| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| sm4.h | 29 uint32_t rk[SM4_KEY_SCHEDULE]; member in struct:SM4_KEY_st
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| sm4.h | 29 uint32_t rk[SM4_KEY_SCHEDULE]; member in struct:SM4_KEY_st
|
| /src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
| sm4.h | 28 uint32_t rk[SM4_KEY_SCHEDULE]; member in struct:SM4_KEY_st
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk += Nr << 2 100 u32 *rk; local 121 u32 *rk = ctx; local [all...] |
| aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp 61 u32 *rk; local 153 u32 *rk = ctx; local [all...] |
| /src/external/bsd/libfido2/dist/examples/ |
| cred.c | 48 bool rk, bool uv, int ext, int cred_protect, const char *key_out, 83 if (rk && (r = fido_cred_set_rk(cred, FIDO_OPT_TRUE)) != FIDO_OK) 157 bool rk = false; local 228 rk = true; 297 if (rk && (r = fido_cred_set_rk(cred, FIDO_OPT_TRUE)) != FIDO_OK) 333 fido_cred_attstmt_len(cred), rk, uv, ext, fido_cred_prot(cred),
|
| /src/external/bsd/libfido2/dist/tools/ |
| credman.c | 45 printf("existing rk(s): %u\n", 47 printf("remaining rk(s): %u\n", 115 print_rk(const fido_credman_rk_t *rk, size_t idx) 124 if ((cred = fido_credman_rk(rk, idx)) == NULL) { 153 fido_credman_rk_t *rk = NULL; local 158 if ((rk = fido_credman_rk_new()) == NULL) { 162 if ((r = fido_credman_get_dev_rk(dev, rp_id, rk, NULL)) != FIDO_OK && 166 r = fido_credman_get_dev_rk(dev, rp_id, rk, pin); 174 for (size_t i = 0; i < fido_credman_rk_count(rk); i++) 175 if (print_rk(rk, i) < 0 191 fido_credman_rk_t *rk = NULL; local [all...] |
| largeblob.c | 32 fido_credman_rk_t **rk; /* rk per rp */ member in struct:rkmap 40 fido_credman_rk_free(&map->rk[i]); 43 free(map->rk); 68 if ((map->rk = calloc(n, sizeof(*map->rk))) == NULL) { 77 if ((map->rk[i] = fido_credman_rk_new()) == NULL) { 81 if ((r = fido_credman_get_dev_rk(dev, rp_id, map->rk[i], 100 fido_credman_rk_t *rk = NULL; local 105 if ((rk = fido_credman_rk_new()) == NULL) [all...] |
| /src/sys/crypto/aes/ |
| aes_impl.c | 466 uint32_t rk[60]; local 470 if (aes_keysched_enc(rk, key, C[i].len) != C[i].nr) 472 if (memcmp(rk, C[i].enc, 4*(C[i].nr + 1))) 474 if (aes_keysched_dec(rk, key, C[i].len) != C[i].nr) 476 if (memcmp(rk, C[i].dec, 4*(C[i].nr + 1)))
|
| /src/crypto/external/apache2/openssl/dist/crypto/aes/ |
| aes_x86core.c | 483 u32 *rk; local 492 rk = key->rd_key; 501 rk[0] = GETU32(userKey); 502 rk[1] = GETU32(userKey + 4); 503 rk[2] = GETU32(userKey + 8); 504 rk[3] = GETU32(userKey + 12); 507 temp = rk[3]; 508 rk[4] = rk[0] ^ ((u32)Te4[(temp >> 8) & 0xff]) ^ ((u32)Te4[(temp >> 16) & 0xff] << 8) ^ ((u32)Te4[(temp >> 24)] << 16) ^ ((u32)Te4[(temp) & 0xff] << 24) ^ rcon[i]; 509 rk[5] = rk[1] ^ rk[4] 566 u32 *rk; local 634 const u32 *rk; local 751 const u32 *rk; local [all...] |
| aes_core.c | 634 u64 *rk; local 641 rk = (u64 *)key->rd_key; 650 KeyExpansion(userKey, rk, key->rounds, bits / 32); 670 const u64 *rk; local 673 rk = (u64 *)key->rd_key; 675 Cipher(in, out, rk, key->rounds); 685 const u64 *rk; local 688 rk = (u64 *)key->rd_key; 690 InvCipher(in, out, rk, key->rounds); 3049 u32 *rk; local 3132 u32 *rk; local 3177 const u32 *rk; local 3309 const u32 *rk; local 3488 u32 *rk; local 3571 u32 *rk; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/sm2/ |
| sm2_sign.c | 216 BIGNUM *rk = NULL; local 240 rk = BN_CTX_get(ctx); 287 if (!BN_add(rk, r, k)) { 292 if (BN_cmp(rk, order) == 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/aes/ |
| aes_x86core.c | 478 u32 *rk; local 487 rk = key->rd_key; 496 rk[0] = GETU32(userKey ); 497 rk[1] = GETU32(userKey + 4); 498 rk[2] = GETU32(userKey + 8); 499 rk[3] = GETU32(userKey + 12); 502 temp = rk[3]; 503 rk[4] = rk[0] ^ 509 rk[5] = rk[1] ^ rk[4] 580 u32 *rk; local 662 const u32 *rk; local 876 const u32 *rk; local [all...] |
| aes_core.c | 634 u64 *rk; local 641 rk = (u64*)key->rd_key; 650 KeyExpansion(userKey, rk, key->rounds, bits/32); 670 const u64 *rk; local 673 rk = (u64*)key->rd_key; 675 Cipher(in, out, rk, key->rounds); 685 const u64 *rk; local 688 rk = (u64*)key->rd_key; 690 InvCipher(in, out, rk, key->rounds); 1282 u32 *rk; local 1384 u32 *rk; local 1436 const u32 *rk; local 1628 const u32 *rk; local 1860 u32 *rk; local 1962 u32 *rk; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/sm2/ |
| sm2_sign.c | 213 BIGNUM *rk = NULL; local 229 rk = BN_CTX_get(ctx); 276 if (!BN_add(rk, r, k)) { 281 if (BN_cmp(rk, order) == 0)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/aes/ |
| aes_x86core.c | 478 u32 *rk; local 487 rk = key->rd_key; 496 rk[0] = GETU32(userKey ); 497 rk[1] = GETU32(userKey + 4); 498 rk[2] = GETU32(userKey + 8); 499 rk[3] = GETU32(userKey + 12); 502 temp = rk[3]; 503 rk[4] = rk[0] ^ 509 rk[5] = rk[1] ^ rk[4] 580 u32 *rk; local 662 const u32 *rk; local 876 const u32 *rk; local [all...] |
| aes_core.c | 618 u64 *rk; local 625 rk = (u64*)key->rd_key; 634 KeyExpansion(userKey, rk, key->rounds, bits/32); 654 const u64 *rk; local 657 rk = (u64*)key->rd_key; 659 Cipher(in, out, rk, key->rounds); 669 const u64 *rk; local 672 rk = (u64*)key->rd_key; 674 InvCipher(in, out, rk, key->rounds); 1266 u32 *rk; local 1368 u32 *rk; local 1420 const u32 *rk; local 1612 const u32 *rk; local 1844 u32 *rk; local 1946 u32 *rk; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/sm2/ |
| sm2_sign.c | 194 BIGNUM *rk = NULL; local 209 rk = BN_CTX_get(ctx); 247 if (!BN_add(rk, r, k)) { 252 if (BN_cmp(rk, order) == 0)
|
| /src/external/bsd/libfido2/dist/fuzz/ |
| fuzz_cred.c | 36 uint8_t rk; member in struct:param 88 if (unpack_byte(v[0], &p->rk) < 0 || 130 (argv[0] = pack_byte(p->rk)) == NULL || 217 int ext, uint8_t rk, uint8_t uv, const char *pin, uint8_t excl_count, 245 if (rk & 1) 275 size_t authdata_raw_len, int ext, uint8_t rk, uint8_t uv, 308 if (rk & 1) 388 p->rk, p->uv, p->pin, p->excl_count, &p->excl_cred); 395 fido_cred_authdata_raw_len(cred), p->ext, p->rk, p->uv, 464 mutate_byte(&p->rk); [all...] |
| fuzz_credman.c | 290 fido_credman_rk_t *rk; local 299 if ((rk = fido_credman_rk_new()) == NULL) { 305 fido_credman_get_dev_rk(dev, p->rp_id, rk, p->pin); 308 for (size_t i = 0; i < fido_credman_rk_count(rk) + 1; i++) { 309 if ((cred = fido_credman_rk(rk, i)) == NULL) { 310 assert(i >= fido_credman_rk_count(rk)); 325 fido_credman_rk_free(&rk);
|
| /src/external/bsd/unbound/dist/util/data/ |
| packed_rrset.h | 135 struct packed_rrset_key rk; member in struct:ub_packed_rrset_key
|
| /src/sys/crypto/aes/arch/arm/ |
| aes_neon.c | 208 storeroundkey(void *rkp, uint8x16_t rk) 210 vst1q_u8(rkp, rk); 249 aes_schedule_low_round(uint8x16_t rk, uint8x16_t prk) 259 subbytes(&io, &jo, rk, inv, inva); 260 rk = vqtbl1q_u8(sb1[0], io) ^ vqtbl1q_u8(sb1[1], jo); 263 return rk ^ prk; 267 aes_schedule_round(uint8x16_t rk, uint8x16_t prk, uint8x16_t *rcon_rot) 276 rk32 = vreinterpretq_u32_u8(rk); 278 rk = vreinterpretq_u8_u32(rk32); 279 rk = vextq_u8(rk, rk, 1) 365 uint8x16_t rk; \/* round key *\/ local 457 uint8x16_t rk; \/* round key *\/ local [all...] |
| /src/sys/crypto/aes/arch/x86/ |
| aes_ssse3.c | 154 storeroundkey(uint32_t *rk32, __m128i rk) 156 _mm_store_si128((void *)rk32, rk); 208 aes_schedule_low_round(__m128i rk, __m128i prk) 218 subbytes(&io, &jo, rk); 219 rk = _mm_shuffle_epi8(sb1[0].m, io) ^ _mm_shuffle_epi8(sb1[1].m, jo); 222 return rk ^ prk; 226 aes_schedule_round(__m128i rk, __m128i prk, __m128i *rcon_rot) 234 rk = _mm_shuffle_epi32(rk, 0xff); 235 rk = _mm_alignr_epi8(rk, rk, 1) 291 __m128i rk; local 311 __m128i rk; \/* round key *\/ local 400 __m128i rk; \/* round key *\/ local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/aria/ |
| aria.c | 340 #define ARIA_ADD_ROUND_KEY(RK, T0, T1, T2, T3) \ 342 (T0) ^= (RK)->u[0]; \ 343 (T1) ^= (RK)->u[1]; \ 344 (T2) ^= (RK)->u[2]; \ 345 (T3) ^= (RK)->u[3]; \ 405 #define _ARIA_GSRK(RK, X, Y, Q, R) \ 407 (RK)->u[0] = ((X)[0]) ^ (((Y)[((Q)) % 4]) >> (R)) ^ (((Y)[((Q) + 3) % 4]) << (32 - (R))); \ 408 (RK)->u[1] = ((X)[1]) ^ (((Y)[((Q) + 1) % 4]) >> (R)) ^ (((Y)[((Q)) % 4]) << (32 - (R))); \ 409 (RK)->u[2] = ((X)[2]) ^ (((Y)[((Q) + 2) % 4]) >> (R)) ^ (((Y)[((Q) + 1) % 4]) << (32 - (R))); \ 410 (RK)->u[3] = ((X)[3]) ^ (((Y)[((Q) + 3) % 4]) >> (R)) ^ (((Y)[((Q) + 2) % 4]) << (32 - (R))); 427 const ARIA_u128 *rk; local 480 ARIA_u128 *rk; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/aria/ |
| aria.c | 345 #define ARIA_ADD_ROUND_KEY(RK, T0, T1, T2, T3) \ 347 (T0) ^= (RK)->u[0]; \ 348 (T1) ^= (RK)->u[1]; \ 349 (T2) ^= (RK)->u[2]; \ 350 (T3) ^= (RK)->u[3]; \ 442 #define _ARIA_GSRK(RK, X, Y, Q, R) \ 444 (RK)->u[0] = \ 448 (RK)->u[1] = \ 452 (RK)->u[2] = \ 456 (RK)->u[3] = 476 const ARIA_u128 *rk; local 545 ARIA_u128 *rk; local [all...] |