/freebsd-13-stable/crypto/openssl/crypto/seed/ |
H A D | seed_ecb.c | 13 const SEED_KEY_SCHEDULE *ks, int enc) 16 SEED_encrypt(in, out, ks); 18 SEED_decrypt(in, out, ks); 12 SEED_ecb_encrypt(const unsigned char *in, unsigned char *out, const SEED_KEY_SCHEDULE *ks, int enc) argument
|
H A D | seed_cbc.c | 14 size_t len, const SEED_KEY_SCHEDULE *ks, 18 CRYPTO_cbc128_encrypt(in, out, len, ks, ivec, 21 CRYPTO_cbc128_decrypt(in, out, len, ks, ivec, 13 SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len, const SEED_KEY_SCHEDULE *ks, unsigned char ivec[SEED_BLOCK_SIZE], int enc) argument
|
H A D | seed_cfb.c | 14 size_t len, const SEED_KEY_SCHEDULE *ks, 18 CRYPTO_cfb128_encrypt(in, out, len, ks, ivec, num, enc, 13 SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const SEED_KEY_SCHEDULE *ks, unsigned char ivec[SEED_BLOCK_SIZE], int *num, int enc) argument
|
H A D | seed_ofb.c | 14 size_t len, const SEED_KEY_SCHEDULE *ks, 17 CRYPTO_ofb128_encrypt(in, out, len, ks, ivec, num, 13 SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const SEED_KEY_SCHEDULE *ks, unsigned char ivec[SEED_BLOCK_SIZE], int *num) argument
|
/freebsd-13-stable/sys/security/mac/ |
H A D | mac_posix_sem.c | 69 mac_posixsem_init(struct ksem *ks) argument 73 ks->ks_label = mac_posixsem_label_alloc(); 75 ks->ks_label = NULL; 87 mac_posixsem_destroy(struct ksem *ks) argument 90 if (ks->ks_label != NULL) { 91 mac_posixsem_label_free(ks->ks_label); 92 ks->ks_label = NULL; 97 mac_posixsem_create(struct ucred *cred, struct ksem *ks) argument 100 MAC_POLICY_PERFORM_NOSLEEP(posixsem_create, cred, ks, ks 107 mac_posixsem_check_open(struct ucred *cred, struct ksem *ks) argument 122 mac_posixsem_check_getvalue(struct ucred *active_cred, struct ucred *file_cred, struct ksem *ks) argument 139 mac_posixsem_check_post(struct ucred *active_cred, struct ucred *file_cred, struct ksem *ks) argument 156 mac_posixsem_check_stat(struct ucred *active_cred, struct ucred *file_cred, struct ksem *ks) argument 173 mac_posixsem_check_unlink(struct ucred *cred, struct ksem *ks) argument 188 mac_posixsem_check_wait(struct ucred *active_cred, struct ucred *file_cred, struct ksem *ks) argument 205 mac_posixsem_check_setmode(struct ucred *cred, struct ksem *ks, mode_t mode) argument 220 mac_posixsem_check_setowner(struct ucred *cred, struct ksem *ks, uid_t uid, gid_t gid) argument [all...] |
/freebsd-13-stable/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 63 typedef void init_func(struct krb5_key_state *ks); 64 typedef void destroy_func(struct krb5_key_state *ks); 65 typedef void set_key_func(struct krb5_key_state *ks, const void *in); 66 typedef void random_to_key_func(struct krb5_key_state *ks, const void *in); 67 typedef void encrypt_func(const struct krb5_key_state *ks, 69 typedef void checksum_func(const struct krb5_key_state *ks, int usage, 102 krb5_set_key(struct krb5_key_state *ks, const void *keydata) argument 105 ks->ks_class->ec_set_key(ks, keydata); 109 krb5_random_to_key(struct krb5_key_state *ks, cons argument 116 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 124 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 132 krb5_checksum(const struct krb5_key_state *ks, int usage, struct mbuf *inout, size_t skip, size_t inlen, size_t outlen) argument [all...] |
H A D | kcrypto_aes.c | 53 aes_init(struct krb5_key_state *ks) argument 59 ks->ks_priv = as; 63 aes_destroy(struct krb5_key_state *ks) argument 65 struct aes_state *as = ks->ks_priv; 72 free(ks->ks_priv, M_GSSAPI); 76 aes_set_key(struct krb5_key_state *ks, const void *in) argument 78 void *kp = ks->ks_key; 79 struct aes_state *as = ks->ks_priv; 83 bcopy(in, kp, ks->ks_class->ec_keylen); 96 csp.csp_auth_klen = ks 113 aes_random_to_key(struct krb5_key_state *ks, const void *in) argument 140 aes_encrypt_1(const struct krb5_key_state *ks, int buftype, void *buf, size_t skip, size_t len, void *ivec, bool encrypt) argument 179 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 250 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 319 aes_checksum(const struct krb5_key_state *ks, int usage, struct mbuf *inout, size_t skip, size_t inlen, size_t outlen) argument [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/icp/algs/skein/ |
H A D | skein_block.c | 52 #define ks (kw + KW_KEY_BASE) macro 108 ks[0] = ctx->X[0]; 109 ks[1] = ctx->X[1]; 110 ks[2] = ctx->X[2]; 111 ks[3] = ctx->X[3]; 112 ks[4] = ks[0] ^ ks[1] ^ ks[2] ^ ks[ [all...] |
/freebsd-13-stable/sys/crypto/skein/ |
H A D | skein_block.c | 42 #define ks (kw + KW_KEY_BASE) macro 97 ks[0] = ctx->X[0]; 98 ks[1] = ctx->X[1]; 99 ks[2] = ctx->X[2]; 100 ks[3] = ctx->X[3]; 101 ks[4] = ks[0] ^ ks[1] ^ ks[2] ^ ks[ [all...] |
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | idea.h | 34 IDEA_KEY_SCHEDULE *ks); 35 void IDEA_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks); 38 long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, 41 long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, 44 long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, 46 void IDEA_encrypt(unsigned long *in, IDEA_KEY_SCHEDULE *ks);
|
H A D | seed.h | 69 SEED_KEY_SCHEDULE *ks); 73 const SEED_KEY_SCHEDULE *ks); 76 const SEED_KEY_SCHEDULE *ks); 79 const SEED_KEY_SCHEDULE *ks, int enc); 81 const SEED_KEY_SCHEDULE *ks, 84 size_t len, const SEED_KEY_SCHEDULE *ks, 88 size_t len, const SEED_KEY_SCHEDULE *ks,
|
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | sm4.h | 31 int SM4_set_key(const uint8_t *key, SM4_KEY *ks); 33 void SM4_encrypt(const uint8_t *in, uint8_t *out, const SM4_KEY *ks); 35 void SM4_decrypt(const uint8_t *in, uint8_t *out, const SM4_KEY *ks);
|
/freebsd-13-stable/crypto/openssl/crypto/des/ |
H A D | str2key.c | 15 DES_key_schedule ks; local 34 DES_set_key_unchecked(key, &ks); 35 DES_cbc_cksum((const unsigned char *)str, key, length, &ks, key); 36 OPENSSL_cleanse(&ks, sizeof(ks)); 42 DES_key_schedule ks; local 70 DES_set_key_unchecked(key1, &ks); 71 DES_cbc_cksum((const unsigned char *)str, key1, length, &ks, key1); 72 DES_set_key_unchecked(key2, &ks); 73 DES_cbc_cksum((const unsigned char *)str, key2, length, &ks, key [all...] |
/freebsd-13-stable/sys/kern/ |
H A D | uipc_sem.c | 121 static int ksem_access(struct ksem *ks, struct ucred *ucred); 127 static void ksem_drop(struct ksem *ks); 130 static struct ksem *ksem_hold(struct ksem *ks); 131 static void ksem_insert(char *path, Fnv32_t fnv, struct ksem *ks); 167 struct ksem *ks; local 172 ks = fp->f_data; 175 error = mac_posixsem_check_stat(active_cred, fp->f_cred, ks); 187 sb->st_atim = ks->ks_atime; 188 sb->st_ctim = ks->ks_ctime; 189 sb->st_mtim = ks 203 struct ksem *ks; local 228 struct ksem *ks; local 257 struct ksem *ks; local 270 struct ksem *ks; local 305 struct ksem *ks; local 332 ksem_hold(struct ksem *ks) argument 340 ksem_drop(struct ksem *ks) argument 360 ksem_access(struct ksem *ks, struct ucred *ucred) argument 392 ksem_insert(char *path, Fnv32_t fnv, struct ksem *ks) argument 469 struct ksem *ks; local 595 struct ksem *ks; local 694 struct ksem *ks; local 723 struct ksem *ks; local 815 struct ksem *ks; local 885 struct ksem *ks; local 921 struct ksem *ks; local [all...] |
/freebsd-13-stable/contrib/llvm-project/openmp/runtime/src/ |
H A D | kmp_debug.h | 114 int ks; \ 115 __kmp_disable(&ks); \ 117 __kmp_enable(ks); \ 121 int ks; \ 122 __kmp_disable(&ks); \ 124 __kmp_enable(ks); \ 128 int ks; \ 129 __kmp_disable(&ks); \ 131 __kmp_enable(ks); \ 135 int ks; \ [all...] |
/freebsd-13-stable/crypto/openssl/crypto/evp/ |
H A D | e_idea.c | 22 IDEA_KEY_SCHEDULE ks; member in struct:__anon7150 37 IDEA_ecb_encrypt(in + i, out + i, &EVP_C_DATA(EVP_IDEA_KEY,ctx)->ks); 41 BLOCK_CIPHER_func_cbc(idea, IDEA, EVP_IDEA_KEY, ks) 42 BLOCK_CIPHER_func_ofb(idea, IDEA, 64, EVP_IDEA_KEY, ks) 43 BLOCK_CIPHER_func_cfb(idea, IDEA, 64, EVP_IDEA_KEY, ks) 59 IDEA_set_encrypt_key(key, &EVP_C_DATA(EVP_IDEA_KEY,ctx)->ks); 64 IDEA_set_decrypt_key(&tmp, &EVP_C_DATA(EVP_IDEA_KEY,ctx)->ks);
|
H A D | e_bf.c | 22 BF_KEY ks; member in struct:__anon7134 27 IMPLEMENT_BLOCK_CIPHER(bf, ks, BF, EVP_BF_KEY, NID_bf, 8, 16, 8, 64, 34 BF_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
|
H A D | e_cast.c | 23 CAST_KEY ks; member in struct:__anon7137 28 IMPLEMENT_BLOCK_CIPHER(cast5, ks, CAST, EVP_CAST_KEY, 36 CAST_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx), key);
|
H A D | e_seed.c | 25 SEED_KEY_SCHEDULE ks; member in struct:__anon7155 28 IMPLEMENT_BLOCK_CIPHER(seed, ks, SEED, EVP_SEED_KEY, NID_seed, 35 SEED_set_key(key, &EVP_C_DATA(EVP_SEED_KEY,ctx)->ks);
|
/freebsd-13-stable/crypto/openssl/crypto/rc2/ |
H A D | rc2_ecb.c | 22 void RC2_ecb_encrypt(const unsigned char *in, unsigned char *out, RC2_KEY *ks, argument 32 RC2_encrypt(d, ks); 34 RC2_decrypt(d, ks);
|
/freebsd-13-stable/crypto/openssl/crypto/rc5/ |
H A D | rc5_ecb.c | 15 RC5_32_KEY *ks, int encrypt) 24 RC5_32_encrypt(d, ks); 26 RC5_32_decrypt(d, ks); 14 RC5_32_ecb_encrypt(const unsigned char *in, unsigned char *out, RC5_32_KEY *ks, int encrypt) argument
|
/freebsd-13-stable/crypto/openssl/crypto/cast/ |
H A D | c_ecb.c | 15 const CAST_KEY *ks, int enc) 24 CAST_encrypt(d, ks); 26 CAST_decrypt(d, ks); 14 CAST_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAST_KEY *ks, int enc) argument
|
/freebsd-13-stable/sys/dev/hwpmc/ |
H A D | hwpmc_soft.h | 47 int pmc_soft_intr(struct pmckern_soft *ks);
|
/freebsd-13-stable/contrib/opie/libopie/ |
H A D | passwd.c | 27 int opiepasswd FUNCTION((old, flags, principal, n, seed, ks), struct opie *old AND int flags AND char *principal AND int n AND char *seed AND char *ks) argument 49 if (ks) { 53 if (opiekeycrunch(MDX, &key, seed, ks)) 60 if ((opieetob(&key, ks) != 1) && !opieatob8(&key, ks))
|
/freebsd-13-stable/sys/cddl/compat/opensolaris/sys/ |
H A D | sid.h | 61 ksid_getid(ksid_t *ks) argument 68 ksid_getdomain(ksid_t *ks) argument 75 ksid_getrid(ksid_t *ks) argument
|