/freebsd-current/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_file.c | 46 struct sshkey *k1, *k2; local 78 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local 80 ASSERT_PTR_NE(k2, NULL); 81 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); 82 sshkey_free(k2); 87 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k2, NULL), 0); 89 ASSERT_PTR_NE(k2, NULL); 90 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); 91 sshkey_free(k2); 97 (const char *)sshbuf_ptr(pw), &k2, NUL local 188 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local 207 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local 289 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local 308 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local 375 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local 441 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local 507 (const char *)sshbuf_ptr(pw), &k2, NULL), 0); local [all...] |
H A D | test_sshkey.c | 184 struct sshkey *k1 = NULL, *k2 = NULL, *k3 = NULL, *kf = NULL; local 417 k2 = get_private("ed25519_2"); 447 ASSERT_INT_EQ(sshkey_from_private(k2, &k1->cert->signature_key), 0); 448 ASSERT_INT_EQ(sshkey_certify(k1, k2, NULL, NULL, NULL), 0); 455 sshkey_free(k2); 463 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, 465 signature_tests(k1, k2, "ssh-rsa"); 467 sshkey_free(k2); 472 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, 474 signature_tests(k1, k2, "rs [all...] |
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_stream/xchacha20/ |
H A D | stream_xchacha20.c | 32 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 34 crypto_core_hchacha20(k2, n, k, NULL); 35 COMPILER_ASSERT(crypto_stream_chacha20_KEYBYTES <= sizeof k2); 41 k2); 49 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 51 crypto_core_hchacha20(k2, n, k, NULL); 53 c, m, mlen, n + crypto_core_hchacha20_INPUTBYTES, ic, k2);
|
/freebsd-current/contrib/jemalloc/include/jemalloc/internal/ |
H A D | hash.h | 145 uint32_t k2 = hash_get_block_32(blocks, i*4 + 1); local 154 k2 *= c2; k2 = hash_rotl_32(k2, 16); k2 *= c3; h2 ^= k2; 175 uint32_t k2 = 0; local 191 case 8: k2 ^= tail[ 7] << 24; JEMALLOC_FALLTHROUGH 192 case 7: k2 ^= tail[ 6] << 16; JEMALLOC_FALLTHROUGH 193 case 6: k2 243 uint64_t k2 = hash_get_block_64(blocks, i*2 + 1); local 261 uint64_t k2 = 0; local [all...] |
H A D | ckh.h | 97 bool ckh_string_keycomp(const void *k1, const void *k2); 99 bool ckh_pointer_keycomp(const void *k1, const void *k2);
|
/freebsd-current/contrib/telnet/libtelnet/ |
H A D | encrypt.h | 72 #define SAMEKEY(k1, k2) (!bcmp((void *)k1, (void *)k2, sizeof(Block)))
|
/freebsd-current/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.h | 69 #define SAMEKEY(k1, k2) (!memcmp(k1, k2, sizeof(des_cblock)))
|
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_aead/xchacha20poly1305/sodium/ |
H A D | aead_xchacha20poly1305.c | 28 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 32 crypto_core_hchacha20(k2, npub, k, NULL); 36 (c, mac, maclen_p, m, mlen, ad, adlen, nsec, npub2, k2); 37 sodium_memzero(k2, crypto_core_hchacha20_OUTPUTBYTES); 81 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 85 crypto_core_hchacha20(k2, npub, k, NULL); 89 (m, nsec, c, clen, mac, ad, adlen, npub2, k2); 90 sodium_memzero(k2, crypto_core_hchacha20_OUTPUTBYTES);
|
/freebsd-current/contrib/netbsd-tests/lib/libc/gen/ |
H A D | t_ftok.c | 65 key_t k1, k2, k3; local 76 k2 = ftok(hlnk, key); 80 ATF_REQUIRE(k2 != -1); 83 if (k1 != k2)
|
/freebsd-current/tests/sys/kqueue/libkqueue/ |
H A D | main.c | 240 _kevent_cmp(struct kevent *k1, struct kevent *k2, const char *file, int line) argument 250 k2->flags |= EV_ADD; 252 if (k1->ident != k2->ident || k1->filter != k2->filter || 253 k1->flags != k2->flags || k1->fflags != k2->fflags || 254 k1->data != k2->data || k1->udata != k2->udata || 255 k1->ext[0] != k2->ext[0] || k1->ext[1] != k2 [all...] |
/freebsd-current/contrib/unbound/util/storage/ |
H A D | dnstree.h | 212 int name_tree_compare(const void* k1, const void* k2); 215 int addr_tree_compare(const void* k1, const void* k2); 218 int addr_tree_addrport_compare(const void* k1, const void* k2);
|
H A D | dnstree.c | 47 int name_tree_compare(const void* k1, const void* k2) argument 50 struct name_tree_node* y = (struct name_tree_node*)k2; 60 int addr_tree_compare(const void* k1, const void* k2) argument 63 struct addr_tree_node* n2 = (struct addr_tree_node*)k2; 74 int addr_tree_addrport_compare(const void* k1, const void* k2) argument 77 struct addr_tree_node* n2 = (struct addr_tree_node*)k2;
|
/freebsd-current/sys/contrib/libsodium/test/default/ |
H A D | box_easy2.c | 21 unsigned char *k2; local 44 k2 = (unsigned char *) sodium_malloc(crypto_box_BEFORENMBYTES); 81 ret = crypto_box_beforenm(k2, small_order_p, alicesk); 86 ret = crypto_box_beforenm(k2, bobpk, alicesk); 99 k2) != 0) { 104 k2) == 0) { 130 nonce, k2) != 0) { 142 sodium_free(k2);
|
/freebsd-current/crypto/openssl/crypto/des/ |
H A D | ofb64ede.c | 25 DES_key_schedule *k1, DES_key_schedule *k2, 49 DES_encrypt3(ti, k1, k2, k3); 23 DES_ede3_ofb64_encrypt(register const unsigned char *in, register unsigned char *out, long length, DES_key_schedule *k1, DES_key_schedule *k2, DES_key_schedule *k3, DES_cblock *ivec, int *num) argument
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | des.h | 61 # define DES_ecb2_encrypt(i,o,k1,k2,e) \ 62 DES_ecb3_encrypt((i),(o),(k1),(k2),(k1),(e)) 64 # define DES_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \ 65 DES_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e)) 67 # define DES_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \ 68 DES_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e)) 70 # define DES_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \ 71 DES_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n))
|
/freebsd-current/tools/tools/kernxref/ |
H A D | kernxref.sh | 55 SORTORDER=-k2
|
/freebsd-current/lib/libc/db/btree/ |
H A D | bt_utils.c | 144 DBT k2; local 165 k2.data = bl->bytes; 166 k2.size = bl->ksize; 173 k2.data = bi->bytes; 174 k2.size = bi->ksize; 180 &k2.size, &t->bt_rdata.data, &t->bt_rdata.size)) 182 k2.data = t->bt_rdata.data; 184 return ((*t->bt_cmp)(k1, &k2));
|
/freebsd-current/sys/sys/ |
H A D | umtxvar.h | 193 umtx_key_match(const struct umtx_key *k1, const struct umtx_key *k2) argument 196 return (k1->type == k2->type && 197 k1->info.both.a == k2->info.both.a && 198 k1->info.both.b == k2->info.both.b);
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | aes-siv.c | 126 const u8 *k1, *k2; local 137 k2 = key + key_len; 158 return aes_ctr_encrypt(k2, key_len, v, crypt_pw, pwlen); 169 const u8 *k1, *k2; local 182 k2 = key + key_len; 197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len);
|
/freebsd-current/sys/contrib/ck/src/ |
H A D | ck_ht_hash.h | 251 uint32_t k2 = *data++; local 252 k2 *= m; k2 ^= k2 >> r; k2 *= m; 253 h2 *= m; h2 ^= k2;
|
/freebsd-current/crypto/openssl/crypto/cmac/ |
H A D | cmac.c | 26 /* Keys k1 and k2 */ 28 unsigned char k2[EVP_MAX_BLOCK_LENGTH]; member in struct:CMAC_CTX_st 74 OPENSSL_cleanse(ctx->k2, EVP_MAX_BLOCK_LENGTH); 104 memcpy(out->k2, in->k2, bl); 151 make_kn(ctx->k2, ctx->k1, bl); 228 out[i] = ctx->last_block[i] ^ ctx->k2[i];
|
/freebsd-current/sys/dev/qat/qat_api/common/crypto/sym/ |
H A D | lac_sym_hash_sw_precomputes.c | 249 k2[LAC_HASH_CMAC_BLOCK_SIZE]; local 279 /* Derived keys (k1 and k2), copy them to 305 k2[i] = (k1[i]) << 1; 307 k2[i - 1] |= 313 k2[i] ^= LAC_SYM_AES_CMAC_RB_128; 321 memcpy(ptr, k2, LAC_HASH_CMAC_BLOCK_SIZE);
|
/freebsd-current/contrib/unbound/validator/ |
H A D | val_sigcrypt.h | 327 int canonical_tree_compare(const void* k1, const void* k2); 334 * @param k2: rrset2 338 struct ub_packed_rrset_key* k1, struct ub_packed_rrset_key* k2);
|
/freebsd-current/contrib/bearssl/src/symcipher/ |
H A D | aes_x86ni.c | 51 expand_step128(__m128i k, __m128i k2) argument 56 k2 = _mm_shuffle_epi32(k2, 0xFF); 57 return _mm_xor_si128(k, k2);
|
/freebsd-current/contrib/unbound/daemon/ |
H A D | acl_list.h | 151 int acl_interface_compare(const void* k1, const void* k2);
|