/dragonfly/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.c | 144 j = (j + state->s[i] + key[i % keylen]) % n; in rc4init() 226 memcpy(&keybuf[IVBYTES], key, keylen); in correct() 254 for (i = 0; i < keylen; i++) { in getdrv() 288 if (keybyte == keylen) { in doRound() 289 return correct(state, key, keylen); in doRound() 326 for (i = 0; i < keylen; i++) { in doComputation() 348 for (j = 0; j < keylen; j++) { in doComputation() 383 for (i = 0; i < keylen; i++) { in PTW_computeKey() 395 for (i = 0; i < keylen; i++) { in PTW_computeKey() 410 getdrv(state->table, keylen, normal, ausreisser); in PTW_computeKey() [all …]
|
/dragonfly/crypto/libressl/crypto/cms/ |
H A D | cms_enc.c | 143 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio() 152 if (ec->keylen != tkeylen) { in cms_EncryptedContent_init_bio() 154 if (!EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen)) { in cms_EncryptedContent_init_bio() 164 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio() 166 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio() 197 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio() 213 if ((ec->key = malloc(keylen)) == NULL) { in cms_EncryptedContent_init() 217 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init() 219 ec->keylen = keylen; in cms_EncryptedContent_init() 228 const unsigned char *key, size_t keylen) in CMS_EncryptedData_set1_key() argument [all …]
|
H A D | cms_pwri.c | 335 size_t keylen; in cms_RecipientInfo_pwri_crypt() local 396 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt() 399 key = malloc(keylen); in cms_RecipientInfo_pwri_crypt() 403 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt() 406 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt() 413 if (!kek_unwrap_key(key, &keylen, pwri->encryptedKey->data, in cms_RecipientInfo_pwri_crypt() 419 freezero(ec->key, ec->keylen); in cms_RecipientInfo_pwri_crypt() 421 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
|
H A D | cms_env.c | 491 freezero(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt() 493 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt() 560 switch (keylen) { in CMS_add0_recipient_key() 587 if (keylen != exp_keylen) { in CMS_add0_recipient_key() 620 kekri->keylen = keylen; in CMS_add0_recipient_key() 679 size_t keylen) in CMS_RecipientInfo_set0_key() argument 690 kekri->keylen = keylen; in CMS_RecipientInfo_set0_key() 719 wkey = malloc(ec->keylen + 8); in cms_RecipientInfo_kekri_encrypt() 795 freezero(ec->key, ec->keylen); in cms_RecipientInfo_kekri_decrypt() 797 ec->keylen = ukeylen; in cms_RecipientInfo_kekri_decrypt() [all …]
|
/dragonfly/contrib/libarchive/libarchive/ |
H A D | archive_blake2.h | 148 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 154 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 160 int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ); 165 int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen ); 171 int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen ); 176 int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen ); 181 … blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); 182 … blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); 184 …blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); 185 …blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ); [all …]
|
H A D | archive_blake2sp_ref.c | 49 P->key_length = (uint8_t)keylen; in blake2sp_init_leaf() 62 static int blake2sp_init_root( blake2s_state *S, size_t outlen, size_t keylen ) in blake2sp_init_root() argument 66 P->key_length = (uint8_t)keylen; in blake2sp_init_root() 107 if( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp_init_key() 113 if( blake2sp_init_root( S->R, outlen, keylen ) < 0 ) in blake2sp_init_key() 124 memcpy( block, key, keylen ); in blake2sp_init_key() 228 if ( NULL == key && keylen > 0) return -1; in blake2sp() 232 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp() 239 if( keylen > 0 ) in blake2sp() 243 memcpy( block, key, keylen ); in blake2sp() [all …]
|
H A D | archive_blake2s_ref.c | 117 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ) in blake2s_init_key() argument 123 if ( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key() 126 P->key_length = (uint8_t)keylen; in blake2s_init_key() 143 memcpy( block, key, keylen ); in blake2s_init_key() 267 int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen… in blake2s() argument 276 if ( NULL == key && keylen > 0) return -1; in blake2s() 280 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s() 282 if( keylen > 0 ) in blake2s() 284 if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2s()
|
/dragonfly/usr.sbin/ppp/ |
H A D | mppe.c | 101 unsigned keylen; /* 8 or 16 bytes */ member 152 RC4_set_key(&RC4Key, mp->keylen, InterimKey); in MPPEKeyChange() 153 RC4(&RC4Key, mp->keylen, InterimKey, mp->sesskey); in MPPEKeyChange() 656 mp->keylen = 16; in MPPE_InitState() 660 mp->keylen = 8; in MPPE_InitState() 664 mp->keylen = 8; in MPPE_InitState() 699 mip->keylen = bundle->radius.mppe.recvkeylen; in MPPEInitInput() 700 if (mip->keylen > sizeof mip->mastkey) in MPPEInitInput() 701 mip->keylen = sizeof mip->mastkey; in MPPEInitInput() 756 if (mop->keylen > sizeof mop->mastkey) in MPPEInitOutput() [all …]
|
/dragonfly/lib/libssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 115 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 124 size_t origkeylen = keylen; in bcrypt_pbkdf() 129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 130 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 134 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 135 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 143 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 166 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 173 keylen -= i; in bcrypt_pbkdf() 185 arc4random_buf(key, keylen); in bcrypt_pbkdf()
|
/dragonfly/sys/crypto/blake2/ |
H A D | blake2s.h | 42 const void *key, size_t keylen); 49 size_t outlen, size_t inlen, size_t keylen) in blake2s() argument 55 (key != NULL || keylen == 0) && keylen <= BLAKE2S_KEY_SIZE); in blake2s() 57 if (keylen > 0) in blake2s() 58 blake2s_init_key(&state, outlen, key, keylen); in blake2s()
|
/dragonfly/contrib/gcc-4.7/gcc/ |
H A D | prefix.c | 189 int keylen; in translate_name() local 197 for (keylen = 0; in translate_name() 198 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name() 199 keylen++) in translate_name() 202 key = (char *) alloca (keylen + 1); in translate_name() 203 strncpy (key, &name[1], keylen); in translate_name() 204 key[keylen] = 0; in translate_name() 224 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
|
/dragonfly/contrib/gcc-8.0/gcc/ |
H A D | prefix.c | 188 int keylen; in translate_name() local 196 for (keylen = 0; in translate_name() 197 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name() 198 keylen++) in translate_name() 201 key = (char *) alloca (keylen + 1); in translate_name() 202 memcpy (key, &name[1], keylen); in translate_name() 203 key[keylen] = 0; in translate_name() 223 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
|
/dragonfly/crypto/libressl/crypto/evp/ |
H A D | p5_crpt2.c | 83 int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC() argument 96 tkeylen = keylen; in PKCS5_PBKDF2_HMAC() 155 int saltlen, int iter, int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument 158 EVP_sha1(), keylen, out); in PKCS5_PBKDF2_HMAC_SHA1() 230 unsigned int keylen = 0; in PKCS5_v2_PBKDF2_keyivgen() local 239 keylen = EVP_CIPHER_CTX_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen() 240 if (keylen > sizeof key) { in PKCS5_v2_PBKDF2_keyivgen() 263 (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen() 297 keylen, key)) in PKCS5_v2_PBKDF2_keyivgen() 302 explicit_bzero(key, keylen); in PKCS5_v2_PBKDF2_keyivgen()
|
/dragonfly/lib/libtelnet/ |
H A D | encrypt.c | 164 int keylen; member 718 kp->keylen = 0; in encrypt_keyid() 723 if (kp->keylen == 0) in encrypt_keyid() 725 kp->keylen = 0; in encrypt_keyid() 729 } else if ((len != kp->keylen) || in encrypt_keyid() 734 kp->keylen = len; in encrypt_keyid() 758 memmove(kp->keyid, keyid, keylen); in encrypt_send_keyid() 759 kp->keylen = keylen; in encrypt_send_keyid() 762 for (strp = &str_keyid[4]; keylen > 0; --keylen) { in encrypt_send_keyid() 821 for (i = 0; i < ki[0].keylen; ++i) { in encrypt_start_output() [all …]
|
/dragonfly/test/testcases/crypto/serpent/ |
H A D | serpent_test.c | 72 session.keylen = klen; in syscrypt() 221 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument 229 print_hex(key, keylen); in do_tests() 234 if (syscrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests() 244 if (syscrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests() 264 u_int keylen, textlen, tmp; in run_file() local 270 keylen = textlen = tmp = 0; in run_file() 297 fail += do_tests(filename, test, key, keylen, in run_file() 342 parsehex(cp, &key, &keylen); in run_file() 343 if (keylen * 8 != (u_int)keysize) in run_file() [all …]
|
/dragonfly/test/testcases/crypto/twofish/ |
H A D | twofish_test.c | 72 session.keylen = klen; in syscrypt() 221 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument 229 print_hex(key, keylen); in do_tests() 234 if (syscrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests() 244 if (syscrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests() 264 u_int keylen, textlen, tmp; in run_file() local 270 keylen = textlen = tmp = 0; in run_file() 297 fail += do_tests(filename, test, key, keylen, in run_file() 342 parsehex(cp, &key, &keylen); in run_file() 343 if (keylen * 8 != (u_int)keysize) in run_file() [all …]
|
/dragonfly/contrib/ldns/ |
H A D | dnssec_verify.c | 1834 if(keylen != 64) { in ldns_gost2pkey_raw() 1882 if(keylen != 32 || keylen + pre_len > sizeof(buf)) in ldns_ed255192pkey_raw() 1920 if(keylen != 57 || keylen + pre_len > sizeof(buf)) in ldns_ed4482pkey_raw() 2034 keylen); in ldns_verify_rrsig_buffers_raw() 2043 keylen); in ldns_verify_rrsig_buffers_raw() 2064 key, keylen); in ldns_verify_rrsig_buffers_raw() 2077 key, keylen); in ldns_verify_rrsig_buffers_raw() 2083 key, keylen); in ldns_verify_rrsig_buffers_raw() 2091 keylen); in ldns_verify_rrsig_buffers_raw() 2764 (void) keylen; [all …]
|
/dragonfly/test/testcases/crypto/aes/ |
H A D | aestest.c | 73 session.keylen = klen; in syscrypt() 214 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument 221 if (syscrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests() 230 if (syscrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests() 249 u_int keylen, textlen, tmp; in run_file() local 255 keylen = textlen = tmp = 0; in run_file() 315 parsehex(cp, &key, &keylen); in run_file() 316 if (keylen * 8 != (u_int)keysize) in run_file() 328 fail += do_tests(filename, test, key, keylen, in run_file()
|
/dragonfly/lib/libc/citrus/ |
H A D | citrus_memstream.c | 73 size_t keylen, len; in _citrus_memory_stream_matchline() local 75 keylen = strlen(key); in _citrus_memory_stream_matchline() 95 if ((size_t)(q - p) == keylen) { in _citrus_memory_stream_matchline() 97 if (memcmp(key, p, keylen) == 0) in _citrus_memory_stream_matchline() 100 if (_bcs_strncasecmp(key, p, keylen) == 0) in _citrus_memory_stream_matchline()
|
/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | p5_pbev2.c | 190 int alg_nid, keylen; in PKCS5_pbe2_set_iv() local 244 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set_iv() 246 keylen = -1; in PKCS5_pbe2_set_iv() 252 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv() 298 int keylen) in PKCS5_pbkdf2_set() argument 332 if (keylen > 0) { in PKCS5_pbkdf2_set() 335 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
|
/dragonfly/lib/librpcsvc/ |
H A D | yp_update.c | 59 yp_update(char *domain, char *map, unsigned int ypop, char *key, int keylen, in yp_update() argument 125 upargs.key.yp_buf_len = keylen; in yp_update() 142 upargs.key.yp_buf_len = keylen; in yp_update() 159 delargs.key.yp_buf_len = keylen; in yp_update() 174 upargs.key.yp_buf_len = keylen; in yp_update()
|
/dragonfly/crypto/libressl/crypto/ec/ |
H A D | ec_pmeth.c | 211 pkey_ec_derive(EVP_PKEY_CTX * ctx, unsigned char *key, size_t * keylen) in pkey_ec_derive() argument 228 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; in pkey_ec_derive() 238 outlen = *keylen; in pkey_ec_derive() 244 *keylen = ret; in pkey_ec_derive() 250 pkey_ec_kdf_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) in pkey_ec_kdf_derive() argument 258 return pkey_ec_derive(ctx, key, keylen); in pkey_ec_kdf_derive() 261 *keylen = dctx->kdf_outlen; in pkey_ec_kdf_derive() 264 if (*keylen != dctx->kdf_outlen) in pkey_ec_kdf_derive() 275 if (!ecdh_KDF_X9_63(key, *keylen, ktmp, ktmplen, dctx->kdf_ukm, in pkey_ec_kdf_derive()
|
/dragonfly/sys/net/ |
H A D | toeplitz.c | 186 toeplitz_get_key(uint8_t *key, int keylen) in toeplitz_get_key() argument 190 if (keylen > TOEPLITZ_KEYLEN_MAX) in toeplitz_get_key() 191 panic("invalid key length %d", keylen); in toeplitz_get_key() 194 for (i = 0; i < keylen; ++i) in toeplitz_get_key()
|
/dragonfly/crypto/libressl/crypto/kdf/ |
H A D | hkdf_evp.c | 222 size_t *keylen) in pkey_hkdf_derive() argument 237 return HKDF(key, *keylen, kctx->md, kctx->key, kctx->key_len, in pkey_hkdf_derive() 242 *keylen = EVP_MD_size(kctx->md); in pkey_hkdf_derive() 245 return HKDF_extract(key, keylen, kctx->md, kctx->key, in pkey_hkdf_derive() 249 return HKDF_expand(key, *keylen, kctx->md, kctx->key, in pkey_hkdf_derive()
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | wpas_kay.c | 296 size_t keylen; in ieee802_1x_auth_get_msk() local 304 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk() 305 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk() 312 if (keylen > *len) in ieee802_1x_auth_get_msk() 313 keylen = *len; in ieee802_1x_auth_get_msk() 314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 315 *len = keylen; in ieee802_1x_auth_get_msk()
|