/freebsd-current/crypto/openssl/crypto/pem/ |
H A D | pem_pk8.c | 23 const char *kstr, int klen, 30 const char *kstr, int klen, 42 const char *kstr, int klen, 45 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u, NULL); 49 const char *kstr, int klen, 52 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u, NULL); 56 const char *kstr, int klen, 59 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u, NULL); 63 const char *kstr, int klen, 66 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, c 41 PEM_write_bio_PKCS8PrivateKey_nid(BIO *bp, const EVP_PKEY *x, int nid, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 48 PEM_write_bio_PKCS8PrivateKey(BIO *bp, const EVP_PKEY *x, const EVP_CIPHER *enc, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 55 i2d_PKCS8PrivateKey_bio(BIO *bp, const EVP_PKEY *x, const EVP_CIPHER *enc, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 62 i2d_PKCS8PrivateKey_nid_bio(BIO *bp, const EVP_PKEY *x, int nid, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 69 do_pk8pkey(BIO *bp, const EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, const char *kstr, int klen, pem_password_cb *cb, void *u, const char *propq) argument 174 int klen; local 208 i2d_PKCS8PrivateKey_fp(FILE *fp, const EVP_PKEY *x, const EVP_CIPHER *enc, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 215 i2d_PKCS8PrivateKey_nid_fp(FILE *fp, const EVP_PKEY *x, int nid, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 222 PEM_write_PKCS8PrivateKey_nid(FILE *fp, const EVP_PKEY *x, int nid, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 229 PEM_write_PKCS8PrivateKey(FILE *fp, const EVP_PKEY *x, const EVP_CIPHER *enc, const char *kstr, int klen, pem_password_cb *cb, void *u) argument 236 do_pk8pkey_fp(FILE *fp, const EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, const char *kstr, int klen, pem_password_cb *cb, void *u, const char *propq) argument [all...] |
H A D | pem_pkey.c | 149 int klen; local 155 klen = cb(psbuf, PEM_BUFSIZE, 0, u); 157 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u); 158 if (klen < 0) { 163 p8inf = PKCS8_decrypt(p8, psbuf, klen); 165 OPENSSL_cleanse(psbuf, klen); 325 (const char *)kstr, klen, cb, u); 326 return PEM_write_bio_PrivateKey_traditional(out, x, enc, kstr, klen, cb, u); 331 return PEM_write_bio_PrivateKey_ex(out, x, enc, kstr, klen, cb, u, 341 const unsigned char *kstr, int klen, 339 PEM_write_bio_PrivateKey_traditional(BIO *bp, const EVP_PKEY *x, const EVP_CIPHER *enc, const unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument [all...] |
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | siv.h | 14 SIV128_CONTEXT *ossl_siv128_new(const unsigned char *key, int klen, 17 int ossl_siv128_init(SIV128_CONTEXT *ctx, const unsigned char *key, int klen,
|
/freebsd-current/tools/tools/net80211/w00t/libw00t/ |
H A D | w00t.c | 277 int klen; local 279 klen = strlen(str); 280 if (klen % 2) 282 klen /= 2; 284 if (klen != 5 && klen != 13) 287 *len = klen; 289 while (klen--) { 303 int wep_decrypt(struct ieee80211_frame *wh, int len, char *key, int klen) argument 311 assert(sizeof(seed) >= klen 331 wep_encrypt(struct ieee80211_frame *wh, int len, char *key, int klen) argument [all...] |
H A D | w00t.h | 48 int wep_decrypt(struct ieee80211_frame *wh, int len, char *key, int klen); 49 void wep_encrypt(struct ieee80211_frame *wh, int len, char *key, int klen);
|
/freebsd-current/sys/opencrypto/ |
H A D | xform_poly1305.c | 24 xform_Poly1305_Setkey(void *ctx, const uint8_t *key, u_int klen) argument 29 if (klen != POLY1305_KEY_LEN) 30 panic("%s: Bogus keylen: %u bytes", __func__, (unsigned)klen);
|
H A D | gmac.c | 45 AES_GMAC_Setkey(void *ctx, const uint8_t *key, u_int klen) argument 53 agc->rounds = rijndaelKeySetupEnc(agc->keysched, key, klen * 8);
|
/freebsd-current/contrib/libucl/tests/ |
H A D | test_msgpack.c | 108 size_t klen, elen, elen2; local 143 key = random_key (&klen); 147 assert (klen != 0); 149 ucl_object_insert_key (obj, elt, key, klen, true); 152 key = random_key (&klen); 154 ucl_object_insert_key (obj, elt, key, klen, true); 156 key = random_key (&klen); 158 ucl_object_insert_key (obj, elt, key, klen, true); 160 key = random_key (&klen); 162 ucl_object_insert_key (obj, elt, key, klen, tru 324 size_t klen; local 370 size_t klen; local [all...] |
/freebsd-current/crypto/openssh/ |
H A D | hmac.h | 29 int ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
|
H A D | kexecdh.c | 145 size_t klen = 0; local 173 klen = (EC_GROUP_get_degree(group) + 7) / 8; 174 if ((kbuf = malloc(klen)) == NULL || 179 if (ECDH_compute_key(kbuf, klen, dh_pub, key, NULL) != (int)klen || 180 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 185 dump_digest("shared secret", kbuf, klen); 194 freezero(kbuf, klen);
|
H A D | kexdh.c | 77 size_t klen = 0; local 93 klen = DH_size(kex->dh); 94 if ((kbuf = malloc(klen)) == NULL || 109 freezero(kbuf, klen);
|
H A D | hmac.c | 66 ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen) argument 73 if (klen <= ctx->buf_len) 74 memcpy(ctx->buf, key, klen); 75 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, 142 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) argument 150 if (ssh_hmac_init(ctx, key, klen) < 0 ||
|
/freebsd-current/sys/crypto/blake2/ |
H A D | blake2_cryptodev.c | 184 blake2_check_klen(const struct crypto_session_params *csp, unsigned klen) argument 188 return (klen <= BLAKE2S_KEYBYTES); 190 return (klen <= BLAKE2B_KEYBYTES); 261 unsigned klen; local 268 klen = csp->csp_auth_klen; 274 if (klen > 0) 275 rc = blake2b_init_key(&bctx.sb, ses->mlen, key, klen); 291 if (klen > 0) 292 rc = blake2s_init_key(&bctx.ss, ses->mlen, key, klen);
|
H A D | blake2-sw.c | 44 blake2b_xform_setkey(void *vctx, const uint8_t *key, u_int klen) argument 50 klen); 107 blake2s_xform_setkey(void *vctx, const uint8_t *key, u_int klen) argument 113 klen);
|
/freebsd-current/sys/crypto/via/ |
H A D | padlock_cipher.c | 97 padlock_cipher_key_setup(struct padlock_session *ses, const void *key, int klen) argument 105 rijndaelKeySetupEnc(ses->ses_ekey, key, klen * 8); 106 rijndaelKeySetupDec(ses->ses_dkey, key, klen * 8); 112 bcopy(key, ses->ses_ekey, klen); 113 bcopy(key, ses->ses_dkey, klen);
|
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_siv_hw.c | 24 size_t klen = keylen / 2; local 33 switch (klen) { 52 * klen is the length of the underlying cipher, not the input key, 55 return ossl_siv128_init(sctx, key, klen, ctx->cbc, ctx->ctr, libctx,
|
/freebsd-current/sys/contrib/libsodium/test/default/ |
H A D | metamorphic.c | 16 size_t klen; local 24 klen = randombytes_uniform(crypto_generichash_KEYBYTES_MAX - 27 k = (unsigned char *) sodium_malloc(klen); 34 randombytes_buf(k, klen); 37 crypto_generichash_init(&st, k, klen, hlen); 45 crypto_generichash(h2, hlen, m, mlen, k, klen);
|
/freebsd-current/sys/crypto/ccp/ |
H A D | ccp.c | 232 ccp_init_hmac_digest(struct ccp_session *s, const char *key, int klen) argument 243 if (klen > axf->blocksize) { 245 axf->Update(&auth_ctx, key, klen); 248 klen = axf->hashsize; 250 memcpy(s->hmac.ipad, key, klen); 252 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); 262 ccp_aes_check_keylen(int alg, int klen) argument 265 switch (klen * 8) { 284 ccp_aes_setkey(struct ccp_session *s, int alg, const void *key, int klen) argument [all...] |
/freebsd-current/tests/sys/opencrypto/ |
H A D | blake2_test.c | 97 create_session(int fd, int alg, int crid, const void *key, size_t klen) argument 105 sop.mackeylen = klen; 109 "alg %d keylen %zu, errno=%d (%s)", alg, klen, errno, local
|
/freebsd-current/sys/dev/glxsb/ |
H A D | glxsb_hash.c | 50 glxsb_hash_key_setup(struct glxsb_session *ses, const char *key, int klen) argument 55 hmac_init_ipad(axf, key, klen, ses->ses_ictx); 56 hmac_init_opad(axf, key, klen, ses->ses_octx);
|
/freebsd-current/usr.sbin/ppp/ |
H A D | pap.c | 184 u_char nlen, klen, *key; local 254 bp = mbuf_Read(bp, &klen, 1); 255 if (m_length(bp) < klen) { 259 if ((key = malloc(klen+1)) == NULL) { 263 bp = mbuf_Read(bp, key, klen); 264 key[klen] = '\0';
|
/freebsd-current/contrib/ldns/ldns/ |
H A D | radix.h | 72 radix_strlen_t klen; member in struct:ldns_radix_node_t
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | pem.h | 83 const unsigned char *kstr, int klen, \ 92 const unsigned char *kstr, int klen, \ 133 x, enc, kstr, klen, cb, u); \ 166 x, enc, kstr, klen, cb, u); \ 392 const unsigned char *kstr, int klen, 403 const unsigned char *kstr, int klen, 415 const unsigned char *kstr, int klen, 478 const unsigned char *kstr, int klen, 483 const char *kstr, int klen, 486 const char *kstr, int klen, [all...] |
/freebsd-current/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 199 size_t klen, /* key length */ 206 robuffT keyb = { key, klen }; 229 size_t klen, /* key length */ 238 robuffT keyb = { key, klen }; 196 MD5authencrypt( int type, const u_char * key, size_t klen, u_int32 * pkt, size_t length ) argument 226 MD5authdecrypt( int type, const u_char * key, size_t klen, u_int32 * pkt, size_t length, size_t size, keyid_t keyno ) argument
|
/freebsd-current/sys/crypto/openssl/ |
H A D | ossl_poly1305.c | 149 ossl_poly1305_setkey(void *vctx, const uint8_t *key, u_int klen) argument 151 MPASS(klen == 32);
|