| /third_party/ulib/uboringssl/crypto/fipsmodule/aes/ |
| A D | mode_wrappers.c | 58 const AES_KEY *key, uint8_t ivec[AES_BLOCK_SIZE], in AES_ctr128_encrypt() argument 65 assert(in && out && key); in AES_ecb_encrypt() 69 AES_encrypt(in, out, key); in AES_ecb_encrypt() 71 AES_decrypt(in, out, key); in AES_ecb_encrypt() 81 const AES_KEY *key, uint8_t *ivec, const int enc) { in AES_cbc_encrypt() argument 83 aes_hw_cbc_encrypt(in, out, len, key, ivec, enc); in AES_cbc_encrypt() 89 aes_nohw_cbc_encrypt(in, out, len, key, ivec, enc); in AES_cbc_encrypt() 92 CRYPTO_cbc128_encrypt(in, out, len, key, ivec, AES_encrypt); in AES_cbc_encrypt() 94 CRYPTO_cbc128_decrypt(in, out, len, key, ivec, AES_decrypt); in AES_cbc_encrypt() 100 const AES_KEY *key, uint8_t *ivec, int *num) { in AES_ofb128_encrypt() argument [all …]
|
| A D | internal.h | 56 AES_KEY *key); 58 AES_KEY *key); 59 void aes_hw_encrypt(const uint8_t *in, uint8_t *out, const AES_KEY *key); 60 void aes_hw_decrypt(const uint8_t *in, uint8_t *out, const AES_KEY *key); 62 const AES_KEY *key, uint8_t *ivec, const int enc); 73 AES_KEY *key) { in aes_hw_set_encrypt_key() argument 78 AES_KEY *key) { in aes_hw_set_decrypt_key() argument 83 const AES_KEY *key) { in aes_hw_encrypt() argument 88 const AES_KEY *key) { in aes_hw_decrypt() argument 98 size_t len, const AES_KEY *key, in aes_hw_ctr32_encrypt_blocks() argument [all …]
|
| A D | aes.c | 543 if (!key || !aeskey) { in aes_nohw_set_encrypt_key() 563 rk[0] = GETU32(key); in aes_nohw_set_encrypt_key() 564 rk[1] = GETU32(key + 4); in aes_nohw_set_encrypt_key() 565 rk[2] = GETU32(key + 8); in aes_nohw_set_encrypt_key() 566 rk[3] = GETU32(key + 12); in aes_nohw_set_encrypt_key() 583 rk[4] = GETU32(key + 16); in aes_nohw_set_encrypt_key() 584 rk[5] = GETU32(key + 20); in aes_nohw_set_encrypt_key() 689 rk = key->rd_key; in aes_nohw_encrypt() 699 r = key->rounds >> 1; in aes_nohw_encrypt() 751 rk = key->rd_key; in aes_nohw_decrypt() [all …]
|
| /third_party/ulib/jemalloc/src/ |
| A D | ckh.c | 60 if (cell->key != NULL && ckh->keycomp(key, cell->key)) in ckh_bucket_search() 108 cell->key = key; in ckh_try_bucket_insert() 134 key = *argkey; in ckh_evict_reloc_insert() 152 cell->key = key; cell->data = data; in ckh_evict_reloc_insert() 184 *argkey = key; in ckh_evict_reloc_insert() 234 key = aTab[i].key; in ckh_rebuild() 451 *key = (void *)ckh->tab[i].key; in ckh_iter() 497 *key = (void *)ckh->tab[cell].key; in ckh_remove() 528 *key = (void *)ckh->tab[cell].key; in ckh_search() 540 hash(key, strlen((const char *)key), 0x94122f33U, r_hash); in ckh_string_hash() [all …]
|
| /third_party/ulib/uboringssl/crypto/chacha/ |
| A D | chacha.c | 49 OPENSSL_memcpy(&x[4], key, 32); in CRYPTO_hchacha20() 89 if ((((uintptr_t)key) & 3) != 0) { in CRYPTO_chacha_20() 90 key_u32[0] = U8TO32_LITTLE(key + 0); in CRYPTO_chacha_20() 156 input[4] = U8TO32_LITTLE(key + 0); in CRYPTO_chacha_20() 157 input[5] = U8TO32_LITTLE(key + 4); in CRYPTO_chacha_20() 158 input[6] = U8TO32_LITTLE(key + 8); in CRYPTO_chacha_20() 159 input[7] = U8TO32_LITTLE(key + 12); in CRYPTO_chacha_20() 161 input[8] = U8TO32_LITTLE(key + 16); in CRYPTO_chacha_20() 162 input[9] = U8TO32_LITTLE(key + 20); in CRYPTO_chacha_20() 163 input[10] = U8TO32_LITTLE(key + 24); in CRYPTO_chacha_20() [all …]
|
| /third_party/ulib/uboringssl/include/openssl/ |
| A D | aes.h | 83 OPENSSL_EXPORT int AES_set_encrypt_key(const uint8_t *key, unsigned bits, 91 OPENSSL_EXPORT int AES_set_decrypt_key(const uint8_t *key, unsigned bits, 97 const AES_KEY *key); 102 const AES_KEY *key); 111 size_t len, const AES_KEY *key, 119 const AES_KEY *key, const int enc); 124 const AES_KEY *key, uint8_t *ivec, 131 size_t len, const AES_KEY *key, 138 size_t len, const AES_KEY *key, 153 OPENSSL_EXPORT int AES_wrap_key(const AES_KEY *key, const uint8_t *iv, [all …]
|
| A D | evp.h | 158 OPENSSL_EXPORT int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key); 159 OPENSSL_EXPORT int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key); 163 OPENSSL_EXPORT int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key); 164 OPENSSL_EXPORT int EVP_PKEY_assign_DSA(EVP_PKEY *pkey, DSA *key); 168 OPENSSL_EXPORT int EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key); 169 OPENSSL_EXPORT int EVP_PKEY_assign_EC_KEY(EVP_PKEY *pkey, EC_KEY *key); 193 OPENSSL_EXPORT int EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key); 223 OPENSSL_EXPORT int EVP_marshal_public_key(CBB *cbb, const EVP_PKEY *key); 639 OPENSSL_EXPORT int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, uint8_t *key, 794 OPENSSL_EXPORT int i2d_PrivateKey(const EVP_PKEY *key, uint8_t **outp); [all …]
|
| A D | hmac.h | 80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key, 113 OPENSSL_EXPORT int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t key_len, 147 OPENSSL_EXPORT int HMAC_Init(HMAC_CTX *ctx, const void *key, int key_len,
|
| A D | cipher.h | 154 const uint8_t *key, const uint8_t *iv, 160 const uint8_t *key, const uint8_t *iv); 165 const uint8_t *key, const uint8_t *iv); 334 size_t data_len, unsigned count, uint8_t *key, 389 const uint8_t *key, const uint8_t *iv, 394 const EVP_CIPHER *cipher, const uint8_t *key, 399 const EVP_CIPHER *cipher, const uint8_t *key, 554 int (*init)(EVP_CIPHER_CTX *ctx, const uint8_t *key, const uint8_t *iv,
|
| /third_party/ulib/jemalloc/include/jemalloc/internal/ |
| A D | rtree_inlines.h | 7 const rtree_ctx_t *rtree_ctx, uintptr_t key); 24 uintptr_t key, const extent_t *extent); 35 uintptr_t key); 44 if (unlikely(key == 0)) in rtree_start_level() 55 uintptr_t key) in rtree_ctx_start_level() argument 61 key_diff = key ^ rtree_ctx->key; in rtree_ctx_start_level() 187 if (key == rtree_ctx->key) in rtree_elm_lookup() 191 rtree_start_level(rtree, key); in rtree_elm_lookup() 197 key)) >= rtree_ctx->start_level)) { in rtree_elm_lookup() 215 key); in rtree_elm_lookup() [all …]
|
| A D | ckh_externs.h | 10 bool ckh_iter(ckh_t *ckh, size_t *tabind, void **key, void **data); 11 bool ckh_insert(tsd_t *tsd, ckh_t *ckh, const void *key, const void *data); 12 bool ckh_remove(tsd_t *tsd, ckh_t *ckh, const void *searchkey, void **key, 14 bool ckh_search(ckh_t *ckh, const void *searchkey, void **key, void **data); 15 void ckh_string_hash(const void *key, size_t r_hash[2]); 17 void ckh_pointer_hash(const void *key, size_t r_hash[2]);
|
| A D | hash_inlines.h | 11 uint32_t hash_x86_32(const void *key, int len, uint32_t seed); 12 void hash_x86_128(const void *key, const int len, uint32_t seed, 14 void hash_x64_128(const void *key, const int len, const uint32_t seed, 16 void hash(const void *key, size_t len, const uint32_t seed, 88 hash_x86_32(const void *key, int len, uint32_t seed) in hash_x86_32() argument 90 const uint8_t *data = (const uint8_t *) key; in hash_x86_32() 139 hash_x86_128(const void *key, const int len, uint32_t seed, in hash_x86_128() argument 142 const uint8_t * data = (const uint8_t *) key; in hash_x86_128() 244 const uint8_t *data = (const uint8_t *) key; in hash_x64_128() 326 hash_x64_128(key, (int)len, seed, (uint64_t *)r_hash); in hash() [all …]
|
| /third_party/ulib/uboringssl/crypto/fipsmodule/modes/ |
| A D | internal.h | 101 const AES_KEY *key); 108 const AES_KEY *key, const uint8_t ivec[16]); 117 const AES_KEY *key, uint8_t ivec[16], 126 const AES_KEY *key, uint8_t ivec[16], 241 const AES_KEY *key, 251 const AES_KEY *key, 277 int CRYPTO_ccm128_init(CCM128_CONTEXT *ctx, const AES_KEY *key, 313 const AES_KEY *key, uint8_t ivec[16], 321 const AES_KEY *key, uint8_t ivec[16], 351 const AES_KEY *key, uint8_t ivec[16], [all …]
|
| /third_party/ulib/musl/src/crypt/ |
| A D | crypt_r.c | 12 char* __crypt_r(const char* key, const char* salt, struct crypt_data* data) { in __crypt_r() argument 20 return __crypt_md5(key, salt, output); in __crypt_r() 22 return __crypt_blowfish(key, salt, output); in __crypt_r() 24 return __crypt_sha256(key, salt, output); in __crypt_r() 26 return __crypt_sha512(key, salt, output); in __crypt_r() 28 return __crypt_des(key, salt, output); in __crypt_r()
|
| A D | encrypt.c | 9 void __des_setkey(const unsigned char* key, struct expanded_key* ekey); 15 void setkey(const char* key) { in setkey() argument 21 for (j = 7; j >= 0; j--, key++) in setkey() 22 bkey[i] |= (uint32_t)(*key & 1) << j; in setkey() 29 struct expanded_key decrypt_key, *key; in encrypt() local 41 key = &__encrypt_key; in encrypt() 43 key = &decrypt_key; in encrypt() 50 __do_des(b[0], b[1], b, b + 1, 1, 0, key); in encrypt()
|
| A D | crypt.c | 6 char* crypt(const char* key, const char* salt) { in crypt() argument 14 return __crypt_r(key, salt, (struct crypt_data*)buf); in crypt()
|
| /third_party/ulib/jemalloc/test/unit/ |
| A D | rb.c | 20 uint64_t key; member 30 ret = (a->key > b->key) - (a->key < b->key); in node_cmp() 48 node_t key; in TEST_BEGIN() local 56 key.key = 0; in TEST_BEGIN() 57 key.magic = NODE_MAGIC; in TEST_BEGIN() 60 key.key = 0; in TEST_BEGIN() 61 key.magic = NODE_MAGIC; in TEST_BEGIN() 64 key.key = 0; in TEST_BEGIN() 65 key.magic = NODE_MAGIC; in TEST_BEGIN() 175 assert_u64_ge(search_node->key, node->key, in node_remove() [all …]
|
| A D | hash.c | 62 hash_variant_verify_key(hash_variant_t variant, uint8_t *key) in hash_variant_verify_key() argument 71 memset(key, 0, KEY_SIZE); in hash_variant_verify_key() 80 key[i] = (uint8_t)i; in hash_variant_verify_key() 84 out = hash_x86_32(key, i, 256-i); in hash_variant_verify_key() 89 hash_x86_128(key, i, 256-i, out); in hash_variant_verify_key() 94 hash_x64_128(key, i, 256-i, out); in hash_variant_verify_key() 145 uint8_t key[KEY_SIZE + (MAX_ALIGN - 1)]; in hash_variant_verify() local 149 hash_variant_verify_key(variant, &key[i]); in hash_variant_verify()
|
| /third_party/ulib/uboringssl/crypto/fipsmodule/hmac/ |
| A D | hmac.c | 68 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, in HMAC() argument 73 if (!HMAC_Init_ex(&ctx, key, key_len, evp_md, NULL) || in HMAC() 114 int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t key_len, in HMAC_Init_ex() argument 127 if (md != ctx->md || key != NULL) { in HMAC_Init_ex() 137 !EVP_DigestUpdate(&ctx->md_ctx, key, key_len) || in HMAC_Init_ex() 143 OPENSSL_memcpy(key_block, key, key_len); in HMAC_Init_ex() 218 int HMAC_Init(HMAC_CTX *ctx, const void *key, int key_len, const EVP_MD *md) { in HMAC_Init() argument 219 if (key && md) { in HMAC_Init() 222 return HMAC_Init_ex(ctx, key, key_len, md, NULL); in HMAC_Init()
|
| /third_party/ulib/uboringssl/ |
| A D | zircon-unused.c | 17 void CRYPTO_cbc128_decrypt(const uint8_t* in, uint8_t* out, size_t len, const AES_KEY* key, in CRYPTO_cbc128_decrypt() argument 22 void CRYPTO_cbc128_encrypt(const uint8_t* in, uint8_t* out, size_t len, const AES_KEY* key, in CRYPTO_cbc128_encrypt() argument 27 void CRYPTO_cfb128_encrypt(const uint8_t* in, uint8_t* out, size_t len, const AES_KEY* key, in CRYPTO_cfb128_encrypt() argument 32 void CRYPTO_ctr128_encrypt(const uint8_t* in, uint8_t* out, size_t len, const AES_KEY* key, in CRYPTO_ctr128_encrypt() argument 38 void CRYPTO_ctr128_encrypt_ctr32(const uint8_t* in, uint8_t* out, size_t len, const AES_KEY* key, in CRYPTO_ctr128_encrypt_ctr32() argument 44 void CRYPTO_ofb128_encrypt(const uint8_t* in, uint8_t* out, size_t len, const AES_KEY* key, in CRYPTO_ofb128_encrypt() argument
|
| /third_party/ulib/uboringssl/crypto/fipsmodule/cipher/ |
| A D | e_aes.c | 173 AES_KEY *key) { in vpaes_set_encrypt_key() argument 177 AES_KEY *key) { in vpaes_set_decrypt_key() argument 320 AES_set_encrypt_key(key, key_bytes * 8, aes_key); in aes_ctr_set_key() 331 vpaes_set_encrypt_key(key, key_bytes * 8, aes_key); in aes_ctr_set_key() 341 AES_set_encrypt_key(key, key_bytes * 8, aes_key); in aes_ctr_set_key() 354 if (!iv && !key) { in aes_gcm_init_key() 357 if (key) { in aes_gcm_init_key() 956 const AES_KEY *key = &gcm_ctx->ks.ks; in aead_aes_gcm_seal_scatter() local 961 CRYPTO_gcm128_setiv(&gcm, key, nonce, nonce_len); in aead_aes_gcm_seal_scatter() 1015 const AES_KEY *key = &gcm_ctx->ks.ks; in aead_aes_gcm_open_gather() local [all …]
|
| /third_party/ulib/uboringssl/crypto/cipher_extra/ |
| A D | e_aesgcmsiv.c | 35 alignas(16) uint8_t key[16*15]; 46 const uint8_t key[16], uint8_t out_expanded_key[16*15]); 51 const uint8_t key[16], uint8_t out_expanded_key[16*15]); 85 aes128gcmsiv_aes_ks(key, &gcm_siv_ctx->key[0]); in aead_aes_gcm_siv_asm_init() 88 aes256gcmsiv_aes_ks(key, &gcm_siv_ctx->key[0]); in aead_aes_gcm_siv_asm_init() 166 const uint64_t key[2]); 172 const uint64_t key[4]); 372 aes128gcmsiv_aes_ks_enc_x1(tag, tag, &enc_key_expanded.key[0], in aead_aes_gcm_siv_asm_seal_scatter() 618 enc_block(counter.c, keystream, key); in gcm_siv_crypt() 695 const AES_KEY *const key = &gcm_siv_ctx->ks.ks; in gcm_siv_keys() local [all …]
|
| /third_party/ulib/musl/src/passwd/ |
| A D | nscd_query.c | 15 FILE* __nscd_query(int32_t req, const char* key, int32_t* buf, size_t len, int* swap) { in __nscd_query() argument 19 int32_t req_buf[REQ_LEN] = {NSCDVERSION, req, strnlen(key, LOGIN_NAME_MAX) + 1}; in __nscd_query() 21 .msg_iov = (struct iovec[]){{&req_buf, sizeof(req_buf)}, {(char*)key, strlen(key) + 1}}, in __nscd_query()
|
| /third_party/ulib/cryptolib/ |
| A D | cryptolib.c | 71 clHASH_update(&ctx->hash, key, len); in _HMAC_init() 74 memcpy(&ctx->opad[0], key, len); in _HMAC_init() 234 _HMAC_init(ctx, key, len); in clHMAC_SHA256_init() 320 _HMAC_init(ctx, key, len); in clHMAC_SHA1_init() 422 u8tou32(a, inout, key->size); in modpowF4() 424 montMul(key, aR, a, key->rr); // aR = a * RR / R mod M in modpowF4() 426 montMul(key, aaR, aR, aR); // aaR = aR * aR / R mod M in modpowF4() 427 montMul(key, aR, aaR, aaR); // aR = aaR * aaR / R mod M in modpowF4() 429 montMul(key, aaa, aR, a); // aaa = aR * a / R mod M in modpowF4() 431 u32tou8(inout, subM(key, a, aaa, 1), key->nwords); in modpowF4() [all …]
|
| /third_party/ulib/musl/src/stdlib/ |
| A D | bsearch.c | 3 void* bsearch(const void* key, const void* base, size_t nel, size_t width, in bsearch() argument 11 sign = cmp(key, try); in bsearch()
|