/dports/net/pichi/pichi-1.4.0/test/ |
H A D | method.cpp | 16 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::RC4_MD5>); in BOOST_AUTO_TEST_CASE() 17 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::BF_CFB>); in BOOST_AUTO_TEST_CASE() 18 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::AES_128_CTR>); in BOOST_AUTO_TEST_CASE() 19 BOOST_CHECK_EQUAL(24_sz, KEY_SIZE<CryptoMethod::AES_192_CTR>); in BOOST_AUTO_TEST_CASE() 20 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::AES_256_CTR>); in BOOST_AUTO_TEST_CASE() 21 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::AES_128_CFB>); in BOOST_AUTO_TEST_CASE() 22 BOOST_CHECK_EQUAL(24_sz, KEY_SIZE<CryptoMethod::AES_192_CFB>); in BOOST_AUTO_TEST_CASE() 23 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::AES_256_CFB>); in BOOST_AUTO_TEST_CASE() 27 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::CHACHA20>); in BOOST_AUTO_TEST_CASE() 28 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::SALSA20>); in BOOST_AUTO_TEST_CASE() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-7.0.0/src/mode/ |
H A D | cbc.rs | 89 Cbc::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cbc_twofish() 92 Cbc::<Twofish>::with_decrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cbc_twofish() 110 Cbc::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cbc_serpent() 113 Cbc::<Serpent>::with_decrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cbc_serpent() 172 Camellia128::KEY_SIZE in round_trip_cbc_camellia128() 177 Camellia128::KEY_SIZE in round_trip_cbc_camellia128() 197 Camellia192::KEY_SIZE in round_trip_cbc_camellia192() 202 Camellia192::KEY_SIZE in round_trip_cbc_camellia192() 222 Camellia256::KEY_SIZE in round_trip_cbc_camellia256() 227 Camellia256::KEY_SIZE in round_trip_cbc_camellia256() [all …]
|
H A D | cfb.rs | 89 Cfb::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cfb_twofish() 92 Cfb::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cfb_twofish() 110 Cfb::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cfb_serpent() 113 Cfb::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cfb_serpent() 172 Camellia128::KEY_SIZE in round_trip_cfb_camellia128() 177 Camellia128::KEY_SIZE in round_trip_cfb_camellia128() 197 Camellia192::KEY_SIZE in round_trip_cfb_camellia192() 202 Camellia192::KEY_SIZE in round_trip_cfb_camellia192() 222 Camellia256::KEY_SIZE in round_trip_cfb_camellia256() 227 Camellia256::KEY_SIZE in round_trip_cfb_camellia256() [all …]
|
H A D | ctr.rs | 89 Ctr::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_ctr_twofish() 92 Ctr::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_ctr_twofish() 110 Ctr::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_ctr_serpent() 113 Ctr::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_ctr_serpent() 172 Camellia128::KEY_SIZE in round_trip_ctr_camellia128() 177 Camellia128::KEY_SIZE in round_trip_ctr_camellia128() 197 Camellia192::KEY_SIZE in round_trip_ctr_camellia192() 202 Camellia192::KEY_SIZE in round_trip_ctr_camellia192() 222 Camellia256::KEY_SIZE in round_trip_ctr_camellia256() 227 Camellia256::KEY_SIZE in round_trip_ctr_camellia256() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-7.0.0/src/aead/ |
H A D | eax.rs | 125 &vec![1; Twofish::KEY_SIZE], in round_trip_eax_twofish() 130 &vec![1; Twofish::KEY_SIZE], in round_trip_eax_twofish() 157 &vec![1; Twofish::KEY_SIZE], in modify_ad_eax_twofish() 162 &vec![1; Twofish::KEY_SIZE], in modify_ad_eax_twofish() 191 &vec![1; Twofish::KEY_SIZE], in modify_ciphertext_eax_twofish() 225 &vec![1; Aes128::KEY_SIZE], in round_trip_eax_aes128() 230 &vec![1; Aes128::KEY_SIZE], in round_trip_eax_aes128() 257 &vec![1; Aes128::KEY_SIZE], in modify_ad_eax_aes128() 262 &vec![1; Aes128::KEY_SIZE], in modify_ad_eax_aes128() 291 &vec![1; Aes128::KEY_SIZE], in modify_ciphertext_eax_aes128() [all …]
|
H A D | gcm.rs | 114 &vec![1; Twofish::KEY_SIZE], in round_trip_gcm_twofish() 119 &vec![1; Twofish::KEY_SIZE], in round_trip_gcm_twofish() 146 &vec![1; Twofish::KEY_SIZE], in modify_ad_gcm_twofish() 151 &vec![1; Twofish::KEY_SIZE], in modify_ad_gcm_twofish() 180 &vec![1; Twofish::KEY_SIZE], in modify_ciphertext_gcm_twofish() 214 &vec![1; Aes128::KEY_SIZE], in round_trip_gcm_aes128() 219 &vec![1; Aes128::KEY_SIZE], in round_trip_gcm_aes128() 246 &vec![1; Aes128::KEY_SIZE], in modify_ad_gcm_aes128() 251 &vec![1; Aes128::KEY_SIZE], in modify_ad_gcm_aes128() 280 &vec![1; Aes128::KEY_SIZE], in modify_ciphertext_gcm_aes128() [all …]
|
H A D | ccm.rs | 118 &vec![1; Twofish::KEY_SIZE], in round_trip_ccm_twofish() 126 &vec![1; Twofish::KEY_SIZE], in round_trip_ccm_twofish() 156 &vec![1; Twofish::KEY_SIZE], in modify_ad_ccm_twofish() 164 &vec![1; Twofish::KEY_SIZE], in modify_ad_ccm_twofish() 196 &vec![1; Twofish::KEY_SIZE], in modify_ciphertext_ccm_twofish() 236 &vec![1; Aes128::KEY_SIZE], in round_trip_ccm_aes128() 244 &vec![1; Aes128::KEY_SIZE], in round_trip_ccm_aes128() 274 &vec![1; Aes128::KEY_SIZE], in modify_ad_ccm_aes128() 282 &vec![1; Aes128::KEY_SIZE], in modify_ad_ccm_aes128() 314 &vec![1; Aes128::KEY_SIZE], in modify_ciphertext_ccm_aes128() [all …]
|
/dports/java/bouncycastle15/crypto-169/core/src/main/java/org/bouncycastle/crypto/params/ |
H A D | X448PublicKeyParameters.java | 14 public static final int KEY_SIZE = X448.POINT_SIZE; field in X448PublicKeyParameters 16 private final byte[] data = new byte[KEY_SIZE]; 27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X448PublicKeyParameters() 34 if (KEY_SIZE != Streams.readFully(input, data)) in X448PublicKeyParameters() 42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode() 52 if (buf.length != KEY_SIZE) in validate() 54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
|
H A D | Ed25519PublicKeyParameters.java | 14 public static final int KEY_SIZE = Ed25519.PUBLIC_KEY_SIZE; field in Ed25519PublicKeyParameters 16 private final byte[] data = new byte[KEY_SIZE]; 27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in Ed25519PublicKeyParameters() 34 if (KEY_SIZE != Streams.readFully(input, data)) in Ed25519PublicKeyParameters() 42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode() 52 if (buf.length != KEY_SIZE) in validate() 54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
|
H A D | X25519PublicKeyParameters.java | 14 public static final int KEY_SIZE = X25519.POINT_SIZE; field in X25519PublicKeyParameters 16 private final byte[] data = new byte[KEY_SIZE]; 27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X25519PublicKeyParameters() 34 if (KEY_SIZE != Streams.readFully(input, data)) in X25519PublicKeyParameters() 42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode() 52 if (buf.length != KEY_SIZE) in validate() 54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
|
H A D | Ed448PublicKeyParameters.java | 14 public static final int KEY_SIZE = Ed448.PUBLIC_KEY_SIZE; field in Ed448PublicKeyParameters 16 private final byte[] data = new byte[KEY_SIZE]; 27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in Ed448PublicKeyParameters() 34 if (KEY_SIZE != Streams.readFully(input, data)) in Ed448PublicKeyParameters() 42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode() 52 if (buf.length != KEY_SIZE) in validate() 54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
|
H A D | X25519PrivateKeyParameters.java | 15 public static final int KEY_SIZE = X25519.SCALAR_SIZE; field in X25519PrivateKeyParameters 18 private final byte[] data = new byte[KEY_SIZE]; 36 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X25519PrivateKeyParameters() 43 if (KEY_SIZE != Streams.readFully(input, data)) in X25519PrivateKeyParameters() 51 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode() 78 if (buf.length != KEY_SIZE) in validate() 80 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
|
H A D | X448PrivateKeyParameters.java | 15 public static final int KEY_SIZE = X448.SCALAR_SIZE; field in X448PrivateKeyParameters 18 private final byte[] data = new byte[KEY_SIZE]; 36 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X448PrivateKeyParameters() 43 if (KEY_SIZE != Streams.readFully(input, data)) in X448PrivateKeyParameters() 51 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode() 78 if (buf.length != KEY_SIZE) in validate() 80 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
|
H A D | Ed448PrivateKeyParameters.java | 15 public static final int KEY_SIZE = Ed448.SECRET_KEY_SIZE; field in Ed448PrivateKeyParameters 18 private final byte[] data = new byte[KEY_SIZE]; 38 System.arraycopy(buf, off, data, 0, KEY_SIZE); in Ed448PrivateKeyParameters() 45 if (KEY_SIZE != Streams.readFully(input, data)) in Ed448PrivateKeyParameters() 53 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode() 117 if (buf.length != KEY_SIZE) in validate() 119 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
|
/dports/security/p5-Crypt-XTEA/Crypt-XTEA-0.0108/lib/Crypt/ |
H A D | XTEA.pm | 20 my $KEY_SIZE = 16; 21 my $ELEMENTS_IN_KEY = $KEY_SIZE / 4; 26 sub keysize { $KEY_SIZE } 40 …croak( sprintf( 'key must be a %d-byte-long STRING or a reference of ARRAY', $KEY_SIZE ) ) if not … 45 … must be a %d-byte-long STRING or a reference of ARRAY', $KEY_SIZE ) ) if length $key != $KEY_SIZE; 102 croak( sprintf( 'key must be %s bytes long', $KEY_SIZE ) ) if length( $key_str ) != $KEY_SIZE;
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/md/bcache/ |
H A D | extents.c | 92 if (!KEY_SIZE(k)) in bch_ptr_status() 279 if (!KEY_SIZE(i->k)) { in bch_extent_sort_fixup() 334 BUG_ON(!KEY_SIZE(insert)); in bch_extent_insert_fixup() 343 if (KEY_SIZE(k)) in bch_extent_insert_fixup() 353 old_size = KEY_SIZE(k); in bch_extent_insert_fixup() 408 KEY_SIZE(insert)); in bch_extent_insert_fixup() 475 KEY_SIZE(insert)); in bch_extent_insert_fixup() 484 if (!KEY_SIZE(k)) in __bch_extent_invalid() 487 if (KEY_SIZE(k) > KEY_OFFSET(k)) in __bch_extent_invalid() 599 if (KEY_SIZE(l) + KEY_SIZE(r) > USHRT_MAX) { in bch_extent_merge() [all …]
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/md/bcache/ |
H A D | extents.c | 92 if (!KEY_SIZE(k)) in bch_ptr_status() 279 if (!KEY_SIZE(i->k)) { in bch_extent_sort_fixup() 334 BUG_ON(!KEY_SIZE(insert)); in bch_extent_insert_fixup() 343 if (KEY_SIZE(k)) in bch_extent_insert_fixup() 353 old_size = KEY_SIZE(k); in bch_extent_insert_fixup() 408 KEY_SIZE(insert)); in bch_extent_insert_fixup() 475 KEY_SIZE(insert)); in bch_extent_insert_fixup() 484 if (!KEY_SIZE(k)) in __bch_extent_invalid() 487 if (KEY_SIZE(k) > KEY_OFFSET(k)) in __bch_extent_invalid() 599 if (KEY_SIZE(l) + KEY_SIZE(r) > USHRT_MAX) { in bch_extent_merge() [all …]
|
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/md/bcache/ |
H A D | extents.c | 92 if (!KEY_SIZE(k)) in bch_ptr_status() 279 if (!KEY_SIZE(i->k)) { in bch_extent_sort_fixup() 334 BUG_ON(!KEY_SIZE(insert)); in bch_extent_insert_fixup() 343 if (KEY_SIZE(k)) in bch_extent_insert_fixup() 353 old_size = KEY_SIZE(k); in bch_extent_insert_fixup() 408 KEY_SIZE(insert)); in bch_extent_insert_fixup() 475 KEY_SIZE(insert)); in bch_extent_insert_fixup() 484 if (!KEY_SIZE(k)) in __bch_extent_invalid() 487 if (KEY_SIZE(k) > KEY_OFFSET(k)) in __bch_extent_invalid() 599 if (KEY_SIZE(l) + KEY_SIZE(r) > USHRT_MAX) { in bch_extent_merge() [all …]
|
/dports/java/cryptix-jce/src/cryptix.jce.test/ |
H A D | TestRSA_ECB_PKCS1.java | 43 private int KEY_SIZE; field in TestRSA_ECB_PKCS1 45 protected TestRSA_ECB_PKCS1 (String algo, int KEY_SIZE) in TestRSA_ECB_PKCS1() argument 49 this.KEY_SIZE = KEY_SIZE; in TestRSA_ECB_PKCS1() 56 this.KEY_SIZE = 1024; in TestRSA_ECB_PKCS1() 73 this.KEY_SIZE = 1024; in init() 77 kpg.initialize(KEY_SIZE); in init()
|
/dports/lang/gcc6-aux/gcc-6-20180516/libjava/classpath/gnu/javax/crypto/cipher/ |
H A D | TripleDES.java | 83 public static final int KEY_SIZE = 24; field in TripleDES 92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES() 204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey() 205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey() 217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey() 218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey() 223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey() 228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
|
/dports/lang/gcc48/gcc-4.8.5/libjava/classpath/gnu/javax/crypto/cipher/ |
H A D | TripleDES.java | 83 public static final int KEY_SIZE = 24; field in TripleDES 92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES() 204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey() 205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey() 217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey() 218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey() 223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey() 228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
|
/dports/devel/arm-none-eabi-gcc492/gcc-4.9.2/libjava/classpath/gnu/javax/crypto/cipher/ |
H A D | TripleDES.java | 83 public static final int KEY_SIZE = 24; field in TripleDES 92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES() 204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey() 205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey() 217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey() 218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey() 223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey() 228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
|
/dports/lang/gnat_util/gcc-6-20180516/libjava/classpath/gnu/javax/crypto/cipher/ |
H A D | TripleDES.java | 83 public static final int KEY_SIZE = 24; field in TripleDES 92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES() 204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey() 205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey() 217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey() 218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey() 223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey() 228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
|
/dports/devel/mingw32-gcc/gcc-4.8.1/libjava/classpath/gnu/javax/crypto/cipher/ |
H A D | TripleDES.java | 83 public static final int KEY_SIZE = 24; field in TripleDES 92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES() 204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey() 205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey() 217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey() 218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey() 223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey() 228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/plugin/debug_key_management/ |
H A D | debug_key_management_plugin.cc | 33 #define KEY_SIZE 16 macro 59 if (*buflen < KEY_SIZE) in get_key() 61 *buflen= KEY_SIZE; in get_key() 64 *buflen= KEY_SIZE; in get_key() 68 memset(dstbuf, 0, KEY_SIZE); in get_key()
|