/freebsd-10.0-release/sys/geom/eli/ |
H A D | pkcs5v2.h | 31 void pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt,
|
H A D | pkcs5v2.c | 52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, argument 61 bzero(key, keylen); 66 for (count = 1; keylen > 0; count++, keylen -= bsize, keyp += bsize) { 67 bsize = MIN(keylen, sizeof(md));
|
/freebsd-10.0-release/crypto/openssl/engines/ccgost/ |
H A D | gost2001_keyx.h | 3 const unsigned char *key, size_t keylen,
|
/freebsd-10.0-release/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.c | 137 static void rc4init ( uint8_t * key, int keylen, rc4state * state) { argument 144 j = (j + state->s[i] + key[i % keylen]) % n; 219 static int correct(PTW_attackstate * state, uint8_t * key, int keylen) { argument 226 memcpy(&keybuf[IVBYTES], key, keylen); 228 rc4init(keybuf, keylen+IVBYTES, &rc4state); 241 static void getdrv(PTW_tableentry orgtable[][n], int keylen, double * normal, double * ausreiser) { argument 254 for (i = 0; i < keylen; i++) { 285 static int doRound(PTW_tableentry sortedtable[][n], int keybyte, int fixat, uint8_t fixvalue, int * searchborders, uint8_t * key, int keylen, PTW_attackstate * state, uint8_t sum, int * strongbytes) { argument 288 if (keybyte == keylen) { 289 return correct(state, key, keylen); 319 doComputation(PTW_attackstate * state, uint8_t * key, int keylen, PTW_tableentry table[][n], sorthelper * sh2, int * strongbytes, int keylimit) argument 363 PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) argument [all...] |
/freebsd-10.0-release/contrib/unbound/validator/ |
H A D | val_secalgo.h | 74 * @param keylen: length of keydata. 81 unsigned char* key, unsigned int keylen, char** reason);
|
/freebsd-10.0-release/sys/crypto/rc4/ |
H A D | rc4.h | 49 extern void rc4_init(struct rc4_state *state, const u_char *key, int keylen);
|
/freebsd-10.0-release/sys/netipsec/ |
H A D | xform_tcp.c | 87 int keylen; local 103 keylen = _KEYLEN(sav->key_auth); 104 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) { 105 DPRINTF(("%s: invalid key length %u\n", __func__, keylen));
|
/freebsd-10.0-release/contrib/gcc/ |
H A D | prefix.c | 191 int keylen; local 199 for (keylen = 0; 200 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); 201 keylen++) 204 key = (char *) alloca (keylen + 1); 205 strncpy (key, &name[1], keylen); 206 key[keylen] = 0; 226 name = concat (prefix, &name[keylen + 1], NULL);
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | crypto-pk.c | 49 size_t keylen, offset; local 61 keylen = (et->keytype->bits + 7) / 8; 63 keydata = malloc(keylen); 93 min(keylen - offset, sizeof(shaoutput))); 97 } while(offset < keylen); 102 ret = krb5_random_to_key(context, type, keydata, keylen, key); 103 memset(keydata, 0, sizeof(keylen)); 213 size_t keylen, offset; local 248 keylen = (et->keytype->bits + 7) / 8; 250 keydata = malloc(keylen); [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 160 ec->keylen = tkeylen; 169 if (ec->keylen != tkeylen) 172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) 186 OPENSSL_cleanse(ec->key, ec->keylen); 189 ec->keylen = tkeylen; 224 OPENSSL_cleanse(ec->key, ec->keylen); 241 const unsigned char *key, size_t keylen) 246 ec->key = OPENSSL_malloc(keylen); 249 memcpy(ec->key, key, keylen); 251 ec->keylen 239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument 257 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument [all...] |
/freebsd-10.0-release/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 67 const EVP_MD **dtype, uint32_t *keylen) 71 *keylen = SNMP_AUTH_HMACMD5_KEY_SIZ; 74 *keylen = SNMP_AUTH_HMACSHA_KEY_SIZ; 94 uint32_t i, keylen, olen; local 99 err = snmp_digest_init(&pdu->user, &ctx, &dtype, &keylen); 106 memcpy(extkey, pdu->user.auth_key, keylen); 107 memset(extkey + keylen, 0, sizeof(extkey) - keylen); 235 uint32_t keylen, olen; local 243 err = snmp_digest_init(user, &ctx, &dtype, &keylen); 66 snmp_digest_init(const struct snmp_user *user, EVP_MD_CTX *ctx, const EVP_MD **dtype, uint32_t *keylen) argument 275 uint32_t keylen, olen; local 313 uint32_t i, keylen, olen; local [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 164 h__dump (out, keylen); 171 int keylen, unsigned char *out) 174 keylen, out); 260 unsigned int keylen = 0; local 270 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 OPENSSL_assert(keylen <= sizeof key); 289 keylen = EVP_CIPHER_CTX_key_length(ctx); 293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 169 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
/freebsd-10.0-release/tools/regression/geom_eli/ |
H A D | init.t | 26 keylen=${cipher##*:} 33 geli init -B none -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null 46 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 48 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 52 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 54 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} se [all...] |
H A D | onetime.t | 25 keylen=${cipher##*:} 30 geli onetime -e $ealgo -l $keylen -s $secsize md${no} 2>/dev/null 42 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 44 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 48 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 50 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} se [all...] |
H A D | integrity-copy.t | 27 keylen=${cipher##*:} 35 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null 42 echo "ok $i - small 1 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 44 echo "not ok $i - small 1 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 57 echo "ok $i - small 2 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 59 echo "not ok $i - small 2 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} se [all...] |
H A D | integrity-data.t | 27 keylen=${cipher##*:} 34 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null 41 echo "ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 43 echo "not ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 56 echo "ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 58 echo "not ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} se [all...] |
H A D | integrity-hmac.t | 27 keylen=${cipher##*:} 34 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null 41 echo "ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 43 echo "not ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 56 echo "ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 58 echo "not ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} se [all...] |
H A D | init-a.t | 26 keylen=${cipher##*:} 34 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null 46 echo "ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}" 48 echo "not ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
|
/freebsd-10.0-release/sys/netinet/ |
H A D | sctp_auth.c | 257 * allocate structure space for a key of length keylen 260 sctp_alloc_key(uint32_t keylen) argument 264 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, 270 new_key->keylen = keylen; 290 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 291 if (key->keylen) { 292 for (i = 0; i < key->keylen; i++) 309 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 310 if (key->keylen) { 332 sctp_generate_random_key(uint32_t keylen) argument 347 sctp_set_key(uint8_t * key, uint32_t keylen) argument 420 uint32_t keylen; local 936 sctp_hmac(uint16_t hmac_algo, uint8_t * key, uint32_t keylen, uint8_t * text, uint32_t textlen, uint8_t * digest) argument 996 sctp_hmac_m(uint16_t hmac_algo, uint8_t * key, uint32_t keylen, struct mbuf *m, uint32_t m_offset, uint8_t * digest, uint32_t trailer) argument 1079 sctp_verify_hmac(uint16_t hmac_algo, uint8_t * key, uint32_t keylen, uint8_t * text, uint32_t textlen, uint8_t * digest, uint32_t digestlen) argument 1431 uint32_t keylen; local 1971 uint16_t keylen; local [all...] |
/freebsd-10.0-release/lib/libc/iconv/ |
H A D | citrus_memstream.c | 74 size_t keylen, len; local 76 keylen = strlen(key); 96 if ((size_t)(q - p) == keylen) { 98 if (memcmp(key, p, keylen) == 0) 101 if (_bcs_strncasecmp(key, p, keylen) == 0)
|
/freebsd-10.0-release/usr.sbin/ppp/ |
H A D | mppe.c | 101 unsigned keylen; /* 8 or 16 bytes */ member in struct:mppe_state 150 GetNewKeyFromSHA(mp->mastkey, mp->sesskey, mp->keylen, InterimKey); 151 RC4_set_key(&RC4Key, mp->keylen, InterimKey); 152 RC4(&RC4Key, mp->keylen, InterimKey, mp->sesskey); 205 RC4_set_key(&mop->rc4key, mop->keylen, mop->sesskey); 354 RC4_set_key(&mip->rc4key, mip->keylen, mip->sesskey); 655 mp->keylen = 16; 659 mp->keylen = 8; 663 mp->keylen = 8; 697 if (mip->keylen > bundl [all...] |
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | hash.c | 101 apr_size_t len, keylen, vallen; 133 keylen = (apr_size_t)ui64; 136 keybuf = apr_palloc(pool, keylen + 1); 137 SVN_ERR(svn_stream_read(stream, keybuf, &keylen)); 138 keybuf[keylen] = '\0'; 171 apr_hash_set(hash, keybuf, keylen, 187 keylen = (apr_size_t)ui64; 190 keybuf = apr_palloc(iterpool, keylen + 1); 191 SVN_ERR(svn_stream_read(stream, keybuf, &keylen)); 192 keybuf[keylen] 98 apr_size_t len, keylen, vallen; local 377 size_t keylen; local [all...] |
/freebsd-10.0-release/crypto/heimdal/kadmin/ |
H A D | random_password.c | 81 RND(unsigned char *key, int keylen, int *left) argument 84 krb5_generate_random_block(key, keylen); 85 *left = keylen;
|
/freebsd-10.0-release/crypto/openssl/crypto/cmac/ |
H A D | cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 31 if (kpos >= keylen)
|