/macosx-10.9.5/CommonCrypto-60049/test/CommonCrypto/ |
H A D | CommonHMacClone.c | 86 uint32_t keySizeInBytes, 134 byteBuffer keyBuffer = genRandomByteBuffer(keySizeInBytes, keySizeInBytes); 138 CCHmacInit(&ctxOrig, hmacAlg, keyBytes, keySizeInBytes); 233 uint32_t keySizeInBytes; 290 keySizeInBytes = (uint32_t)genRandomSize(MIN_KEY_SIZE, MAX_KEY_SIZE); 303 loop, (unsigned long)ptextLen, (unsigned long)keySizeInBytes, 308 ok(doHMacCloneTest(ptext, ptextLen, hmacAlg, keySizeInBytes, stagedOrig, stagedClone, quiet, verbose), "HMacClone Test");
|
H A D | CommonCryptoSymRegression.c | 68 appGetRandomBytes(void *keyBytes, size_t keySizeInBytes) 76 if(read(fd, keyBytes, keySizeInBytes) != (int) keySizeInBytes) { 366 uint32_t keySizeInBytes, 386 appGetRandomBytes(keyBytes, keySizeInBytes); 415 keyBytes, keySizeInBytes, ivPtrEncrypt, 427 keyBytes, keySizeInBytes, ivPtrDecrypt, 484 uint32_t keySizeInBytes = 0; 612 keySizeInBytes = minKeySizeInBytes; 615 keySizeInBytes [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/regressions/ |
H A D | kc-40-seckey.c | 120 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument 123 size_t max_len = keySizeInBytes; 125 case kSecPaddingNone: max_len = keySizeInBytes; break; 126 case kSecPaddingOAEP: max_len = keySizeInBytes - 2 - 2 * CC_SHA1_DIGEST_LENGTH; break; 127 case kSecPaddingPKCS1: max_len = keySizeInBytes - 11; break; 131 uint8_t secret[max_len + 1], encrypted_secret[keySizeInBytes], decrypted_secret[keySizeInBytes]; 197 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local 208 keySizeInBytes); 220 uint8_t something[keySizeInBytes]; 386 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local [all...] |
H A D | kc-41-sececkey.c | 154 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local 165 keySizeInBytes); 178 uint8_t sig[8+2*keySizeInBytes]; 226 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local 256 keySizeInBits, keySizeInBytes);
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey.c | 111 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument 114 size_t max_len = keySizeInBytes; 116 case kSecPaddingNone: max_len = keySizeInBytes; break; 117 case kSecPaddingOAEP: max_len = keySizeInBytes - 2 - 2 * CC_SHA1_DIGEST_LENGTH; break; 118 case kSecPaddingPKCS1: max_len = keySizeInBytes - 11; break; 122 uint8_t secret[max_len + 1], encrypted_secret[keySizeInBytes], decrypted_secret[keySizeInBytes]; 161 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local 172 keySizeInBytes); 184 uint8_t something[keySizeInBytes]; 330 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local [all...] |
H A D | si-41-sececkey.c | 106 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local 118 keySizeInBytes); 131 uint8_t sig[8+2*keySizeInBytes]; 173 size_t keySizeInBytes = (keySizeInBits + 7) / 8; local 204 keySizeInBits, keySizeInBytes);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | AppleCSPContext.cpp | 204 uint32 keySizeInBytes = (reqKeySize + 7) / 8; local 220 setUpCssmData(*keyData, keySizeInBytes, 226 session.getRandomBytes(keySizeInBytes, keyData->Data);
|
H A D | deriveKey.cpp | 342 uint32 keySizeInBytes = (reqKeySize + 7) / 8; local 358 setUpData(*keyData, keySizeInBytes,
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | store.c | 95 createKey.keySizeInBytes = V1_KEYSIZE;
|
/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | print-esp.c | 48 size_t keySizeInBytes; member in struct:CCCryptoCipherData 215 cipherData->padding, iv, key, cipherData->keySizeInBytes,
|