/freebsd/crypto/openssl/test/ |
H A D | evp_libctx_test.c | 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; in kem_rsa_gen_recover() local 542 &secretlen), 1) in kem_rsa_gen_recover() 543 && TEST_int_eq(ctlen, secretlen) in kem_rsa_gen_recover() 546 &secretlen), 1) in kem_rsa_gen_recover() 556 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); in kem_rsa_gen_recover() 562 &secretlen), 0)) in kem_rsa_gen_recover() 613 size_t ctlen = 0, secretlen = 0; in kem_rsa_params() local 631 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, in kem_rsa_params() 636 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) in kem_rsa_params() 648 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, NULL, NULL, &secretlen), 1) in kem_rsa_params() [all …]
|
H A D | tls-provider.c | 269 static int xor_derive(void *vpxorctx, unsigned char *secret, size_t *secretlen, in xor_derive() 278 *secretlen = XOR_KEY_SIZE; in xor_derive() 263 xor_derive(void * vpxorctx,unsigned char * secret,size_t * secretlen,size_t outlen) xor_derive() argument
|
/freebsd/crypto/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 246 unsigned char *secret, size_t *secretlen) in rsasve_generate() argument 259 if (outlen == NULL && secretlen == NULL) in rsasve_generate() 263 if (secretlen != NULL) in rsasve_generate() 264 *secretlen = nlen; in rsasve_generate() 291 if (secretlen != NULL) in rsasve_generate() 292 *secretlen = nlen; in rsasve_generate() 366 unsigned char *secret, size_t *secretlen) in rsakem_generate() argument 372 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_decapsulate.pod | 59 size_t secretlen = 0; 73 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 76 secret = OPENSSL_malloc(secretlen); 80 /* Decapsulated secret data is secretlen bytes long */ 81 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|
H A D | EVP_PKEY_encapsulate.pod | 65 size_t secretlen = 0, outlen = 0; 78 if (EVP_PKEY_encapsulate(ctx, NULL, &outlen, NULL, &secretlen) <= 0) 82 secret = OPENSSL_malloc(secretlen); 91 if (EVP_PKEY_encapsulate(ctx, out, &outlen, secret, &secretlen) <= 0)
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
H A D | argon2-core.c | 295 if (0 != context->secretlen) { in validate_inputs() 299 if (ARGON2_MIN_SECRET > context->secretlen) { in validate_inputs() 303 if (ARGON2_MAX_SECRET < context->secretlen) { in validate_inputs() 445 STORE32_LE(value, context->secretlen); in initial_hash() 451 &BlakeHash, (const uint8_t *) context->secret, context->secretlen); in initial_hash() 454 sodium_memzero(context->secret, context->secretlen); in initial_hash() 455 context->secretlen = 0; in initial_hash()
|
H A D | argon2.c | 120 context.secretlen = 0; in argon2_hash() 215 ctx.secretlen = 0; in argon2_verify()
|
H A D | argon2.h | 174 uint32_t secretlen; /* key length */ member
|
H A D | pwhash_argon2i.c | 263 ctx.adlen = ctx.secretlen = 0U; in _needs_rehash()
|
/freebsd/crypto/openssl/providers/implementations/exchange/ |
H A D | dh_exch.c | 143 unsigned char *secret, size_t *secretlen, in dh_plain_derive() argument 158 *secretlen = dhsize; in dh_plain_derive() 174 *secretlen = ret; in dh_plain_derive() 179 size_t *secretlen, size_t outlen) in dh_X9_42_kdf_derive() argument 187 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive() 215 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive()
|
H A D | kdf_exch.c | 98 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() 111 *secretlen = kdfsize; in kdf_derive() 127 *secretlen = outlen; in kdf_freectx() 94 kdf_derive(void * vpkdfctx,unsigned char * secret,size_t * secretlen,size_t outlen) kdf_derive() argument
|
H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 138 *secretlen = ecxctx->keylen; in ecx_derive() 180 *secretlen = ecxctx->keylen; in ecx_derive()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | kem.c | 188 unsigned char *secret, size_t *secretlen) in EVP_PKEY_encapsulate() argument 207 out, outlen, secret, secretlen); in EVP_PKEY_encapsulate() 216 unsigned char *secret, size_t *secretlen, in EVP_PKEY_decapsulate() argument 221 || (secret == NULL && secretlen == NULL)) in EVP_PKEY_decapsulate() 234 secret, secretlen, in, inlen); in EVP_PKEY_decapsulate()
|
/freebsd/crypto/openssh/ |
H A D | kexgex.c | 59 const u_char *shared_secret, size_t secretlen, in kexgex_hash() argument 86 (r = sshbuf_put(b, shared_secret, secretlen)) != 0) { in kexgex_hash()
|
/freebsd/contrib/tcpdump/ |
H A D | print-esp.c | 113 int secretlen; member 471 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo() 472 if(sa->secretlen == 0) return 0; in espprint_decode_encalgo() 478 sa->secretlen = i; in espprint_decode_encalgo() 481 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-kem.pod | 29 unsigned char *secret, size_t *secretlen); 138 I<*secretlen>. 142 written to I<*secretlen>.
|
H A D | provider-keyexch.pod | 29 int OSSL_FUNC_keyexch_derive(void *ctx, unsigned char *secret, size_t *secretlen, 132 The length of the shared secret should be written to I<*secretlen>. 134 written to I<*secretlen>.
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | core_dispatch.h | 664 size_t *secretlen, size_t outlen)) 825 size_t *secretlen))
|