/macosx-10.9.5/curl-78.94.1/curl/lib/ |
H A D | curl_hmac.h | 59 unsigned int keylen);
|
/macosx-10.9.5/xnu-2422.115.4/EXTERNAL_HEADERS/corecrypto/ |
H A D | ccrc4.h | 34 unsigned long keylen; member in struct:ccrc4_vector
|
H A D | ccdes.h | 64 void *key, unsigned long keylen, void *ivec);
|
/macosx-10.9.5/Libinfo-449.1.3/nis.subproj/ |
H A D | ypmatch_cache.c | 80 ypmatch_add(map, key, keylen, val, vallen) 83 u_int keylen; 113 if ((ep->key = malloc(keylen)) == NULL) 122 ep->keylen = keylen; 125 (void)memcpy(ep->key, key, ep->keylen); 144 ypmatch_find(map, key, keylen, val, vallen) 147 u_int keylen; 160 if (ep->keylen != keylen) [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | rc2test.c | 43 const int keylen; member in struct:__anon794 131 RC2_set_key(&key, tests[i].keylen, tests[i].key, tests[i].bitsize);
|
H A D | pkcs12.c | 46 PKCS12_key_gen(const void *key, size_t keylen, argument 60 * keylen that is no a multiple of 2 is invalid. 62 if (keylen & 1) 96 I[(i * 2) + size_I + 1] = ((unsigned char*)key)[i % (keylen + 1)];
|
H A D | evp-crypt.c | 95 import_key(int alg, const unsigned char *key, size_t keylen) argument 102 size_t bloblen = sizeof(*key_blob) - 1 + keylen; 111 memcpy(key_blob->key, key, keylen);
|
H A D | CCDGlue.h | 132 size_t length, void *key, size_t keylen,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/ntlm/ |
H A D | apop.c | 114 size_t keylen = strlen(password); local 122 if (keylen > CC_MD5_BLOCK_BYTES) { 123 CC_MD5(password, (CC_LONG)keylen, key); 124 keylen = sizeof(keylen); 126 memcpy(key, password, keylen); 130 for (n = 0; n < keylen; n++) 139 for (n = 0; n < keylen; n++)
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/ |
H A D | CryptoAlg.h | 41 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen); 57 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/crypto/rc4/ |
H A D | rc4.c | 58 rc4_init(struct rc4_state *const state, const u_char *key, int keylen) argument 71 j += state->perm[i] + key[i % keylen];
|
/macosx-10.9.5/ntp-88/libntp/ |
H A D | authkeys.c | 30 int keylen; /* key length */ member in struct:savekey 184 cache_keylen = sk->keylen; 294 sk->keylen = 0; 353 sk->keylen = min(len, sizeof(sk->k.MD5_key)); 355 memcpy(sk->k.MD5_key, key, sk->keylen); 383 sk->keylen = min(len, sizeof(sk->k.MD5_key)); 385 memcpy(sk->k.MD5_key, key, sk->keylen); 398 sk->type, sk->keylen); 399 for (j = 0; j < sk->keylen; j++) 434 sk->keylen [all...] |
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/ |
H A D | encrypt.c | 168 int keylen; member in struct:key_info 742 kp->keylen = 0; 747 if (kp->keylen == 0) 749 kp->keylen = 0; 751 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 753 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) { 757 kp->keylen = len; 760 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 763 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); 769 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 783 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument [all...] |
/macosx-10.9.5/libtelnet-13/ |
H A D | encrypt.c | 181 int keylen; member in struct:key_info 735 kp->keylen = 0; 740 if (kp->keylen == 0) 742 kp->keylen = 0; 744 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 746 } else if ((len != kp->keylen) || 751 kp->keylen = len; 754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 757 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); 763 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 767 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | cipher.c | 226 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 244 if (keylen > 8) 245 keylen = 8; 250 if (keylen < cipher->key_len) 252 keylen, cipher->name); 262 if (type->key_len > 0 && type->key_len != keylen) { 263 debug("cipher_init: set keylen (%d -> %d)", 264 type->key_len, keylen); 265 type->key_len = keylen; 280 if (klen > 0 && keylen ! 225 cipher_init(CipherContext *cc, Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument [all...] |
/macosx-10.9.5/ruby-104/ruby/ext/openssl/lib/openssl/ |
H A D | cipher.rb | 33 %w(128 192 256).each{|keylen| 37 cipher_name = "AES-#{keylen}-#{mode}" 41 const_set("AES#{keylen}", klass)
|
/macosx-10.9.5/xnu-2422.115.4/libkern/libkern/crypto/ |
H A D | aesxts.h | 58 const uint8_t *key1, int keylen,
|
/macosx-10.9.5/ppp-727.90.1/Drivers/PPTP/PPTP-extension/ |
H A D | ppp_mppe.c | 87 int keylen; member in struct:ppp_mppe_state 194 rc4_init(&(state->rc4_state), state->session_key, state->keylen); 206 GetNewKeyFromSHA(state->master_key, state->master_key, state->keylen, state->session_key); 208 if(state->keylen == 8) { 227 state->keylen, InterimKey); 230 rc4_init(&(state->rc4_state), InterimKey, state->keylen); 233 rc4_crypt(&(state->rc4_state), InterimKey, state->session_key, state->keylen); 235 if(state->keylen == 8) 244 rc4_init(&(state->rc4_state), state->session_key, state->keylen); 373 state->keylen [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/ |
H A D | hash.c | 362 hash_calc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, argument 374 for (i = 0; i < keylen; i++) 377 for (i = 0; i < keylen; i++) 388 unsigned int keylen, isc_boolean_t case_sensitive) 391 REQUIRE(keylen <= hctx->limit); 393 return (hash_calc(hctx, key, keylen, case_sensitive)); 397 isc_hash_calc(const unsigned char *key, unsigned int keylen, argument 401 REQUIRE(keylen <= hash->limit); 403 return (hash_calc(hash, key, keylen, case_sensitive)); 387 isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive) argument
|
/macosx-10.9.5/ntp-88/lib/isc/ |
H A D | hash.c | 348 hash_calc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, argument 360 for (i = 0; i < keylen; i++) 363 for (i = 0; i < keylen; i++) 374 unsigned int keylen, isc_boolean_t case_sensitive) 377 REQUIRE(keylen <= hctx->limit); 379 return (hash_calc(hctx, key, keylen, case_sensitive)); 383 isc_hash_calc(const unsigned char *key, unsigned int keylen, argument 387 REQUIRE(keylen <= hash->limit); 389 return (hash_calc(hash, key, keylen, case_sensitive)); 373 isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive) argument
|
/macosx-10.9.5/CF-855.17/ |
H A D | CFBurstTrie.c | 166 uint32_t keylen; member in struct:_TrieCursor 177 uint32_t keylen; member in struct:_MapCursor 298 static CFBTInsertCode addCFBurstTrieLevel(CFBurstTrieRef trie, TrieLevelRef root, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload); 843 static ListNodeRef makeCFBurstTrieListNode(const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload) { argument 844 ListNodeRef node = (ListNodeRef) calloc(1, sizeof(*node) + keylen + 1); 845 memcpy(node->string, key, keylen); 846 node->string[keylen] = 0; 848 node->length = keylen; 854 static void addCFBurstTrieBurstLevel(CFBurstTrieRef trie, TrieLevelRef root, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload) { argument 855 if (keylen) { 881 addCFBurstTrieListNode(CFBurstTrieRef trie, ListNodeRef list, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload, uint32_t *listCount) argument 909 addCFBurstTrieLevel(CFBurstTrieRef trie, TrieLevelRef root, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | salt.c | 255 size_t keylen; local 264 keylen = et->keytype->bits / 8; 278 tmp = malloc (keylen); 284 ret = _krb5_n_fold(str, len, tmp, keylen); 291 _krb5_DES3_random_to_key(context, kd.key, tmp, keylen); 292 memset(tmp, 0, keylen);
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | vpn.c | 245 u_int16_t class, algorithm, keylen; local 348 keylen = ntohs(next_algo->key_len); 359 if (keylen) { 360 plog(ASL_LEVEL_ERR, "keylen not allowed\n"); 365 if (keylen && check_keylen(class, algorithm, keylen) < 0) { 366 plog(ASL_LEVEL_ERR, "invalid keylen %d\n", keylen); 372 if (keylen) 373 new_algo->encklen = keylen; [all...] |
/macosx-10.9.5/CPANInternal-140/Digest-SHA/src/ |
H A D | hmac.h | 28 #define _HMAC_KEY unsigned char *key, unsigned int keylen
|
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | corecryptoSymmetricBridge.c | 113 const void *key, size_t keylen, const void *tweak, 116 modeObj.ecb->init(modeObj.ecb, ctx.ecb, keylen, key); 142 const void *key, size_t keylen, const void *tweak, 146 modeObj.cbc->init(modeObj.cbc, &ctx.cbc->cbc, keylen, key); 189 const void *key, size_t keylen, const void *tweak, 192 modeObj.cfb->init(modeObj.cfb, ctx.cfb, keylen, key, iv); 219 const void *key, size_t keylen, const void *tweak, 222 modeObj.cfb8->init(modeObj.cfb8, ctx.cfb8, keylen, key, iv); 248 const void *key, size_t keylen, const void *tweak, 251 modeObj.ctr->init(modeObj.ctr, ctx.ctr, keylen, ke 112 ccecb_mode_setup(corecryptoMode modeObj, const void *IV, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument 141 cccbc_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument 188 cccfb_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument 218 cccfb8_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument 247 ccctr_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument 276 ccofb_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument 310 ccxts_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument 378 ccgcm_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument [all...] |