/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | hmac.c | 50 memset(ctx->buf, 0, ctx->key_length); 89 memset(ctx->buf, 0, ctx->key_length); 92 ctx->key_length = EVP_MD_size(ctx->md); 93 ctx->buf = malloc(ctx->key_length); 106 memset(ctx->opad, 0, ctx->key_length); 110 memset(ctx->ipad, 0, ctx->key_length); 144 EVP_DigestUpdate(ctx->ctx, ctx->buf, ctx->key_length);
|
H A D | hmac.h | 62 size_t key_length; member in struct:hc_HMAC_CTX
|
/macosx-10.10/Security-57031.1.35/Security/utilities/src/ |
H A D | iCloudKeychainTrace.c | 110 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 111 key_length += 1; // For null 112 char key_buffer[key_length]; 113 memset(key_buffer, 0,key_length); 114 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF8)) 192 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 193 key_length += 1; // For null 194 char key_buffer[key_length]; 195 memset(key_buffer, 0,key_length); 196 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF [all...] |
H A D | SecCertificateTrace.c | 118 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 119 key_length += 1; // For null 120 char key_buffer[key_length]; 121 memset(key_buffer, 0,key_length); 122 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF8)) 200 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 201 key_length += 1; // For null 202 char key_buffer[key_length]; 203 memset(key_buffer, 0,key_length); 204 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF [all...] |
/macosx-10.10/Security-57031.1.35/Security/utilities/utilities/ |
H A D | iCloudKeychainTrace.c | 110 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 111 key_length += 1; // For null 112 char key_buffer[key_length]; 113 memset(key_buffer, 0,key_length); 114 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF8)) 192 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 193 key_length += 1; // For null 194 char key_buffer[key_length]; 195 memset(key_buffer, 0,key_length); 196 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF [all...] |
H A D | SecCertificateTrace.c | 118 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 119 key_length += 1; // For null 120 char key_buffer[key_length]; 121 memset(key_buffer, 0,key_length); 122 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF8)) 200 CFIndex key_length = CFStringGetMaximumSizeForEncoding(CFStringGetLength(real_key), kCFStringEncodingUTF8); local 201 key_length += 1; // For null 202 char key_buffer[key_length]; 203 memset(key_buffer, 0,key_length); 204 if (!CFStringGetCString(real_key, key_buffer, key_length, kCFStringEncodingUTF [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPOLUtil.c | 76 u_int16_t key_length; local 85 key_length = EAPOLKeyDescriptorGetLength(descr_p); 90 key_length, 119 uint16_t key_length; local 121 key_length = EAPOLIEEE80211KeyDescriptorGetLength(descr_p); 127 STRING_APPEND(str, "%-18s%d\n", "key_length:", key_length); 337 net_uint16_set(pkt->key_length, length); 351 return (net_uint16_get(pkt->key_length)); 363 return (net_uint16_get(pkt->key_length)); [all...] |
H A D | EAPOL.h | 77 uint8_t key_length[2]; member in struct:__anon8595 108 uint8_t key_length[2]; member in struct:__anon8597
|
H A D | EAPClientModule.h | 118 int * key_length); 123 int * key_length);
|
H A D | EAPClientPlugin.h | 301 (EAPClientPluginFuncSessionKey)(EAPClientPluginDataRef plugin, int * key_length); 315 (EAPClientPluginFuncServerKey)(EAPClientPluginDataRef plugin, int * key_length);
|
H A D | EAPClientModule.c | 332 EAPClientPluginDataRef plugin, int * key_length) 340 return (*session_key)(plugin, key_length); 345 EAPClientPluginDataRef plugin, int * key_length) 353 return (*server_key)(plugin, key_length); 331 EAPClientModulePluginSessionKey(EAPClientModuleRef module, EAPClientPluginDataRef plugin, int * key_length) argument 344 EAPClientModulePluginServerKey(EAPClientModuleRef module, EAPClientPluginDataRef plugin, int * key_length) argument
|
H A D | eaptls_plugin.c | 663 eaptls_session_key(EAPClientPluginDataRef plugin, int * key_length) argument 667 *key_length = 0; 673 *key_length = 32; 678 eaptls_server_key(EAPClientPluginDataRef plugin, int * key_length) argument 682 *key_length = 0; 688 *key_length = 32;
|
H A D | EAPTLSUtil.h | 99 void * key, int key_length);
|
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-hmac.c | 113 &ctx->key_length); 117 ctx->key_length = keylen; 119 if (ctx->key_length != HMAC_MAX_MD_CBLOCK) { 120 memset(&ctx->key[ctx->key_length], 0, 121 HMAC_MAX_MD_CBLOCK - ctx->key_length);
|
H A D | ossl-hmac.h | 86 unsigned int key_length; member in struct:ossl_HMAC_CTX
|
/macosx-10.10/OpenSSL098-52/src/crypto/hmac/ |
H A D | hmac.c | 90 &ctx->key_length); 96 ctx->key_length=len; 98 if(ctx->key_length != HMAC_MAX_MD_CBLOCK) 99 memset(&ctx->key[ctx->key_length], 0, 100 HMAC_MAX_MD_CBLOCK - ctx->key_length);
|
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/macosx-10.10/OpenSSL098-52/src/fips/hmac/ |
H A D | fips_hmac.c | 97 &ctx->key_length); 103 ctx->key_length=len; 105 if(ctx->key_length != HMAC_MAX_MD_CBLOCK) 106 memset(&ctx->key[ctx->key_length], 0, 107 HMAC_MAX_MD_CBLOCK - ctx->key_length);
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | hash.h | 33 size_t key_length, 93 size_t Curl_hash_str(void* key, size_t key_length, size_t slots_num);
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/macosx-10.10/eap8021x-198/eapolclient.tproj/ |
H A D | EAPOLSocket.h | 68 int index, const uint8_t * key, int key_length);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/crypto/ |
H A D | pbkdf2-00-hmac-sha1.c | 32 uint8_t *key_out, size_t key_length) 38 salt, salt_length, iterations, key_out, key_length, temp_data); 29 pbkdf2_hmac_sha1_deriviation(const uint8_t *passphrase, size_t passphrase_length, const uint8_t *salt, size_t salt_length, size_t iterations, uint8_t *key_out, size_t key_length) argument
|
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_pkey.c | 117 ret->key_length=0;
|
/macosx-10.10/ntfs-84/kext/ |
H A D | ntfs_secure.c | 283 le16_to_cpu(ie->key_length) > 294 le16_to_cpu(ie->key_length) > 421 le16_to_cpu(ie->key_length) > 435 le16_to_cpu(ie->key_length) >
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | tls_o.c | 71 static RSA * tlso_tmp_rsa_cb( SSL *ssl, int is_export, int key_length ); 73 static DH * tlso_tmp_dh_cb( SSL *ssl, int is_export, int key_length ); 1421 tlso_tmp_rsa_cb( SSL *ssl, int is_export, int key_length ) 1432 if ( tmp_rsa && !RSA_generate_key_ex( tmp_rsa, key_length, bn, NULL )) { 1440 tmp_rsa = RSA_generate_key( key_length, RSA_F4, NULL, NULL ); 1446 key_length, is_export ? "export" : "domestic", 0 ); 1553 tlso_tmp_dh_cb( SSL *ssl, int is_export, int key_length ) 1563 if ( p->keylength == key_length ) { 1572 if ( tlso_dhpem[i].keylength == key_length ) { 1585 dh = DH_generate_parameters( key_length, DH_GENERATOR_ [all...] |