Searched refs:keylen (Results 1 - 25 of 140) sorted by relevance

123456

/freebsd-9.3-release/sys/geom/eli/
H A Dpkcs5v2.h31 void pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt,
H A Dpkcs5v2.c52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, argument
61 bzero(key, keylen);
66 for (count = 1; keylen > 0; count++, keylen -= bsize, keyp += bsize) {
67 bsize = MIN(keylen, sizeof(md));
/freebsd-9.3-release/crypto/openssl/fips/rand/
H A Dfips_rngvs.c43 long i, keylen; local
45 keylen = 0;
50 keylen = 16;
52 keylen = 24;
54 keylen = 32;
59 if (i != keylen) {
61 keylen);
82 FIPS_rand_set_key(key, keylen);
110 long i, keylen; local
113 keylen
[all...]
H A Dfips_rand.h61 int FIPS_rand_set_key(const unsigned char *key, FIPS_RAND_SIZE_T keylen);
/freebsd-9.3-release/contrib/bind9/lib/isc/include/isc/
H A Dhash.h159 unsigned int keylen, isc_boolean_t case_sensitive);
161 isc_hash_calc(const unsigned char *key, unsigned int keylen,
174 * 'keylen' specifies the key length, which must not be larger than the limit
/freebsd-9.3-release/contrib/libucl/src/
H A Ducl_hash.h65 void ucl_hash_insert (ucl_hash_t* hashlin, ucl_object_t *obj, const char *key, unsigned keylen);
75 ucl_object_t* ucl_hash_search (ucl_hash_t* hashlin, const char *key, unsigned keylen);
H A Ducl_hash.c54 ucl_hash_insert (ucl_hash_t* hashlin, ucl_object_t *obj, const char *key, unsigned keylen) argument
60 HASH_ADD_KEYPTR (hh, hashlin->buckets, key, keylen, node);
95 ucl_hash_search (ucl_hash_t* hashlin, const char *key, unsigned keylen) argument
102 HASH_FIND (hh, hashlin->buckets, key, keylen, found);
115 HASH_FIND (hh, hashlin->buckets, obj->key, obj->keylen, found);
/freebsd-9.3-release/contrib/ntp/lib/isc/include/isc/
H A Dhash.h159 unsigned int keylen, isc_boolean_t case_sensitive);
161 isc_hash_calc(const unsigned char *key, unsigned int keylen,
174 * 'keylen' specifies the key length, which must not be larger than the limit
/freebsd-9.3-release/tools/tools/net80211/wesside/wesside/
H A Daircrack-ptw-lib.c137 static void rc4init ( uint8_t * key, int keylen, rc4state * state) { argument
144 j = (j + state->s[i] + key[i % keylen]) % n;
219 static int correct(PTW_attackstate * state, uint8_t * key, int keylen) { argument
226 memcpy(&keybuf[IVBYTES], key, keylen);
228 rc4init(keybuf, keylen+IVBYTES, &rc4state);
241 static void getdrv(PTW_tableentry orgtable[][n], int keylen, double * normal, double * ausreiser) { argument
254 for (i = 0; i < keylen; i++) {
285 static int doRound(PTW_tableentry sortedtable[][n], int keybyte, int fixat, uint8_t fixvalue, int * searchborders, uint8_t * key, int keylen, PTW_attackstate * state, uint8_t sum, int * strongbytes) { argument
288 if (keybyte == keylen) {
289 return correct(state, key, keylen);
319 doComputation(PTW_attackstate * state, uint8_t * key, int keylen, PTW_tableentry table[][n], sorthelper * sh2, int * strongbytes, int keylimit) argument
363 PTW_computeKey(PTW_attackstate * state, uint8_t * keybuf, int keylen, int testlimit) argument
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/
H A Dtkey_249.h34 isc_uint16_t keylen; member in struct:dns_rdata_tkey
/freebsd-9.3-release/sys/crypto/rc4/
H A Drc4.h49 extern void rc4_init(struct rc4_state *state, const u_char *key, int keylen);
/freebsd-9.3-release/sys/netipsec/
H A Dxform_tcp.c87 int keylen; local
103 keylen = _KEYLEN(sav->key_auth);
104 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) {
105 DPRINTF(("%s: invalid key length %u\n", __func__, keylen));
/freebsd-9.3-release/contrib/gcc/
H A Dprefix.c191 int keylen; local
199 for (keylen = 0;
200 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1]));
201 keylen++)
204 key = (char *) alloca (keylen + 1);
205 strncpy (key, &name[1], keylen);
206 key[keylen] = 0;
226 name = concat (prefix, &name[keylen + 1], NULL);
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_enc.c145 ec->keylen = tkeylen;
154 if (ec->keylen != tkeylen) {
156 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) {
167 OPENSSL_cleanse(ec->key, ec->keylen);
170 ec->keylen = tkeylen;
199 OPENSSL_cleanse(ec->key, ec->keylen);
215 const unsigned char *key, size_t keylen)
219 ec->key = OPENSSL_malloc(keylen);
222 memcpy(ec->key, key, keylen);
224 ec->keylen
213 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
230 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument
[all...]
/freebsd-9.3-release/contrib/bsnmp/lib/
H A Dsnmpcrypto.c67 const EVP_MD **dtype, uint32_t *keylen)
71 *keylen = SNMP_AUTH_HMACMD5_KEY_SIZ;
74 *keylen = SNMP_AUTH_HMACSHA_KEY_SIZ;
94 uint32_t i, keylen, olen; local
99 err = snmp_digest_init(&pdu->user, &ctx, &dtype, &keylen);
106 memcpy(extkey, pdu->user.auth_key, keylen);
107 memset(extkey + keylen, 0, sizeof(extkey) - keylen);
235 uint32_t keylen, olen; local
243 err = snmp_digest_init(user, &ctx, &dtype, &keylen);
66 snmp_digest_init(const struct snmp_user *user, EVP_MD_CTX *ctx, const EVP_MD **dtype, uint32_t *keylen) argument
275 uint32_t keylen, olen; local
313 uint32_t i, keylen, olen; local
[all...]
/freebsd-9.3-release/crypto/openssh/openbsd-compat/
H A Dbcrypt_pbkdf.c107 u_int8_t *key, size_t keylen, unsigned int rounds)
120 if (passlen == 0 || saltlen == 0 || keylen == 0 ||
121 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20)
125 stride = (keylen + sizeof(out) - 1) / sizeof(out);
126 amt = (keylen + stride - 1) / stride;
134 for (count = 1; keylen > 0; count++) {
157 amt = MIN(amt, keylen);
160 keylen -= amt;
106 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, u_int8_t *key, size_t keylen, unsigned int rounds) argument
/freebsd-9.3-release/tools/regression/geom_eli/
H A Dinit.t26 keylen=${cipher##*:}
33 geli init -B none -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null
46 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
48 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
52 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
54 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} se
[all...]
H A Donetime.t25 keylen=${cipher##*:}
30 geli onetime -e $ealgo -l $keylen -s $secsize md${no} 2>/dev/null
42 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
44 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
48 echo "ok $i - ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
50 echo "not ok $i - ealgo=${ealgo} keylen=${keylen} se
[all...]
H A Dintegrity-copy.t27 keylen=${cipher##*:}
35 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null
42 echo "ok $i - small 1 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
44 echo "not ok $i - small 1 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
57 echo "ok $i - small 2 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
59 echo "not ok $i - small 2 aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} se
[all...]
H A Dintegrity-data.t27 keylen=${cipher##*:}
34 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K $keyfile -s $secsize md${no} 2>/dev/null
41 echo "ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
43 echo "not ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
56 echo "ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} sec=${secsize}"
58 echo "not ok $i - aalgo=${aalgo} ealgo=${ealgo} keylen=${keylen} se
[all...]
/freebsd-9.3-release/sys/netinet/
H A Dsctp_auth.c257 * allocate structure space for a key of length keylen
260 sctp_alloc_key(uint32_t keylen) argument
264 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen,
270 new_key->keylen = keylen;
290 SCTP_PRINTF("%s: len %u, ", str, key->keylen);
291 if (key->keylen) {
292 for (i = 0; i < key->keylen; i++)
309 SCTP_PRINTF("%s: len %u, ", str, key->keylen);
310 if (key->keylen) {
332 sctp_generate_random_key(uint32_t keylen) argument
347 sctp_set_key(uint8_t * key, uint32_t keylen) argument
420 uint32_t keylen; local
936 sctp_hmac(uint16_t hmac_algo, uint8_t * key, uint32_t keylen, uint8_t * text, uint32_t textlen, uint8_t * digest) argument
996 sctp_hmac_m(uint16_t hmac_algo, uint8_t * key, uint32_t keylen, struct mbuf *m, uint32_t m_offset, uint8_t * digest, uint32_t trailer) argument
1079 sctp_verify_hmac(uint16_t hmac_algo, uint8_t * key, uint32_t keylen, uint8_t * text, uint32_t textlen, uint8_t * digest, uint32_t digestlen) argument
1431 uint32_t keylen; local
1971 uint16_t keylen; local
[all...]
/freebsd-9.3-release/lib/libc/iconv/
H A Dcitrus_memstream.c74 size_t keylen, len; local
76 keylen = strlen(key);
96 if ((size_t)(q - p) == keylen) {
98 if (memcmp(key, p, keylen) == 0)
101 if (_bcs_strncasecmp(key, p, keylen) == 0)
/freebsd-9.3-release/usr.sbin/ppp/
H A Dmppe.c101 unsigned keylen; /* 8 or 16 bytes */ member in struct:mppe_state
150 GetNewKeyFromSHA(mp->mastkey, mp->sesskey, mp->keylen, InterimKey);
151 RC4_set_key(&RC4Key, mp->keylen, InterimKey);
152 RC4(&RC4Key, mp->keylen, InterimKey, mp->sesskey);
205 RC4_set_key(&mop->rc4key, mop->keylen, mop->sesskey);
354 RC4_set_key(&mip->rc4key, mip->keylen, mip->sesskey);
655 mp->keylen = 16;
659 mp->keylen = 8;
663 mp->keylen = 8;
697 if (mip->keylen > bundl
[all...]
/freebsd-9.3-release/crypto/heimdal/kadmin/
H A Drandom_password.c83 RND(unsigned char *key, int keylen, int *left) argument
86 krb5_generate_random_block(key, keylen);
87 *left = keylen;
/freebsd-9.3-release/crypto/openssh/
H A Dcipher-chachapoly.c31 const u_char *key, u_int keylen)
33 if (keylen != (32 + 32)) /* 2 x 256 bit keys */
34 fatal("%s: invalid keylen %u", __func__, keylen);
30 chachapoly_init(struct chachapoly_ctx *ctx, const u_char *key, u_int keylen) argument

Completed in 290 milliseconds

123456