/freebsd-10.3-release/contrib/wpa/src/crypto/ |
H A D | aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) argument 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[ 61 u32 *rk; local 152 u32 *rk = ctx; local [all...] |
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk 100 u32 *rk; local 117 u32 *rk = ctx; local [all...] |
H A D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) argument 784 rk[0] = GETU32(cipherKey ); 785 rk[1] = GETU32(cipherKey + 4); 786 rk[2] = GETU32(cipherKey + 8); 787 rk[3] = GETU32(cipherKey + 12); 791 temp = rk[3]; 792 rk[4] = rk[0] ^ TE421(temp) ^ TE432(temp) ^ 794 rk[5] = rk[ [all...] |
/freebsd-10.3-release/crypto/openssl/crypto/aes/ |
H A D | aes_core.c | 632 u32 *rk; local 641 rk = key->rd_key; 650 rk[0] = GETU32(userKey ); 651 rk[1] = GETU32(userKey + 4); 652 rk[2] = GETU32(userKey + 8); 653 rk[3] = GETU32(userKey + 12); 656 temp = rk[3]; 657 rk[4] = rk[0] ^ 663 rk[ 734 u32 *rk; local 786 const u32 *rk; local 978 const u32 *rk; local 1210 u32 *rk; local 1312 u32 *rk; local [all...] |
H A D | aes_x86core.c | 474 u32 *rk; local 483 rk = key->rd_key; 492 rk[0] = GETU32(userKey ); 493 rk[1] = GETU32(userKey + 4); 494 rk[2] = GETU32(userKey + 8); 495 rk[3] = GETU32(userKey + 12); 498 temp = rk[3]; 499 rk[4] = rk[0] ^ 505 rk[ 576 u32 *rk; local 658 const u32 *rk; local 872 const u32 *rk; local [all...] |
/freebsd-10.3-release/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 63 if(pkey->rk.dname) 64 free(pkey->rk.dname); 65 pkey->rk.dname = NULL; 75 size_t s = sizeof(struct ub_packed_rrset_key) + k->rk.dname_len; 103 if(key1->rk.type != key2->rk.type) { 104 if(key1->rk.type < key2->rk.type) 108 if(key1->rk.dname_len != key2->rk [all...] |
H A D | msgreply.c | 369 pk->rk.flags = pset->flags; 370 pk->rk.dname_len = pset->dname_len; 372 pk->rk.dname = (uint8_t*)regional_alloc( 374 else pk->rk.dname = 376 if(!pk->rk.dname) 379 dname_pkt_copy(pkt, pk->rk.dname, pset->dname); 381 pk->rk.type = htons(pset->type); 382 pk->rk.rrset_class = pset->rrset_class; 651 dk->rk = fk->rk; [all...] |
H A D | msgencode.c | 289 if((p = compress_tree_lookup(tree, key->rk.dname, 295 if(!write_compressed_dname(pkt, key->rk.dname, 303 if(sldns_buffer_remaining(pkt) < key->rk.dname_len+4+4+2) 305 sldns_buffer_write(pkt, key->rk.dname, 306 key->rk.dname_len); 310 if(!compress_tree_store(key->rk.dname, owner_labs, 352 uint16_t t = ntohs(key->rk.type); 455 if(!rrset_belongs_in_reply(s, ntohs(key->rk.type), qtype, dnssec)) 458 owner_labs = dname_count_labels(key->rk.dname); 470 sldns_buffer_write(pkt, &key->rk [all...] |
/freebsd-10.3-release/crypto/openssh/ |
H A D | rijndael.c | 630 rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) 635 rk[0] = GETU32(cipherKey ); 636 rk[1] = GETU32(cipherKey + 4); 637 rk[2] = GETU32(cipherKey + 8); 638 rk[3] = GETU32(cipherKey + 12); 641 temp = rk[3]; 642 rk[4] = rk[0] ^ 648 rk[5] = rk[ [all...] |
/freebsd-10.3-release/sys/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 735 int rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits) { 741 rk[0] = GETU32(cipherKey ); 742 rk[1] = GETU32(cipherKey + 4); 743 rk[2] = GETU32(cipherKey + 8); 744 rk[3] = GETU32(cipherKey + 12); 747 temp = rk[3]; 748 rk[4] = rk[0] ^ 754 rk[5] = rk[ [all...] |
H A D | rijndael-api-fst.h | 47 u_int32_t rk[4*(RIJNDAEL_MAXNR + 1)]; /* key schedule */ member in struct:__anon7706
|
H A D | rijndael-api-fst.c | 63 key->Nr = rijndaelKeySetupEnc(key->rk, cipherKey, keyLen); 65 key->Nr = rijndaelKeySetupDec(key->rk, cipherKey, keyLen); 104 rijndaelEncrypt(key->rk, key->Nr, input, outBuffer); 124 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 141 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 219 rijndaelEncrypt(key->rk, key->Nr, input, outBuffer); 229 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 239 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 253 rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); 282 rijndaelDecrypt(key->rk, ke [all...] |
/freebsd-10.3-release/contrib/unbound/iterator/ |
H A D | iter_resptype.c | 79 if(ntohs(s->rk.type) == request->qtype && 80 ntohs(s->rk.rrset_class) == request->qclass && 81 query_dname_compare(mname, s->rk.dname) == 0) { 87 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 88 query_dname_compare(mname, s->rk.dname) == 0) { 126 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME && 128 s->rk.dname) == 0) { 163 ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 164 ntohs(s->rk.rrset_class) == request->qclass && 165 dname_strict_subdomain_c(s->rk [all...] |
H A D | iter_utils.c | 668 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NS && 669 ntohs(s->rk.rrset_class) == dclass) { 670 int l = dname_count_labels(s->rk.dname); 672 dname_strict_subdomain(s->rk.dname, 709 if(k1->rk.dname_len != k2->rk.dname_len || 710 k1->rk.flags != k2->rk.flags || 711 k1->rk.type != k2->rk [all...] |
/freebsd-10.3-release/contrib/unbound/validator/ |
H A D | val_utils.c | 79 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 81 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_DS) 83 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS) 91 ntohs(rep->rrsets[0]->rk.type) == LDNS_RR_TYPE_NS && 92 query_dname_compare(rep->rrsets[0]->rk.dname, 119 ntohs(rep->rrsets[i]->rk.type) == qinf->qtype) 121 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_CNAME) 224 rep->rrsets[i]->rk.dname) == 0) { 239 if(ntohs(rep->rrsets[i]->rk.type) != LDNS_RR_TYPE_DNAME) 249 if(ntohs(rep->rrsets[i]->rk [all...] |
H A D | val_nsec.c | 153 log_assert(ntohs(nsec->rk.type) == LDNS_RR_TYPE_NSEC); 243 if(rep->rrsets[i]->rk.type != htons(LDNS_RR_TYPE_NSEC)) 254 if(wc && dname_is_wild(rep->rrsets[i]->rk.dname)) 290 if(query_dname_compare(nsec->rk.dname, qinfo->qname) != 0) { 304 dname_canonical_compare(nsec->rk.dname, 316 if(dname_is_wild(nsec->rk.dname)) { 318 uint8_t* ce = nsec->rk.dname; 319 size_t ce_len = nsec->rk.dname_len; 346 while (dname_strict_subdomain_c(nm, nsec->rk.dname)) { 403 uint8_t* owner = nsec->rk [all...] |
H A D | validator.c | 473 if(dname_seen && ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) { 490 "has failed ANSWER rrset:", s->rk.dname, 491 ntohs(s->rk.type), ntohs(s->rk.rrset_class)); 493 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) 495 else if(ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME) 505 ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME) { 519 "has failed AUTHORITY rrset:", s->rk.dname, 520 ntohs(s->rk.type), ntohs(s->rk [all...] |
H A D | val_neg.c | 329 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 330 d = rep->rrsets[i]->rk.dname; 331 len = rep->rrsets[i]->rk.dname_len; 569 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 583 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 686 if(ntohs(nsec->rk.type) == LDNS_RR_TYPE_NSEC) { 753 uint8_t* nm = nsec->rk.dname; 754 size_t nm_len = nsec->rk.dname_len; 755 int labs = dname_count_labels(nsec->rk.dname); 762 nsec->rk [all...] |
H A D | val_sigcrypt.c | 302 sldns_buffer_write(b, dnskey_rrset->rk.dname, 303 dnskey_rrset->rk.dname_len); 792 uint16_t type = ntohs(rrset->rk.type); 916 int fqdn_labels = dname_signame_label_count(k->rk.dname); 920 sldns_buffer_write(buf, k->rk.dname, k->rk.dname_len); 922 *can_owner_len = k->rk.dname_len; 929 uint8_t* nm = k->rk.dname; 930 size_t len = k->rk.dname_len; 953 switch(ntohs(rrset->rk [all...] |
/freebsd-10.3-release/sys/kern/ |
H A D | kern_procctl.c | 235 reap_kill(struct thread *td, struct proc *p, struct procctl_reaper_kill *rk) argument 244 if (rk->rk_sig <= 0 || rk->rk_sig > _SIG_MAXSIG) 246 if ((rk->rk_flags & ~REAPER_KILL_CHILDREN) != 0) 251 ksi.ksi_signo = rk->rk_sig; 256 rk->rk_killed = 0; 257 rk->rk_fpid = -1; 258 for (p2 = (rk->rk_flags & REAPER_KILL_CHILDREN) != 0 ? 261 p2 = (rk->rk_flags & REAPER_KILL_CHILDREN) != 0 ? 263 if ((rk 355 struct procctl_reaper_kill rk; member in union:__anon10818 [all...] |
/freebsd-10.3-release/contrib/unbound/services/cache/ |
H A D | rrset.c | 190 uint16_t rrset_type = ntohs(k->rk.type); 193 log_assert(k->rk.dname != NULL); 250 key.rk.dname = qname; 251 key.rk.dname_len = qnamelen; 252 key.rk.type = htons(qtype); 253 key.rk.rrset_class = htons(qclass); 254 key.rk.flags = flags; 256 key.entry.hash = rrset_key_hash(&key.rk); 341 rrset->entry.hash = rrset_key_hash(&rrset->rk); 358 if(ntohs(rrset->rk [all...] |
H A D | dns.c | 81 env->alloc, now + ((ntohs(rep->ref[i].key->rk.type)== 421 if(!dp || !delegpt_set_name(dp, region, nskey->rk.dname)) { 506 if(r->an_numrrsets > 0 && (r->rrsets[0]->rk.type == htons( 507 LDNS_RR_TYPE_CNAME) || r->rrsets[0]->rk.type == htons( 597 newlen = q->qname_len + dtarglen - rrset->rk.dname_len; 607 memcpy(newname, q->qname, q->qname_len-rrset->rk.dname_len); 608 memmove(newname+(q->qname_len-rrset->rk.dname_len), dtarg, dtarglen); 617 ck->rk.type = htons(LDNS_RR_TYPE_CNAME); 618 ck->rk.rrset_class = rrset->rk [all...] |
/freebsd-10.3-release/contrib/unbound/daemon/ |
H A D | cachedump.c | 86 (k->rk.flags & PACKED_RRSET_NSEC_AT_APEX)?" nsec_apex":"", 142 nm = sldns_wire2str_dname(k->rk.dname, k->rk.dname_len); 143 tp = sldns_wire2str_type(ntohs(k->rk.type)); 144 cl = sldns_wire2str_class(ntohs(k->rk.rrset_class)); 151 if(!ssl_printf(ssl, "%s %s %s %d\n", nm, cl, tp, (int)k->rk.flags)) { 321 struct ub_packed_rrset_key* rk, struct packed_rrset_data* d, 363 rk->rk.type = htons(sldns_wirerr_get_type(rr, rr_len, dname_len)); 364 rk 320 load_rr(SSL* ssl, sldns_buffer* buf, struct regional* region, struct ub_packed_rrset_key* rk, struct packed_rrset_data* d, unsigned int i, int is_rrsig, int* go_on, time_t now) argument 441 struct ub_packed_rrset_key* rk; local [all...] |
/freebsd-10.3-release/contrib/unbound/dns64/ |
H A D | dns64.c | 647 dk->rk.dname = (uint8_t*)regional_alloc_init(region, 648 fk->rk.dname, fk->rk.dname_len); 650 if(!dk->rk.dname) { 656 dk->rk.type = htons(LDNS_RR_TYPE_AAAA); 659 dk->entry.hash = rrset_key_hash(&dk->rk); 718 dk->rk = fk->rk; 721 if(i<rep->an_numrrsets && fk->rk.type == htons(LDNS_RR_TYPE_A)) { 728 rrset_cache_remove(super->env->rrset_cache, dk->rk [all...] |
/freebsd-10.3-release/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 506 eor $s0,$s0,$t2 @ rk[4]=rk[0]^... 507 eor $s1,$s1,$s0 @ rk[5]=rk[1]^rk[4] 509 eor $s2,$s2,$s1 @ rk[6]=rk[2]^rk[5] 511 eor $s3,$s3,$s2 @ rk[7]=rk[ [all...] |