| /freebsd/sys/security/mac/ |
| H A D | mac_posix_sem.c | 67 mac_posixsem_init(struct ksem *ks) in mac_posixsem_init() argument 71 ks->ks_label = mac_posixsem_label_alloc(); in mac_posixsem_init() 73 ks->ks_label = NULL; in mac_posixsem_init() 85 mac_posixsem_destroy(struct ksem *ks) in mac_posixsem_destroy() argument 88 if (ks->ks_label != NULL) { in mac_posixsem_destroy() 89 mac_posixsem_label_free(ks->ks_label); in mac_posixsem_destroy() 90 ks->ks_label = NULL; in mac_posixsem_destroy() 95 mac_posixsem_create(struct ucred *cred, struct ksem *ks) in mac_posixsem_create() argument 98 MAC_POLICY_PERFORM_NOSLEEP(posixsem_create, cred, ks, ks->ks_label); in mac_posixsem_create() 105 mac_posixsem_check_open(struct ucred *cred, struct ksem *ks) in mac_posixsem_check_open() argument [all …]
|
| /freebsd/sys/crypto/skein/ |
| H A D | skein_block.c | 40 #define ks (kw + KW_KEY_BASE) macro 95 ks[0] = ctx->X[0]; in Skein_256_Process_Block() 96 ks[1] = ctx->X[1]; in Skein_256_Process_Block() 97 ks[2] = ctx->X[2]; in Skein_256_Process_Block() 98 ks[3] = ctx->X[3]; in Skein_256_Process_Block() 99 ks[4] = ks[0] ^ ks[1] ^ ks[2] ^ ks[3] ^ SKEIN_KS_PARITY; in Skein_256_Process_Block() 105 Skein_Show_Block(BLK_BITS,&ctx->h,ctx->X,blkPtr,w,ks,ts); in Skein_256_Process_Block() 107 X0 = w[0] + ks[0]; /* do the first full key injection */ in Skein_256_Process_Block() 108 X1 = w[1] + ks[1] + ts[0]; in Skein_256_Process_Block() 109 X2 = w[2] + ks[2] + ts[1]; in Skein_256_Process_Block() [all …]
|
| /freebsd/sys/contrib/openzfs/module/icp/algs/skein/ |
| H A D | skein_block.c | 55 #define ks (kw + KW_KEY_BASE) macro 111 ks[0] = ctx->X[0]; in Skein_256_Process_Block() 112 ks[1] = ctx->X[1]; in Skein_256_Process_Block() 113 ks[2] = ctx->X[2]; in Skein_256_Process_Block() 114 ks[3] = ctx->X[3]; in Skein_256_Process_Block() 115 ks[4] = ks[0] ^ ks[1] ^ ks[2] ^ ks[3] ^ SKEIN_KS_PARITY; in Skein_256_Process_Block() 122 Skein_Show_Block(BLK_BITS, &ctx->h, ctx->X, blkPtr, w, ks, ts); in Skein_256_Process_Block() 124 X0 = w[0] + ks[0]; /* do the first full key injection */ in Skein_256_Process_Block() 125 X1 = w[1] + ks[1] + ts[0]; in Skein_256_Process_Block() 126 X2 = w[2] + ks[2] + ts[1]; in Skein_256_Process_Block() [all …]
|
| /freebsd/sys/kern/ |
| H A D | uipc_sem.c | 119 static int ksem_access(struct ksem *ks, struct ucred *ucred); 125 static void ksem_drop(struct ksem *ks); 128 static struct ksem *ksem_hold(struct ksem *ks); 129 static void ksem_insert(char *path, Fnv32_t fnv, struct ksem *ks); 165 struct ksem *ks; in ksem_stat() local 170 ks = fp->f_data; in ksem_stat() 173 error = mac_posixsem_check_stat(active_cred, fp->f_cred, ks); in ksem_stat() 185 sb->st_atim = ks->ks_atime; in ksem_stat() 186 sb->st_ctim = ks->ks_ctime; in ksem_stat() 187 sb->st_mtim = ks->ks_mtime; in ksem_stat() [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/aes/ |
| H A D | aeskey.c | 95 cx->ks[0] = ss[0] = word_in(key, 0); in aes_xi() 96 cx->ks[1] = ss[1] = word_in(key, 1); in aes_xi() 97 cx->ks[2] = ss[2] = word_in(key, 2); in aes_xi() 98 cx->ks[3] = ss[3] = word_in(key, 3); in aes_xi() 101 ke4(cx->ks, 0); ke4(cx->ks, 1); in aes_xi() 102 ke4(cx->ks, 2); ke4(cx->ks, 3); in aes_xi() 103 ke4(cx->ks, 4); ke4(cx->ks, 5); in aes_xi() 104 ke4(cx->ks, 6); ke4(cx->ks, 7); in aes_xi() 105 ke4(cx->ks, 8); in aes_xi() 109 ke4(cx->ks, i); in aes_xi() [all …]
|
| /freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
| H A D | hcrypto_des.3 | 19 .RI "int HC_DEPRECATED \fBDES_set_key\fP (DES_cblock *key, DES_key_schedule *ks)" 22 .RI "int \fBDES_set_key_unchecked\fP (DES_cblock *key, DES_key_schedule *ks)" 25 .RI "int \fBDES_set_key_checked\fP (DES_cblock *key, DES_key_schedule *ks)" 28 .RI "int \fBDES_key_sched\fP (DES_cblock *key, DES_key_schedule *ks)" 31 .RI "void \fBDES_encrypt\fP (uint32_t u[2], DES_key_schedule *ks, int encp)" 34 .RI "void \fBDES_ecb_encrypt\fP (DES_cblock *input, DES_cblock *output, DES_key_schedule *ks, int e… 37 .RI "void \fBDES_cbc_encrypt\fP (const void *in, void *out, long length, DES_key_schedule *ks, DES_… 40 .RI "void \fBDES_pcbc_encrypt\fP (const void *in, void *out, long length, DES_key_schedule *ks, DES… 49 .RI "void \fBDES_cfb64_encrypt\fP (const void *in, void *out, long length, DES_key_schedule *ks, DE… 52 …c_cksum\fP (const void *in, DES_cblock *output, long length, DES_key_schedule *ks, DES_cblock *iv)" [all …]
|
| /freebsd/sys/kgssapi/krb5/ |
| H A D | kcrypto.h | 61 typedef void init_func(struct krb5_key_state *ks); 62 typedef void destroy_func(struct krb5_key_state *ks); 63 typedef void set_key_func(struct krb5_key_state *ks, const void *in); 64 typedef void random_to_key_func(struct krb5_key_state *ks, const void *in); 65 typedef void encrypt_func(const struct krb5_key_state *ks, 67 typedef void checksum_func(const struct krb5_key_state *ks, int usage, 100 krb5_set_key(struct krb5_key_state *ks, const void *keydata) in krb5_set_key() argument 103 ks->ks_class->ec_set_key(ks, keydata); in krb5_set_key() 107 krb5_random_to_key(struct krb5_key_state *ks, const void *keydata) in krb5_random_to_key() argument 110 ks->ks_class->ec_random_to_key(ks, keydata); in krb5_random_to_key() [all …]
|
| H A D | kcrypto_aes.c | 50 aes_init(struct krb5_key_state *ks) in aes_init() argument 56 ks->ks_priv = as; in aes_init() 60 aes_destroy(struct krb5_key_state *ks) in aes_destroy() argument 62 struct aes_state *as = ks->ks_priv; in aes_destroy() 69 free(ks->ks_priv, M_GSSAPI); in aes_destroy() 73 aes_set_key(struct krb5_key_state *ks, const void *in) in aes_set_key() argument 75 void *kp = ks->ks_key; in aes_set_key() 76 struct aes_state *as = ks->ks_priv; in aes_set_key() 80 bcopy(in, kp, ks->ks_class->ec_keylen); in aes_set_key() 93 csp.csp_auth_klen = ks->ks_class->ec_keybits / 8; in aes_set_key() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_aes_gcm_hw_rv64i.inc | 22 AES_KEY *ks = &actx->ks.ks; 23 GCM_HW_SET_KEY_CTR_FN(ks, rv64i_zkne_set_encrypt_key, rv64i_zkne_encrypt, 44 AES_KEY *ks = &actx->ks.ks; 51 GCM_HW_SET_KEY_CTR_FN(ks, rv64i_zvkned_set_encrypt_key, 54 GCM_HW_SET_KEY_CTR_FN(ks, AES_set_encrypt_key, 77 AES_KEY *ks = &actx->ks.ks; 84 GCM_HW_SET_KEY_CTR_FN(ks, rv64i_zvkned_set_encrypt_key, 88 GCM_HW_SET_KEY_CTR_FN(ks, AES_set_encrypt_key,
|
| H A D | cipher_aes_hw_rv32i.inc | 36 AES_KEY *ks = &adat->ks.ks; 38 dat->ks = ks; 42 ret = rv32i_zknd_zkne_set_decrypt_key(key, keylen * 8, ks); 46 ret = rv32i_zkne_set_encrypt_key(key, keylen * 8, ks); 64 AES_KEY *ks = &adat->ks.ks; 66 dat->ks = ks; 70 ret = rv32i_zbkb_zknd_zkne_set_decrypt_key(key, keylen * 8, ks); 74 ret = rv32i_zbkb_zkne_set_encrypt_key(key, keylen * 8, ks);
|
| H A D | cipher_aes_hw_rv64i.inc | 28 AES_KEY *ks = &adat->ks.ks; 30 dat->ks = ks; 34 ret = rv64i_zknd_set_decrypt_key(key, keylen * 8, ks); 38 ret = rv64i_zkne_set_encrypt_key(key, keylen * 8, ks); 70 AES_KEY *ks = &adat->ks.ks; 72 dat->ks = ks; 81 ret = rv64i_zvkned_set_encrypt_key(key, keylen * 8, ks); 83 ret = AES_set_encrypt_key(key, keylen * 8, ks);
|
| H A D | cipher_aes_hw_aesni.inc | 26 AES_KEY *ks = &adat->ks.ks; 28 dat->ks = ks; 32 ret = aesni_set_decrypt_key(key, keylen * 8, ks); 37 ret = aesni_set_encrypt_key(key, keylen * 8, ks); 58 const AES_KEY *ks = ctx->ks; 60 aesni_cbc_encrypt(in, out, len, ks, ctx->iv, ctx->enc); 71 aesni_ecb_encrypt(in, out, len, ctx->ks, ctx->enc);
|
| H A D | cipher_sm4_gcm_hw.c | 17 # define SM4_GCM_HW_SET_KEY_CTR_FN(ks, fn_set_enc_key, fn_block, fn_ctr) \ argument 18 fn_set_enc_key(key, ks); \ 19 CRYPTO_gcm128_init(&ctx->gcm, ks, (block128_f)fn_block); \ 27 SM4_KEY *ks = &actx->ks.ks; in sm4_gcm_initkey() local 32 SM4_GCM_HW_SET_KEY_CTR_FN(ks, HWSM4_set_encrypt_key, HWSM4_encrypt, in sm4_gcm_initkey() 35 SM4_GCM_HW_SET_KEY_CTR_FN(ks, HWSM4_set_encrypt_key, HWSM4_encrypt, NULL); in sm4_gcm_initkey() 42 SM4_GCM_HW_SET_KEY_CTR_FN(ks, vpsm4_ex_set_encrypt_key, vpsm4_ex_encrypt, in sm4_gcm_initkey() 49 SM4_GCM_HW_SET_KEY_CTR_FN(ks, vpsm4_set_encrypt_key, vpsm4_encrypt, in sm4_gcm_initkey() 54 SM4_GCM_HW_SET_KEY_CTR_FN(ks, ossl_sm4_set_key, ossl_sm4_encrypt, NULL); in sm4_gcm_initkey()
|
| H A D | cipher_sm4_hw.c | 16 SM4_KEY *ks = &sctx->ks.ks; in cipher_hw_sm4_initkey() local 18 ctx->ks = ks; in cipher_hw_sm4_initkey() 24 HWSM4_set_encrypt_key(key, ks); in cipher_hw_sm4_initkey() 47 vpsm4_ex_set_encrypt_key(key, ks); in cipher_hw_sm4_initkey() 60 vpsm4_set_encrypt_key(key, ks); in cipher_hw_sm4_initkey() 72 ossl_sm4_set_key(key, ks); in cipher_hw_sm4_initkey() 78 HWSM4_set_decrypt_key(key, ks); in cipher_hw_sm4_initkey() 93 vpsm4_ex_set_decrypt_key(key, ks); in cipher_hw_sm4_initkey() 104 vpsm4_set_decrypt_key(key, ks); in cipher_hw_sm4_initkey() 114 ossl_sm4_set_key(key, ks); in cipher_hw_sm4_initkey()
|
| H A D | cipher_aes_hw.c | 24 AES_KEY *ks = &adat->ks.ks; in cipher_hw_aes_initkey() local 26 dat->ks = ks; in cipher_hw_aes_initkey() 32 ret = HWAES_set_decrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey() 47 ret = AES_set_decrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey() 54 ret = vpaes_set_decrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey() 61 ret = AES_set_decrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey() 69 ret = HWAES_set_encrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey() 92 ret = AES_set_encrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey() 99 ret = vpaes_set_encrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey() 106 ret = AES_set_encrypt_key(key, keylen * 8, ks); in cipher_hw_aes_initkey()
|
| H A D | cipher_aes_gcm_hw_rv32i.inc | 19 AES_KEY *ks = &actx->ks.ks; 21 GCM_HW_SET_KEY_CTR_FN(ks, rv32i_zkne_set_encrypt_key, rv32i_zkne_encrypt, 31 AES_KEY *ks = &actx->ks.ks; 33 GCM_HW_SET_KEY_CTR_FN(ks, rv32i_zbkb_zkne_set_encrypt_key, rv32i_zkne_encrypt,
|
| H A D | ciphercommon_hw.c | 20 (*dat->stream.cbc) (in, out, len, dat->ks, dat->iv, dat->enc); in ossl_cipher_hw_generic_cbc() 22 CRYPTO_cbc128_encrypt(in, out, len, dat->ks, dat->iv, dat->block); in ossl_cipher_hw_generic_cbc() 24 CRYPTO_cbc128_decrypt(in, out, len, dat->ks, dat->iv, dat->block); in ossl_cipher_hw_generic_cbc() 38 (*dat->stream.ecb) (in, out, len, dat->ks, dat->enc); in ossl_cipher_hw_generic_ecb() 42 (*dat->block) (in + i, out + i, dat->ks); in ossl_cipher_hw_generic_ecb() 53 CRYPTO_ofb128_encrypt(in, out, len, dat->ks, dat->iv, &num, dat->block); in ossl_cipher_hw_generic_ofb128() 64 CRYPTO_cfb128_encrypt(in, out, len, dat->ks, dat->iv, &num, dat->enc, in ossl_cipher_hw_generic_cfb128() 76 CRYPTO_cfb128_8_encrypt(in, out, len, dat->ks, dat->iv, &num, dat->enc, in ossl_cipher_hw_generic_cfb8() 89 CRYPTO_cfb128_1_encrypt(in, out, len, dat->ks, dat->iv, &num, in ossl_cipher_hw_generic_cfb1() 96 CRYPTO_cfb128_1_encrypt(in, out, MAXBITCHUNK * 8, dat->ks, in ossl_cipher_hw_generic_cfb1() [all …]
|
| H A D | cipher_aes_ccm.h | 20 * Padding is chosen so that s390x.kmac.k overlaps with ks.ks and 21 * fc with ks.ks.rounds. Remember that on s390x, an AES_KEY's 27 AES_KEY ks; member 28 } ks; member 42 unsigned int fc; /* fc has same offset as ks.ks.rounds */
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | e_sm4.c | 26 SM4_KEY ks; member 27 } ks; member 67 HWSM4_set_decrypt_key(key, &dat->ks.ks); in sm4_init_key() 82 vpsm4_set_decrypt_key(key, &dat->ks.ks); in sm4_init_key() 98 HWSM4_set_encrypt_key(key, &dat->ks.ks); in sm4_init_key() 121 vpsm4_set_encrypt_key(key, &dat->ks.ks); in sm4_init_key() 145 (*dat->stream.cbc) (in, out, len, &dat->ks.ks, ctx->iv, in sm4_cbc_cipher() 148 CRYPTO_cbc128_encrypt(in, out, len, &dat->ks, ctx->iv, in sm4_cbc_cipher() 151 CRYPTO_cbc128_decrypt(in, out, len, &dat->ks, in sm4_cbc_cipher() 162 CRYPTO_cfb128_encrypt(in, out, len, &dat->ks, in sm4_cfb_cipher() [all …]
|
| /freebsd/contrib/llvm-project/openmp/runtime/src/ |
| H A D | kmp_debug.h | 114 int ks; \ 115 __kmp_disable(&ks); \ 117 __kmp_enable(ks); \ 121 int ks; \ 122 __kmp_disable(&ks); \ 124 __kmp_enable(ks); \ 128 int ks; \ 129 __kmp_disable(&ks); \ 131 __kmp_enable(ks); \ 135 int ks; \ [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | destest.c | 320 DES_key_schedule ks; in test_des_ecb() local 324 DES_set_key_unchecked(&key_data[i], &ks); in test_des_ecb() 328 DES_ecb_encrypt(&in, &out, &ks, DES_ENCRYPT); in test_des_ecb() 329 DES_ecb_encrypt(&out, &outin, &ks, DES_DECRYPT); in test_des_ecb() 347 DES_key_schedule ks, ks2, ks3; in test_des_ede_ecb() local 350 DES_set_key_unchecked(&key_data[i], &ks); in test_des_ede_ecb() 356 DES_ecb3_encrypt(&in, &out, &ks, &ks2, &ks, DES_ENCRYPT); in test_des_ede_ecb() 357 DES_ecb3_encrypt(&out, &outin, &ks, &ks2, &ks, DES_DECRYPT); in test_des_ede_ecb() 377 DES_key_schedule ks; in test_des_cbc() local 380 if (!TEST_int_eq(DES_set_key_checked(&cbc_key, &ks), 0)) in test_des_cbc() [all …]
|
| /freebsd/crypto/openssl/crypto/des/ |
| H A D | str2key.c | 21 DES_key_schedule ks; in DES_string_to_key() local 40 DES_set_key_unchecked(key, &ks); in DES_string_to_key() 41 DES_cbc_cksum((const unsigned char *)str, key, length, &ks, key); in DES_string_to_key() 42 OPENSSL_cleanse(&ks, sizeof(ks)); in DES_string_to_key() 48 DES_key_schedule ks; in DES_string_to_2keys() local 76 DES_set_key_unchecked(key1, &ks); in DES_string_to_2keys() 77 DES_cbc_cksum((const unsigned char *)str, key1, length, &ks, key1); in DES_string_to_2keys() 78 DES_set_key_unchecked(key2, &ks); in DES_string_to_2keys() 79 DES_cbc_cksum((const unsigned char *)str, key2, length, &ks, key2); in DES_string_to_2keys() 80 OPENSSL_cleanse(&ks, sizeof(ks)); in DES_string_to_2keys()
|
| /freebsd/contrib/netbsd-tests/lib/libdes/ |
| H A D | t_des.c | 387 des_key_schedule ks; in cfb_test() local 389 des_set_key_checked(&cfb_key, ks); in cfb_test() 391 des_cfb_encrypt(plain, cfb_buf1, bits, sizeof(plain), ks, &cfb_tmp, in cfb_test() 396 des_cfb_encrypt(cfb_buf1, cfb_buf2, bits, sizeof(plain), ks, &cfb_tmp, in cfb_test() 408 des_key_schedule ks; in cfb64_test() local 410 des_set_key_checked(&cfb_key, ks); in cfb64_test() 413 des_cfb64_encrypt(plain, cfb_buf1, 12, ks, &cfb_tmp, &n, DES_ENCRYPT); in cfb64_test() 414 des_cfb64_encrypt(&(plain[12]), &(cfb_buf1[12]), sizeof(plain) - 12, ks, in cfb64_test() 420 des_cfb64_encrypt(cfb_buf1, cfb_buf2, 17, ks, &cfb_tmp, &n, DES_DECRYPT); in cfb64_test() 422 sizeof(plain) - 17, ks, &cfb_tmp, &n, DES_DECRYPT); in cfb64_test() [all …]
|
| /freebsd/sys/vm/ |
| H A D | vm_glue.c | 282 static vm_pindex_t vm_kstack_pindex(vm_offset_t ks, int npages); 451 vm_offset_t ks; in vm_thread_stack_create() local 460 ks = vm_thread_alloc_kstack_kva(ptoa(pages + KSTACK_GUARD_PAGES), in vm_thread_stack_create() 462 if (ks == 0) in vm_thread_stack_create() 464 ks += ptoa(KSTACK_GUARD_PAGES); in vm_thread_stack_create() 469 if (vm_thread_stack_back(ks, ma, pages, req, domain) != 0) { in vm_thread_stack_create() 470 vm_thread_free_kstack_kva(ks - ptoa(KSTACK_GUARD_PAGES), in vm_thread_stack_create() 475 pmap_qremove(ks - ptoa(KSTACK_GUARD_PAGES), in vm_thread_stack_create() 480 pmap_qenter(ks, ma, pages); in vm_thread_stack_create() 481 return (ks); in vm_thread_stack_create() [all …]
|
| /freebsd/share/i18n/csmapper/KS/ |
| H A D | mapper.dir.KS.src | 1 # $NetBSD: mapper.dir.KS.src,v 1.2 2006/10/18 17:54:55 tnozaki Exp $ 3 JOHAB/UCS mapper_std KS/JOHAB%UCS.mps 4 KSC5601HANGUL/UCS mapper_std KS/KSC5601HANGUL%UCS.mps 5 KSC5601HANJA/UCS mapper_std KS/KSC5601HANJA%UCS.mps 7 UCS/JOHAB mapper_std KS/UCS%JOHAB.mps 8 UCS/KSC5601HANGUL mapper_std KS/UCS%KSC5601HANGUL.mps 9 UCS/KSC5601HANJA mapper_std KS/UCS%KSC5601HANJA.mps
|