Home
last modified time | relevance | path

Searched refs:klen (Results 1 – 19 of 19) sorted by relevance

/f-stack/freebsd/crypto/blake2/
H A Dblake2-sw.c32 uint16_t klen; member
42 if (ctx->klen > 0) in blake2b_xform_init()
44 ctx->key, ctx->klen); in blake2b_xform_init()
56 if (klen > sizeof(ctx->key)) in blake2b_xform_setkey()
58 memcpy(ctx->key, key, klen); in blake2b_xform_setkey()
59 ctx->klen = klen; in blake2b_xform_setkey()
100 uint16_t klen; member
110 if (ctx->klen > 0) in blake2s_xform_init()
112 ctx->key, ctx->klen); in blake2s_xform_init()
124 if (klen > sizeof(ctx->key)) in blake2s_xform_setkey()
[all …]
H A Dblake2_cryptodev.c263 blake2_check_klen(const struct crypto_session_params *csp, unsigned klen) in blake2_check_klen() argument
267 return (klen <= BLAKE2S_KEYBYTES); in blake2_check_klen()
269 return (klen <= BLAKE2B_KEYBYTES); in blake2_check_klen()
343 unsigned klen; in blake2_cipher_process() local
361 klen = csp->csp_auth_klen; in blake2_cipher_process()
364 if (klen > 0) in blake2_cipher_process()
365 rc = blake2b_init_key(&bctx.sb, ses->mlen, key, klen); in blake2_cipher_process()
381 if (klen > 0) in blake2_cipher_process()
382 rc = blake2s_init_key(&bctx.ss, ses->mlen, key, klen); in blake2_cipher_process()
/f-stack/app/redis-5.0.5/src/
H A Dzipmap.c171 l = klen+vlen+3; in zipmapRequiredLength()
172 if (klen >= ZIPMAP_BIGLEN) l += 4; in zipmapRequiredLength()
219 p = zipmapLookupRaw(zm,key,klen,&zmlen); in zipmapSet()
269 p += zipmapEncodeLength(p,klen); in zipmapSet()
270 memcpy(p,key,klen); in zipmapSet()
271 p += klen; in zipmapSet()
319 *klen = zipmapDecodeLength(zm); in zipmapNext()
320 *key += ZIPMAP_LEN_BYTES(*klen); in zipmapNext()
346 return zipmapLookupRaw(zm,key,klen,NULL) != NULL; in zipmapExists()
461 unsigned int klen, vlen; in zipmapTest() local
[all …]
H A Dzipmap.h39 unsigned char *zipmapSet(unsigned char *zm, unsigned char *key, unsigned int klen, unsigned char *v…
40 unsigned char *zipmapDel(unsigned char *zm, unsigned char *key, unsigned int klen, int *deleted);
42 unsigned char *zipmapNext(unsigned char *zm, unsigned char **key, unsigned int *klen, unsigned char…
43 int zipmapGet(unsigned char *zm, unsigned char *key, unsigned int klen, unsigned char **value, unsi…
44 int zipmapExists(unsigned char *zm, unsigned char *key, unsigned int klen);
H A Devict.c246 int klen = sdslen(key); in evictionPoolPopulate() local
247 if (klen > EVPOOL_CACHED_SDS_SIZE) { in evictionPoolPopulate()
250 memcpy(pool[k].cached,key,klen+1); in evictionPoolPopulate()
251 sdssetlen(pool[k].cached,klen); in evictionPoolPopulate()
/f-stack/freebsd/opencrypto/
H A Dxform_poly1305.c27 const uint8_t key[__min_size(POLY1305_KEY_LEN)], size_t klen) in Poly1305_Setkey() argument
31 if (klen != POLY1305_KEY_LEN) in Poly1305_Setkey()
32 panic("%s: Bogus keylen: %u bytes", __func__, (unsigned)klen); in Poly1305_Setkey()
40 xform_Poly1305_Setkey(void *ctx, const uint8_t *key, u_int klen) in xform_Poly1305_Setkey() argument
42 Poly1305_Setkey(ctx, key, klen); in xform_Poly1305_Setkey()
H A Dgmac.c48 AES_GMAC_Setkey(void *ctx, const uint8_t *key, u_int klen) in AES_GMAC_Setkey() argument
56 agc->rounds = rijndaelKeySetupEnc(agc->keysched, key, klen * 8); in AES_GMAC_Setkey()
H A Dcbc_mac.c68 AES_CBC_MAC_Setkey(void *vctx, const uint8_t *key, u_int klen) in AES_CBC_MAC_Setkey() argument
73 ctx->rounds = rijndaelKeySetupEnc(ctx->keysched, key, klen * 8); in AES_CBC_MAC_Setkey()
H A Dcrypto.c413 hmac_init_pad(const struct auth_hash *axf, const char *key, int klen, in hmac_init_pad() argument
427 if (klen > axf->blocksize) { in hmac_init_pad()
429 axf->Update(auth_ctx, key, klen); in hmac_init_pad()
431 klen = axf->hashsize; in hmac_init_pad()
433 memcpy(hmac_key, key, klen); in hmac_init_pad()
444 hmac_init_ipad(const struct auth_hash *axf, const char *key, int klen, in hmac_init_ipad() argument
448 hmac_init_pad(axf, key, klen, auth_ctx, HMAC_IPAD_VAL); in hmac_init_ipad()
452 hmac_init_opad(const struct auth_hash *axf, const char *key, int klen, in hmac_init_opad() argument
456 hmac_init_pad(axf, key, klen, auth_ctx, HMAC_OPAD_VAL); in hmac_init_opad()
H A Dcryptodev.h677 void hmac_init_ipad(const struct auth_hash *axf, const char *key, int klen,
679 void hmac_init_opad(const struct auth_hash *axf, const char *key, int klen,
H A Dcryptosoft.c288 const uint8_t *key, int klen) in swcr_authprepare() argument
299 hmac_init_ipad(axf, key, klen, sw->sw_ictx); in swcr_authprepare()
300 hmac_init_opad(axf, key, klen, sw->sw_octx); in swcr_authprepare()
305 axf->Setkey(sw->sw_ictx, key, klen); in swcr_authprepare()
/f-stack/freebsd/crypto/via/
H A Dpadlock_cipher.c101 padlock_cipher_key_setup(struct padlock_session *ses, const void *key, int klen) in padlock_cipher_key_setup() argument
109 rijndaelKeySetupEnc(ses->ses_ekey, key, klen * 8); in padlock_cipher_key_setup()
110 rijndaelKeySetupDec(ses->ses_dkey, key, klen * 8); in padlock_cipher_key_setup()
116 bcopy(key, ses->ses_ekey, klen); in padlock_cipher_key_setup()
117 bcopy(key, ses->ses_dkey, klen); in padlock_cipher_key_setup()
H A Dpadlock_hash.c260 int klen) in padlock_hash_key_setup() argument
274 hmac_init_ipad(axf, key, klen, ses->ses_ictx); in padlock_hash_key_setup()
275 hmac_init_opad(axf, key, klen, ses->ses_octx); in padlock_hash_key_setup()
/f-stack/freebsd/contrib/libsodium/test/default/
H A Dmetamorphic.c16 size_t klen; in mm_generichash() local
24 klen = randombytes_uniform(crypto_generichash_KEYBYTES_MAX - in mm_generichash()
27 k = (unsigned char *) sodium_malloc(klen); in mm_generichash()
34 randombytes_buf(k, klen); in mm_generichash()
37 crypto_generichash_init(&st, k, klen, hlen); in mm_generichash()
45 crypto_generichash(h2, hlen, m, mlen, k, klen); in mm_generichash()
/f-stack/freebsd/crypto/ccp/
H A Dccp.c231 ccp_init_hmac_digest(struct ccp_session *s, const char *key, int klen) in ccp_init_hmac_digest() argument
242 if (klen > axf->blocksize) { in ccp_init_hmac_digest()
244 axf->Update(&auth_ctx, key, klen); in ccp_init_hmac_digest()
247 klen = axf->hashsize; in ccp_init_hmac_digest()
249 memcpy(s->hmac.ipad, key, klen); in ccp_init_hmac_digest()
251 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); in ccp_init_hmac_digest()
261 ccp_aes_check_keylen(int alg, int klen) in ccp_aes_check_keylen() argument
264 switch (klen * 8) { in ccp_aes_check_keylen()
288 kbits = (klen / 2) * 8; in ccp_aes_setkey()
290 kbits = klen * 8; in ccp_aes_setkey()
[all …]
/f-stack/dpdk/drivers/net/bnxt/tf_core/
H A Dtf_shadow_tcam.c420 uint16_t idx, klen; in tf_shadow_tcam_bind_index() local
443 klen = parms->key_size; in tf_shadow_tcam_bind_index()
445 klen > TF_SHADOW_TCAM_MAX_KEY_SZ) { in tf_shadow_tcam_bind_index()
449 klen, in tf_shadow_tcam_bind_index()
466 for (i = 0; i < klen; i++) in tf_shadow_tcam_bind_index()
469 memcpy(sk_entry->key, tkey, klen); in tf_shadow_tcam_bind_index()
470 memcpy(sk_entry->mask, parms->mask, klen); in tf_shadow_tcam_bind_index()
/f-stack/app/redis-5.0.5/deps/jemalloc/src/
H A Djemalloc.c876 size_t klen, vlen; in malloc_conf_init() local
954 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0) in malloc_conf_init()
966 k, klen, v, vlen); \ in malloc_conf_init()
1066 k, klen, v, vlen); in malloc_conf_init()
1080 k, klen, v, vlen); in malloc_conf_init()
1091 k, klen, v, vlen); in malloc_conf_init()
1131 klen, v, vlen); in malloc_conf_init()
1158 k, klen, v, vlen); in malloc_conf_init()
1167 k, klen, v, vlen); in malloc_conf_init()
1213 k, klen, v, vlen); in malloc_conf_init()
[all …]
/f-stack/freebsd/crypto/openssl/
H A Dossl.c163 ossl_setkey_hmac(struct ossl_session *s, const void *key, int klen) in ossl_setkey_hmac() argument
166 hmac_init_ipad(s->hash.axf, key, klen, &s->hash.ictx); in ossl_setkey_hmac()
167 hmac_init_opad(s->hash.axf, key, klen, &s->hash.octx); in ossl_setkey_hmac()
/f-stack/freebsd/crypto/aesni/
H A Daesni.c548 aesni_authprepare(struct aesni_session *ses, int klen) in aesni_authprepare() argument
551 if (klen > SHA1_BLOCK_LEN) in aesni_authprepare()
553 if ((ses->hmac && klen == 0) || (!ses->hmac && klen != 0)) in aesni_authprepare()