| /f-stack/freebsd/contrib/ck/include/ |
| H A D | ck_ht.h | 78 CK_HT_TYPE key_length; 150 ck_ht_entry_key_set(ck_ht_entry_t *entry, const void *key, uint16_t key_length) in ck_ht_entry_key_set() argument 154 entry->key = (uintptr_t)key | ((uintptr_t)key_length << CK_MD_VMA_BITS); in ck_ht_entry_key_set() 157 entry->key_length = key_length; in ck_ht_entry_key_set() 181 return entry->key_length; in ck_ht_entry_key_length() 200 uint16_t key_length, in ck_ht_entry_set() argument 205 entry->key = (uintptr_t)key | ((uintptr_t)key_length << CK_MD_VMA_BITS); in ck_ht_entry_set() 210 entry->key_length = key_length; in ck_ht_entry_set()
|
| /f-stack/freebsd/contrib/ck/src/ |
| H A D | ck_ht.c | 112 uint16_t key_length) in ck_ht_hash() argument 285 uint16_t key_length, in ck_ht_map_probe_wr() argument 347 if (k != key_length) in ck_ht_map_probe_wr() 457 CK_HT_TYPE_STORE(&priority->key_length, entry->key_length); in ck_ht_gc() 501 uint16_t key_length) in ck_ht_map_probe_rd() argument 542 snapshot->key_length = CK_HT_TYPE_LOAD(&cursor->key_length); in ck_ht_map_probe_rd() 569 if (k != key_length) in ck_ht_map_probe_rd() 686 uint16_t key_length; in ck_ht_grow_spmc() local 875 CK_HT_TYPE_STORE(&priority->key_length, entry->key_length); in ck_ht_set_spmc() 928 CK_HT_TYPE_STORE(&candidate->key_length, entry->key_length); in ck_ht_set_spmc() [all …]
|
| /f-stack/dpdk/drivers/crypto/ccp/ |
| H A D | ccp_crypto.c | 715 if (sess->cipher.key_length == 16) in ccp_configure_session_cipher() 717 else if (sess->cipher.key_length == 24) in ccp_configure_session_cipher() 719 else if (sess->cipher.key_length == 32) in ccp_configure_session_cipher() 730 if (sess->cipher.key_length == 16) in ccp_configure_session_cipher() 732 else if (sess->cipher.key_length == 24) in ccp_configure_session_cipher() 1079 if (sess->auth.key_length == 16) in ccp_configure_session_auth() 1081 else if (sess->auth.key_length == 24) in ccp_configure_session_auth() 1083 else if (sess->auth.key_length == 32) in ccp_configure_session_auth() 1090 sess->auth.key_length); in ccp_configure_session_auth() 1137 if (sess->cipher.key_length == 16) in ccp_configure_session_aead() [all …]
|
| H A D | ccp_crypto.h | 270 uint64_t key_length; member 293 uint64_t key_length; member
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
| H A D | blake2b-ref.c | 132 P->key_length = 0; in blake2b_init() 155 P->key_length = 0; in blake2b_init_salt_personal() 189 P->key_length = keylen; in blake2b_init_key() 227 P->key_length = keylen; in blake2b_init_key_salt_personal()
|
| H A D | blake2.h | 56 uint8_t key_length; /* 2 */ member
|
| /f-stack/freebsd/contrib/libb2/ |
| H A D | blake2.h | 74 uint8_t key_length; // 2 member 100 uint8_t key_length; // 2 member
|
| H A D | blake2sp.c | 31 P->key_length = keylen; in blake2sp_init_leaf() 49 P->key_length = keylen; in blake2sp_init_root()
|
| H A D | blake2bp.c | 32 P->key_length = keylen; in blake2bp_init_leaf() 51 P->key_length = keylen; in blake2bp_init_root()
|
| H A D | blake2s-ref.c | 185 P->key_length = 0; in blake2s_init() 207 P->key_length = ( uint8_t ) keylen; in blake2s_init_key()
|
| H A D | blake2b-ref.c | 191 P->key_length = 0; in blake2b_init() 214 P->key_length = ( uint8_t ) keylen; in blake2b_init_key()
|
| /f-stack/app/redis-5.0.5/deps/jemalloc/test/src/ |
| H A D | SFMT.c | 638 sfmt_t *init_by_array(uint32_t *init_key, int key_length) { in init_by_array() argument 666 if (key_length + 1 > N32) { in init_by_array() 667 count = key_length + 1; in init_by_array() 674 r += key_length; in init_by_array() 679 for (i = 1, j = 0; (j < count) && (j < key_length); j++) { in init_by_array()
|
| /f-stack/app/redis-5.0.5/deps/jemalloc/test/include/test/ |
| H A D | SFMT.h | 78 sfmt_t *init_by_array(uint32_t *init_key, int key_length);
|
| /f-stack/dpdk/drivers/crypto/aesni_gcm/ |
| H A D | aesni_gcm_pmd.c | 51 uint8_t key_length; in aesni_gcm_set_session_parameters() local 72 key_length = auth_xform->auth.key.length; in aesni_gcm_set_session_parameters() 97 key_length = aead_xform->aead.key.length; in aesni_gcm_set_session_parameters() 115 switch (key_length) { in aesni_gcm_set_session_parameters()
|
| /f-stack/dpdk/drivers/crypto/qat/ |
| H A D | qat_sym_session.c | 76 const uint8_t *key, uint16_t key_length, void **ctx) in bpi_cipher_ctx_init() argument 90 if (key_length == ICP_QAT_HW_AES_128_KEY_SZ) in bpi_cipher_ctx_init() 708 uint8_t key_length = auth_xform->key.length; in qat_sym_session_configure_auth() local 818 key_length, in qat_sym_session_configure_auth() 833 key_length, in qat_sym_session_configure_auth() 849 key_length, in qat_sym_session_configure_auth()
|
| /f-stack/dpdk/drivers/net/hns3/ |
| H A D | hns3_fdir.c | 82 uint8_t key_length; member 655 tuple_size = meta_data_key_info[i].key_length; in hns3_fd_convert_meta_data() 727 tuple_size = tuple_key_info[i].key_length / HNS3_BITS_PER_BYTE; in hns3_config_key()
|
| /f-stack/app/nginx-1.16.1/src/event/ |
| H A D | ngx_event_openssl.h | 184 int key_length);
|
| H A D | ngx_event_openssl.c | 1093 int key_length) in ngx_ssl_rsa512_key_callback() argument 1097 if (key_length != 512) { in ngx_ssl_rsa512_key_callback()
|
| /f-stack/dpdk/drivers/common/sfc_efx/base/ |
| H A D | efx_lic.c | 1083 uint8_t key_length; in efx_lic_v3_validate_key() local 1096 key_length = ((uint8_t *)keyp)[1]; in efx_lic_v3_validate_key() 1101 if (key_length > length) { in efx_lic_v3_validate_key()
|