Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 118) sorted by relevance

12345

/dragonfly/tools/tools/net80211/wesside/wesside/
H A Daircrack-ptw-lib.c144 j = (j + state->s[i] + key[i % keylen]) % n; in rc4init()
226 memcpy(&keybuf[IVBYTES], key, keylen); in correct()
254 for (i = 0; i < keylen; i++) { in getdrv()
288 if (keybyte == keylen) { in doRound()
289 return correct(state, key, keylen); in doRound()
326 for (i = 0; i < keylen; i++) { in doComputation()
348 for (j = 0; j < keylen; j++) { in doComputation()
383 for (i = 0; i < keylen; i++) { in PTW_computeKey()
395 for (i = 0; i < keylen; i++) { in PTW_computeKey()
410 getdrv(state->table, keylen, normal, ausreisser); in PTW_computeKey()
[all …]
/dragonfly/crypto/libressl/crypto/cms/
H A Dcms_enc.c143 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio()
152 if (ec->keylen != tkeylen) { in cms_EncryptedContent_init_bio()
154 if (!EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen)) { in cms_EncryptedContent_init_bio()
164 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio()
166 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio()
197 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio()
213 if ((ec->key = malloc(keylen)) == NULL) { in cms_EncryptedContent_init()
217 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init()
219 ec->keylen = keylen; in cms_EncryptedContent_init()
228 const unsigned char *key, size_t keylen) in CMS_EncryptedData_set1_key() argument
[all …]
H A Dcms_pwri.c335 size_t keylen; in cms_RecipientInfo_pwri_crypt() local
396 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt()
399 key = malloc(keylen); in cms_RecipientInfo_pwri_crypt()
403 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt()
406 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt()
413 if (!kek_unwrap_key(key, &keylen, pwri->encryptedKey->data, in cms_RecipientInfo_pwri_crypt()
419 freezero(ec->key, ec->keylen); in cms_RecipientInfo_pwri_crypt()
421 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
H A Dcms_env.c491 freezero(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt()
493 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt()
560 switch (keylen) { in CMS_add0_recipient_key()
587 if (keylen != exp_keylen) { in CMS_add0_recipient_key()
620 kekri->keylen = keylen; in CMS_add0_recipient_key()
679 size_t keylen) in CMS_RecipientInfo_set0_key() argument
690 kekri->keylen = keylen; in CMS_RecipientInfo_set0_key()
719 wkey = malloc(ec->keylen + 8); in cms_RecipientInfo_kekri_encrypt()
795 freezero(ec->key, ec->keylen); in cms_RecipientInfo_kekri_decrypt()
797 ec->keylen = ukeylen; in cms_RecipientInfo_kekri_decrypt()
[all …]
/dragonfly/contrib/libarchive/libarchive/
H A Darchive_blake2.h148 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen );
154 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen );
160 int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen );
165 int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen );
171 int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen );
176 int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen );
181 … blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
182 … blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
184 …blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
185 …blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
[all …]
H A Darchive_blake2sp_ref.c49 P->key_length = (uint8_t)keylen; in blake2sp_init_leaf()
62 static int blake2sp_init_root( blake2s_state *S, size_t outlen, size_t keylen ) in blake2sp_init_root() argument
66 P->key_length = (uint8_t)keylen; in blake2sp_init_root()
107 if( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp_init_key()
113 if( blake2sp_init_root( S->R, outlen, keylen ) < 0 ) in blake2sp_init_key()
124 memcpy( block, key, keylen ); in blake2sp_init_key()
228 if ( NULL == key && keylen > 0) return -1; in blake2sp()
232 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp()
239 if( keylen > 0 ) in blake2sp()
243 memcpy( block, key, keylen ); in blake2sp()
[all …]
H A Darchive_blake2s_ref.c117 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ) in blake2s_init_key() argument
123 if ( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key()
126 P->key_length = (uint8_t)keylen; in blake2s_init_key()
143 memcpy( block, key, keylen ); in blake2s_init_key()
267 int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen in blake2s() argument
276 if ( NULL == key && keylen > 0) return -1; in blake2s()
280 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s()
282 if( keylen > 0 ) in blake2s()
284 if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2s()
/dragonfly/usr.sbin/ppp/
H A Dmppe.c101 unsigned keylen; /* 8 or 16 bytes */ member
152 RC4_set_key(&RC4Key, mp->keylen, InterimKey); in MPPEKeyChange()
153 RC4(&RC4Key, mp->keylen, InterimKey, mp->sesskey); in MPPEKeyChange()
656 mp->keylen = 16; in MPPE_InitState()
660 mp->keylen = 8; in MPPE_InitState()
664 mp->keylen = 8; in MPPE_InitState()
699 mip->keylen = bundle->radius.mppe.recvkeylen; in MPPEInitInput()
700 if (mip->keylen > sizeof mip->mastkey) in MPPEInitInput()
701 mip->keylen = sizeof mip->mastkey; in MPPEInitInput()
756 if (mop->keylen > sizeof mop->mastkey) in MPPEInitOutput()
[all …]
/dragonfly/lib/libssh/openbsd-compat/
H A Dbcrypt_pbkdf.c115 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument
124 size_t origkeylen = keylen; in bcrypt_pbkdf()
129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
130 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf()
134 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf()
135 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf()
143 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf()
166 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf()
173 keylen -= i; in bcrypt_pbkdf()
185 arc4random_buf(key, keylen); in bcrypt_pbkdf()
/dragonfly/sys/crypto/blake2/
H A Dblake2s.h42 const void *key, size_t keylen);
49 size_t outlen, size_t inlen, size_t keylen) in blake2s() argument
55 (key != NULL || keylen == 0) && keylen <= BLAKE2S_KEY_SIZE); in blake2s()
57 if (keylen > 0) in blake2s()
58 blake2s_init_key(&state, outlen, key, keylen); in blake2s()
/dragonfly/contrib/gcc-4.7/gcc/
H A Dprefix.c189 int keylen; in translate_name() local
197 for (keylen = 0; in translate_name()
198 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name()
199 keylen++) in translate_name()
202 key = (char *) alloca (keylen + 1); in translate_name()
203 strncpy (key, &name[1], keylen); in translate_name()
204 key[keylen] = 0; in translate_name()
224 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
/dragonfly/contrib/gcc-8.0/gcc/
H A Dprefix.c188 int keylen; in translate_name() local
196 for (keylen = 0; in translate_name()
197 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name()
198 keylen++) in translate_name()
201 key = (char *) alloca (keylen + 1); in translate_name()
202 memcpy (key, &name[1], keylen); in translate_name()
203 key[keylen] = 0; in translate_name()
223 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
/dragonfly/crypto/libressl/crypto/evp/
H A Dp5_crpt2.c83 int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC() argument
96 tkeylen = keylen; in PKCS5_PBKDF2_HMAC()
155 int saltlen, int iter, int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument
158 EVP_sha1(), keylen, out); in PKCS5_PBKDF2_HMAC_SHA1()
230 unsigned int keylen = 0; in PKCS5_v2_PBKDF2_keyivgen() local
239 keylen = EVP_CIPHER_CTX_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen()
240 if (keylen > sizeof key) { in PKCS5_v2_PBKDF2_keyivgen()
263 (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen()
297 keylen, key)) in PKCS5_v2_PBKDF2_keyivgen()
302 explicit_bzero(key, keylen); in PKCS5_v2_PBKDF2_keyivgen()
/dragonfly/lib/libtelnet/
H A Dencrypt.c164 int keylen; member
718 kp->keylen = 0; in encrypt_keyid()
723 if (kp->keylen == 0) in encrypt_keyid()
725 kp->keylen = 0; in encrypt_keyid()
729 } else if ((len != kp->keylen) || in encrypt_keyid()
734 kp->keylen = len; in encrypt_keyid()
758 memmove(kp->keyid, keyid, keylen); in encrypt_send_keyid()
759 kp->keylen = keylen; in encrypt_send_keyid()
762 for (strp = &str_keyid[4]; keylen > 0; --keylen) { in encrypt_send_keyid()
821 for (i = 0; i < ki[0].keylen; ++i) { in encrypt_start_output()
[all …]
/dragonfly/test/testcases/crypto/serpent/
H A Dserpent_test.c72 session.keylen = klen; in syscrypt()
221 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument
229 print_hex(key, keylen); in do_tests()
234 if (syscrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests()
244 if (syscrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests()
264 u_int keylen, textlen, tmp; in run_file() local
270 keylen = textlen = tmp = 0; in run_file()
297 fail += do_tests(filename, test, key, keylen, in run_file()
342 parsehex(cp, &key, &keylen); in run_file()
343 if (keylen * 8 != (u_int)keysize) in run_file()
[all …]
/dragonfly/test/testcases/crypto/twofish/
H A Dtwofish_test.c72 session.keylen = klen; in syscrypt()
221 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument
229 print_hex(key, keylen); in do_tests()
234 if (syscrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests()
244 if (syscrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests()
264 u_int keylen, textlen, tmp; in run_file() local
270 keylen = textlen = tmp = 0; in run_file()
297 fail += do_tests(filename, test, key, keylen, in run_file()
342 parsehex(cp, &key, &keylen); in run_file()
343 if (keylen * 8 != (u_int)keysize) in run_file()
[all …]
/dragonfly/contrib/ldns/
H A Ddnssec_verify.c1834 if(keylen != 64) { in ldns_gost2pkey_raw()
1882 if(keylen != 32 || keylen + pre_len > sizeof(buf)) in ldns_ed255192pkey_raw()
1920 if(keylen != 57 || keylen + pre_len > sizeof(buf)) in ldns_ed4482pkey_raw()
2034 keylen); in ldns_verify_rrsig_buffers_raw()
2043 keylen); in ldns_verify_rrsig_buffers_raw()
2064 key, keylen); in ldns_verify_rrsig_buffers_raw()
2077 key, keylen); in ldns_verify_rrsig_buffers_raw()
2083 key, keylen); in ldns_verify_rrsig_buffers_raw()
2091 keylen); in ldns_verify_rrsig_buffers_raw()
2764 (void) keylen;
[all …]
/dragonfly/test/testcases/crypto/aes/
H A Daestest.c73 session.keylen = klen; in syscrypt()
214 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument
221 if (syscrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests()
230 if (syscrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests()
249 u_int keylen, textlen, tmp; in run_file() local
255 keylen = textlen = tmp = 0; in run_file()
315 parsehex(cp, &key, &keylen); in run_file()
316 if (keylen * 8 != (u_int)keysize) in run_file()
328 fail += do_tests(filename, test, key, keylen, in run_file()
/dragonfly/lib/libc/citrus/
H A Dcitrus_memstream.c73 size_t keylen, len; in _citrus_memory_stream_matchline() local
75 keylen = strlen(key); in _citrus_memory_stream_matchline()
95 if ((size_t)(q - p) == keylen) { in _citrus_memory_stream_matchline()
97 if (memcmp(key, p, keylen) == 0) in _citrus_memory_stream_matchline()
100 if (_bcs_strncasecmp(key, p, keylen) == 0) in _citrus_memory_stream_matchline()
/dragonfly/crypto/libressl/crypto/asn1/
H A Dp5_pbev2.c190 int alg_nid, keylen; in PKCS5_pbe2_set_iv() local
244 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set_iv()
246 keylen = -1; in PKCS5_pbe2_set_iv()
252 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv()
298 int keylen) in PKCS5_pbkdf2_set() argument
332 if (keylen > 0) { in PKCS5_pbkdf2_set()
335 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
/dragonfly/lib/librpcsvc/
H A Dyp_update.c59 yp_update(char *domain, char *map, unsigned int ypop, char *key, int keylen, in yp_update() argument
125 upargs.key.yp_buf_len = keylen; in yp_update()
142 upargs.key.yp_buf_len = keylen; in yp_update()
159 delargs.key.yp_buf_len = keylen; in yp_update()
174 upargs.key.yp_buf_len = keylen; in yp_update()
/dragonfly/crypto/libressl/crypto/ec/
H A Dec_pmeth.c211 pkey_ec_derive(EVP_PKEY_CTX * ctx, unsigned char *key, size_t * keylen) in pkey_ec_derive() argument
228 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; in pkey_ec_derive()
238 outlen = *keylen; in pkey_ec_derive()
244 *keylen = ret; in pkey_ec_derive()
250 pkey_ec_kdf_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) in pkey_ec_kdf_derive() argument
258 return pkey_ec_derive(ctx, key, keylen); in pkey_ec_kdf_derive()
261 *keylen = dctx->kdf_outlen; in pkey_ec_kdf_derive()
264 if (*keylen != dctx->kdf_outlen) in pkey_ec_kdf_derive()
275 if (!ecdh_KDF_X9_63(key, *keylen, ktmp, ktmplen, dctx->kdf_ukm, in pkey_ec_kdf_derive()
/dragonfly/sys/net/
H A Dtoeplitz.c186 toeplitz_get_key(uint8_t *key, int keylen) in toeplitz_get_key() argument
190 if (keylen > TOEPLITZ_KEYLEN_MAX) in toeplitz_get_key()
191 panic("invalid key length %d", keylen); in toeplitz_get_key()
194 for (i = 0; i < keylen; ++i) in toeplitz_get_key()
/dragonfly/crypto/libressl/crypto/kdf/
H A Dhkdf_evp.c222 size_t *keylen) in pkey_hkdf_derive() argument
237 return HKDF(key, *keylen, kctx->md, kctx->key, kctx->key_len, in pkey_hkdf_derive()
242 *keylen = EVP_MD_size(kctx->md); in pkey_hkdf_derive()
245 return HKDF_extract(key, keylen, kctx->md, kctx->key, in pkey_hkdf_derive()
249 return HKDF_expand(key, *keylen, kctx->md, kctx->key, in pkey_hkdf_derive()
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Dwpas_kay.c296 size_t keylen; in ieee802_1x_auth_get_msk() local
304 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk()
305 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk()
312 if (keylen > *len) in ieee802_1x_auth_get_msk()
313 keylen = *len; in ieee802_1x_auth_get_msk()
314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
315 *len = keylen; in ieee802_1x_auth_get_msk()

12345