| /src/crypto/external/apache2/openssl/dist/demos/keyexch/ |
| ecdh.c | 33 size_t secretlen; member in struct:peer_data_st 110 size_t secretlen = 0; local 150 if (EVP_PKEY_derive(derivectx, NULL, &secretlen) <= 0) 152 secret = (unsigned char *)OPENSSL_malloc(secretlen); 161 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0) 164 peerA->secretlen = secretlen; 167 BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2); 207 if (peer1.secretlen != peer2.secretlen [all...] |
| /src/external/mpl/bind/dist/bin/named/ |
| tsigconf.c | 58 int secretlen = 0; local 99 secretalloc = secretlen = strlen(secretstr) * 3 / 4; 100 secret = isc_mem_get(mctx, secretlen); 101 isc_buffer_init(&secretbuf, secret, secretlen); 106 secretlen = isc_buffer_usedlength(&secretbuf); 108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, mctx,
|
| /src/lib/libskey/ |
| skeylogin.c | 451 size_t secretlen; local 497 secretlen = SKEY_MAX_SEED_LEN; 502 secretlen = strlen(secret); 513 SHA1Update(&ctx, secret, secretlen); 518 memset(secret, 0, secretlen);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/ |
| ec_kem.c | 526 size_t secretlen = (EC_GROUP_get_degree(group) + 7) / 8; local 528 if (secretlen != secretsz || secretlen > maxout) { 535 return ECDH_compute_key(out, secretlen, EC_KEY_get0_public_key(peer), 549 * secret The returned secret (with a length ctx->alg->secretlen bytes). 635 * Setting this to NULL allows the enclen and secretlen to return 640 * secretlen Passes in the max size of the secret buffer and returns the 646 unsigned char *secret, size_t *secretlen) 656 if (enclen == NULL && secretlen == NULL) 660 if (secretlen != NULL [all...] |
| /src/external/bsd/tcpdump/dist/ |
| print-esp.c | 118 int secretlen; member in struct:sa_list 476 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); 477 if(sa->secretlen == 0) return 0; 483 sa->secretlen = i; 486 sa->secretlen = sizeof(sa->secret);
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
| argon2.h | 174 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
|
| /src/crypto/external/apache2/openssl/dist/crypto/hpke/ |
| hpke.c | 662 size_t secretlen = OSSL_HPKE_MAXSIZE; local 738 secretlen = kdf_info->Nh; 739 if (secretlen > OSSL_HPKE_MAXSIZE) { 743 if (ossl_hpke_labeled_extract(kctx, secret, secretlen, 760 secret, secretlen, OSSL_HPKE_SEC51LABEL, 773 secret, secretlen, OSSL_HPKE_SEC51LABEL, 787 secret, secretlen, OSSL_HPKE_SEC51LABEL, 1247 unsigned char *secret, size_t secretlen, 1256 if (ctx == NULL || secret == NULL || secretlen == 0) { 1290 erv = ossl_hpke_labeled_expand(kctx, secret, secretlen, [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/fips/ |
| self_test_kats.c | 666 size_t wrappedlen = t->cipher_text_len, secretlen = t->secret_len; local 684 secret = OPENSSL_malloc(secretlen); 689 if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0) 699 if (secretlen != t->secret_len 725 size_t secretlen = t->secret_len; local 746 secret = OPENSSL_malloc(secretlen); 751 if (EVP_PKEY_decapsulate(ctx, secret, &secretlen, 758 if (secretlen != t->secret_len
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_libctx_test.c | 727 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local 738 &secretlen), 740 && TEST_int_eq(ctlen, secretlen) 743 &secretlen), 756 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); 762 &secretlen), 824 size_t ctlen = 0, secretlen = 0; local 842 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, 848 && (is_fips_lt_3_5 || (TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, &ctlen, NULL, &secretlen), 1) && TEST_true(ctlen <= sizeof(ct)) && TEST_true(secretlen <= sizeof(secret)) && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), 1) (…) [all...] |
| evp_pkey_dhkem_test.c | 189 size_t secretlen = sizeof(secret); local 203 secret, &secretlen), 618 size_t secretlen = sizeof(secret); local 639 secret, &secretlen), 645 if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, 668 size_t secretlen = sizeof(secret); local 684 secret, &secretlen), 689 || !TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, 708 size_t secretlen = sizeof(secret); local 715 && TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, [all...] |
| evp_extra_test2.c | 1718 size_t outlen, secretlen, secretlen2; local 1735 || !TEST_int_eq(EVP_PKEY_encapsulate(ctx, NULL, &outlen, NULL, &secretlen), 1)) 1738 secret = OPENSSL_malloc(secretlen); 1739 secret2 = OPENSSL_malloc(secretlen); 1741 || !TEST_int_eq(EVP_PKEY_encapsulate(ctx, out, &outlen, secret, &secretlen), 1) 1744 || !TEST_mem_eq(secret, secretlen, secret2, secretlen2))
|
| evp_test.c | 2222 size_t wrappedlen = 0, secretlen = 0; local 2253 if (EVP_PKEY_encapsulate(ctx, NULL, &wrappedlen, NULL, &secretlen) <= 0) { 2258 secret = OPENSSL_malloc(secretlen); 2263 if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0) { 2276 && !TEST_mem_eq(secret, secretlen, kdata->output, kdata->outputlen)) { 2288 *outsecretlen = secretlen; 2401 size_t wrappedlen = 0, secretlen = 0; local 2404 &secret, &secretlen); 2411 secret, secretlen);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_libctx_test.c | 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local 542 &secretlen), 1) 543 && TEST_int_eq(ctlen, secretlen) 546 &secretlen), 1) 556 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); 562 &secretlen), 0)) 613 size_t ctlen = 0, secretlen = 0; local 631 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, 636 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) 642 /* Test secretlen is optional * [all...] |
| /src/external/apache2/argon2/dist/phc-winner-argon2/include/ |
| argon2.h | 202 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| pkeyutl.c | 166 size_t buf_outlen = 0, secretlen = 0; local 582 buf_in, buf_inlen, NULL, &secretlen); 585 && (secretlen > 0 || (pkey_op != EVP_PKEY_OP_ENCAPSULATE && pkey_op != EVP_PKEY_OP_DECAPSULATE)) 589 if (secretlen > 0) 590 secret = app_malloc(secretlen, "secret output"); 593 buf_in, buf_inlen, secret, &secretlen); 615 if (secretlen > 0) 616 BIO_write(secout ? secout : out, secret, secretlen);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| argon2.c | 163 uint32_t secretlen; member in struct:__anon546 691 store32((uint8_t *)&value, ctx->secretlen); 696 if (EVP_DigestUpdate(mdctx, ctx->secret, ctx->secretlen) != 1) 699 OPENSSL_cleanse(ctx->secret, ctx->secretlen); 700 ctx->secretlen = 0; 995 OPENSSL_clear_free(ctx->secret, ctx->secretlen); 1136 OPENSSL_clear_free(ctx->secret, ctx->secretlen); 1236 OPENSSL_clear_free(ctx->secret, ctx->secretlen); 1238 ctx->secretlen = 0U; 1247 ctx->secretlen = 0U [all...] |
| /src/external/mpl/bind/dist/bin/nsupdate/ |
| nsupdate.c | 488 int secretlen; local 533 secretlen = strlen(secretstr) * 3 / 4; 534 secret = isc_mem_allocate(gmctx, secretlen); 536 isc_buffer_init(&secretbuf, secret, secretlen); 544 secretlen = isc_buffer_usedlength(&secretbuf); 547 result = dns_tsigkey_create(mykeyname, hmac_alg, secret, secretlen, 1723 int secretlen; local 1761 secretlen = strlen(secretstr) * 3 / 4; 1762 secret = isc_mem_allocate(gmctx, secretlen); 1764 isc_buffer_init(&secretbuf, secret, secretlen); [all...] |