| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_shorthash/siphash24/ref/ |
| shorthash_siphash24_ref.c | 16 uint64_t k1 = LOAD64_LE(k + 8); local 22 v3 ^= k1; 24 v1 ^= k1;
|
| shorthash_siphashx24_ref.c | 15 uint64_t k1 = LOAD64_LE(k + 8); local 21 v3 ^= k1; 23 v1 ^= k1;
|
| /src/sys/opencrypto/ |
| aesxcbcmac.c | 53 uint8_t k1[AES_BLOCKSIZE]; local 69 aes_enc(&r_ks, k1seed, k1, ctx->r_nr); 72 aes_setenckey128(&ctx->r_k1s, k1); 75 explicit_memset(k1, 0, sizeof(k1));
|
| /src/tests/lib/libc/gen/ |
| t_ftok.c | 65 key_t k1, k2, k3; local 75 k1 = ftok(path, key); 79 ATF_REQUIRE(k1 != -1); 83 if (k1 != k2) 86 if (k1 != k3)
|
| /src/sys/crypto/chacha/ |
| chacha_selftest.c | 82 static const uint8_t k1[32] = { 111 (*ci->ci_chacha_core)(out, in1, k1, chacha_const32, 12); 80 static const uint8_t k1[32] = { local
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| box_easy2.c | 20 unsigned char *k1; local 43 k1 = (unsigned char *) sodium_malloc(crypto_box_BEFORENMBYTES); 79 ret = crypto_box_beforenm(k1, small_order_p, bobsk); 84 ret = crypto_box_beforenm(k1, alicepk, bobsk); 91 if (crypto_box_easy_afternm(c, m, 0, nonce, k1) != 0) { 96 crypto_box_easy_afternm(c, m, (unsigned long long) mlen, nonce, k1); 128 k1); 141 sodium_free(k1);
|
| /src/external/bsd/nsd/dist/ |
| siphash.c | 85 uint64_t k1 = U8TO64_LE(k + 8); local 91 v3 ^= k1; 93 v1 ^= k1;
|
| /src/external/bsd/unbound/dist/util/ |
| siphash.c | 98 uint64_t k1 = U8TO64_LE(k + 8); local 108 v3 ^= k1; 110 v1 ^= k1;
|
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/rtl/ |
| tsan_posix.cc | 61 thread_key k1 = thread_key(key, &mtx, 42, &cnt); local 64 EXPECT_EQ(__interceptor_pthread_create(&th[0], 0, dtors_thread, &k1), 0);
|
| /src/crypto/external/apache2/openssl/dist/crypto/siphash/ |
| siphash.c | 109 uint64_t k1 = U8TO64_LE(k + 8); local 126 ctx->v1 = 0x646f72616e646f6dULL ^ k1; 128 ctx->v3 = 0x7465646279746573ULL ^ k1;
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| test_fx.c | 120 krb5_keyblock k1, k2, k3; local 140 &k1); 144 ret = krb5_crypto_init(context, &k1, 0, &c1); 197 krb5_free_keyblock_contents(context, &k1);
|
| /src/crypto/external/bsd/openssl/dist/crypto/cmac/ |
| cmac.c | 26 /* Keys k1 and k2 */ 27 unsigned char k1[EVP_MAX_BLOCK_LENGTH]; member in struct:CMAC_CTX_st 37 /* Make temporary keys K1 and K2 */ 39 static void make_kn(unsigned char *k1, const unsigned char *l, int bl) 46 k1[i] = (c << 1) | ((cnext = l[i + 1]) >> 7); 49 k1[i] = (c << 1) ^ ((0 - carry) & (bl == 16 ? 0x87 : 0x1b)); 73 OPENSSL_cleanse(ctx->k1, EVP_MAX_BLOCK_LENGTH); 103 memcpy(out->k1, in->k1, bl); 150 make_kn(ctx->k1, ctx->tbl, bl) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/siphash/ |
| siphash.c | 112 uint64_t k1 = U8TO64_LE(k + 8); local 129 ctx->v1 = 0x646f72616e646f6dULL ^ k1; 131 ctx->v3 = 0x7465646279746573ULL ^ k1;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cmac/ |
| cmac.c | 20 /* Keys k1 and k2 */ 21 unsigned char k1[EVP_MAX_BLOCK_LENGTH]; member in struct:CMAC_CTX_st 31 /* Make temporary keys K1 and K2 */ 33 static void make_kn(unsigned char *k1, const unsigned char *l, int bl) 40 k1[i] = (c << 1) | ((cnext = l[i + 1]) >> 7); 43 k1[i] = (c << 1) ^ ((0 - carry) & (bl == 16 ? 0x87 : 0x1b)); 67 OPENSSL_cleanse(ctx->k1, EVP_MAX_BLOCK_LENGTH); 95 memcpy(out->k1, in->k1, bl); 140 make_kn(ctx->k1, ctx->tbl, bl) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/siphash/ |
| siphash.c | 117 uint64_t k1 = U8TO64_LE(k + 8); local 134 ctx->v1 = 0x646f72616e646f6dULL ^ k1; 136 ctx->v3 = 0x7465646279746573ULL ^ k1;
|
| /src/external/bsd/unbound/dist/testcode/ |
| unitecs.c | 214 addrkey_t k1[] = {0x55, 0x55, 0x5A}; local 217 unit_assert( !unittest_wrapper_addrtree_issub(k1, 24, k2, 24, 0) ); 218 unit_assert( unittest_wrapper_addrtree_issub(k1, 8, k2, 16, 0) ); 219 unit_assert( unittest_wrapper_addrtree_issub(k2, 12, k1, 13, 0) ); 220 unit_assert( !unittest_wrapper_addrtree_issub(k1, 16, k2, 12, 0) ); 221 unit_assert( unittest_wrapper_addrtree_issub(k1, 12, k2, 12, 0) ); 222 unit_assert( !unittest_wrapper_addrtree_issub(k1, 13, k2, 13, 0) ); 223 unit_assert( unittest_wrapper_addrtree_issub(k1, 24, k2, 24, 13) ); 224 unit_assert( !unittest_wrapper_addrtree_issub(k1, 24, k2, 20, 13) ); 225 unit_assert( unittest_wrapper_addrtree_issub(k1, 20, k2, 24, 13) ) 230 addrkey_t k1[] = {0x55, 0x55, 0x5A}; local 240 addrkey_t k1[] = {0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0}; local 263 addrkey_t k1[] = {0xA5, 0x0F}; local [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| aes-siv.c | 126 const u8 *k1, *k2; local 136 k1 = key; 146 if (aes_s2v(k1, key_len, num_elem + 1, _addr, _len, v)) 169 const u8 *k1, *k2; local 181 k1 = key; 201 ret = aes_s2v(k1, key_len, num_elem + 1, _addr, _len, check);
|
| /src/external/lgpl3/mpfr/dist/src/ |
| round_prec.c | 182 mp_size_t k, k1, tn; local 335 k1 = MPFR_PREC2LIMBS (prec + 1); 337 if (((bp[bn - k1] >> s1) & 1) && 342 k1 = MPFR_PREC2LIMBS (prec); 345 (((bp[bn - k1] >> s1) & 1) == 0); 364 k1 = (prec - 1) / GMP_NUMB_BITS; 366 /* the least significant bit is bit s1 in limb k1 */ 368 /* We don't need to consider the k1 most significant limbs. 372 k -= k1; 373 bn -= k1; [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/isc/ |
| siphash.c | 99 uint64_t k1; local 102 memcpy(&k1, k + sizeof(k0), sizeof(k1)); 105 k1 = le64toh(k1); 108 uint64_t v1 = UINT64_C(0x646f72616e646f6d) ^ k1; 110 uint64_t v3 = UINT64_C(0x7465646279746573) ^ k1; 186 uint32_t k1 = U8TO32_LE(k + 4); local 189 uint32_t v1 = UINT32_C(0x00000000) ^ k1; 191 uint32_t v3 = UINT32_C(0x74656462) ^ k1; [all...] |
| /src/sys/crypto/skipjack/ |
| skipjack.c | 70 * k0, k1..k9 86 #define g(k0, k1, k2, k3, ih, il, oh, ol) \ 89 ol = k##k1 [oh] ^ il; \ 101 #define g_inv(k0, k1, k2, k3, ih, il, oh, ol) \ 105 ol = k##k1 [oh] ^ ol; \ 142 u_int8_t * k1 = key_tables [1]; local 210 u_int8_t * k1 = key_tables [1]; local
|
| /src/usr.bin/tset/ |
| tset.c | 69 const char *k1, *k2; local 206 k1 = "set noglob;\nsetenv TERM "; 209 k1 = "TERM="; 212 (void)printf("%s%s%s", k1, ttype, k2);
|
| /src/crypto/external/apache2/openssl/dist/crypto/cmac/ |
| cmac.c | 28 /* Keys k1 and k2 */ 29 unsigned char k1[EVP_MAX_BLOCK_LENGTH]; member in struct:CMAC_CTX_st 39 /* Make temporary keys K1 and K2 */ 41 static void make_kn(unsigned char *k1, const unsigned char *l, int bl) 48 k1[i] = (c << 1) | ((cnext = l[i + 1]) >> 7); 51 k1[i] = (c << 1) ^ ((0 - carry) & (bl == 16 ? 0x87 : 0x1b)); 73 OPENSSL_cleanse(ctx->k1, EVP_MAX_BLOCK_LENGTH); 103 memcpy(out->k1, in->k1, bl); 160 make_kn(ctx->k1, ctx->tbl, bl) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| destest.c | 73 unsigned char k1[8], k2[8], k3[8], local 77 memcpy(k1, key1, 8); 82 DES_set_odd_parity(&k1); 85 DES_set_key_unchecked(&k1, &s1); 99 unsigned char k1[8], local 104 memcpy(k1, key1, 8); 108 DES_set_odd_parity(&k1); 109 DES_set_key_unchecked(&k1, &s1); 121 unsigned char k1[8], local 127 memcpy(k1, key1, 8) 148 unsigned char k1[8], k2[8], k3[8], local 181 unsigned char k1[8], local 204 unsigned char k1[8], indata[24], ansdata[8]; local [all...] |
| /src/external/bsd/jemalloc/dist/include/jemalloc/internal/ |
| hash.h | 88 uint32_t k1 = hash_get_block_32(blocks, i); local 90 k1 *= c1; 91 k1 = hash_rotl_32(k1, 15); 92 k1 *= c2; 94 h1 ^= k1; 104 uint32_t k1 = 0; local 107 case 3: k1 ^= tail[2] << 16; JEMALLOC_FALLTHROUGH; 108 case 2: k1 ^= tail[1] << 8; JEMALLOC_FALLTHROUGH; 109 case 1: k1 ^= tail[0]; k1 *= c1; k1 = hash_rotl_32(k1, 15) 144 uint32_t k1 = hash_get_block_32(blocks, i*4 + 0); local 174 uint32_t k1 = 0; local 242 uint64_t k1 = hash_get_block_64(blocks, i*2 + 0); local 260 uint64_t k1 = 0; local [all...] |
| /src/external/bsd/jemalloc/include/jemalloc/internal/ |
| hash.h | 88 uint32_t k1 = hash_get_block_32(blocks, i); local 90 k1 *= c1; 91 k1 = hash_rotl_32(k1, 15); 92 k1 *= c2; 94 h1 ^= k1; 104 uint32_t k1 = 0; local 107 case 3: k1 ^= tail[2] << 16; JEMALLOC_FALLTHROUGH; 108 case 2: k1 ^= tail[1] << 8; JEMALLOC_FALLTHROUGH; 109 case 1: k1 ^= tail[0]; k1 *= c1; k1 = hash_rotl_32(k1, 15) 144 uint32_t k1 = hash_get_block_32(blocks, i*4 + 0); local 174 uint32_t k1 = 0; local 242 uint64_t k1 = hash_get_block_64(blocks, i*2 + 0); local 260 uint64_t k1 = 0; local [all...] |