| /src/sys/crypto/aesni/ |
| H A D | intel_sha1.c | 68 __m128i msg0, msg1, msg2, msg3; in intel_sha1_step() local 108 msg2 = _mm_loadu_si128((const __m128i*) (data+32)); in intel_sha1_step() 109 msg2 = _mm_shuffle_epi8(msg2, shuf_mask); in intel_sha1_step() 110 e0 = _mm_sha1nexte_epu32(e0, msg2); in intel_sha1_step() 113 msg1 = _mm_sha1msg1_epu32(msg1, msg2); in intel_sha1_step() 114 msg0 = _mm_xor_si128(msg0, msg2); in intel_sha1_step() 123 msg2 = _mm_sha1msg1_epu32(msg2, msg3); in intel_sha1_step() 132 msg2 = _mm_xor_si128(msg2, msg0); in intel_sha1_step() 137 msg2 = _mm_sha1msg2_epu32(msg2, msg1); in intel_sha1_step() 143 e0 = _mm_sha1nexte_epu32(e0, msg2); in intel_sha1_step() [all …]
|
| /src/crypto/openssl/test/ |
| H A D | membio_test.c | 19 const char msg2[] = "abcdefghijklmno"; in test_dgram() local 42 if (!TEST_int_eq(BIO_write(bio, msg2, sizeof(msg2)), sizeof(msg2))) in test_dgram() 52 || !TEST_int_eq(BIO_read(bio, buf, sizeof(buf)), sizeof(msg2)) in test_dgram() 53 || !TEST_mem_eq(buf, sizeof(msg2), msg2, sizeof(msg2)) in test_dgram() 63 if (!TEST_int_eq(BIO_write(bio, msg2, sizeof(msg2)), sizeof(msg2))) in test_dgram() 70 if (!TEST_int_eq(BIO_read(bio, buf, sizeof(buf)), sizeof(msg2)) in test_dgram() 71 || !TEST_mem_eq(buf, sizeof(msg2), msg2, sizeof(msg2)) in test_dgram() 82 if (!TEST_int_eq(BIO_write(bio, msg2, sizeof(msg2)), sizeof(msg2))) in test_dgram() 87 if (!TEST_int_eq(BIO_read(bio, buf, sizeof(buf)), sizeof(msg2)) in test_dgram() 88 || !TEST_mem_eq(buf, sizeof(msg2), msg2, sizeof(msg2))) in test_dgram()
|
| H A D | quic_client_test.c | 19 static char msg2[16000]; variable 130 if (c_write_done && !c_shutdown && c_total_read < sizeof(msg2) - 1) { in test_quic_client_ex() 131 ret = SSL_read_ex(c_ssl, msg2 + c_total_read, in test_quic_client_ex() 132 sizeof(msg2) - 1 - c_total_read, &l); in test_quic_client_ex() 136 TEST_info("Message:\n%s\n", msg2); in test_quic_client_ex() 143 if (!TEST_size_t_lt(c_total_read, sizeof(msg2) - 1)) in test_quic_client_ex()
|
| H A D | ml_dsa_test.c | 367 static uint8_t msg2[2048] = { 0 }; variable 385 { msg2, sizeof(msg2), NULL, 0, 0, 1 }, 386 { msg2, sizeof(msg2), NULL, 0, 1, 1 }, 387 { msg2, sizeof(msg2), ctx1, sizeof(ctx1), 0, 1 }, 388 { msg2, sizeof(msg2), ctx1, sizeof(ctx1), 1, 1 }, 389 { msg2, sizeof(msg2), ctx2, sizeof(ctx2), 0, 0 }, 390 { msg2, sizeof(msg2), ctx2, sizeof(ctx2), 1, 0 },
|
| H A D | quic_tserver_test.c | 21 static char msg2[1024], msg3[1024]; variable 245 (unsigned char *)msg2 + s_total_read, in do_test() 246 sizeof(msg2) - s_total_read, &l)) { in do_test() 250 if (!TEST_mem_eq(msg1, sizeof(msg1) - 1, msg2, s_total_read)) in do_test() 264 (unsigned char *)msg2 + s_total_written, in do_test()
|
| H A D | curve448_internal_test.c | 145 static const uint8_t msg2[1] = { variable 603 || !TEST_true(ossl_ed448_sign(NULL, outsig, msg2, sizeof(msg2), in test_ed448()
|
| /src/contrib/netbsd-tests/lib/libc/sys/ |
| H A D | t_msgrcv.c | 82 struct msg msg2 = { MSG_MTYPE_1, { 'x', 'y', 'z' } }; in ATF_TC_BODY() local 89 (void)msgrcv(id, &msg2, MSG_LEN, MSG_MTYPE_1, IPC_NOWAIT); in ATF_TC_BODY() 91 ATF_CHECK(msg1.buf[0] == msg2.buf[0]); in ATF_TC_BODY() 92 ATF_CHECK(msg1.buf[1] == msg2.buf[1]); in ATF_TC_BODY() 93 ATF_CHECK(msg1.buf[2] == msg2.buf[2]); in ATF_TC_BODY() 211 struct msg msg2 = { MSG_MTYPE_3, { 'x', 'y', 'z' } }; in ATF_TC_BODY() local 218 (void)msgrcv(id, &msg2, MSG_LEN, MSG_MTYPE_2, IPC_NOWAIT); in ATF_TC_BODY() 220 ATF_CHECK(msg1.buf[0] != msg2.buf[0]); /* Different mtype. */ in ATF_TC_BODY() 221 ATF_CHECK(msg1.buf[1] != msg2.buf[1]); in ATF_TC_BODY() 222 ATF_CHECK(msg1.buf[2] != msg2.buf[2]); in ATF_TC_BODY() [all …]
|
| /src/contrib/netbsd-tests/lib/csu/ |
| H A D | h_initfini_common.cxx | 17 static const char msg2[] = "stack unaligned \n"; in Test() local 18 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in Test() 29 static const char msg2[] = "stack unaligned \n"; in ~Test() local 30 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in ~Test()
|
| H A D | h_initfini3.cxx | 9 static const char msg2[] = "main after dlopen\n"; in main() local 18 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in main()
|
| /src/contrib/netbsd-tests/lib/csu/dso/ |
| H A D | h_initfini3_dso.cxx | 17 static const char msg2[] = "stack unaligned \n"; in Test2() local 18 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in Test2() 29 static const char msg2[] = "stack unaligned \n"; in ~Test2() local 30 write(STDOUT_FILENO, msg2, sizeof(msg2) - 1); in ~Test2()
|
| /src/lib/libmd/aarch64/ |
| H A D | sha1block.S | 309 msg2 .req v18 label 329 ld1 {msg0.4s, msg1.4s, msg2.4s, msg3.4s}, [buf], #64 332 rev32 msg2.16b, msg2.16b 341 add tmp0.4s, msg2.4s, k0.4s 342 sha1su0 msg0.4s, msg1.4s, msg2.4s 349 sha1su0 msg1.4s, msg2.4s, msg3.4s 356 sha1su0 msg2.4s, msg3.4s, msg0.4s 362 sha1su1 msg2.4s, msg1.4s 368 add tmp0.4s, msg2.4s, k1.4s 369 sha1su1 msg3.4s, msg2.4s [all …]
|
| /src/contrib/ntp/sntp/libevent/test/ |
| H A D | regress_rpc.c | 736 struct msg *msg = NULL, *msg2 = NULL; in rpc_test() local 797 msg2 = msg_new(); in rpc_test() 798 if (evtag_unmarshal_msg(tmp, 0xdeaf, msg2) == -1) in rpc_test() 807 if (!EVTAG_HAS(msg2, from_name) || in rpc_test() 808 !EVTAG_HAS(msg2, to_name) || in rpc_test() 809 !EVTAG_HAS(msg2, attack)) { in rpc_test() 813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test() 817 if (EVTAG_ARRAY_LEN(msg2, run) != i) { in rpc_test() 822 if (EVTAG_ARRAY_GET(msg2, run, 0, &run) == -1) { in rpc_test() 876 if (msg2) in rpc_test() [all …]
|
| /src/contrib/libevent/test/ |
| H A D | regress_rpc.c | 736 struct msg *msg = NULL, *msg2 = NULL; in rpc_test() local 797 msg2 = msg_new(); in rpc_test() 798 if (evtag_unmarshal_msg(tmp, 0xdeaf, msg2) == -1) in rpc_test() 807 if (!EVTAG_HAS(msg2, from_name) || in rpc_test() 808 !EVTAG_HAS(msg2, to_name) || in rpc_test() 809 !EVTAG_HAS(msg2, attack)) { in rpc_test() 813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test() 817 if (EVTAG_ARRAY_LEN(msg2, run) != i) { in rpc_test() 822 if (EVTAG_ARRAY_GET(msg2, run, 0, &run) == -1) { in rpc_test() 876 if (msg2) in rpc_test() [all …]
|
| /src/sys/dev/bnxt/bnxt_en/ |
| H A D | bnxt_mgmt.c | 169 struct bnxt_mgmt_fw_msg msg_temp, *msg, *msg2 = NULL; in bnxt_mgmt_process_hwrm() local 228 msg2 = malloc(size, M_BNXT, M_WAITOK | M_ZERO); in bnxt_mgmt_process_hwrm() 230 if (copyin((void *)mgmt_req.req.hreq, msg2, size)) { in bnxt_mgmt_process_hwrm() 236 msg = msg2; in bnxt_mgmt_process_hwrm() 293 if (msg2) in bnxt_mgmt_process_hwrm() 294 free(msg2, M_BNXT); in bnxt_mgmt_process_hwrm()
|
| /src/contrib/googletest/googletest/test/ |
| H A D | googletest-message-test.cc | 70 const Message msg2(msg1); in TEST() local 71 EXPECT_EQ("Hello", msg2.GetString()); in TEST()
|
| H A D | googletest-death-test-test.cc | 1279 Message msg2; in TEST() local 1280 msg2 << kBiggestSignedParsableMax; in TEST() 1283 EXPECT_TRUE(ParseNaturalNumber(msg2.GetString(), &signed_result)); in TEST()
|
| /src/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | kerberos5.c | 521 const char *msg2 = "user is not authorized to login"; in kerberos5_is() local 529 msg2 = msg; in kerberos5_is() 530 Data(ap, KRB_REJECT, (void *)msg2, -1); in kerberos5_is()
|
| /src/contrib/byacc/test/ |
| H A D | expr.oxout.y | 186 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local 208 msg2 = " Have to modify evaluator: -Y%c%ld.\n"; in yyyHandleOverflow() 209 fprintf(stderr,msg2,which,newSize); in yyyHandleOverflow()
|
| /src/crypto/openssl/demos/http3/ |
| H A D | ossl-nghttp3-demo-server.c | 345 uint8_t msg2[16000]; in quic_server_read() local 346 size_t l = sizeof(msg2); in quic_server_read() 351 ret = SSL_read(stream, msg2, l); in quic_server_read() 370 r = nghttp3_conn_read_stream(h3conn, id, msg2, ret, 0); in quic_server_read()
|
| /src/contrib/wpa/src/eap_peer/ |
| H A D | eap_aka.c | 470 const struct wpabuf *msg2) in eap_aka_add_id_msg() argument 477 if (msg2) in eap_aka_add_id_msg() 478 len += wpabuf_len(msg2); in eap_aka_add_id_msg() 489 if (msg2) in eap_aka_add_id_msg() 490 wpabuf_put_buf(data->id_msgs, msg2); in eap_aka_add_id_msg()
|
| /src/contrib/unbound/util/data/ |
| H A D | msgreply.c | 670 struct query_info* msg2 = (struct query_info*)m2; in query_info_compare() local 673 COMPARE_IT(msg1->qtype, msg2->qtype); in query_info_compare() 674 if((mc = query_dname_compare(msg1->qname, msg2->qname)) != 0) in query_info_compare() 676 log_assert(msg1->qname_len == msg2->qname_len); in query_info_compare() 677 COMPARE_IT(msg1->qclass, msg2->qclass); in query_info_compare()
|
| /src/crypto/openssh/ |
| H A D | sshconnect.c | 1191 char *msg1 = NULL, *msg2 = NULL; in check_host_key() local 1219 if ((msg2 = other_hostkeys_message(host, ip, host_key, in check_host_key() 1222 xextendf(&msg1, "\n", "%s", msg2); in check_host_key() 1232 free(msg2); in check_host_key()
|
| /src/contrib/byacc/test/yacc/ |
| H A D | expr.oxout.tab.c | 385 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local 407 msg2 = " Have to modify evaluator: -Y%c%ld.\n"; in yyyHandleOverflow() 408 fprintf(stderr,msg2,which,newSize); in yyyHandleOverflow()
|
| /src/contrib/byacc/test/btyacc/ |
| H A D | expr.oxout.tab.c | 535 {char *msg1 = "?", *msg2; in yyyHandleOverflow() local 557 msg2 = " Have to modify evaluator: -Y%c%ld.\n"; in yyyHandleOverflow() 558 fprintf(stderr,msg2,which,newSize); in yyyHandleOverflow()
|
| /src/sys/kern/ |
| H A D | uipc_mqueue.c | 1760 struct mqueue_msg *msg2; in _mqueue_send() local 1787 TAILQ_FOREACH(msg2, &mq->mq_msgq, msg_link) { in _mqueue_send() 1788 if (msg2->msg_prio < msg->msg_prio) in _mqueue_send() 1791 TAILQ_INSERT_BEFORE(msg2, msg, msg_link); in _mqueue_send()
|