/freebsd-10.3-release/contrib/wpa/src/common/ |
H A D | eapol_common.h | 55 /* Note: key_length is unaligned */ 56 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 70 * key field (of key_length bytes) contains the key in encrypted form; 71 * if packet body length = 44, key field is absent and key_length
|
H A D | wpa_common.h | 160 /* Note: key_info, key_length, and key_data_length are unaligned */ 162 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
|
/freebsd-10.3-release/crypto/openssl/crypto/hmac/ |
H A D | hmac.c | 113 &ctx->key_length)) 119 ctx->key_length = len; 121 if (ctx->key_length != HMAC_MAX_MD_CBLOCK) 122 memset(&ctx->key[ctx->key_length], 0, 123 HMAC_MAX_MD_CBLOCK - ctx->key_length); 209 dctx->key_length = sctx->key_length;
|
H A D | hmac.h | 80 unsigned int key_length; member in struct:hmac_ctx_st
|
/freebsd-10.3-release/crypto/openssl/crypto/asn1/ |
H A D | x_pkey.c | 114 ret->key_length = 0;
|
/freebsd-10.3-release/crypto/openssl/ssl/ |
H A D | s2_srvr.c | 376 unsigned int num_encrypted_key_bytes, key_length; local 489 key_length = (unsigned int)EVP_CIPHER_key_length(c); 490 if (key_length > SSL_MAX_MASTER_KEY_LENGTH) { 502 num_encrypted_key_bytes = key_length; 505 if (s->s2->tmp.clear + num_encrypted_key_bytes != key_length) { 553 s->session->master_key_length = (int)key_length; 554 memcpy(s->session->master_key, p, key_length); 555 OPENSSL_cleanse(p, key_length);
|
/freebsd-10.3-release/contrib/wpa/src/rsn_supp/ |
H A D | peerkey.c | 88 WPA_PUT_BE16(err->key_length, 0); 148 WPA_PUT_BE16(reply->key_length, 0); 356 WPA_PUT_BE16(msg->key_length, 16); 358 WPA_PUT_BE16(msg->key_length, 32); 416 WPA_PUT_BE16(msg->key_length, 16); 418 WPA_PUT_BE16(msg->key_length, 32); 1084 WPA_PUT_BE16(req->key_length, 0);
|
H A D | wpa.c | 120 WPA_PUT_BE16(reply->key_length, 0); 333 WPA_PUT_BE16(reply->key_length, 0); 335 os_memcpy(reply->key_length, key->key_length, 2); 1085 WPA_PUT_BE16(reply->key_length, 0); 1087 os_memcpy(reply->key_length, key->key_length, 2); 1153 keylen = WPA_GET_BE16(key->key_length); 1267 gd->gtk_len = WPA_GET_BE16(key->key_length); 1360 WPA_PUT_BE16(reply->key_length, [all...] |
/freebsd-10.3-release/sys/gnu/fs/reiserfs/ |
H A D | reiserfs_stree.c | 88 if (cpu_key->key_length == 3)
|
H A D | reiserfs_fs.h | 333 int key_length; /* 3 in all cases but direct2indirect member in struct:cpu_key 1246 off_t offset, int type, int key_length);
|
H A D | reiserfs_inode.c | 176 key->key_length = length;
|
/freebsd-10.3-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | mergeinfo.c | 1702 apr_ssize_t key_length; local 1708 apr_hash_this(hi, (const void**)&key, &key_length, (void **)&lhs); 1709 rhs = apr_hash_get(info2, key, key_length);
|
/freebsd-10.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 1275 WPA_PUT_BE16(key->key_length, wpa_cipher_key_len(alg)); 1277 WPA_PUT_BE16(key->key_length, 0);
|
H A D | ieee802_1x.c | 132 WPA_PUT_BE16(key->key_length, key_len);
|
/freebsd-10.3-release/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 657 rx_key_length = WPA_GET_BE16(key->key_length); 659 "EAPOL-Key: type=%d key_length=%d key_index=0x%x", 751 "(key_length=%d)", key_len, rx_key_length);
|
/freebsd-10.3-release/crypto/openssl/crypto/x509/ |
H A D | x509.h | 486 int key_length; member in struct:private_key_st
|