| /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/ |
| cipher_aes_siv_hw.c | 24 size_t klen = keylen / 2; local 33 switch (klen) { 52 * klen is the length of the underlying cipher, not the input key, 55 return ossl_siv128_init(sctx, key, klen, ctx->cbc, ctx->ctr, libctx,
|
| /src/crypto/external/bsd/openssh/dist/ |
| kexdh.c | 77 size_t klen = 0; local 93 klen = DH_size(kex->dh); 94 if ((kbuf = malloc(klen)) == NULL || 109 freezero(kbuf, klen);
|
| kexecdh.c | 146 size_t klen = 0; local 174 klen = (EC_GROUP_get_degree(group) + 7) / 8; 175 if ((kbuf = malloc(klen)) == NULL || 180 if (ECDH_compute_key(kbuf, klen, dh_pub, key, NULL) != (int)klen || 181 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 186 dump_digest("shared secret", kbuf, klen); 195 freezero(kbuf, klen);
|
| cipher.c | 276 int klen; local 328 klen = EVP_CIPHER_CTX_key_length(cc->evp); 329 if (klen > 0 && keylen != (u_int)klen) {
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
| cipher_aes_siv_hw.c | 24 size_t klen = keylen / 2; local 33 switch (klen) { 52 * klen is the length of the underlying cipher, not the input key, 55 return ossl_siv128_init(sctx, key, klen, ctx->cbc, ctx->ctr, libctx,
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| metamorphic.c | 16 size_t klen; local 24 klen = randombytes_uniform(crypto_generichash_KEYBYTES_MAX - 27 k = (unsigned char *) sodium_malloc(klen); 34 randombytes_buf(k, klen); 37 crypto_generichash_init(&st, k, klen, hlen); 45 crypto_generichash(h2, hlen, m, mlen, k, klen);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pem/ |
| pem_pk8.c | 21 char *kstr, int klen, pem_password_cb *cb, void *u); 26 char *kstr, int klen, pem_password_cb *cb, void *u); 36 char *kstr, int klen, 39 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); 43 char *kstr, int klen, 46 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); 50 char *kstr, int klen, 53 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); 57 char *kstr, int klen, 60 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u) 117 int klen; local [all...] |
| pem_pkey.c | 54 int klen; local 60 klen = cb(psbuf, PEM_BUFSIZE, 0, u); 62 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u); 63 if (klen < 0) { 68 p8inf = PKCS8_decrypt(p8, psbuf, klen); 70 OPENSSL_cleanse(psbuf, klen); 96 unsigned char *kstr, int klen, 101 (char *)kstr, klen, cb, u); 102 return PEM_write_bio_PrivateKey_traditional(bp, x, enc, kstr, klen, cb, u); 107 unsigned char *kstr, int klen, [all...] |
| /src/external/gpl2/lvm2/dist/libdm/regex/ |
| ttree.c | 28 int klen; member in struct:ttree 54 int count = tt->klen; 77 int count = tt->klen; 107 struct ttree *ttree_create(struct dm_pool *mem, unsigned int klen) 116 tt->klen = klen;
|
| /src/crypto/external/apache2/openssl/dist/crypto/pem/ |
| pem_pk8.c | 23 const char *kstr, int klen, 30 const char *kstr, int klen, 42 const char *kstr, int klen, 45 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u, NULL); 49 const char *kstr, int klen, 52 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u, NULL); 56 const char *kstr, int klen, 59 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u, NULL); 63 const char *kstr, int klen, 66 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u, NULL) 173 int klen; local [all...] |
| pem_pkey.c | 149 int klen; local 155 klen = cb(psbuf, PEM_BUFSIZE, 0, u); 157 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u); 158 if (klen < 0) { 163 p8inf = PKCS8_decrypt(p8, psbuf, klen); 165 OPENSSL_cleanse(psbuf, klen); 326 (const char *)kstr, klen, cb, u); 327 return PEM_write_bio_PrivateKey_traditional(out, x, enc, kstr, klen, cb, u); 332 return PEM_write_bio_PrivateKey_ex(out, x, enc, kstr, klen, cb, u, 342 const unsigned char *kstr, int klen, [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/pem/ |
| pem_pk8.c | 23 const char *kstr, int klen, 30 const char *kstr, int klen, 42 const char *kstr, int klen, 45 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u, NULL); 49 const char *kstr, int klen, 52 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u, NULL); 56 const char *kstr, int klen, 59 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u, NULL); 63 const char *kstr, int klen, 66 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u, NULL) 174 int klen; local [all...] |
| pem_pkey.c | 149 int klen; local 155 klen = cb(psbuf, PEM_BUFSIZE, 0, u); 157 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u); 158 if (klen < 0) { 163 p8inf = PKCS8_decrypt(p8, psbuf, klen); 165 OPENSSL_cleanse(psbuf, klen); 325 (const char *)kstr, klen, cb, u); 326 return PEM_write_bio_PrivateKey_traditional(out, x, enc, kstr, klen, cb, u); 331 return PEM_write_bio_PrivateKey_ex(out, x, enc, kstr, klen, cb, u, 341 const unsigned char *kstr, int klen, [all...] |
| /src/lib/libterminfo/ |
| term.c | 274 size_t len, klen; local 294 klen = strlen(name) + 1; 295 if (cdbr_find(db, name, klen, &data, &len) == -1)
|
| /src/external/ibm-public/postfix/dist/src/util/ |
| dict_lmdb.c | 142 ssize_t klen; local 145 klen = strlen(name); 176 mdb_key.mv_size = klen + 1; 195 mdb_key.mv_size = klen; 316 ssize_t klen; local 319 klen = strlen(name); 350 mdb_key.mv_size = klen + 1; 370 mdb_key.mv_size = klen;
|
| /src/sys/net/npf/ |
| npf_connkey.c | 202 const unsigned klen = NPF_CONNKEY_LEN(skey); local 215 memcpy(dk, sk, klen); 217 return klen;
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_pmeth.c | 339 int klen = RSA_size(rsa); local 342 if (!RSA_padding_add_PKCS1_OAEP_mgf1(rctx->tbuf, klen, 348 ret = RSA_public_encrypt(klen, rctx->tbuf, out, rsa, RSA_NO_PADDING);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| krb5kdf.c | 350 int klen, ret; local 356 klen = EVP_CIPHER_CTX_get_key_length(ctx); 357 if (key_len != (size_t)klen) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_pmeth.c | 326 int klen = RSA_size(rsa); local 329 if (!RSA_padding_add_PKCS1_OAEP_mgf1(rctx->tbuf, klen, 335 ret = RSA_public_encrypt(klen, rctx->tbuf, out, rsa, RSA_NO_PADDING);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| krb5kdf.c | 330 int klen, ret; local 336 klen = EVP_CIPHER_CTX_get_key_length(ctx); 337 if (key_len != (size_t)klen) {
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_pmeth.c | 301 int klen = RSA_size(ctx->pkey->pkey.rsa); local 304 if (!RSA_padding_add_PKCS1_OAEP_mgf1(rctx->tbuf, klen, 310 ret = RSA_public_encrypt(klen, rctx->tbuf, out,
|
| /src/usr.bin/db/ |
| db.c | 430 int klen; local 434 if ((klen = decode_data(keystr, &ks)) == -1) 437 klen = strlen(keystr); 441 key->size = klen + (flags & F_INCLUDE_NUL ? 0 : 1);
|
| /src/external/bsd/less/dist/ |
| decode.c | 254 int klen; local 279 klen = fm[2] & 0377; 280 fm += klen; 281 if (repl == NULL || (int) strlen(repl) > klen)
|
| /src/sys/net80211/ |
| ieee80211_ioctl.c | 2564 int i, error = 0, kid, klen, s; local 2640 klen = nwkey->i_key[kid].i_keylen; 2641 if ((klen > 0 && 2642 klen < IEEE80211_WEP_KEYLEN) || 2643 klen > sizeof(ic->ic_nw_keys[kid].wk_key)) { 2655 klen = nwkey->i_key[kid].i_keylen; 2656 if (klen <= 0) 2659 tmpkey[kid], klen)) != 0) 2669 klen = nwkey->i_key[kid].i_keylen; 2670 if (klen <= 0 [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/base/ |
| test_base.c | 642 size_t klen, vlen; local 647 klen = heim_data_get_length(k); 651 if (klen == strlen("msg") && !strncmp(kptr, "msg", strlen("msg")) && 654 else if (klen == strlen("msg2") &&
|