/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth_glue.c | 200 size_t keylen; local 207 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); 211 if (keylen > *len) 212 keylen = *len; 213 os_memcpy(msk, key, keylen); 214 *len = keylen;
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_openssl.c | 142 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 156 !EVP_CIPHER_CTX_set_key_length(&ctx, keylen) || 468 int keylen; local 483 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh); 484 if (keylen < 0) 486 wpabuf_put(res, keylen);
|
H A D | crypto.h | 456 * @keylen: RC4 key length 466 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
H A D | crypto_libtomcrypt.c | 297 size_t keylen; member in struct:crypto_cipher::__anon4325::__anon4326 341 ctx->u.rc4.keylen = key_len; 364 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 388 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
H A D | crypto_nss.c | 118 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
|
/freebsd-9.3-release/sys/net80211/ |
H A D | ieee80211_crypto_wep.c | 320 u_int off, keylen; local 332 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN; 334 j = (j + S[i] + rc4key[i % keylen]) & 0xff; 403 u_int off, keylen; local 415 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN; 417 j = (j + S[i] + rc4key[i % keylen]) & 0xff;
|
H A D | ieee80211_hostap.c | 1179 wpa_cipher(const uint8_t *sel, uint8_t *keylen) argument 1188 if (keylen) 1189 *keylen = 40 / NBBY; 1192 if (keylen) 1193 *keylen = 104 / NBBY; 1326 rsn_cipher(const uint8_t *sel, uint8_t *keylen) argument 1335 if (keylen) 1336 *keylen = 40 / NBBY; 1339 if (keylen) 1340 *keylen [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_smime.c | 216 const unsigned char *key, size_t keylen, 230 if (CMS_EncryptedData_set1_key(cms, NULL, key, keylen) <= 0) 242 size_t keylen, unsigned int flags) 252 if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen)) 634 unsigned char *key, size_t keylen, 651 CMS_RecipientInfo_set0_key(ri, key, keylen); 215 CMS_EncryptedData_decrypt(CMS_ContentInfo *cms, const unsigned char *key, size_t keylen, BIO *dcont, BIO *out, unsigned int flags) argument 240 CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen, unsigned int flags) argument 633 CMS_decrypt_set1_key(CMS_ContentInfo *cms, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen) argument
|
/freebsd-9.3-release/contrib/bind9/lib/isccfg/ |
H A D | aclconf.c | 191 unsigned int keylen; local 194 keylen = strlen(txtname); 195 isc_buffer_constinit(&buf, txtname, keylen); 196 isc_buffer_add(&buf, keylen);
|
/freebsd-9.3-release/sbin/setkey/ |
H A D | test-pfkey.c | 431 u_int keylen = strlen(str); local 434 len = sizeof(struct sadb_key) + PFKEY_ALIGN8(keylen); 437 m_key.sadb_key_bits = keylen * 8; 442 str, keylen);
|
/freebsd-9.3-release/sys/netgraph/ |
H A D | ng_mppc.c | 333 const int keylen = KEYLEN(cfg->bits); local 335 bcopy(cfg->startkey, d->key, keylen); 336 ng_mppc_getkey(cfg->startkey, d->key, keylen); 341 rc4_init(&d->rc4, d->key, keylen); 898 const int keylen = KEYLEN(bits); local 900 ng_mppc_getkey(key0, key, keylen); 901 rc4_init(rc4, key, keylen); 902 rc4_crypt(rc4, key, key, keylen); 907 rc4_init(rc4, key, keylen);
|
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | tkey.c | 396 r2.length = tkeyin->keylen; 411 tkeyout->keylen = TKEY_RANDOM_AMOUNT; 466 intoken.length = tkeyin->keylen; 536 tkeyout->keylen = isc_buffer_usedlength(outtoken); 541 tkeyout->key = isc_mem_get(tkeyout->mctx, tkeyin->keylen); 546 tkeyout->keylen = tkeyin->keylen; 547 memmove(tkeyout->key, tkeyin->key, tkeyin->keylen); 709 tkeyout.keylen = tkeyout.otherlen = 0; 827 isc_mem_put(tkeyout.mctx, tkeyout.key, tkeyout.keylen); [all...] |
/freebsd-9.3-release/sys/opencrypto/ |
H A D | cryptodev.h | 150 u_int32_t keylen; /* cipher key */ member in struct:session_op 162 u_int32_t keylen; /* cipher key */ member in struct:session2_op
|
/freebsd-9.3-release/crypto/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 139 int keylen; member in struct:__anon47 266 return (ciphers[i].keylen == len); 304 sess.keylen = ciphers[i].keylen; 479 sess->keylen = ctx->key_len; 1023 int fd, keylen; local 1031 keylen = BN_num_bits(dh->p); 1046 kop.crk_param[3].crp_nbits = keylen * 8;
|
/freebsd-9.3-release/crypto/openssl/fips/rand/ |
H A D | fips_randtest.c | 211 static void run_test(unsigned char *key, int keylen, AES_PRNG_MCT * tv) argument 217 FIPS_rand_set_key(key, keylen);
|
/freebsd-9.3-release/tools/tools/crypto/ |
H A D | cryptotest.c | 257 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2; 258 sop.key = (char *) malloc(sop.keylen); 261 for (i = 0; i < sop.keylen; i++) 282 printf(" keylen %u\n", sop.keylen); 288 printf("cipher %s keylen %u mackeylen %u\n", 289 alg->name, sop.keylen, sop.mackeylen);
|
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius.c | 948 size_t keylen; local 960 &keylen); 962 keys->send = decrypt_ms_key(key, keylen, 971 &keylen); 973 keys->recv = decrypt_ms_key(key, keylen, 989 size_t keylen; local 1000 RADIUS_CISCO_AV_PAIR, &keylen); 1001 if (key && keylen == 51 && 1003 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
|
/freebsd-9.3-release/lib/libipsec/ |
H A D | pfkey.c | 176 * keylen is the unit of bit. 182 ipsec_check_keylen(supported, alg_id, keylen) 185 u_int keylen; 202 return ipsec_check_keylen2(satype, alg_id, keylen); 208 * keylen is the unit of bit. 214 ipsec_check_keylen2(satype, alg_id, keylen) 217 u_int keylen; 225 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 237 * keylen i [all...] |
/freebsd-9.3-release/libexec/ypxfr/ |
H A D | ypxfr_main.c | 121 ypxfr_foreach(int status, char *key, int keylen, char *val, int vallen, argument 135 if (keylen) { 137 dbkey.size = keylen;
|
/freebsd-9.3-release/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 145 * @keylen: Length of the WEP key 149 const u8 *key, size_t keylen);
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 79 size_t keylen; local 83 keylen = EVP_CIPHER_key_length(c); 85 key = malloc(keylen); 127 memset(key, 0, keylen);
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | mit_glue.c | 333 size_t *keylen) 341 return krb5_enctype_keysize(context, enctype, keylen); 330 krb5_c_keylengths(krb5_context context, krb5_enctype enctype, size_t *ilen, size_t *keylen) argument
|
/freebsd-9.3-release/lib/libc/resolv/ |
H A D | res_mkupdate.c | 110 int keylen, certlen; local 583 keylen = b64_pton(buf2, buf3, sizeof(buf3)); 584 if (keylen < 0) 586 ShrinkBuffer(keylen); 587 memcpy(cp, buf3, keylen); 588 cp += keylen;
|
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_addr.c | 532 unsigned keylen; 539 keylen = 3; 541 keylen = 2; 547 if (f->addressFamily->length == keylen && 548 !memcmp(f->addressFamily->data, key, keylen)) 560 if (!ASN1_OCTET_STRING_set(f->addressFamily, key, keylen))
|
/freebsd-9.3-release/lib/libc/gen/ |
H A D | getgrent.c | 124 int keylen; member in struct:nis_state 1086 int *errnop, keylen, resultlen, rv; local 1139 &st->keylen, &result, &resultlen); 1142 keylen = st->keylen; 1144 rv = yp_next(st->domain, map, key, keylen, 1145 &st->key, &st->keylen, &result,
|