/dports/www/mod_webauth/webauth-4.7.0/tests/lib/ |
H A D | was-cache-t.c | 46 cache.key_data_len = key->length; in main() 65 is_int(cache.key_data_len, cache2.key_data_len, in main() 67 ok(memcmp(cache.key_data, cache2.key_data, cache.key_data_len) == 0, in main() 87 is_int(WA_AES_128, cache.key_data_len, "...and key length is correct"); in main()
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_aeskeywrap_unittest.cc | 22 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 27 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 53 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 95 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 96 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
H A D | pk11_aeskeywrapkwp_unittest.cc | 24 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 29 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 54 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 96 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 97 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
/dports/security/ca_root_nss/nss-3.71/nss/gtests/pk11_gtest/ |
H A D | pk11_aeskeywrapkwp_unittest.cc | 24 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 29 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 54 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 96 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 97 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
H A D | pk11_aeskeywrap_unittest.cc | 22 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 27 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 53 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 95 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 96 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_aeskeywrap_unittest.cc | 22 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 27 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 53 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 95 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 96 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
H A D | pk11_aeskeywrapkwp_unittest.cc | 24 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 29 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 54 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 96 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 97 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/ |
H A D | pk11_aeskeywrap_unittest.cc | 22 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 27 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 53 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 95 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 96 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
H A D | pk11_aeskeywrapkwp_unittest.cc | 24 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 29 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 54 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 96 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 97 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_aeskeywrapkwp_unittest.cc | 24 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 29 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 54 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 96 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 97 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
H A D | pk11_aeskeywrap_unittest.cc | 22 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 27 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 53 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 95 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 96 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_aeskeywrapkwp_unittest.cc | 24 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 29 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 54 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 96 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 97 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
H A D | pk11_aeskeywrap_unittest.cc | 22 unsigned char* key_data, unsigned int key_data_len, in WrapUnwrap() argument 27 std::vector<unsigned char> unwrapped_key(PR_MAX(1U, key_data_len)); in WrapUnwrap() 53 wrapped_key.size(), key_data, key_data_len); in WrapUnwrap() 95 EXPECT_EQ(unwrapped_key_len, key_data_len) << msg; in WrapUnwrap() 96 EXPECT_TRUE(!memcmp(key_data, unwrapped_key.data(), key_data_len)) in WrapUnwrap()
|
/dports/net/hostapd/hostapd-2.9/src/rsn_supp/ |
H A D | wpa.c | 102 size_t key_data_len; in wpa_eapol_key_send() local 135 s_key_data, key_data_len); in wpa_eapol_key_send() 589 size_t key_data_len) in wpa_supplicant_process_1_of_4() argument 1680 maxkeylen = key_data_len; in wpa_supplicant_process_1_of_2_wpa() 1855 key_data_len, in wpa_supplicant_process_1_of_2() 2019 if (*key_data_len < 8 || *key_data_len % 8) { in wpa_supplicant_decrypt_key_data() 2118 size_t *key_data_len) in wpa_supp_aead_decrypt() argument 2162 tmp, *key_data_len); in wpa_supp_aead_decrypt() 2420 &key_data_len)) in wpa_sm_rx_eapol() 2435 key_data_len); in wpa_sm_rx_eapol() [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.c | 102 size_t key_data_len; in wpa_eapol_key_send() local 135 s_key_data, key_data_len); in wpa_eapol_key_send() 589 size_t key_data_len) in wpa_supplicant_process_1_of_4() argument 1680 maxkeylen = key_data_len; in wpa_supplicant_process_1_of_2_wpa() 1855 key_data_len, in wpa_supplicant_process_1_of_2() 2019 if (*key_data_len < 8 || *key_data_len % 8) { in wpa_supplicant_decrypt_key_data() 2118 size_t *key_data_len) in wpa_supp_aead_decrypt() argument 2162 tmp, *key_data_len); in wpa_supp_aead_decrypt() 2420 &key_data_len)) in wpa_sm_rx_eapol() 2435 key_data_len); in wpa_sm_rx_eapol() [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.c | 102 size_t key_data_len; in wpa_eapol_key_send() local 135 s_key_data, key_data_len); in wpa_eapol_key_send() 589 size_t key_data_len) in wpa_supplicant_process_1_of_4() argument 1680 maxkeylen = key_data_len; in wpa_supplicant_process_1_of_2_wpa() 1855 key_data_len, in wpa_supplicant_process_1_of_2() 2019 if (*key_data_len < 8 || *key_data_len % 8) { in wpa_supplicant_decrypt_key_data() 2118 size_t *key_data_len) in wpa_supp_aead_decrypt() argument 2162 tmp, *key_data_len); in wpa_supp_aead_decrypt() 2420 &key_data_len)) in wpa_sm_rx_eapol() 2435 key_data_len); in wpa_sm_rx_eapol() [all …]
|
/dports/security/hashcat/hashcat-6.2.5/tools/test_modules/ |
H A D | m02500.pm | 244 my $key_data_len; 248 $key_data_len = 24; # length of the key_data (== WPA info) 252 $key_data_len = 22; # length of the key_data (== RSN info) 255 $ret .= pack ("n*", $key_data_len);
|
H A D | m22000.pm | 313 my $key_data_len; 317 $key_data_len = 24; # length of the key_data (== WPA info) 321 $key_data_len = 22; # length of the key_data (== RSN info) 324 $ret .= pack ("n*", $key_data_len);
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/rsn_supp/ |
H A D | wpa.c | 104 size_t key_data_len; in wpa_eapol_key_send() local 137 s_key_data, key_data_len); in wpa_eapol_key_send() 675 size_t key_data_len) in wpa_supplicant_process_1_of_4() argument 1940 maxkeylen = key_data_len; in wpa_supplicant_process_1_of_2_wpa() 2124 key_data_len, in wpa_supplicant_process_1_of_2() 2288 if (*key_data_len < 8 || *key_data_len % 8) { in wpa_supplicant_decrypt_key_data() 2397 size_t *key_data_len) in wpa_supp_aead_decrypt() argument 2441 tmp, *key_data_len); in wpa_supp_aead_decrypt() 2697 &key_data_len)) in wpa_sm_rx_eapol() 2712 key_data_len); in wpa_sm_rx_eapol() [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/rsn_supp/ |
H A D | wpa.c | 104 size_t key_data_len; in wpa_eapol_key_send() local 137 s_key_data, key_data_len); in wpa_eapol_key_send() 675 size_t key_data_len) in wpa_supplicant_process_1_of_4() argument 1940 maxkeylen = key_data_len; in wpa_supplicant_process_1_of_2_wpa() 2124 key_data_len, in wpa_supplicant_process_1_of_2() 2288 if (*key_data_len < 8 || *key_data_len % 8) { in wpa_supplicant_decrypt_key_data() 2397 size_t *key_data_len) in wpa_supp_aead_decrypt() argument 2441 tmp, *key_data_len); in wpa_supp_aead_decrypt() 2697 &key_data_len)) in wpa_sm_rx_eapol() 2712 key_data_len); in wpa_sm_rx_eapol() [all …]
|
/dports/math/gnumeric/gnumeric-1.12.50/plugins/excel/ |
H A D | rc4.c | 14 prepare_key (unsigned char *key_data_ptr, int key_data_len, RC4_KEY *key) in prepare_key() argument 33 index1 = (index1 + 1) % key_data_len; in prepare_key()
|
/dports/textproc/wv/wv-1.2.9/ |
H A D | rc4.c | 36 prepare_key (unsigned char *key_data_ptr, int key_data_len, rc4_key * key) in prepare_key() argument 55 index1 = (index1 + 1) % key_data_len; in prepare_key()
|
/dports/mail/dovecot/dovecot-2.3.17/src/lib-dcrypt/ |
H A D | ostream-encrypt.c | 44 size_t key_data_len; member 92 s = htons(stream->key_data_len); in o_stream_encrypt_send_header_v1() 95 buffer_append(values, stream->key_data, stream->key_data_len); in o_stream_encrypt_send_header_v1() 124 8 + stream->key_data_len); in o_stream_encrypt_send_header_v2() 131 i = cpu32_to_be(stream->key_data_len); in o_stream_encrypt_send_header_v2() 133 buffer_append(values, stream->key_data, stream->key_data_len); in o_stream_encrypt_send_header_v2() 255 stream->key_data_len = res->used; in o_stream_encrypt_keydata_create_v1() 445 stream->key_data_len = res->used; in o_stream_encrypt_keydata_create_v2()
|
/dports/security/py-cryptography/cryptography-3.3.2/tests/hazmat/primitives/ |
H A D | test_x963_vectors.py | 53 key_data_len = vector["key_data_length"] // 8 58 length=key_data_len,
|
/dports/databases/mdbtools/mdbtools-1.0.0/src/libmdb/ |
H A D | rc4.c | 31 static void RC4_set_key(RC4_KEY *key, int key_data_len, unsigned char *key_data_ptr) in RC4_set_key() argument 49 index1 = (index1 + 1) % key_data_len; in RC4_set_key()
|