Searched refs:keylen (Results 1 - 25 of 185) sorted by relevance

12345678

/macosx-10.10/OpenSSL098-52/src/fips/rand/
H A Dfips_rngvs.c43 long i, keylen; local
45 keylen = 0;
51 keylen = 16;
53 keylen = 24;
55 keylen = 32;
61 if (i != keylen)
63 fprintf(stderr, "Invalid key length, expecting %ld\n", keylen);
91 FIPS_rand_set_key(key, keylen);
120 long i, keylen; local
123 keylen
[all...]
H A Dfips_rand.h61 int FIPS_rand_set_key(const unsigned char *key, FIPS_RAND_SIZE_T keylen);
/macosx-10.10/OpenSSL098-52/src/test/
H A Dfips_rngvs.c43 long i, keylen; local
45 keylen = 0;
51 keylen = 16;
53 keylen = 24;
55 keylen = 32;
61 if (i != keylen)
63 fprintf(stderr, "Invalid key length, expecting %ld\n", keylen);
91 FIPS_rand_set_key(key, keylen);
120 long i, keylen; local
123 keylen
[all...]
/macosx-10.10/CommonCrypto-60061/lib/
H A DCommonCryptorDES.c44 void *key, size_t keylen, void *ivec)
47 return ccdes_cbc_cksum(in, out, length, key, keylen, ivec);
43 CCDesCBCCksum(void *in, void *out, size_t length, void *key, size_t keylen, void *ivec) argument
/macosx-10.10/bind9-45.101/bind9/lib/isc/include/isc/
H A Dhash.h159 unsigned int keylen, isc_boolean_t case_sensitive);
161 isc_hash_calc(const unsigned char *key, unsigned int keylen,
174 * 'keylen' specifies the key length, which must not be larger than the limit
/macosx-10.10/ntp-92/lib/isc/include/isc/
H A Dhash.h159 unsigned int keylen, isc_boolean_t case_sensitive);
161 isc_hash_calc(const unsigned char *key, unsigned int keylen,
174 * 'keylen' specifies the key length, which must not be larger than the limit
/macosx-10.10/OpenSSH-189/osslshim/tests/
H A Dtest_rsa.c150 int keylen; local
168 keylen = RSA_private_encrypt(len, in, res, rsa, padding);
169 if (keylen <= 0) {
170 fprintf(stderr, "failed to private encrypt: %d %d", (int)len, (int)keylen);
175 if (keylen > RSA_size(rsa)) {
176 fprintf(stderr, "keylen (%d) > RSA_size(rsa) (%d)", (int)keylen, (int)RSA_size(rsa));
181 keylen = RSA_public_decrypt(keylen, res, res2, rsa, padding);
182 if (keylen <
[all...]
H A Dtest_engine_dso.c198 int keylen; local
225 keylen = RSA_private_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING);
226 if (keylen <= 0)
229 keylen = RSA_public_decrypt(keylen, buf, buf, rsa, RSA_PKCS1_PADDING);
230 if (keylen <= 0)
233 if (keylen != 7)
234 errx(1, "output buffer not same length: %d", (int)keylen);
244 keylen = RSA_public_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING);
245 if (keylen <
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/
H A Dtest_rsa.c91 int keylen; local
103 keylen = RSA_private_encrypt((int)len, in, res, rsa, padding);
104 if (keylen <= 0)
105 errx(1, "failed to private encrypt: %d %d", (int)len, (int)keylen);
107 if (keylen > RSA_size(rsa))
108 errx(1, "keylen > RSA_size(rsa)");
110 keylen = RSA_public_decrypt(keylen, res, res2, rsa, padding);
111 if (keylen <= 0)
112 errx(1, "failed to public decrypt: %d", (int)keylen);
[all...]
H A Dtest_pkcs12.c51 size_t keylen; member in struct:tests
111 key = malloc(t->keylen);
117 t->id, t->iterations, t->keylen,
124 if (memcmp(t->key, key, t->keylen) != 0) {
H A Dtest_engine_dso.c198 int keylen; local
225 keylen = RSA_private_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING);
226 if (keylen <= 0)
229 keylen = RSA_public_decrypt(keylen, buf, buf, rsa, RSA_PKCS1_PADDING);
230 if (keylen <= 0)
233 if (keylen != 7)
234 errx(1, "output buffer not same length: %d", (int)keylen);
244 keylen = RSA_public_encrypt(7, buf, buf, rsa, RSA_PKCS1_PADDING);
245 if (keylen <
[all...]
H A Dhmac.c79 size_t keylen,
99 if (keylen > EVP_MD_block_size(ctx->md)) {
100 EVP_Digest(key, keylen, ctx->buf, NULL, ctx->md, engine);
102 keylen = EVP_MD_size(ctx->md);
119 for (i = 0, p = ctx->ipad; i < keylen; i++)
121 for (i = 0, p = ctx->opad; i < keylen; i++)
77 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md, ENGINE *engine) argument
/macosx-10.10/OpenSSL098-52/src/include/openssl/
H A Dfips_rand.h61 int FIPS_rand_set_key(const unsigned char *key, FIPS_RAND_SIZE_T keylen);
/macosx-10.10/apache-793/httpd/server/
H A Dutil_fcgi.c137 apr_size_t keylen, vallen; local
145 keylen = strlen(elts[i].key);
147 if (keylen >> 7 == 0) {
154 envlen += keylen;
197 apr_size_t keylen, vallen; local
205 keylen = strlen(elts[i].key);
207 if (keylen >> 7 == 0) {
212 itr[0] = keylen & 0xff;
221 itr[0] = ((keylen >> 24) & 0xff) | 0x80;
222 itr[1] = ((keylen >> 1
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/
H A Dtkey_249.h34 isc_uint16_t keylen; member in struct:dns_rdata_tkey
/macosx-10.10/bless-103/libbless/Misc/
H A DBLPreserveBootArgs.c79 int keylen = strlen(remove_boot_args[i]); local
80 if(strlen(token) >= keylen+1
81 && strncmp(remove_boot_args[i], token, keylen) == 0
82 && token[keylen] == '=') {
/macosx-10.10/ruby-106/ruby/ext/openssl/
H A Dossl_pkcs5.c13 * PKCS5.pbkdf2_hmac(pass, salt, iter, keylen, digest) => string
19 * * +keylen+ - integer
27 ossl_pkcs5_pbkdf2_hmac(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen, VALUE digest) argument
31 int len = NUM2INT(keylen);
55 * PKCS5.pbkdf2_hmac_sha1(pass, salt, iter, keylen) => string
61 * * +keylen+ - integer
68 ossl_pkcs5_pbkdf2_hmac_sha1(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen) argument
71 int len = NUM2INT(keylen);
/macosx-10.10/xnu-2782.1.97/bsd/crypto/rc4/
H A Drc4.h49 extern void rc4_init(struct rc4_state *state, const u_char *key, int keylen);
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dhmac.c54 unsigned int keylen)
75 if(keylen > hashparams->hmac_maxkeylen) {
77 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen);
81 keylen = hashparams->hmac_resultlen;
88 for(i = 0; i < keylen; i++) {
52 Curl_HMAC_init(const HMAC_params * hashparams, const unsigned char * key, unsigned int keylen) argument
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dcrypto-pk.c49 size_t keylen, offset; local
61 keylen = (et->keytype->bits + 7) / 8;
63 keydata = malloc(keylen);
93 min(keylen - offset, sizeof(shaoutput)));
97 } while(offset < keylen);
102 ret = krb5_random_to_key(context, type, keydata, keylen, key);
103 memset(keydata, 0, sizeof(keylen));
216 size_t keylen, offset; local
252 keylen = (et->keytype->bits + 7) / 8;
254 keydata = malloc(keylen);
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/cms/
H A Dcms_enc.c160 ec->keylen = tkeylen;
169 if (ec->keylen != tkeylen)
172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0)
186 OPENSSL_cleanse(ec->key, ec->keylen);
189 ec->keylen = tkeylen;
224 OPENSSL_cleanse(ec->key, ec->keylen);
241 const unsigned char *key, size_t keylen)
246 ec->key = OPENSSL_malloc(keylen);
249 memcpy(ec->key, key, keylen);
251 ec->keylen
239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
257 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument
[all...]
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/
H A Ddnssd_clientlib.c76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen)
291 unsigned long keylen; local
[all...]
/macosx-10.10/apr-32/apr/apr/user/win32/
H A Duserinfo.c78 DWORD keylen;
91 keylen = (DWORD)strlen(regkey);
92 get_sid_string(regkey + keylen, sizeof(regkey) - keylen, uid);
97 keylen = (DWORD)strlen(regkey);
98 apr_cpystrn(regkey + keylen, username, sizeof(regkey) - keylen);
108 keylen = sizeof(regkey);
110 (void*)regkey, &keylen);
138 keylen
[all...]
/macosx-10.10/OpenSSH-189/osslshim/ossl/
H A Dossl-hmac.c90 size_t keylen,
109 if (blksize < keylen) {
111 EVP_DigestUpdate(&ctx->md_ctx, key, keylen);
115 /* assert(keylen>=0 && keylen<=(int)sizeof(ctx->buf)); */
116 memcpy(ctx->key, key, keylen);
117 ctx->key_length = keylen;
144 HMAC_Init(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md) argument
149 HMAC_Init_ex(ctx, key, keylen, md, NULL);
88 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md, ENGINE *engine) argument
/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Drandom_password.c81 RND(unsigned char *key, int keylen, int *left) argument
84 krb5_generate_random_block(key, keylen);
85 *left = keylen;

Completed in 315 milliseconds

12345678