Searched refs:keyLen (Results 1 - 25 of 98) sorted by relevance

1234

/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DHMACSHA1.c29 hmacsha1 (const void *keyPtr, uint32 keyLen, argument
33 CCHmac(kCCHmacAlgSHA1, keyPtr, keyLen,
H A DbfContext.cpp49 CSSM_SIZE keyLen; local
56 keyData, keyLen);
57 if((keyLen < BF_MIN_KEY_SIZE_BYTES) || (keyLen > BF_MAX_KEY_SIZE_BYTES)) {
64 if(mRawKeySize == keyLen) {
73 BF_set_key(&mBfKey, (int)keyLen, keyData);
76 memmove(mRawKey, keyData, keyLen);
77 mRawKeySize = (unsigned int)keyLen;
H A DcastContext.cpp63 CSSM_SIZE keyLen; local
70 keyData, keyLen);
71 if((keyLen < kCCKeySizeMinCAST) || (keyLen > kCCKeySizeMaxCAST)) {
78 if(mRawKeySize == keyLen) {
87 (void) CCCryptorCreateWithMode(0, kCCModeECB, kCCAlgorithmCAST, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &mCastKey);
90 memmove(mRawKey, keyData, keyLen);
91 mRawKeySize = (uint32)keyLen;
H A DgladmanContext.cpp72 CSSM_SIZE keyLen; local
79 keyData, keyLen);
81 switch(keyLen) {
93 if(mRawKeySize == keyLen) {
107 (void) CCCryptorCreateWithMode(0, kCCModeECB, kCCAlgorithmAES128, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &mAesKey);
110 memmove(mRawKey, keyData, keyLen);
111 mRawKeySize = (uint32)keyLen;
H A Drc4Context.cpp41 CSSM_SIZE keyLen; local
47 keyData, keyLen);
48 if((keyLen < kCCKeySizeMinRC4) || (keyLen > kCCKeySizeMaxRC4)) {
54 (void) CCCryptorCreateWithMode(0, kCCModeRC4, kCCAlgorithmRC4, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &rc4Key);
H A DrijndaelApi.c60 int keyLen, // in BITS
74 if ((keyLen == 128) || (keyLen == 192) || (keyLen == 256)) {
75 key->keyLen = keyLen;
85 (keyLen == MIN_AES_KEY_BITS) &&
104 keyBytes = keyLen / 8;
108 rijndaelKeySched (k, key->keyLen, key->blockLen, key->keySched);
130 (key->keyLen !
58 makeKey( keyInstance *key, int keyLen, int blockLen, word8 *keyMaterial, int enable128Opt) argument
[all...]
H A DHMACSHA1.h41 hmacsha1 (const void *keyPtr, uint32 keyLen,
H A Dpbkdf2.h39 The inputs to the pseudo random function are the first keyLen octets pointed
41 Both keyLen and textLen can have any nonzero value.
44 typedef void (*PRF)(const void *keyPtr, uint32 keyLen,
H A Daescsp.cpp108 CSSM_SIZE keyLen; local
116 keyData, keyLen);
118 switch(keyLen) {
140 if((lastBlockSize == mBlockSize) && (mRawKeySize == keyLen)) {
150 (keyLen == (MIN_AES_KEY_BITS/8)) &&
164 (int)keyLen * 8,
174 mRawKeySize = (uint32)keyLen;
H A DMacContext.cpp42 CSSM_SIZE keyLen; local
47 keyData, keyLen);
64 if((keyLen < minKey) || (keyLen > HMAC_MAX_KEY_SIZE)) {
67 CCHmacInit(&hmacCtx, ccAlg, keyData, keyLen);
125 CSSM_SIZE keyLen; local
131 keyData, keyLen);
132 if((keyLen < HMAC_SHA_MIN_KEY_SIZE) || (keyLen > HMAC_MAX_KEY_SIZE)) {
136 OSStatus ortn = hmacLegacyInit(mHmac, keyData, (UInt32)keyLen);
[all...]
H A Drc2Context.cpp40 CSSM_SIZE keyLen; local
47 keyData, keyLen);
48 if((keyLen < RC2_MIN_KEY_SIZE_BYTES) || (keyLen > RC2_MAX_KEY_SIZE_BYTES)) {
64 RC2_set_key(&rc2Key, (int)keyLen, keyData, effectiveBits);
H A Drc5Context.cpp40 CSSM_SIZE keyLen; local
47 keyData, keyLen);
48 if((keyLen < RC5_MIN_KEY_SIZE_BYTES) || (keyLen > RC5_MAX_KEY_SIZE_BYTES)) {
62 RC5_32_set_key(&rc5Key, (int)keyLen, keyData, rounds);
H A DopensshCoding.cpp225 unsigned keyLen,
234 if(keyLen < (len + 1)) {
248 keyLen -= (len + 1);
251 skipWhite(key, keyLen);
252 if(keyLen == 0) {
259 const unsigned char *endBlob = findNextWhite(key, keyLen);
474 unsigned keyLen = (unsigned)length; local
483 if((ourRtn = parseSSH2PubKey(key, keyLen, SSH2_RSA_HEADER, &decodedBlob, &decodedBlobLen))) {
498 keyLen = decodedBlobLen;
499 if(keyLen < 1
223 parseSSH2PubKey( const unsigned char *key, unsigned keyLen, const char *header, unsigned char **decodedBlob, unsigned *decodedBlobLen) argument
609 unsigned keyLen = (unsigned)length; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cryptkit/
H A DHmacSha1Legacy.c89 UInt32 keyLen)
104 if (keyLen != kSHA1DigestSize) {
118 for (byte = 0; byte < keyLen; byte++)
126 memset (hmac->k_ipad + keyLen, 0x36, kSHA1BlockSize - keyLen);
127 memset (hmac->k_opad + keyLen, 0x5c, kSHA1BlockSize - keyLen);
86 hmacLegacyInit( hmacLegacyContextRef hmac, const void *keyPtr, UInt32 keyLen) argument
H A DHmacSha1Legacy.h54 UInt32 keyLen);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cryptkit/lib/
H A DHmacSha1Legacy.c89 UInt32 keyLen)
104 if (keyLen != kSHA1DigestSize) {
118 for (byte = 0; byte < keyLen; byte++)
126 memset (hmac->k_ipad + keyLen, 0x36, kSHA1BlockSize - keyLen);
127 memset (hmac->k_opad + keyLen, 0x5c, kSHA1BlockSize - keyLen);
86 hmacLegacyInit( hmacLegacyContextRef hmac, const void *keyPtr, UInt32 keyLen) argument
H A DHmacSha1Legacy.h54 UInt32 keyLen);
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/utilLib/
H A DrijndaelApi.c34 int keyLen, // in BITS
54 if ((keyLen == 128) || (keyLen == 192) || (keyLen == 256)) {
55 key->keyLen = keyLen;
62 keyBytes = keyLen / 8;
66 _rijndaelKeySched (k, key->keyLen, key->blockLen, key->keySched);
111 (key->keyLen != 128 && key->keyLen !
32 _makeKey( keyInstance *key, BYTE direction, int keyLen, int blockLen, BYTE *keyMaterial) argument
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/
H A DSecImportExportOpenSSH.cpp80 unsigned keyLen,
86 skipWhite(key, keyLen);
87 if(keyLen == 0) {
91 key = findNextWhite(key, keyLen);
92 if(keyLen == 0) {
95 skipWhite(key, keyLen);
96 if(keyLen == 0) {
102 char *rtnStr = (char *)malloc(keyLen + 1);
103 memmove(rtnStr, key, keyLen);
104 if(rtnStr[keyLen
78 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument
184 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument
206 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument
232 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument
305 unsigned keyLen = (unsigned)CFDataGetLength(external); local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecImportExportOpenSSH.cpp80 unsigned keyLen,
86 skipWhite(key, keyLen);
87 if(keyLen == 0) {
91 key = findNextWhite(key, keyLen);
92 if(keyLen == 0) {
95 skipWhite(key, keyLen);
96 if(keyLen == 0) {
102 char *rtnStr = (char *)malloc(keyLen + 1);
103 memmove(rtnStr, key, keyLen);
104 if(rtnStr[keyLen
78 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument
184 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument
206 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument
232 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument
305 unsigned keyLen = (unsigned)CFDataGetLength(external); local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecImportExportOpenSSH.cpp80 unsigned keyLen,
86 skipWhite(key, keyLen);
87 if(keyLen == 0) {
91 key = findNextWhite(key, keyLen);
92 if(keyLen == 0) {
95 skipWhite(key, keyLen);
96 if(keyLen == 0) {
102 char *rtnStr = (char *)malloc(keyLen + 1);
103 memmove(rtnStr, key, keyLen);
104 if(rtnStr[keyLen
78 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument
184 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument
206 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument
232 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument
305 unsigned keyLen = (unsigned)CFDataGetLength(external); local
[all...]
/macosx-10.10.1/configd-699.1.5/configd.tproj/
H A Dconfigd_server.h69 mach_msg_type_number_t keyLen,
78 mach_msg_type_number_t keyLen,
87 mach_msg_type_number_t keyLen,
95 mach_msg_type_number_t keyLen,
104 mach_msg_type_number_t keyLen,
113 mach_msg_type_number_t keyLen,
119 mach_msg_type_number_t keyLen,
145 mach_msg_type_number_t keyLen,
151 mach_msg_type_number_t keyLen,
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A Dpbkdf2.h37 The inputs to the pseudo random function are the first keyLen octets pointed
39 Both keyLen and textLen can have any nonzero value.
42 typedef void (*PRF)(const uint8_t *keyPtr, size_t keyLen,
/macosx-10.10.1/tcl-105/tcl_ext/tclx/tclx/generic/
H A DtclXkeylist.c48 int keyLen; member in struct:__anon12754
107 ValidateKey _ANSI_ARGS_((Tcl_Interp *interp, char *key, int keyLen));
221 * o keyLen - Length of the string, used to check for binary data.
227 ValidateKey (interp, key, keyLen)
230 int keyLen;
232 if (strlen (key) != (size_t) keyLen) {
237 if (keyLen == 0) {
414 int keyLen, findIdx = -1;
418 keyLen = keySeparPtr - key;
420 keyLen
407 int keyLen, findIdx = -1; local
558 int keyLen, idx, objc, subObjc; local
783 int findIdx, keyLen, status = TCL_OK; local
1035 int keyLen, status; local
1114 int idx, keyLen, result = TCL_OK; local
1174 int idx, keyLen, status; local
1236 int keyLen, status; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A Dtls_hmac.c53 size_t keyLen,
108 if (keyLen <= digest_block_size) {
111 SSLBuffer keyBuffer = { keyLen, (uint8_t *)keyPtr };
116 keyLen = outBuffer.length;
122 for (ix = 0; ix < keyLen; ++ix)
124 memset(pad + keyLen, 0x5c, digest_block_size - keyLen);
128 for (ix = 0; ix < keyLen; ++ix)
130 memset(pad + keyLen, 0x36, digest_block_size - keyLen);
50 HMAC_Alloc( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument
262 HMAC_AllocNull( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument
[all...]

Completed in 275 milliseconds

1234