/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/ |
H A D | generichash_blake2b.c | 13 const unsigned char *key, size_t keylen) 16 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { 20 assert(keylen <= UINT8_MAX); 23 (uint8_t) keylen); 29 unsigned long long inlen, const unsigned char *key, size_t keylen, 33 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { 37 assert(keylen <= UINT8_MAX); 40 (uint64_t) inlen, (uint8_t) keylen, salt, 46 const unsigned char *key, const size_t keylen, 50 keylen > BLAKE2B_KEYBYTE 11 crypto_generichash_blake2b(unsigned char *out, size_t outlen, const unsigned char *in, unsigned long long inlen, const unsigned char *key, size_t keylen) argument 27 crypto_generichash_blake2b_salt_personal( unsigned char *out, size_t outlen, const unsigned char *in, unsigned long long inlen, const unsigned char *key, size_t keylen, const unsigned char *salt, const unsigned char *personal) argument 45 crypto_generichash_blake2b_init(crypto_generichash_blake2b_state *state, const unsigned char *key, const size_t keylen, const size_t outlen) argument 67 crypto_generichash_blake2b_init_salt_personal( crypto_generichash_blake2b_state *state, const unsigned char *key, const size_t keylen, const size_t outlen, const unsigned char *salt, const unsigned char *personal) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
H A D | cipher_aria_ccm.h | 22 const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keylen);
|
H A D | cipher_aes_siv.h | 15 int (*initkey)(void *ctx, const uint8_t *key, size_t keylen); 27 size_t keylen; /* The input keylength (twice the alg key length) */ member in struct:prov_siv_ctx_st
|
H A D | cipher_aria_ccm_hw.c | 17 const unsigned char *key, size_t keylen) 21 ossl_aria_set_encrypt_key(key, keylen * 8, &actx->ks.ks); 16 ccm_aria_initkey(PROV_CCM_CTX *ctx, const unsigned char *key, size_t keylen) argument
|
H A D | cipher_blowfish_hw.c | 19 const unsigned char *key, size_t keylen) 23 BF_set_key(&bctx->ks.ks, keylen, key); 18 cipher_hw_blowfish_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) argument
|
H A D | cipher_cast5_hw.c | 19 const unsigned char *key, size_t keylen) 23 CAST_set_key(&(bctx->ks.ks), keylen, key); 18 cipher_hw_cast5_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) argument
|
H A D | cipher_rc4_hw.c | 19 const unsigned char *key, size_t keylen) 23 RC4_set_key(&rctx->ks.ks, keylen, key); 18 cipher_hw_rc4_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) argument
|
H A D | cipher_rc5_hw.c | 19 const unsigned char *key, size_t keylen) 23 return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds); 18 cipher_hw_rc5_initkey(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) argument
|
/netbsd-current/external/gpl2/gettext/dist/gettext-tools/gnulib-lib/ |
H A D | hash.c | 46 size_t keylen; member in struct:hash_entry 121 compute_hashval (const void *key, size_t keylen) argument 130 hval = keylen; 131 while (cnt < keylen) 149 const void *key, size_t keylen, 163 if (table[idx].used == hval && table[idx].keylen == keylen 164 && memcmp (table[idx].key, key, keylen) == 0) 178 if (table[idx].used == hval && table[idx].keylen == keylen 148 lookup(hash_table *htab, const void *key, size_t keylen, unsigned long int hval) argument 191 hash_find_entry(hash_table *htab, const void *key, size_t keylen, void **result) argument 209 insert_entry_2(hash_table *htab, const void *key, size_t keylen, unsigned long int hval, size_t idx, void *data) argument 267 hash_insert_entry(hash_table *htab, const void *key, size_t keylen, void *data) argument 294 hash_set_value(hash_table *htab, const void *key, size_t keylen, void *data) argument 326 hash_iterate(hash_table *htab, void **ptr, const void **key, size_t *keylen, void **data) argument 359 hash_iterate_modify(hash_table *htab, void **ptr, const void **key, size_t *keylen, void ***datap) argument [all...] |
H A D | hash.h | 51 const void *key, size_t keylen, 59 const void *key, size_t keylen, 65 const void *key, size_t keylen, 73 const void **key, size_t *keylen, 82 const void **key, size_t *keylen,
|
/netbsd-current/external/gpl2/gettext/dist/gettext-tools/libgettextpo/ |
H A D | hash.c | 46 size_t keylen; member in struct:hash_entry 121 compute_hashval (const void *key, size_t keylen) argument 130 hval = keylen; 131 while (cnt < keylen) 149 const void *key, size_t keylen, 163 if (table[idx].used == hval && table[idx].keylen == keylen 164 && memcmp (table[idx].key, key, keylen) == 0) 178 if (table[idx].used == hval && table[idx].keylen == keylen 148 lookup(hash_table *htab, const void *key, size_t keylen, unsigned long int hval) argument 191 hash_find_entry(hash_table *htab, const void *key, size_t keylen, void **result) argument 209 insert_entry_2(hash_table *htab, const void *key, size_t keylen, unsigned long int hval, size_t idx, void *data) argument 267 hash_insert_entry(hash_table *htab, const void *key, size_t keylen, void *data) argument 294 hash_set_value(hash_table *htab, const void *key, size_t keylen, void *data) argument 326 hash_iterate(hash_table *htab, void **ptr, const void **key, size_t *keylen, void **data) argument 359 hash_iterate_modify(hash_table *htab, void **ptr, const void **key, size_t *keylen, void ***datap) argument [all...] |
H A D | hash.h | 51 const void *key, size_t keylen, 59 const void *key, size_t keylen, 65 const void *key, size_t keylen, 73 const void **key, size_t *keylen, 82 const void **key, size_t *keylen,
|
/netbsd-current/external/gpl2/gettext/dist/gnulib-local/lib/ |
H A D | hash.c | 46 size_t keylen; member in struct:hash_entry 121 compute_hashval (const void *key, size_t keylen) argument 130 hval = keylen; 131 while (cnt < keylen) 149 const void *key, size_t keylen, 163 if (table[idx].used == hval && table[idx].keylen == keylen 164 && memcmp (table[idx].key, key, keylen) == 0) 178 if (table[idx].used == hval && table[idx].keylen == keylen 148 lookup(hash_table *htab, const void *key, size_t keylen, unsigned long int hval) argument 191 hash_find_entry(hash_table *htab, const void *key, size_t keylen, void **result) argument 209 insert_entry_2(hash_table *htab, const void *key, size_t keylen, unsigned long int hval, size_t idx, void *data) argument 267 hash_insert_entry(hash_table *htab, const void *key, size_t keylen, void *data) argument 294 hash_set_value(hash_table *htab, const void *key, size_t keylen, void *data) argument 326 hash_iterate(hash_table *htab, void **ptr, const void **key, size_t *keylen, void **data) argument 359 hash_iterate_modify(hash_table *htab, void **ptr, const void **key, size_t *keylen, void ***datap) argument [all...] |
H A D | hash.h | 51 const void *key, size_t keylen, 59 const void *key, size_t keylen, 65 const void *key, size_t keylen, 73 const void **key, size_t *keylen, 82 const void **key, size_t *keylen,
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | xmss_hash.c | 37 int core_hash_SHA2(unsigned char *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned char *in, unsigned long long inlen, unsigned int n){ argument 39 unsigned char buf[inlen + n + keylen]; 46 for (i=0; i < keylen; i++) { 51 buf[keylen + n + i] = in[i]; 55 SHA256(buf, inlen + keylen + n, out); 60 SHA512(buf, inlen + keylen + n, out); 70 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) argument 72 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen); 78 int h_msg(unsigned char *out, const unsigned char *in, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, cons argument [all...] |
H A D | xmss_hash.h | 16 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen); 17 int h_msg(unsigned char *out,const unsigned char *in,unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned int n);
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | e_cast.c | 43 int keylen = EVP_CIPHER_CTX_get_key_length(ctx); local 45 if (keylen <= 0) 47 CAST_set_key(&data(ctx)->ks, keylen, key);
|
H A D | p_open.c | 23 size_t keylen = 0; local 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) 45 if ((key = OPENSSL_malloc(keylen)) == NULL) { 50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) 53 if (EVP_CIPHER_CTX_set_key_length(ctx, keylen) <= 0 60 OPENSSL_clear_free(key, keylen);
|
/netbsd-current/tests/net/ipsec/ |
H A D | algorithms.sh | 156 local keylen=$(($1 / 8)) 159 while [ $keylen -gt 0 ]; do 161 keylen=$((keylen - 1)) 174 local keylen=$(get_one_valid_keylen $algo) 175 local key=$(generate_key $keylen)
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 20-test_kdf.t | 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}], 28 { cmd => [qw{openssl kdf -keylen 25 -digest SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}], 31 { cmd => [qw{openssl kdf -keylen 64 -mac KMAC128 -kdfopt maclen:20 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}], 34 { cmd => [qw{openssl kdf -keylen 16 -mac HMAC -digest SHA256 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}], 37 { cmd => [qw{openssl kdf -keylen 14 -digest SHA224 -kdfopt hexkey:6dbdc23f045488e4062757b06b9ebae183fc5a5946d80db93fec6f62ec07e3727f0126aed12ce4b262f47d48d54287f81d474c7c3b1850e9 -kdfopt hexinfo:a1b2c3d4e54341565369643c832e9849dcdba71e9a3139e606e095de3c264a66e98a165854cd07989b1ee0ec3f8dbe SSKDF}], 40 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt hexkey:0102030405 -kdfopt hexxcghash:06090A -kdfopt hexsession_id:01020304 -kdfopt type:A SSHKDF}], 45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 48 { cmd => [qw{openssl kdf -keylen 1 [all...] |
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha256/ |
H A D | auth_hmacsha256.c | 38 const unsigned char *key, size_t keylen) 44 if (keylen > 64) { 46 crypto_hash_sha256_update(&state->ictx, key, keylen); 49 keylen = 32; 53 for (i = 0; i < keylen; i++) { 60 for (i = 0; i < keylen; i++) { 37 crypto_auth_hmacsha256_init(crypto_auth_hmacsha256_state *state, const unsigned char *key, size_t keylen) argument
|
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_auth/hmacsha512/ |
H A D | auth_hmacsha512.c | 38 const unsigned char *key, size_t keylen) 44 if (keylen > 128) { 46 crypto_hash_sha512_update(&state->ictx, key, keylen); 49 keylen = 64; 53 for (i = 0; i < keylen; i++) { 60 for (i = 0; i < keylen; i++) { 37 crypto_auth_hmacsha512_init(crypto_auth_hmacsha512_state *state, const unsigned char *key, size_t keylen) argument
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/ec/ |
H A D | ecx_key.c | 26 ret->keylen = X25519_KEYLEN; 29 ret->keylen = X448_KEYLEN; 32 ret->keylen = ED25519_KEYLEN; 35 ret->keylen = ED448_KEYLEN; 71 OPENSSL_secure_clear_free(key->privkey, key->keylen); 95 key->privkey = OPENSSL_secure_zalloc(key->keylen);
|
/netbsd-current/usr.bin/sort/ |
H A D | append.c | 72 * Ignore duplicates (marked with -ve keylen) 84 if (crec->keylen >= 0) 90 if (crec->keylen >= 0)
|
/netbsd-current/external/bsd/ntp/dist/lib/isc/include/isc/ |
H A D | hash.h | 161 unsigned int keylen, isc_boolean_t case_sensitive); 163 isc_hash_calc(const unsigned char *key, unsigned int keylen, 176 * 'keylen' specifies the key length, which must not be larger than the limit
|