/freebsd/contrib/libucl/tests/basic/ |
H A D | 1.res | 1 key1 = "value"; 2 key1 = "value2"; 3 key1 = "value;"; 4 key1 = 1.0; 5 key1 = -3735928559; 6 key1 = "0xdeadbeef.1"; 7 key1 = "0xreadbeef"; 8 key1 = -1e-10; 9 key1 = 1; 10 key1 = true; [all …]
|
H A D | 1.in | 2 "key1": value; 3 "key1": value2; 4 "key1": "value;" 5 "key1": 1.0, 6 "key1": -0xdeadbeef 7 "key1": 0xdeadbeef.1 8 "key1": 0xreadbeef 9 "key1": -1e-10, 10 "key1": 1 11 "key1": true [all …]
|
H A D | 9.res | 1 key1 = "value"; 2 key1 = "value"; 3 key1 = "value"; 10 key1 = "value"; 16 key1 = "value"; 23 key1 = "value"; 24 key1 = "value"; 28 key1 = "value"; 33 key1 = "value";
|
H A D | 19.res | 6 key1 = "value2"; 20 key1 = "value2"; 30 key1 = "value2";
|
H A D | 2.res | 22 key1 = 1.0; 23 key1 = "some string";
|
H A D | 2.in | 6 key1 = 1s 14 key1 = "some string";
|
/freebsd/crypto/openssl/crypto/des/ |
H A D | str2key.c | 46 void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2) in DES_string_to_2keys() argument 51 memset(key1, 0, 8); in DES_string_to_2keys() 59 (*key1)[i % 8] ^= (j << 1); in DES_string_to_2keys() 67 (*key1)[7 - (i % 8)] ^= j; in DES_string_to_2keys() 73 memcpy(key2, key1, 8); in DES_string_to_2keys() 74 DES_set_odd_parity(key1); in DES_string_to_2keys() 76 DES_set_key_unchecked(key1, &ks); in DES_string_to_2keys() 77 DES_cbc_cksum((const unsigned char *)str, key1, length, &ks, key1); in DES_string_to_2keys() 81 DES_set_odd_parity(key1); in DES_string_to_2keys()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | aes_platform.h | 40 size_t len, const AES_KEY *key1, 43 size_t len, const AES_KEY *key1, 55 const AES_KEY *key1, const AES_KEY *key2, 58 const AES_KEY *key1, const AES_KEY *key2, 198 const AES_KEY *key1, const AES_KEY *key2, 204 const AES_KEY *key1, const AES_KEY *key2, 294 size_t blocks, const AES_KEY *key1, 297 size_t blocks, const AES_KEY *key1, 300 size_t blocks, const AES_KEY *key1, 303 size_t blocks, const AES_KEY *key1, [all …]
|
/freebsd/crypto/openssl/providers/implementations/keymgmt/ |
H A D | mac_legacy_kmgmt.c | 159 const MAC_KEY *key1 = keydata1; in mac_match() local 167 if ((key1->priv_key == NULL && key2->priv_key != NULL) in mac_match() 168 || (key1->priv_key != NULL && key2->priv_key == NULL) in mac_match() 169 || key1->priv_key_len != key2->priv_key_len in mac_match() 170 || (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL) in mac_match() 171 || (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL)) in mac_match() 174 ok = ok && (key1->priv_key == NULL /* implies key2->privkey == NULL */ in mac_match() 175 || CRYPTO_memcmp(key1->priv_key, key2->priv_key, in mac_match() 176 key1->priv_key_len) == 0); in mac_match() 177 if (key1->cipher.cipher != NULL) in mac_match() [all …]
|
H A D | ecx_kmgmt.c | 145 const ECX_KEY *key1 = keydata1; in ecx_match() local 153 ok = ok && key1->type == key2->type; in ecx_match() 158 const unsigned char *pa = key1->haspubkey ? key1->pubkey : NULL; in ecx_match() 160 size_t pal = key1->keylen; in ecx_match() 165 && key1->type == key2->type in ecx_match() 173 const unsigned char *pa = key1->privkey; in ecx_match() 175 size_t pal = key1->keylen; in ecx_match() 180 && key1->type == key2->type in ecx_match()
|
/freebsd/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 97 struct ub_packed_rrset_key* key1 = (struct ub_packed_rrset_key*)k1; in ub_rrset_compare() local 100 if(key1 == key2) in ub_rrset_compare() 102 if(key1->rk.type != key2->rk.type) { in ub_rrset_compare() 103 if(key1->rk.type < key2->rk.type) in ub_rrset_compare() 107 if(key1->rk.dname_len != key2->rk.dname_len) { in ub_rrset_compare() 108 if(key1->rk.dname_len < key2->rk.dname_len) in ub_rrset_compare() 112 if((c=query_dname_compare(key1->rk.dname, key2->rk.dname)) != 0) in ub_rrset_compare() 114 if(key1->rk.rrset_class != key2->rk.rrset_class) { in ub_rrset_compare() 115 if(key1->rk.rrset_class < key2->rk.rrset_class) in ub_rrset_compare() 119 if(key1->rk.flags != key2->rk.flags) { in ub_rrset_compare() [all …]
|
/freebsd/contrib/jemalloc/include/jemalloc/internal/ |
H A D | mutex_pool.h | 57 mutex_pool_lock2(tsdn_t *tsdn, mutex_pool_t *pool, uintptr_t key1, in mutex_pool_lock2() argument 61 malloc_mutex_t *mutex1 = mutex_pool_mutex(pool, key1); in mutex_pool_lock2() 75 mutex_pool_unlock2(tsdn_t *tsdn, mutex_pool_t *pool, uintptr_t key1, in mutex_pool_unlock2() argument 77 malloc_mutex_t *mutex1 = mutex_pool_mutex(pool, key1); in mutex_pool_unlock2()
|
/freebsd/crypto/openssl/test/ |
H A D | igetest.c | 81 const unsigned char key1[32]; member 194 AES_KEY key1; in test_bi_ige_vectors() local 202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 209 AES_bi_ige_encrypt(v->in, buf, v->length, &key1, &key2, v->iv, in test_bi_ige_vectors() 213 test_output_memory("key 1", v->key1, sizeof(v->key1)); in test_bi_ige_vectors()
|
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 1928 my ($inp,$out,$len,$key1,$key2,$ivp,$rounds,$idx) = map("r$_",(3..10)); 2015 ?lvsl $keyperm,0,$key1 # prepare for unaligned key 2016 lwz $rounds,240($key1) 2036 lvx $rndkey0,0,$key1 2037 lvx $rndkey1,$idx,$key1 2043 lvx $rndkey0,$idx,$key1 2052 lvx $rndkey1,$idx,$key1 2056 lvx $rndkey0,$idx,$key1 2062 lvx $rndkey1,$idx,$key1 2080 lvx $rndkey0,0,$key1 [all …]
|
H A D | aesv8-armx.pl | 2237 my ($inp,$out,$len,$key1,$key2,$ivp)=map("x$_",(0..5)); 2301 ldr $rounds,[$key1,#240] 2302 vld1.32 {q20-q21},[$key1],#32 // load key schedule... 2306 vld1.32 {q8-q9},[$key1],#32 // load key schedule... 2314 vld1.32 {q8},[$key1],#16 // load key schedule... 2317 vld1.32 {q9},[$key1],#16 // load key schedule... 2321 vld1.32 {q10-q11},[$key1],#32 // load key schedule... 2326 vld1.32 {q12-q13},[$key1],#32 // load key schedule... 2331 vld1.32 {q14-q15},[$key1],#32 // load key schedule... 2336 vld1.32 {$rndlast},[$key1] [all …]
|
H A D | aes-s390x.pl | 1636 my $key1="%r5"; # $i1 1655 la %r1,0($key1) # restore $key1 1666 lmg $s0,$s3,0($key1) # load 256 bits of key material, 1682 la %r1,0($key1) # restore pointer to $key1 1844 l %r0,240($key1) 1845 la %r1,0($key1) # $key1 is not needed anymore 1928 la $key,0($key1) 1978 la $key,0($key1) 2047 l %r0,240($key1) 2048 la %r1,0($key1) # $key1 is not needed anymore [all …]
|
/freebsd/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_keycache.c | 194 u_int32_t key0, key1, key2, key3, key4; in ar9300_set_key_cache_entry() local 258 key1 = (LE_READ_2(k->kv_val + 4) ^ xor_mask) & 0xffff; in ar9300_set_key_cache_entry() 298 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), ~key1); in ar9300_set_key_cache_entry() 361 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ar9300_set_key_cache_entry() 364 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ar9300_set_key_cache_entry() 450 u_int32_t key0, key1, key2, key3, key4; in ar9300_check_key_cache_entry() local 508 key1 = (LE_READ_2(k->kv_val + 4) ^ xorMask) & 0xffff; in ar9300_check_key_cache_entry() 532 (OS_REG_READ(ah, AR_KEYTABLE_KEY1(entry)) == key1) && in ar9300_check_key_cache_entry() 581 (OS_REG_READ(ah, AR_KEYTABLE_KEY1(entry)) == key1) && in ar9300_check_key_cache_entry()
|
/freebsd/lib/libc/iconv/ |
H A D | citrus_pivot_factory.c | 109 char key1[LINE_MAX], key2[LINE_MAX], data[LINE_MAX]; in convert_line() local 128 snprintf(key1, sizeof(key1), "%.*s", (int)(p - line), line); in convert_line() 148 ret = find_src(sh, &se, key1); in convert_line()
|
/freebsd/crypto/openssl/crypto/modes/ |
H A D | xts128.c | 55 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt() 100 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt() 138 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt() 149 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt()
|
/freebsd/sys/dev/ath/ath_hal/ar5212/ |
H A D | ar5212_keycache.c | 160 uint32_t key0, key1, key2, key3, key4; in ar5212SetKeyCacheEntry() local 216 key1 = (LE_READ_2(k->kv_val+4) ^ xorMask) & 0xffff; in ar5212SetKeyCacheEntry() 239 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), ~key1); in ar5212SetKeyCacheEntry() 289 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ar5212SetKeyCacheEntry() 292 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ar5212SetKeyCacheEntry()
|
/freebsd/sys/dev/ath/ath_hal/ar5210/ |
H A D | ar5210_keycache.c | 112 uint32_t key0, key1, key2, key3, key4; in ar5210SetKeyCacheEntry() local 136 key1 = (LE_READ_2(k->kv_val+4) ^ xorMask) & 0xffff; in ar5210SetKeyCacheEntry() 150 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ar5210SetKeyCacheEntry()
|
/freebsd/sys/opencrypto/ |
H A D | xform_aes_xts.c | 119 rijndael_encrypt(&ctx->key1, block, out); in aes_xts_crypt() 121 rijndael_decrypt(&ctx->key1, block, out); in aes_xts_crypt() 177 rijndael_set_key(&ctx->key1, key, len * 4); in aes_xts_setkey()
|
/freebsd/sys/dev/ath/ath_hal/ar5211/ |
H A D | ar5211_keycache.c | 119 uint32_t key0, key1, key2, key3, key4; in ar5211SetKeyCacheEntry() local 157 key1 = (LE_READ_2(k->kv_val+4) ^ xorMask) & 0xffff; in ar5211SetKeyCacheEntry() 171 OS_REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ar5211SetKeyCacheEntry()
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_xts.c | 140 if (in->xts.key1 != NULL) { in aes_xts_dupctx() 141 if (in->xts.key1 != &in->ks1) in aes_xts_dupctx() 163 || ctx->xts.key1 == NULL in aes_xts_cipher() 183 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); in aes_xts_cipher()
|
/freebsd/crypto/openssh/ |
H A D | hmac.c | 169 u_char key1[16] = { in main() local 191 hmac_test(key1, sizeof(key1), data1, strlen(data1), dig1, sizeof(dig1)); in main()
|