/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) argument 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[ 61 u32 *rk; local 153 u32 *rk = ctx; local [all...] |
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk 100 u32 *rk; local 121 u32 *rk = ctx; local [all...] |
H A D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) argument 784 rk[0] = GETU32(cipherKey ); 785 rk[1] = GETU32(cipherKey + 4); 786 rk[2] = GETU32(cipherKey + 8); 787 rk[3] = GETU32(cipherKey + 12); 791 temp = rk[3]; 792 rk[4] = rk[0] ^ TE421(temp) ^ TE432(temp) ^ 794 rk[5] = rk[ [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/icp/algs/aes/ |
H A D | aes_impl_aesni.c | 31 extern int rijndael_key_setup_enc_intel(uint32_t rk[], 33 extern int rijndael_key_setup_dec_intel(uint32_t rk[], 35 extern void aes_encrypt_intel(const uint32_t rk[], int Nr, 37 extern void aes_decrypt_intel(const uint32_t rk[], int Nr, 72 * rk Key schedule, of aes_ks_t (60 32-bit integers) 78 aes_aesni_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4], argument 82 aes_encrypt_intel(rk, Nr, pt, ct); 95 * rk Key schedule, of aes_ks_t (60 32-bit integers) 101 aes_aesni_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4], argument 105 aes_decrypt_intel(rk, N [all...] |
H A D | aes_impl_generic.c | 785 * rk AES key schedule 32-bit array to be initialized 790 rijndael_key_setup_enc(uint32_t rk[], const uint32_t cipherKey[], argument 796 rk[0] = cipherKey[0]; 797 rk[1] = cipherKey[1]; 798 rk[2] = cipherKey[2]; 799 rk[3] = cipherKey[3]; 803 temp = rk[3]; 804 rk[4] = rk[0] ^ 810 rk[ 895 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits) argument 979 aes_generic_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4], uint32_t ct[4]) argument 1107 aes_generic_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4], uint32_t pt[4]) argument [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
H A D | aeskey.c | 89 aes_encrypt_key128(const unsigned char *key, uint32_t rk[]) argument 93 rk[0] = ss[0] = word_in(key, 0); 94 rk[1] = ss[1] = word_in(key, 1); 95 rk[2] = ss[2] = word_in(key, 2); 96 rk[3] = ss[3] = word_in(key, 3); 99 ke4(rk, 0); ke4(rk, 1); 100 ke4(rk, 2); ke4(rk, 3); 101 ke4(rk, 129 aes_encrypt_key192(const unsigned char *key, uint32_t rk[]) argument 173 aes_encrypt_key256(const unsigned char *key, uint32_t rk[]) argument 214 rijndael_key_setup_enc_amd64(uint32_t rk[], const uint32_t cipherKey[], int keyBits) argument 327 aes_decrypt_key128(const unsigned char *key, uint32_t rk[]) argument 407 aes_decrypt_key192(const unsigned char *key, uint32_t rk[]) argument 505 aes_decrypt_key256(const unsigned char *key, uint32_t rk[]) argument 562 rijndael_key_setup_dec_amd64(uint32_t rk[], const uint32_t cipherKey[], int keyBits) argument [all...] |
/freebsd-13-stable/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 63 free(pkey->rk.dname); 64 pkey->rk.dname = NULL; 74 size_t s = sizeof(struct ub_packed_rrset_key) + k->rk.dname_len; 102 if(key1->rk.type != key2->rk.type) { 103 if(key1->rk.type < key2->rk.type) 107 if(key1->rk.dname_len != key2->rk.dname_len) { 108 if(key1->rk [all...] |
H A D | msgreply.c | 382 pk->rk.flags = pset->flags; 383 pk->rk.dname_len = pset->dname_len; 385 pk->rk.dname = (uint8_t*)regional_alloc( 387 else pk->rk.dname = 389 if(!pk->rk.dname) 392 dname_pkt_copy(pkt, pk->rk.dname, pset->dname); 394 pk->rk.type = htons(pset->type); 395 pk->rk.rrset_class = pset->rrset_class; 679 dk->rk = fk->rk; [all...] |
H A D | msgencode.c | 295 if((p = compress_tree_lookup(tree, key->rk.dname, 301 if(!write_compressed_dname(pkt, key->rk.dname, 309 if(sldns_buffer_remaining(pkt) < key->rk.dname_len+4+4+2) 311 sldns_buffer_write(pkt, key->rk.dname, 312 key->rk.dname_len); 316 if(!compress_tree_store(key->rk.dname, owner_labs, 358 uint16_t t = ntohs(key->rk.type); 462 if(!rrset_belongs_in_reply(s, ntohs(key->rk.type), qtype, dnssec)) 465 owner_labs = dname_count_labels(key->rk.dname); 470 if((key->rk [all...] |
/freebsd-13-stable/sys/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 735 int rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) { 741 rk[0] = GETU32(cipherKey ); 742 rk[1] = GETU32(cipherKey + 4); 743 rk[2] = GETU32(cipherKey + 8); 744 rk[3] = GETU32(cipherKey + 12); 747 temp = rk[3]; 748 rk[4] = rk[0] ^ 754 rk[5] = rk[ [all...] |
H A D | rijndael-api-fst.h | 47 u_int32_t rk[4*(RIJNDAEL_MAXNR + 1)]; /* key schedule */ member in struct:__anon11203
|
/freebsd-13-stable/crypto/openssh/ |
H A D | rijndael.c | 630 rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) 635 rk[0] = GETU32(cipherKey ); 636 rk[1] = GETU32(cipherKey + 4); 637 rk[2] = GETU32(cipherKey + 8); 638 rk[3] = GETU32(cipherKey + 12); 641 temp = rk[3]; 642 rk[4] = rk[0] ^ 648 rk[5] = rk[ [all...] |
/freebsd-13-stable/crypto/openssl/crypto/aes/ |
H A D | aes_x86core.c | 478 u32 *rk; local 487 rk = key->rd_key; 496 rk[0] = GETU32(userKey ); 497 rk[1] = GETU32(userKey + 4); 498 rk[2] = GETU32(userKey + 8); 499 rk[3] = GETU32(userKey + 12); 502 temp = rk[3]; 503 rk[4] = rk[0] ^ 509 rk[ 580 u32 *rk; local 662 const u32 *rk; local 876 const u32 *rk; local [all...] |
H A D | aes_core.c | 618 u64 *rk; local 625 rk = (u64*)key->rd_key; 634 KeyExpansion(userKey, rk, key->rounds, bits/32); 654 const u64 *rk; local 657 rk = (u64*)key->rd_key; 659 Cipher(in, out, rk, key->rounds); 669 const u64 *rk; local 672 rk = (u64*)key->rd_key; 674 InvCipher(in, out, rk, key->rounds); 1266 u32 *rk; local 1368 u32 *rk; local 1420 const u32 *rk; local 1612 const u32 *rk; local 1844 u32 *rk; local 1946 u32 *rk; local [all...] |
/freebsd-13-stable/contrib/unbound/iterator/ |
H A D | iter_resptype.c | 79 if(ntohs(s->rk.type) == request->qtype && 80 ntohs(s->rk.rrset_class) == request->qclass && 81 query_dname_compare(mname, s->rk.dname) == 0) { 87 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 88 query_dname_compare(mname, s->rk.dname) == 0) { 126 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 128 s->rk.dname) == 0) { 163 ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 164 ntohs(s->rk.rrset_class) == request->qclass && 165 dname_strict_subdomain_c(s->rk [all...] |
H A D | iter_utils.c | 878 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 879 ntohs(s->rk.rrset_class) == dclass) { 880 int l = dname_count_labels(s->rk.dname); 882 dname_strict_subdomain(s->rk.dname, 919 if(k1->rk.dname_len != k2->rk.dname_len || 920 k1->rk.flags != k2->rk.flags || 921 k1->rk.type != k2->rk [all...] |
/freebsd-13-stable/contrib/bearssl/tools/ |
H A D | keys.c | 57 const br_rsa_private_key *rk; local 61 rk = br_skey_decoder_get_rsa(&dc); 64 sk->key.rsa.n_bitlen = rk->n_bitlen; 65 sk->key.rsa.p = xblobdup(rk->p, rk->plen); 66 sk->key.rsa.plen = rk->plen; 67 sk->key.rsa.q = xblobdup(rk->q, rk->qlen); 68 sk->key.rsa.qlen = rk->qlen; 69 sk->key.rsa.dp = xblobdup(rk [all...] |
/freebsd-13-stable/contrib/unbound/validator/ |
H A D | val_utils.c | 82 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 84 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_DS) 86 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS) 94 ntohs(rep->rrsets[0]->rk.type) == LDNS_RR_TYPE_NS && 95 query_dname_compare(rep->rrsets[0]->rk.dname, 122 ntohs(rep->rrsets[i]->rk.type) == qinf->qtype) 124 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_CNAME) 227 rep->rrsets[i]->rk.dname) == 0) { 242 if(ntohs(rep->rrsets[i]->rk.type) != LDNS_RR_TYPE_DNAME) 252 if(ntohs(rep->rrsets[i]->rk [all...] |
H A D | val_nsec.c | 153 log_assert(ntohs(nsec->rk.type) == LDNS_RR_TYPE_NSEC); 245 if(rep->rrsets[i]->rk.type != htons(LDNS_RR_TYPE_NSEC)) 257 if(wc && dname_is_wild(rep->rrsets[i]->rk.dname)) 293 if(query_dname_compare(nsec->rk.dname, qinfo->qname) != 0) { 307 dname_canonical_compare(nsec->rk.dname, 319 if(dname_is_wild(nsec->rk.dname)) { 321 uint8_t* ce = nsec->rk.dname; 322 size_t ce_len = nsec->rk.dname_len; 349 while (dname_canonical_compare(nsec->rk.dname, nm) < 0) { 406 uint8_t* owner = nsec->rk [all...] |
H A D | val_sigcrypt.c | 303 sldns_buffer_write(b, dnskey_rrset->rk.dname, 304 dnskey_rrset->rk.dname_len); 802 uint16_t type = ntohs(rrset->rk.type); 926 int fqdn_labels = dname_signame_label_count(k->rk.dname); 930 sldns_buffer_write(buf, k->rk.dname, k->rk.dname_len); 932 *can_owner_len = k->rk.dname_len; 939 uint8_t* nm = k->rk.dname; 940 size_t len = k->rk.dname_len; 963 switch(ntohs(rrset->rk [all...] |
/freebsd-13-stable/contrib/unbound/services/cache/ |
H A D | rrset.c | 192 uint16_t rrset_type = ntohs(k->rk.type); 195 log_assert(k->rk.dname != NULL); 259 free(rrset->rk.dname); 260 rrset->rk.dname_len = ce_len + 2; 261 rrset->rk.dname = (uint8_t*)memdup(wc_dname, rrset->rk.dname_len); 262 if(!rrset->rk.dname) { 268 rrset->entry.hash = rrset_key_hash(&rrset->rk); 285 key.rk.dname = qname; 286 key.rk [all...] |
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | sm4.h | 28 uint32_t rk[SM4_KEY_SCHEDULE]; member in struct:SM4_KEY_st
|
/freebsd-13-stable/contrib/unbound/daemon/ |
H A D | cachedump.c | 87 (k->rk.flags & PACKED_RRSET_NSEC_AT_APEX)?" nsec_apex":"", 143 nm = sldns_wire2str_dname(k->rk.dname, k->rk.dname_len); 144 tp = sldns_wire2str_type(ntohs(k->rk.type)); 145 cl = sldns_wire2str_class(ntohs(k->rk.rrset_class)); 152 if(!ssl_printf(ssl, "%s %s %s %d\n", nm, cl, tp, (int)k->rk.flags)) { 322 struct ub_packed_rrset_key* rk, struct packed_rrset_data* d, 364 rk->rk.type = htons(sldns_wirerr_get_type(rr, rr_len, dname_len)); 365 rk 321 load_rr(RES* ssl, sldns_buffer* buf, struct regional* region, struct ub_packed_rrset_key* rk, struct packed_rrset_data* d, unsigned int i, int is_rrsig, int* go_on, time_t now) argument 442 struct ub_packed_rrset_key* rk; local [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/icp/include/aes/ |
H A D | aes_impl.h | 200 extern int rijndael_key_setup_enc_amd64(uint32_t rk[], 202 extern int rijndael_key_setup_dec_amd64(uint32_t rk[], 204 extern void aes_encrypt_amd64(const uint32_t rk[], int Nr, 206 extern void aes_decrypt_amd64(const uint32_t rk[], int Nr,
|
/freebsd-13-stable/sys/kern/ |
H A D | kern_procctl.c | 244 struct procctl_reaper_kill *rk, int *error) 249 error1 = p_cansignal(td, p2, rk->rk_sig); 251 pksignal(p2, rk->rk_sig, ksi); 252 rk->rk_killed++; 255 rk->rk_fpid = p2->p_pid; 279 reap_kill(struct thread *td, struct proc *p, struct procctl_reaper_kill *rk) argument 290 if (rk->rk_sig <= 0 || rk->rk_sig > _SIG_MAXSIG || 291 (rk->rk_flags & ~(REAPER_KILL_CHILDREN | 292 REAPER_KILL_SUBTREE)) != 0 || (rk 243 reap_kill_proc(struct thread *td, struct proc *p2, ksiginfo_t *ksi, struct procctl_reaper_kill *rk, int *error) argument 588 struct procctl_reaper_kill rk; member in union:__anon14742 [all...] |