/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/ |
H A D | CommonCMac.c | 47 byteBuffer inputBytes, expectedBytes, keyBytes; 54 keyBytes = hexStringToBytes(keystr); 60 CCAES_Discreet_Cmac(keyBytes->bytes, inputBytes->bytes, inputBytes->len, mdBufdiscreet->bytes); 61 CCAES_Discreet_Cmac_EvenChunk(keyBytes->bytes, inputBytes->bytes, inputBytes->len, mdBufEvenChunk->bytes); 62 CCAESCmac(keyBytes->bytes, inputBytes->bytes, inputBytes->len, mdBufoneshot->bytes); 81 free(keyBytes);
|
H A D | CommonCryptoSymRegression.c | 68 appGetRandomBytes(void *keyBytes, size_t keySizeInBytes) 76 if(read(fd, keyBytes, keySizeInBytes) != (int) keySizeInBytes) { 135 const void *keyBytes, size_t keyLen, 214 keyBytes, keyLen, iv, 229 keyBytes, keyLen, iv, 247 keyBytes, keyLen, iv, 259 keyBytes, keyLen, iv, 270 keyBytes, keyLen, iv, 374 uint8_t keyBytes[MAX_KEY_SIZE]; 386 appGetRandomBytes(keyBytes, keySizeInByte [all...] |
H A D | CommonHMacClone.c | 97 uint8_t *keyBytes; 141 keyBytes = keyBuffer->bytes; 144 CCHmacInit(&ctxOrig, hmacAlg, keyBytes, keySizeInBytes);
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/Java/ |
H A D | TXTRecord.java | 76 byte[] keyBytes; 80 keyBytes = key.getBytes( "US-ASCII"); 86 for ( int i=0; i < keyBytes.length; i++) 87 if ( keyBytes[i] == '=') 90 if ( keyBytes.length + valLen >= 255) 97 this.insert( keyBytes, value, prevLoc); 100 protected void insert( byte[] keyBytes, byte[] value, int index) argument 112 avLen = keyBytes.length + valLen + (value != null ? 1 : 0); 120 System.arraycopy( keyBytes, 0, fBytes, insertion + 1, keyBytes [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/aesVect/ |
H A D | aesVect.c | 66 unsigned keyBytes = keySizeInBits / 8; local 77 setBit(key, keyBytes, i); 86 printBigNum("KEY", key, keyBytes); 101 unsigned keyBytes = keySizeInBits / 8; local 109 printBigNum("KEY", key, keyBytes);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccHmacCompat/ |
H A D | ccHmacCompat.c | 78 const void *keyBytes, size_t keyLen, 88 CCHmac(hmacAlg, keyBytes, keyLen, inText, inTextLen, outText); 93 CCHmacInit(&ctx, hmacAlg, keyBytes, keyLen); 116 const void *keyBytes, size_t keyLen, 148 HMAC(md, keyBytes, (int)keyLen, 167 uint8_t keyBytes[MAX_KEY_SIZE]; local 175 memset(keyBytes, 0, keySizeInBytes); 179 appGetRandomBytes(keyBytes, keySizeInBytes); 184 keyBytes, keySizeInBytes, 190 keyBytes, keySizeInByte 76 doHmacCC( CCHmacAlgorithm hmacAlg, bool randUpdates, const void *keyBytes, size_t keyLen, const uint8_t *inText, size_t inTextLen, uint8_t *outText) argument 114 doHmacRef( CCHmacAlgorithm hmacAlg, const void *keyBytes, size_t keyLen, const uint8_t *inText, size_t inTextLen, uint8_t *outText, size_t *outTextLen) argument [all...] |
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/bind/serial/ |
H A D | StoredClassCatalog.java | 170 byte[] keyBytes = new byte[classID.length + 1]; 171 keyBytes[0] = REC_CLASS_FORMAT; 172 System.arraycopy(classID, 0, keyBytes, 1, classID.length); 173 DatabaseEntry key = new DatabaseEntry(keyBytes); 222 byte[] keyBytes = new byte[1 + UtfOps.getByteLength(nameChars)]; 223 keyBytes[0] = REC_CLASS_INFO; 224 UtfOps.charsToBytes(nameChars, 0, keyBytes, 1, nameChars.length); 225 DatabaseEntry key = new DatabaseEntry(keyBytes); 311 byte[] keyBytes = new byte[1 + idBytes.length]; 312 keyBytes[ [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccPerform/ |
H A D | ccPerform.cpp | 117 uint8_t keyBytes[MAX_KEY_SIZE]; local 120 appGetRandomBytes(keyBytes, MAX_KEY_SIZE); 185 keyBytes, keyLength, NULL, &cryptor); 211 keyBytes, keyLength, NULL, &cryptor);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccSymTest/ |
H A D | ccSymTest.cpp | 114 const void *keyBytes, size_t keyLen, 179 keyBytes, keyLen, iv, 194 keyBytes, keyLen, iv, 212 keyBytes, keyLen, iv, 224 keyBytes, keyLen, iv, 235 keyBytes, keyLen, iv, 339 uint8_t keyBytes[MAX_KEY_SIZE]; local 351 appGetRandomBytes(keyBytes, keySizeInBytes); 380 keyBytes, keySizeInBytes, ivPtrEncrypt, 394 keyBytes, keySizeInByte 109 doCCCrypt( bool forEncrypt, CCAlgorithm encrAlg, bool doCbc, bool doPadding, const void *keyBytes, size_t keyLen, const void *iv, bool randUpdates, bool inPlace, size_t ctxSize, bool askOutSize, const uint8_t *inText, size_t inTextLen, uint8_t **outText, size_t *outTextLen) argument [all...] |
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/collections/ |
H A D | DataCursor.java | 191 private void setThangs(byte[] keyBytes, argument 195 keyThang.setData(KeyRange.copyBytes(keyBytes)); 235 int repositionRange(byte[] keyBytes, argument 245 setThangs(keyBytes, priKeyBytes, valueBytes); 259 if (!KeyRange.equalBytes(keyBytes, 0, keyBytes.length, 291 boolean repositionExact(byte[] keyBytes, argument 301 setThangs(keyBytes, priKeyBytes, valueBytes);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | FEEKeys.cpp | 282 unsigned keyBytes = ((keyBits + 7) / 8) + 1; local 283 aSeed.malloc(keyBytes); 284 session().getRandomBytes(keyBytes, aSeed);
|
H A D | rijndaelApi.c | 65 unsigned keyBytes; local 104 keyBytes = keyLen / 8; 105 for(i = 0; i < keyBytes; i++) {
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/ |
H A D | desTest.cpp | 41 uint8 keyBytes[KEY_SIZE_BYTES]; local 42 CSSM_DATA keyData = {KEY_SIZE_BYTES, keyBytes}; 56 brtn = B_SetKeyInfo(*desKey, KI_DES8, (POINTER)keyBytes);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccHmacClone/ |
H A D | ccHmacClone.cpp | 104 uint8_t keyBytes[MAX_KEY_SIZE]; local 140 appGetRandomBytes(keyBytes, keySizeInBytes); 143 CCHmacInit(&ctxOrig, hmacAlg, keyBytes, keySizeInBytes);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/ |
H A D | rijndaelApi.c | 39 unsigned keyBytes; local 62 keyBytes = keyLen / 8; 63 for(i = 0; i < keyBytes; i++) {
|
H A D | bsafeUtils.c | 214 unsigned keyBytes = (keySizeInBits + 7) / 8; 216 if(keyBytes > keyData->Length) { 230 item.len = keyBytes;
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12Crypto.cpp | 66 unsigned keyBytes = (keySizeInBits + 7) / 8; local 67 coder.allocItem(key.KeyData, keyBytes);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/symCompat/ |
H A D | symCompat.c | 329 unsigned keyBytes = (keySizeInBits + 7) / 8; local 337 keyBytes, 357 if(symKey->KeyData.Length != keyBytes) { 359 keyBytes, symKey->KeyData.Length); 362 memmove(symKey->KeyData.Data, key->Data, keyBytes);
|
/macosx-10.10/ICU-531.30/icuSources/tools/genrb/ |
H A D | reslist.h | 90 bundle_addKeyBytes(struct SRBRoot *bundle, const char *keyBytes, int32_t length, UErrorCode *status);
|
H A D | reslist.c | 1410 bundle_addKeyBytes(struct SRBRoot *bundle, const char *keyBytes, int32_t length, UErrorCode *status) { argument 1416 if (length < 0 || (keyBytes == NULL && length != 0)) { 1436 uprv_memcpy(bundle->fKeys + keypos, keyBytes, length);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/asymTest/ |
H A D | asymTest.c | 601 uint32 keyBytes = keySizeInBits / 8; local 602 if(ptextSize != keyBytes) {
|
/macosx-10.10/ICU-531.30/icuSources/test/intltest/ |
H A D | collationtest.cpp | 1317 const uint8_t *keyBytes = key.getByteArray(keyLength); local 1318 if(keyLength == 0 || keyBytes[keyLength - 1] != 0) { 1339 uint8_t b = keyBytes[i]; 1411 uprv_memcmp(mergedKey.getAlias(), keyBytes, keyLength) != 0)) { 1434 if(keyLength != parts.length() || uprv_memcmp(keyBytes, parts.data(), keyLength) != 0) {
|