HomeSort by: relevance | last modified time | path
    Searched defs:klen (Results 1 - 25 of 42) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/
cipher_aes_siv_hw.c 24 size_t klen = keylen / 2; local
33 switch (klen) {
52 * klen is the length of the underlying cipher, not the input key,
55 return ossl_siv128_init(sctx, key, klen, ctx->cbc, ctx->ctr, libctx,
  /src/crypto/external/bsd/openssh/dist/
kexdh.c 77 size_t klen = 0; local
93 klen = DH_size(kex->dh);
94 if ((kbuf = malloc(klen)) == NULL ||
109 freezero(kbuf, klen);
kexecdh.c 146 size_t klen = 0; local
174 klen = (EC_GROUP_get_degree(group) + 7) / 8;
175 if ((kbuf = malloc(klen)) == NULL ||
180 if (ECDH_compute_key(kbuf, klen, dh_pub, key, NULL) != (int)klen ||
181 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
186 dump_digest("shared secret", kbuf, klen);
195 freezero(kbuf, klen);
cipher.c 276 int klen; local
328 klen = EVP_CIPHER_CTX_key_length(cc->evp);
329 if (klen > 0 && keylen != (u_int)klen) {
  /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/
cipher_aes_siv_hw.c 24 size_t klen = keylen / 2; local
33 switch (klen) {
52 * klen is the length of the underlying cipher, not the input key,
55 return ossl_siv128_init(sctx, key, klen, ctx->cbc, ctx->ctr, libctx,
  /src/sys/external/isc/libsodium/dist/test/default/
metamorphic.c 16 size_t klen; local
24 klen = randombytes_uniform(crypto_generichash_KEYBYTES_MAX -
27 k = (unsigned char *) sodium_malloc(klen);
34 randombytes_buf(k, klen);
37 crypto_generichash_init(&st, k, klen, hlen);
45 crypto_generichash(h2, hlen, m, mlen, k, klen);
  /src/crypto/external/bsd/openssl.old/dist/crypto/pem/
pem_pk8.c 21 char *kstr, int klen, pem_password_cb *cb, void *u);
26 char *kstr, int klen, pem_password_cb *cb, void *u);
36 char *kstr, int klen,
39 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u);
43 char *kstr, int klen,
46 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u);
50 char *kstr, int klen,
53 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u);
57 char *kstr, int klen,
60 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u)
117 int klen; local
    [all...]
pem_pkey.c 54 int klen; local
60 klen = cb(psbuf, PEM_BUFSIZE, 0, u);
62 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u);
63 if (klen < 0) {
68 p8inf = PKCS8_decrypt(p8, psbuf, klen);
70 OPENSSL_cleanse(psbuf, klen);
96 unsigned char *kstr, int klen,
101 (char *)kstr, klen, cb, u);
102 return PEM_write_bio_PrivateKey_traditional(bp, x, enc, kstr, klen, cb, u);
107 unsigned char *kstr, int klen,
    [all...]
  /src/external/gpl2/lvm2/dist/libdm/regex/
ttree.c 28 int klen; member in struct:ttree
54 int count = tt->klen;
77 int count = tt->klen;
107 struct ttree *ttree_create(struct dm_pool *mem, unsigned int klen)
116 tt->klen = klen;
  /src/crypto/external/apache2/openssl/dist/crypto/pem/
pem_pk8.c 23 const char *kstr, int klen,
30 const char *kstr, int klen,
42 const char *kstr, int klen,
45 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u, NULL);
49 const char *kstr, int klen,
52 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u, NULL);
56 const char *kstr, int klen,
59 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u, NULL);
63 const char *kstr, int klen,
66 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u, NULL)
173 int klen; local
    [all...]
pem_pkey.c 149 int klen; local
155 klen = cb(psbuf, PEM_BUFSIZE, 0, u);
157 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u);
158 if (klen < 0) {
163 p8inf = PKCS8_decrypt(p8, psbuf, klen);
165 OPENSSL_cleanse(psbuf, klen);
326 (const char *)kstr, klen, cb, u);
327 return PEM_write_bio_PrivateKey_traditional(out, x, enc, kstr, klen, cb, u);
332 return PEM_write_bio_PrivateKey_ex(out, x, enc, kstr, klen, cb, u,
342 const unsigned char *kstr, int klen,
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/pem/
pem_pk8.c 23 const char *kstr, int klen,
30 const char *kstr, int klen,
42 const char *kstr, int klen,
45 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u, NULL);
49 const char *kstr, int klen,
52 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u, NULL);
56 const char *kstr, int klen,
59 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u, NULL);
63 const char *kstr, int klen,
66 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u, NULL)
174 int klen; local
    [all...]
pem_pkey.c 149 int klen; local
155 klen = cb(psbuf, PEM_BUFSIZE, 0, u);
157 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u);
158 if (klen < 0) {
163 p8inf = PKCS8_decrypt(p8, psbuf, klen);
165 OPENSSL_cleanse(psbuf, klen);
325 (const char *)kstr, klen, cb, u);
326 return PEM_write_bio_PrivateKey_traditional(out, x, enc, kstr, klen, cb, u);
331 return PEM_write_bio_PrivateKey_ex(out, x, enc, kstr, klen, cb, u,
341 const unsigned char *kstr, int klen,
    [all...]
  /src/lib/libterminfo/
term.c 274 size_t len, klen; local
294 klen = strlen(name) + 1;
295 if (cdbr_find(db, name, klen, &data, &len) == -1)
  /src/external/ibm-public/postfix/dist/src/util/
dict_lmdb.c 142 ssize_t klen; local
145 klen = strlen(name);
176 mdb_key.mv_size = klen + 1;
195 mdb_key.mv_size = klen;
316 ssize_t klen; local
319 klen = strlen(name);
350 mdb_key.mv_size = klen + 1;
370 mdb_key.mv_size = klen;
  /src/sys/net/npf/
npf_connkey.c 202 const unsigned klen = NPF_CONNKEY_LEN(skey); local
215 memcpy(dk, sk, klen);
217 return klen;
  /src/crypto/external/apache2/openssl/dist/crypto/rsa/
rsa_pmeth.c 339 int klen = RSA_size(rsa); local
342 if (!RSA_padding_add_PKCS1_OAEP_mgf1(rctx->tbuf, klen,
348 ret = RSA_public_encrypt(klen, rctx->tbuf, out, rsa, RSA_NO_PADDING);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/
krb5kdf.c 350 int klen, ret; local
356 klen = EVP_CIPHER_CTX_get_key_length(ctx);
357 if (key_len != (size_t)klen) {
  /src/crypto/external/bsd/openssl/dist/crypto/rsa/
rsa_pmeth.c 326 int klen = RSA_size(rsa); local
329 if (!RSA_padding_add_PKCS1_OAEP_mgf1(rctx->tbuf, klen,
335 ret = RSA_public_encrypt(klen, rctx->tbuf, out, rsa, RSA_NO_PADDING);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/
krb5kdf.c 330 int klen, ret; local
336 klen = EVP_CIPHER_CTX_get_key_length(ctx);
337 if (key_len != (size_t)klen) {
  /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/
rsa_pmeth.c 301 int klen = RSA_size(ctx->pkey->pkey.rsa); local
304 if (!RSA_padding_add_PKCS1_OAEP_mgf1(rctx->tbuf, klen,
310 ret = RSA_public_encrypt(klen, rctx->tbuf, out,
  /src/usr.bin/db/
db.c 430 int klen; local
434 if ((klen = decode_data(keystr, &ks)) == -1)
437 klen = strlen(keystr);
441 key->size = klen + (flags & F_INCLUDE_NUL ? 0 : 1);
  /src/external/bsd/less/dist/
decode.c 254 int klen; local
279 klen = fm[2] & 0377;
280 fm += klen;
281 if (repl == NULL || (int) strlen(repl) > klen)
  /src/sys/net80211/
ieee80211_ioctl.c 2564 int i, error = 0, kid, klen, s; local
2640 klen = nwkey->i_key[kid].i_keylen;
2641 if ((klen > 0 &&
2642 klen < IEEE80211_WEP_KEYLEN) ||
2643 klen > sizeof(ic->ic_nw_keys[kid].wk_key)) {
2655 klen = nwkey->i_key[kid].i_keylen;
2656 if (klen <= 0)
2659 tmpkey[kid], klen)) != 0)
2669 klen = nwkey->i_key[kid].i_keylen;
2670 if (klen <= 0
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/base/
test_base.c 642 size_t klen, vlen; local
647 klen = heim_data_get_length(k);
651 if (klen == strlen("msg") && !strncmp(kptr, "msg", strlen("msg")) &&
654 else if (klen == strlen("msg2") &&

Completed in 54 milliseconds

1 2