/freebsd-10.2-release/contrib/wpa/src/crypto/ |
H A D | crypto_internal.c | 27 size_t key_len; member in struct:crypto_hash 32 size_t key_len) 58 if (key_len > sizeof(k_pad)) { 60 MD5Update(&ctx->u.md5, key, key_len); 63 key_len = 16; 65 os_memcpy(ctx->key, key, key_len); 66 ctx->key_len = key_len; 68 os_memcpy(k_pad, key, key_len); 69 if (key_len < sizeo 31 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) argument [all...] |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (md5_vector(1, &key, &key_len, tk)) 47 key_len = 16; 61 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 95 * @key_len: Length of the key in bytes 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, [all...] |
H A D | md5.h | 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha1_vector(1, &key, &key_len, tk)) 47 key_len = 20; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 103 return hmac_sha256_vector(key, key_len, [all...] |
H A D | sha256.h | 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 18 void sha256_prf(const u8 *key, size_t key_len, const char *label,
|
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha256-prf.c | 19 * @key_len: Length of the key in bytes 29 void sha256_prf(const u8 *key, size_t key_len, const char *label, argument 54 hmac_sha256_vector(key, key_len, 4, addr, len, 58 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
H A D | aes_wrap.h | 43 int __must_check aes_gcm_ae(const u8 *key, size_t key_len, 48 int __must_check aes_gcm_ad(const u8 *key, size_t key_len, 53 int __must_check aes_gmac(const u8 *key, size_t key_len, 56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
H A D | crypto_internal-cipher.c | 45 size_t key_len) 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); 70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); 79 if (key_len != 24) { 87 if (key_len != 8) { 43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
/freebsd-10.2-release/contrib/ntp/sntp/tests/ |
H A D | crypto.c | 32 md5.key_len = 6; 33 memcpy(&md5.key_seq, "md5seq", md5.key_len); 58 sha1.key_len = 7; 59 memcpy(&sha1.key_seq, "sha1seq", sha1.key_len); 88 md5.key_len = 6; 89 memcpy(&md5.key_seq, "md5key", md5.key_len); 111 sha1.key_len = 7; 112 memcpy(&sha1.key_seq, "sha1key", sha1.key_len); 140 md5.key_len = 6; 141 memcpy(&md5.key_seq, "md5key", md5.key_len); [all...] |
H A D | keyFile.c | 11 bool CompareKeysAlternative(int key_id,int key_len,const char* type,const char* key_seq,struct key actual); 30 if (expected.key_len != actual.key_len) { 31 printf("Expected key_len: %d but was: %d\n", 32 expected.key_len, actual.key_len); 41 if (memcmp(expected.key_seq, actual.key_seq, expected.key_len) != 0) { 52 int key_len, 61 temp.key_len = key_len; 50 CompareKeysAlternative( int key_id, int key_len, const char * type, const char * key_seq, struct key actual ) argument [all...] |
/freebsd-10.2-release/contrib/wpa/src/eap_common/ |
H A D | eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
H A D | eap_pax_common.c | 20 * @key_len: Length of the secret key in bytes 30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, argument 60 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 74 * @key_len: Length of the secret key in bytes 86 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, argument 109 hmac_sha1_vector(key, key_len, count, addr, len, hash);
|
/freebsd-10.2-release/contrib/tcpdump/ |
H A D | signature.c | 53 unsigned int key_len, u_int8_t *digest) 62 if (key_len > 64) { 67 MD5_Update(&tctx, key, key_len); 71 key_len = 16; 88 memcpy(k_ipad, key, key_len); 89 memcpy(k_opad, key, key_len); 52 signature_compute_hmac_md5(const u_int8_t *text, int text_len, unsigned char *key, unsigned int key_len, u_int8_t *digest) argument
|
/freebsd-10.2-release/crypto/openssl/crypto/evp/ |
H A D | p_enc.c | 70 int key_len, EVP_PKEY *pubk) 82 RSA_public_encrypt(key_len, key, ek, pubk->pkey.rsa, 69 EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, EVP_PKEY *pubk) argument
|
H A D | evp_locl.h | 135 key_len, iv_len, flags, init_key, cleanup, \ 138 nid##_##nmode, block_size, key_len, iv_len, \ 150 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ 153 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ 156 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ 160 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 163 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ 167 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 170 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ 173 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \ [all...] |
/freebsd-10.2-release/lib/libcrypt/ |
H A D | crypt-sha256.c | 69 size_t salt_len, key_len, cnt, rounds; local 100 key_len = strlen(key); 106 SHA256_Update(&ctx, key, key_len); 118 SHA256_Update(&alt_ctx, key, key_len); 124 SHA256_Update(&alt_ctx, key, key_len); 130 for (cnt = key_len; cnt > 32; cnt -= 32) 136 for (cnt = key_len; cnt > 0; cnt >>= 1) 140 SHA256_Update(&ctx, key, key_len); 149 for (cnt = 0; cnt < key_len; ++cnt) 150 SHA256_Update(&alt_ctx, key, key_len); [all...] |
H A D | crypt-sha512.c | 69 size_t salt_len, key_len, cnt, rounds; local 100 key_len = strlen(key); 106 SHA512_Update(&ctx, key, key_len); 118 SHA512_Update(&alt_ctx, key, key_len); 124 SHA512_Update(&alt_ctx, key, key_len); 130 for (cnt = key_len; cnt > 64; cnt -= 64) 136 for (cnt = key_len; cnt > 0; cnt >>= 1) 140 SHA512_Update(&ctx, key, key_len); 149 for (cnt = 0; cnt < key_len; ++cnt) 150 SHA512_Update(&alt_ctx, key, key_len); [all...] |
/freebsd-10.2-release/contrib/wpa/src/wps/ |
H A D | wps_attr_process.c | 169 const u8 *key, size_t key_len) 184 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len); 185 if (key_len <= sizeof(cred->key)) { 186 os_memcpy(cred->key, key, key_len); 187 cred->key_len = key_len; 277 cred->key_len > 8 && cred->key_len < 64 && 278 cred->key[cred->key_len - 1] == 0) { 283 cred->key, cred->key_len); 168 wps_process_cred_network_key(struct wps_credential *cred, const u8 *key, size_t key_len) argument [all...] |
/freebsd-10.2-release/contrib/wpa/src/eap_peer/ |
H A D | eap_vendor_test.c | 151 const int key_len = 64; local 156 key = os_malloc(key_len); 160 os_memset(key, 0x11, key_len / 2); 161 os_memset(key + key_len / 2, 0x22, key_len / 2); 162 *len = key_len;
|
/freebsd-10.2-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_vendor_test.c | 144 const int key_len = 64; local 149 key = os_malloc(key_len); 153 os_memset(key, 0x11, key_len / 2); 154 os_memset(key + key_len / 2, 0x22, key_len / 2); 155 *len = key_len;
|
/freebsd-10.2-release/contrib/ntp/sntp/ |
H A D | crypto.h | 22 int key_len; member in struct:key
|
/freebsd-10.2-release/contrib/groff/src/utils/indxbib/ |
H A D | indxbib.cpp | 389 int key_len = 0; 397 if (key_len < truncate_len) 398 key_buffer[key_len++] = cmlower(c); 401 if (key_len >= shortest_len) { 402 int h = hash(key_buffer, key_len) % hash_table_size; 403 common_words_table[h] = new word_list(key_buffer, key_len, 408 key_len = 0; 425 int key_len = 0; 429 key_len = 1; 434 if (key_len < truncate_le [all...] |