/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_auth.c | 249 sctp_alloc_key(uint32_t keylen) in sctp_alloc_key() argument 253 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, in sctp_alloc_key() 259 new_key->keylen = keylen; in sctp_alloc_key() 279 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_print_key() 280 if (key->keylen) { in sctp_print_key() 281 for (i = 0; i < key->keylen; i++) in sctp_print_key() 298 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_show_key() 299 if (key->keylen) { in sctp_show_key() 300 for (i = 0; i < key->keylen; i++) in sctp_show_key() 312 return (key->keylen); in sctp_get_keylen() [all …]
|
/third_party/python/Modules/_blake2/impl/ |
D | blake2-dispatch.c | 159 int blake2b_init_key_ref( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 163 …b_ref( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 168 int blake2b_init_key_sse2( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 172 …_sse2( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 175 int blake2b_init_key_ssse3( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 179 …ssse3( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 182 int blake2b_init_key_sse41( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 186 …sse41( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 189 int blake2b_init_key_avx( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 193 …b_avx( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); [all …]
|
D | blake2bp.c | 28 static int blake2bp_init_leaf( blake2b_state *S, uint8_t outlen, uint8_t keylen, uint64_t offset ) in blake2bp_init_leaf() argument 32 P->key_length = keylen; in blake2bp_init_leaf() 47 static int blake2bp_init_root( blake2b_state *S, uint8_t outlen, uint8_t keylen ) in blake2bp_init_root() argument 51 P->key_length = keylen; in blake2bp_init_root() 86 int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen ) in blake2bp_init_key() argument 90 if( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2bp_init_key() 95 if( blake2bp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2bp_init_key() 99 if( blake2bp_init_leaf( S->S[i], ( uint8_t ) outlen, ( uint8_t ) keylen, i ) < 0 ) in blake2bp_init_key() 108 memcpy( block, key, keylen ); in blake2bp_init_key() 196 …ake2bp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2bp() argument [all …]
|
D | blake2sp.c | 27 static int blake2sp_init_leaf( blake2s_state *S, uint8_t outlen, uint8_t keylen, uint64_t offset ) in blake2sp_init_leaf() argument 31 P->key_length = keylen; in blake2sp_init_leaf() 45 static int blake2sp_init_root( blake2s_state *S, uint8_t outlen, uint8_t keylen ) in blake2sp_init_root() argument 49 P->key_length = keylen; in blake2sp_init_root() 83 int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ) in blake2sp_init_key() argument 87 if( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp_init_key() 92 if( blake2sp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2sp_init_key() 96 if( blake2sp_init_leaf( S->S[i], ( uint8_t ) outlen, ( uint8_t ) keylen, i ) < 0 ) in blake2sp_init_key() 105 memcpy( block, key, keylen ); in blake2sp_init_key() 194 …ake2sp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2sp() argument [all …]
|
/third_party/libwebsockets/lib/core/ |
D | lws_map.c | 41 size_t keylen; member 180 const lws_map_key_t key, size_t keylen, in lws_map_item_create() argument 189 item = lws_map_item_lookup(map, key, keylen); in lws_map_item_create() 193 item = map->info._alloc(map, sizeof(*item) + keylen + valuelen); in lws_map_item_create() 198 item->keylen = keylen; in lws_map_item_create() 202 memcpy(u, key, keylen); in lws_map_item_create() 203 u += keylen; in lws_map_item_create() 207 h = map->info._hash(key, keylen); in lws_map_item_create() 228 lws_map_item_lookup(lws_map_t *map, const lws_map_key_t key, size_t keylen) in lws_map_item_lookup() argument 230 lws_map_hash_t h = map->info._hash(key, keylen); in lws_map_item_lookup() [all …]
|
/third_party/node/lib/internal/crypto/ |
D | pbkdf2.js | 33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument 39 ({ password, salt, iterations, keylen, digest } = 40 check(password, salt, iterations, keylen, digest)); 49 keylen, 65 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument 66 ({ password, salt, iterations, keylen, digest } = 67 check(password, salt, iterations, keylen, digest)); 74 keylen, 86 function check(password, salt, iterations, keylen, digest) { argument 94 validateInt32(keylen, 'keylen', 0); [all …]
|
D | scrypt.js | 41 function scrypt(password, salt, keylen, options, callback = defaults) { argument 47 options = check(password, salt, keylen, options); 49 ({ password, salt, keylen } = options); 54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen); 69 function scryptSync(password, salt, keylen, options = defaults) { argument 70 options = check(password, salt, keylen, options); 72 ({ password, salt, keylen } = options); 74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen); 85 function check(password, salt, keylen, options) { argument 91 validateInt32(keylen, 'keylen', 0); [all …]
|
/third_party/openssl/crypto/evp/ |
D | e_camellia.c | 142 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument 143 static const EVP_CIPHER cmll_t4_##keylen##_##mode = { \ 144 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 152 static const EVP_CIPHER camellia_##keylen##_##mode = { \ 153 nid##_##keylen##_##nmode,blocksize, \ 154 keylen/8,ivlen, \ 162 const EVP_CIPHER *EVP_camellia_##keylen##_##mode(void) \ 163 { return SPARC_CMLL_CAPABLE?&cmll_t4_##keylen##_##mode:&camellia_##keylen##_##mode; } 167 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument 168 static const EVP_CIPHER camellia_##keylen##_##mode = { \ [all …]
|
D | p5_crpt2.c | 24 const EVP_MD *digest, int keylen, unsigned char *out, in ossl_pkcs5_pbkdf2_hmac_ex() argument 60 if (EVP_KDF_derive(kctx, out, keylen, params) != 1) in ossl_pkcs5_pbkdf2_hmac_ex() 77 0, keylen, out, keylen); in ossl_pkcs5_pbkdf2_hmac_ex() 84 int saltlen, int iter, const EVP_MD *digest, int keylen, in PKCS5_PBKDF2_HMAC() argument 88 keylen, out, NULL, NULL); in PKCS5_PBKDF2_HMAC() 94 int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument 101 digest, keylen, out, NULL, NULL); in PKCS5_PBKDF2_HMAC_SHA1() 188 unsigned int keylen = 0; in PKCS5_v2_PBKDF2_keyivgen_ex() local 198 keylen = EVP_CIPHER_CTX_get_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen_ex() 199 OPENSSL_assert(keylen <= sizeof(key)); in PKCS5_v2_PBKDF2_keyivgen_ex() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
D | e_camellia.c | 142 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument 143 static const EVP_CIPHER cmll_t4_##keylen##_##mode = { \ 144 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 152 static const EVP_CIPHER camellia_##keylen##_##mode = { \ 153 nid##_##keylen##_##nmode,blocksize, \ 154 keylen/8,ivlen, \ 162 const EVP_CIPHER *EVP_camellia_##keylen##_##mode(void) \ 163 { return SPARC_CMLL_CAPABLE?&cmll_t4_##keylen##_##mode:&camellia_##keylen##_##mode; } 167 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument 168 static const EVP_CIPHER camellia_##keylen##_##mode = { \ [all …]
|
D | p5_crpt2.c | 24 const EVP_MD *digest, int keylen, unsigned char *out, in ossl_pkcs5_pbkdf2_hmac_ex() argument 60 if (EVP_KDF_derive(kctx, out, keylen, params) != 1) in ossl_pkcs5_pbkdf2_hmac_ex() 77 0, keylen, out, keylen); in ossl_pkcs5_pbkdf2_hmac_ex() 84 int saltlen, int iter, const EVP_MD *digest, int keylen, in PKCS5_PBKDF2_HMAC() argument 88 keylen, out, NULL, NULL); in PKCS5_PBKDF2_HMAC() 94 int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument 101 digest, keylen, out, NULL, NULL); in PKCS5_PBKDF2_HMAC_SHA1() 188 unsigned int keylen = 0; in PKCS5_v2_PBKDF2_keyivgen_ex() local 198 keylen = EVP_CIPHER_CTX_get_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen_ex() 199 OPENSSL_assert(keylen <= sizeof(key)); in PKCS5_v2_PBKDF2_keyivgen_ex() [all …]
|
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
D | ecx_exch.c | 39 size_t keylen; member 44 static void *ecx_newctx(void *provctx, size_t keylen) in ecx_newctx() argument 57 ctx->keylen = keylen; in ecx_newctx() 83 || key->keylen != ecxctx->keylen in ecx_init() 105 || key->keylen != ecxctx->keylen in ecx_set_peer() 131 if (!ossl_assert(ecxctx->keylen == X25519_KEYLEN in ecx_derive() 132 || ecxctx->keylen == X448_KEYLEN)) { in ecx_derive() 138 *secretlen = ecxctx->keylen; in ecx_derive() 141 if (outlen < ecxctx->keylen) { in ecx_derive() 146 if (ecxctx->keylen == X25519_KEYLEN) { in ecx_derive() [all …]
|
/third_party/openssl/providers/implementations/exchange/ |
D | ecx_exch.c | 39 size_t keylen; member 44 static void *ecx_newctx(void *provctx, size_t keylen) in ecx_newctx() argument 57 ctx->keylen = keylen; in ecx_newctx() 83 || key->keylen != ecxctx->keylen in ecx_init() 105 || key->keylen != ecxctx->keylen in ecx_set_peer() 131 if (!ossl_assert(ecxctx->keylen == X25519_KEYLEN in ecx_derive() 132 || ecxctx->keylen == X448_KEYLEN)) { in ecx_derive() 138 *secretlen = ecxctx->keylen; in ecx_derive() 141 if (outlen < ecxctx->keylen) { in ecx_derive() 146 if (ecxctx->keylen == X25519_KEYLEN) { in ecx_derive() [all …]
|
/third_party/ffmpeg/libavutil/ |
D | hmac.c | 51 int keylen; member 145 void av_hmac_init(AVHMAC *c, const uint8_t *key, unsigned int keylen) in av_hmac_init() argument 149 if (keylen > c->blocklen) { in av_hmac_init() 151 c->update(c->hash, key, keylen); in av_hmac_init() 153 c->keylen = c->hashlen; in av_hmac_init() 155 memcpy(c->key, key, keylen); in av_hmac_init() 156 c->keylen = keylen; in av_hmac_init() 159 for (i = 0; i < c->keylen; i++) in av_hmac_init() 161 for (i = c->keylen; i < c->blocklen; i++) in av_hmac_init() 179 for (i = 0; i < c->keylen; i++) in av_hmac_final() [all …]
|
/third_party/openssl/providers/implementations/macs/ |
D | hmac_prov.c | 53 size_t keylen; member 97 OPENSSL_secure_clear_free(macctx->key, macctx->keylen); in hmac_free() 127 dst->key = OPENSSL_secure_malloc(src->keylen > 0 ? src->keylen : 1); in hmac_dup() 132 memcpy(dst->key, src->key, src->keylen); in hmac_dup() 152 const unsigned char *key, size_t keylen) in hmac_setkey() argument 157 OPENSSL_secure_clear_free(macctx->key, macctx->keylen); in hmac_setkey() 159 macctx->key = OPENSSL_secure_malloc(keylen > 0 ? keylen : 1); in hmac_setkey() 162 memcpy(macctx->key, key, keylen); in hmac_setkey() 163 macctx->keylen = keylen; in hmac_setkey() 168 return HMAC_Init_ex(macctx->ctx, key, keylen, digest, in hmac_setkey() [all …]
|
/third_party/node/deps/openssl/openssl/providers/implementations/macs/ |
D | hmac_prov.c | 53 size_t keylen; member 97 OPENSSL_secure_clear_free(macctx->key, macctx->keylen); in hmac_free() 127 dst->key = OPENSSL_secure_malloc(src->keylen > 0 ? src->keylen : 1); in hmac_dup() 132 memcpy(dst->key, src->key, src->keylen); in hmac_dup() 152 const unsigned char *key, size_t keylen) in hmac_setkey() argument 157 OPENSSL_secure_clear_free(macctx->key, macctx->keylen); in hmac_setkey() 159 macctx->key = OPENSSL_secure_malloc(keylen > 0 ? keylen : 1); in hmac_setkey() 162 memcpy(macctx->key, key, keylen); in hmac_setkey() 163 macctx->keylen = keylen; in hmac_setkey() 168 return HMAC_Init_ex(macctx->ctx, key, keylen, digest, in hmac_setkey() [all …]
|
/third_party/openssl/crypto/cms/ |
D | cms_enc.c | 133 ec->keylen = tkeylen; in ossl_cms_EncryptedContent_init_bio() 142 if (ec->keylen != tkeylen) { in ossl_cms_EncryptedContent_init_bio() 144 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) { in ossl_cms_EncryptedContent_init_bio() 154 OPENSSL_clear_free(ec->key, ec->keylen); in ossl_cms_EncryptedContent_init_bio() 156 ec->keylen = tkeylen; in ossl_cms_EncryptedContent_init_bio() 196 OPENSSL_clear_free(ec->key, ec->keylen); in ossl_cms_EncryptedContent_init_bio() 208 const unsigned char *key, size_t keylen, in ossl_cms_EncryptedContent_init() argument 213 if ((ec->key = OPENSSL_malloc(keylen)) == NULL) { in ossl_cms_EncryptedContent_init() 217 memcpy(ec->key, key, keylen); in ossl_cms_EncryptedContent_init() 219 ec->keylen = keylen; in ossl_cms_EncryptedContent_init() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
D | cms_enc.c | 133 ec->keylen = tkeylen; in ossl_cms_EncryptedContent_init_bio() 142 if (ec->keylen != tkeylen) { in ossl_cms_EncryptedContent_init_bio() 144 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) { in ossl_cms_EncryptedContent_init_bio() 154 OPENSSL_clear_free(ec->key, ec->keylen); in ossl_cms_EncryptedContent_init_bio() 156 ec->keylen = tkeylen; in ossl_cms_EncryptedContent_init_bio() 196 OPENSSL_clear_free(ec->key, ec->keylen); in ossl_cms_EncryptedContent_init_bio() 208 const unsigned char *key, size_t keylen, in ossl_cms_EncryptedContent_init() argument 213 if ((ec->key = OPENSSL_malloc(keylen)) == NULL) { in ossl_cms_EncryptedContent_init() 217 memcpy(ec->key, key, keylen); in ossl_cms_EncryptedContent_init() 219 ec->keylen = keylen; in ossl_cms_EncryptedContent_init() [all …]
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpmac_common.txt | 48 Input = "Sample message for keylen=blocklen" 56 Input = "Sample message for keylen<blocklen" 63 Input = "Sample message for keylen=blocklen" 72 Input = "Sample message for keylen=blocklen" 80 Input = "Sample message for keylen<blocklen" 86 Input = "Sample message for keylen=blocklen" 92 Input = "Sample message for keylen=blocklen" 100 Input = "Sample message for keylen<blocklen" 106 Input = "Sample message for keylen=blocklen" 112 Input = "Sample message for keylen=blocklen" [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-dhe.js | 55 function test(dhparam, keylen, expectedCipher) { argument 71 assert(keylen === null || 72 stdout.includes(`Server Temp Key: DH, ${keylen} bits`)); 81 function testCustomParam(keylen, expectedCipher) { argument 82 const dhparam = loadDHParam(keylen); 83 if (keylen === 'error') keylen = null; 84 return test(dhparam, keylen, expectedCipher);
|
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
D | cipher_tdes_common.c | 64 static int tdes_init(void *vctx, const unsigned char *key, size_t keylen, in tdes_init() argument 89 if (keylen != ctx->keylen) { in tdes_init() 93 if (!ctx->hw->init(ctx, key, ctx->keylen)) in tdes_init() 99 int ossl_tdes_einit(void *vctx, const unsigned char *key, size_t keylen, in ossl_tdes_einit() argument 103 return tdes_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_tdes_einit() 106 int ossl_tdes_dinit(void *vctx, const unsigned char *key, size_t keylen, in ossl_tdes_dinit() argument 110 return tdes_init(vctx, key, keylen, iv, ivlen, params, 0); in ossl_tdes_dinit() 121 size_t kl = ctx->keylen;
|
D | cipher_aes_xts.c | 68 static int aes_xts_init(void *vctx, const unsigned char *key, size_t keylen, in aes_xts_init() argument 85 if (keylen != ctx->keylen) { in aes_xts_init() 89 if (!aes_xts_check_keys_differ(key, keylen / 2, enc)) in aes_xts_init() 91 if (!ctx->hw->init(ctx, key, keylen)) in aes_xts_init() 97 static int aes_xts_einit(void *vctx, const unsigned char *key, size_t keylen, in aes_xts_einit() argument 101 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 1); in aes_xts_einit() 104 static int aes_xts_dinit(void *vctx, const unsigned char *key, size_t keylen, in aes_xts_dinit() argument 108 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0); in aes_xts_dinit() 241 size_t keylen; in aes_xts_set_ctx_params() local 243 if (!OSSL_PARAM_get_size_t(p, &keylen)) { in aes_xts_set_ctx_params() [all …]
|
/third_party/openssl/providers/implementations/ciphers/ |
D | cipher_tdes_common.c | 64 static int tdes_init(void *vctx, const unsigned char *key, size_t keylen, in tdes_init() argument 89 if (keylen != ctx->keylen) { in tdes_init() 93 if (!ctx->hw->init(ctx, key, ctx->keylen)) in tdes_init() 99 int ossl_tdes_einit(void *vctx, const unsigned char *key, size_t keylen, in ossl_tdes_einit() argument 103 return tdes_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_tdes_einit() 106 int ossl_tdes_dinit(void *vctx, const unsigned char *key, size_t keylen, in ossl_tdes_dinit() argument 110 return tdes_init(vctx, key, keylen, iv, ivlen, params, 0); in ossl_tdes_dinit() 121 size_t kl = ctx->keylen;
|
/third_party/openssl/crypto/asn1/ |
D | p5_scrypt.c | 34 size_t keylen, uint64_t N, uint64_t r, 48 size_t keylen = 0; in PKCS5_pbe2_set_scrypt() local 106 keylen = EVP_CIPHER_get_key_length(cipher); in PKCS5_pbe2_set_scrypt() 112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 148 size_t keylen, uint64_t N, uint64_t r, in pkcs5_scrypt_set() argument 178 if (keylen > 0) { in pkcs5_scrypt_set() 182 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) in pkcs5_scrypt_set() 219 size_t keylen = 0; in PKCS5_v2_scrypt_keyivgen_ex() local 242 keylen = t; in PKCS5_v2_scrypt_keyivgen_ex() 249 || (spkeylen != keylen)) { in PKCS5_v2_scrypt_keyivgen_ex() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
D | p5_scrypt.c | 34 size_t keylen, uint64_t N, uint64_t r, 48 size_t keylen = 0; in PKCS5_pbe2_set_scrypt() local 106 keylen = EVP_CIPHER_get_key_length(cipher); in PKCS5_pbe2_set_scrypt() 112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 148 size_t keylen, uint64_t N, uint64_t r, in pkcs5_scrypt_set() argument 178 if (keylen > 0) { in pkcs5_scrypt_set() 182 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) in pkcs5_scrypt_set() 219 size_t keylen = 0; in PKCS5_v2_scrypt_keyivgen_ex() local 242 keylen = t; in PKCS5_v2_scrypt_keyivgen_ex() 249 || (spkeylen != keylen)) { in PKCS5_v2_scrypt_keyivgen_ex() [all …]
|