HomeSort by: relevance | last modified time | path
    Searched refs:keylen (Results 1 - 25 of 82) sorted by relevancy

1 2 3 4

  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/
generichash_blake2b.c 13 const unsigned char *key, size_t keylen)
16 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) {
20 assert(keylen <= UINT8_MAX);
23 (uint8_t) keylen);
29 unsigned long long inlen, const unsigned char *key, size_t keylen,
33 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) {
37 assert(keylen <= UINT8_MAX);
40 (uint64_t) inlen, (uint8_t) keylen, salt,
46 const unsigned char *key, const size_t keylen,
50 keylen > BLAKE2B_KEYBYTES)
    [all...]
blake2b-ref.c 178 const uint8_t keylen)
185 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) {
189 P->key_length = keylen;
206 memcpy(block, key, keylen); /* keylen cannot be 0 */
215 const void *key, const uint8_t keylen,
223 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) {
227 P->key_length = keylen;
    [all...]
blake2.h 81 const uint8_t keylen);
83 const void *key, const uint8_t keylen,
91 const uint64_t inlen, uint8_t keylen);
94 uint8_t keylen, const void *salt,
  /src/tests/net/ipsec/
algorithms.sh 156 local keylen=$(($1 / 8))
159 while [ $keylen -gt 0 ]; do
161 keylen=$((keylen - 1))
174 local keylen=$(get_one_valid_keylen $algo)
175 local key=$(generate_key $keylen)
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha256/
auth_hmacsha256.c 38 const unsigned char *key, size_t keylen)
44 if (keylen > 64) {
46 crypto_hash_sha256_update(&state->ictx, key, keylen);
49 keylen = 32;
53 for (i = 0; i < keylen; i++) {
60 for (i = 0; i < keylen; i++) {
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha512/
auth_hmacsha512.c 38 const unsigned char *key, size_t keylen)
44 if (keylen > 128) {
46 crypto_hash_sha512_update(&state->ictx, key, keylen);
49 keylen = 64;
53 for (i = 0; i < keylen; i++) {
60 for (i = 0; i < keylen; i++) {
  /src/usr.bin/sort/
append.c 72 * Ignore duplicates (marked with -ve keylen)
84 if (crec->keylen >= 0)
90 if (crec->keylen >= 0)
radix_sort.c 108 if (data_index >= hdr->keylen) {
112 hdr->keylen = -1;
184 s_len = akh->keylen;
187 t_len = (*ai)->keylen;
204 akh->keylen = -1;
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/
crypto_generichash.c 56 size_t keylen)
58 return crypto_generichash_blake2b(out, outlen, in, inlen, key, keylen);
64 const size_t keylen, const size_t outlen)
67 ((crypto_generichash_blake2b_state *) state, key, keylen, outlen);
  /src/sys/netipsec/
xform_tcp.c 87 int keylen; local in function:tcpsignature_init
102 keylen = _KEYLEN(sav->key_auth);
103 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) {
104 DPRINTF("invalid key length %u\n", keylen);
  /src/usr.sbin/services_mkdb/
output_cdb.c 69 size_t len, protolen, datalen, keylen; local in function:cdb_add
109 keylen = 4 + protolen;
110 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
114 keylen = 4;
115 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
125 keylen = 2 + len + protolen;
126 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
130 keylen = 2 + len;
131 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
  /src/sys/external/isc/libsodium/dist/src/libsodium/include/sodium/
crypto_generichash_blake2b.h 77 const unsigned char *key, size_t keylen);
84 size_t keylen,
91 const size_t keylen, const size_t outlen);
96 const size_t keylen, const size_t outlen,
crypto_generichash.h 52 const unsigned char *key, size_t keylen);
57 const size_t keylen, const size_t outlen);
crypto_auth_hmacsha256.h 49 size_t keylen);
crypto_auth_hmacsha512.h 49 size_t keylen);
crypto_auth_hmacsha512256.h 44 size_t keylen);
  /src/sys/opencrypto/
ocryptodev.h 93 u_int32_t keylen; /* cipher key */ member in struct:osession_op
105 u_int32_t keylen; /* cipher key */ member in struct:osession_n_op
148 u_int32_t keylen; /* cipher key - optional */ member in struct:ocrypt_n_op
ocryptodev.c 229 cnop.keylen = ocnop->keylen;
255 sop.keylen = osop->keylen;
277 os_op.keylen = osn_ops->keylen;
  /src/lib/libc/citrus/
citrus_memstream.c 79 size_t len, keylen; local in function:_citrus_memory_stream_matchline
81 keylen = strlen(key);
101 if ((size_t)(q-p) == keylen) {
103 if (memcmp(key, p, keylen) == 0)
106 if (_bcs_strncasecmp(key, p, keylen) == 0)
  /src/sys/dev/
cgd_crypto.c 136 cgd_cipher_aes_cbc_init(size_t keylen, const void *key, size_t *blocksize)
142 if (keylen != 128 && keylen != 192 && keylen != 256)
149 switch (keylen) {
214 cgd_cipher_aes_xts_init(size_t keylen, const void *xtskey, size_t *blocksize)
221 if (keylen != 256 && keylen != 512)
229 keylen /= 2;
231 key2 = key + keylen / CHAR_BIT
    [all...]
  /src/lib/libc/yp/
yp_match.c 59 int keylen, vallen; member in struct:ypmatch_ent
68 ypmatch_add(const char *map, const char *key, int keylen, char *val, int vallen)
100 if ((ep->key = malloc((size_t)keylen)) == NULL)
109 ep->keylen = keylen;
112 (void)memcpy(ep->key, key, (size_t)ep->keylen);
131 ypmatch_find(const char *map, const char *key, int keylen, const char **val,
147 if (ep->keylen != keylen)
151 if (memcmp(ep->key, key, (size_t)keylen))
    [all...]
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha512256/
auth_hmacsha512256.c 40 const unsigned char *key, size_t keylen)
43 key, keylen);
  /src/lib/libtelnet/
encrypt.c 166 int keylen; member in struct:key_info
724 kp->keylen = 0;
729 if (kp->keylen == 0)
731 kp->keylen = 0;
733 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
737 } else if ((len != kp->keylen) ||
742 kp->keylen = len;
745 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
748 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen);
754 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0)
    [all...]
  /src/sbin/cgdconfig/
argon2_utils.c 81 argon2id_calibrate(size_t keylen, size_t saltlen,
95 key = emalloc(keylen);
118 key, keylen,
149 key, keylen,
  /src/sys/crypto/blake2/
blake2s.c 153 blake2s_init(struct blake2s *B, size_t dlen, const void *key, size_t keylen)
160 assert(keylen <= 32);
179 param0 |= (uint32_t)keylen << 8;
185 if (keylen) {
188 blake2s_update(B, key, keylen);
189 blake2s_update(B, zero_block, 64 - keylen);
265 blake2s(void *digest, size_t dlen, const void *key, size_t keylen,
270 blake2s_init(&ctx, dlen, key, keylen);

Completed in 20 milliseconds

1 2 3 4