HomeSort by: relevance | last modified time | path
    Searched defs:crypt (Results 1 - 6 of 6) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/
mesh_rsn.c 656 u8 *ampe_buf, *crypt = NULL, *pos, *end; local
697 /* crypt is modified by siv_decrypt */
698 crypt = os_zalloc(crypt_len);
699 if (!crypt) {
705 os_memcpy(crypt, elems->mic, crypt_len);
707 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3,
812 os_free(crypt);
  /src/tests/lib/libdes/
t_des.c 65 #define crypt(c,s) (des_crypt((c),(s))) macro
961 str = crypt("testing", "ef");
963 atf_tc_fail_nonfatal("fast crypt error, %s should be efGnQx2725bI2\n", str);
964 str = crypt("bca76;23", "yA");
966 atf_tc_fail_nonfatal("fast crypt error, %s should be yA1Rp/1hZXIJk\n", str);
  /src/lib/libcrypt/
crypt.c 1 /* $NetBSD: crypt.c,v 1.41 2024/07/23 22:37:11 riastradh Exp $ */
38 static char sccsid[] = "@(#)crypt.c 8.1.1.1 (Berkeley) 8/18/93";
40 __RCSID("$NetBSD: crypt.c,v 1.41 2024/07/23 22:37:11 riastradh Exp $");
53 #include "crypt.h"
102 * little effect on crypt().
472 * We match the behavior of UFC-crypt on systems where "char" is signed by
573 /* $sha1$ found in crypt.h:SHA1_MAGIC */
687 crypt(const char *key, const char *salt) function
1092 printf("%s\n", crypt(argv[1], (argc > 2) ? argv[2] : argv[1]));
  /src/crypto/external/bsd/netpgp/dist/src/lib/
writer.c 923 pgp_crypt_t *crypt; member in struct:__anon1064
946 if (!pgp_is_sa_supported(pgp_encrypt->crypt->alg)) {
954 pgp_encrypt->crypt->cfb_encrypt(pgp_encrypt->crypt, encbuf,
982 free(pgp_encrypt->crypt);
1002 pgp_encrypt->crypt = pgp_crypt;
1013 pgp_crypt_t *crypt; member in struct:__anon1065
1065 se_ip->crypt = encrypted;
1109 se_ip->crypt);
1133 free(se_ip->crypt);
1385 pgp_crypt_t *crypt; member in struct:__anon1068
    [all...]
  /src/external/bsd/wpa/dist/src/drivers/
driver_hostap.h 171 } crypt; member in union:prism2_hostapd_param::__anon8348
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth.c 3201 const u8 *end, *ie_start, *ie, *session, *crypt; local
3237 crypt = session + 2 + session[1];
3239 if (end - crypt < AES_BLOCK_SIZE) {
3264 aad_len[4] = crypt - aad[4];
3266 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt,
3267 5, aad, aad_len, pos + (crypt - ie_start)) < 0) {

Completed in 37 milliseconds