Searched refs:key_len (Results 26 - 50 of 134) sorted by relevance

123456

/freebsd-10.2-release/contrib/wpa/src/crypto/
H A Dsha1-tprf.c18 * @key_len: Length of the key in bytes
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
H A Daes-gcm.c175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument
179 aes = aes_encrypt_init(key, key_len);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
263 aes = aes_gcm_init_hash_subkey(key, key_len, H);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
297 aes = aes_gcm_init_hash_subkey(key, key_len, H);
322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
H A Dcrypto_gnutls.c197 size_t key_len)
216 if (key_len == 24)
218 else if (key_len == 32)
236 if (key_len == 5)
253 if (gcry_cipher_setkey(ctx->enc, key, key_len) != GPG_ERR_NO_ERROR ||
254 gcry_cipher_setkey(ctx->dec, key, key_len) != GPG_ERR_NO_ERROR) {
195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
H A Dcrypto_openssl.c355 size_t key_len)
372 switch (key_len) {
409 !EVP_CIPHER_CTX_set_key_length(&ctx->enc, key_len) ||
419 !EVP_CIPHER_CTX_set_key_length(&ctx->dec, key_len) ||
596 size_t key_len)
629 HMAC_Init_ex(&ctx->ctx, key, key_len, md, NULL);
631 if (HMAC_Init_ex(&ctx->ctx, key, key_len, md, NULL) != 1) {
698 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument
708 HMAC_Init_ex(&ctx, key, key_len, EVP_sha1(), NULL);
710 if (HMAC_Init_ex(&ctx, key, key_len, EVP_sha
353 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
595 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) argument
730 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
739 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
771 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Daes-ccm.c148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, argument
159 aes = aes_encrypt_init(key, key_len);
178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, argument
190 aes = aes_encrypt_init(key, key_len);
H A Dcrypto_cryptoapi.c353 size_t key_len)
384 key_blob.len = key_len;
385 if (key_len > sizeof(key_blob.key))
387 os_memcpy(key_blob.key, key, key_len);
509 size_t key_len)
522 key_blob.len = key_len;
523 if (key_len > sizeof(key_blob.key))
525 os_memcpy(key_blob.key, key, key_len);
529 if (key_len == 32)
531 else if (key_len
352 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) argument
507 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
[all...]
/freebsd-10.2-release/contrib/wpa/src/eap_common/
H A Deap_pax_common.h79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
83 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
H A Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
H A Dikev2_common.h258 size_t key_len; member in struct:ikev2_integ_alg
264 size_t key_len; member in struct:ikev2_prf_alg
270 size_t key_len; member in struct:ikev2_encr_alg
275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
H A Dikev2_common.c56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, argument
63 if (key_len != 20)
65 hmac_sha1(key, key_len, data, data_len, tmphash);
69 if (key_len != 16)
71 hmac_md5(key, key_len, data, data_len, tmphash);
95 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, argument
101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash);
104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash);
114 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, argument
144 res = ikev2_prf_hash(alg, key, key_len,
189 ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *plain, u8 *crypt, size_t len) argument
248 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
/freebsd-10.2-release/crypto/openssl/crypto/hmac/
H A Dhmactest.c84 int key_len; member in struct:test_st
155 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
161 test[i].key, test[i].key_len,
199 if (HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, NULL, NULL)) {
214 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) {
241 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha256(), NULL)) {
263 if (!HMAC_Init_ex(&ctx, test[6].key, test[6].key_len, NULL, NULL)) {
288 if (!HMAC_Init_ex(&ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) {
H A Dhmac.h98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
/freebsd-10.2-release/secure/lib/libcrypt/
H A Dcrypt-blowfish.c144 size_t key_len; local
207 key_len = (u_int8_t)(strlen(key) + (minr >= 'a' ? 1 : 0));
211 * type, so cap key_len at the actual maximum supported
213 key_len = strlen(key);
214 if (key_len > 72)
215 key_len = 72;
216 key_len++; /* include the NUL */
222 (const u_int8_t *) key, key_len);
224 Blowfish_expand0state(&state, (const u_int8_t *) key, key_len);
/freebsd-10.2-release/contrib/ntp/sntp/tests/
H A DpacketProcessing.c16 void PrepareAuthenticationTest(int key_id,int key_len,const char* type,const void* key_seq);
17 void PrepareAuthenticationTestMD5(int key_id,int key_len,const void* key_seq);
65 int key_len,
78 key_ptr->key_len = key_len;
81 TEST_ASSERT_TRUE(key_len < sizeof(key_ptr->key_seq));
83 memcpy(key_ptr->key_seq, key_seq, key_ptr->key_len);
91 int key_len,
95 PrepareAuthenticationTest(key_id, key_len, "MD5", key_seq);
63 PrepareAuthenticationTest( int key_id, int key_len, const char * type, const void * key_seq ) argument
89 PrepareAuthenticationTestMD5( int key_id, int key_len, const void * key_seq ) argument
/freebsd-10.2-release/contrib/ntp/sntp/
H A Dcrypto.c23 if (cmp_key->key_len > 64)
33 EVP_DigestUpdate(ctx, (const u_char *)cmp_key->key_seq, (u_int)cmp_key->key_len);
141 act->key_len = len;
149 act->key_len = len >> 1;
/freebsd-10.2-release/contrib/wpa/src/common/
H A Dprivsep_commands.h53 size_t key_len; member in struct:privsep_cmd_set_key
/freebsd-10.2-release/crypto/openssl/engines/vendor_defns/
H A Dhw_ubsec.h97 unsigned char *key, int key_len,
106 unsigned char *key, int key_len,
/freebsd-10.2-release/crypto/openssl/crypto/evp/
H A De_aes.c230 ret = aesni_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data);
235 ret = aesni_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data);
301 aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks);
338 /* key_len is two AES keys */
340 aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1);
344 aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1);
349 aesni_set_encrypt_key(key + ctx->key_len / 2,
350 ctx->key_len * 4, &xctx->ks2);
375 aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks);
484 ret = AES_set_decrypt_key(key, ctx->key_len *
[all...]
H A Devp_key.c129 nkey = type->key_len;
188 rv = type->key_len;
H A De_camellia.c103 ret = Camellia_set_key(key, ctx->key_len * 8, ctx->cipher_data);
/freebsd-10.2-release/crypto/openssh/
H A Dmac.c58 int key_len; /* just for UMAC */ member in struct:macalg
120 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg);
123 mac->key_len = macalg->key_len / 8;
157 ssh_hmac_init(mac->hmac_ctx, mac->key, mac->key_len) < 0)
H A Dcipher-bf1.c106 ssh1_bf.key_len = 32;
H A Dcipher.c65 u_int key_len; member in struct:Cipher
142 return (c->key_len);
294 if (keylen < cipher->key_len)
309 if (type->key_len > 0 && type->key_len != keylen) {
311 type->key_len, keylen);
312 type->key_len = keylen;
/freebsd-10.2-release/contrib/subversion/subversion/libsvn_subr/
H A Dcache-membuffer.c206 apr_size_t key_len; member in struct:entry_tag_t
227 apr_size_t key_len,
234 key_len,
241 tag->key_len = key_len;
279 SVN_ERR_ASSERT(lhs->key_len == rhs->key_len);
298 cache->key_len == APR_HASH_KEY_STRING \
300 : cache->key_len, \
1868 apr_ssize_t key_len; member in struct:svn_membuffer_cache_t
223 store_key_part(entry_tag_t *tag, entry_key_t prefix_hash, char *prefix_tail, const void *key, apr_size_t key_len, apr_pool_t *pool) argument
1905 combine_key(svn_membuffer_cache_t *cache, const void *key, apr_ssize_t key_len) argument
[all...]
/freebsd-10.2-release/contrib/wpa/wpa_supplicant/
H A Dwps_supplicant.c238 cred->key, cred->key_len);
260 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) {
263 (unsigned long) cred->key_len);
314 if (cred->key_len <= 0)
316 if (cred->key_len != 5 && cred->key_len != 13 &&
317 cred->key_len != 10 && cred->key_len != 26) {
319 "%lu", (unsigned long) cred->key_len);
[all...]

Completed in 316 milliseconds

123456