| /f-stack/freebsd/crypto/blake2/ |
| H A D | blake2-sw.c | 32 uint16_t klen; member 42 if (ctx->klen > 0) in blake2b_xform_init() 44 ctx->key, ctx->klen); in blake2b_xform_init() 56 if (klen > sizeof(ctx->key)) in blake2b_xform_setkey() 58 memcpy(ctx->key, key, klen); in blake2b_xform_setkey() 59 ctx->klen = klen; in blake2b_xform_setkey() 100 uint16_t klen; member 110 if (ctx->klen > 0) in blake2s_xform_init() 112 ctx->key, ctx->klen); in blake2s_xform_init() 124 if (klen > sizeof(ctx->key)) in blake2s_xform_setkey() [all …]
|
| H A D | blake2_cryptodev.c | 263 blake2_check_klen(const struct crypto_session_params *csp, unsigned klen) in blake2_check_klen() argument 267 return (klen <= BLAKE2S_KEYBYTES); in blake2_check_klen() 269 return (klen <= BLAKE2B_KEYBYTES); in blake2_check_klen() 343 unsigned klen; in blake2_cipher_process() local 361 klen = csp->csp_auth_klen; in blake2_cipher_process() 364 if (klen > 0) in blake2_cipher_process() 365 rc = blake2b_init_key(&bctx.sb, ses->mlen, key, klen); in blake2_cipher_process() 381 if (klen > 0) in blake2_cipher_process() 382 rc = blake2s_init_key(&bctx.ss, ses->mlen, key, klen); in blake2_cipher_process()
|
| /f-stack/app/redis-5.0.5/src/ |
| H A D | zipmap.c | 171 l = klen+vlen+3; in zipmapRequiredLength() 172 if (klen >= ZIPMAP_BIGLEN) l += 4; in zipmapRequiredLength() 219 p = zipmapLookupRaw(zm,key,klen,&zmlen); in zipmapSet() 269 p += zipmapEncodeLength(p,klen); in zipmapSet() 270 memcpy(p,key,klen); in zipmapSet() 271 p += klen; in zipmapSet() 319 *klen = zipmapDecodeLength(zm); in zipmapNext() 320 *key += ZIPMAP_LEN_BYTES(*klen); in zipmapNext() 346 return zipmapLookupRaw(zm,key,klen,NULL) != NULL; in zipmapExists() 461 unsigned int klen, vlen; in zipmapTest() local [all …]
|
| H A D | zipmap.h | 39 unsigned char *zipmapSet(unsigned char *zm, unsigned char *key, unsigned int klen, unsigned char *v… 40 unsigned char *zipmapDel(unsigned char *zm, unsigned char *key, unsigned int klen, int *deleted); 42 unsigned char *zipmapNext(unsigned char *zm, unsigned char **key, unsigned int *klen, unsigned char… 43 int zipmapGet(unsigned char *zm, unsigned char *key, unsigned int klen, unsigned char **value, unsi… 44 int zipmapExists(unsigned char *zm, unsigned char *key, unsigned int klen);
|
| H A D | evict.c | 246 int klen = sdslen(key); in evictionPoolPopulate() local 247 if (klen > EVPOOL_CACHED_SDS_SIZE) { in evictionPoolPopulate() 250 memcpy(pool[k].cached,key,klen+1); in evictionPoolPopulate() 251 sdssetlen(pool[k].cached,klen); in evictionPoolPopulate()
|
| /f-stack/freebsd/opencrypto/ |
| H A D | xform_poly1305.c | 27 const uint8_t key[__min_size(POLY1305_KEY_LEN)], size_t klen) in Poly1305_Setkey() argument 31 if (klen != POLY1305_KEY_LEN) in Poly1305_Setkey() 32 panic("%s: Bogus keylen: %u bytes", __func__, (unsigned)klen); in Poly1305_Setkey() 40 xform_Poly1305_Setkey(void *ctx, const uint8_t *key, u_int klen) in xform_Poly1305_Setkey() argument 42 Poly1305_Setkey(ctx, key, klen); in xform_Poly1305_Setkey()
|
| H A D | gmac.c | 48 AES_GMAC_Setkey(void *ctx, const uint8_t *key, u_int klen) in AES_GMAC_Setkey() argument 56 agc->rounds = rijndaelKeySetupEnc(agc->keysched, key, klen * 8); in AES_GMAC_Setkey()
|
| H A D | cbc_mac.c | 68 AES_CBC_MAC_Setkey(void *vctx, const uint8_t *key, u_int klen) in AES_CBC_MAC_Setkey() argument 73 ctx->rounds = rijndaelKeySetupEnc(ctx->keysched, key, klen * 8); in AES_CBC_MAC_Setkey()
|
| H A D | crypto.c | 413 hmac_init_pad(const struct auth_hash *axf, const char *key, int klen, in hmac_init_pad() argument 427 if (klen > axf->blocksize) { in hmac_init_pad() 429 axf->Update(auth_ctx, key, klen); in hmac_init_pad() 431 klen = axf->hashsize; in hmac_init_pad() 433 memcpy(hmac_key, key, klen); in hmac_init_pad() 444 hmac_init_ipad(const struct auth_hash *axf, const char *key, int klen, in hmac_init_ipad() argument 448 hmac_init_pad(axf, key, klen, auth_ctx, HMAC_IPAD_VAL); in hmac_init_ipad() 452 hmac_init_opad(const struct auth_hash *axf, const char *key, int klen, in hmac_init_opad() argument 456 hmac_init_pad(axf, key, klen, auth_ctx, HMAC_OPAD_VAL); in hmac_init_opad()
|
| H A D | cryptodev.h | 677 void hmac_init_ipad(const struct auth_hash *axf, const char *key, int klen, 679 void hmac_init_opad(const struct auth_hash *axf, const char *key, int klen,
|
| H A D | cryptosoft.c | 288 const uint8_t *key, int klen) in swcr_authprepare() argument 299 hmac_init_ipad(axf, key, klen, sw->sw_ictx); in swcr_authprepare() 300 hmac_init_opad(axf, key, klen, sw->sw_octx); in swcr_authprepare() 305 axf->Setkey(sw->sw_ictx, key, klen); in swcr_authprepare()
|
| /f-stack/freebsd/crypto/via/ |
| H A D | padlock_cipher.c | 101 padlock_cipher_key_setup(struct padlock_session *ses, const void *key, int klen) in padlock_cipher_key_setup() argument 109 rijndaelKeySetupEnc(ses->ses_ekey, key, klen * 8); in padlock_cipher_key_setup() 110 rijndaelKeySetupDec(ses->ses_dkey, key, klen * 8); in padlock_cipher_key_setup() 116 bcopy(key, ses->ses_ekey, klen); in padlock_cipher_key_setup() 117 bcopy(key, ses->ses_dkey, klen); in padlock_cipher_key_setup()
|
| H A D | padlock_hash.c | 260 int klen) in padlock_hash_key_setup() argument 274 hmac_init_ipad(axf, key, klen, ses->ses_ictx); in padlock_hash_key_setup() 275 hmac_init_opad(axf, key, klen, ses->ses_octx); in padlock_hash_key_setup()
|
| /f-stack/freebsd/contrib/libsodium/test/default/ |
| H A D | metamorphic.c | 16 size_t klen; in mm_generichash() local 24 klen = randombytes_uniform(crypto_generichash_KEYBYTES_MAX - in mm_generichash() 27 k = (unsigned char *) sodium_malloc(klen); in mm_generichash() 34 randombytes_buf(k, klen); in mm_generichash() 37 crypto_generichash_init(&st, k, klen, hlen); in mm_generichash() 45 crypto_generichash(h2, hlen, m, mlen, k, klen); in mm_generichash()
|
| /f-stack/freebsd/crypto/ccp/ |
| H A D | ccp.c | 231 ccp_init_hmac_digest(struct ccp_session *s, const char *key, int klen) in ccp_init_hmac_digest() argument 242 if (klen > axf->blocksize) { in ccp_init_hmac_digest() 244 axf->Update(&auth_ctx, key, klen); in ccp_init_hmac_digest() 247 klen = axf->hashsize; in ccp_init_hmac_digest() 249 memcpy(s->hmac.ipad, key, klen); in ccp_init_hmac_digest() 251 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); in ccp_init_hmac_digest() 261 ccp_aes_check_keylen(int alg, int klen) in ccp_aes_check_keylen() argument 264 switch (klen * 8) { in ccp_aes_check_keylen() 288 kbits = (klen / 2) * 8; in ccp_aes_setkey() 290 kbits = klen * 8; in ccp_aes_setkey() [all …]
|
| /f-stack/dpdk/drivers/net/bnxt/tf_core/ |
| H A D | tf_shadow_tcam.c | 420 uint16_t idx, klen; in tf_shadow_tcam_bind_index() local 443 klen = parms->key_size; in tf_shadow_tcam_bind_index() 445 klen > TF_SHADOW_TCAM_MAX_KEY_SZ) { in tf_shadow_tcam_bind_index() 449 klen, in tf_shadow_tcam_bind_index() 466 for (i = 0; i < klen; i++) in tf_shadow_tcam_bind_index() 469 memcpy(sk_entry->key, tkey, klen); in tf_shadow_tcam_bind_index() 470 memcpy(sk_entry->mask, parms->mask, klen); in tf_shadow_tcam_bind_index()
|
| /f-stack/app/redis-5.0.5/deps/jemalloc/src/ |
| H A D | jemalloc.c | 876 size_t klen, vlen; in malloc_conf_init() local 954 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0) in malloc_conf_init() 966 k, klen, v, vlen); \ in malloc_conf_init() 1066 k, klen, v, vlen); in malloc_conf_init() 1080 k, klen, v, vlen); in malloc_conf_init() 1091 k, klen, v, vlen); in malloc_conf_init() 1131 klen, v, vlen); in malloc_conf_init() 1158 k, klen, v, vlen); in malloc_conf_init() 1167 k, klen, v, vlen); in malloc_conf_init() 1213 k, klen, v, vlen); in malloc_conf_init() [all …]
|
| /f-stack/freebsd/crypto/openssl/ |
| H A D | ossl.c | 163 ossl_setkey_hmac(struct ossl_session *s, const void *key, int klen) in ossl_setkey_hmac() argument 166 hmac_init_ipad(s->hash.axf, key, klen, &s->hash.ictx); in ossl_setkey_hmac() 167 hmac_init_opad(s->hash.axf, key, klen, &s->hash.octx); in ossl_setkey_hmac()
|
| /f-stack/freebsd/crypto/aesni/ |
| H A D | aesni.c | 548 aesni_authprepare(struct aesni_session *ses, int klen) in aesni_authprepare() argument 551 if (klen > SHA1_BLOCK_LEN) in aesni_authprepare() 553 if ((ses->hmac && klen == 0) || (!ses->hmac && klen != 0)) in aesni_authprepare()
|