Searched refs:keystream (Results 1 – 8 of 8) sorted by relevance
/dragonfly/lib/libc/gen/ |
H A D | arc4random.c | 201 u_char *keystream; in _rs_random_buf() local 208 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) in _rs_random_buf() 210 memcpy(buf, keystream, m); in _rs_random_buf() 211 memset(keystream, 0, m); in _rs_random_buf() 224 u_char *keystream; in _rs_random_u32() local 229 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) - rs->rs_have; in _rs_random_u32() 230 memcpy(val, keystream, sizeof(*val)); in _rs_random_u32() 231 memset(keystream, 0, sizeof(*val)); in _rs_random_u32()
|
/dragonfly/sys/opencrypto/ |
H A D | gmac.c | 149 uint8_t keystream[GMAC_BLOCK_LEN]; in AES_GMAC_Final() local 154 rijndaelEncrypt(ctx->K, ctx->rounds, ctx->J, keystream); in AES_GMAC_Final() 156 digest[i] = ctx->ghash.S[i] ^ keystream[i]; in AES_GMAC_Final() 157 bzero(keystream, sizeof(keystream)); in AES_GMAC_Final()
|
H A D | xform.c | 728 u_int8_t keystream[AESCTR_BLOCK_LEN]; in aes_ctr_crypt() local 737 rijndaelEncrypt(ctx->ac_ek, ctx->ac_nr, iv, keystream); in aes_ctr_crypt() 739 data[i] ^= keystream[i]; in aes_ctr_crypt() 740 bzero(keystream, sizeof(keystream)); in aes_ctr_crypt()
|
/dragonfly/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.c | 187 static void guesskeybytes(uint8_t * iv, uint8_t * keystream, uint8_t * result, int kb) { in guesskeybytes() argument 203 tmp = jj - keystream[jj-1]; in guesskeybytes() 230 if ((rc4update(&rc4state) ^ state->sessions[i].keystream[j]) != 0) { in correct() 436 int PTW_addsession(PTW_attackstate * state, uint8_t * iv, uint8_t * keystream) { in PTW_addsession() argument 448 guesskeybytes(iv, keystream, buf, PTW_KEYHSBYTES); in PTW_addsession() 454 memcpy(state->sessions[state->sessions_collected].keystream, keystream, KSBYTES); in PTW_addsession()
|
H A D | aircrack-ptw-lib.h | 63 uint8_t keystream[PTW_KSBYTES]; member
|
/dragonfly/tools/tools/net80211/wesside/ |
H A D | README | 12 * Waits for a packet. Uses fragmentation to recover some keystream. 13 * Discovers the network's IP using the linear keystream expansion technique in
|
/dragonfly/tools/tools/net80211/w00t/ |
H A D | README | 50 Sniff a packet on a WEP network and obtain a keystream. It binds 72 Sniff a WEP packet and do the linear keystream expansion trick to
|
/dragonfly/crypto/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 10 is used as a keystream, with any unused bytes simply discarded.
|