/barrelfish-master/include/lwip2/netif/ppp/polarssl/ |
H A D | arc4.h | 62 * \param keylen length of the key 64 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen );
|
H A D | arc4.c | 48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen ) 64 if( k >= keylen ) k = 0;
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost2001_keyx.h | 3 const unsigned char *key, size_t keylen,
|
H A D | gost_lcl.h | 179 int pkey_gost2001_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); 181 int pkey_gost94_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
|
H A D | gost2001_keyx.c | 75 int pkey_gost2001_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument 91 *keylen = 32; 95 *keylen=VKO_compute_key(key, 32, EC_KEY_get0_public_key(EVP_PKEY_get0(peer_key)),
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_enc.c | 145 if (!ec->keylen) 146 ec->keylen = EVP_CIPHER_CTX_key_length(ctx); 147 ec->key = OPENSSL_malloc(ec->keylen); 158 else if (ec->keylen != (unsigned int)EVP_CIPHER_CTX_key_length(ctx)) 161 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) 197 OPENSSL_cleanse(ec->key, ec->keylen); 209 const unsigned char *key, size_t keylen) 214 ec->key = OPENSSL_malloc(keylen); 217 memcpy(ec->key, key, keylen); 219 ec->keylen 207 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument 225 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument [all...] |
H A D | cms_env.c | 335 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0) 347 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) 421 cms->d.envelopedData->encryptedContentInfo->keylen = eklen; 473 unsigned char *key, size_t keylen, 488 switch (keylen) 521 if (keylen != exp_keylen) 558 kekri->keylen = keylen; 622 unsigned char *key, size_t keylen) 633 kekri->keylen 472 CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, ASN1_OBJECT *otherTypeId, ASN1_TYPE *otherType) argument 621 CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, unsigned char *key, size_t keylen) argument [all...] |
H A D | cms.h | 157 const unsigned char *key, size_t keylen, 161 const unsigned char *key, size_t keylen, 165 const unsigned char *key, size_t keylen); 185 unsigned char *key, size_t keylen, 203 unsigned char *key, size_t keylen, 217 unsigned char *key, size_t keylen);
|
H A D | cms_lcl.h | 177 size_t keylen; member in struct:CMS_EncryptedContentInfo_st 260 size_t keylen; member in struct:CMS_KEKRecipientInfo_st 450 const unsigned char *key, size_t keylen);
|
/barrelfish-master/lib/libc/iconv/ |
H A D | citrus_memstream.c | 73 size_t keylen, len; local 75 keylen = strlen(key); 95 if ((size_t)(q - p) == keylen) { 97 if (memcmp(key, p, keylen) == 0) 100 if (_bcs_strncasecmp(key, p, keylen) == 0)
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p5_crpt2.c | 82 int keylen, unsigned char *out) 95 tkeylen = keylen; 137 h__dump (out, keylen); 144 int keylen, unsigned char *out) 147 keylen, out); 174 unsigned int keylen; local 220 keylen = EVP_CIPHER_CTX_key_length(ctx); 221 OPENSSL_assert(keylen <= sizeof key); 244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 279 keylen, ke 79 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 142 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
H A D | pmeth_gn.c | 202 unsigned char *key, int keylen) 212 EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key) <= 0) 201 EVP_PKEY_new_mac_key(int type, ENGINE *e, unsigned char *key, int keylen) argument
|
/barrelfish-master/lib/lwip2/src/netif/ppp/polarssl/ |
H A D | arc4.c | 48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen ) 64 if( k >= keylen ) k = 0;
|
/barrelfish-master/include/ |
H A D | arranet_debug.h | 42 uint16_t keylen; member in struct:__anon1::__anon2 61 uint16_t keylen; member in struct:__anon3::__anon4
|
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | mppe.c | 72 lwip_sha1_update(&sha1_ctx, state->master_key, state->keylen); 74 lwip_sha1_update(&sha1_ctx, state->session_key, state->keylen); 78 MEMCPY(state->session_key, sha1_digest, state->keylen); 82 lwip_arc4_setup(&state->arc4, sha1_digest, state->keylen); 83 lwip_arc4_crypt(&state->arc4, state->session_key, state->keylen); 86 if (state->keylen == 8) { 93 lwip_arc4_setup(&state->arc4, state->session_key, state->keylen); 122 state->keylen = 16; 124 state->keylen = 8; 144 debugstr, pcb->netif->num, (state->keylen [all...] |
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | mppe.c | 72 lwip_sha1_update(&sha1_ctx, state->master_key, state->keylen); 74 lwip_sha1_update(&sha1_ctx, state->session_key, state->keylen); 78 MEMCPY(state->session_key, sha1_digest, state->keylen); 82 lwip_arc4_setup(&state->arc4, sha1_digest, state->keylen); 83 lwip_arc4_crypt(&state->arc4, state->session_key, state->keylen); 86 if (state->keylen == 8) { 93 lwip_arc4_setup(&state->arc4, state->session_key, state->keylen); 122 state->keylen = 16; 124 state->keylen = 8; 144 debugstr, pcb->netif->num, (state->keylen [all...] |
/barrelfish-master/lib/libc/gen/ |
H A D | getusershell.c | 185 int keylen, datalen; local 209 if (yp_first(ypdomain, "shells", &key, &keylen, &data, &datalen)) 216 r = yp_next(ypdomain, "shells", lastkey, keylen, 217 &key, &keylen, &data, &datalen);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/hmac/ |
H A D | hm_pmeth.c | 221 long keylen; local 222 key = string_to_hex(value, &keylen); 225 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_wrap.c | 146 const unsigned char *key, int keylen) 151 otmp = OPENSSL_malloc(keylen + 8); 152 ptmp = OPENSSL_malloc(keylen); 157 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); 161 if (eout && memcmp(eout, otmp, keylen)) 168 if (memcmp(key, ptmp, keylen)) 143 AES_wrap_unwrap_test(const unsigned char *kek, int keybits, const unsigned char *iv, const unsigned char *eout, const unsigned char *key, int keylen) argument
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ec/ |
H A D | ec_pmeth.c | 170 static int pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument 185 *keylen = (EC_GROUP_get_degree(group) + 7)/8; 195 outlen = *keylen; 200 *keylen = ret;
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | tls1.h | 267 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ 268 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys)) 269 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ 270 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
|
/barrelfish-master/include/openssl/ |
H A D | tls1.h | 267 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ 268 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys)) 269 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ 270 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
|
H A D | cms.h | 157 const unsigned char *key, size_t keylen, 161 const unsigned char *key, size_t keylen, 165 const unsigned char *key, size_t keylen); 185 unsigned char *key, size_t keylen, 203 unsigned char *key, size_t keylen, 217 unsigned char *key, size_t keylen);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/ |
H A D | dh_pmeth.c | 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument 216 *keylen = ret;
|
/barrelfish-master/lib/vfs/ |
H A D | vfs_ops.h | 45 char **retkey, size_t *keylen, size_t *retoffset);
|