Home
last modified time | relevance | path

Searched refs:msg2 (Results 1 – 22 of 22) sorted by relevance

/freebsd/sys/crypto/aesni/
H A Dintel_sha1.c68 __m128i msg0, msg1, msg2, msg3; in intel_sha1_step() local
108 msg2 = _mm_loadu_si128((const __m128i*) (data+32)); in intel_sha1_step()
109 msg2 = _mm_shuffle_epi8(msg2, shuf_mask); in intel_sha1_step()
110 e0 = _mm_sha1nexte_epu32(e0, msg2); in intel_sha1_step()
113 msg1 = _mm_sha1msg1_epu32(msg1, msg2); in intel_sha1_step()
114 msg0 = _mm_xor_si128(msg0, msg2); in intel_sha1_step()
123 msg2 = _mm_sha1msg1_epu32(msg2, msg3); in intel_sha1_step()
132 msg2 = _mm_xor_si128(msg2, msg0); in intel_sha1_step()
137 msg2 = _mm_sha1msg2_epu32(msg2, msg1); in intel_sha1_step()
143 e0 = _mm_sha1nexte_epu32(e0, msg2); in intel_sha1_step()
[all …]
/freebsd/contrib/netbsd-tests/lib/libc/sys/
H A Dt_msgrcv.c82 struct msg msg2 = { MSG_MTYPE_1, { 'x', 'y', 'z' } }; in ATF_TC_BODY() local
89 (void)msgrcv(id, &msg2, MSG_LEN, MSG_MTYPE_1, IPC_NOWAIT); in ATF_TC_BODY()
91 ATF_CHECK(msg1.buf[0] == msg2.buf[0]); in ATF_TC_BODY()
92 ATF_CHECK(msg1.buf[1] == msg2.buf[1]); in ATF_TC_BODY()
93 ATF_CHECK(msg1.buf[2] == msg2.buf[2]); in ATF_TC_BODY()
211 struct msg msg2 = { MSG_MTYPE_3, { 'x', 'y', 'z' } }; in ATF_TC_BODY() local
218 (void)msgrcv(id, &msg2, MSG_LEN, MSG_MTYPE_2, IPC_NOWAIT); in ATF_TC_BODY()
220 ATF_CHECK(msg1.buf[0] != msg2.buf[0]); /* Different mtype. */ in ATF_TC_BODY()
221 ATF_CHECK(msg1.buf[1] != msg2.buf[1]); in ATF_TC_BODY()
222 ATF_CHECK(msg1.buf[2] != msg2.buf[2]); in ATF_TC_BODY()
[all …]
/freebsd/contrib/netbsd-tests/lib/csu/dso/
H A Dh_initfini3_dso.cxx17 static const char msg2[] = "stack unaligned \n"; in Test2() local
18 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in Test2()
29 static const char msg2[] = "stack unaligned \n"; in ~Test2() local
30 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in ~Test2()
/freebsd/contrib/netbsd-tests/lib/csu/
H A Dh_initfini_common.cxx17 static const char msg2[] = "stack unaligned \n"; in Test() local
18 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in Test()
29 static const char msg2[] = "stack unaligned \n"; in ~Test() local
30 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in ~Test()
H A Dh_initfini3.cxx9 static const char msg2[] = "main after dlopen\n"; in main() local
18 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in main()
/freebsd/contrib/ntp/sntp/libevent/test/
H A Dregress_rpc.c736 struct msg *msg = NULL, *msg2 = NULL; in rpc_test() local
797 msg2 = msg_new(); in rpc_test()
798 if (evtag_unmarshal_msg(tmp, 0xdeaf, msg2) == -1) in rpc_test()
807 if (!EVTAG_HAS(msg2, from_name) || in rpc_test()
808 !EVTAG_HAS(msg2, to_name) || in rpc_test()
809 !EVTAG_HAS(msg2, attack)) { in rpc_test()
813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test()
817 if (EVTAG_ARRAY_LEN(msg2, run) != i) { in rpc_test()
822 if (EVTAG_ARRAY_GET(msg2, run, 0, &run) == -1) { in rpc_test()
876 if (msg2) in rpc_test()
[all …]
/freebsd/contrib/libevent/test/
H A Dregress_rpc.c736 struct msg *msg = NULL, *msg2 = NULL; in rpc_test() local
797 msg2 = msg_new(); in rpc_test()
798 if (evtag_unmarshal_msg(tmp, 0xdeaf, msg2) == -1) in rpc_test()
807 if (!EVTAG_HAS(msg2, from_name) || in rpc_test()
808 !EVTAG_HAS(msg2, to_name) || in rpc_test()
809 !EVTAG_HAS(msg2, attack)) { in rpc_test()
813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test()
817 if (EVTAG_ARRAY_LEN(msg2, run) != i) { in rpc_test()
822 if (EVTAG_ARRAY_GET(msg2, run, 0, &run) == -1) { in rpc_test()
876 if (msg2) in rpc_test()
[all …]
/freebsd/sys/dev/bnxt/bnxt_en/
H A Dbnxt_mgmt.c169 struct bnxt_mgmt_fw_msg msg_temp, *msg, *msg2 = NULL; in bnxt_mgmt_process_hwrm() local
228 msg2 = malloc(size, M_BNXT, M_WAITOK | M_ZERO); in bnxt_mgmt_process_hwrm()
230 if (copyin((void *)mgmt_req.req.hreq, msg2, size)) { in bnxt_mgmt_process_hwrm()
236 msg = msg2; in bnxt_mgmt_process_hwrm()
293 if (msg2) in bnxt_mgmt_process_hwrm()
294 free(msg2, M_BNXT); in bnxt_mgmt_process_hwrm()
/freebsd/crypto/openssl/test/
H A Dcurve448_internal_test.c149 static const uint8_t msg2[1] = { variable
607 || !TEST_true(ossl_ed448_sign(NULL, outsig, msg2, sizeof(msg2), in test_ed448()
/freebsd/contrib/googletest/googletest/test/
H A Dgoogletest-message-test.cc70 const Message msg2(msg1); in TEST() local
71 EXPECT_EQ("Hello", msg2.GetString()); in TEST()
H A Dgoogletest-death-test-test.cc1279 Message msg2; in TEST() local
1280 msg2 << kBiggestSignedParsableMax; in TEST()
1283 EXPECT_TRUE(ParseNaturalNumber(msg2.GetString(), &signed_result)); in TEST()
H A Dgtest_unittest.cc3582 const std::string msg2( in TEST() local
3589 msg2.c_str()); in TEST()
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Dkerberos5.c521 const char *msg2 = "user is not authorized to login"; in kerberos5_is() local
529 msg2 = msg; in kerberos5_is()
530 Data(ap, KRB_REJECT, (void *)msg2, -1); in kerberos5_is()
/freebsd/contrib/byacc/test/
H A Dexpr.oxout.y186 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local
208 msg2 = " Have to modify evaluator: -Y%c%ld.\n"; in yyyHandleOverflow()
209 fprintf(stderr,msg2,which,newSize); in yyyHandleOverflow()
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_aka.c470 const struct wpabuf *msg2) in eap_aka_add_id_msg() argument
477 if (msg2) in eap_aka_add_id_msg()
478 len += wpabuf_len(msg2); in eap_aka_add_id_msg()
489 if (msg2) in eap_aka_add_id_msg()
490 wpabuf_put_buf(data->id_msgs, msg2); in eap_aka_add_id_msg()
/freebsd/contrib/unbound/util/data/
H A Dmsgreply.c670 struct query_info* msg2 = (struct query_info*)m2; in query_info_compare() local
673 COMPARE_IT(msg1->qtype, msg2->qtype); in query_info_compare()
674 if((mc = query_dname_compare(msg1->qname, msg2->qname)) != 0) in query_info_compare()
676 log_assert(msg1->qname_len == msg2->qname_len); in query_info_compare()
677 COMPARE_IT(msg1->qclass, msg2->qclass); in query_info_compare()
/freebsd/crypto/openssh/
H A Dsshconnect.c1182 char *msg1 = NULL, *msg2 = NULL; in check_host_key() local
1210 if ((msg2 = other_hostkeys_message(host, ip, host_key, in check_host_key()
1213 xextendf(&msg1, "\n", "%s", msg2); in check_host_key()
1223 free(msg2); in check_host_key()
/freebsd/contrib/byacc/test/yacc/
H A Dexpr.oxout.tab.c385 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local
407 msg2 = " Have to modify evaluator: -Y%c%ld.\n"; in yyyHandleOverflow()
408 fprintf(stderr,msg2,which,newSize); in yyyHandleOverflow()
/freebsd/contrib/byacc/test/btyacc/
H A Dexpr.oxout.tab.c535 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local
557 msg2 = " Have to modify evaluator: -Y%c%ld.\n"; in yyyHandleOverflow()
558 fprintf(stderr,msg2,which,newSize); in yyyHandleOverflow()
/freebsd/sys/kern/
H A Duipc_mqueue.c1759 struct mqueue_msg *msg2; in _mqueue_send() local
1786 TAILQ_FOREACH(msg2, &mq->mq_msgq, msg_link) { in _mqueue_send()
1787 if (msg2->msg_prio < msg->msg_prio) in _mqueue_send()
1790 TAILQ_INSERT_BEFORE(msg2, msg, msg_link); in _mqueue_send()
/freebsd/tests/sys/audit/
H A Dinter-process.c180 msgstr_t msg1, msg2; in ATF_TC_BODY() local
188 ATF_REQUIRE((recv_bytes = msgrcv(msqid, &msg2, in ATF_TC_BODY()
/freebsd/contrib/bearssl/test/
H A Dtest_crypto.c6782 unsigned char n2[256], d[256], msg1[256], msg2[256]; in test_RSA_keygen() local
6892 memcpy(msg2, msg1, pk.nlen); in test_RSA_keygen()
6893 if (!pub(msg2, pk.nlen, &pk2) || !pub(msg2, pk.nlen, &pk)) { in test_RSA_keygen()
6897 if (memcmp(msg1, msg2, pk.nlen) != 0) { in test_RSA_keygen()