/freebsd/crypto/openssl/crypto/des/ |
H A D | str2key.c | 46 void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2) in DES_string_to_2keys() argument 52 memset(key2, 0, 8); in DES_string_to_2keys() 61 (*key2)[i % 8] ^= (j << 1); in DES_string_to_2keys() 69 (*key2)[7 - (i % 8)] ^= j; in DES_string_to_2keys() 73 memcpy(key2, key1, 8); in DES_string_to_2keys() 75 DES_set_odd_parity(key2); in DES_string_to_2keys() 78 DES_set_key_unchecked(key2, &ks); in DES_string_to_2keys() 79 DES_cbc_cksum((const unsigned char *)str, key2, length, &ks, key2); in DES_string_to_2keys() 82 DES_set_odd_parity(key2); in DES_string_to_2keys()
|
/freebsd/crypto/openssl/test/ |
H A D | igetest.c | 82 const unsigned char key2[32]; member 195 AES_KEY key2; in test_bi_ige_vectors() local 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 209 AES_bi_ige_encrypt(v->in, buf, v->length, &key1, &key2, v->iv, in test_bi_ige_vectors() 214 test_output_memory("key 2", v->key2, sizeof(v->key2)); in test_bi_ige_vectors() 329 AES_KEY key, key2; in test_bi_ige_enc_dec() local 336 AES_set_encrypt_key(rkey2, 8 * sizeof(rkey2), &key2); in test_bi_ige_enc_dec() 337 AES_bi_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, &key2, iv, in test_bi_ige_enc_dec() 341 AES_set_decrypt_key(rkey2, 8 * sizeof(rkey2), &key2); in test_bi_ige_enc_dec() [all …]
|
/freebsd/sys/contrib/libsodium/test/default/ |
H A D | auth.c | 10 static unsigned char key2[] = variable 46 crypto_auth_hmacsha512_init(&st, key2, sizeof key2); in main() 57 crypto_auth_hmacsha256_init(&st256, key2, sizeof key2); in main()
|
H A D | aead_xchacha20poly1305.c | 32 …unsigned char *key2 = (unsigned char *) sodium_malloc(crypto_aead_xchacha20poly1305_ietf_KEYBYTES); in tv() local 165 crypto_aead_xchacha20poly1305_ietf_keygen(key2); in tv() 167 NULL, 0U, nonce, key2) == 0) { in tv() 173 sodium_free(key2); in tv()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | aes_platform.h | 41 const AES_KEY *key2, const unsigned char iv[16]); 44 const AES_KEY *key2, const unsigned char iv[16]); 55 const AES_KEY *key1, const AES_KEY *key2, 58 const AES_KEY *key1, const AES_KEY *key2, 198 const AES_KEY *key1, const AES_KEY *key2, 204 const AES_KEY *key1, const AES_KEY *key2, 295 const AES_KEY *key2, const unsigned char *ivec); 298 const AES_KEY *key2, const unsigned char *ivec); 301 const AES_KEY *key2, const unsigned char *ivec); 304 const AES_KEY *key2, const unsigned char *ivec); [all …]
|
/freebsd/contrib/unbound/util/data/ |
H A D | packed_rrset.c | 98 struct ub_packed_rrset_key* key2 = (struct ub_packed_rrset_key*)k2; in ub_rrset_compare() local 100 if(key1 == key2) in ub_rrset_compare() 102 if(key1->rk.type != key2->rk.type) { in ub_rrset_compare() 103 if(key1->rk.type < key2->rk.type) in ub_rrset_compare() 107 if(key1->rk.dname_len != key2->rk.dname_len) { in ub_rrset_compare() 108 if(key1->rk.dname_len < key2->rk.dname_len) in ub_rrset_compare() 112 if((c=query_dname_compare(key1->rk.dname, key2->rk.dname)) != 0) in ub_rrset_compare() 114 if(key1->rk.rrset_class != key2->rk.rrset_class) { in ub_rrset_compare() 115 if(key1->rk.rrset_class < key2->rk.rrset_class) in ub_rrset_compare() 119 if(key1->rk.flags != key2->rk.flags) { in ub_rrset_compare() [all …]
|
/freebsd/contrib/jemalloc/include/jemalloc/internal/ |
H A D | mutex_pool.h | 58 uintptr_t key2) { in mutex_pool_lock2() argument 62 malloc_mutex_t *mutex2 = mutex_pool_mutex(pool, key2); in mutex_pool_lock2() 76 uintptr_t key2) { in mutex_pool_unlock2() argument 78 malloc_mutex_t *mutex2 = mutex_pool_mutex(pool, key2); in mutex_pool_unlock2()
|
/freebsd/sys/compat/linux/ |
H A D | linux_futex.c | 628 struct umtx_key key, key2; in linux_futex_wakeop() local 638 error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2); in linux_futex_wakeop() 652 umtxq_lock(&key2); in linux_futex_wakeop() 653 count = umtxq_count(&key2); in linux_futex_wakeop() 655 ret += umtxq_signal_mask(&key2, nrwake, args->val3); in linux_futex_wakeop() 658 umtxq_unlock(&key2); in linux_futex_wakeop() 663 umtx_key_release(&key2); in linux_futex_wakeop() 672 struct umtx_key key, key2; in linux_futex_requeue() local 695 error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2); in linux_futex_requeue() 709 umtxq_lock(&key2); in linux_futex_requeue() [all …]
|
/freebsd/crypto/openssl/providers/implementations/keymgmt/ |
H A D | mac_legacy_kmgmt.c | 160 const MAC_KEY *key2 = keydata2; in mac_match() local 167 if ((key1->priv_key == NULL && key2->priv_key != NULL) in mac_match() 168 || (key1->priv_key != NULL && key2->priv_key == NULL) in mac_match() 169 || key1->priv_key_len != key2->priv_key_len in mac_match() 170 || (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL) in mac_match() 171 || (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL)) in mac_match() 175 || CRYPTO_memcmp(key1->priv_key, key2->priv_key, in mac_match() 179 EVP_CIPHER_get0_name(key2->cipher.cipher)); in mac_match()
|
H A D | ecx_kmgmt.c | 146 const ECX_KEY *key2 = keydata2; in ecx_match() local 153 ok = ok && key1->type == key2->type; in ecx_match() 159 const unsigned char *pb = key2->haspubkey ? key2->pubkey : NULL; in ecx_match() 161 size_t pbl = key2->keylen; in ecx_match() 165 && key1->type == key2->type in ecx_match() 174 const unsigned char *pb = key2->privkey; in ecx_match() 176 size_t pbl = key2->keylen; in ecx_match() 180 && key1->type == key2->type in ecx_match()
|
/freebsd/lib/libc/iconv/ |
H A D | citrus_pivot_factory.c | 109 char key1[LINE_MAX], key2[LINE_MAX], data[LINE_MAX]; in convert_line() local 137 snprintf(key2, sizeof(key2), "%.*s", (int)(p - line), line); in convert_line() 152 return (_db_factory_add32_by_s(se->se_df, key2, val)); in convert_line()
|
/freebsd/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_keycache.c | 194 u_int32_t key0, key1, key2, key3, key4; in ar9300_set_key_cache_entry() local 259 key2 = LE_READ_4(k->kv_val + 6) ^ xor_mask; in ar9300_set_key_cache_entry() 299 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar9300_set_key_cache_entry() 365 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar9300_set_key_cache_entry() 450 u_int32_t key0, key1, key2, key3, key4; in ar9300_check_key_cache_entry() local 509 key2 = LE_READ_4(k->kv_val + 6) ^ xorMask; in ar9300_check_key_cache_entry() 533 (OS_REG_READ(ah, AR_KEYTABLE_KEY2(entry)) == key2) && in ar9300_check_key_cache_entry() 582 (OS_REG_READ(ah, AR_KEYTABLE_KEY2(entry)) == key2) && in ar9300_check_key_cache_entry()
|
/freebsd/contrib/libucl/tests/basic/ |
H A D | 18.in | 24 key2 = "wtf??" 30 key2 = "OMG" # low priority
|
H A D | 2.res | 24 key2 = 60.0; 25 key2 = "/some/path";
|
H A D | 2.in | 7 key2 = 1min 15 key2 = /some/path;
|
/freebsd/sys/dev/ath/ath_hal/ar5210/ |
H A D | ar5210_keycache.c | 112 uint32_t key0, key1, key2, key3, key4; in ar5210SetKeyCacheEntry() local 137 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; in ar5210SetKeyCacheEntry() 151 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar5210SetKeyCacheEntry()
|
/freebsd/sys/dev/ath/ath_hal/ar5211/ |
H A D | ar5211_keycache.c | 119 uint32_t key0, key1, key2, key3, key4; in ar5211SetKeyCacheEntry() local 158 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; in ar5211SetKeyCacheEntry() 172 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar5211SetKeyCacheEntry()
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_xts.c | 144 if (in->xts.key2 != NULL) { in aes_xts_dupctx() 145 if (in->xts.key2 != &in->ks2) in aes_xts_dupctx() 164 || ctx->xts.key2 == NULL in aes_xts_cipher() 183 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); in aes_xts_cipher()
|
/freebsd/sys/dev/ath/ath_hal/ar5212/ |
H A D | ar5212_keycache.c | 160 uint32_t key0, key1, key2, key3, key4; in ar5212SetKeyCacheEntry() local 217 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; in ar5212SetKeyCacheEntry() 240 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar5212SetKeyCacheEntry() 293 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar5212SetKeyCacheEntry()
|
/freebsd/crypto/openssh/ |
H A D | hmac.c | 177 u_char *key2 = "Jefe"; in main() local 192 hmac_test(key2, strlen(key2), data2, strlen(data2), dig2, sizeof(dig2)); in main()
|
/freebsd/contrib/unbound/services/ |
H A D | outside_network.h | 842 int pending_cmp(const void* key1, const void* key2); 845 int serviced_cmp(const void* key1, const void* key2); 848 int reuse_cmp(const void* key1, const void* key2); 851 int reuse_id_cmp(const void* key1, const void* key2);
|
H A D | listen_dnsport.h | 704 int doq_conn_cmp(const void* key1, const void* key2); 707 int doq_conid_cmp(const void* key1, const void* key2); 710 int doq_timer_cmp(const void* key1, const void* key2); 713 int doq_stream_cmp(const void* key1, const void* key2);
|
/freebsd/contrib/unbound/services/cache/ |
H A D | infra.h | 461 int infra_compfunc(void* key1, void* key2); 473 int rate_compfunc(void* key1, void* key2); 485 int ip_rate_compfunc(void* key1, void* key2);
|
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | aesv8-armx.pl | 2237 my ($inp,$out,$len,$key1,$key2,$ivp)=map("x$_",(0..5)); 2276 ldr $rounds,[$key2,#240] 2277 vld1.32 {$dat},[$key2],#16 2280 vld1.32 {$dat1},[$key2],#16 2285 vld1.32 {$dat},[$key2],#16 2289 vld1.32 {$dat1},[$key2],#16 2294 vld1.32 {$dat},[$key2] 2363 ldr $rounds,[$key2,#240] 2364 vld1.32 {$dat},[$key2],#16 2367 vld1.32 {$dat1},[$key2],#16 [all …]
|
/freebsd/contrib/dialog/ |
H A D | calendar.c | 871 int key2; in dialog_calendar() local 891 if ((key2 = dlg_char_to_button(key, buttons)) >= 0) { in dialog_calendar() 892 result = key2; in dialog_calendar() 931 key2 = -1; in dialog_calendar() 933 if ((key2 = dlg_ok_buttoncode(Mouse2Key(key))) >= 0) { in dialog_calendar() 934 result = key2; in dialog_calendar() 939 key2 = 1; in dialog_calendar() 947 if (key2 < 0) { in dialog_calendar()
|