/freebsd/sys/crypto/aesni/ |
H A D | intel_sha1.c | 68 __m128i msg0, msg1, msg2, msg3; in intel_sha1_step() local 100 msg1 = _mm_loadu_si128((const __m128i*) (data+16)); in intel_sha1_step() 101 msg1 = _mm_shuffle_epi8(msg1, shuf_mask); in intel_sha1_step() 102 e1 = _mm_sha1nexte_epu32(e1, msg1); in intel_sha1_step() 105 msg0 = _mm_sha1msg1_epu32(msg0, msg1); in intel_sha1_step() 113 msg1 = _mm_sha1msg1_epu32(msg1, msg2); in intel_sha1_step() 124 msg1 = _mm_xor_si128(msg1, msg3); in intel_sha1_step() 129 msg1 = _mm_sha1msg2_epu32(msg1, msg0); in intel_sha1_step() 135 e1 = _mm_sha1nexte_epu32(e1, msg1); in intel_sha1_step() 137 msg2 = _mm_sha1msg2_epu32(msg2, msg1); in intel_sha1_step() [all …]
|
/freebsd/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_msgrcv.c | 81 struct msg msg1 = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; in ATF_TC_BODY() local 88 (void)msgsnd(id, &msg1, MSG_LEN, IPC_NOWAIT); in ATF_TC_BODY() 91 ATF_CHECK(msg1.buf[0] == msg2.buf[0]); in ATF_TC_BODY() 92 ATF_CHECK(msg1.buf[1] == msg2.buf[1]); in ATF_TC_BODY() 93 ATF_CHECK(msg1.buf[2] == msg2.buf[2]); in ATF_TC_BODY() 210 struct msg msg1 = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; in ATF_TC_BODY() local 217 (void)msgsnd(id, &msg1, MSG_LEN, IPC_NOWAIT); in ATF_TC_BODY() 220 ATF_CHECK(msg1.buf[0] != msg2.buf[0]); /* Different mtype. */ in ATF_TC_BODY() 221 ATF_CHECK(msg1.buf[1] != msg2.buf[1]); in ATF_TC_BODY() 222 ATF_CHECK(msg1.buf[2] != msg2.buf[2]); in ATF_TC_BODY() [all …]
|
/freebsd/contrib/netbsd-tests/lib/csu/ |
H A D | h_initfini3.cxx | 8 static const char msg1[] = "main started\n"; in main() local 14 write(STDOUT_FILENO, msg1, sizeof(msg1) - 1); in main()
|
/freebsd/contrib/googletest/googletest/test/ |
H A D | googletest-message-test.cc | 69 const Message msg1("Hello"); in TEST() local 70 const Message msg2(msg1); in TEST()
|
H A D | gtest_unittest.cc | 3572 const std::string msg1( in TEST() local 3580 msg1.c_str()); in TEST() 3626 const std::string msg1( in TEST() local 3637 msg1.c_str()); in TEST()
|
/freebsd/crypto/openssh/ |
H A D | sshconnect.c | 1182 char *msg1 = NULL, *msg2 = NULL; in check_host_key() local 1184 xasprintf(&msg1, "The authenticity of host " in check_host_key() 1188 xextendf(&msg1, "\n", "but keys of different " in check_host_key() 1191 xextendf(&msg1, "", "."); in check_host_key() 1199 xextendf(&msg1, "\n", "%s key fingerprint is %s.", in check_host_key() 1202 xextendf(&msg1, "\n", "%s", ra); in check_host_key() 1204 xextendf(&msg1, "\n", in check_host_key() 1213 xextendf(&msg1, "\n", "%s", msg2); in check_host_key() 1215 xextendf(&msg1, "\n", in check_host_key() 1219 confirmed = confirm(msg1, fp); in check_host_key() [all …]
|
/freebsd/contrib/byacc/test/ |
H A D | expr.oxout.y | 186 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local 191 msg1 = "SSAL overflow: "; in yyyHandleOverflow() 195 msg1 = "ready set overflow: "; in yyyHandleOverflow() 199 msg1 = "traversal stack overflow: "; in yyyHandleOverflow() 206 fputs(msg1,stderr); in yyyHandleOverflow()
|
/freebsd/contrib/atf/atf-sh/ |
H A D | libatf-sh.subr | 245 # atf_expected_failure msg1 [.. msgN] 258 # atf_fail msg1 [.. msgN] 374 # atf_skip msg1 [.. msgN] 457 # _atf_error error_code [msg1 [.. msgN]] 476 # _atf_warning msg1 [.. msgN] 652 # _atf_syntax_error msg1 [.. msgN] 718 # _atf_warning [msg1 [.. msgN]]
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_util.c | 206 static const char msg1[] = "Fatal Internal Error in libarchive: "; in __archive_errx() local 209 s = write(2, msg1, strlen(msg1)); in __archive_errx()
|
/freebsd/contrib/byacc/test/yacc/ |
H A D | expr.oxout.tab.c | 385 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local 390 msg1 = "SSAL overflow: "; in yyyHandleOverflow() 394 msg1 = "ready set overflow: "; in yyyHandleOverflow() 398 msg1 = "traversal stack overflow: "; in yyyHandleOverflow() 405 fputs(msg1,stderr); in yyyHandleOverflow()
|
/freebsd/contrib/unbound/util/data/ |
H A D | msgreply.c | 669 struct query_info* msg1 = (struct query_info*)m1; in query_info_compare() local 673 COMPARE_IT(msg1->qtype, msg2->qtype); in query_info_compare() 674 if((mc = query_dname_compare(msg1->qname, msg2->qname)) != 0) in query_info_compare() 676 log_assert(msg1->qname_len == msg2->qname_len); in query_info_compare() 677 COMPARE_IT(msg1->qclass, msg2->qclass); in query_info_compare()
|
/freebsd/tests/sys/audit/ |
H A D | inter-process.c | 180 msgstr_t msg1, msg2; in ATF_TC_BODY() local 181 msg1.mtype = 1; in ATF_TC_BODY() 182 memset(msg1.mtext, 0, BUFFSIZE); in ATF_TC_BODY() 185 ATF_REQUIRE_EQ(0, msgsnd(msqid, &msg1, BUFFSIZE, IPC_NOWAIT)); in ATF_TC_BODY()
|
/freebsd/contrib/byacc/test/btyacc/ |
H A D | expr.oxout.tab.c | 535 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local 540 msg1 = "SSAL overflow: "; in yyyHandleOverflow() 544 msg1 = "ready set overflow: "; in yyyHandleOverflow() 548 msg1 = "traversal stack overflow: "; in yyyHandleOverflow() 555 fputs(msg1,stderr); in yyyHandleOverflow()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 469 const struct wpabuf *msg1, in eap_aka_add_id_msg() argument 474 if (!msg1) in eap_aka_add_id_msg() 476 len = wpabuf_len(msg1); in eap_aka_add_id_msg() 488 wpabuf_put_buf(data->id_msgs, msg1); in eap_aka_add_id_msg()
|
/freebsd/contrib/bearssl/test/ |
H A D | test_crypto.c | 6782 unsigned char n2[256], d[256], msg1[256], msg2[256]; in test_RSA_keygen() local 6890 rng.vtable->generate(&rng.vtable, msg1, pk.nlen); in test_RSA_keygen() 6891 msg1[0] = 0x00; in test_RSA_keygen() 6892 memcpy(msg2, msg1, pk.nlen); in test_RSA_keygen() 6897 if (memcmp(msg1, msg2, pk.nlen) != 0) { in test_RSA_keygen()
|