Searched refs:keylen (Results 1 - 25 of 47) sorted by relevance

12

/barrelfish-master/include/lwip2/netif/ppp/polarssl/
H A Darc4.h62 * \param keylen length of the key
64 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen );
H A Darc4.c48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen )
64 if( k >= keylen ) k = 0;
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/
H A Dgost2001_keyx.h3 const unsigned char *key, size_t keylen,
H A Dgost_lcl.h179 int pkey_gost2001_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
181 int pkey_gost94_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
H A Dgost2001_keyx.c75 int pkey_gost2001_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument
91 *keylen = 32;
95 *keylen=VKO_compute_key(key, 32, EC_KEY_get0_public_key(EVP_PKEY_get0(peer_key)),
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/
H A Dcms_enc.c145 if (!ec->keylen)
146 ec->keylen = EVP_CIPHER_CTX_key_length(ctx);
147 ec->key = OPENSSL_malloc(ec->keylen);
158 else if (ec->keylen != (unsigned int)EVP_CIPHER_CTX_key_length(ctx))
161 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0)
197 OPENSSL_cleanse(ec->key, ec->keylen);
209 const unsigned char *key, size_t keylen)
214 ec->key = OPENSSL_malloc(keylen);
217 memcpy(ec->key, key, keylen);
219 ec->keylen
207 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
225 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument
[all...]
H A Dcms_env.c335 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
347 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
421 cms->d.envelopedData->encryptedContentInfo->keylen = eklen;
473 unsigned char *key, size_t keylen,
488 switch (keylen)
521 if (keylen != exp_keylen)
558 kekri->keylen = keylen;
622 unsigned char *key, size_t keylen)
633 kekri->keylen
472 CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, ASN1_OBJECT *otherTypeId, ASN1_TYPE *otherType) argument
621 CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, unsigned char *key, size_t keylen) argument
[all...]
H A Dcms.h157 const unsigned char *key, size_t keylen,
161 const unsigned char *key, size_t keylen,
165 const unsigned char *key, size_t keylen);
185 unsigned char *key, size_t keylen,
203 unsigned char *key, size_t keylen,
217 unsigned char *key, size_t keylen);
H A Dcms_lcl.h177 size_t keylen; member in struct:CMS_EncryptedContentInfo_st
260 size_t keylen; member in struct:CMS_KEKRecipientInfo_st
450 const unsigned char *key, size_t keylen);
/barrelfish-master/lib/libc/iconv/
H A Dcitrus_memstream.c73 size_t keylen, len; local
75 keylen = strlen(key);
95 if ((size_t)(q - p) == keylen) {
97 if (memcmp(key, p, keylen) == 0)
100 if (_bcs_strncasecmp(key, p, keylen) == 0)
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/
H A Dp5_crpt2.c82 int keylen, unsigned char *out)
95 tkeylen = keylen;
137 h__dump (out, keylen);
144 int keylen, unsigned char *out)
147 keylen, out);
174 unsigned int keylen; local
220 keylen = EVP_CIPHER_CTX_key_length(ctx);
221 OPENSSL_assert(keylen <= sizeof key);
244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
279 keylen, ke
79 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
142 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]
H A Dpmeth_gn.c202 unsigned char *key, int keylen)
212 EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key) <= 0)
201 EVP_PKEY_new_mac_key(int type, ENGINE *e, unsigned char *key, int keylen) argument
/barrelfish-master/lib/lwip2/src/netif/ppp/polarssl/
H A Darc4.c48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen )
64 if( k >= keylen ) k = 0;
/barrelfish-master/include/
H A Darranet_debug.h42 uint16_t keylen; member in struct:__anon1::__anon2
61 uint16_t keylen; member in struct:__anon3::__anon4
/barrelfish-master/lib/lwip2/src/netif/ppp/
H A Dmppe.c72 lwip_sha1_update(&sha1_ctx, state->master_key, state->keylen);
74 lwip_sha1_update(&sha1_ctx, state->session_key, state->keylen);
78 MEMCPY(state->session_key, sha1_digest, state->keylen);
82 lwip_arc4_setup(&state->arc4, sha1_digest, state->keylen);
83 lwip_arc4_crypt(&state->arc4, state->session_key, state->keylen);
86 if (state->keylen == 8) {
93 lwip_arc4_setup(&state->arc4, state->session_key, state->keylen);
122 state->keylen = 16;
124 state->keylen = 8;
144 debugstr, pcb->netif->num, (state->keylen
[all...]
/barrelfish-master/include/lwip2/netif/ppp/
H A Dmppe.c72 lwip_sha1_update(&sha1_ctx, state->master_key, state->keylen);
74 lwip_sha1_update(&sha1_ctx, state->session_key, state->keylen);
78 MEMCPY(state->session_key, sha1_digest, state->keylen);
82 lwip_arc4_setup(&state->arc4, sha1_digest, state->keylen);
83 lwip_arc4_crypt(&state->arc4, state->session_key, state->keylen);
86 if (state->keylen == 8) {
93 lwip_arc4_setup(&state->arc4, state->session_key, state->keylen);
122 state->keylen = 16;
124 state->keylen = 8;
144 debugstr, pcb->netif->num, (state->keylen
[all...]
/barrelfish-master/lib/libc/gen/
H A Dgetusershell.c185 int keylen, datalen; local
209 if (yp_first(ypdomain, "shells", &key, &keylen, &data, &datalen))
216 r = yp_next(ypdomain, "shells", lastkey, keylen,
217 &key, &keylen, &data, &datalen);
/barrelfish-master/lib/openssl-1.0.0d/crypto/hmac/
H A Dhm_pmeth.c221 long keylen; local
222 key = string_to_hex(value, &keylen);
225 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/
H A Daes_wrap.c146 const unsigned char *key, int keylen)
151 otmp = OPENSSL_malloc(keylen + 8);
152 ptmp = OPENSSL_malloc(keylen);
157 r = AES_wrap_key(&wctx, iv, otmp, key, keylen);
161 if (eout && memcmp(eout, otmp, keylen))
168 if (memcmp(key, ptmp, keylen))
143 AES_wrap_unwrap_test(const unsigned char *kek, int keybits, const unsigned char *iv, const unsigned char *eout, const unsigned char *key, int keylen) argument
/barrelfish-master/lib/openssl-1.0.0d/crypto/ec/
H A Dec_pmeth.c170 static int pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument
185 *keylen = (EC_GROUP_get_degree(group) + 7)/8;
195 outlen = *keylen;
200 *keylen = ret;
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dtls1.h267 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \
268 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys))
269 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \
270 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
/barrelfish-master/include/openssl/
H A Dtls1.h267 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \
268 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys))
269 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \
270 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
H A Dcms.h157 const unsigned char *key, size_t keylen,
161 const unsigned char *key, size_t keylen,
165 const unsigned char *key, size_t keylen);
185 unsigned char *key, size_t keylen,
203 unsigned char *key, size_t keylen,
217 unsigned char *key, size_t keylen);
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/
H A Ddh_pmeth.c204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument
216 *keylen = ret;
/barrelfish-master/lib/vfs/
H A Dvfs_ops.h45 char **retkey, size_t *keylen, size_t *retoffset);

Completed in 179 milliseconds

12