Home
last modified time | relevance | path

Searched refs:KEY_SIZE (Results 1 – 25 of 783) sorted by relevance

12345678910>>...32

/dports/net/pichi/pichi-1.4.0/test/
H A Dmethod.cpp16 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::RC4_MD5>); in BOOST_AUTO_TEST_CASE()
17 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::BF_CFB>); in BOOST_AUTO_TEST_CASE()
18 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::AES_128_CTR>); in BOOST_AUTO_TEST_CASE()
19 BOOST_CHECK_EQUAL(24_sz, KEY_SIZE<CryptoMethod::AES_192_CTR>); in BOOST_AUTO_TEST_CASE()
20 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::AES_256_CTR>); in BOOST_AUTO_TEST_CASE()
21 BOOST_CHECK_EQUAL(16_sz, KEY_SIZE<CryptoMethod::AES_128_CFB>); in BOOST_AUTO_TEST_CASE()
22 BOOST_CHECK_EQUAL(24_sz, KEY_SIZE<CryptoMethod::AES_192_CFB>); in BOOST_AUTO_TEST_CASE()
23 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::AES_256_CFB>); in BOOST_AUTO_TEST_CASE()
27 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::CHACHA20>); in BOOST_AUTO_TEST_CASE()
28 BOOST_CHECK_EQUAL(32_sz, KEY_SIZE<CryptoMethod::SALSA20>); in BOOST_AUTO_TEST_CASE()
[all …]
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-7.0.0/src/mode/
H A Dcbc.rs89 Cbc::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cbc_twofish()
92 Cbc::<Twofish>::with_decrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cbc_twofish()
110 Cbc::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cbc_serpent()
113 Cbc::<Serpent>::with_decrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cbc_serpent()
172 Camellia128::KEY_SIZE in round_trip_cbc_camellia128()
177 Camellia128::KEY_SIZE in round_trip_cbc_camellia128()
197 Camellia192::KEY_SIZE in round_trip_cbc_camellia192()
202 Camellia192::KEY_SIZE in round_trip_cbc_camellia192()
222 Camellia256::KEY_SIZE in round_trip_cbc_camellia256()
227 Camellia256::KEY_SIZE in round_trip_cbc_camellia256()
[all …]
H A Dcfb.rs89 Cfb::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cfb_twofish()
92 Cfb::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_cfb_twofish()
110 Cfb::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cfb_serpent()
113 Cfb::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_cfb_serpent()
172 Camellia128::KEY_SIZE in round_trip_cfb_camellia128()
177 Camellia128::KEY_SIZE in round_trip_cfb_camellia128()
197 Camellia192::KEY_SIZE in round_trip_cfb_camellia192()
202 Camellia192::KEY_SIZE in round_trip_cfb_camellia192()
222 Camellia256::KEY_SIZE in round_trip_cfb_camellia256()
227 Camellia256::KEY_SIZE in round_trip_cfb_camellia256()
[all …]
H A Dctr.rs89 Ctr::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_ctr_twofish()
92 Ctr::<Twofish>::with_encrypt_key(&vec![0; Twofish::KEY_SIZE]) in round_trip_ctr_twofish()
110 Ctr::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_ctr_serpent()
113 Ctr::<Serpent>::with_encrypt_key(&vec![0; Serpent::KEY_SIZE]) in round_trip_ctr_serpent()
172 Camellia128::KEY_SIZE in round_trip_ctr_camellia128()
177 Camellia128::KEY_SIZE in round_trip_ctr_camellia128()
197 Camellia192::KEY_SIZE in round_trip_ctr_camellia192()
202 Camellia192::KEY_SIZE in round_trip_ctr_camellia192()
222 Camellia256::KEY_SIZE in round_trip_ctr_camellia256()
227 Camellia256::KEY_SIZE in round_trip_ctr_camellia256()
[all …]
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-7.0.0/src/aead/
H A Deax.rs125 &vec![1; Twofish::KEY_SIZE], in round_trip_eax_twofish()
130 &vec![1; Twofish::KEY_SIZE], in round_trip_eax_twofish()
157 &vec![1; Twofish::KEY_SIZE], in modify_ad_eax_twofish()
162 &vec![1; Twofish::KEY_SIZE], in modify_ad_eax_twofish()
191 &vec![1; Twofish::KEY_SIZE], in modify_ciphertext_eax_twofish()
225 &vec![1; Aes128::KEY_SIZE], in round_trip_eax_aes128()
230 &vec![1; Aes128::KEY_SIZE], in round_trip_eax_aes128()
257 &vec![1; Aes128::KEY_SIZE], in modify_ad_eax_aes128()
262 &vec![1; Aes128::KEY_SIZE], in modify_ad_eax_aes128()
291 &vec![1; Aes128::KEY_SIZE], in modify_ciphertext_eax_aes128()
[all …]
H A Dgcm.rs114 &vec![1; Twofish::KEY_SIZE], in round_trip_gcm_twofish()
119 &vec![1; Twofish::KEY_SIZE], in round_trip_gcm_twofish()
146 &vec![1; Twofish::KEY_SIZE], in modify_ad_gcm_twofish()
151 &vec![1; Twofish::KEY_SIZE], in modify_ad_gcm_twofish()
180 &vec![1; Twofish::KEY_SIZE], in modify_ciphertext_gcm_twofish()
214 &vec![1; Aes128::KEY_SIZE], in round_trip_gcm_aes128()
219 &vec![1; Aes128::KEY_SIZE], in round_trip_gcm_aes128()
246 &vec![1; Aes128::KEY_SIZE], in modify_ad_gcm_aes128()
251 &vec![1; Aes128::KEY_SIZE], in modify_ad_gcm_aes128()
280 &vec![1; Aes128::KEY_SIZE], in modify_ciphertext_gcm_aes128()
[all …]
H A Dccm.rs118 &vec![1; Twofish::KEY_SIZE], in round_trip_ccm_twofish()
126 &vec![1; Twofish::KEY_SIZE], in round_trip_ccm_twofish()
156 &vec![1; Twofish::KEY_SIZE], in modify_ad_ccm_twofish()
164 &vec![1; Twofish::KEY_SIZE], in modify_ad_ccm_twofish()
196 &vec![1; Twofish::KEY_SIZE], in modify_ciphertext_ccm_twofish()
236 &vec![1; Aes128::KEY_SIZE], in round_trip_ccm_aes128()
244 &vec![1; Aes128::KEY_SIZE], in round_trip_ccm_aes128()
274 &vec![1; Aes128::KEY_SIZE], in modify_ad_ccm_aes128()
282 &vec![1; Aes128::KEY_SIZE], in modify_ad_ccm_aes128()
314 &vec![1; Aes128::KEY_SIZE], in modify_ciphertext_ccm_aes128()
[all …]
/dports/java/bouncycastle15/crypto-169/core/src/main/java/org/bouncycastle/crypto/params/
H A DX448PublicKeyParameters.java14 public static final int KEY_SIZE = X448.POINT_SIZE; field in X448PublicKeyParameters
16 private final byte[] data = new byte[KEY_SIZE];
27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X448PublicKeyParameters()
34 if (KEY_SIZE != Streams.readFully(input, data)) in X448PublicKeyParameters()
42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode()
52 if (buf.length != KEY_SIZE) in validate()
54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
H A DEd25519PublicKeyParameters.java14 public static final int KEY_SIZE = Ed25519.PUBLIC_KEY_SIZE; field in Ed25519PublicKeyParameters
16 private final byte[] data = new byte[KEY_SIZE];
27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in Ed25519PublicKeyParameters()
34 if (KEY_SIZE != Streams.readFully(input, data)) in Ed25519PublicKeyParameters()
42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode()
52 if (buf.length != KEY_SIZE) in validate()
54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
H A DX25519PublicKeyParameters.java14 public static final int KEY_SIZE = X25519.POINT_SIZE; field in X25519PublicKeyParameters
16 private final byte[] data = new byte[KEY_SIZE];
27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X25519PublicKeyParameters()
34 if (KEY_SIZE != Streams.readFully(input, data)) in X25519PublicKeyParameters()
42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode()
52 if (buf.length != KEY_SIZE) in validate()
54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
H A DEd448PublicKeyParameters.java14 public static final int KEY_SIZE = Ed448.PUBLIC_KEY_SIZE; field in Ed448PublicKeyParameters
16 private final byte[] data = new byte[KEY_SIZE];
27 System.arraycopy(buf, off, data, 0, KEY_SIZE); in Ed448PublicKeyParameters()
34 if (KEY_SIZE != Streams.readFully(input, data)) in Ed448PublicKeyParameters()
42 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode()
52 if (buf.length != KEY_SIZE) in validate()
54 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
H A DX25519PrivateKeyParameters.java15 public static final int KEY_SIZE = X25519.SCALAR_SIZE; field in X25519PrivateKeyParameters
18 private final byte[] data = new byte[KEY_SIZE];
36 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X25519PrivateKeyParameters()
43 if (KEY_SIZE != Streams.readFully(input, data)) in X25519PrivateKeyParameters()
51 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode()
78 if (buf.length != KEY_SIZE) in validate()
80 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
H A DX448PrivateKeyParameters.java15 public static final int KEY_SIZE = X448.SCALAR_SIZE; field in X448PrivateKeyParameters
18 private final byte[] data = new byte[KEY_SIZE];
36 System.arraycopy(buf, off, data, 0, KEY_SIZE); in X448PrivateKeyParameters()
43 if (KEY_SIZE != Streams.readFully(input, data)) in X448PrivateKeyParameters()
51 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode()
78 if (buf.length != KEY_SIZE) in validate()
80 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
H A DEd448PrivateKeyParameters.java15 public static final int KEY_SIZE = Ed448.SECRET_KEY_SIZE; field in Ed448PrivateKeyParameters
18 private final byte[] data = new byte[KEY_SIZE];
38 System.arraycopy(buf, off, data, 0, KEY_SIZE); in Ed448PrivateKeyParameters()
45 if (KEY_SIZE != Streams.readFully(input, data)) in Ed448PrivateKeyParameters()
53 System.arraycopy(data, 0, buf, off, KEY_SIZE); in encode()
117 if (buf.length != KEY_SIZE) in validate()
119 throw new IllegalArgumentException("'buf' must have length " + KEY_SIZE); in validate()
/dports/security/p5-Crypt-XTEA/Crypt-XTEA-0.0108/lib/Crypt/
H A DXTEA.pm20 my $KEY_SIZE = 16;
21 my $ELEMENTS_IN_KEY = $KEY_SIZE / 4;
26 sub keysize { $KEY_SIZE }
40 …croak( sprintf( 'key must be a %d-byte-long STRING or a reference of ARRAY', $KEY_SIZE ) ) if not …
45 … must be a %d-byte-long STRING or a reference of ARRAY', $KEY_SIZE ) ) if length $key != $KEY_SIZE;
102 croak( sprintf( 'key must be %s bytes long', $KEY_SIZE ) ) if length( $key_str ) != $KEY_SIZE;
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/md/bcache/
H A Dextents.c92 if (!KEY_SIZE(k)) in bch_ptr_status()
279 if (!KEY_SIZE(i->k)) { in bch_extent_sort_fixup()
334 BUG_ON(!KEY_SIZE(insert)); in bch_extent_insert_fixup()
343 if (KEY_SIZE(k)) in bch_extent_insert_fixup()
353 old_size = KEY_SIZE(k); in bch_extent_insert_fixup()
408 KEY_SIZE(insert)); in bch_extent_insert_fixup()
475 KEY_SIZE(insert)); in bch_extent_insert_fixup()
484 if (!KEY_SIZE(k)) in __bch_extent_invalid()
487 if (KEY_SIZE(k) > KEY_OFFSET(k)) in __bch_extent_invalid()
599 if (KEY_SIZE(l) + KEY_SIZE(r) > USHRT_MAX) { in bch_extent_merge()
[all …]
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/md/bcache/
H A Dextents.c92 if (!KEY_SIZE(k)) in bch_ptr_status()
279 if (!KEY_SIZE(i->k)) { in bch_extent_sort_fixup()
334 BUG_ON(!KEY_SIZE(insert)); in bch_extent_insert_fixup()
343 if (KEY_SIZE(k)) in bch_extent_insert_fixup()
353 old_size = KEY_SIZE(k); in bch_extent_insert_fixup()
408 KEY_SIZE(insert)); in bch_extent_insert_fixup()
475 KEY_SIZE(insert)); in bch_extent_insert_fixup()
484 if (!KEY_SIZE(k)) in __bch_extent_invalid()
487 if (KEY_SIZE(k) > KEY_OFFSET(k)) in __bch_extent_invalid()
599 if (KEY_SIZE(l) + KEY_SIZE(r) > USHRT_MAX) { in bch_extent_merge()
[all …]
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/md/bcache/
H A Dextents.c92 if (!KEY_SIZE(k)) in bch_ptr_status()
279 if (!KEY_SIZE(i->k)) { in bch_extent_sort_fixup()
334 BUG_ON(!KEY_SIZE(insert)); in bch_extent_insert_fixup()
343 if (KEY_SIZE(k)) in bch_extent_insert_fixup()
353 old_size = KEY_SIZE(k); in bch_extent_insert_fixup()
408 KEY_SIZE(insert)); in bch_extent_insert_fixup()
475 KEY_SIZE(insert)); in bch_extent_insert_fixup()
484 if (!KEY_SIZE(k)) in __bch_extent_invalid()
487 if (KEY_SIZE(k) > KEY_OFFSET(k)) in __bch_extent_invalid()
599 if (KEY_SIZE(l) + KEY_SIZE(r) > USHRT_MAX) { in bch_extent_merge()
[all …]
/dports/java/cryptix-jce/src/cryptix.jce.test/
H A DTestRSA_ECB_PKCS1.java43 private int KEY_SIZE; field in TestRSA_ECB_PKCS1
45 protected TestRSA_ECB_PKCS1 (String algo, int KEY_SIZE) in TestRSA_ECB_PKCS1() argument
49 this.KEY_SIZE = KEY_SIZE; in TestRSA_ECB_PKCS1()
56 this.KEY_SIZE = 1024; in TestRSA_ECB_PKCS1()
73 this.KEY_SIZE = 1024; in init()
77 kpg.initialize(KEY_SIZE); in init()
/dports/lang/gcc6-aux/gcc-6-20180516/libjava/classpath/gnu/javax/crypto/cipher/
H A DTripleDES.java83 public static final int KEY_SIZE = 24; field in TripleDES
92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES()
204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey()
205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey()
217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey()
218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey()
223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey()
228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
/dports/lang/gcc48/gcc-4.8.5/libjava/classpath/gnu/javax/crypto/cipher/
H A DTripleDES.java83 public static final int KEY_SIZE = 24; field in TripleDES
92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES()
204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey()
205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey()
217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey()
218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey()
223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey()
228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
/dports/devel/arm-none-eabi-gcc492/gcc-4.9.2/libjava/classpath/gnu/javax/crypto/cipher/
H A DTripleDES.java83 public static final int KEY_SIZE = 24; field in TripleDES
92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES()
204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey()
205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey()
217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey()
218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey()
223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey()
228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
/dports/lang/gnat_util/gcc-6-20180516/libjava/classpath/gnu/javax/crypto/cipher/
H A DTripleDES.java83 public static final int KEY_SIZE = 24; field in TripleDES
92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES()
204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey()
205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey()
217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey()
218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey()
223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey()
228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
/dports/devel/mingw32-gcc/gcc-4.8.1/libjava/classpath/gnu/javax/crypto/cipher/
H A DTripleDES.java83 public static final int KEY_SIZE = 24; field in TripleDES
92 super(Registry.TRIPLEDES_CIPHER, BLOCK_SIZE, KEY_SIZE); in TripleDES()
204 byte[] k1 = new byte[DES.KEY_SIZE]; in makeKey()
205 System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE); in makeKey()
217 byte[] k2 = new byte[DES.KEY_SIZE]; in makeKey()
218 System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE); in makeKey()
223 byte[] k3 = new byte[DES.KEY_SIZE]; in makeKey()
228 System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE); in makeKey()
/dports/databases/mariadb105-client/mariadb-10.5.15/plugin/debug_key_management/
H A Ddebug_key_management_plugin.cc33 #define KEY_SIZE 16 macro
59 if (*buflen < KEY_SIZE) in get_key()
61 *buflen= KEY_SIZE; in get_key()
64 *buflen= KEY_SIZE; in get_key()
68 memset(dstbuf, 0, KEY_SIZE); in get_key()

12345678910>>...32