/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) argument 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[ 61 u32 *rk; local 153 u32 *rk = ctx; local [all...] |
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk 100 u32 *rk; local 121 u32 *rk = ctx; local [all...] |
H A D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) argument 784 rk[0] = GETU32(cipherKey ); 785 rk[1] = GETU32(cipherKey + 4); 786 rk[2] = GETU32(cipherKey + 8); 787 rk[3] = GETU32(cipherKey + 12); 791 temp = rk[3]; 792 rk[4] = rk[0] ^ TE421(temp) ^ TE432(temp) ^ 794 rk[5] = rk[ [all...] |
/freebsd-11-stable/crypto/openssl/crypto/aes/ |
H A D | aes_core.c | 632 u32 *rk; local 641 rk = key->rd_key; 650 rk[0] = GETU32(userKey ); 651 rk[1] = GETU32(userKey + 4); 652 rk[2] = GETU32(userKey + 8); 653 rk[3] = GETU32(userKey + 12); 656 temp = rk[3]; 657 rk[4] = rk[0] ^ 663 rk[ 734 u32 *rk; local 786 const u32 *rk; local 978 const u32 *rk; local 1210 u32 *rk; local 1312 u32 *rk; local [all...] |
H A D | aes_x86core.c | 476 u32 *rk; local 485 rk = key->rd_key; 494 rk[0] = GETU32(userKey ); 495 rk[1] = GETU32(userKey + 4); 496 rk[2] = GETU32(userKey + 8); 497 rk[3] = GETU32(userKey + 12); 500 temp = rk[3]; 501 rk[4] = rk[0] ^ 507 rk[ 578 u32 *rk; local 660 const u32 *rk; local 874 const u32 *rk; local [all...] |
/freebsd-11-stable/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 63 free(pkey->rk.dname); 64 pkey->rk.dname = NULL; 74 size_t s = sizeof(struct ub_packed_rrset_key) + k->rk.dname_len; 102 if(key1->rk.type != key2->rk.type) { 103 if(key1->rk.type < key2->rk.type) 107 if(key1->rk.dname_len != key2->rk.dname_len) { 108 if(key1->rk [all...] |
H A D | msgreply.c | 382 pk->rk.flags = pset->flags; 383 pk->rk.dname_len = pset->dname_len; 385 pk->rk.dname = (uint8_t*)regional_alloc( 387 else pk->rk.dname = 389 if(!pk->rk.dname) 392 dname_pkt_copy(pkt, pk->rk.dname, pset->dname); 394 pk->rk.type = htons(pset->type); 395 pk->rk.rrset_class = pset->rrset_class; 679 dk->rk = fk->rk; [all...] |
H A D | msgencode.c | 295 if((p = compress_tree_lookup(tree, key->rk.dname, 301 if(!write_compressed_dname(pkt, key->rk.dname, 309 if(sldns_buffer_remaining(pkt) < key->rk.dname_len+4+4+2) 311 sldns_buffer_write(pkt, key->rk.dname, 312 key->rk.dname_len); 316 if(!compress_tree_store(key->rk.dname, owner_labs, 358 uint16_t t = ntohs(key->rk.type); 462 if(!rrset_belongs_in_reply(s, ntohs(key->rk.type), qtype, dnssec)) 465 owner_labs = dname_count_labels(key->rk.dname); 470 if((key->rk [all...] |
/freebsd-11-stable/sys/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 735 int rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) { 741 rk[0] = GETU32(cipherKey ); 742 rk[1] = GETU32(cipherKey + 4); 743 rk[2] = GETU32(cipherKey + 8); 744 rk[3] = GETU32(cipherKey + 12); 747 temp = rk[3]; 748 rk[4] = rk[0] ^ 754 rk[5] = rk[ [all...] |
H A D | rijndael-api-fst.h | 47 u_int32_t rk[4*(RIJNDAEL_MAXNR + 1)]; /* key schedule */ member in struct:__anon8906
|
H A D | rijndael-api-fst.c | 64 key->Nr = rijndaelKeySetupEnc(key->rk, cipherKey, keyLen); 66 key->Nr = rijndaelKeySetupDec(key->rk, cipherKey, keyLen); 105 rijndaelEncrypt(key->rk, key->Nr, input, outBuffer); 125 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 142 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 220 rijndaelEncrypt(key->rk, key->Nr, input, outBuffer); 230 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 240 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 254 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 283 rijndaelDecrypt(key->rk, ke [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | rijndael.c | 630 rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) 635 rk[0] = GETU32(cipherKey ); 636 rk[1] = GETU32(cipherKey + 4); 637 rk[2] = GETU32(cipherKey + 8); 638 rk[3] = GETU32(cipherKey + 12); 641 temp = rk[3]; 642 rk[4] = rk[0] ^ 648 rk[5] = rk[ [all...] |
/freebsd-11-stable/contrib/unbound/iterator/ |
H A D | iter_resptype.c | 79 if(ntohs(s->rk.type) == request->qtype && 80 ntohs(s->rk.rrset_class) == request->qclass && 81 query_dname_compare(mname, s->rk.dname) == 0) { 87 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 88 query_dname_compare(mname, s->rk.dname) == 0) { 126 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 128 s->rk.dname) == 0) { 163 ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 164 ntohs(s->rk.rrset_class) == request->qclass && 165 dname_strict_subdomain_c(s->rk [all...] |
H A D | iter_utils.c | 878 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 879 ntohs(s->rk.rrset_class) == dclass) { 880 int l = dname_count_labels(s->rk.dname); 882 dname_strict_subdomain(s->rk.dname, 919 if(k1->rk.dname_len != k2->rk.dname_len || 920 k1->rk.flags != k2->rk.flags || 921 k1->rk.type != k2->rk [all...] |
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_utils.c | 82 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 84 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_DS) 86 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS) 94 ntohs(rep->rrsets[0]->rk.type) == LDNS_RR_TYPE_NS && 95 query_dname_compare(rep->rrsets[0]->rk.dname, 122 ntohs(rep->rrsets[i]->rk.type) == qinf->qtype) 124 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_CNAME) 227 rep->rrsets[i]->rk.dname) == 0) { 242 if(ntohs(rep->rrsets[i]->rk.type) != LDNS_RR_TYPE_DNAME) 252 if(ntohs(rep->rrsets[i]->rk [all...] |
H A D | val_nsec.c | 153 log_assert(ntohs(nsec->rk.type) == LDNS_RR_TYPE_NSEC); 245 if(rep->rrsets[i]->rk.type != htons(LDNS_RR_TYPE_NSEC)) 257 if(wc && dname_is_wild(rep->rrsets[i]->rk.dname)) 293 if(query_dname_compare(nsec->rk.dname, qinfo->qname) != 0) { 307 dname_canonical_compare(nsec->rk.dname, 319 if(dname_is_wild(nsec->rk.dname)) { 321 uint8_t* ce = nsec->rk.dname; 322 size_t ce_len = nsec->rk.dname_len; 349 while (dname_canonical_compare(nsec->rk.dname, nm) < 0) { 406 uint8_t* owner = nsec->rk [all...] |
H A D | val_sigcrypt.c | 303 sldns_buffer_write(b, dnskey_rrset->rk.dname, 304 dnskey_rrset->rk.dname_len); 802 uint16_t type = ntohs(rrset->rk.type); 926 int fqdn_labels = dname_signame_label_count(k->rk.dname); 930 sldns_buffer_write(buf, k->rk.dname, k->rk.dname_len); 932 *can_owner_len = k->rk.dname_len; 939 uint8_t* nm = k->rk.dname; 940 size_t len = k->rk.dname_len; 963 switch(ntohs(rrset->rk [all...] |
H A D | validator.c | 602 if(dname_seen && ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) { 620 "has failed ANSWER rrset:", s->rk.dname, 621 ntohs(s->rk.type), ntohs(s->rk.rrset_class)); 623 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) 625 else if(ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME) 635 ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME) { 650 "has failed AUTHORITY rrset:", s->rk.dname, 651 ntohs(s->rk.type), ntohs(s->rk [all...] |
H A D | val_neg.c | 330 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 331 d = rep->rrsets[i]->rk.dname; 332 len = rep->rrsets[i]->rk.dname_len; 570 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 584 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 687 if(ntohs(nsec->rk.type) == LDNS_RR_TYPE_NSEC) { 754 uint8_t* nm = nsec->rk.dname; 755 size_t nm_len = nsec->rk.dname_len; 756 int labs = dname_count_labels(nsec->rk.dname); 763 nsec->rk [all...] |
/freebsd-11-stable/contrib/unbound/services/cache/ |
H A D | rrset.c | 192 uint16_t rrset_type = ntohs(k->rk.type); 195 log_assert(k->rk.dname != NULL); 259 free(rrset->rk.dname); 260 rrset->rk.dname_len = ce_len + 2; 261 rrset->rk.dname = (uint8_t*)memdup(wc_dname, rrset->rk.dname_len); 262 if(!rrset->rk.dname) { 268 rrset->entry.hash = rrset_key_hash(&rrset->rk); 285 key.rk.dname = qname; 286 key.rk [all...] |
/freebsd-11-stable/sys/kern/ |
H A D | kern_procctl.c | 238 struct procctl_reaper_kill *rk, int *error) 243 error1 = p_cansignal(td, p2, rk->rk_sig); 245 pksignal(p2, rk->rk_sig, ksi); 246 rk->rk_killed++; 249 rk->rk_fpid = p2->p_pid; 273 reap_kill(struct thread *td, struct proc *p, struct procctl_reaper_kill *rk) argument 284 if (rk->rk_sig <= 0 || rk->rk_sig > _SIG_MAXSIG || 285 (rk->rk_flags & ~(REAPER_KILL_CHILDREN | 286 REAPER_KILL_SUBTREE)) != 0 || (rk 237 reap_kill_proc(struct thread *td, struct proc *p2, ksiginfo_t *ksi, struct procctl_reaper_kill *rk, int *error) argument 481 struct procctl_reaper_kill rk; member in union:__anon5345 [all...] |
/freebsd-11-stable/contrib/unbound/daemon/ |
H A D | cachedump.c | 87 (k->rk.flags & PACKED_RRSET_NSEC_AT_APEX)?" nsec_apex":"", 143 nm = sldns_wire2str_dname(k->rk.dname, k->rk.dname_len); 144 tp = sldns_wire2str_type(ntohs(k->rk.type)); 145 cl = sldns_wire2str_class(ntohs(k->rk.rrset_class)); 152 if(!ssl_printf(ssl, "%s %s %s %d\n", nm, cl, tp, (int)k->rk.flags)) { 322 struct ub_packed_rrset_key* rk, struct packed_rrset_data* d, 364 rk->rk.type = htons(sldns_wirerr_get_type(rr, rr_len, dname_len)); 365 rk 321 load_rr(RES* ssl, sldns_buffer* buf, struct regional* region, struct ub_packed_rrset_key* rk, struct packed_rrset_data* d, unsigned int i, int is_rrsig, int* go_on, time_t now) argument 442 struct ub_packed_rrset_key* rk; local [all...] |
/freebsd-11-stable/contrib/unbound/respip/ |
H A D | respip.c | 241 rrset->rk.dname = regional_alloc_zero(region, 1); 242 if(!rrset->rk.dname) { 246 rrset->rk.dname_len = 1; 247 rrset->rk.type = htons(rrtype); 248 rrset->rk.rrset_class = htons(rrclass); 267 raddr->data->rk.type == htons(LDNS_RR_TYPE_CNAME)) { 504 ck->rk = key->rk; 505 if(key->rk.dname) { 506 ck->rk [all...] |
/freebsd-11-stable/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 537 eor $s0,$s0,$t2 @ rk[4]=rk[0]^... 538 eor $s1,$s1,$s0 @ rk[5]=rk[1]^rk[4] 540 eor $s2,$s2,$s1 @ rk[6]=rk[2]^rk[5] 542 eor $s3,$s3,$s2 @ rk[7]=rk[ [all...] |
/freebsd-11-stable/secure/lib/libcrypto/arm/ |
H A D | aes-armv4.S | 519 eor r0,r0,r5 @ rk[4]=rk[0]^... 520 eor r1,r1,r0 @ rk[5]=rk[1]^rk[4] 522 eor r2,r2,r1 @ rk[6]=rk[2]^rk[5] 524 eor r3,r3,r2 @ rk[7]=rk[ [all...] |