/freebsd-10.2-release/contrib/wpa/src/crypto/ |
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | aes-gcm.c | 175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument 179 aes = aes_encrypt_init(key, key_len); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 263 aes = aes_gcm_init_hash_subkey(key, key_len, H); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 297 aes = aes_gcm_init_hash_subkey(key, key_len, H); 322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
|
H A D | crypto_gnutls.c | 197 size_t key_len) 216 if (key_len == 24) 218 else if (key_len == 32) 236 if (key_len == 5) 253 if (gcry_cipher_setkey(ctx->enc, key, key_len) != GPG_ERR_NO_ERROR || 254 gcry_cipher_setkey(ctx->dec, key, key_len) != GPG_ERR_NO_ERROR) { 195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
H A D | crypto_openssl.c | 355 size_t key_len) 372 switch (key_len) { 409 !EVP_CIPHER_CTX_set_key_length(&ctx->enc, key_len) || 419 !EVP_CIPHER_CTX_set_key_length(&ctx->dec, key_len) || 596 size_t key_len) 629 HMAC_Init_ex(&ctx->ctx, key, key_len, md, NULL); 631 if (HMAC_Init_ex(&ctx->ctx, key, key_len, md, NULL) != 1) { 698 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 708 HMAC_Init_ex(&ctx, key, key_len, EVP_sha1(), NULL); 710 if (HMAC_Init_ex(&ctx, key, key_len, EVP_sha 353 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument 595 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) argument 730 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 739 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 771 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | aes-ccm.c | 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, argument 159 aes = aes_encrypt_init(key, key_len); 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, argument 190 aes = aes_encrypt_init(key, key_len);
|
H A D | crypto_cryptoapi.c | 353 size_t key_len) 384 key_blob.len = key_len; 385 if (key_len > sizeof(key_blob.key)) 387 os_memcpy(key_blob.key, key, key_len); 509 size_t key_len) 522 key_blob.len = key_len; 523 if (key_len > sizeof(key_blob.key)) 525 os_memcpy(key_blob.key, key, key_len); 529 if (key_len == 32) 531 else if (key_len 352 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) argument 507 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument [all...] |
/freebsd-10.2-release/contrib/wpa/src/eap_common/ |
H A D | eap_pax_common.h | 79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 83 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
|
H A D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
|
H A D | ikev2_common.h | 258 size_t key_len; member in struct:ikev2_integ_alg 264 size_t key_len; member in struct:ikev2_prf_alg 270 size_t key_len; member in struct:ikev2_encr_alg 275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, argument 63 if (key_len != 20) 65 hmac_sha1(key, key_len, data, data_len, tmphash); 69 if (key_len != 16) 71 hmac_md5(key, key_len, data, data_len, tmphash); 95 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, argument 101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash); 104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash); 114 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, argument 144 res = ikev2_prf_hash(alg, key, key_len, 189 ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *plain, u8 *crypt, size_t len) argument 248 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
/freebsd-10.2-release/crypto/openssl/crypto/hmac/ |
H A D | hmactest.c | 84 int key_len; member in struct:test_st 155 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 161 test[i].key, test[i].key_len, 199 if (HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, NULL, NULL)) { 214 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) { 241 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha256(), NULL)) { 263 if (!HMAC_Init_ex(&ctx, test[6].key, test[6].key_len, NULL, NULL)) { 288 if (!HMAC_Init_ex(&ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) {
|
H A D | hmac.h | 98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/freebsd-10.2-release/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 144 size_t key_len; local 207 key_len = (u_int8_t)(strlen(key) + (minr >= 'a' ? 1 : 0)); 211 * type, so cap key_len at the actual maximum supported 213 key_len = strlen(key); 214 if (key_len > 72) 215 key_len = 72; 216 key_len++; /* include the NUL */ 222 (const u_int8_t *) key, key_len); 224 Blowfish_expand0state(&state, (const u_int8_t *) key, key_len);
|
/freebsd-10.2-release/contrib/ntp/sntp/tests/ |
H A D | packetProcessing.c | 16 void PrepareAuthenticationTest(int key_id,int key_len,const char* type,const void* key_seq); 17 void PrepareAuthenticationTestMD5(int key_id,int key_len,const void* key_seq); 65 int key_len, 78 key_ptr->key_len = key_len; 81 TEST_ASSERT_TRUE(key_len < sizeof(key_ptr->key_seq)); 83 memcpy(key_ptr->key_seq, key_seq, key_ptr->key_len); 91 int key_len, 95 PrepareAuthenticationTest(key_id, key_len, "MD5", key_seq); 63 PrepareAuthenticationTest( int key_id, int key_len, const char * type, const void * key_seq ) argument 89 PrepareAuthenticationTestMD5( int key_id, int key_len, const void * key_seq ) argument
|
/freebsd-10.2-release/contrib/ntp/sntp/ |
H A D | crypto.c | 23 if (cmp_key->key_len > 64) 33 EVP_DigestUpdate(ctx, (const u_char *)cmp_key->key_seq, (u_int)cmp_key->key_len); 141 act->key_len = len; 149 act->key_len = len >> 1;
|
/freebsd-10.2-release/contrib/wpa/src/common/ |
H A D | privsep_commands.h | 53 size_t key_len; member in struct:privsep_cmd_set_key
|
/freebsd-10.2-release/crypto/openssl/engines/vendor_defns/ |
H A D | hw_ubsec.h | 97 unsigned char *key, int key_len, 106 unsigned char *key, int key_len,
|
/freebsd-10.2-release/crypto/openssl/crypto/evp/ |
H A D | e_aes.c | 230 ret = aesni_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data); 235 ret = aesni_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); 301 aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks); 338 /* key_len is two AES keys */ 340 aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1); 344 aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1); 349 aesni_set_encrypt_key(key + ctx->key_len / 2, 350 ctx->key_len * 4, &xctx->ks2); 375 aesni_set_encrypt_key(key, ctx->key_len * 8, &cctx->ks); 484 ret = AES_set_decrypt_key(key, ctx->key_len * [all...] |
H A D | evp_key.c | 129 nkey = type->key_len; 188 rv = type->key_len;
|
H A D | e_camellia.c | 103 ret = Camellia_set_key(key, ctx->key_len * 8, ctx->cipher_data);
|
/freebsd-10.2-release/crypto/openssh/ |
H A D | mac.c | 58 int key_len; /* just for UMAC */ member in struct:macalg 120 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg); 123 mac->key_len = macalg->key_len / 8; 157 ssh_hmac_init(mac->hmac_ctx, mac->key, mac->key_len) < 0)
|
H A D | cipher-bf1.c | 106 ssh1_bf.key_len = 32;
|
H A D | cipher.c | 65 u_int key_len; member in struct:Cipher 142 return (c->key_len); 294 if (keylen < cipher->key_len) 309 if (type->key_len > 0 && type->key_len != keylen) { 311 type->key_len, keylen); 312 type->key_len = keylen;
|
/freebsd-10.2-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | cache-membuffer.c | 206 apr_size_t key_len; member in struct:entry_tag_t 227 apr_size_t key_len, 234 key_len, 241 tag->key_len = key_len; 279 SVN_ERR_ASSERT(lhs->key_len == rhs->key_len); 298 cache->key_len == APR_HASH_KEY_STRING \ 300 : cache->key_len, \ 1868 apr_ssize_t key_len; member in struct:svn_membuffer_cache_t 223 store_key_part(entry_tag_t *tag, entry_key_t prefix_hash, char *prefix_tail, const void *key, apr_size_t key_len, apr_pool_t *pool) argument 1905 combine_key(svn_membuffer_cache_t *cache, const void *key, apr_ssize_t key_len) argument [all...] |
/freebsd-10.2-release/contrib/wpa/wpa_supplicant/ |
H A D | wps_supplicant.c | 238 cred->key, cred->key_len); 260 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) { 263 (unsigned long) cred->key_len); 314 if (cred->key_len <= 0) 316 if (cred->key_len != 5 && cred->key_len != 13 && 317 cred->key_len != 10 && cred->key_len != 26) { 319 "%lu", (unsigned long) cred->key_len); [all...] |