| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/ |
| generichash_blake2b.c | 13 const unsigned char *key, size_t keylen) 16 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { 20 assert(keylen <= UINT8_MAX); 23 (uint8_t) keylen); 29 unsigned long long inlen, const unsigned char *key, size_t keylen, 33 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { 37 assert(keylen <= UINT8_MAX); 40 (uint64_t) inlen, (uint8_t) keylen, salt, 46 const unsigned char *key, const size_t keylen, 50 keylen > BLAKE2B_KEYBYTES) [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/ |
| cipher_aria_ccm.h | 22 const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keylen);
|
| cipher_sm4_ccm.h | 23 const PROV_CCM_HW *ossl_prov_sm4_hw_ccm(size_t keylen);
|
| cipher_aes_siv.h | 15 int (*initkey)(void *ctx, const uint8_t *key, size_t keylen); 27 size_t keylen; /* The input keylength (twice the alg key length) */ member in struct:prov_siv_ctx_st
|
| cipher_aria_ccm_hw.c | 17 const unsigned char *key, size_t keylen) 21 ossl_aria_set_encrypt_key(key, keylen * 8, &actx->ks.ks);
|
| cipher_blowfish_hw.c | 19 const unsigned char *key, size_t keylen) 23 BF_set_key(&bctx->ks.ks, keylen, key);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
| cipher_aria_ccm.h | 22 const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keylen);
|
| /src/external/gpl2/gettext/dist/gettext-tools/gnulib-lib/ |
| hash.c | 46 size_t keylen; member in struct:hash_entry 118 /* Compute a hash code for a key consisting of KEYLEN bytes starting at KEY 121 compute_hashval (const void *key, size_t keylen) 130 hval = keylen; 131 while (cnt < keylen) 149 const void *key, size_t keylen, 163 if (table[idx].used == hval && table[idx].keylen == keylen 164 && memcmp (table[idx].key, key, keylen) == 0) 178 if (table[idx].used == hval && table[idx].keylen == keyle [all...] |
| hash.h | 51 const void *key, size_t keylen, 54 /* Try to insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table. 59 const void *key, size_t keylen, 62 /* Insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table. 65 const void *key, size_t keylen, 70 in *KEY, *KEYLEN, *DATA. 73 const void **key, size_t *keylen, 78 in *KEY, *KEYLEN, *DATAP. *DATAP is set to point to the storage of the 82 const void **key, size_t *keylen,
|
| /src/external/gpl2/gettext/dist/gettext-tools/libgettextpo/ |
| hash.c | 46 size_t keylen; member in struct:hash_entry 118 /* Compute a hash code for a key consisting of KEYLEN bytes starting at KEY 121 compute_hashval (const void *key, size_t keylen) 130 hval = keylen; 131 while (cnt < keylen) 149 const void *key, size_t keylen, 163 if (table[idx].used == hval && table[idx].keylen == keylen 164 && memcmp (table[idx].key, key, keylen) == 0) 178 if (table[idx].used == hval && table[idx].keylen == keyle [all...] |
| hash.h | 51 const void *key, size_t keylen, 54 /* Try to insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table. 59 const void *key, size_t keylen, 62 /* Insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table. 65 const void *key, size_t keylen, 70 in *KEY, *KEYLEN, *DATA. 73 const void **key, size_t *keylen, 78 in *KEY, *KEYLEN, *DATAP. *DATAP is set to point to the storage of the 82 const void **key, size_t *keylen,
|
| /src/external/gpl2/gettext/dist/gnulib-local/lib/ |
| hash.c | 46 size_t keylen; member in struct:hash_entry 118 /* Compute a hash code for a key consisting of KEYLEN bytes starting at KEY 121 compute_hashval (const void *key, size_t keylen) 130 hval = keylen; 131 while (cnt < keylen) 149 const void *key, size_t keylen, 163 if (table[idx].used == hval && table[idx].keylen == keylen 164 && memcmp (table[idx].key, key, keylen) == 0) 178 if (table[idx].used == hval && table[idx].keylen == keyle [all...] |
| hash.h | 51 const void *key, size_t keylen, 54 /* Try to insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table. 59 const void *key, size_t keylen, 62 /* Insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table. 65 const void *key, size_t keylen, 70 in *KEY, *KEYLEN, *DATA. 73 const void **key, size_t *keylen, 78 in *KEY, *KEYLEN, *DATAP. *DATAP is set to point to the storage of the 82 const void **key, size_t *keylen,
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| e_cast.c | 43 int keylen = EVP_CIPHER_CTX_get_key_length(ctx); local 45 if (keylen <= 0) 47 CAST_set_key(&data(ctx)->ks, keylen, key);
|
| p_open.c | 23 size_t keylen = 0; local 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) 45 if ((key = OPENSSL_malloc(keylen)) == NULL) 48 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) 51 if (EVP_CIPHER_CTX_set_key_length(ctx, keylen) <= 0 58 OPENSSL_clear_free(key, keylen);
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| e_cast.c | 43 int keylen = EVP_CIPHER_CTX_get_key_length(ctx); local 45 if (keylen <= 0) 47 CAST_set_key(&data(ctx)->ks, keylen, key);
|
| p_open.c | 23 size_t keylen = 0; local 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) 45 if ((key = OPENSSL_malloc(keylen)) == NULL) { 50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) 53 if (EVP_CIPHER_CTX_set_key_length(ctx, keylen) <= 0 60 OPENSSL_clear_free(key, keylen);
|
| /src/tests/net/ipsec/ |
| algorithms.sh | 156 local keylen=$(($1 / 8)) 159 while [ $keylen -gt 0 ]; do 161 keylen=$((keylen - 1)) 174 local keylen=$(get_one_valid_keylen $algo) 175 local key=$(generate_key $keylen)
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecx_key.c | 32 ret->keylen = X25519_KEYLEN; 35 ret->keylen = X448_KEYLEN; 38 ret->keylen = ED25519_KEYLEN; 41 ret->keylen = ED448_KEYLEN; 81 OPENSSL_secure_clear_free(key->privkey, key->keylen); 105 key->privkey = OPENSSL_secure_zalloc(key->keylen); 110 int ossl_ecx_compute_key(ECX_KEY *peer, ECX_KEY *priv, size_t keylen, 120 if (!ossl_assert(keylen == X25519_KEYLEN 121 || keylen == X448_KEYLEN)) { 127 *secretlen = keylen; [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 20-test_kdf.t | 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}], 28 { cmd => [qw{openssl kdf -keylen 25 -digest SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}], 31 { cmd => [qw{openssl kdf -keylen 64 -mac KMAC128 -kdfopt maclen:20 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}], 34 { cmd => [qw{openssl kdf -keylen 16 -mac HMAC -digest SHA256 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}], 37 { cmd => [qw{openssl kdf -keylen 14 -digest SHA224 -kdfopt hexkey:6dbdc23f045488e4062757b06b9ebae183fc5a5946d80db93fec6f62ec07e3727f0126aed12ce4b262f47d48d54287f81d474c7c3b1850e9 -kdfopt hexinfo:a1b2c3d4e54341565369643c832e9849dcdba71e9a3139e606e095de3c264a66e98a165854cd07989b1ee0ec3f8dbe SSKDF}], 40 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt hexkey:0102030405 -kdfopt hexxcghash:06090A -kdfopt hexsession_id:01020304 -kdfopt type:A SSHKDF}], 45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 48 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}] [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 20-test_kdf.t | 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}], 28 { cmd => [qw{openssl kdf -keylen 25 -digest SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}], 31 { cmd => [qw{openssl kdf -keylen 64 -mac KMAC128 -kdfopt maclen:20 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}], 34 { cmd => [qw{openssl kdf -keylen 16 -mac HMAC -digest SHA256 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}], 37 { cmd => [qw{openssl kdf -keylen 14 -digest SHA224 -kdfopt hexkey:6dbdc23f045488e4062757b06b9ebae183fc5a5946d80db93fec6f62ec07e3727f0126aed12ce4b262f47d48d54287f81d474c7c3b1850e9 -kdfopt hexinfo:a1b2c3d4e54341565369643c832e9849dcdba71e9a3139e606e095de3c264a66e98a165854cd07989b1ee0ec3f8dbe SSKDF}], 40 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt hexkey:0102030405 -kdfopt hexxcghash:06090A -kdfopt hexsession_id:01020304 -kdfopt type:A SSHKDF}], 45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 48 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}] [all...] |
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha256/ |
| auth_hmacsha256.c | 38 const unsigned char *key, size_t keylen) 44 if (keylen > 64) { 46 crypto_hash_sha256_update(&state->ictx, key, keylen); 49 keylen = 32; 53 for (i = 0; i < keylen; i++) { 60 for (i = 0; i < keylen; i++) {
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha512/ |
| auth_hmacsha512.c | 38 const unsigned char *key, size_t keylen) 44 if (keylen > 128) { 46 crypto_hash_sha512_update(&state->ictx, key, keylen); 49 keylen = 64; 53 for (i = 0; i < keylen; i++) { 60 for (i = 0; i < keylen; i++) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecx_key.c | 26 ret->keylen = X25519_KEYLEN; 29 ret->keylen = X448_KEYLEN; 32 ret->keylen = ED25519_KEYLEN; 35 ret->keylen = ED448_KEYLEN; 71 OPENSSL_secure_clear_free(key->privkey, key->keylen); 95 key->privkey = OPENSSL_secure_zalloc(key->keylen);
|
| /src/usr.bin/sort/ |
| append.c | 72 * Ignore duplicates (marked with -ve keylen) 84 if (crec->keylen >= 0) 90 if (crec->keylen >= 0)
|