/freebsd/crypto/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 39 unsigned char *key, size_t keylen, EVP_MD *sha256, 152 static int kdf_scrypt_derive(void *vctx, unsigned char *key, size_t keylen, in kdf_scrypt_derive() argument 175 ctx->maxmem_bytes, key, keylen, ctx->sha256, in kdf_scrypt_derive() 413 unsigned char *key, size_t keylen, EVP_MD *sha256, in scrypt_alg() argument 506 keylen, key, libctx, propq) == 0) in scrypt_alg()
|
H A D | x942kdf.c | 197 x942_encode_otherinfo(size_t keylen, in x942_encode_otherinfo() argument 214 if (keylen > 0xFFFFFF) in x942_encode_otherinfo() 216 keylen_bits = 8 * keylen; in x942_encode_otherinfo() 397 static int x942kdf_derive(void *vctx, unsigned char *key, size_t keylen, in x942kdf_derive() argument 464 der, der_len, ctr, key, keylen); in x942kdf_derive()
|
H A D | tls1_prf.c | 136 static int kdf_tls1_prf_derive(void *vctx, unsigned char *key, size_t keylen, in kdf_tls1_prf_derive() argument 156 if (keylen == 0) { in kdf_tls1_prf_derive() 164 key, keylen); in kdf_tls1_prf_derive()
|
/freebsd/contrib/libucl/tests/ |
H A D | test_msgpack.c | 84 int keylen, i; in random_key() local 87 keylen = pcg32_random () % (sizeof (keybuf) - 1) + 1; in random_key() 89 for (i = 0; i < keylen; i ++) { in random_key() 97 *lenptr = keylen; in random_key()
|
/freebsd/sbin/setkey/ |
H A D | test-pfkey.c | 432 u_int keylen = strlen(str); local 435 len = sizeof(struct sadb_key) + PFKEY_ALIGN8(keylen); 438 m_key.sadb_key_bits = keylen * 8; 443 str, keylen);
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 49 const int keylen = EVP_CIPHER_CTX_get_key_length(ctx); in rc4_hmac_md5_init_key() local 51 if (keylen <= 0) in rc4_hmac_md5_init_key() 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
|
H A D | kdf_lib.c | 140 int EVP_KDF_derive(EVP_KDF_CTX *ctx, unsigned char *key, size_t keylen, in EVP_KDF_derive() argument 146 return ctx->meth->derive(ctx->algctx, key, keylen, params); in EVP_KDF_derive()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | kdf.h | 44 int EVP_KDF_derive(EVP_KDF_CTX *ctx, unsigned char *key, size_t keylen, 111 const unsigned char *key, int keylen);
|
H A D | cms.h | 247 const unsigned char *key, size_t keylen, 252 size_t keylen, unsigned int flags); 255 size_t keylen, unsigned int flags, 260 const unsigned char *key, size_t keylen); 284 unsigned char *key, size_t keylen, 316 unsigned char *key, size_t keylen, 330 unsigned char *key, size_t keylen); 482 ASN1_OCTET_STRING *ukm, int keylen);
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_camellia_hw_t4.inc | 17 size_t keylen) 24 bits = keylen * 8;
|
H A D | cipher_aes_siv_hw.c | 20 static int aes_siv_initkey(void *vctx, const unsigned char *key, size_t keylen) in aes_siv_initkey() argument 24 size_t klen = keylen / 2; in aes_siv_initkey()
|
H A D | cipher_null.c | 40 static int null_einit(void *vctx, const unsigned char *key, size_t keylen, in null_einit() argument 54 static int null_dinit(void *vctx, const unsigned char *key, size_t keylen, in null_dinit() argument
|
H A D | cipher_aria_ccm.h | 22 const PROV_CCM_HW *ossl_prov_aria_hw_ccm(size_t keylen);
|
H A D | cipher_aes_hw_t4.inc | 16 const unsigned char *key, size_t keylen) 24 bits = keylen * 8;
|
/freebsd/crypto/openssh/ |
H A D | cipher-chachapoly-libcrypto.c | 42 chachapoly_new(const u_char *key, u_int keylen) in chachapoly_new() argument 46 if (keylen != (32 + 32)) /* 2 x 256 bit keys */ in chachapoly_new()
|
/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ft.c | 449 int keylen; in wpa_ft_install_ptk() local 462 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_ft_install_ptk() 465 (u8 *) sm->ptk.tk, keylen, in wpa_ft_install_ptk() 760 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local 793 keylen = wpa_cipher_key_len(sm->group_cipher); in wpa_ft_process_gtk_subelem() 802 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem() 811 if (gtk_elem[2] != keylen) { in wpa_ft_process_gtk_subelem() 814 gtk_elem[2], (unsigned long) keylen); in wpa_ft_process_gtk_subelem() 818 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem() 827 gtk_elem + 3, rsc_len, gtk, keylen, in wpa_ft_process_gtk_subelem()
|
/freebsd/tools/tools/crypto/ |
H A D | cryptotest.c | 264 sop.keylen = (ealg->minkeylen + ealg->maxkeylen)/2; in runtest() 265 key = (char *) malloc(sop.keylen); in runtest() 268 for (i = 0; i < sop.keylen; i++) in runtest() 296 printf(" keylen %u\n", sop.keylen); in runtest() 304 alg? alg->name : "", sop.keylen, sop.mackeylen); in runtest()
|
/freebsd/sys/geom/eli/ |
H A D | g_eli_key.c | 181 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, in g_eli_mkey_encrypt() argument 200 error = g_eli_crypto_encrypt(algo, mkey, G_ELI_MKEYLEN, enckey, keylen); in g_eli_mkey_encrypt()
|
H A D | pkcs5v2.h | 31 void pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt,
|
/freebsd/sys/net/ |
H A D | toeplitz.h | 35 uint32_t toeplitz_hash(u_int keylen, const uint8_t *key,
|
/freebsd/libexec/ypxfr/ |
H A D | ypxfr_misc.c | 256 unsigned long keylen) in ypxfr_match() argument 273 ypkey.key.keydat_len = keylen; in ypxfr_match()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_new.pod | 35 size_t keylen); 37 const unsigned char *key, size_t keylen); 42 size_t keylen); 44 const unsigned char *key, size_t keylen); 46 int keylen); 99 data for this B<EVP_PKEY> which should be of length I<keylen>. The length
|
/freebsd/sys/crypto/aesni/ |
H A D | aesni.c | 780 int i, keylen; in aesni_cipher_mac() local 786 keylen = csp->csp_auth_klen; in aesni_cipher_mac() 795 for (i = 0; i < keylen; i++) in aesni_cipher_mac() 797 for (i = keylen; i < sizeof(hmac_key); i++) in aesni_cipher_mac() 824 for (i = 0; i < keylen; i++) in aesni_cipher_mac() 826 for (i = keylen; i < sizeof(hmac_key); i++) in aesni_cipher_mac()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | aes_platform.h | 310 # define S390X_AES_FC(keylen) (S390X_AES_128 + ((((keylen) << 3) - 128) >> 6)) argument 398 # define S390X_AES_FC(keylen) (S390X_AES_128 + ((((keylen) << 3) - 128) >> 6)) argument
|
/freebsd/sys/dev/wg/ |
H A D | wg_crypto.c | 95 const uint8_t *key, const size_t keylen) in blake2s_init_key() argument 99 blake2s_init_param(state, 0x01010000 | keylen << 8 | outlen); in blake2s_init_key() 101 memcpy(block, key, keylen); in blake2s_init_key()
|