Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 120) sorted by relevance

12345

/openbsd/gnu/usr.bin/perl/
H A Dfeature.h286 keypv = SvPV_const(keysv, keylen); in S_magic_sethint_feature()
288 if (memBEGINs(keypv, keylen, "feature_")) { in S_magic_sethint_feature()
293 if (keylen == sizeof("feature___SUB__")-1 in S_magic_sethint_feature()
314 if (keylen == sizeof("feature_class")-1 in S_magic_sethint_feature()
322 if (keylen == sizeof("feature_defer")-1 in S_magic_sethint_feature()
338 if (keylen == sizeof("feature_fc")-1 in S_magic_sethint_feature()
346 if (keylen == sizeof("feature_indirect")-1 in S_magic_sethint_feature()
351 else if (keylen == sizeof("feature_isa")-1 in S_magic_sethint_feature()
398 if (keylen == sizeof("feature_say")-1 in S_magic_sethint_feature()
421 if (keylen == sizeof("feature_try")-1 in S_magic_sethint_feature()
[all …]
/openbsd/usr.bin/ssh/
H A Dxmss_hash.c34 …ar *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned ch… in core_hash_SHA2() argument
36 unsigned char buf[inlen + n + keylen]; in core_hash_SHA2()
43 for (i=0; i < keylen; i++) { in core_hash_SHA2()
48 buf[keylen + n + i] = in[i]; in core_hash_SHA2()
52 SHA256(buf, inlen + keylen + n, out); in core_hash_SHA2()
57 SHA512(buf, inlen + keylen + n, out); in core_hash_SHA2()
67 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) in prf() argument
69 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen); in prf()
75 …, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned in… in h_msg() argument
77 if (keylen != 3*n){ in h_msg()
[all …]
/openbsd/regress/lib/libcrypto/pbkdf2/
H A Dpbkdf2.c138 size_t keylen; in test_p5_pbkdf2() local
147 keylen = strlen(hex); in test_p5_pbkdf2()
148 if ((keylen % 2) != 0) { in test_p5_pbkdf2()
152 keylen /= 2; in test_p5_pbkdf2()
153 expected = malloc(keylen); in test_p5_pbkdf2()
154 out = malloc(keylen); in test_p5_pbkdf2()
159 if (convert(expected, (const unsigned char *)hex, keylen) != 0) { in test_p5_pbkdf2()
166 test->iter, digest, keylen, out); in test_p5_pbkdf2()
173 if (memcmp(expected, out, keylen) != 0) { in test_p5_pbkdf2()
177 hexdump(stderr, "expected: ", expected, keylen); in test_p5_pbkdf2()
[all …]
/openbsd/lib/libcrypto/cms/
H A Dcms_enc.c146 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio()
155 if (ec->keylen != tkeylen) { in cms_EncryptedContent_init_bio()
157 if (!EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen)) { in cms_EncryptedContent_init_bio()
167 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio()
169 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio()
200 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio()
216 if ((ec->key = malloc(keylen)) == NULL) { in cms_EncryptedContent_init()
220 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init()
222 ec->keylen = keylen; in cms_EncryptedContent_init()
231 const unsigned char *key, size_t keylen) in CMS_EncryptedData_set1_key() argument
[all …]
H A Dcms_pwri.c340 size_t keylen; in cms_RecipientInfo_pwri_crypt() local
401 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt()
404 key = malloc(keylen); in cms_RecipientInfo_pwri_crypt()
408 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt()
411 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt()
418 if (!kek_unwrap_key(key, &keylen, pwri->encryptedKey->data, in cms_RecipientInfo_pwri_crypt()
424 freezero(ec->key, ec->keylen); in cms_RecipientInfo_pwri_crypt()
426 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
H A Dcms_env.c501 freezero(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt()
503 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt()
571 switch (keylen) { in CMS_add0_recipient_key()
598 if (keylen != exp_keylen) { in CMS_add0_recipient_key()
631 kekri->keylen = keylen; in CMS_add0_recipient_key()
692 size_t keylen) in CMS_RecipientInfo_set0_key() argument
703 kekri->keylen = keylen; in CMS_RecipientInfo_set0_key()
733 wkey = malloc(ec->keylen + 8); in cms_RecipientInfo_kekri_encrypt()
809 freezero(ec->key, ec->keylen); in cms_RecipientInfo_kekri_decrypt()
811 ec->keylen = ukeylen; in cms_RecipientInfo_kekri_decrypt()
[all …]
/openbsd/regress/lib/libutil/bcrypt_pbkdf/
H A Dbcrypt_pbkdf_test.c30 size_t keylen; member
111 printkey(const uint8_t *key, size_t keylen) in printkey() argument
115 for (k = 0; k < keylen; k++) { in printkey()
144 key, t->keylen, t->rounds); in main()
145 if (memcmp(key, t->key, t->keylen) != 0) { in main()
148 printkey(t->key, t->keylen); in main()
150 printkey(key, t->keylen); in main()
/openbsd/sys/crypto/
H A Dblake2s.h41 const void *key, const size_t keylen);
47 const size_t outlen, const size_t inlen, const size_t keylen) in blake2s() argument
53 (key != NULL || keylen == 0) && keylen <= BLAKE2S_KEY_SIZE); in blake2s()
55 if (keylen) in blake2s()
56 blake2s_init_key(&state, outlen, key, keylen); in blake2s()
65 const size_t outlen, const size_t inlen, const size_t keylen);
H A Dblake2s.c82 const void *key, const size_t keylen) in blake2s_init_key() argument
87 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key()
89 blake2s_init_param(state, 0x01010000 | keylen << 8 | outlen); in blake2s_init_key()
91 memcpy(block, key, keylen); in blake2s_init_key()
203 const size_t inlen, const size_t keylen) in blake2s_hmac() argument
210 if (keylen > BLAKE2S_BLOCK_SIZE) { in blake2s_hmac()
212 blake2s_update(&state, key, keylen); in blake2s_hmac()
215 memcpy(x_key, key, keylen); in blake2s_hmac()
/openbsd/lib/libutil/
H A Dbcrypt_pbkdf.c99 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument
109 size_t origkeylen = keylen; in bcrypt_pbkdf()
114 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
115 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf()
117 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf()
118 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf()
127 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf()
154 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf()
161 keylen -= i; in bcrypt_pbkdf()
173 arc4random_buf(key, keylen); in bcrypt_pbkdf()
/openbsd/sbin/unwind/libunbound/sldns/
H A Dkeyraw.c544 if(keylen != 64) { in sldns_gost2pkey_raw()
572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw()
624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
638 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw()
670 if(keylen != 32 || keylen + pre_len > sizeof(buf)) in sldns_ed255192pkey_raw()
673 memmove(buf+pre_len, key, keylen); in sldns_ed255192pkey_raw()
691 if(keylen != 57 || keylen + pre_len > sizeof(buf)) in sldns_ed4482pkey_raw()
[all …]
/openbsd/usr.sbin/unbound/sldns/
H A Dkeyraw.c544 if(keylen != 64) { in sldns_gost2pkey_raw()
572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw()
624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
638 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw()
670 if(keylen != 32 || keylen + pre_len > sizeof(buf)) in sldns_ed255192pkey_raw()
673 memmove(buf+pre_len, key, keylen); in sldns_ed255192pkey_raw()
691 if(keylen != 57 || keylen + pre_len > sizeof(buf)) in sldns_ed4482pkey_raw()
[all …]
/openbsd/sys/lib/libsa/
H A Dbcrypt_pbkdf.c97 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument
107 size_t origkeylen = keylen; in bcrypt_pbkdf()
112 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
113 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf()
115 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf()
116 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf()
125 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf()
152 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf()
159 keylen -= i; in bcrypt_pbkdf()
/openbsd/gnu/gcc/gcc/
H A Dprefix.c191 int keylen; in translate_name() local
199 for (keylen = 0; in translate_name()
200 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name()
201 keylen++) in translate_name()
204 key = (char *) alloca (keylen + 1); in translate_name()
205 strncpy (key, &name[1], keylen); in translate_name()
206 key[keylen] = 0; in translate_name()
226 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
/openbsd/gnu/usr.bin/gcc/gcc/
H A Dprefix.c190 int keylen; local
198 for (keylen = 0;
199 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1]));
200 keylen++)
203 key = (char *) alloca (keylen + 1);
204 strncpy (key, &name[1], keylen);
205 key[keylen] = 0;
225 name = concat (prefix, &name[keylen + 1], NULL);
/openbsd/lib/libc/yp/
H A Dypmatch_cache.c46 int keylen, vallen; member
53 ypmatch_add(const char *map, const char *key, u_int keylen, char *val, in ypmatch_add() argument
60 if (keylen == 0 || vallen == 0) in ypmatch_add()
67 (newkey = malloc(keylen)) == NULL || in ypmatch_add()
96 (void)memcpy(newkey, key, keylen); in ypmatch_add()
101 ep->keylen = keylen; in ypmatch_add()
108 ypmatch_find(const char *map, const char *key, u_int keylen, char **val, in ypmatch_find() argument
120 if (ep->keylen != keylen) in ypmatch_find()
124 if (memcmp(ep->key, key, keylen)) in ypmatch_find()
/openbsd/regress/lib/libcrypto/aeswrap/
H A Daes_wrap.c66 const unsigned char *key, int keylen) in AES_wrap_unwrap_test() argument
72 otmp = malloc(keylen + 8); in AES_wrap_unwrap_test()
73 ptmp = malloc(keylen); in AES_wrap_unwrap_test()
78 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); in AES_wrap_unwrap_test()
82 if (eout && memcmp(eout, otmp, keylen)) in AES_wrap_unwrap_test()
91 if (memcmp(key, ptmp, keylen)) in AES_wrap_unwrap_test()
/openbsd/sbin/isakmpd/
H A Ddnssec.c64 dns_get_key(int type, struct message *msg, int *keylen) in dns_get_key() argument
226 *keylen = key_rr.datalen; in dns_get_key()
237 dns_RSA_dns_to_x509(u_int8_t *key, int keylen, RSA **rsa_key) in dns_RSA_dns_to_x509() argument
243 if (!key || keylen <= 0) { in dns_RSA_dns_to_x509()
257 if (keylen < 3) { in dns_RSA_dns_to_x509()
265 if (e_len > (keylen - key_offset)) { in dns_RSA_dns_to_x509()
275 rsa->n = BN_bin2bn(key + key_offset, keylen - key_offset, NULL); in dns_RSA_dns_to_x509()
286 dns_RSA_x509_to_dns(RSA *rsa_key, u_int8_t *key, int *keylen) in dns_RSA_x509_to_dns() argument
/openbsd/sbin/unwind/libunbound/validator/
H A Dval_secalgo.c546 unsigned char* key, size_t keylen) in setup_key_digest() argument
1264 *pubkey = nss_buf2dsa(key, keylen); in nss_setup_key_digest()
1801 if (keylen < 21) { in _verify_nettle_dsa()
1810 if (keylen != expected_len ) { in _verify_nettle_dsa()
1851 if( keylen <= 1) { in _verify_nettle_rsa()
1860 if (keylen < 3) { in _verify_nettle_rsa()
1874 pubkey.size = keylen - mod_offset; in _verify_nettle_rsa()
1995 if(keylen != ED25519_KEY_SIZE) { in _verify_nettle_ed25519()
2071 sigblock_len, key, keylen); in verify_canonrrset()
2084 sigblock_len, key, keylen); in verify_canonrrset()
[all …]
/openbsd/usr.sbin/unbound/validator/
H A Dval_secalgo.c546 unsigned char* key, size_t keylen) in setup_key_digest() argument
1264 *pubkey = nss_buf2dsa(key, keylen); in nss_setup_key_digest()
1801 if (keylen < 21) { in _verify_nettle_dsa()
1810 if (keylen != expected_len ) { in _verify_nettle_dsa()
1851 if( keylen <= 1) { in _verify_nettle_rsa()
1860 if (keylen < 3) { in _verify_nettle_rsa()
1874 pubkey.size = keylen - mod_offset; in _verify_nettle_rsa()
1995 if(keylen != ED25519_KEY_SIZE) { in _verify_nettle_ed25519()
2071 sigblock_len, key, keylen); in verify_canonrrset()
2084 sigblock_len, key, keylen); in verify_canonrrset()
[all …]
/openbsd/sys/net80211/
H A Dieee80211_pae_output.c260 u_int16_t info, keylen; in ieee80211_send_4way_msg1() local
283 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg1()
284 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg1()
340 int keylen; in ieee80211_send_4way_msg2() local
344 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg2()
368 u_int16_t info, keylen; in ieee80211_send_4way_msg3() local
404 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg3()
460 int keylen; in ieee80211_send_4way_msg4() local
463 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg4()
527 BE_WRITE_2(key->keylen, k->k_len); in ieee80211_send_group_msg1()
[all …]
/openbsd/sbin/mount_vnd/
H A Dmount_vnd.c65 size_t keylen = 0; in main() local
108 if (key == NULL || (keylen = strlen(key)) == 0) in main()
112 keylen = BLF_MAXUTILIZED; in main()
114 rv = config(argv[1], argv[0], dp, key, keylen); in main()
187 config(char *dev, char *file, struct disklabel *dp, char *key, size_t keylen) in config() argument
203 vndio.vnd_keylen = keylen; in config()
216 explicit_bzero(key, keylen); in config()
/openbsd/regress/sys/crypto/aes/
H A Daestest.c141 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument
148 if (docrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests()
157 if (docrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests()
176 u_int keylen, textlen, tmp; in run_file() local
182 keylen = textlen = tmp = 0; in run_file()
242 parsehex(cp, &key, &keylen); in run_file()
243 if (keylen * 8 != (u_int)keysize) in run_file()
255 fail += do_tests(filename, test, key, keylen, in run_file()
/openbsd/usr.bin/dig/lib/dns/
H A Dhmac_link.c143 int keylen; in hmacsha1_fromdns() local
164 keylen = r.length; in hmacsha1_fromdns()
167 key->key_size = keylen * 8; in hmacsha1_fromdns()
287 int keylen; in hmacsha224_fromdns() local
308 keylen = r.length; in hmacsha224_fromdns()
431 int keylen; in hmacsha256_fromdns() local
452 keylen = r.length; in hmacsha256_fromdns()
575 int keylen; in hmacsha384_fromdns() local
596 keylen = r.length; in hmacsha384_fromdns()
719 int keylen; in hmacsha512_fromdns() local
[all …]
/openbsd/lib/libcrypto/asn1/
H A Dp5_pbev2.c191 int alg_nid, keylen; in PKCS5_pbe2_set() local
233 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set()
235 keylen = -1; in PKCS5_pbe2_set()
241 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set()
280 int keylen) in PKCS5_pbkdf2_set() argument
314 if (keylen > 0) { in PKCS5_pbkdf2_set()
317 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set()

12345