Searched refs:keylen (Results 26 - 50 of 161) sorted by relevance

1234567

/macosx-10.9.5/curl-78.94.1/curl/lib/
H A Dcurl_hmac.h59 unsigned int keylen);
/macosx-10.9.5/xnu-2422.115.4/EXTERNAL_HEADERS/corecrypto/
H A Dccrc4.h34 unsigned long keylen; member in struct:ccrc4_vector
H A Dccdes.h64 void *key, unsigned long keylen, void *ivec);
/macosx-10.9.5/Libinfo-449.1.3/nis.subproj/
H A Dypmatch_cache.c80 ypmatch_add(map, key, keylen, val, vallen)
83 u_int keylen;
113 if ((ep->key = malloc(keylen)) == NULL)
122 ep->keylen = keylen;
125 (void)memcpy(ep->key, key, ep->keylen);
144 ypmatch_find(map, key, keylen, val, vallen)
147 u_int keylen;
160 if (ep->keylen != keylen)
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/
H A Drc2test.c43 const int keylen; member in struct:__anon794
131 RC2_set_key(&key, tests[i].keylen, tests[i].key, tests[i].bitsize);
H A Dpkcs12.c46 PKCS12_key_gen(const void *key, size_t keylen, argument
60 * keylen that is no a multiple of 2 is invalid.
62 if (keylen & 1)
96 I[(i * 2) + size_I + 1] = ((unsigned char*)key)[i % (keylen + 1)];
H A Devp-crypt.c95 import_key(int alg, const unsigned char *key, size_t keylen) argument
102 size_t bloblen = sizeof(*key_blob) - 1 + keylen;
111 memcpy(key_blob->key, key, keylen);
H A DCCDGlue.h132 size_t length, void *key, size_t keylen,
/macosx-10.9.5/Heimdal-323.92.1/lib/ntlm/
H A Dapop.c114 size_t keylen = strlen(password); local
122 if (keylen > CC_MD5_BLOCK_BYTES) {
123 CC_MD5(password, (CC_LONG)keylen, key);
124 keylen = sizeof(keylen);
126 memcpy(key, password, keylen);
130 for (n = 0; n < keylen; n++)
139 for (n = 0; n < keylen; n++)
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/
H A DCryptoAlg.h41 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
57 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
/macosx-10.9.5/xnu-2422.115.4/bsd/crypto/rc4/
H A Drc4.c58 rc4_init(struct rc4_state *const state, const u_char *key, int keylen) argument
71 j += state->perm[i] + key[i % keylen];
/macosx-10.9.5/ntp-88/libntp/
H A Dauthkeys.c30 int keylen; /* key length */ member in struct:savekey
184 cache_keylen = sk->keylen;
294 sk->keylen = 0;
353 sk->keylen = min(len, sizeof(sk->k.MD5_key));
355 memcpy(sk->k.MD5_key, key, sk->keylen);
383 sk->keylen = min(len, sizeof(sk->k.MD5_key));
385 memcpy(sk->k.MD5_key, key, sk->keylen);
398 sk->type, sk->keylen);
399 for (j = 0; j < sk->keylen; j++)
434 sk->keylen
[all...]
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/
H A Dencrypt.c168 int keylen; member in struct:key_info
742 kp->keylen = 0;
747 if (kp->keylen == 0)
749 kp->keylen = 0;
751 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
753 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) {
757 kp->keylen = len;
760 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
763 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen);
769 encrypt_send_keyid(dir, kp->keyid, kp->keylen,
783 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument
[all...]
/macosx-10.9.5/libtelnet-13/
H A Dencrypt.c181 int keylen; member in struct:key_info
735 kp->keylen = 0;
740 if (kp->keylen == 0)
742 kp->keylen = 0;
744 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
746 } else if ((len != kp->keylen) ||
751 kp->keylen = len;
754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
757 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen);
763 encrypt_send_keyid(dir, kp->keyid, kp->keylen,
767 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument
[all...]
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dcipher.c226 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
244 if (keylen > 8)
245 keylen = 8;
250 if (keylen < cipher->key_len)
252 keylen, cipher->name);
262 if (type->key_len > 0 && type->key_len != keylen) {
263 debug("cipher_init: set keylen (%d -> %d)",
264 type->key_len, keylen);
265 type->key_len = keylen;
280 if (klen > 0 && keylen !
225 cipher_init(CipherContext *cc, Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
[all...]
/macosx-10.9.5/ruby-104/ruby/ext/openssl/lib/openssl/
H A Dcipher.rb33 %w(128 192 256).each{|keylen|
37 cipher_name = "AES-#{keylen}-#{mode}"
41 const_set("AES#{keylen}", klass)
/macosx-10.9.5/xnu-2422.115.4/libkern/libkern/crypto/
H A Daesxts.h58 const uint8_t *key1, int keylen,
/macosx-10.9.5/ppp-727.90.1/Drivers/PPTP/PPTP-extension/
H A Dppp_mppe.c87 int keylen; member in struct:ppp_mppe_state
194 rc4_init(&(state->rc4_state), state->session_key, state->keylen);
206 GetNewKeyFromSHA(state->master_key, state->master_key, state->keylen, state->session_key);
208 if(state->keylen == 8) {
227 state->keylen, InterimKey);
230 rc4_init(&(state->rc4_state), InterimKey, state->keylen);
233 rc4_crypt(&(state->rc4_state), InterimKey, state->session_key, state->keylen);
235 if(state->keylen == 8)
244 rc4_init(&(state->rc4_state), state->session_key, state->keylen);
373 state->keylen
[all...]
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/
H A Dhash.c362 hash_calc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, argument
374 for (i = 0; i < keylen; i++)
377 for (i = 0; i < keylen; i++)
388 unsigned int keylen, isc_boolean_t case_sensitive)
391 REQUIRE(keylen <= hctx->limit);
393 return (hash_calc(hctx, key, keylen, case_sensitive));
397 isc_hash_calc(const unsigned char *key, unsigned int keylen, argument
401 REQUIRE(keylen <= hash->limit);
403 return (hash_calc(hash, key, keylen, case_sensitive));
387 isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive) argument
/macosx-10.9.5/ntp-88/lib/isc/
H A Dhash.c348 hash_calc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, argument
360 for (i = 0; i < keylen; i++)
363 for (i = 0; i < keylen; i++)
374 unsigned int keylen, isc_boolean_t case_sensitive)
377 REQUIRE(keylen <= hctx->limit);
379 return (hash_calc(hctx, key, keylen, case_sensitive));
383 isc_hash_calc(const unsigned char *key, unsigned int keylen, argument
387 REQUIRE(keylen <= hash->limit);
389 return (hash_calc(hash, key, keylen, case_sensitive));
373 isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive) argument
/macosx-10.9.5/CF-855.17/
H A DCFBurstTrie.c166 uint32_t keylen; member in struct:_TrieCursor
177 uint32_t keylen; member in struct:_MapCursor
298 static CFBTInsertCode addCFBurstTrieLevel(CFBurstTrieRef trie, TrieLevelRef root, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload);
843 static ListNodeRef makeCFBurstTrieListNode(const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload) { argument
844 ListNodeRef node = (ListNodeRef) calloc(1, sizeof(*node) + keylen + 1);
845 memcpy(node->string, key, keylen);
846 node->string[keylen] = 0;
848 node->length = keylen;
854 static void addCFBurstTrieBurstLevel(CFBurstTrieRef trie, TrieLevelRef root, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload) { argument
855 if (keylen) {
881 addCFBurstTrieListNode(CFBurstTrieRef trie, ListNodeRef list, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload, uint32_t *listCount) argument
909 addCFBurstTrieLevel(CFBurstTrieRef trie, TrieLevelRef root, const uint8_t *key, uint32_t keylen, uint32_t weight, uint32_t payload) argument
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dsalt.c255 size_t keylen; local
264 keylen = et->keytype->bits / 8;
278 tmp = malloc (keylen);
284 ret = _krb5_n_fold(str, len, tmp, keylen);
291 _krb5_DES3_random_to_key(context, kd.key, tmp, keylen);
292 memset(tmp, 0, keylen);
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dvpn.c245 u_int16_t class, algorithm, keylen; local
348 keylen = ntohs(next_algo->key_len);
359 if (keylen) {
360 plog(ASL_LEVEL_ERR, "keylen not allowed\n");
365 if (keylen && check_keylen(class, algorithm, keylen) < 0) {
366 plog(ASL_LEVEL_ERR, "invalid keylen %d\n", keylen);
372 if (keylen)
373 new_algo->encklen = keylen;
[all...]
/macosx-10.9.5/CPANInternal-140/Digest-SHA/src/
H A Dhmac.h28 #define _HMAC_KEY unsigned char *key, unsigned int keylen
/macosx-10.9.5/CommonCrypto-60049/lib/
H A DcorecryptoSymmetricBridge.c113 const void *key, size_t keylen, const void *tweak,
116 modeObj.ecb->init(modeObj.ecb, ctx.ecb, keylen, key);
142 const void *key, size_t keylen, const void *tweak,
146 modeObj.cbc->init(modeObj.cbc, &ctx.cbc->cbc, keylen, key);
189 const void *key, size_t keylen, const void *tweak,
192 modeObj.cfb->init(modeObj.cfb, ctx.cfb, keylen, key, iv);
219 const void *key, size_t keylen, const void *tweak,
222 modeObj.cfb8->init(modeObj.cfb8, ctx.cfb8, keylen, key, iv);
248 const void *key, size_t keylen, const void *tweak,
251 modeObj.ctr->init(modeObj.ctr, ctx.ctr, keylen, ke
112 ccecb_mode_setup(corecryptoMode modeObj, const void *IV, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
141 cccbc_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
188 cccfb_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
218 cccfb8_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
247 ccctr_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
276 ccofb_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
310 ccxts_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
378 ccgcm_mode_setup(const corecryptoMode modeObj, const void *iv, const void *key, size_t keylen, const void *tweak, size_t tweaklen, int options, modeCtx ctx) argument
[all...]

Completed in 408 milliseconds

1234567