HomeSort by: relevance | last modified time | path
    Searched defs:secretlen (Results 1 - 25 of 34) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/demos/keyexch/
ecdh.c 33 size_t secretlen; member in struct:peer_data_st
110 size_t secretlen = 0; local
150 if (EVP_PKEY_derive(derivectx, NULL, &secretlen) <= 0)
152 secret = (unsigned char *)OPENSSL_malloc(secretlen);
161 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0)
164 peerA->secretlen = secretlen;
167 BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2);
207 if (peer1.secretlen != peer2.secretlen
    [all...]
ecdh.c 33 size_t secretlen; member in struct:peer_data_st
110 size_t secretlen = 0; local
150 if (EVP_PKEY_derive(derivectx, NULL, &secretlen) <= 0)
152 secret = (unsigned char *)OPENSSL_malloc(secretlen);
161 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0)
164 peerA->secretlen = secretlen;
167 BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2);
207 if (peer1.secretlen != peer2.secretlen
    [all...]
  /src/external/mpl/bind/dist/bin/named/
tsigconf.c 58 int secretlen = 0; local
99 secretalloc = secretlen = strlen(secretstr) * 3 / 4;
100 secret = isc_mem_get(mctx, secretlen);
101 isc_buffer_init(&secretbuf, secret, secretlen);
106 secretlen = isc_buffer_usedlength(&secretbuf);
108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, mctx,
tsigconf.c 58 int secretlen = 0; local
99 secretalloc = secretlen = strlen(secretstr) * 3 / 4;
100 secret = isc_mem_get(mctx, secretlen);
101 isc_buffer_init(&secretbuf, secret, secretlen);
106 secretlen = isc_buffer_usedlength(&secretbuf);
108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, mctx,
  /src/lib/libskey/
skeylogin.c 451 size_t secretlen; local
497 secretlen = SKEY_MAX_SEED_LEN;
502 secretlen = strlen(secret);
513 SHA1Update(&ctx, secret, secretlen);
518 memset(secret, 0, secretlen);
skeylogin.c 451 size_t secretlen; local
497 secretlen = SKEY_MAX_SEED_LEN;
502 secretlen = strlen(secret);
513 SHA1Update(&ctx, secret, secretlen);
518 memset(secret, 0, secretlen);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/
ec_kem.c 526 size_t secretlen = (EC_GROUP_get_degree(group) + 7) / 8; local
528 if (secretlen != secretsz || secretlen > maxout) {
535 return ECDH_compute_key(out, secretlen, EC_KEY_get0_public_key(peer),
549 * secret The returned secret (with a length ctx->alg->secretlen bytes).
635 * Setting this to NULL allows the enclen and secretlen to return
640 * secretlen Passes in the max size of the secret buffer and returns the
646 unsigned char *secret, size_t *secretlen)
656 if (enclen == NULL && secretlen == NULL)
660 if (secretlen != NULL
    [all...]
ec_kem.c 526 size_t secretlen = (EC_GROUP_get_degree(group) + 7) / 8; local
528 if (secretlen != secretsz || secretlen > maxout) {
535 return ECDH_compute_key(out, secretlen, EC_KEY_get0_public_key(peer),
549 * secret The returned secret (with a length ctx->alg->secretlen bytes).
635 * Setting this to NULL allows the enclen and secretlen to return
640 * secretlen Passes in the max size of the secret buffer and returns the
646 unsigned char *secret, size_t *secretlen)
656 if (enclen == NULL && secretlen == NULL)
660 if (secretlen != NULL
    [all...]
  /src/external/bsd/tcpdump/dist/
print-esp.c 118 int secretlen; member in struct:sa_list
476 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon);
477 if(sa->secretlen == 0) return 0;
483 sa->secretlen = i;
486 sa->secretlen = sizeof(sa->secret);
print-esp.c 118 int secretlen; member in struct:sa_list
476 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon);
477 if(sa->secretlen == 0) return 0;
483 sa->secretlen = i;
486 sa->secretlen = sizeof(sa->secret);
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/
argon2.h 174 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
argon2.h 174 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
  /src/crypto/external/apache2/openssl/dist/crypto/hpke/
hpke.c 662 size_t secretlen = OSSL_HPKE_MAXSIZE; local
738 secretlen = kdf_info->Nh;
739 if (secretlen > OSSL_HPKE_MAXSIZE) {
743 if (ossl_hpke_labeled_extract(kctx, secret, secretlen,
760 secret, secretlen, OSSL_HPKE_SEC51LABEL,
773 secret, secretlen, OSSL_HPKE_SEC51LABEL,
787 secret, secretlen, OSSL_HPKE_SEC51LABEL,
1247 unsigned char *secret, size_t secretlen,
1256 if (ctx == NULL || secret == NULL || secretlen == 0) {
1290 erv = ossl_hpke_labeled_expand(kctx, secret, secretlen,
    [all...]
hpke.c 662 size_t secretlen = OSSL_HPKE_MAXSIZE; local
738 secretlen = kdf_info->Nh;
739 if (secretlen > OSSL_HPKE_MAXSIZE) {
743 if (ossl_hpke_labeled_extract(kctx, secret, secretlen,
760 secret, secretlen, OSSL_HPKE_SEC51LABEL,
773 secret, secretlen, OSSL_HPKE_SEC51LABEL,
787 secret, secretlen, OSSL_HPKE_SEC51LABEL,
1247 unsigned char *secret, size_t secretlen,
1256 if (ctx == NULL || secret == NULL || secretlen == 0) {
1290 erv = ossl_hpke_labeled_expand(kctx, secret, secretlen,
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/fips/
self_test_kats.c 666 size_t wrappedlen = t->cipher_text_len, secretlen = t->secret_len; local
684 secret = OPENSSL_malloc(secretlen);
689 if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0)
699 if (secretlen != t->secret_len
725 size_t secretlen = t->secret_len; local
746 secret = OPENSSL_malloc(secretlen);
751 if (EVP_PKEY_decapsulate(ctx, secret, &secretlen,
758 if (secretlen != t->secret_len
self_test_kats.c 666 size_t wrappedlen = t->cipher_text_len, secretlen = t->secret_len; local
684 secret = OPENSSL_malloc(secretlen);
689 if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0)
699 if (secretlen != t->secret_len
725 size_t secretlen = t->secret_len; local
746 secret = OPENSSL_malloc(secretlen);
751 if (EVP_PKEY_decapsulate(ctx, secret, &secretlen,
758 if (secretlen != t->secret_len
  /src/crypto/external/apache2/openssl/dist/test/
evp_libctx_test.c 727 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local
738 &secretlen),
740 && TEST_int_eq(ctlen, secretlen)
743 &secretlen),
756 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen);
762 &secretlen),
824 size_t ctlen = 0, secretlen = 0; local
842 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct,
848 && (is_fips_lt_3_5 || (TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, &ctlen, NULL, &secretlen), 1) && TEST_true(ctlen <= sizeof(ct)) && TEST_true(secretlen <= sizeof(secret)) && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), 1) (…)
    [all...]
evp_pkey_dhkem_test.c 189 size_t secretlen = sizeof(secret); local
203 secret, &secretlen),
618 size_t secretlen = sizeof(secret); local
639 secret, &secretlen),
645 if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
668 size_t secretlen = sizeof(secret); local
684 secret, &secretlen),
689 || !TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
708 size_t secretlen = sizeof(secret); local
715 && TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
    [all...]
evp_libctx_test.c 727 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local
738 &secretlen),
740 && TEST_int_eq(ctlen, secretlen)
743 &secretlen),
756 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen);
762 &secretlen),
824 size_t ctlen = 0, secretlen = 0; local
842 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct,
848 && (is_fips_lt_3_5 || (TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, &ctlen, NULL, &secretlen), 1) && TEST_true(ctlen <= sizeof(ct)) && TEST_true(secretlen <= sizeof(secret)) && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), 1) (…)
    [all...]
evp_pkey_dhkem_test.c 189 size_t secretlen = sizeof(secret); local
203 secret, &secretlen),
618 size_t secretlen = sizeof(secret); local
639 secret, &secretlen),
645 if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
668 size_t secretlen = sizeof(secret); local
684 secret, &secretlen),
689 || !TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
708 size_t secretlen = sizeof(secret); local
715 && TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
evp_libctx_test.c 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local
542 &secretlen), 1)
543 && TEST_int_eq(ctlen, secretlen)
546 &secretlen), 1)
556 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen);
562 &secretlen), 0))
613 size_t ctlen = 0, secretlen = 0; local
631 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct,
636 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2)
642 /* Test secretlen is optional *
    [all...]
evp_libctx_test.c 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local
542 &secretlen), 1)
543 && TEST_int_eq(ctlen, secretlen)
546 &secretlen), 1)
556 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen);
562 &secretlen), 0))
613 size_t ctlen = 0, secretlen = 0; local
631 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct,
636 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2)
642 /* Test secretlen is optional *
    [all...]
  /src/external/apache2/argon2/dist/phc-winner-argon2/include/
argon2.h 202 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
argon2.h 202 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
  /src/crypto/external/apache2/openssl/dist/apps/
pkeyutl.c 166 size_t buf_outlen = 0, secretlen = 0; local
582 buf_in, buf_inlen, NULL, &secretlen);
585 && (secretlen > 0 || (pkey_op != EVP_PKEY_OP_ENCAPSULATE && pkey_op != EVP_PKEY_OP_DECAPSULATE))
589 if (secretlen > 0)
590 secret = app_malloc(secretlen, "secret output");
593 buf_in, buf_inlen, secret, &secretlen);
615 if (secretlen > 0)
616 BIO_write(secout ? secout : out, secret, secretlen);

Completed in 60 milliseconds

1 2