| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
| H A D | generichash_blake2b.c | 16 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { in crypto_generichash_blake2b() 20 assert(keylen <= UINT8_MAX); in crypto_generichash_blake2b() 23 (uint8_t) keylen); in crypto_generichash_blake2b() 33 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { in crypto_generichash_blake2b_salt_personal() 37 assert(keylen <= UINT8_MAX); in crypto_generichash_blake2b_salt_personal() 50 keylen > BLAKE2B_KEYBYTES) { in crypto_generichash_blake2b_init() 54 assert(keylen <= UINT8_MAX); in crypto_generichash_blake2b_init() 55 if (key == NULL || keylen <= 0U) { in crypto_generichash_blake2b_init() 73 keylen > BLAKE2B_KEYBYTES) { in crypto_generichash_blake2b_init_salt_personal() 77 assert(keylen <= UINT8_MAX); in crypto_generichash_blake2b_init_salt_personal() [all …]
|
| H A D | blake2b-ref.c | 178 const uint8_t keylen) in blake2b_init_key() argument 185 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) { in blake2b_init_key() 189 P->key_length = keylen; in blake2b_init_key() 223 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) { in blake2b_init_key_salt_personal() 227 P->key_length = keylen; in blake2b_init_key_salt_personal() 348 if (NULL == key && keylen > 0) { in blake2b() 351 if (keylen > BLAKE2B_KEYBYTES) { in blake2b() 354 if (keylen > 0) { in blake2b() 386 if (NULL == key && keylen > 0) { in blake2b_salt_personal() 389 if (keylen > BLAKE2B_KEYBYTES) { in blake2b_salt_personal() [all …]
|
| H A D | blake2.h | 81 const uint8_t keylen); 83 const void *key, const uint8_t keylen, 91 const uint64_t inlen, uint8_t keylen); 94 uint8_t keylen, const void *salt,
|
| /f-stack/freebsd/contrib/libb2/ |
| H A D | blake2-dispatch.c | 159 int blake2b_init_key_ref( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 168 int blake2b_init_key_sse2( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 189 int blake2b_init_key_avx( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 455 return blake2b_init_key_ptr( S, outlen, key, keylen ); in blake2b_init_key_dispatch() 479 return blake2b_ptr( out, in, key, outlen, inlen, keylen ); in blake2b_dispatch() 489 return blake2b_init_key_ptr( S, outlen, key, keylen ); in blake2b_init_key() 509 return blake2b_ptr( out, in, key, outlen, inlen, keylen ); in blake2b() 521 return blake2s_init_key_ptr( S, outlen, key, keylen ); in blake2s_init_key_dispatch() 545 return blake2s_ptr( out, in, key, outlen, inlen, keylen ); in blake2s_dispatch() 555 return blake2s_init_key_ptr( S, outlen, key, keylen ); in blake2s_init_key() [all …]
|
| H A D | blake2sp.c | 31 P->key_length = keylen; in blake2sp_init_leaf() 45 static int blake2sp_init_root( blake2s_state *S, uint8_t outlen, uint8_t keylen ) in blake2sp_init_root() argument 49 P->key_length = keylen; in blake2sp_init_root() 87 if( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp_init_key() 92 if( blake2sp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2sp_init_key() 105 memcpy( block, key, keylen ); in blake2sp_init_key() 205 if ( NULL == key && keylen > 0 ) return -1; in blake2sp() 209 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp() 217 if( keylen > 0 ) in blake2sp() 221 memcpy( block, key, keylen ); in blake2sp() [all …]
|
| H A D | blake2bp.c | 32 P->key_length = keylen; in blake2bp_init_leaf() 47 static int blake2bp_init_root( blake2b_state *S, uint8_t outlen, uint8_t keylen ) in blake2bp_init_root() argument 51 P->key_length = keylen; in blake2bp_init_root() 90 if( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2bp_init_key() 95 if( blake2bp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2bp_init_key() 108 memcpy( block, key, keylen ); in blake2bp_init_key() 207 if ( NULL == key && keylen > 0) return -1; in blake2bp() 211 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2bp() 219 if( keylen > 0 ) in blake2bp() 223 memcpy( block, key, keylen ); in blake2bp() [all …]
|
| H A D | blake2.h | 144 …BLAKE2_API int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 150 …BLAKE2_API int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 156 …AKE2_API int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ); 161 …AKE2_API int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen ); 166 …ake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 167 …ake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 169 …ke2sp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 170 …ke2bp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 172 …blake2( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2() argument 174 return blake2b( out, in, key, outlen, inlen, keylen ); in blake2()
|
| H A D | blake2s-ref.c | 153 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 156 …ake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 198 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ) in blake2s_init_key() argument 204 if ( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key() 207 P->key_length = ( uint8_t ) keylen; in blake2s_init_key() 223 memcpy( block, key, keylen ); in blake2s_init_key() 348 …lake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2s() argument 357 if ( NULL == key && keylen > 0 ) return -1; in blake2s() 361 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s() 363 if( keylen > 0 ) in blake2s() [all …]
|
| H A D | blake2b-ref.c | 160 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 163 …ake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 205 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ) in blake2b_init_key() argument 211 if ( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key() 214 P->key_length = ( uint8_t ) keylen; in blake2b_init_key() 230 memcpy( block, key, keylen ); in blake2b_init_key() 358 …lake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2b() argument 367 if( NULL == key && keylen > 0 ) return -1; in blake2b() 371 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b() 373 if( keylen > 0 ) in blake2b() [all …]
|
| H A D | blake2s.c | 190 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 193 …ake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 239 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ) in blake2s_init_key() argument 243 if ( ( !key ) || ( !keylen ) || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key() 248 keylen, in blake2s_init_key() 265 memcpy( block, key, keylen ); in blake2s_init_key() 388 …lake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2s() argument 397 if ( NULL == key && keylen > 0) return -1; in blake2s() 401 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s() 403 if( keylen > 0 ) in blake2s() [all …]
|
| H A D | blake2b.c | 204 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 207 …ake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 253 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ) in blake2b_init_key() argument 257 if ( ( !keylen ) || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key() 262 ( uint8_t ) keylen, in blake2b_init_key() 280 memcpy( block, key, keylen ); in blake2b_init_key() 410 …lake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2b() argument 419 if( NULL == key && keylen > 0 ) return -1; in blake2b() 423 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b() 425 if( keylen ) in blake2b() [all …]
|
| /f-stack/freebsd/netinet/ |
| H A D | sctp_auth.c | 254 new_key->keylen = keylen; in sctp_alloc_key() 275 if (key->keylen) { in sctp_print_key() 294 if (key->keylen) { in sctp_show_key() 326 new_key->keylen = keylen; in sctp_generate_random_key() 404 uint32_t keylen; in sctp_compute_hashkey() local 411 if (keylen > 0) { in sctp_compute_hashkey() 418 new_key->keylen = keylen; in sctp_compute_hashkey() 1377 uint32_t keylen; in sctp_auth_get_cookie_params() local 1465 keylen = 0; in sctp_auth_get_cookie_params() 1921 uint16_t keylen; in sctp_initialize_auth_params() local [all …]
|
| H A D | sctp_auth.h | 59 uint32_t keylen; member 126 extern sctp_key_t *sctp_alloc_key(uint32_t keylen); 130 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 131 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 176 sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 185 sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_auth/hmacsha256/ |
| H A D | auth_hmacsha256.c | 38 const unsigned char *key, size_t keylen) in crypto_auth_hmacsha256_init() argument 44 if (keylen > 64) { in crypto_auth_hmacsha256_init() 46 crypto_hash_sha256_update(&state->ictx, key, keylen); in crypto_auth_hmacsha256_init() 49 keylen = 32; in crypto_auth_hmacsha256_init() 53 for (i = 0; i < keylen; i++) { in crypto_auth_hmacsha256_init() 60 for (i = 0; i < keylen; i++) { in crypto_auth_hmacsha256_init()
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_auth/hmacsha512/ |
| H A D | auth_hmacsha512.c | 38 const unsigned char *key, size_t keylen) in crypto_auth_hmacsha512_init() argument 44 if (keylen > 128) { in crypto_auth_hmacsha512_init() 46 crypto_hash_sha512_update(&state->ictx, key, keylen); in crypto_auth_hmacsha512_init() 49 keylen = 64; in crypto_auth_hmacsha512_init() 53 for (i = 0; i < keylen; i++) { in crypto_auth_hmacsha512_init() 60 for (i = 0; i < keylen; i++) { in crypto_auth_hmacsha512_init()
|
| /f-stack/app/nginx-1.16.1/src/core/ |
| H A D | ngx_crypt.c | 57 size_t saltlen, keylen; in ngx_crypt_apr1() local 62 keylen = ngx_strlen(key); in ngx_crypt_apr1() 74 ngx_md5_update(&md5, key, keylen); in ngx_crypt_apr1() 79 ngx_md5_update(&ctx1, key, keylen); in ngx_crypt_apr1() 81 ngx_md5_update(&ctx1, key, keylen); in ngx_crypt_apr1() 84 for (n = keylen; n > 0; n -= 16) { in ngx_crypt_apr1() 90 for (i = keylen; i; i >>= 1) { in ngx_crypt_apr1() 105 ngx_md5_update(&ctx1, key, keylen); in ngx_crypt_apr1() 116 ngx_md5_update(&ctx1, key, keylen); in ngx_crypt_apr1() 123 ngx_md5_update(&ctx1, key, keylen); in ngx_crypt_apr1()
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_generichash/ |
| H A D | crypto_generichash.c | 56 size_t keylen) in crypto_generichash() argument 58 return crypto_generichash_blake2b(out, outlen, in, inlen, key, keylen); in crypto_generichash() 64 const size_t keylen, const size_t outlen) in crypto_generichash_init() argument 67 ((crypto_generichash_blake2b_state *) state, key, keylen, outlen); in crypto_generichash_init()
|
| /f-stack/dpdk/drivers/common/sfc_efx/base/ |
| H A D | efx_vpd.c | 489 uint8_t keylen; in efx_vpd_hunk_verify() local 517 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_verify() 642 uint8_t keylen; in efx_vpd_hunk_next() local 671 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_next() 676 paylen = keylen; in efx_vpd_hunk_next() 719 uint8_t keylen; in efx_vpd_hunk_get() local 746 *paylenp = keylen; in efx_vpd_hunk_get() 783 uint8_t keylen; in efx_vpd_hunk_set() local 853 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_set() 859 source = offset + pos + 3 + keylen; in efx_vpd_hunk_set() [all …]
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/include/sodium/ |
| H A D | crypto_generichash_blake2b.h | 77 const unsigned char *key, size_t keylen); 84 size_t keylen, 91 const size_t keylen, const size_t outlen); 96 const size_t keylen, const size_t outlen,
|
| /f-stack/dpdk/drivers/common/dpaax/caamflib/desc/ |
| H A D | ipsec.h | 777 if (authdata->keylen) { in cnstr_shdsc_ipsec_encap() 780 authdata->key, authdata->keylen, in cnstr_shdsc_ipsec_encap() 785 if (cipherdata->keylen) in cnstr_shdsc_ipsec_encap() 844 if (authdata->keylen) { in cnstr_shdsc_ipsec_decap() 847 authdata->key, authdata->keylen, in cnstr_shdsc_ipsec_decap() 852 if (cipherdata->keylen) in cnstr_shdsc_ipsec_decap() 1288 if (authdata->keylen) in cnstr_shdsc_ipsec_new_encap() 1290 if (cipherdata->keylen) in cnstr_shdsc_ipsec_new_encap() 1377 if (authdata->keylen) in cnstr_shdsc_ipsec_new_decap() 1379 if (cipherdata->keylen) in cnstr_shdsc_ipsec_new_decap() [all …]
|
| H A D | pdcp.h | 498 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_cplane_int_only_op() 534 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_cplane_int_only_op() 652 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_cplane_int_only_op() 764 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_cplane_int_only_op() 1251 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_uplane_aes_aes_op() 1288 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_uplane_aes_aes_op() 1359 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_uplane_aes_aes_op() 1441 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_cplane_snow_aes_op() 1493 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_cplane_snow_aes_op() 2303 authdata->keylen, INLINE_KEY(authdata)); in pdcp_insert_cplane_zuc_aes_op() [all …]
|
| /f-stack/app/redis-5.0.5/src/modules/ |
| H A D | hellodict.c | 90 size_t keylen; in cmd_KEYRANGE() local 93 while((key = RedisModule_DictNextC(iter,&keylen,NULL)) != NULL) { in cmd_KEYRANGE() 97 RedisModule_ReplyWithStringBuffer(ctx,key,keylen); in cmd_KEYRANGE()
|
| /f-stack/freebsd/crypto/blake2/ |
| H A D | blake2-sw.c | 12 const void *key, size_t keylen); 17 size_t outlen, size_t inlen, size_t keylen); 22 const void *key, size_t keylen); 27 size_t outlen, size_t inlen, size_t keylen);
|
| /f-stack/freebsd/crypto/armv8/ |
| H A D | armv8_crypto.c | 275 const struct crypto_session_params *csp, const uint8_t *key, int keylen) in armv8_crypto_cipher_setup() argument 282 keylen /= 2; in armv8_crypto_cipher_setup() 284 switch (keylen * 8) { in armv8_crypto_cipher_setup() 301 keylen * 8, &ses->enc_schedule); in armv8_crypto_cipher_setup() 306 keylen * 8, &ses->dec_schedule); in armv8_crypto_cipher_setup() 309 aes_v8_set_encrypt_key(key + keylen, keylen * 8, &ses->xts_schedule); in armv8_crypto_cipher_setup()
|
| /f-stack/freebsd/netipsec/ |
| H A D | xform_tcp.c | 341 int keylen; in tcpsignature_init() local 352 keylen = _KEYLEN(sav->key_auth); in tcpsignature_init() 353 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) { in tcpsignature_init() 354 DPRINTF(("%s: invalid key length %u\n", __func__, keylen)); in tcpsignature_init()
|