/freebsd-current/crypto/openssl/crypto/des/ |
H A D | str2key.c | 46 void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2) argument 52 memset(key2, 0, 8); 61 (*key2)[i % 8] ^= (j << 1); 69 (*key2)[7 - (i % 8)] ^= j; 73 memcpy(key2, key1, 8); 75 DES_set_odd_parity(key2); 78 DES_set_key_unchecked(key2, &ks); 79 DES_cbc_cksum((const unsigned char *)str, key2, length, &ks, key2); 82 DES_set_odd_parity(key2); [all...] |
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_xts.h | 22 const AES_KEY *key1, const AES_KEY *key2,
|
H A D | cipher_aes_xts.c | 144 if (in->xts.key2 != NULL) { 145 if (in->xts.key2 != &in->ks2) 164 || ctx->xts.key2 == NULL 183 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv);
|
H A D | cipher_aes_xts_hw.c | 34 xctx->xts.key2 = &xctx->ks2; \ 97 dctx->xts.key2 = &dctx->ks2.ks;
|
/freebsd-current/sys/contrib/libsodium/test/default/ |
H A D | auth.c | 10 static unsigned char key2[] = variable 46 crypto_auth_hmacsha512_init(&st, key2, sizeof key2); 57 crypto_auth_hmacsha256_init(&st256, key2, sizeof key2);
|
H A D | aead_xchacha20poly1305.c | 32 unsigned char *key2 = (unsigned char *) sodium_malloc(crypto_aead_xchacha20poly1305_ietf_KEYBYTES); local 165 crypto_aead_xchacha20poly1305_ietf_keygen(key2); 167 NULL, 0U, nonce, key2) == 0) { 173 sodium_free(key2);
|
/freebsd-current/contrib/jemalloc/include/jemalloc/internal/ |
H A D | mutex_pool.h | 58 uintptr_t key2) { 62 malloc_mutex_t *mutex2 = mutex_pool_mutex(pool, key2); 76 uintptr_t key2) { 78 malloc_mutex_t *mutex2 = mutex_pool_mutex(pool, key2); 57 mutex_pool_lock2(tsdn_t *tsdn, mutex_pool_t *pool, uintptr_t key1, uintptr_t key2) argument 75 mutex_pool_unlock2(tsdn_t *tsdn, mutex_pool_t *pool, uintptr_t key1, uintptr_t key2) argument
|
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | aes_platform.h | 41 const AES_KEY *key2, const unsigned char iv[16]); 44 const AES_KEY *key2, const unsigned char iv[16]); 55 const AES_KEY *key1, const AES_KEY *key2, 58 const AES_KEY *key1, const AES_KEY *key2, 196 const AES_KEY *key1, const AES_KEY *key2, 202 const AES_KEY *key1, const AES_KEY *key2, 293 const AES_KEY *key2, const unsigned char *ivec); 296 const AES_KEY *key2, const unsigned char *ivec); 299 const AES_KEY *key2, const unsigned char *ivec); 302 const AES_KEY *key2, cons [all...] |
/freebsd-current/lib/libc/iconv/ |
H A D | citrus_pivot_factory.c | 109 char key1[LINE_MAX], key2[LINE_MAX], data[LINE_MAX]; local 130 /* key2 */ 137 snprintf(key2, sizeof(key2), "%.*s", (int)(p - line), line); 152 return (_db_factory_add32_by_s(se->se_df, key2, val));
|
/freebsd-current/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 98 struct ub_packed_rrset_key* key2 = (struct ub_packed_rrset_key*)k2; local 100 if(key1 == key2) 102 if(key1->rk.type != key2->rk.type) { 103 if(key1->rk.type < key2->rk.type) 107 if(key1->rk.dname_len != key2->rk.dname_len) { 108 if(key1->rk.dname_len < key2->rk.dname_len) 112 if((c=query_dname_compare(key1->rk.dname, key2->rk.dname)) != 0) 114 if(key1->rk.rrset_class != key2->rk.rrset_class) { 115 if(key1->rk.rrset_class < key2->rk.rrset_class) 119 if(key1->rk.flags != key2 [all...] |
/freebsd-current/crypto/openssl/test/ |
H A D | igetest.c | 82 const unsigned char key2[32]; member in struct:bi_ige_test 95 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f}, /* key2 */ 120 0x67, 0x7b, 0x58, 0xa8, 0x18, 0xf9, 0x72, 0xe4}, /* key2 */ 195 AES_KEY key2; local 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); 209 AES_bi_ige_encrypt(v->in, buf, v->length, &key1, &key2, v->iv, 214 test_output_memory("key 2", v->key2, sizeo 329 AES_KEY key, key2; local 350 AES_KEY key, key2; local 381 AES_KEY key, key2; local 412 AES_KEY key, key2; local [all...] |
/freebsd-current/sys/dev/ath/ath_hal/ar5211/ |
H A D | ar5211_keycache.c | 119 uint32_t key0, key1, key2, key3, key4; local 158 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; 172 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
|
/freebsd-current/sys/dev/ath/ath_hal/ar5210/ |
H A D | ar5210_keycache.c | 112 uint32_t key0, key1, key2, key3, key4; local 137 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; 151 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
|
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/ |
H A D | mac_legacy_kmgmt.c | 160 const MAC_KEY *key2 = keydata2; local 167 if ((key1->priv_key == NULL && key2->priv_key != NULL) 168 || (key1->priv_key != NULL && key2->priv_key == NULL) 169 || key1->priv_key_len != key2->priv_key_len 170 || (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL) 171 || (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL)) 174 ok = ok && (key1->priv_key == NULL /* implies key2->privkey == NULL */ 175 || CRYPTO_memcmp(key1->priv_key, key2->priv_key, 179 EVP_CIPHER_get0_name(key2->cipher.cipher));
|
/freebsd-current/sys/dev/ath/ath_hal/ar5212/ |
H A D | ar5212_keycache.c | 160 uint32_t key0, key1, key2, key3, key4; local 217 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; 240 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); 293 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
|
/freebsd-current/sys/opencrypto/ |
H A D | xform_enc.h | 115 rijndael_ctx key2; member in struct:aes_xts_ctx
|
H A D | xform_aes_xts.c | 103 rijndael_encrypt(&ctx->key2, ctx->tweak, ctx->tweak); 178 rijndael_set_key(&ctx->key2, key + (len / 2), len * 4);
|
/freebsd-current/sys/compat/linux/ |
H A D | linux_futex.c | 630 struct umtx_key key, key2; local 640 error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2); 656 umtxq_lock(&key2); 657 count = umtxq_count(&key2); 659 ret += umtxq_signal_mask(&key2, nrwake, args->val3); 662 umtxq_unlock(&key2); 667 umtx_key_release(&key2); 676 struct umtx_key key, key2; local 699 error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2); 715 umtxq_lock(&key2); [all...] |
/freebsd-current/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_keycache.c | 194 u_int32_t key0, key1, key2, key3, key4; local 259 key2 = LE_READ_4(k->kv_val + 6) ^ xor_mask; 299 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); 365 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); 450 u_int32_t key0, key1, key2, key3, key4; local 509 key2 = LE_READ_4(k->kv_val + 6) ^ xorMask; 533 (OS_REG_READ(ah, AR_KEYTABLE_KEY2(entry)) == key2) && 582 (OS_REG_READ(ah, AR_KEYTABLE_KEY2(entry)) == key2) &&
|
/freebsd-current/contrib/unbound/services/ |
H A D | outside_network.h | 842 int pending_cmp(const void* key1, const void* key2); 845 int serviced_cmp(const void* key1, const void* key2); 848 int reuse_cmp(const void* key1, const void* key2); 851 int reuse_id_cmp(const void* key1, const void* key2);
|
/freebsd-current/contrib/unbound/edns-subnet/ |
H A D | addrtree.h | 185 const addrkey_t *key2, addrlen_t n);
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | aes.h | 94 size_t length, const AES_KEY *key, const AES_KEY *key2,
|
/freebsd-current/crypto/openssh/ |
H A D | hmac.c | 177 u_char *key2 = "Jefe"; local 192 hmac_test(key2, strlen(key2), data2, strlen(data2), dig2, sizeof(dig2));
|
/freebsd-current/contrib/unbound/services/cache/ |
H A D | infra.h | 461 int infra_compfunc(void* key1, void* key2); 473 int rate_compfunc(void* key1, void* key2); 485 int ip_rate_compfunc(void* key1, void* key2);
|
/freebsd-current/contrib/dialog/ |
H A D | rangebox.c | 302 int key2; local 318 if ((key2 = dlg_char_to_button(key, buttons)) >= 0) { 319 result = key2;
|