/src/sys/external/isc/libsodium/dist/test/default/ |
keygen.c | 7 size_t key_len; member in struct:KeygenTV_ 45 key = (unsigned char *) sodium_malloc(tv->key_len); 46 key[tv->key_len - 1U] = 0; 49 if (key[tv->key_len - 1U] != 0) {
|
/src/tests/crypto/opencrypto/ |
h_aescbc.c | 46 size_t key_len; member in struct:__anond7f5095a0108 135 cs.keylen = tests[i].key_len;
|
h_aesctr1.c | 49 size_t key_len; member in struct:__anond7e42dac0108 221 cs.keylen = tests[i].key_len;
|
h_md5hmac.c | 44 size_t key_len; member in struct:__anonc7ff8ff80108 151 if (tests[i].key_len != MD5_HMAC_KEYLEN) 156 cs.mackeylen = tests[i].key_len;
|
h_sha1hmac.c | 44 size_t key_len; member in struct:__anonb8df601f0108 161 if (tests[i].key_len != SHA1_HMAC_KEYLEN) 166 cs.mackeylen = tests[i].key_len;
|
h_sha2hmac.c | 43 size_t key_len; member in struct:__anon05d99ce00108 242 cs.mackeylen = tests[i].key_len;
|
/src/lib/libcrypt/ |
bcrypt.c | 218 u_int8_t key_len, salt_len, logr, minor; local in function:__bcrypt 271 key_len = 72; 273 key_len = (uint8_t)len; 274 key_len += minor >= 'a' ? 1 : 0; 279 (const u_int8_t *) key, key_len); 281 Blowfish_expand0state(&state, (const u_int8_t *) key, key_len);
|
hmac.c | 68 const unsigned char *key, size_t key_len, 84 if (key_len > HMAC_BLOCKSZ) { 88 HASH_Update(&tctx, key, key_len); 92 key_len = HASH_LENGTH; 111 for (i = 0; i < key_len; i++) { 287 int key_len; local in function:main 303 key_len = strlen(key); 305 HMAC_FUNC(data, data_len, key, key_len, digest);
|
/src/sys/crypto/aes/arch/x86/ |
aes_sse2_subr.c | 53 size_t key_len; local in function:aes_sse2_setkey 57 key_len = 16; 60 key_len = 24; 63 key_len = 32; 69 aes_sse2_keysched(rk, key, key_len);
|
aes_via.c | 108 size_t key_len; local in function:aesvia_setenckey 118 key_len = 24; 121 key_len = 32; 126 br_aes_ct_keysched_stdenc(enc->aese_aes.aes_rk, key, key_len); 132 size_t key_len; local in function:aesvia_setdeckey 142 key_len = 24; 145 key_len = 32; 150 br_aes_ct_keysched_stddec(dec->aesd_aes.aes_rk, key, key_len);
|
/src/lib/libresolv/ |
hmac_link.c | 272 int len, key_len; local in function:dst_hmac_md5_key_to_file_format 296 for (key_len = 0; key_len < HMAC_LEN; key_len++) 297 key[key_len] = hkey->hk_ipad[key_len] ^ HMAC_IPAD; 298 for (key_len = HMAC_LEN - 1; key_len >= 0; key_len--) 299 if (key[key_len] != 0 340 int key_len, len; local in function:dst_hmac_md5_key_from_file_format [all...] |
/src/sys/crypto/aes/ |
aes_bear.c | 52 size_t key_len; local in function:aesbear_setkey 56 key_len = 16; 59 key_len = 24; 62 key_len = 32; 68 br_aes_ct_keysched(rk, key, key_len);
|
/src/lib/libc/nameser/ |
ns_print.c | 1015 unsigned int i, hip_len, algorithm, key_len; local in function:ns_sprintrrf 1022 key_len = ns_get16(rdata); 1025 siz = key_len*4/3 + 4; /* "+4" accounts for trailing \0 */ 1040 len = b64_ntop(rdata, key_len, base64_key, siz); 1046 rdata += key_len;
|
/src/usr.sbin/wgconfig/ |
wgconfig.c | 55 #define KEY_LEN 32 84 size_t key_len; local in function:format_key 93 key_len = prop_data_size(key_prop); 94 if (key_len != KEY_LEN) 95 errx(EXIT_FAILURE, "invalid key len: %zu", key_len); 96 error = b64_ntop(key, key_len, key_b64, KEY_BASE64_LEN + 1); 410 unsigned char keybuf[KEY_LEN]) 414 ret = b64_pton(keyb64buf, keybuf, KEY_LEN); 420 read_key(const char *path, unsigned char keybuf[KEY_LEN]) [all...] |
/src/sys/dev/pci/ |
if_iavfvar.h | 218 uint16_t key_len; member in struct:iavf_vc_rss_key
|
if_iavf.c | 4813 size_t key_len; local in function:iavf_config_rss_key 4822 key_len = IXL_RSS_KEY_SIZE; 4823 iavf_get_default_rss_key(rss_key->key, key_len); 4824 rss_key->key_len = key_len; 4831 + (sizeof(rss_key->key[0]) * key_len));
|
/src/sys/dev/usb/ |
if_upgtvar.h | 346 uint8_t key_len; member in struct:upgt_lmac_tx_desc_wep
|
/src/sys/fs/hfs/ |
libhfs.h | 315 uint16_t key_len; member in struct:__anon46ade0a11908 453 uint8_t catkeysizefieldsize; /* size of catalog file key_len field in 455 uint8_t extkeysizefieldsize; /* size of extent file key_len field in
|
/src/sys/dev/ic/ |
bwfmreg.h | 635 uint16_t key_len; member in struct:bwfm_wsec_pmk
|