| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.c | 656 u8 *ampe_buf, *crypt = NULL, *pos, *end; local 697 /* crypt is modified by siv_decrypt */ 698 crypt = os_zalloc(crypt_len); 699 if (!crypt) { 705 os_memcpy(crypt, elems->mic, crypt_len); 707 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, 812 os_free(crypt);
|
| /src/tests/lib/libdes/ |
| t_des.c | 65 #define crypt(c,s) (des_crypt((c),(s))) macro 961 str = crypt("testing", "ef"); 963 atf_tc_fail_nonfatal("fast crypt error, %s should be efGnQx2725bI2\n", str); 964 str = crypt("bca76;23", "yA"); 966 atf_tc_fail_nonfatal("fast crypt error, %s should be yA1Rp/1hZXIJk\n", str);
|
| /src/lib/libcrypt/ |
| crypt.c | 1 /* $NetBSD: crypt.c,v 1.41 2024/07/23 22:37:11 riastradh Exp $ */ 38 static char sccsid[] = "@(#)crypt.c 8.1.1.1 (Berkeley) 8/18/93"; 40 __RCSID("$NetBSD: crypt.c,v 1.41 2024/07/23 22:37:11 riastradh Exp $"); 53 #include "crypt.h" 102 * little effect on crypt(). 472 * We match the behavior of UFC-crypt on systems where "char" is signed by 573 /* $sha1$ found in crypt.h:SHA1_MAGIC */ 687 crypt(const char *key, const char *salt) function 1092 printf("%s\n", crypt(argv[1], (argc > 2) ? argv[2] : argv[1]));
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| writer.c | 923 pgp_crypt_t *crypt; member in struct:__anon1064 946 if (!pgp_is_sa_supported(pgp_encrypt->crypt->alg)) { 954 pgp_encrypt->crypt->cfb_encrypt(pgp_encrypt->crypt, encbuf, 982 free(pgp_encrypt->crypt); 1002 pgp_encrypt->crypt = pgp_crypt; 1013 pgp_crypt_t *crypt; member in struct:__anon1065 1065 se_ip->crypt = encrypted; 1109 se_ip->crypt); 1133 free(se_ip->crypt); 1385 pgp_crypt_t *crypt; member in struct:__anon1068 [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_hostap.h | 171 } crypt; member in union:prism2_hostapd_param::__anon8348
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth.c | 3201 const u8 *end, *ie_start, *ie, *session, *crypt; local 3237 crypt = session + 2 + session[1]; 3239 if (end - crypt < AES_BLOCK_SIZE) { 3264 aad_len[4] = crypt - aad[4]; 3266 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, 3267 5, aad, aad_len, pos + (crypt - ie_start)) < 0) {
|