
/freebsd-10.0-release/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 61 if(pkey->rk.dname) 62 free(pkey->rk.dname); 63 pkey->rk.dname = NULL; 73 size_t s = sizeof(struct ub_packed_rrset_key) + k->rk.dname_len; 101 if(key1->rk.type != key2->rk.type) { 102 if(key1->rk.type < key2->rk.type) 106 if(key1->rk.dname_len != key2->rk [all...] |
H A D | msgreply.c | 340 pk->rk.flags = pset->flags; 341 pk->rk.dname_len = pset->dname_len; 343 pk->rk.dname = (uint8_t*)regional_alloc( 345 else pk->rk.dname = 347 if(!pk->rk.dname) 350 dname_pkt_copy(pkt, pk->rk.dname, pset->dname); 352 pk->rk.type = htons(pset->type); 353 pk->rk.rrset_class = pset->rrset_class; 620 dk->rk = fk->rk; [all...] |
H A D | msgencode.c | 289 if((p = compress_tree_lookup(tree, key->rk.dname, 295 if(!write_compressed_dname(pkt, key->rk.dname, 303 if(ldns_buffer_remaining(pkt) < key->rk.dname_len+4+4+2) 305 ldns_buffer_write(pkt, key->rk.dname, 306 key->rk.dname_len); 310 if(!compress_tree_store(key->rk.dname, owner_labs, 352 uint16_t t = ntohs(key->rk.type); 455 if(!rrset_belongs_in_reply(s, ntohs(key->rk.type), qtype, dnssec)) 458 owner_labs = dname_count_labels(key->rk.dname); 470 ldns_buffer_write(pkt, &key->rk [all...] |
/freebsd-10.0-release/contrib/unbound/validator/ |
H A D | val_utils.c | 79 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 81 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_DS) 83 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS) 91 ntohs(rep->rrsets[0]->rk.type) == LDNS_RR_TYPE_NS && 92 query_dname_compare(rep->rrsets[0]->rk.dname, 119 ntohs(rep->rrsets[i]->rk.type) == qinf->qtype) 121 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_CNAME) 224 rep->rrsets[i]->rk.dname) == 0) { 239 if(ntohs(rep->rrsets[i]->rk.type) != LDNS_RR_TYPE_DNAME) 249 if(ntohs(rep->rrsets[i]->rk [all...] |
H A D | val_nsec.c | 154 log_assert(ntohs(nsec->rk.type) == LDNS_RR_TYPE_NSEC); 244 if(rep->rrsets[i]->rk.type != htons(LDNS_RR_TYPE_NSEC)) 255 if(wc && dname_is_wild(rep->rrsets[i]->rk.dname)) 291 if(query_dname_compare(nsec->rk.dname, qinfo->qname) != 0) { 305 dname_canonical_compare(nsec->rk.dname, 317 if(dname_is_wild(nsec->rk.dname)) { 319 uint8_t* ce = nsec->rk.dname; 320 size_t ce_len = nsec->rk.dname_len; 382 uint8_t* owner = nsec->rk.dname; 440 nsec->rk [all...] |
H A D | validator.c | 448 if(dname_seen && ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) { 465 "has failed ANSWER rrset:", s->rk.dname, 466 ntohs(s->rk.type), ntohs(s->rk.rrset_class)); 468 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) 470 else if(ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME) 480 ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME) { 494 "has failed AUTHORITY rrset:", s->rk.dname, 495 ntohs(s->rk.type), ntohs(s->rk [all...] |
H A D | val_neg.c | 327 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 328 d = rep->rrsets[i]->rk.dname; 329 len = rep->rrsets[i]->rk.dname_len; 567 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 581 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 684 if(ntohs(nsec->rk.type) == LDNS_RR_TYPE_NSEC) { 751 uint8_t* nm = nsec->rk.dname; 752 size_t nm_len = nsec->rk.dname_len; 753 int labs = dname_count_labels(nsec->rk.dname); 760 nsec->rk [all...] |
H A D | val_sigcrypt.c | 298 ldns_buffer_write(b, dnskey_rrset->rk.dname, 299 dnskey_rrset->rk.dname_len); 788 uint16_t type = ntohs(rrset->rk.type); 911 int fqdn_labels = dname_signame_label_count(k->rk.dname); 915 ldns_buffer_write(buf, k->rk.dname, k->rk.dname_len); 917 *can_owner_len = k->rk.dname_len; 924 uint8_t* nm = k->rk.dname; 925 size_t len = k->rk.dname_len; 948 switch(ntohs(rrset->rk [all...] |
H A D | val_kentry.c | 308 d->rrset_type = ntohs(rrset->rk.type); 352 rrk->rk.dname = regional_alloc_init(region, kkey->name, kkey->namelen); 353 if(!rrk->rk.dname) 355 rrk->rk.dname_len = kkey->namelen; 356 rrk->rk.type = htons(d->rrset_type); 357 rrk->rk.rrset_class = htons(kkey->key_class);
|
/freebsd-10.0-release/contrib/unbound/daemon/ |
H A D | cachedump.c | 74 ldns_rr_set_class(rr, ntohs(k->rk.rrset_class)); 79 status = ldns_wire2dname(&rdf, k->rk.dname, k->rk.dname_len, &pos); 131 (k->rk.flags & PACKED_RRSET_NSEC_AT_APEX)?" nsec_apex":"", 138 if(!dump_rrset_line(ssl, k, d, now, i, ntohs(k->rk.type))) 198 status = ldns_wire2dname(&rdf, k->rk.dname, k->rk.dname_len, &pos); 204 tp = ldns_rr_type2str(ntohs(k->rk.type)); 205 cl = ldns_rr_class2str(ntohs(k->rk.rrset_class)); 212 if(!ssl_printf(ssl, "%s %s %s %d\n", nm, cl, tp, (int)k->rk 388 load_rr(SSL* ssl, ldns_buffer* buf, struct regional* region, struct ub_packed_rrset_key* rk, struct packed_rrset_data* d, unsigned int i, int is_rrsig, int* go_on, uint32_t now) argument 531 struct ub_packed_rrset_key* rk; local [all...] |
/freebsd-10.0-release/contrib/unbound/services/cache/ |
H A D | rrset.c | 189 uint16_t rrset_type = ntohs(k->rk.type); 248 key.rk.dname = qname; 249 key.rk.dname_len = qnamelen; 250 key.rk.type = htons(qtype); 251 key.rk.rrset_class = htons(qclass); 252 key.rk.flags = flags; 254 key.entry.hash = rrset_key_hash(&key.rk); 338 rrset->entry.hash = rrset_key_hash(&rrset->rk); 355 if(ntohs(rrset->rk.type) != LDNS_RR_TYPE_NS || 377 rrset->entry.hash = rrset_key_hash(&rrset->rk); [all...] |
H A D | dns.c | 80 env->alloc, now + ((ntohs(rep->ref[i].key->rk.type)== 398 if(!dp || !delegpt_set_name(dp, region, nskey->rk.dname)) { 481 if(r->an_numrrsets > 0 && (r->rrsets[0]->rk.type == htons( 482 LDNS_RR_TYPE_CNAME) || r->rrsets[0]->rk.type == htons( 572 newlen = q->qname_len + dtarglen - rrset->rk.dname_len; 582 memcpy(newname, q->qname, q->qname_len-rrset->rk.dname_len); 583 memmove(newname+(q->qname_len-rrset->rk.dname_len), dtarg, dtarglen); 592 ck->rk.type = htons(LDNS_RR_TYPE_CNAME); 593 ck->rk.rrset_class = rrset->rk [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 506 eor $s0,$s0,$t2 @ rk[4]=rk[0]^... 507 eor $s1,$s1,$s0 @ rk[5]=rk[1]^rk[4] 509 eor $s2,$s2,$s1 @ rk[6]=rk[2]^rk[5] 511 eor $s3,$s3,$s2 @ rk[7]=rk[ [all...] |