| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_stream/xchacha20/ |
| stream_xchacha20.c | 32 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 34 crypto_core_hchacha20(k2, n, k, NULL); 35 COMPILER_ASSERT(crypto_stream_chacha20_KEYBYTES <= sizeof k2); 41 k2); 49 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 51 crypto_core_hchacha20(k2, n, k, NULL); 53 c, m, mlen, n + crypto_core_hchacha20_INPUTBYTES, ic, k2);
|
| /src/sys/opencrypto/ |
| aesxcbcmac.h | 16 u_int8_t k2[AES_BLOCKSIZE]; member in struct:__anon7493
|
| /src/lib/libc/db/btree/ |
| bt_utils.c | 152 DBT k2; local 173 k2.data = bl->bytes; 174 k2.size = bl->ksize; 181 k2.data = bi->bytes; 182 k2.size = bi->ksize; 188 &k2.size, &t->bt_rdata.data, &t->bt_rdata.size)) 190 k2.data = t->bt_rdata.data; 192 return ((*t->bt_cmp)(k1, &k2));
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_aead/xchacha20poly1305/sodium/ |
| aead_xchacha20poly1305.c | 28 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 32 crypto_core_hchacha20(k2, npub, k, NULL); 36 (c, mac, maclen_p, m, mlen, ad, adlen, nsec, npub2, k2); 37 sodium_memzero(k2, crypto_core_hchacha20_OUTPUTBYTES); 81 unsigned char k2[crypto_core_hchacha20_OUTPUTBYTES]; local 85 crypto_core_hchacha20(k2, npub, k, NULL); 89 (m, nsec, c, clen, mac, ad, adlen, npub2, k2); 90 sodium_memzero(k2, crypto_core_hchacha20_OUTPUTBYTES);
|
| /src/tests/lib/libc/gen/ |
| t_ftok.c | 65 key_t k1, k2, k3; local 76 k2 = ftok(hlnk, key); 80 ATF_REQUIRE(k2 != -1); 83 if (k1 != k2)
|
| /src/external/lgpl3/gmp/dist/mpn/generic/ |
| brootinv.c | 83 mp_limb_t kinv, k2, r0, y0; local 92 k2 = (k >> 1) + 1; /* (k + 1) / 2 , but avoid k+1 overflow */ 99 k%4 +-------------------------+k2%2 106 r0 = y0 ^ (((y0 << 1) ^ (y0 << 2)) & (k2 << 3) & 8); /* 4 bits */ 107 r0 = kinv * (k2 * r0 * 2 - y0 * powsquaredlimb(r0, k2 & 0x3f)); /* 8 bits */ 108 r0 = kinv * (k2 * r0 * 2 - y0 * powsquaredlimb(r0, k2 & 0x3fff)); /* 16 bits */ 114 r0 = kinv * (k2 * r0 * 2 - y0 * powsquaredlimb(r0, k2)); [all...] |
| /src/sys/external/isc/libsodium/dist/test/default/ |
| box_easy2.c | 21 unsigned char *k2; local 44 k2 = (unsigned char *) sodium_malloc(crypto_box_BEFORENMBYTES); 81 ret = crypto_box_beforenm(k2, small_order_p, alicesk); 86 ret = crypto_box_beforenm(k2, bobpk, alicesk); 99 k2) != 0) { 104 k2) == 0) { 130 nonce, k2) != 0) { 142 sodium_free(k2);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/rtl/ |
| tsan_posix.cc | 62 thread_key k2 = thread_key(key, &mtx, 43, &cnt); local 65 EXPECT_EQ(__interceptor_pthread_create(&th[1], 0, dtors_thread, &k2), 0);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| test_fx.c | 120 krb5_keyblock k1, k2, k3; local 157 &k2); 161 ret = krb5_crypto_init(context, &k2, 0, &c2); 198 krb5_free_keyblock_contents(context, &k2);
|
| /src/crypto/external/bsd/openssl/dist/crypto/cmac/ |
| cmac.c | 26 /* Keys k1 and k2 */ 28 unsigned char k2[EVP_MAX_BLOCK_LENGTH]; member in struct:CMAC_CTX_st 37 /* Make temporary keys K1 and K2 */ 74 OPENSSL_cleanse(ctx->k2, EVP_MAX_BLOCK_LENGTH); 104 memcpy(out->k2, in->k2, bl); 151 make_kn(ctx->k2, ctx->k1, bl); 228 out[i] = ctx->last_block[i] ^ ctx->k2[i];
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cmac/ |
| cmac.c | 20 /* Keys k1 and k2 */ 22 unsigned char k2[EVP_MAX_BLOCK_LENGTH]; member in struct:CMAC_CTX_st 31 /* Make temporary keys K1 and K2 */ 68 OPENSSL_cleanse(ctx->k2, EVP_MAX_BLOCK_LENGTH); 96 memcpy(out->k2, in->k2, bl); 141 make_kn(ctx->k2, ctx->k1, bl); 212 out[i] = ctx->last_block[i] ^ ctx->k2[i];
|
| /src/external/bsd/unbound/dist/testcode/ |
| unitecs.c | 215 addrkey_t k2[] = {0x55, 0x5D, 0x5A}; local 217 unit_assert( !unittest_wrapper_addrtree_issub(k1, 24, k2, 24, 0) ); 218 unit_assert( unittest_wrapper_addrtree_issub(k1, 8, k2, 16, 0) ); 219 unit_assert( unittest_wrapper_addrtree_issub(k2, 12, k1, 13, 0) ); 220 unit_assert( !unittest_wrapper_addrtree_issub(k1, 16, k2, 12, 0) ); 221 unit_assert( unittest_wrapper_addrtree_issub(k1, 12, k2, 12, 0) ); 222 unit_assert( !unittest_wrapper_addrtree_issub(k1, 13, k2, 13, 0) ); 223 unit_assert( unittest_wrapper_addrtree_issub(k1, 24, k2, 24, 13) ); 224 unit_assert( !unittest_wrapper_addrtree_issub(k1, 24, k2, 20, 13) ); 225 unit_assert( unittest_wrapper_addrtree_issub(k1, 20, k2, 24, 13) ) 241 addrkey_t k2[] = {0,0,0,0,0,0,0,0}; local 264 addrkey_t k2[] = {0x5A, 0xF0}; local [all...] |
| unitslabhash.c | 86 testkey_type* k2 = newkey(14); local 91 k2->entry.data = d2; 94 slabhash_insert(table, myhash(14), &k2->entry, d2, NULL); 98 unit_assert( slabhash_lookup(table, myhash(14), k2, 0) == &k2->entry); 99 lock_rw_unlock( &k2->entry.lock ); 101 slabhash_remove(table, myhash(14), k2);
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| aes-siv.c | 126 const u8 *k1, *k2; local 137 k2 = key + key_len; 158 return aes_ctr_encrypt(k2, key_len, v, crypt_pw, pwlen); 169 const u8 *k1, *k2; local 182 k2 = key + key_len; 197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len);
|
| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.cp/ |
| temargs.cc | 60 struct K2 112 K2<&S::somefunc> k2; local 120 k2.k2_m ();
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.cp/ |
| temargs.cc | 60 struct K2 112 K2<&S::somefunc> k2; local 120 k2.k2_m ();
|
| /src/sys/crypto/skipjack/ |
| skipjack.c | 86 #define g(k0, k1, k2, k3, ih, il, oh, ol) \ 90 oh = k##k2 [ol] ^ oh; \ 101 #define g_inv(k0, k1, k2, k3, ih, il, oh, ol) \ 104 oh = k##k2 [ol] ^ ih; \ 143 u_int8_t * k2 = key_tables [2]; local 211 u_int8_t * k2 = key_tables [2]; local
|
| /src/usr.bin/tset/ |
| tset.c | 69 const char *k1, *k2; local 207 k2 = ";\nunset noglob;\n"; 210 k2 = ";\nexport TERM;\n"; 212 (void)printf("%s%s%s", k1, ttype, k2);
|
| /src/crypto/external/apache2/openssl/dist/crypto/cmac/ |
| cmac.c | 28 /* Keys k1 and k2 */ 30 unsigned char k2[EVP_MAX_BLOCK_LENGTH]; member in struct:CMAC_CTX_st 39 /* Make temporary keys K1 and K2 */ 74 OPENSSL_cleanse(ctx->k2, EVP_MAX_BLOCK_LENGTH); 104 memcpy(out->k2, in->k2, bl); 161 make_kn(ctx->k2, ctx->k1, bl); 269 out[i] = ctx->last_block[i] ^ ctx->k2[i];
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| destest.c | 73 unsigned char k1[8], k2[8], k3[8], local 78 memcpy(k2, key2, 8); 83 DES_set_odd_parity(&k2); 86 DES_set_key_unchecked(&k2, &s2); 148 unsigned char k1[8], k2[8], k3[8], local 154 memcpy(k2, key2, 8); 160 DES_set_odd_parity(&k2); 163 DES_set_key_unchecked(&k2, &s2);
|
| /src/external/bsd/jemalloc/dist/include/jemalloc/internal/ |
| hash.h | 145 uint32_t k2 = hash_get_block_32(blocks, i*4 + 1); local 154 k2 *= c2; k2 = hash_rotl_32(k2, 16); k2 *= c3; h2 ^= k2; 175 uint32_t k2 = 0; local 191 case 8: k2 ^= (uint32_t) tail[ 7] << 24; JEMALLOC_FALLTHROUGH; 192 case 7: k2 ^= tail[ 6] << 16; JEMALLOC_FALLTHROUGH; 193 case 6: k2 ^= tail[ 5] << 8; JEMALLOC_FALLTHROUGH 243 uint64_t k2 = hash_get_block_64(blocks, i*2 + 1); local 261 uint64_t k2 = 0; local [all...] |
| /src/external/bsd/jemalloc/include/jemalloc/internal/ |
| hash.h | 145 uint32_t k2 = hash_get_block_32(blocks, i*4 + 1); local 154 k2 *= c2; k2 = hash_rotl_32(k2, 16); k2 *= c3; h2 ^= k2; 175 uint32_t k2 = 0; local 191 case 8: k2 ^= (uint32_t) tail[ 7] << 24; JEMALLOC_FALLTHROUGH; 192 case 7: k2 ^= tail[ 6] << 16; JEMALLOC_FALLTHROUGH; 193 case 6: k2 ^= tail[ 5] << 8; JEMALLOC_FALLTHROUGH 243 uint64_t k2 = hash_get_block_64(blocks, i*2 + 1); local 261 uint64_t k2 = 0; local [all...] |
| /src/external/bsd/jemalloc.old/dist/include/jemalloc/internal/ |
| hash.h | 145 uint32_t k2 = hash_get_block_32(blocks, i*4 + 1); local 154 k2 *= c2; k2 = hash_rotl_32(k2, 16); k2 *= c3; h2 ^= k2; 175 uint32_t k2 = 0; local 193 case 8: k2 ^= tail[ 7] << 24; /*FALLTHROUGH*/ 194 case 7: k2 ^= tail[ 6] << 16; /*FALLTHROUGH*/ 195 case 6: k2 ^= tail[ 5] << 8; /*FALLTHROUGH* 245 uint64_t k2 = hash_get_block_64(blocks, i*2 + 1); local 263 uint64_t k2 = 0; local [all...] |
| /src/external/bsd/jemalloc.old/include/jemalloc/internal/ |
| hash.h | 145 uint32_t k2 = hash_get_block_32(blocks, i*4 + 1); local 154 k2 *= c2; k2 = hash_rotl_32(k2, 16); k2 *= c3; h2 ^= k2; 175 uint32_t k2 = 0; local 193 case 8: k2 ^= (uint32_t)tail[ 7] << 24; /*FALLTHROUGH*/ 194 case 7: k2 ^= tail[ 6] << 16; /*FALLTHROUGH*/ 195 case 6: k2 ^= tail[ 5] << 8; /*FALLTHROUGH* 245 uint64_t k2 = hash_get_block_64(blocks, i*2 + 1); local 263 uint64_t k2 = 0; local [all...] |
| /src/external/bsd/unbound/dist/util/storage/ |
| slabhash.c | 207 struct slabhash_testkey* k2 = (struct slabhash_testkey*)key2; local 208 if(k1->id == k2->id) 210 if(k1->id > k2->id)
|