/haiku/src/add-ons/mail_daemon/inbound_protocols/pop3/ |
H A D | md5.h | 48 const unsigned char* key, int key_len); 51 const unsigned char* key, int key_len);
|
H A D | md5c.c | 333 const unsigned char* key, int key_len) 348 if (key_len > 64) { 353 MD5Update(&tctx, (unsigned char*)key, key_len); 357 memcpy(k_ipad, key, key_len); 358 memcpy(k_opad, key, key_len); 402 const unsigned char* key, int key_len) 407 MD5Hmac(digest, text, text_len, key, key_len); 331 MD5Hmac(unsigned char *digest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument 400 MD5HexHmac(char *hexdigest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument
|
/haiku/src/libs/compat/openbsd_wlan/crypto/ |
H A D | hmac.c | 33 HMAC_MD5_Init(HMAC_MD5_CTX *ctx, const u_int8_t *key, u_int key_len) argument 38 if (key_len > MD5_BLOCK_LENGTH) { 40 MD5Update(&ctx->ctx, key, key_len); 42 ctx->key_len = MD5_DIGEST_LENGTH; 44 bcopy(key, ctx->key, key_len); 45 ctx->key_len = key_len; 49 memcpy(k_ipad, ctx->key, ctx->key_len); 74 memcpy(k_opad, ctx->key, ctx->key_len); 87 HMAC_SHA1_Init(HMAC_SHA1_CTX *ctx, const u_int8_t *key, u_int key_len) argument 141 HMAC_SHA256_Init(HMAC_SHA256_CTX *ctx, const u_int8_t *key, u_int key_len) argument [all...] |
H A D | hmac.h | 25 u_int key_len; member in struct:_HMAC_MD5_CTX 31 u_int key_len; member in struct:_HMAC_SHA1_CTX 37 u_int key_len; member in struct:_HMAC_SHA256_CTX
|
H A D | aes.c | 334 aes_keysched_base(uint32_t *skey, const void *key, size_t key_len) argument 340 switch (key_len) { 353 nk = (int)(key_len >> 2); 359 tmp = skey[(key_len >> 2) - 1]; 384 aes_ct_keysched(uint32_t *comp_skey, const void *key, size_t key_len) argument 389 num_rounds = aes_keysched_base(skey, key, key_len);
|
/haiku/src/system/libnetwork/netresolv/dst/ |
H A D | hmac_link.c | 270 int len, key_len; local 294 for (key_len = 0; key_len < HMAC_LEN; key_len++) 295 key[key_len] = hkey->hk_ipad[key_len] ^ HMAC_IPAD; 296 for (key_len = HMAC_LEN - 1; key_len >= 0; key_len--) 297 if (key[key_len] ! 338 int key_len, len; local [all...] |
H A D | dst_api.c | 768 const int key_len) /*!< size of key */ 786 if (dkey->dk_func->from_dns_key(dkey, key_buf, key_len) < 0) { 763 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument
|
/haiku/src/add-ons/kernel/file_systems/ntfs/libntfs/ |
H A D | index.h | 146 extern int ntfs_index_lookup(const void *key, const int key_len,
|
H A D | index.c | 575 static int ntfs_ie_lookup(const void *key, const int key_len, argument 622 rc = icx->collate(icx->ni->vol, key, key_len, 740 * @key_len: [IN] length of @key in bytes 769 int ntfs_index_lookup(const void *key, const int key_len, ntfs_index_context *icx) argument 780 if (!key || key_len <= 0) { 782 ntfs_log_perror("key: %p key_len: %d", key, key_len); 816 ret = ntfs_ie_lookup(key, key_len, icx, &ir->index, &vcn, &ie); 858 ret = ntfs_ie_lookup(key, key_len, icx, &ib->index, &vcn, &ie);
|
/haiku/src/add-ons/mail_daemon/outbound_protocols/smtp/ |
H A D | SMTP.cpp | 79 const unsigned char* key, int key_len) 91 if (key_len > 64) { 96 MD5_Update(&tctx, (unsigned char*)key, key_len); 100 memcpy(k_ipad, key, key_len); 101 memcpy(k_opad, key, key_len); 143 const unsigned char* key, int key_len) 149 MD5Hmac(digest, text, text_len, key, key_len); 78 MD5Hmac(unsigned char *digest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument 142 MD5HexHmac(char *hexdigest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument
|
/haiku/src/libs/compat/openbsd_wlan/net80211/ |
H A D | ieee80211_crypto.c | 324 ieee80211_prf(const u_int8_t *key, size_t key_len, const u_int8_t *label, argument 333 HMAC_SHA1_Init(&ctx, key, key_len); 353 ieee80211_kdf(const u_int8_t *key, size_t key_len, const u_int8_t *label, argument 363 HMAC_SHA256_Init(&ctx, key, key_len);
|
/haiku/src/system/libnetwork/netresolv/nameser/ |
H A D | ns_print.c | 1015 unsigned int i, hip_len, algorithm, key_len; local 1022 key_len = ns_get16(rdata); 1025 siz = key_len*4/3 + 4; /* "+4" accounts for trailing \0 */ 1040 len = b64_ntop(rdata, key_len, base64_key, siz); 1046 rdata += key_len;
|