/macosx-10.10/OpenSSL098-52/src/fips/rand/ |
H A D | fips_rngvs.c | 43 long i, keylen; local 45 keylen = 0; 51 keylen = 16; 53 keylen = 24; 55 keylen = 32; 61 if (i != keylen) 63 fprintf(stderr, "Invalid key length, expecting %ld\n", keylen); 91 FIPS_rand_set_key(key, keylen); 120 long i, keylen; local 123 keylen [all...] |
H A D | fips_rand.h | 61 int FIPS_rand_set_key(const unsigned char *key, FIPS_RAND_SIZE_T keylen);
|
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | fips_rngvs.c | 43 long i, keylen; local 45 keylen = 0; 51 keylen = 16; 53 keylen = 24; 55 keylen = 32; 61 if (i != keylen) 63 fprintf(stderr, "Invalid key length, expecting %ld\n", keylen); 91 FIPS_rand_set_key(key, keylen); 120 long i, keylen; local 123 keylen [all...] |
/macosx-10.10/CommonCrypto-60061/lib/ |
H A D | CommonCryptorDES.c | 44 void *key, size_t keylen, void *ivec) 47 return ccdes_cbc_cksum(in, out, length, key, keylen, ivec); 43 CCDesCBCCksum(void *in, void *out, size_t length, void *key, size_t keylen, void *ivec) argument
|
/macosx-10.10/bind9-45.101/bind9/lib/isc/include/isc/ |
H A D | hash.h | 159 unsigned int keylen, isc_boolean_t case_sensitive); 161 isc_hash_calc(const unsigned char *key, unsigned int keylen, 174 * 'keylen' specifies the key length, which must not be larger than the limit
|
/macosx-10.10/ntp-92/lib/isc/include/isc/ |
H A D | hash.h | 159 unsigned int keylen, isc_boolean_t case_sensitive); 161 isc_hash_calc(const unsigned char *key, unsigned int keylen, 174 * 'keylen' specifies the key length, which must not be larger than the limit
|
/macosx-10.10/OpenSSH-189/osslshim/tests/ |
H A D | test_rsa.c | 150 int keylen; local 168 keylen = RSA_private_encrypt(len, in, res, rsa, padding); 169 if (keylen <= 0) { 170 fprintf(stderr, "failed to private encrypt: %d %d", (int)len, (int)keylen); 175 if (keylen > RSA_size(rsa)) { 176 fprintf(stderr, "keylen (%d) > RSA_size(rsa) (%d)", (int)keylen, (int)RSA_size(rsa)); 181 keylen = RSA_public_decrypt(keylen, res, res2, rsa, padding); 182 if (keylen < [all...] |
H A D | test_engine_dso.c | 198 int keylen; local 225 keylen = RSA_private_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING); 226 if (keylen <= 0) 229 keylen = RSA_public_decrypt(keylen, buf, buf, rsa, RSA_PKCS1_PADDING); 230 if (keylen <= 0) 233 if (keylen != 7) 234 errx(1, "output buffer not same length: %d", (int)keylen); 244 keylen = RSA_public_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING); 245 if (keylen < [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | test_rsa.c | 91 int keylen; local 103 keylen = RSA_private_encrypt((int)len, in, res, rsa, padding); 104 if (keylen <= 0) 105 errx(1, "failed to private encrypt: %d %d", (int)len, (int)keylen); 107 if (keylen > RSA_size(rsa)) 108 errx(1, "keylen > RSA_size(rsa)"); 110 keylen = RSA_public_decrypt(keylen, res, res2, rsa, padding); 111 if (keylen <= 0) 112 errx(1, "failed to public decrypt: %d", (int)keylen); [all...] |
H A D | test_pkcs12.c | 51 size_t keylen; member in struct:tests 111 key = malloc(t->keylen); 117 t->id, t->iterations, t->keylen, 124 if (memcmp(t->key, key, t->keylen) != 0) {
|
H A D | test_engine_dso.c | 198 int keylen; local 225 keylen = RSA_private_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING); 226 if (keylen <= 0) 229 keylen = RSA_public_decrypt(keylen, buf, buf, rsa, RSA_PKCS1_PADDING); 230 if (keylen <= 0) 233 if (keylen != 7) 234 errx(1, "output buffer not same length: %d", (int)keylen); 244 keylen = RSA_public_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING); 245 if (keylen < [all...] |
H A D | hmac.c | 79 size_t keylen, 99 if (keylen > EVP_MD_block_size(ctx->md)) { 100 EVP_Digest(key, keylen, ctx->buf, NULL, ctx->md, engine); 102 keylen = EVP_MD_size(ctx->md); 119 for (i = 0, p = ctx->ipad; i < keylen; i++) 121 for (i = 0, p = ctx->opad; i < keylen; i++) 77 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md, ENGINE *engine) argument
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | fips_rand.h | 61 int FIPS_rand_set_key(const unsigned char *key, FIPS_RAND_SIZE_T keylen);
|
/macosx-10.10/apache-793/httpd/server/ |
H A D | util_fcgi.c | 137 apr_size_t keylen, vallen; local 145 keylen = strlen(elts[i].key); 147 if (keylen >> 7 == 0) { 154 envlen += keylen; 197 apr_size_t keylen, vallen; local 205 keylen = strlen(elts[i].key); 207 if (keylen >> 7 == 0) { 212 itr[0] = keylen & 0xff; 221 itr[0] = ((keylen >> 24) & 0xff) | 0x80; 222 itr[1] = ((keylen >> 1 [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | tkey_249.h | 34 isc_uint16_t keylen; member in struct:dns_rdata_tkey
|
/macosx-10.10/bless-103/libbless/Misc/ |
H A D | BLPreserveBootArgs.c | 79 int keylen = strlen(remove_boot_args[i]); local 80 if(strlen(token) >= keylen+1 81 && strncmp(remove_boot_args[i], token, keylen) == 0 82 && token[keylen] == '=') {
|
/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkcs5.c | 13 * PKCS5.pbkdf2_hmac(pass, salt, iter, keylen, digest) => string 19 * * +keylen+ - integer 27 ossl_pkcs5_pbkdf2_hmac(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen, VALUE digest) argument 31 int len = NUM2INT(keylen); 55 * PKCS5.pbkdf2_hmac_sha1(pass, salt, iter, keylen) => string 61 * * +keylen+ - integer 68 ossl_pkcs5_pbkdf2_hmac_sha1(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen) argument 71 int len = NUM2INT(keylen);
|
/macosx-10.10/xnu-2782.1.97/bsd/crypto/rc4/ |
H A D | rc4.h | 49 extern void rc4_init(struct rc4_state *state, const u_char *key, int keylen);
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | hmac.c | 54 unsigned int keylen) 75 if(keylen > hashparams->hmac_maxkeylen) { 77 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); 81 keylen = hashparams->hmac_resultlen; 88 for(i = 0; i < keylen; i++) { 52 Curl_HMAC_init(const HMAC_params * hashparams, const unsigned char * key, unsigned int keylen) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | crypto-pk.c | 49 size_t keylen, offset; local 61 keylen = (et->keytype->bits + 7) / 8; 63 keydata = malloc(keylen); 93 min(keylen - offset, sizeof(shaoutput))); 97 } while(offset < keylen); 102 ret = krb5_random_to_key(context, type, keydata, keylen, key); 103 memset(keydata, 0, sizeof(keylen)); 216 size_t keylen, offset; local 252 keylen = (et->keytype->bits + 7) / 8; 254 keydata = malloc(keylen); [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/cms/ |
H A D | cms_enc.c | 160 ec->keylen = tkeylen; 169 if (ec->keylen != tkeylen) 172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) 186 OPENSSL_cleanse(ec->key, ec->keylen); 189 ec->keylen = tkeylen; 224 OPENSSL_cleanse(ec->key, ec->keylen); 241 const unsigned char *key, size_t keylen) 246 ec->key = OPENSSL_malloc(keylen); 249 memcpy(ec->key, key, keylen); 251 ec->keylen 239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument 257 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) 291 unsigned long keylen; local [all...] |
/macosx-10.10/apr-32/apr/apr/user/win32/ |
H A D | userinfo.c | 78 DWORD keylen; 91 keylen = (DWORD)strlen(regkey); 92 get_sid_string(regkey + keylen, sizeof(regkey) - keylen, uid); 97 keylen = (DWORD)strlen(regkey); 98 apr_cpystrn(regkey + keylen, username, sizeof(regkey) - keylen); 108 keylen = sizeof(regkey); 110 (void*)regkey, &keylen); 138 keylen [all...] |
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-hmac.c | 90 size_t keylen, 109 if (blksize < keylen) { 111 EVP_DigestUpdate(&ctx->md_ctx, key, keylen); 115 /* assert(keylen>=0 && keylen<=(int)sizeof(ctx->buf)); */ 116 memcpy(ctx->key, key, keylen); 117 ctx->key_length = keylen; 144 HMAC_Init(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md) argument 149 HMAC_Init_ex(ctx, key, keylen, md, NULL); 88 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md, ENGINE *engine) argument
|
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | random_password.c | 81 RND(unsigned char *key, int keylen, int *left) argument 84 krb5_generate_random_block(key, keylen); 85 *left = keylen;
|