| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
| H A D | generichash_blake2b.c | 13 const unsigned char *key, size_t keylen) in crypto_generichash_blake2b() argument 16 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { in crypto_generichash_blake2b() 20 assert(keylen <= UINT8_MAX); in crypto_generichash_blake2b() 23 (uint8_t) keylen); in crypto_generichash_blake2b() 29 unsigned long long inlen, const unsigned char *key, size_t keylen, in crypto_generichash_blake2b_salt_personal() argument 33 keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { in crypto_generichash_blake2b_salt_personal() 37 assert(keylen <= UINT8_MAX); in crypto_generichash_blake2b_salt_personal() 40 (uint64_t) inlen, (uint8_t) keylen, salt, in crypto_generichash_blake2b_salt_personal() 46 const unsigned char *key, const size_t keylen, in crypto_generichash_blake2b_init() argument 50 keylen > BLAKE2B_KEYBYTES) { in crypto_generichash_blake2b_init() [all …]
|
| H A D | blake2b-ref.c | 178 const uint8_t keylen) in blake2b_init_key() argument 185 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) { in blake2b_init_key() 189 P->key_length = keylen; in blake2b_init_key() 206 memcpy(block, key, keylen); /* keylen cannot be 0 */ in blake2b_init_key() 215 const void *key, const uint8_t keylen, in blake2b_init_key_salt_personal() argument 223 if (!key || !keylen || keylen > BLAKE2B_KEYBYTES) { in blake2b_init_key_salt_personal() 227 P->key_length = keylen; in blake2b_init_key_salt_personal() 252 memcpy(block, key, keylen); /* keylen cannot be 0 */ in blake2b_init_key_salt_personal() 334 const uint64_t inlen, uint8_t keylen) in blake2b() argument 348 if (NULL == key && keylen > 0) { in blake2b() [all …]
|
| /freebsd/sys/contrib/libb2/ |
| H A D | blake2-dispatch.c | 159 int blake2b_init_key_ref( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 163 …b_ref( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 168 int blake2b_init_key_sse2( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 172 …_sse2( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 175 int blake2b_init_key_ssse3( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 179 …ssse3( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 182 int blake2b_init_key_sse41( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 186 …sse41( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 189 int blake2b_init_key_avx( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 193 …b_avx( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); [all …]
|
| H A D | blake2bp.c | 28 static int blake2bp_init_leaf( blake2b_state *S, uint8_t outlen, uint8_t keylen, uint64_t offset ) in blake2bp_init_leaf() argument 32 P->key_length = keylen; in blake2bp_init_leaf() 47 static int blake2bp_init_root( blake2b_state *S, uint8_t outlen, uint8_t keylen ) in blake2bp_init_root() argument 51 P->key_length = keylen; in blake2bp_init_root() 86 int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen ) in blake2bp_init_key() argument 90 if( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2bp_init_key() 95 if( blake2bp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2bp_init_key() 99 if( blake2bp_init_leaf( S->S[i], ( uint8_t ) outlen, ( uint8_t ) keylen, i ) < 0 ) in blake2bp_init_key() 108 memcpy( block, key, keylen ); in blake2bp_init_key() 196 …ake2bp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2bp() argument [all …]
|
| H A D | blake2sp.c | 27 static int blake2sp_init_leaf( blake2s_state *S, uint8_t outlen, uint8_t keylen, uint64_t offset ) in blake2sp_init_leaf() argument 31 P->key_length = keylen; in blake2sp_init_leaf() 45 static int blake2sp_init_root( blake2s_state *S, uint8_t outlen, uint8_t keylen ) in blake2sp_init_root() argument 49 P->key_length = keylen; in blake2sp_init_root() 83 int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ) in blake2sp_init_key() argument 87 if( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp_init_key() 92 if( blake2sp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2sp_init_key() 96 if( blake2sp_init_leaf( S->S[i], ( uint8_t ) outlen, ( uint8_t ) keylen, i ) < 0 ) in blake2sp_init_key() 105 memcpy( block, key, keylen ); in blake2sp_init_key() 194 …ake2sp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2sp() argument [all …]
|
| /freebsd/tools/tools/net80211/wesside/wesside/ |
| H A D | aircrack-ptw-lib.c | 135 static void rc4init ( uint8_t * key, int keylen, rc4state * state) { in rc4init() argument 142 j = (j + state->s[i] + key[i % keylen]) % n; in rc4init() 217 static int correct(PTW_attackstate * state, uint8_t * key, int keylen) { in correct() argument 224 memcpy(&keybuf[IVBYTES], key, keylen); in correct() 226 rc4init(keybuf, keylen+IVBYTES, &rc4state); in correct() 239 static void getdrv(PTW_tableentry orgtable[][n], int keylen, double * normal, double * ausreiser) { in getdrv() argument 252 for (i = 0; i < keylen; i++) { in getdrv() 283 …te, int fixat, uint8_t fixvalue, int * searchborders, uint8_t * key, int keylen, PTW_attackstate *… in doRound() argument 286 if (keybyte == keylen) { in doRound() 287 return correct(state, key, keylen); in doRound() [all …]
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | ecx_key.c | 32 ret->keylen = X25519_KEYLEN; in ossl_ecx_key_new() 35 ret->keylen = X448_KEYLEN; in ossl_ecx_key_new() 38 ret->keylen = ED25519_KEYLEN; in ossl_ecx_key_new() 41 ret->keylen = ED448_KEYLEN; in ossl_ecx_key_new() 81 OPENSSL_secure_clear_free(key->privkey, key->keylen); in ossl_ecx_key_free() 105 key->privkey = OPENSSL_secure_zalloc(key->keylen); in ossl_ecx_key_allocate_privkey() 110 int ossl_ecx_compute_key(ECX_KEY *peer, ECX_KEY *priv, size_t keylen, in ossl_ecx_compute_key() argument 120 if (!ossl_assert(keylen == X25519_KEYLEN in ossl_ecx_compute_key() 121 || keylen == X448_KEYLEN)) { in ossl_ecx_compute_key() 127 *secretlen = keylen; in ossl_ecx_compute_key() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | xmss_hash.c | 38 …ar *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned ch… in core_hash_SHA2() argument 40 unsigned char buf[inlen + n + keylen]; in core_hash_SHA2() 47 for (i=0; i < keylen; i++) { in core_hash_SHA2() 52 buf[keylen + n + i] = in[i]; in core_hash_SHA2() 56 SHA256(buf, inlen + keylen + n, out); in core_hash_SHA2() 61 SHA512(buf, inlen + keylen + n, out); in core_hash_SHA2() 71 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) in prf() argument 73 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen); in prf() 79 …, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned in… in h_msg() argument 81 if (keylen != 3*n){ in h_msg() [all …]
|
| /freebsd/contrib/bsnmp/lib/ |
| H A D | snmpcrypto.c | 66 const EVP_MD **dtype, uint32_t *keylen) in snmp_digest_init() argument 70 *keylen = SNMP_AUTH_HMACMD5_KEY_SIZ; in snmp_digest_init() 73 *keylen = SNMP_AUTH_HMACSHA_KEY_SIZ; in snmp_digest_init() 93 uint32_t i, keylen, olen; in snmp_pdu_calc_digest() local 101 err = snmp_digest_init(&pdu->user, ctx, &dtype, &keylen); in snmp_pdu_calc_digest() 110 memcpy(extkey, pdu->user.auth_key, keylen); in snmp_pdu_calc_digest() 111 memset(extkey + keylen, 0, sizeof(extkey) - keylen); in snmp_pdu_calc_digest() 249 uint32_t keylen, olen; in snmp_passwd_to_keys() local 261 err = snmp_digest_init(user, ctx, &dtype, &keylen); in snmp_passwd_to_keys() 295 uint32_t keylen, olen; in snmp_get_local_keys() local [all …]
|
| /freebsd/sys/netinet/ |
| H A D | sctp_auth.c | 241 sctp_alloc_key(uint32_t keylen) in sctp_alloc_key() argument 245 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, in sctp_alloc_key() 251 new_key->keylen = keylen; in sctp_alloc_key() 271 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_print_key() 272 if (key->keylen) { in sctp_print_key() 273 for (i = 0; i < key->keylen; i++) in sctp_print_key() 290 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_show_key() 291 if (key->keylen) { in sctp_show_key() 292 for (i = 0; i < key->keylen; i++) in sctp_show_key() 304 return (key->keylen); in sctp_get_keylen() [all …]
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | e_camellia.c | 139 #define BLOCK_CIPHER_generic(nid, keylen, blocksize, ivlen, nmode, mode, MODE, flags) \ argument 140 static const EVP_CIPHER cmll_t4_##keylen##_##mode = { \ 141 nid##_##keylen##_##nmode, blocksize, keylen / 8, ivlen, \ 150 static const EVP_CIPHER camellia_##keylen##_##mode = { \ 151 nid##_##keylen##_##nmode, blocksize, \ 152 keylen / 8, ivlen, \ 161 const EVP_CIPHER *EVP_camellia_##keylen##_##mode(void) \ 163 return SPARC_CMLL_CAPABLE ? &cmll_t4_##keylen##_##mode : &camellia_##keylen##_##mode; \ 168 #define BLOCK_CIPHER_generic(nid, keylen, blocksize, ivlen, nmode, mode, MODE, flags) \ argument 169 static const EVP_CIPHER camellia_##keylen##_##mode = { \ [all …]
|
| H A D | e_aes.c | 148 const int keylen = EVP_CIPHER_CTX_get_key_length(ctx) * 8; in aesni_init_key() local 150 if (keylen <= 0) { in aesni_init_key() 157 ret = aesni_set_decrypt_key(key, keylen, &dat->ks.ks); in aesni_init_key() 161 ret = aesni_set_encrypt_key(key, keylen, &dat->ks.ks); in aesni_init_key() 231 const int keylen = EVP_CIPHER_CTX_get_key_length(ctx) * 8; in aesni_gcm_init_key() local 233 if (keylen <= 0) { in aesni_gcm_init_key() 237 aesni_set_encrypt_key(key, keylen, &gctx->ks.ks); in aesni_gcm_init_key() 276 const int keylen = EVP_CIPHER_CTX_get_key_length(ctx); in aesni_xts_init_key() local 277 const int bytes = keylen / 2; in aesni_xts_init_key() 280 if (keylen <= 0) { in aesni_xts_init_key() [all …]
|
| H A D | p5_crpt2.c | 24 const EVP_MD *digest, int keylen, unsigned char *out, in ossl_pkcs5_pbkdf2_hmac_ex() argument 60 if (EVP_KDF_derive(kctx, out, keylen, params) != 1) in ossl_pkcs5_pbkdf2_hmac_ex() 78 0, keylen, out, keylen); in ossl_pkcs5_pbkdf2_hmac_ex() 86 int saltlen, int iter, const EVP_MD *digest, int keylen, in PKCS5_PBKDF2_HMAC() argument 90 keylen, out, NULL, NULL); in PKCS5_PBKDF2_HMAC() 95 int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument 102 digest, keylen, out, NULL, NULL); in PKCS5_PBKDF2_HMAC_SHA1() 189 unsigned int keylen = 0; in PKCS5_v2_PBKDF2_keyivgen_ex() local 199 keylen = EVP_CIPHER_CTX_get_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen_ex() 200 OPENSSL_assert(keylen <= sizeof(key)); in PKCS5_v2_PBKDF2_keyivgen_ex() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/macs/ |
| H A D | hmac_prov.c | 58 size_t keylen; member 101 OPENSSL_clear_free(macctx->key, macctx->keylen); in hmac_free() 130 dst->key = OPENSSL_malloc(src->keylen > 0 ? src->keylen : 1); in hmac_dup() 135 if (src->keylen > 0) in hmac_dup() 136 memcpy(dst->key, src->key, src->keylen); in hmac_dup() 156 const unsigned char *key, size_t keylen) in hmac_setkey() argument 167 int approved = ossl_mac_check_key_size(keylen); in hmac_setkey() 181 OPENSSL_clear_free(macctx->key, macctx->keylen); in hmac_setkey() 183 macctx->key = OPENSSL_malloc(keylen > 0 ? keylen : 1); in hmac_setkey() 187 if (keylen > 0) in hmac_setkey() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_aes_xts_hw.c | 22 size_t bytes = keylen / 2; \ 41 size_t keylen) in cipher_hw_aes_xts_generic_initkey() argument 104 const unsigned char *key, size_t keylen) in cipher_hw_aesni_xts_initkey() argument 124 if (keylen == 64) { in cipher_hw_aesni_xts_initkey() 127 } else if (keylen == 32) { in cipher_hw_aesni_xts_initkey() 153 const unsigned char *key, size_t keylen) in cipher_hw_aes_xts_t4_initkey() argument 160 switch (keylen) { in cipher_hw_aes_xts_t4_initkey() 193 size_t keylen) in cipher_hw_aes_xts_rv64i_zknd_zkne_initkey() argument 206 PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen) in cipher_hw_aes_xts_rv64i_zvbb_zvkg_zvkned_initkey() argument 213 if (keylen * 8 == 128 * 2 || keylen * 8 == 256 * 2) { in cipher_hw_aes_xts_rv64i_zvbb_zvkg_zvkned_initkey() [all …]
|
| H A D | cipher_aes_ocb_hw.c | 22 fn_set_enc_key(key, keylen * 8, &ctx->ksenc.ks); \ 23 fn_set_dec_key(key, keylen * 8, &ctx->ksdec.ks); \ 32 size_t keylen) in cipher_hw_aes_ocb_generic_initkey() argument 64 size_t keylen) in cipher_hw_aes_ocb_aesni_initkey() argument 87 size_t keylen) in cipher_hw_aes_ocb_t4_initkey() argument 109 size_t keylen) in cipher_hw_aes_ocb_rv64i_zknd_zkne_initkey() argument 120 size_t keylen) in cipher_hw_aes_ocb_rv64i_zvkned_initkey() argument 125 if (keylen * 8 == 128 || keylen * 8 == 256) { in cipher_hw_aes_ocb_rv64i_zvkned_initkey() 157 size_t keylen) in cipher_hw_aes_ocb_rv32i_zknd_zkne_initkey() argument 168 size_t keylen) in cipher_hw_aes_ocb_rv32i_zbkb_zknd_zkne_initkey() argument
|
| H A D | cipher_aes_xts.c | 72 static int aes_xts_init(void *vctx, const unsigned char *key, size_t keylen, in aes_xts_init() argument 89 if (keylen != ctx->keylen) { in aes_xts_init() 93 if (!aes_xts_check_keys_differ(key, keylen / 2, enc)) in aes_xts_init() 95 if (!ctx->hw->init(ctx, key, keylen)) in aes_xts_init() 101 static int aes_xts_einit(void *vctx, const unsigned char *key, size_t keylen, in aes_xts_einit() argument 106 if (s390x_aes_xts_einit(vctx, key, keylen, iv, ivlen, params) == 1) in aes_xts_einit() 109 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 1); in aes_xts_einit() 112 static int aes_xts_dinit(void *vctx, const unsigned char *key, size_t keylen, in aes_xts_dinit() argument 117 if (s390x_aes_xts_dinit(vctx, key, keylen, iv, ivlen, params) == 1) in aes_xts_dinit() 120 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0); in aes_xts_dinit() [all …]
|
| /freebsd/crypto/openssl/fuzz/ |
| H A D | ml-dsa.c | 82 char **keytype, size_t *keylen, in select_keytype_and_size() argument 113 *keylen = ML_DSA_44_PUB_LEN; in select_keytype_and_size() 117 *keylen = ML_DSA_65_PUB_LEN; in select_keytype_and_size() 121 *keylen = ML_DSA_87_PUB_LEN; in select_keytype_and_size() 126 *keylen = 33; in select_keytype_and_size() 133 *keylen = (size_t)keysize; in select_keytype_and_size() 134 *keylen %= ML_DSA_87_PUB_LEN; /* size to our key buffer */ in select_keytype_and_size() 138 *keylen = 0; in select_keytype_and_size() 164 size_t keylen = 0; in create_ml_dsa_raw_key() local 169 if (!select_keytype_and_size(buf, len, &keytype, &keylen, 0)) in create_ml_dsa_raw_key() [all …]
|
| H A D | ml-kem.c | 62 char **keytype, size_t *keylen, in select_keytype_and_size() argument 94 *keylen = OSSL_ML_KEM_512_PUBLIC_KEY_BYTES; in select_keytype_and_size() 98 *keylen = OSSL_ML_KEM_768_PUBLIC_KEY_BYTES; in select_keytype_and_size() 102 *keylen = OSSL_ML_KEM_1024_PUBLIC_KEY_BYTES; in select_keytype_and_size() 107 *keylen = 13; in select_keytype_and_size() 114 *keylen = (size_t)keysize; in select_keytype_and_size() 115 *keylen %= 1024; /* size to our key buffer */ in select_keytype_and_size() 119 *keylen = 0; in select_keytype_and_size() 145 size_t keylen = 0; in create_mlkem_raw_key() local 149 if (!select_keytype_and_size(buf, len, &keytype, &keylen, 0)) in create_mlkem_raw_key() [all …]
|
| /freebsd/contrib/libarchive/libarchive/ |
| H A D | archive_blake2.h | 148 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 154 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 160 int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ); 165 int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen ); 171 int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen ); 176 int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen ); 181 … blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); 182 … blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); 184 …blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); 185 …blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); [all …]
|
| H A D | archive_blake2sp_ref.c | 45 static int blake2sp_init_leaf( blake2s_state *S, size_t outlen, size_t keylen, uint32_t offset ) in blake2sp_init_leaf() argument 49 P->key_length = (uint8_t)keylen; in blake2sp_init_leaf() 62 static int blake2sp_init_root( blake2s_state *S, size_t outlen, size_t keylen ) in blake2sp_init_root() argument 66 P->key_length = (uint8_t)keylen; in blake2sp_init_root() 101 int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ) in blake2sp_init_key() argument 107 if( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp_init_key() 113 if( blake2sp_init_root( S->R, outlen, keylen ) < 0 ) in blake2sp_init_key() 117 if( blake2sp_init_leaf( S->S[i], outlen, keylen, (uint32_t)i ) < 0 ) return -1; in blake2sp_init_key() 124 memcpy( block, key, keylen ); in blake2sp_init_key() 216 … blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ) in blake2sp() argument [all …]
|
| /freebsd/crypto/openssl/crypto/cms/ |
| H A D | cms_enc.c | 137 ec->keylen = tkeylen; in ossl_cms_EncryptedContent_init_bio() 145 if (ec->keylen != tkeylen) { in ossl_cms_EncryptedContent_init_bio() 147 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) { in ossl_cms_EncryptedContent_init_bio() 157 OPENSSL_clear_free(ec->key, ec->keylen); in ossl_cms_EncryptedContent_init_bio() 159 ec->keylen = tkeylen; in ossl_cms_EncryptedContent_init_bio() 199 OPENSSL_clear_free(ec->key, ec->keylen); in ossl_cms_EncryptedContent_init_bio() 211 const unsigned char *key, size_t keylen, in ossl_cms_EncryptedContent_init() argument 216 if ((ec->key = OPENSSL_malloc(keylen)) == NULL) in ossl_cms_EncryptedContent_init() 218 memcpy(ec->key, key, keylen); in ossl_cms_EncryptedContent_init() 220 ec->keylen = keylen; in ossl_cms_EncryptedContent_init() [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | bcrypt_pbkdf.c | 115 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 124 size_t origkeylen = keylen; in bcrypt_pbkdf() 129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 130 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 134 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 135 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 143 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 166 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 173 keylen -= i; in bcrypt_pbkdf() 185 arc4random_buf(key, keylen); in bcrypt_pbkdf()
|
| /freebsd/contrib/unbound/sldns/ |
| H A D | keyraw.c | 537 sldns_gost2pkey_raw(unsigned char* key, size_t keylen) in sldns_gost2pkey_raw() argument 546 if(keylen != 64) { in sldns_gost2pkey_raw() 562 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument 574 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 577 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() 582 if(keylen+1 > sizeof(buf)) { /* sanity check */ in sldns_ecdsa2pkey_raw() 587 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw() 594 !OSSL_PARAM_BLD_push_octet_string(param_bld, "pub", buf, keylen+1)) { in sldns_ecdsa2pkey_raw() 626 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 629 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() [all …]
|
| /freebsd/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_mutl.c | 27 int id, int iter, int keylen, 64 int iter, int keylen, unsigned char *key, in pkcs12_gen_gost_mac_key() argument 69 if (keylen != TK26_MAC_KEY_LEN) { in pkcs12_gen_gost_mac_key() 116 int keylen = 0; in PBMAC1_PBKDF2_HMAC() local 149 keylen = ASN1_INTEGER_get(pbkdf2_param->keylength); in PBMAC1_PBKDF2_HMAC() 150 if (keylen <= 0 || keylen > EVP_MAX_MD_SIZE) { in PBMAC1_PBKDF2_HMAC() 156 ASN1_INTEGER_get(pbkdf2_param->iter), kdf_md, keylen, key) in PBMAC1_PBKDF2_HMAC() 161 ret = keylen; in PBMAC1_PBKDF2_HMAC() 187 int keylen = 0; in pkcs12_gen_mac() local 230 keylen = EVP_MD_get_size(md); in pkcs12_gen_mac() [all …]
|