/openbsd/gnu/usr.bin/perl/ |
H A D | feature.h | 286 keypv = SvPV_const(keysv, keylen); in S_magic_sethint_feature() 288 if (memBEGINs(keypv, keylen, "feature_")) { in S_magic_sethint_feature() 293 if (keylen == sizeof("feature___SUB__")-1 in S_magic_sethint_feature() 314 if (keylen == sizeof("feature_class")-1 in S_magic_sethint_feature() 322 if (keylen == sizeof("feature_defer")-1 in S_magic_sethint_feature() 338 if (keylen == sizeof("feature_fc")-1 in S_magic_sethint_feature() 346 if (keylen == sizeof("feature_indirect")-1 in S_magic_sethint_feature() 351 else if (keylen == sizeof("feature_isa")-1 in S_magic_sethint_feature() 398 if (keylen == sizeof("feature_say")-1 in S_magic_sethint_feature() 421 if (keylen == sizeof("feature_try")-1 in S_magic_sethint_feature() [all …]
|
/openbsd/usr.bin/ssh/ |
H A D | xmss_hash.c | 34 …ar *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned ch… in core_hash_SHA2() argument 36 unsigned char buf[inlen + n + keylen]; in core_hash_SHA2() 43 for (i=0; i < keylen; i++) { in core_hash_SHA2() 48 buf[keylen + n + i] = in[i]; in core_hash_SHA2() 52 SHA256(buf, inlen + keylen + n, out); in core_hash_SHA2() 57 SHA512(buf, inlen + keylen + n, out); in core_hash_SHA2() 67 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) in prf() argument 69 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen); in prf() 75 …, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned in… in h_msg() argument 77 if (keylen != 3*n){ in h_msg() [all …]
|
/openbsd/regress/lib/libcrypto/pbkdf2/ |
H A D | pbkdf2.c | 138 size_t keylen; in test_p5_pbkdf2() local 147 keylen = strlen(hex); in test_p5_pbkdf2() 148 if ((keylen % 2) != 0) { in test_p5_pbkdf2() 152 keylen /= 2; in test_p5_pbkdf2() 153 expected = malloc(keylen); in test_p5_pbkdf2() 154 out = malloc(keylen); in test_p5_pbkdf2() 159 if (convert(expected, (const unsigned char *)hex, keylen) != 0) { in test_p5_pbkdf2() 166 test->iter, digest, keylen, out); in test_p5_pbkdf2() 173 if (memcmp(expected, out, keylen) != 0) { in test_p5_pbkdf2() 177 hexdump(stderr, "expected: ", expected, keylen); in test_p5_pbkdf2() [all …]
|
/openbsd/lib/libcrypto/cms/ |
H A D | cms_enc.c | 146 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio() 155 if (ec->keylen != tkeylen) { in cms_EncryptedContent_init_bio() 157 if (!EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen)) { in cms_EncryptedContent_init_bio() 167 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio() 169 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio() 200 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio() 216 if ((ec->key = malloc(keylen)) == NULL) { in cms_EncryptedContent_init() 220 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init() 222 ec->keylen = keylen; in cms_EncryptedContent_init() 231 const unsigned char *key, size_t keylen) in CMS_EncryptedData_set1_key() argument [all …]
|
H A D | cms_pwri.c | 340 size_t keylen; in cms_RecipientInfo_pwri_crypt() local 401 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt() 404 key = malloc(keylen); in cms_RecipientInfo_pwri_crypt() 408 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt() 411 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt() 418 if (!kek_unwrap_key(key, &keylen, pwri->encryptedKey->data, in cms_RecipientInfo_pwri_crypt() 424 freezero(ec->key, ec->keylen); in cms_RecipientInfo_pwri_crypt() 426 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
|
H A D | cms_env.c | 501 freezero(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt() 503 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt() 571 switch (keylen) { in CMS_add0_recipient_key() 598 if (keylen != exp_keylen) { in CMS_add0_recipient_key() 631 kekri->keylen = keylen; in CMS_add0_recipient_key() 692 size_t keylen) in CMS_RecipientInfo_set0_key() argument 703 kekri->keylen = keylen; in CMS_RecipientInfo_set0_key() 733 wkey = malloc(ec->keylen + 8); in cms_RecipientInfo_kekri_encrypt() 809 freezero(ec->key, ec->keylen); in cms_RecipientInfo_kekri_decrypt() 811 ec->keylen = ukeylen; in cms_RecipientInfo_kekri_decrypt() [all …]
|
/openbsd/regress/lib/libutil/bcrypt_pbkdf/ |
H A D | bcrypt_pbkdf_test.c | 30 size_t keylen; member 111 printkey(const uint8_t *key, size_t keylen) in printkey() argument 115 for (k = 0; k < keylen; k++) { in printkey() 144 key, t->keylen, t->rounds); in main() 145 if (memcmp(key, t->key, t->keylen) != 0) { in main() 148 printkey(t->key, t->keylen); in main() 150 printkey(key, t->keylen); in main()
|
/openbsd/sys/crypto/ |
H A D | blake2s.h | 41 const void *key, const size_t keylen); 47 const size_t outlen, const size_t inlen, const size_t keylen) in blake2s() argument 53 (key != NULL || keylen == 0) && keylen <= BLAKE2S_KEY_SIZE); in blake2s() 55 if (keylen) in blake2s() 56 blake2s_init_key(&state, outlen, key, keylen); in blake2s() 65 const size_t outlen, const size_t inlen, const size_t keylen);
|
H A D | blake2s.c | 82 const void *key, const size_t keylen) in blake2s_init_key() argument 87 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key() 89 blake2s_init_param(state, 0x01010000 | keylen << 8 | outlen); in blake2s_init_key() 91 memcpy(block, key, keylen); in blake2s_init_key() 203 const size_t inlen, const size_t keylen) in blake2s_hmac() argument 210 if (keylen > BLAKE2S_BLOCK_SIZE) { in blake2s_hmac() 212 blake2s_update(&state, key, keylen); in blake2s_hmac() 215 memcpy(x_key, key, keylen); in blake2s_hmac()
|
/openbsd/lib/libutil/ |
H A D | bcrypt_pbkdf.c | 99 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 109 size_t origkeylen = keylen; in bcrypt_pbkdf() 114 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 115 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf() 117 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 118 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 127 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 154 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 161 keylen -= i; in bcrypt_pbkdf() 173 arc4random_buf(key, keylen); in bcrypt_pbkdf()
|
/openbsd/sbin/unwind/libunbound/sldns/ |
H A D | keyraw.c | 544 if(keylen != 64) { in sldns_gost2pkey_raw() 572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() 585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw() 624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() 638 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw() 670 if(keylen != 32 || keylen + pre_len > sizeof(buf)) in sldns_ed255192pkey_raw() 673 memmove(buf+pre_len, key, keylen); in sldns_ed255192pkey_raw() 691 if(keylen != 57 || keylen + pre_len > sizeof(buf)) in sldns_ed4482pkey_raw() [all …]
|
/openbsd/usr.sbin/unbound/sldns/ |
H A D | keyraw.c | 544 if(keylen != 64) { in sldns_gost2pkey_raw() 572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() 585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw() 624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() 638 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw() 670 if(keylen != 32 || keylen + pre_len > sizeof(buf)) in sldns_ed255192pkey_raw() 673 memmove(buf+pre_len, key, keylen); in sldns_ed255192pkey_raw() 691 if(keylen != 57 || keylen + pre_len > sizeof(buf)) in sldns_ed4482pkey_raw() [all …]
|
/openbsd/sys/lib/libsa/ |
H A D | bcrypt_pbkdf.c | 97 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 107 size_t origkeylen = keylen; in bcrypt_pbkdf() 112 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 113 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf() 115 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 116 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 125 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 152 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 159 keylen -= i; in bcrypt_pbkdf()
|
/openbsd/gnu/gcc/gcc/ |
H A D | prefix.c | 191 int keylen; in translate_name() local 199 for (keylen = 0; in translate_name() 200 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name() 201 keylen++) in translate_name() 204 key = (char *) alloca (keylen + 1); in translate_name() 205 strncpy (key, &name[1], keylen); in translate_name() 206 key[keylen] = 0; in translate_name() 226 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
|
/openbsd/gnu/usr.bin/gcc/gcc/ |
H A D | prefix.c | 190 int keylen; local 198 for (keylen = 0; 199 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); 200 keylen++) 203 key = (char *) alloca (keylen + 1); 204 strncpy (key, &name[1], keylen); 205 key[keylen] = 0; 225 name = concat (prefix, &name[keylen + 1], NULL);
|
/openbsd/lib/libc/yp/ |
H A D | ypmatch_cache.c | 46 int keylen, vallen; member 53 ypmatch_add(const char *map, const char *key, u_int keylen, char *val, in ypmatch_add() argument 60 if (keylen == 0 || vallen == 0) in ypmatch_add() 67 (newkey = malloc(keylen)) == NULL || in ypmatch_add() 96 (void)memcpy(newkey, key, keylen); in ypmatch_add() 101 ep->keylen = keylen; in ypmatch_add() 108 ypmatch_find(const char *map, const char *key, u_int keylen, char **val, in ypmatch_find() argument 120 if (ep->keylen != keylen) in ypmatch_find() 124 if (memcmp(ep->key, key, keylen)) in ypmatch_find()
|
/openbsd/regress/lib/libcrypto/aeswrap/ |
H A D | aes_wrap.c | 66 const unsigned char *key, int keylen) in AES_wrap_unwrap_test() argument 72 otmp = malloc(keylen + 8); in AES_wrap_unwrap_test() 73 ptmp = malloc(keylen); in AES_wrap_unwrap_test() 78 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); in AES_wrap_unwrap_test() 82 if (eout && memcmp(eout, otmp, keylen)) in AES_wrap_unwrap_test() 91 if (memcmp(key, ptmp, keylen)) in AES_wrap_unwrap_test()
|
/openbsd/sbin/isakmpd/ |
H A D | dnssec.c | 64 dns_get_key(int type, struct message *msg, int *keylen) in dns_get_key() argument 226 *keylen = key_rr.datalen; in dns_get_key() 237 dns_RSA_dns_to_x509(u_int8_t *key, int keylen, RSA **rsa_key) in dns_RSA_dns_to_x509() argument 243 if (!key || keylen <= 0) { in dns_RSA_dns_to_x509() 257 if (keylen < 3) { in dns_RSA_dns_to_x509() 265 if (e_len > (keylen - key_offset)) { in dns_RSA_dns_to_x509() 275 rsa->n = BN_bin2bn(key + key_offset, keylen - key_offset, NULL); in dns_RSA_dns_to_x509() 286 dns_RSA_x509_to_dns(RSA *rsa_key, u_int8_t *key, int *keylen) in dns_RSA_x509_to_dns() argument
|
/openbsd/sbin/unwind/libunbound/validator/ |
H A D | val_secalgo.c | 546 unsigned char* key, size_t keylen) in setup_key_digest() argument 1264 *pubkey = nss_buf2dsa(key, keylen); in nss_setup_key_digest() 1801 if (keylen < 21) { in _verify_nettle_dsa() 1810 if (keylen != expected_len ) { in _verify_nettle_dsa() 1851 if( keylen <= 1) { in _verify_nettle_rsa() 1860 if (keylen < 3) { in _verify_nettle_rsa() 1874 pubkey.size = keylen - mod_offset; in _verify_nettle_rsa() 1995 if(keylen != ED25519_KEY_SIZE) { in _verify_nettle_ed25519() 2071 sigblock_len, key, keylen); in verify_canonrrset() 2084 sigblock_len, key, keylen); in verify_canonrrset() [all …]
|
/openbsd/usr.sbin/unbound/validator/ |
H A D | val_secalgo.c | 546 unsigned char* key, size_t keylen) in setup_key_digest() argument 1264 *pubkey = nss_buf2dsa(key, keylen); in nss_setup_key_digest() 1801 if (keylen < 21) { in _verify_nettle_dsa() 1810 if (keylen != expected_len ) { in _verify_nettle_dsa() 1851 if( keylen <= 1) { in _verify_nettle_rsa() 1860 if (keylen < 3) { in _verify_nettle_rsa() 1874 pubkey.size = keylen - mod_offset; in _verify_nettle_rsa() 1995 if(keylen != ED25519_KEY_SIZE) { in _verify_nettle_ed25519() 2071 sigblock_len, key, keylen); in verify_canonrrset() 2084 sigblock_len, key, keylen); in verify_canonrrset() [all …]
|
/openbsd/sys/net80211/ |
H A D | ieee80211_pae_output.c | 260 u_int16_t info, keylen; in ieee80211_send_4way_msg1() local 283 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg1() 284 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg1() 340 int keylen; in ieee80211_send_4way_msg2() local 344 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg2() 368 u_int16_t info, keylen; in ieee80211_send_4way_msg3() local 404 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg3() 460 int keylen; in ieee80211_send_4way_msg4() local 463 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg4() 527 BE_WRITE_2(key->keylen, k->k_len); in ieee80211_send_group_msg1() [all …]
|
/openbsd/sbin/mount_vnd/ |
H A D | mount_vnd.c | 65 size_t keylen = 0; in main() local 108 if (key == NULL || (keylen = strlen(key)) == 0) in main() 112 keylen = BLF_MAXUTILIZED; in main() 114 rv = config(argv[1], argv[0], dp, key, keylen); in main() 187 config(char *dev, char *file, struct disklabel *dp, char *key, size_t keylen) in config() argument 203 vndio.vnd_keylen = keylen; in config() 216 explicit_bzero(key, keylen); in config()
|
/openbsd/regress/sys/crypto/aes/ |
H A D | aestest.c | 141 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument 148 if (docrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests() 157 if (docrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests() 176 u_int keylen, textlen, tmp; in run_file() local 182 keylen = textlen = tmp = 0; in run_file() 242 parsehex(cp, &key, &keylen); in run_file() 243 if (keylen * 8 != (u_int)keysize) in run_file() 255 fail += do_tests(filename, test, key, keylen, in run_file()
|
/openbsd/usr.bin/dig/lib/dns/ |
H A D | hmac_link.c | 143 int keylen; in hmacsha1_fromdns() local 164 keylen = r.length; in hmacsha1_fromdns() 167 key->key_size = keylen * 8; in hmacsha1_fromdns() 287 int keylen; in hmacsha224_fromdns() local 308 keylen = r.length; in hmacsha224_fromdns() 431 int keylen; in hmacsha256_fromdns() local 452 keylen = r.length; in hmacsha256_fromdns() 575 int keylen; in hmacsha384_fromdns() local 596 keylen = r.length; in hmacsha384_fromdns() 719 int keylen; in hmacsha512_fromdns() local [all …]
|
/openbsd/lib/libcrypto/asn1/ |
H A D | p5_pbev2.c | 191 int alg_nid, keylen; in PKCS5_pbe2_set() local 233 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set() 235 keylen = -1; in PKCS5_pbe2_set() 241 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set() 280 int keylen) in PKCS5_pbkdf2_set() argument 314 if (keylen > 0) { in PKCS5_pbkdf2_set() 317 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
|