/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | HMACSHA1.c | 30 hmacsha1 (const void *keyPtr, uint32 keyLen, argument 34 CCHmac(kCCHmacAlgSHA1, keyPtr, keyLen,
|
H A D | bfContext.cpp | 50 CSSM_SIZE keyLen; local 57 keyData, keyLen); 58 if((keyLen < BF_MIN_KEY_SIZE_BYTES) || (keyLen > BF_MAX_KEY_SIZE_BYTES)) { 65 if(mRawKeySize == keyLen) { 74 BF_set_key(&mBfKey, (int)keyLen, keyData); 77 memmove(mRawKey, keyData, keyLen); 78 mRawKeySize = (unsigned int)keyLen;
|
H A D | castContext.cpp | 63 CSSM_SIZE keyLen; local 70 keyData, keyLen); 71 if((keyLen < kCCKeySizeMinCAST) || (keyLen > kCCKeySizeMaxCAST)) { 78 if(mRawKeySize == keyLen) { 87 (void) CCCryptorCreateWithMode(0, kCCModeECB, kCCAlgorithmCAST, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &mCastKey); 90 memmove(mRawKey, keyData, keyLen); 91 mRawKeySize = (uint32)keyLen;
|
H A D | gladmanContext.cpp | 73 CSSM_SIZE keyLen; local 80 keyData, keyLen); 82 switch(keyLen) { 94 if(mRawKeySize == keyLen) { 108 (void) CCCryptorCreateWithMode(0, kCCModeECB, kCCAlgorithmAES128, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &mAesKey); 111 memmove(mRawKey, keyData, keyLen); 112 mRawKeySize = (uint32)keyLen;
|
H A D | rc4Context.cpp | 42 CSSM_SIZE keyLen; local 48 keyData, keyLen); 49 if((keyLen < kCCKeySizeMinRC4) || (keyLen > kCCKeySizeMaxRC4)) { 55 (void) CCCryptorCreateWithMode(0, kCCModeRC4, kCCAlgorithmRC4, ccDefaultPadding, NULL, keyData, keyLen, NULL, 0, 0, 0, &rc4Key);
|
H A D | rijndaelApi.c | 60 int keyLen, // in BITS 74 if ((keyLen == 128) || (keyLen == 192) || (keyLen == 256)) { 75 key->keyLen = keyLen; 85 (keyLen == MIN_AES_KEY_BITS) && 104 keyBytes = keyLen / 8; 108 rijndaelKeySched (k, key->keyLen, key->blockLen, key->keySched); 130 (key->keyLen ! 58 makeKey( keyInstance *key, int keyLen, int blockLen, word8 *keyMaterial, int enable128Opt) argument [all...] |
H A D | HMACSHA1.h | 42 hmacsha1 (const void *keyPtr, uint32 keyLen,
|
H A D | pbkdf2.h | 40 The inputs to the pseudo random function are the first keyLen octets pointed 42 Both keyLen and textLen can have any nonzero value. 45 typedef void (*PRF)(const void *keyPtr, uint32 keyLen,
|
H A D | aescsp.cpp | 109 CSSM_SIZE keyLen; local 117 keyData, keyLen); 119 switch(keyLen) { 141 if((lastBlockSize == mBlockSize) && (mRawKeySize == keyLen)) { 151 (keyLen == (MIN_AES_KEY_BITS/8)) && 165 (int)keyLen * 8, 175 mRawKeySize = (uint32)keyLen;
|
H A D | MacContext.cpp | 42 CSSM_SIZE keyLen; local 47 keyData, keyLen); 64 if((keyLen < minKey) || (keyLen > HMAC_MAX_KEY_SIZE)) { 67 CCHmacInit(&hmacCtx, ccAlg, keyData, keyLen); 125 CSSM_SIZE keyLen; local 131 keyData, keyLen); 132 if((keyLen < HMAC_SHA_MIN_KEY_SIZE) || (keyLen > HMAC_MAX_KEY_SIZE)) { 136 OSStatus ortn = hmacLegacyInit(mHmac, keyData, (UInt32)keyLen); [all...] |
H A D | rc2Context.cpp | 41 CSSM_SIZE keyLen; local 48 keyData, keyLen); 49 if((keyLen < RC2_MIN_KEY_SIZE_BYTES) || (keyLen > RC2_MAX_KEY_SIZE_BYTES)) { 65 RC2_set_key(&rc2Key, (int)keyLen, keyData, effectiveBits);
|
H A D | rc5Context.cpp | 41 CSSM_SIZE keyLen; local 48 keyData, keyLen); 49 if((keyLen < RC5_MIN_KEY_SIZE_BYTES) || (keyLen > RC5_MAX_KEY_SIZE_BYTES)) { 63 RC5_32_set_key(&rc5Key, (int)keyLen, keyData, rounds);
|
H A D | opensshCoding.cpp | 226 unsigned keyLen, 235 if(keyLen < (len + 1)) { 249 keyLen -= (len + 1); 252 skipWhite(key, keyLen); 253 if(keyLen == 0) { 260 const unsigned char *endBlob = findNextWhite(key, keyLen); 475 unsigned keyLen = (unsigned)length; local 484 if((ourRtn = parseSSH2PubKey(key, keyLen, SSH2_RSA_HEADER, &decodedBlob, &decodedBlobLen))) { 499 keyLen = decodedBlobLen; 500 if(keyLen < 1 224 parseSSH2PubKey( const unsigned char *key, unsigned keyLen, const char *header, unsigned char **decodedBlob, unsigned *decodedBlobLen) argument 610 unsigned keyLen = (unsigned)length; local [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_cryptkit/ |
H A D | HmacSha1Legacy.c | 90 UInt32 keyLen) 105 if (keyLen != kSHA1DigestSize) { 119 for (byte = 0; byte < keyLen; byte++) 127 memset (hmac->k_ipad + keyLen, 0x36, kSHA1BlockSize - keyLen); 128 memset (hmac->k_opad + keyLen, 0x5c, kSHA1BlockSize - keyLen); 87 hmacLegacyInit( hmacLegacyContextRef hmac, const void *keyPtr, UInt32 keyLen) argument
|
H A D | HmacSha1Legacy.h | 55 UInt32 keyLen);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cryptkit/lib/ |
H A D | HmacSha1Legacy.c | 90 UInt32 keyLen) 105 if (keyLen != kSHA1DigestSize) { 119 for (byte = 0; byte < keyLen; byte++) 127 memset (hmac->k_ipad + keyLen, 0x36, kSHA1BlockSize - keyLen); 128 memset (hmac->k_opad + keyLen, 0x5c, kSHA1BlockSize - keyLen); 87 hmacLegacyInit( hmacLegacyContextRef hmac, const void *keyPtr, UInt32 keyLen) argument
|
H A D | HmacSha1Legacy.h | 55 UInt32 keyLen);
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecImportExportOpenSSH.cpp | 81 unsigned keyLen, 87 skipWhite(key, keyLen); 88 if(keyLen == 0) { 92 key = findNextWhite(key, keyLen); 93 if(keyLen == 0) { 96 skipWhite(key, keyLen); 97 if(keyLen == 0) { 103 char *rtnStr = (char *)malloc(keyLen + 1); 104 memmove(rtnStr, key, keyLen); 105 if(rtnStr[keyLen 79 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument 185 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument 207 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument 233 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument 306 unsigned keyLen = (unsigned)CFDataGetLength(external); local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecImportExportOpenSSH.cpp | 81 unsigned keyLen, 87 skipWhite(key, keyLen); 88 if(keyLen == 0) { 92 key = findNextWhite(key, keyLen); 93 if(keyLen == 0) { 96 skipWhite(key, keyLen); 97 if(keyLen == 0) { 103 char *rtnStr = (char *)malloc(keyLen + 1); 104 memmove(rtnStr, key, keyLen); 105 if(rtnStr[keyLen 79 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument 185 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument 207 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument 233 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument 306 unsigned keyLen = (unsigned)CFDataGetLength(external); local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecImportExportOpenSSH.cpp | 81 unsigned keyLen, 87 skipWhite(key, keyLen); 88 if(keyLen == 0) { 92 key = findNextWhite(key, keyLen); 93 if(keyLen == 0) { 96 skipWhite(key, keyLen); 97 if(keyLen == 0) { 103 char *rtnStr = (char *)malloc(keyLen + 1); 104 memmove(rtnStr, key, keyLen); 105 if(rtnStr[keyLen 79 commentAsNthField( const unsigned char *key, unsigned keyLen, unsigned n) argument 185 opensshV2PubComment( const unsigned char *key, unsigned keyLen) argument 207 opensshV1PubComment( const unsigned char *key, unsigned keyLen) argument 233 opensshV1PrivComment( const unsigned char *key, unsigned keyLen) argument 306 unsigned keyLen = (unsigned)CFDataGetLength(external); local [all...] |
/macosx-10.9.5/configd-596.15/configd.tproj/ |
H A D | configd_server.h | 69 mach_msg_type_number_t keyLen, 78 mach_msg_type_number_t keyLen, 87 mach_msg_type_number_t keyLen, 95 mach_msg_type_number_t keyLen, 104 mach_msg_type_number_t keyLen, 113 mach_msg_type_number_t keyLen, 119 mach_msg_type_number_t keyLen, 145 mach_msg_type_number_t keyLen, 151 mach_msg_type_number_t keyLen,
|
/macosx-10.9.5/tcl-102/tcl_ext/tclx/tclx/generic/ |
H A D | tclXkeylist.c | 48 int keyLen; member in struct:__anon12969 107 ValidateKey _ANSI_ARGS_((Tcl_Interp *interp, char *key, int keyLen)); 221 * o keyLen - Length of the string, used to check for binary data. 227 ValidateKey (interp, key, keyLen) 230 int keyLen; 232 if (strlen (key) != (size_t) keyLen) { 237 if (keyLen == 0) { 414 int keyLen, findIdx = -1; 418 keyLen = keySeparPtr - key; 420 keyLen 407 int keyLen, findIdx = -1; local 558 int keyLen, idx, objc, subObjc; local 783 int findIdx, keyLen, status = TCL_OK; local 1035 int keyLen, status; local 1114 int idx, keyLen, result = TCL_OK; local 1174 int idx, keyLen, status; local 1236 int keyLen, status; local [all...] |
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | pbkdf2.h | 38 The inputs to the pseudo random function are the first keyLen octets pointed 40 Both keyLen and textLen can have any nonzero value. 43 typedef void (*PRF)(const uint8_t *keyPtr, size_t keyLen,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | tls_hmac.c | 53 size_t keyLen, 108 if (keyLen <= digest_block_size) { 111 SSLBuffer keyBuffer = { keyLen, (uint8_t *)keyPtr }; 116 keyLen = outBuffer.length; 122 for (ix = 0; ix < keyLen; ++ix) 124 memset(pad + keyLen, 0x5c, digest_block_size - keyLen); 128 for (ix = 0; ix < keyLen; ++ix) 130 memset(pad + keyLen, 0x36, digest_block_size - keyLen); 50 HMAC_Alloc( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument 262 HMAC_AllocNull( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | tls_hmac.c | 53 size_t keyLen, 108 if (keyLen <= digest_block_size) { 111 SSLBuffer keyBuffer = { keyLen, (uint8_t *)keyPtr }; 116 keyLen = outBuffer.length; 122 for (ix = 0; ix < keyLen; ++ix) 124 memset(pad + keyLen, 0x5c, digest_block_size - keyLen); 128 for (ix = 0; ix < keyLen; ++ix) 130 memset(pad + keyLen, 0x36, digest_block_size - keyLen); 50 HMAC_Alloc( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument 262 HMAC_AllocNull( const struct HMACReference *hmac, const void *keyPtr, size_t keyLen, HMACContextRef *hmacCtx) argument [all...] |