| /src/crypto/external/apache2/openssl/dist/demos/keyexch/ |
| ecdh.c | 33 size_t secretlen; member in struct:peer_data_st 110 size_t secretlen = 0; local 150 if (EVP_PKEY_derive(derivectx, NULL, &secretlen) <= 0) 152 secret = (unsigned char *)OPENSSL_malloc(secretlen); 161 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0) 164 peerA->secretlen = secretlen; 167 BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2); 207 if (peer1.secretlen != peer2.secretlen [all...] |
| ecdh.c | 33 size_t secretlen; member in struct:peer_data_st 110 size_t secretlen = 0; local 150 if (EVP_PKEY_derive(derivectx, NULL, &secretlen) <= 0) 152 secret = (unsigned char *)OPENSSL_malloc(secretlen); 161 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0) 164 peerA->secretlen = secretlen; 167 BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2); 207 if (peer1.secretlen != peer2.secretlen [all...] |
| /src/external/mpl/bind/dist/bin/named/ |
| tsigconf.c | 58 int secretlen = 0; local 99 secretalloc = secretlen = strlen(secretstr) * 3 / 4; 100 secret = isc_mem_get(mctx, secretlen); 101 isc_buffer_init(&secretbuf, secret, secretlen); 106 secretlen = isc_buffer_usedlength(&secretbuf); 108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, mctx,
|
| tsigconf.c | 58 int secretlen = 0; local 99 secretalloc = secretlen = strlen(secretstr) * 3 / 4; 100 secret = isc_mem_get(mctx, secretlen); 101 isc_buffer_init(&secretbuf, secret, secretlen); 106 secretlen = isc_buffer_usedlength(&secretbuf); 108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, mctx,
|
| /src/lib/libskey/ |
| skeylogin.c | 451 size_t secretlen; local 497 secretlen = SKEY_MAX_SEED_LEN; 502 secretlen = strlen(secret); 513 SHA1Update(&ctx, secret, secretlen); 518 memset(secret, 0, secretlen);
|
| skeylogin.c | 451 size_t secretlen; local 497 secretlen = SKEY_MAX_SEED_LEN; 502 secretlen = strlen(secret); 513 SHA1Update(&ctx, secret, secretlen); 518 memset(secret, 0, secretlen);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/ |
| ec_kem.c | 526 size_t secretlen = (EC_GROUP_get_degree(group) + 7) / 8; local 528 if (secretlen != secretsz || secretlen > maxout) { 535 return ECDH_compute_key(out, secretlen, EC_KEY_get0_public_key(peer), 549 * secret The returned secret (with a length ctx->alg->secretlen bytes). 635 * Setting this to NULL allows the enclen and secretlen to return 640 * secretlen Passes in the max size of the secret buffer and returns the 646 unsigned char *secret, size_t *secretlen) 656 if (enclen == NULL && secretlen == NULL) 660 if (secretlen != NULL [all...] |
| ec_kem.c | 526 size_t secretlen = (EC_GROUP_get_degree(group) + 7) / 8; local 528 if (secretlen != secretsz || secretlen > maxout) { 535 return ECDH_compute_key(out, secretlen, EC_KEY_get0_public_key(peer), 549 * secret The returned secret (with a length ctx->alg->secretlen bytes). 635 * Setting this to NULL allows the enclen and secretlen to return 640 * secretlen Passes in the max size of the secret buffer and returns the 646 unsigned char *secret, size_t *secretlen) 656 if (enclen == NULL && secretlen == NULL) 660 if (secretlen != NULL [all...] |
| /src/external/bsd/tcpdump/dist/ |
| print-esp.c | 118 int secretlen; member in struct:sa_list 476 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); 477 if(sa->secretlen == 0) return 0; 483 sa->secretlen = i; 486 sa->secretlen = sizeof(sa->secret);
|
| print-esp.c | 118 int secretlen; member in struct:sa_list 476 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); 477 if(sa->secretlen == 0) return 0; 483 sa->secretlen = i; 486 sa->secretlen = sizeof(sa->secret);
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
| argon2.h | 174 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
|
| argon2.h | 174 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
|
| /src/crypto/external/apache2/openssl/dist/crypto/hpke/ |
| hpke.c | 662 size_t secretlen = OSSL_HPKE_MAXSIZE; local 738 secretlen = kdf_info->Nh; 739 if (secretlen > OSSL_HPKE_MAXSIZE) { 743 if (ossl_hpke_labeled_extract(kctx, secret, secretlen, 760 secret, secretlen, OSSL_HPKE_SEC51LABEL, 773 secret, secretlen, OSSL_HPKE_SEC51LABEL, 787 secret, secretlen, OSSL_HPKE_SEC51LABEL, 1247 unsigned char *secret, size_t secretlen, 1256 if (ctx == NULL || secret == NULL || secretlen == 0) { 1290 erv = ossl_hpke_labeled_expand(kctx, secret, secretlen, [all...] |
| hpke.c | 662 size_t secretlen = OSSL_HPKE_MAXSIZE; local 738 secretlen = kdf_info->Nh; 739 if (secretlen > OSSL_HPKE_MAXSIZE) { 743 if (ossl_hpke_labeled_extract(kctx, secret, secretlen, 760 secret, secretlen, OSSL_HPKE_SEC51LABEL, 773 secret, secretlen, OSSL_HPKE_SEC51LABEL, 787 secret, secretlen, OSSL_HPKE_SEC51LABEL, 1247 unsigned char *secret, size_t secretlen, 1256 if (ctx == NULL || secret == NULL || secretlen == 0) { 1290 erv = ossl_hpke_labeled_expand(kctx, secret, secretlen, [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/fips/ |
| self_test_kats.c | 666 size_t wrappedlen = t->cipher_text_len, secretlen = t->secret_len; local 684 secret = OPENSSL_malloc(secretlen); 689 if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0) 699 if (secretlen != t->secret_len 725 size_t secretlen = t->secret_len; local 746 secret = OPENSSL_malloc(secretlen); 751 if (EVP_PKEY_decapsulate(ctx, secret, &secretlen, 758 if (secretlen != t->secret_len
|
| self_test_kats.c | 666 size_t wrappedlen = t->cipher_text_len, secretlen = t->secret_len; local 684 secret = OPENSSL_malloc(secretlen); 689 if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0) 699 if (secretlen != t->secret_len 725 size_t secretlen = t->secret_len; local 746 secret = OPENSSL_malloc(secretlen); 751 if (EVP_PKEY_decapsulate(ctx, secret, &secretlen, 758 if (secretlen != t->secret_len
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_libctx_test.c | 727 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local 738 &secretlen), 740 && TEST_int_eq(ctlen, secretlen) 743 &secretlen), 756 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); 762 &secretlen), 824 size_t ctlen = 0, secretlen = 0; local 842 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, 848 && (is_fips_lt_3_5 || (TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, &ctlen, NULL, &secretlen), 1) && TEST_true(ctlen <= sizeof(ct)) && TEST_true(secretlen <= sizeof(secret)) && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), 1) (…) [all...] |
| evp_pkey_dhkem_test.c | 189 size_t secretlen = sizeof(secret); local 203 secret, &secretlen), 618 size_t secretlen = sizeof(secret); local 639 secret, &secretlen), 645 if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, 668 size_t secretlen = sizeof(secret); local 684 secret, &secretlen), 689 || !TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, 708 size_t secretlen = sizeof(secret); local 715 && TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, [all...] |
| evp_libctx_test.c | 727 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local 738 &secretlen), 740 && TEST_int_eq(ctlen, secretlen) 743 &secretlen), 756 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); 762 &secretlen), 824 size_t ctlen = 0, secretlen = 0; local 842 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, 848 && (is_fips_lt_3_5 || (TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, &ctlen, NULL, &secretlen), 1) && TEST_true(ctlen <= sizeof(ct)) && TEST_true(secretlen <= sizeof(secret)) && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), 1) (…) [all...] |
| evp_pkey_dhkem_test.c | 189 size_t secretlen = sizeof(secret); local 203 secret, &secretlen), 618 size_t secretlen = sizeof(secret); local 639 secret, &secretlen), 645 if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, 668 size_t secretlen = sizeof(secret); local 684 secret, &secretlen), 689 || !TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, 708 size_t secretlen = sizeof(secret); local 715 && TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen, [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_libctx_test.c | 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local 542 &secretlen), 1) 543 && TEST_int_eq(ctlen, secretlen) 546 &secretlen), 1) 556 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); 562 &secretlen), 0)) 613 size_t ctlen = 0, secretlen = 0; local 631 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, 636 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) 642 /* Test secretlen is optional * [all...] |
| evp_libctx_test.c | 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; local 542 &secretlen), 1) 543 && TEST_int_eq(ctlen, secretlen) 546 &secretlen), 1) 556 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); 562 &secretlen), 0)) 613 size_t ctlen = 0, secretlen = 0; local 631 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, 636 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) 642 /* Test secretlen is optional * [all...] |
| /src/external/apache2/argon2/dist/phc-winner-argon2/include/ |
| argon2.h | 202 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
|
| argon2.h | 202 uint32_t secretlen; /* key length */ member in struct:Argon2_Context
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| pkeyutl.c | 166 size_t buf_outlen = 0, secretlen = 0; local 582 buf_in, buf_inlen, NULL, &secretlen); 585 && (secretlen > 0 || (pkey_op != EVP_PKEY_OP_ENCAPSULATE && pkey_op != EVP_PKEY_OP_DECAPSULATE)) 589 if (secretlen > 0) 590 secret = app_malloc(secretlen, "secret output"); 593 buf_in, buf_inlen, secret, &secretlen); 615 if (secretlen > 0) 616 BIO_write(secout ? secout : out, secret, secretlen);
|