/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/ |
generichash_blake2b.c | 13 const unsigned char *key, size_t keylen) 16 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { 20 assert(keylen <= UINT8_MAX); 23 (uint8_t) keylen); 29 unsigned long long inlen, const unsigned char *key, size_t keylen, 33 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { 37 assert(keylen <= UINT8_MAX); 40 (uint64_t) inlen, (uint8_t) keylen, salt, 46 const unsigned char *key, const size_t keylen, 50 keylen > BLAKE2B_KEYBYTES) [all...] |
blake2b-ref.c | 178 const uint8_t keylen) 185 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) { 189 P->key_length = keylen; 206 memcpy(block, key, keylen); /* keylen cannot be 0 */ 215 const void *key, const uint8_t keylen, 223 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) { 227 P->key_length = keylen; [all...] |
blake2.h | 81 const uint8_t keylen); 83 const void *key, const uint8_t keylen, 91 const uint64_t inlen, uint8_t keylen); 94 uint8_t keylen, const void *salt,
|
/src/tests/net/ipsec/ |
algorithms.sh | 156 local keylen=$(($1 / 8)) 159 while [ $keylen -gt 0 ]; do 161 keylen=$((keylen - 1)) 174 local keylen=$(get_one_valid_keylen $algo) 175 local key=$(generate_key $keylen)
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha256/ |
auth_hmacsha256.c | 38 const unsigned char *key, size_t keylen) 44 if (keylen > 64) { 46 crypto_hash_sha256_update(&state->ictx, key, keylen); 49 keylen = 32; 53 for (i = 0; i < keylen; i++) { 60 for (i = 0; i < keylen; i++) {
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha512/ |
auth_hmacsha512.c | 38 const unsigned char *key, size_t keylen) 44 if (keylen > 128) { 46 crypto_hash_sha512_update(&state->ictx, key, keylen); 49 keylen = 64; 53 for (i = 0; i < keylen; i++) { 60 for (i = 0; i < keylen; i++) {
|
/src/usr.bin/sort/ |
append.c | 72 * Ignore duplicates (marked with -ve keylen) 84 if (crec->keylen >= 0) 90 if (crec->keylen >= 0)
|
radix_sort.c | 108 if (data_index >= hdr->keylen) { 112 hdr->keylen = -1; 184 s_len = akh->keylen; 187 t_len = (*ai)->keylen; 204 akh->keylen = -1;
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/ |
crypto_generichash.c | 56 size_t keylen) 58 return crypto_generichash_blake2b(out, outlen, in, inlen, key, keylen); 64 const size_t keylen, const size_t outlen) 67 ((crypto_generichash_blake2b_state *) state, key, keylen, outlen);
|
/src/sys/netipsec/ |
xform_tcp.c | 87 int keylen; local in function:tcpsignature_init 102 keylen = _KEYLEN(sav->key_auth); 103 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) { 104 DPRINTF("invalid key length %u\n", keylen);
|
/src/usr.sbin/services_mkdb/ |
output_cdb.c | 69 size_t len, protolen, datalen, keylen; local in function:cdb_add 109 keylen = 4 + protolen; 110 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 114 keylen = 4; 115 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 125 keylen = 2 + len + protolen; 126 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 130 keylen = 2 + len; 131 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
|
/src/sys/external/isc/libsodium/dist/src/libsodium/include/sodium/ |
crypto_generichash_blake2b.h | 77 const unsigned char *key, size_t keylen); 84 size_t keylen, 91 const size_t keylen, const size_t outlen); 96 const size_t keylen, const size_t outlen,
|
crypto_generichash.h | 52 const unsigned char *key, size_t keylen); 57 const size_t keylen, const size_t outlen);
|
crypto_auth_hmacsha256.h | 49 size_t keylen);
|
crypto_auth_hmacsha512.h | 49 size_t keylen);
|
crypto_auth_hmacsha512256.h | 44 size_t keylen);
|
/src/sys/opencrypto/ |
ocryptodev.h | 93 u_int32_t keylen; /* cipher key */ member in struct:osession_op 105 u_int32_t keylen; /* cipher key */ member in struct:osession_n_op 148 u_int32_t keylen; /* cipher key - optional */ member in struct:ocrypt_n_op
|
ocryptodev.c | 229 cnop.keylen = ocnop->keylen; 255 sop.keylen = osop->keylen; 277 os_op.keylen = osn_ops->keylen;
|
/src/lib/libc/citrus/ |
citrus_memstream.c | 79 size_t len, keylen; local in function:_citrus_memory_stream_matchline 81 keylen = strlen(key); 101 if ((size_t)(q-p) == keylen) { 103 if (memcmp(key, p, keylen) == 0) 106 if (_bcs_strncasecmp(key, p, keylen) == 0)
|
/src/sys/dev/ |
cgd_crypto.c | 136 cgd_cipher_aes_cbc_init(size_t keylen, const void *key, size_t *blocksize) 142 if (keylen != 128 && keylen != 192 && keylen != 256) 149 switch (keylen) { 214 cgd_cipher_aes_xts_init(size_t keylen, const void *xtskey, size_t *blocksize) 221 if (keylen != 256 && keylen != 512) 229 keylen /= 2; 231 key2 = key + keylen / CHAR_BIT [all...] |
/src/lib/libc/yp/ |
yp_match.c | 59 int keylen, vallen; member in struct:ypmatch_ent 68 ypmatch_add(const char *map, const char *key, int keylen, char *val, int vallen) 100 if ((ep->key = malloc((size_t)keylen)) == NULL) 109 ep->keylen = keylen; 112 (void)memcpy(ep->key, key, (size_t)ep->keylen); 131 ypmatch_find(const char *map, const char *key, int keylen, const char **val, 147 if (ep->keylen != keylen) 151 if (memcmp(ep->key, key, (size_t)keylen)) [all...] |
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha512256/ |
auth_hmacsha512256.c | 40 const unsigned char *key, size_t keylen) 43 key, keylen);
|
/src/lib/libtelnet/ |
encrypt.c | 166 int keylen; member in struct:key_info 724 kp->keylen = 0; 729 if (kp->keylen == 0) 731 kp->keylen = 0; 733 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 737 } else if ((len != kp->keylen) || 742 kp->keylen = len; 745 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 748 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); 754 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0) [all...] |
/src/sbin/cgdconfig/ |
argon2_utils.c | 81 argon2id_calibrate(size_t keylen, size_t saltlen, 95 key = emalloc(keylen); 118 key, keylen, 149 key, keylen,
|
/src/sys/crypto/blake2/ |
blake2s.c | 153 blake2s_init(struct blake2s *B, size_t dlen, const void *key, size_t keylen) 160 assert(keylen <= 32); 179 param0 |= (uint32_t)keylen << 8; 185 if (keylen) { 188 blake2s_update(B, key, keylen); 189 blake2s_update(B, zero_block, 64 - keylen); 265 blake2s(void *digest, size_t dlen, const void *key, size_t keylen, 270 blake2s_init(&ctx, dlen, key, keylen);
|