Searched refs:key_len (Results 1 - 12 of 12) sorted by relevance

/haiku/src/add-ons/mail_daemon/inbound_protocols/pop3/
H A Dmd5.h48 const unsigned char* key, int key_len);
51 const unsigned char* key, int key_len);
H A Dmd5c.c333 const unsigned char* key, int key_len)
348 if (key_len > 64) {
353 MD5Update(&tctx, (unsigned char*)key, key_len);
357 memcpy(k_ipad, key, key_len);
358 memcpy(k_opad, key, key_len);
402 const unsigned char* key, int key_len)
407 MD5Hmac(digest, text, text_len, key, key_len);
331 MD5Hmac(unsigned char *digest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument
400 MD5HexHmac(char *hexdigest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument
/haiku/src/libs/compat/openbsd_wlan/crypto/
H A Dhmac.c33 HMAC_MD5_Init(HMAC_MD5_CTX *ctx, const u_int8_t *key, u_int key_len) argument
38 if (key_len > MD5_BLOCK_LENGTH) {
40 MD5Update(&ctx->ctx, key, key_len);
42 ctx->key_len = MD5_DIGEST_LENGTH;
44 bcopy(key, ctx->key, key_len);
45 ctx->key_len = key_len;
49 memcpy(k_ipad, ctx->key, ctx->key_len);
74 memcpy(k_opad, ctx->key, ctx->key_len);
87 HMAC_SHA1_Init(HMAC_SHA1_CTX *ctx, const u_int8_t *key, u_int key_len) argument
141 HMAC_SHA256_Init(HMAC_SHA256_CTX *ctx, const u_int8_t *key, u_int key_len) argument
[all...]
H A Dhmac.h25 u_int key_len; member in struct:_HMAC_MD5_CTX
31 u_int key_len; member in struct:_HMAC_SHA1_CTX
37 u_int key_len; member in struct:_HMAC_SHA256_CTX
H A Daes.c334 aes_keysched_base(uint32_t *skey, const void *key, size_t key_len) argument
340 switch (key_len) {
353 nk = (int)(key_len >> 2);
359 tmp = skey[(key_len >> 2) - 1];
384 aes_ct_keysched(uint32_t *comp_skey, const void *key, size_t key_len) argument
389 num_rounds = aes_keysched_base(skey, key, key_len);
/haiku/src/system/libnetwork/netresolv/dst/
H A Dhmac_link.c270 int len, key_len; local
294 for (key_len = 0; key_len < HMAC_LEN; key_len++)
295 key[key_len] = hkey->hk_ipad[key_len] ^ HMAC_IPAD;
296 for (key_len = HMAC_LEN - 1; key_len >= 0; key_len--)
297 if (key[key_len] !
338 int key_len, len; local
[all...]
H A Ddst_api.c768 const int key_len) /*!< size of key */
786 if (dkey->dk_func->from_dns_key(dkey, key_buf, key_len) < 0) {
763 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument
/haiku/src/add-ons/kernel/file_systems/ntfs/libntfs/
H A Dindex.h146 extern int ntfs_index_lookup(const void *key, const int key_len,
H A Dindex.c575 static int ntfs_ie_lookup(const void *key, const int key_len, argument
622 rc = icx->collate(icx->ni->vol, key, key_len,
740 * @key_len: [IN] length of @key in bytes
769 int ntfs_index_lookup(const void *key, const int key_len, ntfs_index_context *icx) argument
780 if (!key || key_len <= 0) {
782 ntfs_log_perror("key: %p key_len: %d", key, key_len);
816 ret = ntfs_ie_lookup(key, key_len, icx, &ir->index, &vcn, &ie);
858 ret = ntfs_ie_lookup(key, key_len, icx, &ib->index, &vcn, &ie);
/haiku/src/add-ons/mail_daemon/outbound_protocols/smtp/
H A DSMTP.cpp79 const unsigned char* key, int key_len)
91 if (key_len > 64) {
96 MD5_Update(&tctx, (unsigned char*)key, key_len);
100 memcpy(k_ipad, key, key_len);
101 memcpy(k_opad, key, key_len);
143 const unsigned char* key, int key_len)
149 MD5Hmac(digest, text, text_len, key, key_len);
78 MD5Hmac(unsigned char *digest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument
142 MD5HexHmac(char *hexdigest, const unsigned char* text, int text_len, const unsigned char* key, int key_len) argument
/haiku/src/libs/compat/openbsd_wlan/net80211/
H A Dieee80211_crypto.c324 ieee80211_prf(const u_int8_t *key, size_t key_len, const u_int8_t *label, argument
333 HMAC_SHA1_Init(&ctx, key, key_len);
353 ieee80211_kdf(const u_int8_t *key, size_t key_len, const u_int8_t *label, argument
363 HMAC_SHA256_Init(&ctx, key, key_len);
/haiku/src/system/libnetwork/netresolv/nameser/
H A Dns_print.c1015 unsigned int i, hip_len, algorithm, key_len; local
1022 key_len = ns_get16(rdata);
1025 siz = key_len*4/3 + 4; /* "+4" accounts for trailing \0 */
1040 len = b64_ntop(rdata, key_len, base64_key, siz);
1046 rdata += key_len;

Completed in 66 milliseconds