| /src/sys/external/isc/libsodium/dist/test/default/ |
| box_seed.c | 15 unsigned char sk[32]; local 18 crypto_box_seed_keypair(pk, sk, seed); 25 printf(",0x%02x", (unsigned int) sk[i]);
|
| box_seal.c | 9 unsigned char sk[crypto_box_SECRETKEYBYTES]; local 16 crypto_box_keypair(pk, sk); 27 if (crypto_box_seal_open(m2, c, c_len, pk, sk) != 0) { 33 printf("%d\n", crypto_box_seal_open(m, c, 0U, pk, sk)); 34 printf("%d\n", crypto_box_seal_open(m, c, c_len - 1U, pk, sk)); 35 printf("%d\n", crypto_box_seal_open(m, c, c_len, sk, pk));
|
| sign.c | 11 const unsigned char sk[crypto_sign_SEEDBYTES]; member in struct:TestData_ 1077 unsigned char sk[crypto_sign_SECRETKEYBYTES]; local [all...] |
| xchacha20.c | 304 unsigned char *sk; local 316 sk = (unsigned char *) sodium_malloc(crypto_box_curve25519xchacha20poly1305_SECRETKEYBYTES); 329 assert(crypto_box_curve25519xchacha20poly1305_keypair(pk, sk) == 0); 331 pk, sk) == 0); 333 pk, sk) == 0); 336 nonce, small_order_p, sk) == -1); 339 nonce, pk, sk) == -1); 341 (m2, out, 0, nonce, pk, sk) == -1); 344 nonce, pk, sk) == 0); 350 assert(crypto_box_curve25519xchacha20poly1305_beforenm(pc, small_order_p, sk) == -1) [all...] |
| /src/external/bsd/ipf/dist/ipsend/ |
| snit.c | 121 struct sockaddr sk, *sa = &sk; local
|
| lsock.c | 200 struct sock *s, sk; local 249 KMCPY(&sk, s, sizeof(sk)); 250 ti->ti_win = sk.window; 251 ti->ti_seq = sk.sent_seq - 1; 252 ti->ti_ack = sk.rcv_ack_seq;
|
| /src/external/bsd/libfido2/dist/src/ |
| ecdh.c | 116 do_ecdh(const fido_dev_t *dev, const es256_sk_t *sk, const es256_pk_t *pk, 130 (sk_evp = es256_sk_to_EVP_PKEY(sk)) == NULL) { 170 es256_sk_t *sk = NULL; /* our private key */ local 176 if ((sk = es256_sk_new()) == NULL || (*pk = es256_pk_new()) == NULL) { 180 if (es256_sk_create(sk) < 0 || es256_derive_pk(sk, *pk) < 0) { 191 if (do_ecdh(dev, sk, ak, ecdh) < 0) { 199 es256_sk_free(&sk);
|
| es256.c | 152 es256_sk_t *sk; local 154 if (skp == NULL || (sk = *skp) == NULL) 157 freezero(sk, sizeof(*sk)); 461 es256_derive_pk(const es256_sk_t *sk, es256_pk_t *pk) 469 if ((d = BN_bin2bn(sk->d, (int)sizeof(sk->d), NULL)) == NULL ||
|
| /src/external/gpl2/groff/dist/src/utils/addftinfo/ |
| guess.h | 43 int sk; member in struct:char_metric
|
| /src/sys/external/gpl2/dts/dist/arch/arm64/boot/dts/ti/ |
| Makefile | 16 dtb-$(CONFIG_ARCH_K3) += k3-am625-sk.dtb 27 dtb-$(CONFIG_ARCH_K3) += k3-am62-lp-sk.dtb 28 dtb-$(CONFIG_ARCH_K3) += k3-am62-lp-sk-nand.dtbo 31 dtb-$(CONFIG_ARCH_K3) += k3-am62a7-sk.dtb 35 dtb-$(CONFIG_ARCH_K3) += k3-am62p5-sk.dtb 37 # Common overlays for SK-AM62* family of boards 38 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-csi2-ov5640.dtbo 39 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-csi2-tevi-ov5640.dtbo 40 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-csi2-imx219.dtbo 41 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-hdmi-audio.dtb [all...] |
| /src/external/bsd/ntp/dist/sntp/tests/ |
| crypto.c | 41 struct key sk; local 43 sk.next = NULL; 44 sk.key_id = 10; 45 sk.key_len = sizeof(KEY) - 1; 46 memcpy(&sk.key_seq, KEY, min(sizeof(sk.key_seq), sk.key_len)); 47 strlcpy(sk.typen, "SHAKE128", sizeof(sk.typen)); 48 sk.typei = keytype_from_text(sk.typen, NULL) 140 struct key sk; local 260 struct key sk; local 303 struct key sk; local [all...] |
| /src/lib/libtelnet/ |
| pk.c | 182 BIGNUM *sk = BN_new(); local 193 (void)BN_zero(sk); 202 BN_mul(sk, tmp, sk, ctx); 203 BN_add(sk, tmp, sk); 207 BN_div(tmp, sk, sk, modulus, ctx); 208 BN_mod_exp(pk, root, sk, modulus, ctx); 210 xkey = BN_bn2hex(sk); [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/slh_dsa/ |
| slh_wots.c | 146 uint8_t sk[SLH_MAX_N]; local 166 if (!PRF(ctx, pk_seed, sk_seed, sk_adrs, sk, sizeof(sk))) 170 if (!slh_wots_chain(ctx, sk, 0, NIBBLE_MASK, pk_seed, adrs, tmp_wpkt)) 183 OPENSSL_cleanse(sk, n); 210 uint8_t sk[SLH_MAX_N]; local 237 if (!PRF(ctx, pk_seed, sk_seed, sk_adrs, sk, sizeof(sk))) 241 if (!slh_wots_chain(ctx, sk, 0, msg_and_csum_nibbles[i],
|
| slh_fors.c | 83 uint8_t sk[SLH_MAX_N], lnode[SLH_MAX_N], rnode[SLH_MAX_N]; local 90 if (!slh_fors_sk_gen(ctx, sk_seed, pk_seed, adrs, node_id, sk, sizeof(sk))) 94 ret = key->hash_func->F(ctx, pk_seed, adrs, sk, n, node, node_len); 95 OPENSSL_cleanse(sk, n); 223 const uint8_t *sk, *authj; /* Pointers to |sig| buffer inside fors_sig_rpkt */ local 252 if (!PACKET_get_bytes(fors_sig_rpkt, &sk, n) 254 || !F(ctx, pk_seed, adrs, sk, n, node0, n))
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/ |
| ml_dsa_codecs.c | 558 const uint8_t *sk = ossl_ml_dsa_key_get_priv(key); local 564 if (sk == NULL) { 640 memcpy(pos, sk, params->sk_len); 670 const uint8_t *seed, *sk, *pk; local 678 sk = ossl_ml_dsa_key_get_priv(key); 689 if (sk == NULL) { 698 if (!ossl_bio_print_labeled_buf(out, "priv:", sk, params->sk_len))
|
| /src/sys/net/npf/ |
| npf_connkey.c | 203 const uint32_t *sk = skey->ck_key; local 210 dk[0] = sk[1]; 211 dk[1] = (sk[1] >> 16) | (sk[1] << 16); 212 memcpy(&dk[2], &sk[2 + nwords], alen); 213 memcpy(&dk[2 + nwords], &sk[2], alen); 215 memcpy(dk, sk, klen);
|
| /src/crypto/external/apache2/openssl/dist/crypto/ml_dsa/ |
| ml_dsa_key.c | 39 const uint8_t *sk, size_t sk_len) 46 || (sk != NULL && sk_len != key->params->sk_len) 51 if (sk != NULL 52 && (key->priv_encoding = OPENSSL_memdup(sk, sk_len)) == NULL) 466 uint8_t *sk; local 479 sk = out->priv_encoding; 481 if (sk == NULL) { 485 && memcmp(out->priv_encoding, sk, out->params->sk_len) != 0) { 492 OPENSSL_free(sk);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| ml_dsa_kmgmt.c | 199 const uint8_t *pk = NULL, *sk = NULL, *seed = NULL; local 225 && !OSSL_PARAM_get_octet_string_ptr(p, (const void **)&sk, &sk_len)) 227 if (sk != NULL && sk_len != key_params->sk_len) { 243 if (!ossl_ml_dsa_set_prekey(key, 0, 0, seed, seed_len, sk, sk_len)) 250 if (!ossl_ml_dsa_sk_decode(key, sk, sk_len)) 414 const uint8_t *sk, *seed; local 425 sk = ossl_ml_dsa_key_get_priv(key); 428 && (sk == NULL || (ossl_ml_dsa_key_get_prov_flags(key) & ML_DSA_KEY_PREFER_SEED))) { 431 } else if (sk != NULL) { 432 if (ossl_ml_dsa_sk_decode(key, sk, [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| dh.h | 107 void *sk; member in struct:DH::CRYPTO_EX_DATA
|
| dsa.h | 109 void *sk; member in struct:DSA::dsa_CRYPTO_EX_DATA
|
| rsa.h | 118 void *sk; member in struct:RSA::rsa_CRYPTO_EX_DATA
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_gpsk.c | 23 u8 sk[EAP_GPSK_MAX_SK_LEN]; member in struct:eap_gpsk_data 181 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor, 414 data->sk, &data->sk_len, 446 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor, 515 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
|
| /src/external/gpl2/groff/dist/src/preproc/refer/ |
| token.cpp | 88 void token_info::set(token_type t, const char *sk, const char *oc) 92 sort_key = sk; 157 const char *sk = 0, const char *oc = 0) 174 token_table[n].ti.set(typ, sk, oc); 282 const char *sk = 0) 293 store_letter(p, strsave(buf), sk); 300 store_letter(strsave(buf), p, sk); local
|
| /src/external/lgpl3/mpfr/dist/src/ |
| atan.c | 288 mpfr_t xp, arctgt, sk, tmp, tmp2; local 370 MPFR_GROUP_INIT_4 (group, prec, sk, tmp, tmp2, arctgt); 386 9 - 2 * EXP(sk), which we estimate by 9 + 2*ceil(log2(p)) 387 since we manage that sk < 1/p */ 398 MPFR_GROUP_REPREC_4 (group, prec, sk, tmp, tmp2, arctgt); 412 mpfr_ui_div (sk, 1, xp, MPFR_RNDN); 414 mpfr_set (sk, xp, MPFR_RNDN); 416 /* now 0 < sk <= 1 */ 419 We want |sk| < k/sqrt(p) where p is the target precision. */ 421 for (red = 0; MPFR_GET_EXP(sk) > - (mpfr_exp_t) log2p; red ++ [all...] |
| /src/sys/dist/pf/net/ |
| if_pfsync.c | 250 struct pf_state_key *sk = NULL; local 292 if ((sk = pf_alloc_state_key(st)) == NULL) { 305 pool_put(&pf_state_key_pl, sk); 316 pf_state_host_ntoh(&sp->lan, &sk->lan); 317 pf_state_host_ntoh(&sp->gwy, &sk->gwy); 318 pf_state_host_ntoh(&sp->ext, &sk->ext); 327 sk->af = sp->af; 328 sk->proto = sp->proto; 329 sk->direction = sp->direction; 360 struct pf_state_key *sk; local 1132 struct pf_state_key *sk = st->state_key; local [all...] |