/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | HMACSHA1.c | 29 hmacsha1 (const void *keyPtr, uint32 keyLen, argument 33 CCHmac(kCCHmacAlgSHA1, keyPtr, keyLen,
|
H A D | bfContext.cpp | 49 CSSM_SIZE keyLen; local 56 keyData, keyLen); 57 if((keyLen < BF_MIN_KEY_SIZE_BYTES) || (keyLen > BF_MAX_KEY_SIZE_BYTES)) { 64 if(mRawKeySize == keyLen) { 73 BF_set_key(&mBfKey, (int)keyLen, keyData); 76 memmove(mRawKey, keyData, keyLen); 77 mRawKeySize = (unsigned int)keyLen;
|
H A D | castContext.cpp | 63 CSSM_SIZE keyLen; local 70 keyData, keyLen); 71 if((keyLen < kCCKeySizeMinCAST) || (keyLen > kCCKeySizeMaxCAST)) { 78 if(mRawKeySize == keyLen) { 87 (void) CCCryptorCreateWithMode(0, kCCModeECB, kCCAlgorithmCAST, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &mCastKey); 90 memmove(mRawKey, keyData, keyLen); 91 mRawKeySize = (uint32)keyLen;
|
H A D | gladmanContext.cpp | 72 CSSM_SIZE keyLen; local 79 keyData, keyLen); 81 switch(keyLen) { 93 if(mRawKeySize == keyLen) { 107 (void) CCCryptorCreateWithMode(0, kCCModeECB, kCCAlgorithmAES128, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &mAesKey); 110 memmove(mRawKey, keyData, keyLen); 111 mRawKeySize = (uint32)keyLen;
|
H A D | rc4Context.cpp | 41 CSSM_SIZE keyLen; local 47 keyData, keyLen); 48 if((keyLen < kCCKeySizeMinRC4) || (keyLen > kCCKeySizeMaxRC4)) { 54 (void) CCCryptorCreateWithMode(0, kCCModeRC4, kCCAlgorithmRC4, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &rc4Key);
|
H A D | rijndaelApi.c | 60 int keyLen, // in BITS 74 if ((keyLen == 128) || (keyLen == 192) || (keyLen == 256)) { 75 key->keyLen = keyLen; 85 (keyLen == MIN_AES_KEY_BITS) && 104 keyBytes = keyLen / 8; 108 rijndaelKeySched (k, key->keyLen, key->blockLen, key->keySched); 130 (key->keyLen ! 58 makeKey( keyInstance *key, int keyLen, int blockLen, word8 *keyMaterial, int enable128Opt) argument [all...] |
H A D | HMACSHA1.h | 41 hmacsha1 (const void *keyPtr, uint32 keyLen,
|
H A D | pbkdf2.h | 39 The inputs to the pseudo random function are the first keyLen octets pointed 41 Both keyLen and textLen can have any nonzero value. 44 typedef void (*PRF)(const void *keyPtr, uint32 keyLen,
|
H A D | aescsp.cpp | 108 CSSM_SIZE keyLen; local 116 keyData, keyLen); 118 switch(keyLen) { 140 if((lastBlockSize == mBlockSize) && (mRawKeySize == keyLen)) { 150 (keyLen == (MIN_AES_KEY_BITS/8)) && 164 (int)keyLen * 8, 174 mRawKeySize = (uint32)keyLen;
|
H A D | MacContext.cpp | 42 CSSM_SIZE keyLen; local 47 keyData, keyLen); 64 if((keyLen < minKey) || (keyLen > HMAC_MAX_KEY_SIZE)) { 67 CCHmacInit(&hmacCtx, ccAlg, keyData, keyLen); 125 CSSM_SIZE keyLen; local 131 keyData, keyLen); 132 if((keyLen < HMAC_SHA_MIN_KEY_SIZE) || (keyLen > HMAC_MAX_KEY_SIZE)) { 136 OSStatus ortn = hmacLegacyInit(mHmac, keyData, (UInt32)keyLen); [all...] |
H A D | rc2Context.cpp | 40 CSSM_SIZE keyLen; local 47 keyData, keyLen); 48 if((keyLen < RC2_MIN_KEY_SIZE_BYTES) || (keyLen > RC2_MAX_KEY_SIZE_BYTES)) { 64 RC2_set_key(&rc2Key, (int)keyLen, keyData, effectiveBits);
|
H A D | rc5Context.cpp | 40 CSSM_SIZE keyLen; local 47 keyData, keyLen); 48 if((keyLen < RC5_MIN_KEY_SIZE_BYTES) || (keyLen > RC5_MAX_KEY_SIZE_BYTES)) { 62 RC5_32_set_key(&rc5Key, (int)keyLen, keyData, rounds);
|
H A D | opensshCoding.cpp | 225 unsigned keyLen, 234 if(keyLen < (len + 1)) { 248 keyLen -= (len + 1); 251 skipWhite(key, keyLen); 252 if(keyLen == 0) { 259 const unsigned char *endBlob = findNextWhite(key, keyLen); 474 unsigned keyLen = (unsigned)length; local 483 if((ourRtn = parseSSH2PubKey(key, keyLen, SSH2_RSA_HEADER, &decodedBlob, &decodedBlobLen))) { 498 keyLen = decodedBlobLen; 499 if(keyLen < 1 223 parseSSH2PubKey( const unsigned char *key, unsigned keyLen, const char *header, unsigned char **decodedBlob, unsigned *decodedBlobLen) argument 609 unsigned keyLen = (unsigned)length; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cryptkit/ |
H A D | HmacSha1Legacy.c | 89 UInt32 keyLen) 104 if (keyLen != kSHA1DigestSize) { 118 for (byte = 0; byte < keyLen; byte++) 126 memset (hmac->k_ipad + keyLen, 0x36, kSHA1BlockSize - keyLen); 127 memset (hmac->k_opad + keyLen, 0x5c, kSHA1BlockSize - keyLen); 86 hmacLegacyInit( hmacLegacyContextRef hmac, const void *keyPtr, UInt32 keyLen) argument
|
H A D | HmacSha1Legacy.h | 54 UInt32 keyLen);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cryptkit/lib/ |
H A D | HmacSha1Legacy.c | 89 UInt32 keyLen) 104 if (keyLen != kSHA1DigestSize) { 118 for (byte = 0; byte < keyLen; byte++) 126 memset (hmac->k_ipad + keyLen, 0x36, kSHA1BlockSize - keyLen); 127 memset (hmac->k_opad + keyLen, 0x5c, kSHA1BlockSize - keyLen); 86 hmacLegacyInit( hmacLegacyContextRef hmac, const void *keyPtr, UInt32 keyLen) argument
|
H A D | HmacSha1Legacy.h | 54 UInt32 keyLen);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/utilLib/ |
H A D | rijndaelApi.c | 34 int keyLen, // in BITS 54 if ((keyLen == 128) || (keyLen == 192) || (keyLen == 256)) { 55 key->keyLen = keyLen; 62 keyBytes = keyLen / 8; 66 _rijndaelKeySched (k, key->keyLen, key->blockLen, key->keySched); 111 (key->keyLen != 128 && key->keyLen ! 32 _makeKey( keyInstance *key, BYTE direction, int keyLen, int blockLen, BYTE *keyMaterial) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecImportExportOpenSSH.cpp | 80 unsigned keyLen, 86 skipWhite(key, keyLen); 87 if(keyLen == 0) { 91 key = findNextWhite(key, keyLen); 92 if(keyLen == 0) { 95 skipWhite(key, keyLen); 96 if(keyLen == 0) { 102 char *rtnStr = (char *)malloc(keyLen + 1); 103 memmove(rtnStr, key, keyLen); 104 if(rtnStr[keyLen 78 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument 184 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument 206 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument 232 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument 305 unsigned keyLen = (unsigned)CFDataGetLength(external); local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecImportExportOpenSSH.cpp | 80 unsigned keyLen, 86 skipWhite(key, keyLen); 87 if(keyLen == 0) { 91 key = findNextWhite(key, keyLen); 92 if(keyLen == 0) { 95 skipWhite(key, keyLen); 96 if(keyLen == 0) { 102 char *rtnStr = (char *)malloc(keyLen + 1); 103 memmove(rtnStr, key, keyLen); 104 if(rtnStr[keyLen 78 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument 184 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument 206 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument 232 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument 305 unsigned keyLen = (unsigned)CFDataGetLength(external); local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecImportExportOpenSSH.cpp | 80 unsigned keyLen, 86 skipWhite(key, keyLen); 87 if(keyLen == 0) { 91 key = findNextWhite(key, keyLen); 92 if(keyLen == 0) { 95 skipWhite(key, keyLen); 96 if(keyLen == 0) { 102 char *rtnStr = (char *)malloc(keyLen + 1); 103 memmove(rtnStr, key, keyLen); 104 if(rtnStr[keyLen 78 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument 184 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument 206 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument 232 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument 305 unsigned keyLen = (unsigned)CFDataGetLength(external); local [all...] |
/macosx-10.10.1/configd-699.1.5/configd.tproj/ |
H A D | configd_server.h | 69 mach_msg_type_number_t keyLen, 78 mach_msg_type_number_t keyLen, 87 mach_msg_type_number_t keyLen, 95 mach_msg_type_number_t keyLen, 104 mach_msg_type_number_t keyLen, 113 mach_msg_type_number_t keyLen, 119 mach_msg_type_number_t keyLen, 145 mach_msg_type_number_t keyLen, 151 mach_msg_type_number_t keyLen,
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | pbkdf2.h | 37 The inputs to the pseudo random function are the first keyLen octets pointed 39 Both keyLen and textLen can have any nonzero value. 42 typedef void (*PRF)(const uint8_t *keyPtr, size_t keyLen,
|
/macosx-10.10.1/tcl-105/tcl_ext/tclx/tclx/generic/ |
H A D | tclXkeylist.c | 48 int keyLen; member in struct:__anon12754 107 ValidateKey _ANSI_ARGS_((Tcl_Interp *interp, char *key, int keyLen)); 221 * o keyLen - Length of the string, used to check for binary data. 227 ValidateKey (interp, key, keyLen) 230 int keyLen; 232 if (strlen (key) != (size_t) keyLen) { 237 if (keyLen == 0) { 414 int keyLen, findIdx = -1; 418 keyLen = keySeparPtr - key; 420 keyLen 407 int keyLen, findIdx = -1; local 558 int keyLen, idx, objc, subObjc; local 783 int findIdx, keyLen, status = TCL_OK; local 1035 int keyLen, status; local 1114 int idx, keyLen, result = TCL_OK; local 1174 int idx, keyLen, status; local 1236 int keyLen, status; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | tls_hmac.c | 53 size_t keyLen, 108 if (keyLen <= digest_block_size) { 111 SSLBuffer keyBuffer = { keyLen, (uint8_t *)keyPtr }; 116 keyLen = outBuffer.length; 122 for (ix = 0; ix < keyLen; ++ix) 124 memset(pad + keyLen, 0x5c, digest_block_size - keyLen); 128 for (ix = 0; ix < keyLen; ++ix) 130 memset(pad + keyLen, 0x36, digest_block_size - keyLen); 50 HMAC_Alloc( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument 262 HMAC_AllocNull( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument [all...] |