| /src/crypto/openssl/crypto/des/ |
| H A D | str2key.c | 46 void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2) in DES_string_to_2keys() argument 52 memset(key2, 0, 8); in DES_string_to_2keys() 61 (*key2)[i % 8] ^= (j << 1); in DES_string_to_2keys() 69 (*key2)[7 - (i % 8)] ^= j; in DES_string_to_2keys() 73 memcpy(key2, key1, 8); in DES_string_to_2keys() 75 DES_set_odd_parity(key2); in DES_string_to_2keys() 78 DES_set_key_unchecked(key2, &ks); in DES_string_to_2keys() 79 DES_cbc_cksum((const unsigned char *)str, key2, length, &ks, key2); in DES_string_to_2keys() 82 DES_set_odd_parity(key2); in DES_string_to_2keys()
|
| /src/crypto/openssl/test/ |
| H A D | igetest.c | 82 const unsigned char key2[32]; member 195 AES_KEY key2; in test_bi_ige_vectors() local 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 209 AES_bi_ige_encrypt(v->in, buf, v->length, &key1, &key2, v->iv, in test_bi_ige_vectors() 214 test_output_memory("key 2", v->key2, sizeof(v->key2)); in test_bi_ige_vectors() 329 AES_KEY key, key2; in test_bi_ige_enc_dec() local 336 AES_set_encrypt_key(rkey2, 8 * sizeof(rkey2), &key2); in test_bi_ige_enc_dec() 337 AES_bi_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, &key2, iv, in test_bi_ige_enc_dec() 341 AES_set_decrypt_key(rkey2, 8 * sizeof(rkey2), &key2); in test_bi_ige_enc_dec() [all …]
|
| H A D | pkcs12_api_test.c | 68 EVP_PKEY *key2 = NULL; in changepass() local 83 if (!TEST_true(PKCS12_parse(p12new, "NEWPASS", &key2, &cert2, &ca2))) in changepass() 86 if (!TEST_ptr(key2) || !TEST_int_eq(EVP_PKEY_eq(key, key2), 1)) in changepass() 97 EVP_PKEY_free(key2); in changepass()
|
| /src/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_cf2.in | 3 key2 8 key2 13 key2 18 key2 23 key2 28 key2
|
| /src/crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/ |
| H A D | passtest.c | 14 char *key_line, *val_line, *get_key, *get_val, *old, *key2; in main() local 121 key2 = (char *)malloc(100); in main() 132 key2 = fgets(get_key, 100, keys); in main() 133 if (!key2) in main() 135 key.data = (void *)key2; in main() 136 key.size = strlen(key2); in main() 143 free(key2); in main() 148 key2 = (char *)malloc(100); in main() 160 key2 = fgets(key2, 100, keys); in main() 161 if (!key2) in main() [all …]
|
| /src/crypto/openssl/fuzz/ |
| H A D | ml-kem.c | 141 void **key1, void **key2) in create_mlkem_raw_key() argument 203 void **key1, void **key2) in keygen_mlkem_real_key() argument 210 *key1 = *key2 = NULL; in keygen_mlkem_real_key() 246 key = (EVP_PKEY **)key2; in keygen_mlkem_real_key() 406 static void mlkem_kex(uint8_t **buf, size_t *len, void *key1, void *key2, in mlkem_kex() argument 410 EVP_PKEY *bob = (EVP_PKEY *)key2; in mlkem_kex() 444 void *key2, void **out1, void **out2) in mlkem_export_import() argument 489 void *key2, void **out1, void **out2) in mlkem_compare() argument 492 EVP_PKEY *bob = (EVP_PKEY *)key2; in mlkem_compare() 512 static void cleanup_mlkem_keys(void *key1, void *key2, in cleanup_mlkem_keys() argument [all …]
|
| H A D | ml-dsa.c | 160 void **key1, void **key2) in create_ml_dsa_raw_key() argument 277 void **key1, void **key2) in keygen_ml_dsa_real_key() argument 280 || !keygen_ml_dsa_real_key_helper(buf, len, (EVP_PKEY **)key2)) in keygen_ml_dsa_real_key() 460 void *key2, void **out1, void **out2) in ml_dsa_export_import() argument 505 void *key2, void **out1, void **out2) in ml_dsa_compare() argument 508 EVP_PKEY *bob = (EVP_PKEY *)key2; in ml_dsa_compare() 528 static void cleanup_ml_dsa_keys(void *key1, void *key2, in cleanup_ml_dsa_keys() argument 532 EVP_PKEY_free((EVP_PKEY *)key2); in cleanup_ml_dsa_keys()
|
| /src/crypto/openssl/include/crypto/ |
| H A D | aes_platform.h | 41 const AES_KEY *key2, const unsigned char iv[16]); 44 const AES_KEY *key2, const unsigned char iv[16]); 55 const AES_KEY *key1, const AES_KEY *key2, 58 const AES_KEY *key1, const AES_KEY *key2, 228 const AES_KEY *key1, const AES_KEY *key2, 234 const AES_KEY *key1, const AES_KEY *key2, 241 const AES_KEY *key2, 245 const AES_KEY *key2, 250 const AES_KEY *key2, 254 const AES_KEY *key2, [all …]
|
| H A D | sm4_platform.h | 88 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 91 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 112 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 116 const SM4_KEY *key2, const unsigned char ivec[16],
|
| /src/sys/contrib/libsodium/test/default/ |
| H A D | auth.c | 10 static unsigned char key2[] = variable 46 crypto_auth_hmacsha512_init(&st, key2, sizeof key2); in main() 57 crypto_auth_hmacsha256_init(&st256, key2, sizeof key2); in main()
|
| H A D | aead_xchacha20poly1305.c | 32 …unsigned char *key2 = (unsigned char *) sodium_malloc(crypto_aead_xchacha20poly1305_ietf_KEYBYTES); in tv() local 165 crypto_aead_xchacha20poly1305_ietf_keygen(key2); in tv() 167 NULL, 0U, nonce, key2) == 0) { in tv() 173 sodium_free(key2); in tv()
|
| /src/contrib/unbound/util/data/ |
| H A D | packed_rrset.c | 98 struct ub_packed_rrset_key* key2 = (struct ub_packed_rrset_key*)k2; in ub_rrset_compare() local 100 if(key1 == key2) in ub_rrset_compare() 102 if(key1->rk.type != key2->rk.type) { in ub_rrset_compare() 103 if(key1->rk.type < key2->rk.type) in ub_rrset_compare() 107 if(key1->rk.dname_len != key2->rk.dname_len) { in ub_rrset_compare() 108 if(key1->rk.dname_len < key2->rk.dname_len) in ub_rrset_compare() 112 if((c=query_dname_compare(key1->rk.dname, key2->rk.dname)) != 0) in ub_rrset_compare() 114 if(key1->rk.rrset_class != key2->rk.rrset_class) { in ub_rrset_compare() 115 if(key1->rk.rrset_class < key2->rk.rrset_class) in ub_rrset_compare() 119 if(key1->rk.flags != key2->rk.flags) { in ub_rrset_compare() [all …]
|
| /src/crypto/openssl/crypto/sm4/asm/ |
| H A D | sm4-armv8.pl | 146 my ($key0,$key1,$key2,$key3,$key4,$key5,$key6,$key7)=map("v$_",(0..7)); 169 sm4ekey $key2.4S,$key1.4S,$const2.4S 170 sm4ekey $key3.4S,$key2.4S,$const3.4S 172 st1 {$key0.4s,$key1.4s,$key2.4s,$key3.4s},[$keys],64 185 my ($key7,$key6,$key5,$key4,$key3,$key2,$key1,$key0)=map("v$_",(0..7)); 208 sm4ekey $key2.4S,$key1.4S,$const2.4S 213 sm4ekey $key3.4S,$key2.4S,$const3.4S 215 rev64 $key2.4s,$key2.4s 217 ext $key2.16b,$key2.16b,$key2.16b,#8 231 st1 {$key3.4s,$key2.4s,$key1.4s,$key0.4s},[$keys]
|
| /src/sys/compat/linux/ |
| H A D | linux_futex.c | 628 struct umtx_key key, key2; in linux_futex_wakeop() local 638 error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2); in linux_futex_wakeop() 652 umtxq_lock(&key2); in linux_futex_wakeop() 653 count = umtxq_count(&key2); in linux_futex_wakeop() 655 ret += umtxq_signal_mask(&key2, nrwake, args->val3); in linux_futex_wakeop() 658 umtxq_unlock(&key2); in linux_futex_wakeop() 663 umtx_key_release(&key2); in linux_futex_wakeop() 672 struct umtx_key key, key2; in linux_futex_requeue() local 695 error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2); in linux_futex_requeue() 709 umtxq_lock(&key2); in linux_futex_requeue() [all …]
|
| /src/crypto/openssl/providers/implementations/keymgmt/ |
| H A D | mac_legacy_kmgmt.c | 158 const MAC_KEY *key2 = keydata2; in mac_match() local 165 if ((key1->priv_key == NULL && key2->priv_key != NULL) in mac_match() 166 || (key1->priv_key != NULL && key2->priv_key == NULL) in mac_match() 167 || key1->priv_key_len != key2->priv_key_len in mac_match() 168 || (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL) in mac_match() 169 || (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL)) in mac_match() 173 || CRYPTO_memcmp(key1->priv_key, key2->priv_key, key1->priv_key_len) == 0); in mac_match() 175 … ok = ok && EVP_CIPHER_is_a(key1->cipher.cipher, EVP_CIPHER_get0_name(key2->cipher.cipher)); in mac_match()
|
| /src/lib/libc/iconv/ |
| H A D | citrus_pivot_factory.c | 109 char key1[LINE_MAX], key2[LINE_MAX], data[LINE_MAX]; in convert_line() local 137 snprintf(key2, sizeof(key2), "%.*s", (int)(p - line), line); in convert_line() 152 return (_db_factory_add32_by_s(se->se_df, key2, val)); in convert_line()
|
| /src/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_sm4_xts.c | 110 if (in->xts.key2 != NULL) { in sm4_xts_dupctx() 111 if (in->xts.key2 != &in->ks2) in sm4_xts_dupctx() 128 || ctx->xts.key2 == NULL in sm4_xts_cipher() 147 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher() 154 (*ctx->stream_gb)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher()
|
| H A D | cipher_aes_xts_hw.c | 35 xctx->xts.key2 = &xctx->ks2; \ 98 dctx->xts.key2 = &dctx->ks2.ks; in cipher_hw_aes_xts_copyctx() 111 const AES_KEY *key1, const AES_KEY *key2, in cipher_hw_aesni_xts_initkey() 116 const AES_KEY *key1, const AES_KEY *key2, in cipher_hw_aesni_xts_initkey()
|
| /src/sys/contrib/dev/ath/ath_hal/ar9300/ |
| H A D | ar9300_keycache.c | 194 u_int32_t key0, key1, key2, key3, key4; in ar9300_set_key_cache_entry() local 259 key2 = LE_READ_4(k->kv_val + 6) ^ xor_mask; in ar9300_set_key_cache_entry() 299 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar9300_set_key_cache_entry() 365 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar9300_set_key_cache_entry() 450 u_int32_t key0, key1, key2, key3, key4; in ar9300_check_key_cache_entry() local 509 key2 = LE_READ_4(k->kv_val + 6) ^ xorMask; in ar9300_check_key_cache_entry() 533 (OS_REG_READ(ah, AR_KEYTABLE_KEY2(entry)) == key2) && in ar9300_check_key_cache_entry() 582 (OS_REG_READ(ah, AR_KEYTABLE_KEY2(entry)) == key2) && in ar9300_check_key_cache_entry()
|
| /src/contrib/libucl/tests/basic/ |
| H A D | 18.in | 24 key2 = "wtf??" 30 key2 = "OMG" # low priority
|
| H A D | 2.res | 24 key2 = 60.0; 25 key2 = "/some/path";
|
| H A D | 2.in | 7 key2 = 1min 15 key2 = /some/path;
|
| /src/crypto/openssl/crypto/slh_dsa/ |
| H A D | slh_dsa_key.c | 189 int ossl_slh_dsa_key_equal(const SLH_DSA_KEY *key1, const SLH_DSA_KEY *key2, in ossl_slh_dsa_key_equal() argument 195 if (key1->params != key2->params) in ossl_slh_dsa_key_equal() 200 if (key1->pub != NULL && key2->pub != NULL) { in ossl_slh_dsa_key_equal() 201 if (memcmp(key1->pub, key2->pub, key1->params->pk_len) != 0) in ossl_slh_dsa_key_equal() 208 if (key1->has_priv && key2->has_priv) { in ossl_slh_dsa_key_equal() 209 if (memcmp(key1->priv, key2->priv, in ossl_slh_dsa_key_equal()
|
| /src/sys/dev/ath/ath_hal/ar5210/ |
| H A D | ar5210_keycache.c | 112 uint32_t key0, key1, key2, key3, key4; in ar5210SetKeyCacheEntry() local 137 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; in ar5210SetKeyCacheEntry() 151 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar5210SetKeyCacheEntry()
|
| /src/sys/dev/ath/ath_hal/ar5211/ |
| H A D | ar5211_keycache.c | 119 uint32_t key0, key1, key2, key3, key4; in ar5211SetKeyCacheEntry() local 158 key2 = LE_READ_4(k->kv_val+6) ^ xorMask; in ar5211SetKeyCacheEntry() 172 OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ar5211SetKeyCacheEntry()
|