/freebsd-9.3-release/crypto/openssl/crypto/pem/ |
H A D | pem_pk8.c | 71 char *kstr, int klen, pem_password_cb *cb, void *u); 74 char *kstr, int klen, pem_password_cb *cb, void *u); 84 char *kstr, int klen, 87 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); 91 char *kstr, int klen, 94 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); 98 char *kstr, int klen, 101 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); 105 char *kstr, int klen, 108 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, c 83 PEM_write_bio_PKCS8PrivateKey_nid(BIO *bp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 90 PEM_write_bio_PKCS8PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 97 i2d_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 104 i2d_PKCS8PrivateKey_nid_bio(BIO *bp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 111 do_pk8pkey(BIO *bp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 164 int klen; local 197 i2d_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 203 i2d_PKCS8PrivateKey_nid_fp(FILE *fp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 210 PEM_write_PKCS8PrivateKey_nid(FILE *fp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 217 PEM_write_PKCS8PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 224 do_pk8pkey_fp(FILE *fp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument [all...] |
H A D | pem_all.c | 194 unsigned char *kstr, int klen, 204 ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u); 211 unsigned char *kstr, int klen, 222 ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u); 266 unsigned char *kstr, int klen, 276 ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u); 283 unsigned char *kstr, int klen, 292 ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u); 345 unsigned char *kstr, int klen, 355 ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, c 193 PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 210 PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 265 PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 282 PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 361 PEM_write_ECPrivateKey(FILE *fp, EC_KEY *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 424 PEM_write_bio_PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 438 PEM_write_PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument [all...] |
H A D | pem_pkey.c | 103 int klen; local 109 klen = cb(psbuf, PEM_BUFSIZE, 0, u); 111 klen = PEM_def_callback(psbuf, PEM_BUFSIZE, 0, u); 112 if (klen <= 0) { 117 p8inf = PKCS8_decrypt(p8, psbuf, klen);
|
H A D | pem.h | 251 unsigned char *kstr, int klen, pem_password_cb *cb, \ 257 enc, kstr, klen, cb, u); \ 262 unsigned char *kstr, int klen, pem_password_cb *cb, \ 268 enc, kstr, klen, cb, u); \ 302 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 307 enc, kstr, klen, cb, u); \ 312 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 317 enc, kstr, klen, cb, u); \ 373 unsigned char *kstr, int klen, pem_password_cb *cb, void *u); 389 unsigned char *kstr, int klen, pem_password_c [all...] |
H A D | pem_lib.c | 276 int klen, pem_password_cb *callback, void *u) 286 ret = PEM_ASN1_write_bio(i2d, name, b, x, enc, kstr, klen, callback, u); 294 int klen, pem_password_cb *callback, void *u) 330 klen = PEM_def_callback(buf, PEM_BUFSIZE, 1, u); 332 klen = (*callback) (buf, PEM_BUFSIZE, 1, u); 333 if (klen <= 0) { 339 ebcdic2ascii(buf, buf, klen); 351 EVP_BytesToKey(enc, EVP_md5(), iv, kstr, klen, 1, key, NULL); 393 int i, j, o, klen; local 404 klen 274 PEM_ASN1_write(i2d_of_void *i2d, const char *name, FILE *fp, char *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *callback, void *u) argument 292 PEM_ASN1_write_bio(i2d_of_void *i2d, const char *name, BIO *bp, char *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *callback, void *u) argument [all...] |
/freebsd-9.3-release/crypto/openssh/ |
H A D | kexecdhc.c | 59 u_int klen, slen, sbloblen, hashlen; local 109 klen = (EC_GROUP_get_degree(group) + 7) / 8; 110 kbuf = xmalloc(klen); 111 if (ECDH_compute_key(kbuf, klen, server_public, 112 client_key, NULL) != (int)klen) 116 dump_digest("shared secret", kbuf, klen); 120 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 122 explicit_bzero(kbuf, klen);
|
H A D | kexecdhs.c | 56 u_int klen, slen, sbloblen, hashlen; local 93 klen = (EC_GROUP_get_degree(group) + 7) / 8; 94 kbuf = xmalloc(klen); 95 if (ECDH_compute_key(kbuf, klen, client_public, 96 server_key, NULL) != (int)klen) 100 dump_digest("shared secret", kbuf, klen); 104 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 106 explicit_bzero(kbuf, klen);
|
H A D | hmac.h | 28 int ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
|
H A D | kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; local 116 klen = DH_size(dh); 117 kbuf = xmalloc(klen); 127 explicit_bzero(kbuf, klen);
|
H A D | kexdhs.c | 53 u_int sbloblen, klen, hashlen, slen; local 102 klen = DH_size(dh); 103 kbuf = xmalloc(klen); 113 explicit_bzero(kbuf, klen);
|
H A D | kexgexc.c | 56 u_int klen, slen, sbloblen, hashlen; local 154 klen = DH_size(dh); 155 kbuf = xmalloc(klen); 165 explicit_bzero(kbuf, klen);
|
H A D | kexgexs.c | 60 u_int sbloblen, klen, slen, hashlen; local 142 klen = DH_size(dh); 143 kbuf = xmalloc(klen); 153 explicit_bzero(kbuf, klen);
|
H A D | hmac.c | 64 ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen) argument 71 if (klen <= ctx->buf_len) 72 memcpy(ctx->buf, key, klen); 73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) argument 149 if (ssh_hmac_init(ctx, key, klen) < 0 ||
|
H A D | cipher.c | 279 int klen; local 327 klen = EVP_CIPHER_CTX_key_length(&cc->evp); 328 if (klen > 0 && keylen != (u_int)klen) { 329 debug2("cipher_init: set keylen (%d -> %d)", klen, keylen); 332 klen, keylen);
|
/freebsd-9.3-release/sys/dev/glxsb/ |
H A D | glxsb_hash.c | 52 glxsb_hash_key_setup(struct glxsb_session *ses, caddr_t key, int klen) argument 57 klen /= 8; 60 for (i = 0; i < klen; i++) 64 axf->Update(ses->ses_ictx, key, klen); 65 axf->Update(ses->ses_ictx, hmac_ipad_buffer, axf->blocksize - klen); 67 for (i = 0; i < klen; i++) 71 axf->Update(ses->ses_octx, key, klen); 72 axf->Update(ses->ses_octx, hmac_opad_buffer, axf->blocksize - klen); 74 for (i = 0; i < klen; i++)
|
/freebsd-9.3-release/tools/tools/net80211/w00t/libw00t/ |
H A D | w00t.c | 279 int klen; local 281 klen = strlen(str); 282 if (klen % 2) 284 klen /= 2; 286 if (klen != 5 && klen != 13) 289 *len = klen; 291 while (klen--) { 305 int wep_decrypt(struct ieee80211_frame *wh, int len, char *key, int klen) argument 313 assert(sizeof(seed) >= klen 333 wep_encrypt(struct ieee80211_frame *wh, int len, char *key, int klen) argument [all...] |
H A D | w00t.h | 50 int wep_decrypt(struct ieee80211_frame *wh, int len, char *key, int klen); 51 void wep_encrypt(struct ieee80211_frame *wh, int len, char *key, int klen);
|
/freebsd-9.3-release/sbin/iscontrol/ |
H A D | login.c | 102 int klen, len, n; local 108 klen = strlen(key); 109 while(len > klen) { 110 if(strncmp(key, ptr, klen) == 0) 111 return ptr+klen; 157 int len, klen, n; local 167 klen = 0; 169 klen = eq - ptr; 170 if(klen > 0) { 171 if(strncmp(ptr, "TargetAddress", klen) [all...] |
/freebsd-9.3-release/sys/boot/arm/at91/boot2/ |
H A D | boot2.c | 206 int klen; local 209 klen = 0; 235 klen += ep[i].p_filesz; 242 fixup_boot_drv(staddr, klen, bootslice, bootpart); 346 fixup_boot_drv(caddr_t addr, int klen, int bs, int bp) argument 353 (int)addr, klen, bs, bp); 358 ps = memmem(addr, klen, op, sizeof(op)); 375 ps = memmem(addr, klen, op2, sizeof(op2) - 1);
|
/freebsd-9.3-release/sys/boot/arm/ixp425/boot2/ |
H A D | boot2.c | 215 int klen; local 218 klen = 0; 245 klen += ep[i].p_filesz; 254 fixup_boot_drv(staddr, klen, bootslice, bootpart); 436 fixup_boot_drv(caddr_t addr, int klen, int bs, int bp) argument 443 (int)addr, klen, bs, bp); 448 ps = memmem(addr, klen, op, sizeof(op)); 465 ps = memmem(addr, klen, op2, sizeof(op2) - 1);
|
/freebsd-9.3-release/sys/crypto/via/ |
H A D | padlock_hash.c | 244 padlock_hash_key_setup(struct padlock_session *ses, caddr_t key, int klen) argument 249 klen /= 8; 260 for (i = 0; i < klen; i++) 264 axf->Update(ses->ses_ictx, key, klen); 265 axf->Update(ses->ses_ictx, hmac_ipad_buffer, axf->blocksize - klen); 267 for (i = 0; i < klen; i++) 271 axf->Update(ses->ses_octx, key, klen); 272 axf->Update(ses->ses_octx, hmac_opad_buffer, axf->blocksize - klen); 274 for (i = 0; i < klen; i++)
|
H A D | padlock_cipher.c | 101 padlock_cipher_key_setup(struct padlock_session *ses, caddr_t key, int klen) argument 109 rijndaelKeySetupEnc(ses->ses_ekey, key, klen); 110 rijndaelKeySetupDec(ses->ses_dkey, key, klen); 116 bcopy(key, ses->ses_ekey, klen); 117 bcopy(key, ses->ses_dkey, klen);
|
/freebsd-9.3-release/usr.sbin/ppp/ |
H A D | pap.c | 184 u_char nlen, klen, *key; local 254 bp = mbuf_Read(bp, &klen, 1); 255 if (m_length(bp) < klen) { 259 if ((key = malloc(klen+1)) == NULL) { 263 bp = mbuf_Read(bp, key, klen); 264 key[klen] = '\0';
|
/freebsd-9.3-release/usr.sbin/mount_portalfs/ |
H A D | activate.c | 66 static int get_request(int so, struct portal_cred *pcr, char *key, int klen) argument 75 iov[1].iov_len = klen;
|
/freebsd-9.3-release/sys/opencrypto/ |
H A D | cryptosoft.c | 451 int klen) 455 klen /= 8; 465 for (k = 0; k < klen; k++) 469 axf->Update(sw->sw_ictx, key, klen); 470 axf->Update(sw->sw_ictx, hmac_ipad_buffer, axf->blocksize - klen); 472 for (k = 0; k < klen; k++) 476 axf->Update(sw->sw_octx, key, klen); 477 axf->Update(sw->sw_octx, hmac_opad_buffer, axf->blocksize - klen); 479 for (k = 0; k < klen; k++) 497 sw->sw_klen = klen; 450 swcr_authprepare(struct auth_hash *axf, struct swcr_data *sw, u_char *key, int klen) argument [all...] |