HomeSort by: relevance | last modified time | path
    Searched refs:keylen (Results 1 - 25 of 775) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/
generichash_blake2b.c 13 const unsigned char *key, size_t keylen)
16 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) {
20 assert(keylen <= UINT8_MAX);
23 (uint8_t) keylen);
29 unsigned long long inlen, const unsigned char *key, size_t keylen,
33 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) {
37 assert(keylen <= UINT8_MAX);
40 (uint64_t) inlen, (uint8_t) keylen, salt,
46 const unsigned char *key, const size_t keylen,
50 keylen > BLAKE2B_KEYBYTES)
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/
cipher_aria_ccm.h 22 const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keylen);
cipher_sm4_ccm.h 23 const PROV_CCM_HW *ossl_prov_sm4_hw_ccm(size_t keylen);
cipher_aes_siv.h 15 int (*initkey)(void *ctx, const uint8_t *key, size_t keylen);
27 size_t keylen; /* The input keylength (twice the alg key length) */ member in struct:prov_siv_ctx_st
cipher_aria_ccm_hw.c 17 const unsigned char *key, size_t keylen)
21 ossl_aria_set_encrypt_key(key, keylen * 8, &actx->ks.ks);
cipher_blowfish_hw.c 19 const unsigned char *key, size_t keylen)
23 BF_set_key(&bctx->ks.ks, keylen, key);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/
cipher_aria_ccm.h 22 const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keylen);
  /src/external/gpl2/gettext/dist/gettext-tools/gnulib-lib/
hash.c 46 size_t keylen; member in struct:hash_entry
118 /* Compute a hash code for a key consisting of KEYLEN bytes starting at KEY
121 compute_hashval (const void *key, size_t keylen)
130 hval = keylen;
131 while (cnt < keylen)
149 const void *key, size_t keylen,
163 if (table[idx].used == hval && table[idx].keylen == keylen
164 && memcmp (table[idx].key, key, keylen) == 0)
178 if (table[idx].used == hval && table[idx].keylen == keyle
    [all...]
hash.h 51 const void *key, size_t keylen,
54 /* Try to insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table.
59 const void *key, size_t keylen,
62 /* Insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table.
65 const void *key, size_t keylen,
70 in *KEY, *KEYLEN, *DATA.
73 const void **key, size_t *keylen,
78 in *KEY, *KEYLEN, *DATAP. *DATAP is set to point to the storage of the
82 const void **key, size_t *keylen,
  /src/external/gpl2/gettext/dist/gettext-tools/libgettextpo/
hash.c 46 size_t keylen; member in struct:hash_entry
118 /* Compute a hash code for a key consisting of KEYLEN bytes starting at KEY
121 compute_hashval (const void *key, size_t keylen)
130 hval = keylen;
131 while (cnt < keylen)
149 const void *key, size_t keylen,
163 if (table[idx].used == hval && table[idx].keylen == keylen
164 && memcmp (table[idx].key, key, keylen) == 0)
178 if (table[idx].used == hval && table[idx].keylen == keyle
    [all...]
hash.h 51 const void *key, size_t keylen,
54 /* Try to insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table.
59 const void *key, size_t keylen,
62 /* Insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table.
65 const void *key, size_t keylen,
70 in *KEY, *KEYLEN, *DATA.
73 const void **key, size_t *keylen,
78 in *KEY, *KEYLEN, *DATAP. *DATAP is set to point to the storage of the
82 const void **key, size_t *keylen,
  /src/external/gpl2/gettext/dist/gnulib-local/lib/
hash.c 46 size_t keylen; member in struct:hash_entry
118 /* Compute a hash code for a key consisting of KEYLEN bytes starting at KEY
121 compute_hashval (const void *key, size_t keylen)
130 hval = keylen;
131 while (cnt < keylen)
149 const void *key, size_t keylen,
163 if (table[idx].used == hval && table[idx].keylen == keylen
164 && memcmp (table[idx].key, key, keylen) == 0)
178 if (table[idx].used == hval && table[idx].keylen == keyle
    [all...]
hash.h 51 const void *key, size_t keylen,
54 /* Try to insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table.
59 const void *key, size_t keylen,
62 /* Insert the pair (KEY[0..KEYLEN-1], DATA) in the hash table.
65 const void *key, size_t keylen,
70 in *KEY, *KEYLEN, *DATA.
73 const void **key, size_t *keylen,
78 in *KEY, *KEYLEN, *DATAP. *DATAP is set to point to the storage of the
82 const void **key, size_t *keylen,
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
e_cast.c 43 int keylen = EVP_CIPHER_CTX_get_key_length(ctx); local
45 if (keylen <= 0)
47 CAST_set_key(&data(ctx)->ks, keylen, key);
p_open.c 23 size_t keylen = 0; local
42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0)
45 if ((key = OPENSSL_malloc(keylen)) == NULL)
48 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0)
51 if (EVP_CIPHER_CTX_set_key_length(ctx, keylen) <= 0
58 OPENSSL_clear_free(key, keylen);
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
e_cast.c 43 int keylen = EVP_CIPHER_CTX_get_key_length(ctx); local
45 if (keylen <= 0)
47 CAST_set_key(&data(ctx)->ks, keylen, key);
p_open.c 23 size_t keylen = 0; local
42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0)
45 if ((key = OPENSSL_malloc(keylen)) == NULL) {
50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0)
53 if (EVP_CIPHER_CTX_set_key_length(ctx, keylen) <= 0
60 OPENSSL_clear_free(key, keylen);
  /src/tests/net/ipsec/
algorithms.sh 156 local keylen=$(($1 / 8))
159 while [ $keylen -gt 0 ]; do
161 keylen=$((keylen - 1))
174 local keylen=$(get_one_valid_keylen $algo)
175 local key=$(generate_key $keylen)
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecx_key.c 32 ret->keylen = X25519_KEYLEN;
35 ret->keylen = X448_KEYLEN;
38 ret->keylen = ED25519_KEYLEN;
41 ret->keylen = ED448_KEYLEN;
81 OPENSSL_secure_clear_free(key->privkey, key->keylen);
105 key->privkey = OPENSSL_secure_zalloc(key->keylen);
110 int ossl_ecx_compute_key(ECX_KEY *peer, ECX_KEY *priv, size_t keylen,
120 if (!ossl_assert(keylen == X25519_KEYLEN
121 || keylen == X448_KEYLEN)) {
127 *secretlen = keylen;
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/recipes/
20-test_kdf.t 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}],
28 { cmd => [qw{openssl kdf -keylen 25 -digest SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}],
31 { cmd => [qw{openssl kdf -keylen 64 -mac KMAC128 -kdfopt maclen:20 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}],
34 { cmd => [qw{openssl kdf -keylen 16 -mac HMAC -digest SHA256 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}],
37 { cmd => [qw{openssl kdf -keylen 14 -digest SHA224 -kdfopt hexkey:6dbdc23f045488e4062757b06b9ebae183fc5a5946d80db93fec6f62ec07e3727f0126aed12ce4b262f47d48d54287f81d474c7c3b1850e9 -kdfopt hexinfo:a1b2c3d4e54341565369643c832e9849dcdba71e9a3139e606e095de3c264a66e98a165854cd07989b1ee0ec3f8dbe SSKDF}],
40 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt hexkey:0102030405 -kdfopt hexxcghash:06090A -kdfopt hexsession_id:01020304 -kdfopt type:A SSHKDF}],
45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
48 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}]
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/
20-test_kdf.t 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}],
28 { cmd => [qw{openssl kdf -keylen 25 -digest SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}],
31 { cmd => [qw{openssl kdf -keylen 64 -mac KMAC128 -kdfopt maclen:20 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}],
34 { cmd => [qw{openssl kdf -keylen 16 -mac HMAC -digest SHA256 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}],
37 { cmd => [qw{openssl kdf -keylen 14 -digest SHA224 -kdfopt hexkey:6dbdc23f045488e4062757b06b9ebae183fc5a5946d80db93fec6f62ec07e3727f0126aed12ce4b262f47d48d54287f81d474c7c3b1850e9 -kdfopt hexinfo:a1b2c3d4e54341565369643c832e9849dcdba71e9a3139e606e095de3c264a66e98a165854cd07989b1ee0ec3f8dbe SSKDF}],
40 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt hexkey:0102030405 -kdfopt hexxcghash:06090A -kdfopt hexsession_id:01020304 -kdfopt type:A SSHKDF}],
45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
48 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}]
    [all...]
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha256/
auth_hmacsha256.c 38 const unsigned char *key, size_t keylen)
44 if (keylen > 64) {
46 crypto_hash_sha256_update(&state->ictx, key, keylen);
49 keylen = 32;
53 for (i = 0; i < keylen; i++) {
60 for (i = 0; i < keylen; i++) {
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha512/
auth_hmacsha512.c 38 const unsigned char *key, size_t keylen)
44 if (keylen > 128) {
46 crypto_hash_sha512_update(&state->ictx, key, keylen);
49 keylen = 64;
53 for (i = 0; i < keylen; i++) {
60 for (i = 0; i < keylen; i++) {
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecx_key.c 26 ret->keylen = X25519_KEYLEN;
29 ret->keylen = X448_KEYLEN;
32 ret->keylen = ED25519_KEYLEN;
35 ret->keylen = ED448_KEYLEN;
71 OPENSSL_secure_clear_free(key->privkey, key->keylen);
95 key->privkey = OPENSSL_secure_zalloc(key->keylen);
  /src/usr.bin/sort/
append.c 72 * Ignore duplicates (marked with -ve keylen)
84 if (crec->keylen >= 0)
90 if (crec->keylen >= 0)

Completed in 70 milliseconds

1 2 3 4 5 6 7 8 91011>>