Searched refs:alice (Results 1 – 7 of 7) sorted by relevance
| /src/crypto/openssl/fuzz/ |
| H A D | ml-kem.c | 409 EVP_PKEY *alice = (EVP_PKEY *)key1; in mlkem_kex() local 415 do_derive(alice, bob, &aliceshare, &alicelen); in mlkem_kex() 416 do_derive(bob, alice, &bobshare, &boblen); in mlkem_kex() 446 EVP_PKEY *alice = (EVP_PKEY *)key1; in mlkem_export_import() local 451 if (!EVP_PKEY_todata(alice, EVP_PKEY_KEYPAIR, ¶ms)) { in mlkem_export_import() 456 ctx = EVP_PKEY_CTX_new_from_pkey(NULL, alice, NULL); in mlkem_export_import() 491 EVP_PKEY *alice = (EVP_PKEY *)key1; in mlkem_compare() local 494 EVP_PKEY_eq(alice, alice); in mlkem_compare() 495 EVP_PKEY_eq(alice, bob); in mlkem_compare()
|
| H A D | ml-dsa.c | 462 EVP_PKEY *alice = (EVP_PKEY *)key1; in ml_dsa_export_import() local 467 if (!EVP_PKEY_todata(alice, EVP_PKEY_KEYPAIR, ¶ms)) { in ml_dsa_export_import() 472 ctx = EVP_PKEY_CTX_new_from_pkey(NULL, alice, NULL); in ml_dsa_export_import() 507 EVP_PKEY *alice = (EVP_PKEY *)key1; in ml_dsa_compare() local 510 EVP_PKEY_eq(alice, alice); in ml_dsa_compare() 511 EVP_PKEY_eq(alice, bob); in ml_dsa_compare()
|
| H A D | slh-dsa.c | 421 EVP_PKEY *alice = (EVP_PKEY *)key1; in slh_dsa_export_import() local 427 OPENSSL_assert(EVP_PKEY_todata(alice, EVP_PKEY_KEYPAIR, ¶ms) == 1); in slh_dsa_export_import() 429 ctx = EVP_PKEY_CTX_new_from_pkey(NULL, alice, NULL); in slh_dsa_export_import() 445 OPENSSL_assert(EVP_PKEY_eq(alice, new) == 1); in slh_dsa_export_import() 470 rc = EVP_PKEY_eq(alice, new); in slh_dsa_export_import()
|
| /src/contrib/sendmail/cf/siteconfig/ |
| H A D | uucp.ucbvax.m4 | 3 SITE(alice)
|
| /src/share/examples/pf/ |
| H A D | faq-example2 | 53 alice = "192.168.0.2"
|
| /src/contrib/ntp/util/ |
| H A D | ntp-keygen-opts.def | 740 On trusted host alice run 759 by trusted host alice. 773 On trusted host alice run 796 After generating the parameter file, on alice run 816 On trusted host alice run 847 For illustration assume trish is the TA, alice one of several trusted hosts 866 Copy the parameter file to alice and install a soft link 870 Copy one of the client key files to alice for later distribution 872 It does not matter which client key file goes to alice,
|
| H A D | invoke-ntp-keygen.texi | 474 On trusted host alice run 493 by trusted host alice. 507 On trusted host alice run 530 After generating the parameter file, on alice run 550 On trusted host alice run 581 For illustration assume trish is the TA, alice one of several trusted hosts 600 Copy the parameter file to alice and install a soft link 604 Copy one of the client key files to alice for later distribution 606 It does not matter which client key file goes to alice,
|