HomeSort by: relevance | last modified time | path
    Searched defs:sk (Results 1 - 25 of 47) sorted by relevancy

1 2

  /src/sys/external/isc/libsodium/dist/test/default/
box_seed.c 15 unsigned char sk[32]; local
18 crypto_box_seed_keypair(pk, sk, seed);
25 printf(",0x%02x", (unsigned int) sk[i]);
box_seal.c 9 unsigned char sk[crypto_box_SECRETKEYBYTES]; local
16 crypto_box_keypair(pk, sk);
27 if (crypto_box_seal_open(m2, c, c_len, pk, sk) != 0) {
33 printf("%d\n", crypto_box_seal_open(m, c, 0U, pk, sk));
34 printf("%d\n", crypto_box_seal_open(m, c, c_len - 1U, pk, sk));
35 printf("%d\n", crypto_box_seal_open(m, c, c_len, sk, pk));
sign.c 11 const unsigned char sk[crypto_sign_SEEDBYTES]; member in struct:TestData_
1077 unsigned char sk[crypto_sign_SECRETKEYBYTES]; local
    [all...]
xchacha20.c 304 unsigned char *sk; local
316 sk = (unsigned char *) sodium_malloc(crypto_box_curve25519xchacha20poly1305_SECRETKEYBYTES);
329 assert(crypto_box_curve25519xchacha20poly1305_keypair(pk, sk) == 0);
331 pk, sk) == 0);
333 pk, sk) == 0);
336 nonce, small_order_p, sk) == -1);
339 nonce, pk, sk) == -1);
341 (m2, out, 0, nonce, pk, sk) == -1);
344 nonce, pk, sk) == 0);
350 assert(crypto_box_curve25519xchacha20poly1305_beforenm(pc, small_order_p, sk) == -1)
    [all...]
  /src/external/bsd/ipf/dist/ipsend/
snit.c 121 struct sockaddr sk, *sa = &sk; local
lsock.c 200 struct sock *s, sk; local
249 KMCPY(&sk, s, sizeof(sk));
250 ti->ti_win = sk.window;
251 ti->ti_seq = sk.sent_seq - 1;
252 ti->ti_ack = sk.rcv_ack_seq;
  /src/external/bsd/libfido2/dist/src/
ecdh.c 116 do_ecdh(const fido_dev_t *dev, const es256_sk_t *sk, const es256_pk_t *pk,
130 (sk_evp = es256_sk_to_EVP_PKEY(sk)) == NULL) {
170 es256_sk_t *sk = NULL; /* our private key */ local
176 if ((sk = es256_sk_new()) == NULL || (*pk = es256_pk_new()) == NULL) {
180 if (es256_sk_create(sk) < 0 || es256_derive_pk(sk, *pk) < 0) {
191 if (do_ecdh(dev, sk, ak, ecdh) < 0) {
199 es256_sk_free(&sk);
es256.c 152 es256_sk_t *sk; local
154 if (skp == NULL || (sk = *skp) == NULL)
157 freezero(sk, sizeof(*sk));
461 es256_derive_pk(const es256_sk_t *sk, es256_pk_t *pk)
469 if ((d = BN_bin2bn(sk->d, (int)sizeof(sk->d), NULL)) == NULL ||
  /src/external/gpl2/groff/dist/src/utils/addftinfo/
guess.h 43 int sk; member in struct:char_metric
  /src/sys/external/gpl2/dts/dist/arch/arm64/boot/dts/ti/
Makefile 16 dtb-$(CONFIG_ARCH_K3) += k3-am625-sk.dtb
27 dtb-$(CONFIG_ARCH_K3) += k3-am62-lp-sk.dtb
28 dtb-$(CONFIG_ARCH_K3) += k3-am62-lp-sk-nand.dtbo
31 dtb-$(CONFIG_ARCH_K3) += k3-am62a7-sk.dtb
35 dtb-$(CONFIG_ARCH_K3) += k3-am62p5-sk.dtb
37 # Common overlays for SK-AM62* family of boards
38 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-csi2-ov5640.dtbo
39 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-csi2-tevi-ov5640.dtbo
40 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-csi2-imx219.dtbo
41 dtb-$(CONFIG_ARCH_K3) += k3-am62x-sk-hdmi-audio.dtb
    [all...]
  /src/external/bsd/ntp/dist/sntp/tests/
crypto.c 41 struct key sk; local
43 sk.next = NULL;
44 sk.key_id = 10;
45 sk.key_len = sizeof(KEY) - 1;
46 memcpy(&sk.key_seq, KEY, min(sizeof(sk.key_seq), sk.key_len));
47 strlcpy(sk.typen, "SHAKE128", sizeof(sk.typen));
48 sk.typei = keytype_from_text(sk.typen, NULL)
140 struct key sk; local
260 struct key sk; local
303 struct key sk; local
    [all...]
  /src/lib/libtelnet/
pk.c 182 BIGNUM *sk = BN_new(); local
193 (void)BN_zero(sk);
202 BN_mul(sk, tmp, sk, ctx);
203 BN_add(sk, tmp, sk);
207 BN_div(tmp, sk, sk, modulus, ctx);
208 BN_mod_exp(pk, root, sk, modulus, ctx);
210 xkey = BN_bn2hex(sk);
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/slh_dsa/
slh_wots.c 146 uint8_t sk[SLH_MAX_N]; local
166 if (!PRF(ctx, pk_seed, sk_seed, sk_adrs, sk, sizeof(sk)))
170 if (!slh_wots_chain(ctx, sk, 0, NIBBLE_MASK, pk_seed, adrs, tmp_wpkt))
183 OPENSSL_cleanse(sk, n);
210 uint8_t sk[SLH_MAX_N]; local
237 if (!PRF(ctx, pk_seed, sk_seed, sk_adrs, sk, sizeof(sk)))
241 if (!slh_wots_chain(ctx, sk, 0, msg_and_csum_nibbles[i],
slh_fors.c 83 uint8_t sk[SLH_MAX_N], lnode[SLH_MAX_N], rnode[SLH_MAX_N]; local
90 if (!slh_fors_sk_gen(ctx, sk_seed, pk_seed, adrs, node_id, sk, sizeof(sk)))
94 ret = key->hash_func->F(ctx, pk_seed, adrs, sk, n, node, node_len);
95 OPENSSL_cleanse(sk, n);
223 const uint8_t *sk, *authj; /* Pointers to |sig| buffer inside fors_sig_rpkt */ local
252 if (!PACKET_get_bytes(fors_sig_rpkt, &sk, n)
254 || !F(ctx, pk_seed, adrs, sk, n, node0, n))
  /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/
ml_dsa_codecs.c 558 const uint8_t *sk = ossl_ml_dsa_key_get_priv(key); local
564 if (sk == NULL) {
640 memcpy(pos, sk, params->sk_len);
670 const uint8_t *seed, *sk, *pk; local
678 sk = ossl_ml_dsa_key_get_priv(key);
689 if (sk == NULL) {
698 if (!ossl_bio_print_labeled_buf(out, "priv:", sk, params->sk_len))
  /src/sys/net/npf/
npf_connkey.c 203 const uint32_t *sk = skey->ck_key; local
210 dk[0] = sk[1];
211 dk[1] = (sk[1] >> 16) | (sk[1] << 16);
212 memcpy(&dk[2], &sk[2 + nwords], alen);
213 memcpy(&dk[2 + nwords], &sk[2], alen);
215 memcpy(dk, sk, klen);
  /src/crypto/external/apache2/openssl/dist/crypto/ml_dsa/
ml_dsa_key.c 39 const uint8_t *sk, size_t sk_len)
46 || (sk != NULL && sk_len != key->params->sk_len)
51 if (sk != NULL
52 && (key->priv_encoding = OPENSSL_memdup(sk, sk_len)) == NULL)
466 uint8_t *sk; local
479 sk = out->priv_encoding;
481 if (sk == NULL) {
485 && memcmp(out->priv_encoding, sk, out->params->sk_len) != 0) {
492 OPENSSL_free(sk);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/
ml_dsa_kmgmt.c 199 const uint8_t *pk = NULL, *sk = NULL, *seed = NULL; local
225 && !OSSL_PARAM_get_octet_string_ptr(p, (const void **)&sk, &sk_len))
227 if (sk != NULL && sk_len != key_params->sk_len) {
243 if (!ossl_ml_dsa_set_prekey(key, 0, 0, seed, seed_len, sk, sk_len))
250 if (!ossl_ml_dsa_sk_decode(key, sk, sk_len))
414 const uint8_t *sk, *seed; local
425 sk = ossl_ml_dsa_key_get_priv(key);
428 && (sk == NULL || (ossl_ml_dsa_key_get_prov_flags(key) & ML_DSA_KEY_PREFER_SEED))) {
431 } else if (sk != NULL) {
432 if (ossl_ml_dsa_sk_decode(key, sk,
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
dh.h 107 void *sk; member in struct:DH::CRYPTO_EX_DATA
dsa.h 109 void *sk; member in struct:DSA::dsa_CRYPTO_EX_DATA
rsa.h 118 void *sk; member in struct:RSA::rsa_CRYPTO_EX_DATA
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_gpsk.c 23 u8 sk[EAP_GPSK_MAX_SK_LEN]; member in struct:eap_gpsk_data
181 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
414 data->sk, &data->sk_len,
446 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
515 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
  /src/external/gpl2/groff/dist/src/preproc/refer/
token.cpp 88 void token_info::set(token_type t, const char *sk, const char *oc)
92 sort_key = sk;
157 const char *sk = 0, const char *oc = 0)
174 token_table[n].ti.set(typ, sk, oc);
282 const char *sk = 0)
293 store_letter(p, strsave(buf), sk);
300 store_letter(strsave(buf), p, sk); local
  /src/external/lgpl3/mpfr/dist/src/
atan.c 288 mpfr_t xp, arctgt, sk, tmp, tmp2; local
370 MPFR_GROUP_INIT_4 (group, prec, sk, tmp, tmp2, arctgt);
386 9 - 2 * EXP(sk), which we estimate by 9 + 2*ceil(log2(p))
387 since we manage that sk < 1/p */
398 MPFR_GROUP_REPREC_4 (group, prec, sk, tmp, tmp2, arctgt);
412 mpfr_ui_div (sk, 1, xp, MPFR_RNDN);
414 mpfr_set (sk, xp, MPFR_RNDN);
416 /* now 0 < sk <= 1 */
419 We want |sk| < k/sqrt(p) where p is the target precision. */
421 for (red = 0; MPFR_GET_EXP(sk) > - (mpfr_exp_t) log2p; red ++
    [all...]
  /src/sys/dist/pf/net/
if_pfsync.c 250 struct pf_state_key *sk = NULL; local
292 if ((sk = pf_alloc_state_key(st)) == NULL) {
305 pool_put(&pf_state_key_pl, sk);
316 pf_state_host_ntoh(&sp->lan, &sk->lan);
317 pf_state_host_ntoh(&sp->gwy, &sk->gwy);
318 pf_state_host_ntoh(&sp->ext, &sk->ext);
327 sk->af = sp->af;
328 sk->proto = sp->proto;
329 sk->direction = sp->direction;
360 struct pf_state_key *sk; local
1132 struct pf_state_key *sk = st->state_key; local
    [all...]

Completed in 57 milliseconds

1 2