Searched refs:key_len (Results 1 - 25 of 124) sorted by relevance

12345

/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dcrypto_internal.c27 size_t key_len; member in struct:crypto_hash
32 size_t key_len)
58 if (key_len > sizeof(k_pad)) {
60 MD5Update(&ctx->u.md5, key, key_len);
63 key_len = 16;
65 os_memcpy(ctx->key, key, key_len);
66 ctx->key_len = key_len;
68 os_memcpy(k_pad, key, key_len);
69 if (key_len < sizeo
31 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) argument
[all...]
H A Dmd5.c19 * @key_len: Length of the key in bytes
26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument
43 if (key_len > 64) {
44 if (md5_vector(1, &key, &key_len, tk))
47 key_len = 16;
61 os_memcpy(k_pad, key, key_len);
78 os_memcpy(k_pad, key, key_len);
95 * @key_len: Length of the key in bytes
101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument
104 return hmac_md5_vector(key, key_len,
[all...]
H A Dmd5.h14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
H A Dsha1.c19 * @key_len: Length of the key in bytes
26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument
43 if (key_len > 64) {
44 if (sha1_vector(1, &key, &key_len, tk))
47 key_len = 20;
61 os_memcpy(k_pad, key, key_len);
77 os_memcpy(k_pad, key, key_len);
94 * @key_len: Length of the key in bytes
100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument
103 return hmac_sha1_vector(key, key_len,
[all...]
H A Dsha256.c19 * @key_len: Length of the key in bytes
26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument
43 if (key_len > 64) {
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
47 key_len = 32;
61 os_memcpy(k_pad, key, key_len);
77 os_memcpy(k_pad, key, key_len);
94 * @key_len: Length of the key in bytes
100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument
103 return hmac_sha256_vector(key, key_len,
[all...]
H A Dsha256.h14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
18 void sha256_prf(const u8 *key, size_t key_len, const char *label,
H A Dsha1.h14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
18 int sha1_prf(const u8 *key, size_t key_len, const char *label,
20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
H A Dsha1-prf.c19 * @key_len: Length of the key in bytes
30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument
51 if (hmac_sha1_vector(key, key_len, 3, addr, len,
56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
H A Dsha256-prf.c19 * @key_len: Length of the key in bytes
29 void sha256_prf(const u8 *key, size_t key_len, const char *label, argument
54 hmac_sha256_vector(key, key_len, 4, addr, len,
58 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
H A Daes_wrap.h43 int __must_check aes_gcm_ae(const u8 *key, size_t key_len,
48 int __must_check aes_gcm_ad(const u8 *key, size_t key_len,
53 int __must_check aes_gmac(const u8 *key, size_t key_len,
56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
H A Dcrypto_internal-cipher.c45 size_t key_len)
57 if (key_len > sizeof(ctx->u.rc4.key)) {
61 ctx->u.rc4.keylen = key_len;
62 os_memcpy(ctx->u.rc4.key, key, key_len);
65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len);
70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len);
79 if (key_len != 24) {
87 if (key_len != 8) {
43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
H A Dsha1-tprf.c18 * @key_len: Length of the key in bytes
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_peap_common.h12 int peap_prfplus(int version, const u8 *key, size_t key_len,
H A Deap_pax_common.c20 * @key_len: Length of the secret key in bytes
30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, argument
60 hmac_sha1_vector(key, key_len, 3, addr, len, mac);
74 * @key_len: Length of the secret key in bytes
86 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, argument
109 hmac_sha1_vector(key, key_len, count, addr, len, hash);
H A Deap_pax_common.h79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
83 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
H A Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
/freebsd-10.0-release/contrib/tcpdump/
H A Dsignature.c53 unsigned int key_len, u_int8_t *digest)
62 if (key_len > 64) {
67 MD5_Update(&tctx, key, key_len);
71 key_len = 16;
88 memcpy(k_ipad, key, key_len);
89 memcpy(k_opad, key, key_len);
52 signature_compute_hmac_md5(const u_int8_t *text, int text_len, unsigned char *key, unsigned int key_len, u_int8_t *digest) argument
/freebsd-10.0-release/crypto/openssl/crypto/evp/
H A Dp_enc.c69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument
82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
H A Devp_locl.h134 key_len, iv_len, flags, init_key, cleanup, \
137 nid##_##nmode, block_size, key_len, iv_len, \
149 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \
152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \
155 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \
159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
162 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \
166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
169 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \
172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \
[all...]
/freebsd-10.0-release/lib/libcrypt/
H A Dcrypt-sha256.c69 size_t salt_len, key_len, cnt, rounds; local
100 key_len = strlen(key);
106 SHA256_Update(&ctx, key, key_len);
118 SHA256_Update(&alt_ctx, key, key_len);
124 SHA256_Update(&alt_ctx, key, key_len);
130 for (cnt = key_len; cnt > 32; cnt -= 32)
136 for (cnt = key_len; cnt > 0; cnt >>= 1)
140 SHA256_Update(&ctx, key, key_len);
149 for (cnt = 0; cnt < key_len; ++cnt)
150 SHA256_Update(&alt_ctx, key, key_len);
[all...]
H A Dcrypt-sha512.c69 size_t salt_len, key_len, cnt, rounds; local
100 key_len = strlen(key);
106 SHA512_Update(&ctx, key, key_len);
118 SHA512_Update(&alt_ctx, key, key_len);
124 SHA512_Update(&alt_ctx, key, key_len);
130 for (cnt = key_len; cnt > 64; cnt -= 64)
136 for (cnt = key_len; cnt > 0; cnt >>= 1)
140 SHA512_Update(&ctx, key, key_len);
149 for (cnt = 0; cnt < key_len; ++cnt)
150 SHA512_Update(&alt_ctx, key, key_len);
[all...]
/freebsd-10.0-release/contrib/wpa/src/wps/
H A Dwps_attr_process.c169 const u8 *key, size_t key_len)
184 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len);
185 if (key_len <= sizeof(cred->key)) {
186 os_memcpy(cred->key, key, key_len);
187 cred->key_len = key_len;
277 cred->key_len > 8 && cred->key_len < 64 &&
278 cred->key[cred->key_len - 1] == 0) {
283 cred->key, cred->key_len);
168 wps_process_cred_network_key(struct wps_credential *cred, const u8 *key, size_t key_len) argument
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_vendor_test.c151 const int key_len = 64; local
156 key = os_malloc(key_len);
160 os_memset(key, 0x11, key_len / 2);
161 os_memset(key + key_len / 2, 0x22, key_len / 2);
162 *len = key_len;
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_vendor_test.c144 const int key_len = 64; local
149 key = os_malloc(key_len);
153 os_memset(key, 0x11, key_len / 2);
154 os_memset(key + key_len / 2, 0x22, key_len / 2);
155 *len = key_len;
/freebsd-10.0-release/contrib/groff/src/utils/indxbib/
H A Dindxbib.cpp389 int key_len = 0;
397 if (key_len < truncate_len)
398 key_buffer[key_len++] = cmlower(c);
401 if (key_len >= shortest_len) {
402 int h = hash(key_buffer, key_len) % hash_table_size;
403 common_words_table[h] = new word_list(key_buffer, key_len,
408 key_len = 0;
425 int key_len = 0;
429 key_len = 1;
434 if (key_len < truncate_le
[all...]

Completed in 119 milliseconds

12345