| /src/sys/external/isc/libsodium/dist/test/default/ |
| keygen.c | 7 size_t key_len; member in struct:KeygenTV_ 45 key = (unsigned char *) sodium_malloc(tv->key_len); 46 key[tv->key_len - 1U] = 0; 49 if (key[tv->key_len - 1U] != 0) {
|
| /src/tests/crypto/opencrypto/ |
| h_aescbc.c | 46 size_t key_len; member in struct:__anon7787 135 cs.keylen = tests[i].key_len;
|
| h_aesctr1.c | 49 size_t key_len; member in struct:__anon7788 221 cs.keylen = tests[i].key_len;
|
| h_md5hmac.c | 44 size_t key_len; member in struct:__anon7790 151 if (tests[i].key_len != MD5_HMAC_KEYLEN) 156 cs.mackeylen = tests[i].key_len;
|
| h_sha1hmac.c | 44 size_t key_len; member in struct:__anon7791 161 if (tests[i].key_len != SHA1_HMAC_KEYLEN) 166 cs.mackeylen = tests[i].key_len;
|
| h_sha2hmac.c | 43 size_t key_len; member in struct:__anon7792 242 cs.mackeylen = tests[i].key_len;
|
| /src/lib/libcrypt/ |
| bcrypt.c | 215 u_int8_t key_len, salt_len, logr, minor; local 268 key_len = 72; 270 key_len = (uint8_t)len; 271 key_len += minor >= 'a' ? 1 : 0; 276 (const u_int8_t *) key, key_len); 278 Blowfish_expand0state(&state, (const u_int8_t *) key, key_len);
|
| hmac.c | 68 const unsigned char *key, size_t key_len, 84 if (key_len > HMAC_BLOCKSZ) { 88 HASH_Update(&tctx, key, key_len); 92 key_len = HASH_LENGTH; 111 for (i = 0; i < key_len; i++) { 287 int key_len; local 303 key_len = strlen(key); 305 HMAC_FUNC(data, data_len, key, key_len, digest);
|
| /src/lib/libresolv/ |
| hmac_link.c | 272 int len, key_len; local 296 for (key_len = 0; key_len < HMAC_LEN; key_len++) 297 key[key_len] = hkey->hk_ipad[key_len] ^ HMAC_IPAD; 298 for (key_len = HMAC_LEN - 1; key_len >= 0; key_len--) 299 if (key[key_len] != 0 340 int key_len, len; local [all...] |
| /src/sys/crypto/aes/arch/x86/ |
| aes_sse2_4x32_subr.c | 69 size_t key_len; local 73 key_len = 16; 76 key_len = 24; 79 key_len = 32; 85 aes_sse2_4x32_keysched(rk, key, key_len);
|
| aes_via.c | 110 size_t key_len; local 126 key_len = 24; 129 key_len = 32; 134 aes_keysched_enc(enc->aese_aes.aes_rk, key, key_len); 140 size_t key_len; local 150 key_len = 24; 153 key_len = 32; 158 aes_keysched_dec(dec->aesd_aes.aes_rk, key, key_len);
|
| /src/sys/crypto/aes/ |
| aes_bear.c | 52 size_t key_len; local 56 key_len = 16; 59 key_len = 24; 62 key_len = 32; 68 br_aes_ct_keysched(rk, key, key_len);
|
| aes_bear64.c | 52 size_t key_len; local 56 key_len = 16; 59 key_len = 24; 62 key_len = 32; 68 br_aes_ct64_keysched(rk, key, key_len);
|
| /src/lib/libc/nameser/ |
| ns_print.c | 1015 unsigned int i, hip_len, algorithm, key_len; local 1022 key_len = ns_get16(rdata); 1025 siz = key_len*4/3 + 4; /* "+4" accounts for trailing \0 */ 1040 len = b64_ntop(rdata, key_len, base64_key, siz); 1046 rdata += key_len;
|
| /src/usr.sbin/wgconfig/ |
| wgconfig.c | 55 #define KEY_LEN 32 84 size_t key_len; local 93 key_len = prop_data_size(key_prop); 94 if (key_len != KEY_LEN) 95 errx(EXIT_FAILURE, "invalid key len: %zu", key_len); 96 error = b64_ntop(key, key_len, key_b64, KEY_BASE64_LEN + 1); 410 unsigned char keybuf[KEY_LEN]) 414 ret = b64_pton(keyb64buf, keybuf, KEY_LEN); 420 read_key(const char *path, unsigned char keybuf[KEY_LEN]) [all...] |
| /src/sys/dev/pci/ |
| if_iavfvar.h | 218 uint16_t key_len; member in struct:iavf_vc_rss_key
|
| if_iavf.c | 4813 size_t key_len; local 4822 key_len = IXL_RSS_KEY_SIZE; 4823 iavf_get_default_rss_key(rss_key->key, key_len); 4824 rss_key->key_len = key_len; 4831 + (sizeof(rss_key->key[0]) * key_len));
|
| /src/sys/dev/usb/ |
| if_upgtvar.h | 346 uint8_t key_len; member in struct:upgt_lmac_tx_desc_wep
|
| /src/sys/fs/hfs/ |
| libhfs.h | 315 uint16_t key_len; member in struct:__anon6754 453 uint8_t catkeysizefieldsize; /* size of catalog file key_len field in 455 uint8_t extkeysizefieldsize; /* size of extent file key_len field in
|
| /src/sys/dev/ic/ |
| bwfmreg.h | 635 uint16_t key_len; member in struct:bwfm_wsec_pmk
|