| /src/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | expect-vk.txt | 7 KEY=80000000000000000000000000000000 11 KEY=40000000000000000000000000000000 15 KEY=20000000000000000000000000000000 19 KEY=10000000000000000000000000000000 23 KEY=08000000000000000000000000000000 27 KEY=04000000000000000000000000000000 31 KEY=02000000000000000000000000000000 35 KEY=01000000000000000000000000000000 39 KEY=00800000000000000000000000000000 43 KEY=00400000000000000000000000000000 [all …]
|
| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_brainpool.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 30 -----BEGIN PRIVATE KEY----- 32 -----END PRIVATE KEY----- 35 -----BEGIN PUBLIC KEY----- 38 -----END PUBLIC KEY----- 55 -----BEGIN PRIVATE KEY----- 57 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_ecdh.txt | 24 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 30 -----BEGIN PUBLIC KEY----- 33 -----END PUBLIC KEY----- 39 -----BEGIN PRIVATE KEY----- 42 -----END PRIVATE KEY----- 45 -----BEGIN PUBLIC KEY----- 48 -----END PUBLIC KEY----- 68 -----BEGIN PRIVATE KEY----- 71 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_kas.txt | 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 33 -----BEGIN PUBLIC KEY----- 36 -----END PUBLIC KEY----- 42 -----BEGIN PUBLIC KEY----- 45 -----END PUBLIC KEY----- 60 -----BEGIN PRIVATE KEY----- 64 -----END PRIVATE KEY----- 67 -----BEGIN PUBLIC KEY----- 70 -----END PUBLIC KEY----- [all …]
|
| H A D | evppkey_ecc.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 31 -----BEGIN PRIVATE KEY----- 33 -----END PRIVATE KEY----- 36 -----BEGIN PUBLIC KEY----- 39 -----END PUBLIC KEY----- 71 -----BEGIN PUBLIC KEY----- 74 -----END PUBLIC KEY----- [all …]
|
| H A D | evppkey_ecx.txt | 23 -----BEGIN PRIVATE KEY----- 25 -----END PRIVATE KEY----- 28 -----BEGIN PUBLIC KEY----- 30 -----END PUBLIC KEY----- 35 -----BEGIN PRIVATE KEY----- 37 -----END PRIVATE KEY----- 40 -----BEGIN PUBLIC KEY----- 42 -----END PUBLIC KEY----- 101 -----BEGIN PRIVATE KEY----- 104 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_ecx_sigalg.txt | 19 -----BEGIN PRIVATE KEY----- 21 -----END PRIVATE KEY----- 24 -----BEGIN PRIVATE KEY----- 26 -----END PRIVATE KEY----- 29 -----BEGIN PRIVATE KEY----- 31 -----END PRIVATE KEY----- 34 -----BEGIN PRIVATE KEY----- 36 -----END PRIVATE KEY----- 39 -----BEGIN PRIVATE KEY----- 41 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_ffdhe.txt | 26 -----BEGIN PRIVATE KEY----- 34 -----END PRIVATE KEY----- 37 -----BEGIN PRIVATE KEY----- 45 -----END PRIVATE KEY----- 48 -----BEGIN PUBLIC KEY----- 61 -----END PUBLIC KEY----- 64 -----BEGIN PUBLIC KEY----- 77 -----END PUBLIC KEY----- 120 -----BEGIN PRIVATE KEY----- 131 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_dh.txt | 17 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 33 -----BEGIN PUBLIC KEY----- 46 -----END PUBLIC KEY----- 49 -----BEGIN PRIVATE KEY----- 62 -----END PRIVATE KEY----- 65 -----BEGIN PUBLIC KEY----- 78 -----END PUBLIC KEY----- 81 -----BEGIN PRIVATE KEY----- 94 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_mismatch_ecx.txt | 18 -----BEGIN PRIVATE KEY----- 20 -----END PRIVATE KEY----- 23 -----BEGIN PRIVATE KEY----- 26 -----END PRIVATE KEY----- 29 -----BEGIN PUBLIC KEY----- 32 -----END PUBLIC KEY----- 35 -----BEGIN PUBLIC KEY----- 38 -----END PUBLIC KEY----- 41 -----BEGIN PRIVATE KEY----- 68 -----END PRIVATE KEY-----
|
| H A D | evppkey_dsa_sigalg.txt | 19 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 30 -----BEGIN PUBLIC KEY----- 41 -----END PUBLIC KEY----- 102 -----BEGIN PRIVATE KEY----- 109 -----END PRIVATE KEY----- 112 -----BEGIN PUBLIC KEY----- 123 -----END PUBLIC KEY----- 135 -----BEGIN PRIVATE KEY----- 144 -----END PRIVATE KEY----- [all …]
|
| /src/crypto/krb5/src/lib/kdb/ |
| H A D | t_sort_key_data.c | 36 #define KEY(kvno) { \ macro 56 krb5_key_data keys[] = { KEY(5), KEY(5), KEY(4), KEY(3), KEY(3), KEY(2), in test_pre_sorted() 57 KEY(2), KEY(1) }; in test_pre_sorted() 67 krb5_key_data keys[] = { KEY(1), KEY(2), KEY(2), KEY(3), KEY(3), KEY(3), in test_reverse_sorted() 68 KEY(4), KEY(5) }; in test_reverse_sorted() 78 krb5_key_data keys[] = { KEY(1), KEY(4), KEY(1), KEY(3), KEY(4), KEY(3), in test_random_order() 79 KEY(5), KEY(2) }; in test_random_order()
|
| /src/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
| H A D | aes_aesni.S | 599 #define KEY xmm1 /* temporary, 128 bits */ macro 605 movups (%KEYP), %KEY // key 612 pxor %KEY, %STATE // round 0 621 movups -0x60(%KEYP), %KEY 622 aesenc %KEY, %STATE 623 movups -0x50(%KEYP), %KEY 624 aesenc %KEY, %STATE 629 movups -0x40(%KEYP), %KEY 630 aesenc %KEY, %STATE 631 movups -0x30(%KEYP), %KEY [all …]
|
| /src/sys/crypto/aesni/ |
| H A D | aesni_ghash.c | 278 const __m128i *KEY = (const __m128i *)key; in AES_GCM_encrypt() local 294 tmp1 = _mm_xor_si128(X, KEY[0]); in AES_GCM_encrypt() 295 tmp2 = _mm_xor_si128(Y, KEY[0]); in AES_GCM_encrypt() 297 tmp1 = _mm_aesenc_si128(tmp1, KEY[j]); in AES_GCM_encrypt() 298 tmp2 = _mm_aesenc_si128(tmp2, KEY[j]); in AES_GCM_encrypt() 300 tmp1 = _mm_aesenc_si128(tmp1, KEY[j+1]); in AES_GCM_encrypt() 301 tmp2 = _mm_aesenc_si128(tmp2, KEY[j+1]); in AES_GCM_encrypt() 303 tmp1 = _mm_aesenc_si128(tmp1, KEY[nr-1]); in AES_GCM_encrypt() 304 tmp2 = _mm_aesenc_si128(tmp2, KEY[nr-1]); in AES_GCM_encrypt() 306 H = _mm_aesenclast_si128(tmp1, KEY[nr]); in AES_GCM_encrypt() [all …]
|
| /src/contrib/kyua/store/ |
| H A D | schema_v1.sql | 58 timestamp TIMESTAMP PRIMARY KEY CHECK (timestamp >= 0), 75 context_id INTEGER PRIMARY KEY AUTOINCREMENT, 88 PRIMARY KEY (context_id, var_name) 104 action_id INTEGER PRIMARY KEY AUTOINCREMENT, 137 test_program_id INTEGER PRIMARY KEY AUTOINCREMENT, 171 test_case_id INTEGER PRIMARY KEY AUTOINCREMENT, 183 test_case_id INTEGER PRIMARY KEY REFERENCES test_cases, 207 PRIMARY KEY (test_case_id, file_name) 225 test_case_id INTEGER PRIMARY KEY REFERENCES test_cases, 271 test_program_id INTEGER PRIMARY KEY REFERENCES test_programs, [all …]
|
| H A D | schema_v2.sql | 60 schema_version INTEGER PRIMARY KEY CHECK (schema_version >= 1), 77 context_id INTEGER PRIMARY KEY AUTOINCREMENT, 90 PRIMARY KEY (context_id, var_name) 106 action_id INTEGER PRIMARY KEY AUTOINCREMENT, 147 PRIMARY KEY (metadata_id, property_name) 171 test_program_id INTEGER PRIMARY KEY AUTOINCREMENT, 213 test_case_id INTEGER PRIMARY KEY AUTOINCREMENT, 233 test_case_id INTEGER PRIMARY KEY REFERENCES test_cases, 257 PRIMARY KEY (test_case_id, file_name) 271 file_id INTEGER PRIMARY KEY,
|
| H A D | schema_v3.sql | 60 schema_version INTEGER PRIMARY KEY CHECK (schema_version >= 1), 83 var_name TEXT PRIMARY KEY, 117 PRIMARY KEY (metadata_id, property_name) 141 test_program_id INTEGER PRIMARY KEY AUTOINCREMENT, 177 test_case_id INTEGER PRIMARY KEY AUTOINCREMENT, 195 test_case_id INTEGER PRIMARY KEY REFERENCES test_cases, 219 PRIMARY KEY (test_case_id, file_name) 233 file_id INTEGER PRIMARY KEY,
|
| /src/release/scripts/ |
| H A D | atlas-upload.sh | 51 KEY="${OPTARG}" 69 -z "${KEY}" -o \ 78 …T=$(/usr/local/bin/curl -s "${ATLAS_UPLOAD_URL}/api/v1/box/${USERNAME}/${BOX}?access_token=${KEY}") 86 …${ATLAS_UPLOAD_URL}/api/v1/boxes -X POST -d "box[name]=${BOX}" -d "access_token=${KEY}" > /dev/null 87 …pi/v1/box/${USERNAME}/${BOX} -X PUT -d "box[is_private]=false" -d "access_token=${KEY}" > /dev/null 88 …USERNAME}/${BOX} -X PUT -d "box[description]='${DESCRIPTION}'" -d "access_token=${KEY}" > /dev/null 94 …curl -s "${ATLAS_UPLOAD_URL}/api/v1/box/${USERNAME}/${BOX}/version/${VERSION}?access_token=${KEY}") 102 …NAME}/${BOX}/versions -X POST -d "version[version]=${VERSION}" -d "access_token=${KEY}" > /dev/null 103 …ion/${VERSION} -X PUT -d "version[description]=${DESCRIPTION}" -d "access_token=${KEY}" > /dev/null 104 …curl -s "${ATLAS_UPLOAD_URL}/api/v1/box/${USERNAME}/${BOX}/version/${VERSION}?access_token=${KEY}") [all …]
|
| /src/contrib/mtree/ |
| H A D | misc.c | 61 } KEY; typedef 64 static KEY keylist[] = { 97 static KEY typelist[] = { 120 KEY *k, tmp; in parsekey() 125 for (i = 0; i < sizeof(keylist) / sizeof(KEY); i++) in parsekey() 131 k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY), in parsekey() 132 sizeof(KEY), keycompare); in parsekey() 145 KEY *k, tmp; in parsetype() 148 k = (KEY *)bsearch(&tmp, typelist, sizeof(typelist) / sizeof(KEY), in parsetype() 149 sizeof(KEY), keycompare); in parsetype() [all …]
|
| /src/crypto/krb5/src/util/ |
| H A D | gen-map.pl | 16 * key: <KEY> 24 <KEY> key; 40 void (*free_key)(<KEY>) = <FREEKEY>; 54 <NAME>__find_node (struct <NAME>__head *head, <KEY> key) 64 <NAME>_find (struct <NAME>__head *head, <KEY> key) 73 <NAME>__copy_key (<KEY> *out, <KEY> in) 75 int (*copykey)(<KEY> *, <KEY>) = <COPYKEY>; 85 <KEY> key, <VALUE> new_value)
|
| /src/contrib/tcsh/nls/C/ |
| H A D | set20 | 14 12 Usage: bindkey [options] [--] [KEY [COMMAND]]\n 15 13 -a list or bind KEY in alternative key map\n 16 14 -b interpret KEY as a C-, M-, F- or X- key name\n 23 21 -r remove KEY's binding\n 24 22 -k interpret KEY as a symbolic arrow-key name\n 27 25 Without KEY or COMMAND, prints all bindings\n 28 26 Without COMMAND, prints the binding for KEY.\n 38 36 usage: bind [KEY | COMMAND KEY | "emacs" | "vi" | "-a"]\n
|
| /src/contrib/ntp/sntp/tests/ |
| H A D | crypto.c | 32 const char KEY[] = "SHAKE128 unit test key"; in test_MakeSHAKE128Mac() local 43 sk.key_len = sizeof(KEY) - 1; in test_MakeSHAKE128Mac() 44 memcpy(&sk.key_seq, KEY, min(sizeof(sk.key_seq), sk.key_len)); in test_MakeSHAKE128Mac() 131 const char KEY[] = "SHAKE128 unit test key"; in test_VerifySHAKE128() local 145 sk.key_len = sizeof(KEY) - 1; in test_VerifySHAKE128() 146 memcpy(&sk.key_seq, KEY, min(sizeof(sk.key_seq), sk.key_len)); in test_VerifySHAKE128() 250 const char KEY[] = "SHAKE128 unit test key"; in test_VerifyFailure() local 265 sk.key_len = sizeof(KEY) - 1; in test_VerifyFailure() 266 memcpy(&sk.key_seq, KEY, min(sizeof(sk.key_seq), sk.key_len)); in test_VerifyFailure() 294 const char KEY[] = "SHAKE128 unit test key"; in test_PacketSizeNotMultipleOfFourBytes() local [all …]
|
| /src/crypto/openssl/crypto/rc4/asm/ |
| H A D | rc4-c64xplus.pl | 28 ($KEY,$LEN,$INP,$OUT)=("A4","B4","A6","B6"); 52 ||[B0] ADD $KEY,2,$KEYA 53 ||[B0] ADD $KEY,2,$KEYB 112 ADD $KEY,2,$KEYA 113 || ADD $KEY,2,$KEYB 117 STH $TX,*${KEY}++ ; key->x=key->y=0 125 STNW A0,*${KEY}++
|
| /src/contrib/tcsh/nls/ukrainian/ |
| H A D | set20 | 15 13 -a list or bind KEY in alternative key map\n 16 14 -b interpret KEY as a C-, M-, F- or X- key name\n 23 21 -r remove KEY's binding\n 24 22 -k interpret KEY as a symbolic arrow-key name\n 27 25 Without KEY or COMMAND, prints all bindings\n 28 26 Without COMMAND, prints the binding for KEY.\n 38 36 Використання: bind [KEY | COMMAND KEY | "emacs" | "vi" | "-a"]\n
|
| /src/crypto/openssl/crypto/chacha/asm/ |
| H A D | chacha-riscv64-v-zbb.pl | 71 my ( $OUTPUT, $INPUT, $LEN, $KEY, $COUNTER ) = ( "a0", "a1", "a2", "a3", "a4" ); 290 lw $KEY0, 0($KEY) 294 lw $KEY1, 4($KEY) 296 lw $KEY2, 8($KEY) 298 lw $KEY3, 12($KEY) 300 lw $KEY4, 16($KEY) 302 lw $KEY5, 20($KEY) 304 lw $KEY6, 24($KEY) 306 lw $KEY7, 28($KEY) 375 lw $T0, 0($KEY) [all …]
|