/dragonfly/usr.sbin/makefs/hammer2/ |
H A D | hammer2_chain.c | 5263 hammer2_key_t xkey; in hammer2_base_insert() local 5342 xkey = elm->key + ((hammer2_key_t)1 << elm->keybits) - 1; in hammer2_base_insert() 5343 if (i != count && (base[i].key < elm->key || xkey >= base[i].key)) { in hammer2_base_insert()
|
/dragonfly/sys/vfs/hammer2/ |
H A D | hammer2_chain.c | 5228 hammer2_key_t xkey; in hammer2_base_insert() local 5307 xkey = elm->key + ((hammer2_key_t)1 << elm->keybits) - 1; in hammer2_base_insert() 5308 if (i != count && (base[i].key < elm->key || xkey >= base[i].key)) { in hammer2_base_insert()
|
/dragonfly/usr.bin/newkey/ |
H A D | generic.c | 97 char *xkey; in genkeys() local 128 if ((xkey = BN_bn2hex(sk)) == NULL) in genkeys() 131 adjust(secret, xkey); in genkeys() 132 OPENSSL_free(xkey); in genkeys() 134 if ((xkey = BN_bn2hex(pk)) == NULL) in genkeys() 137 adjust(public, xkey); in genkeys() 138 OPENSSL_free(xkey); in genkeys()
|
/dragonfly/sys/opencrypto/ |
H A D | cast.c | 25 t = ROL(key->xkey[i] + r, key->xkey[i+16]); \ 29 t = ROL(key->xkey[i] ^ r, key->xkey[i+16]); \ 33 t = ROL(key->xkey[i] - r, key->xkey[i+16]); \ 204 key->xkey[i+0] ^= cast_sbox5[U_INT8_Tc(z[0])]; in cast_setkey() 205 key->xkey[i+1] ^= cast_sbox6[U_INT8_Tc(z[1])]; in cast_setkey() 206 key->xkey[i+2] ^= cast_sbox7[U_INT8_Tb(z[2])]; in cast_setkey() 207 key->xkey[i+3] ^= cast_sbox8[U_INT8_Ta(z[3])]; in cast_setkey() 229 key->xkey[i+0] &= 31; in cast_setkey() 230 key->xkey[i+1] &= 31; in cast_setkey() 231 key->xkey[i+2] &= 31; in cast_setkey() [all …]
|
H A D | cast.h | 15 u_int32_t xkey[32]; /* Key, after expansion */ member
|
/dragonfly/lib/libtelnet/ |
H A D | pk.c | 198 char *xkey; in genkeys() local 229 if ((xkey = BN_bn2hex(sk)) == NULL) in genkeys() 232 adjust(secret, xkey); in genkeys() 233 OPENSSL_free(xkey); in genkeys() 235 if ((xkey = BN_bn2hex(pk)) == NULL) in genkeys() 238 adjust(public, xkey); in genkeys() 239 OPENSSL_free(xkey); in genkeys()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 112 u8 xkey[SHA1_MAC_LEN]; in eap_sim_derive_keys_reauth() local 143 sha1_vector(4, addr, len, xkey); in eap_sim_derive_keys_reauth() 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); in eap_sim_derive_keys_reauth() 146 if (eap_sim_prf(xkey, buf, sizeof(buf)) < 0) { in eap_sim_derive_keys_reauth()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 1889 u8 xkey[] = { in test_fips186_2_prf() local 1905 if (fips186_2_prf(xkey, sizeof(xkey), buf, sizeof(buf)) < 0 || in test_fips186_2_prf()
|
H A D | fips_prf_internal.c | 19 u8 xkey[64]; in fips186_2_prf() local 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 47 SHA1Transform(_t, xkey); in fips186_2_prf() 58 carry += xkey[k] + xpos[k]; in fips186_2_prf() 59 xkey[k] = carry & 0xff; in fips186_2_prf()
|
H A D | fips_prf_openssl.c | 50 u8 xkey[64]; in fips186_2_prf() local 56 if (seed_len < sizeof(xkey)) in fips186_2_prf() 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 59 seed_len = sizeof(xkey); in fips186_2_prf() 63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 78 sha1_transform(_t, xkey); in fips186_2_prf() 88 carry += xkey[k] + xpos[k]; in fips186_2_prf() 89 xkey[k] = carry & 0xff; in fips186_2_prf()
|
H A D | fips_prf_wolfssl.c | 38 u8 xkey[64]; in fips186_2_prf() local 44 if (seed_len < sizeof(xkey)) in fips186_2_prf() 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 47 seed_len = sizeof(xkey); in fips186_2_prf() 51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 66 sha1_transform(_t, xkey); in fips186_2_prf() 76 carry += xkey[k] + xpos[k]; in fips186_2_prf() 77 xkey[k] = carry & 0xff; in fips186_2_prf()
|