Home
last modified time | relevance | path

Searched refs:keystream (Results 1 – 8 of 8) sorted by relevance

/dragonfly/lib/libc/gen/
H A Darc4random.c201 u_char *keystream; in _rs_random_buf() local
208 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) in _rs_random_buf()
210 memcpy(buf, keystream, m); in _rs_random_buf()
211 memset(keystream, 0, m); in _rs_random_buf()
224 u_char *keystream; in _rs_random_u32() local
229 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) - rs->rs_have; in _rs_random_u32()
230 memcpy(val, keystream, sizeof(*val)); in _rs_random_u32()
231 memset(keystream, 0, sizeof(*val)); in _rs_random_u32()
/dragonfly/sys/opencrypto/
H A Dgmac.c149 uint8_t keystream[GMAC_BLOCK_LEN]; in AES_GMAC_Final() local
154 rijndaelEncrypt(ctx->K, ctx->rounds, ctx->J, keystream); in AES_GMAC_Final()
156 digest[i] = ctx->ghash.S[i] ^ keystream[i]; in AES_GMAC_Final()
157 bzero(keystream, sizeof(keystream)); in AES_GMAC_Final()
H A Dxform.c728 u_int8_t keystream[AESCTR_BLOCK_LEN]; in aes_ctr_crypt() local
737 rijndaelEncrypt(ctx->ac_ek, ctx->ac_nr, iv, keystream); in aes_ctr_crypt()
739 data[i] ^= keystream[i]; in aes_ctr_crypt()
740 bzero(keystream, sizeof(keystream)); in aes_ctr_crypt()
/dragonfly/tools/tools/net80211/wesside/wesside/
H A Daircrack-ptw-lib.c187 static void guesskeybytes(uint8_t * iv, uint8_t * keystream, uint8_t * result, int kb) { in guesskeybytes() argument
203 tmp = jj - keystream[jj-1]; in guesskeybytes()
230 if ((rc4update(&rc4state) ^ state->sessions[i].keystream[j]) != 0) { in correct()
436 int PTW_addsession(PTW_attackstate * state, uint8_t * iv, uint8_t * keystream) { in PTW_addsession() argument
448 guesskeybytes(iv, keystream, buf, PTW_KEYHSBYTES); in PTW_addsession()
454 memcpy(state->sessions[state->sessions_collected].keystream, keystream, KSBYTES); in PTW_addsession()
H A Daircrack-ptw-lib.h63 uint8_t keystream[PTW_KSBYTES]; member
/dragonfly/tools/tools/net80211/wesside/
H A DREADME12 * Waits for a packet. Uses fragmentation to recover some keystream.
13 * Discovers the network's IP using the linear keystream expansion technique in
/dragonfly/tools/tools/net80211/w00t/
H A DREADME50 Sniff a packet on a WEP network and obtain a keystream. It binds
72 Sniff a WEP packet and do the linear keystream expansion trick to
/dragonfly/crypto/openssh/
H A DPROTOCOL.chacha20poly130510 is used as a keystream, with any unused bytes simply discarded.