| /src/lib/libc/gen/ |
| H A D | arc4random.c | 201 u_char *keystream; in _rs_random_buf() local 208 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) in _rs_random_buf() 210 memcpy(buf, keystream, m); in _rs_random_buf() 211 memset(keystream, 0, m); in _rs_random_buf() 224 u_char *keystream; in _rs_random_u32() local 229 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) - rs->rs_have; in _rs_random_u32() 230 memcpy(val, keystream, sizeof(*val)); in _rs_random_u32() 231 memset(keystream, 0, sizeof(*val)); in _rs_random_u32()
|
| /src/sys/opencrypto/ |
| H A D | xform_aes_icm.c | 209 uint8_t keystream[AESICM_BLOCKSIZE]; in aes_icm_crypt_multi() local 214 rijndaelEncrypt(ctx->ac_ek, ctx->ac_nr, ctx->ac_block, keystream); in aes_icm_crypt_multi() 216 out[i] = in[i] ^ keystream[i]; in aes_icm_crypt_multi() 227 explicit_bzero(keystream, sizeof(keystream)); in aes_icm_crypt_multi() 234 uint8_t keystream[AESICM_BLOCKSIZE]; in aes_icm_crypt_last() local 238 rijndaelEncrypt(ctx->ac_ek, ctx->ac_nr, ctx->ac_block, keystream); in aes_icm_crypt_last() 240 out[i] = in[i] ^ keystream[i]; in aes_icm_crypt_last() 241 explicit_bzero(keystream, sizeof(keystream)); in aes_icm_crypt_last()
|
| /src/crypto/openssh/openbsd-compat/ |
| H A D | arc4random.c | 174 u_char *keystream; in _rs_random_buf() local 181 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) in _rs_random_buf() 183 memcpy(buf, keystream, m); in _rs_random_buf() 184 memset(keystream, 0, m); in _rs_random_buf() 197 u_char *keystream; in _rs_random_u32() local 202 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) - rs->rs_have; in _rs_random_u32() 203 memcpy(val, keystream, sizeof(*val)); in _rs_random_u32() 204 memset(keystream, 0, sizeof(*val)); in _rs_random_u32()
|
| /src/contrib/unbound/compat/ |
| H A D | arc4random.c | 262 u_char *keystream; in _rs_random_buf() local 269 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) in _rs_random_buf() 271 memcpy(buf, keystream, m); in _rs_random_buf() 272 memset(keystream, 0, m); in _rs_random_buf() 285 u_char *keystream; in _rs_random_u32() local 289 keystream = rsx->rs_buf + sizeof(rsx->rs_buf) - rs->rs_have; in _rs_random_u32() 290 memcpy(val, keystream, sizeof(*val)); in _rs_random_u32() 291 memset(keystream, 0, sizeof(*val)); in _rs_random_u32()
|
| /src/tools/tools/net80211/wesside/wesside/ |
| H A D | aircrack-ptw-lib.c | 185 static void guesskeybytes(uint8_t * iv, uint8_t * keystream, uint8_t * result, int kb) { in guesskeybytes() argument 201 tmp = jj - keystream[jj-1]; in guesskeybytes() 228 if ((rc4update(&rc4state) ^ state->sessions[i].keystream[j]) != 0) { in correct() 434 int PTW_addsession(PTW_attackstate * state, uint8_t * iv, uint8_t * keystream) { in PTW_addsession() argument 446 guesskeybytes(iv, keystream, buf, PTW_KEYHSBYTES); in PTW_addsession() 452 memcpy(state->sessions[state->sessions_collected].keystream, keystream, KSBYTES); in PTW_addsession()
|
| H A D | aircrack-ptw-lib.h | 61 uint8_t keystream[PTW_KSBYTES]; member
|
| /src/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_aes_gcm_siv_hw.c | 337 uint8_t keystream[BLOCK_SIZE]; in aes_gcm_siv_ctr32() local 357 … error |= !EVP_EncryptUpdate(ctx->ecb_ctx, keystream, &out_len, (uint8_t *)&block, sizeof(block)); in aes_gcm_siv_ctr32() 365 if (todo > sizeof(keystream)) in aes_gcm_siv_ctr32() 366 todo = sizeof(keystream); in aes_gcm_siv_ctr32() 369 out[i + j] = in[i + j] ^ keystream[j]; in aes_gcm_siv_ctr32()
|
| /src/tools/tools/net80211/wesside/ |
| H A D | README | 11 * Waits for a packet. Uses fragmentation to recover some keystream. 12 * Discovers the network's IP using the linear keystream expansion technique in
|
| /src/tools/tools/net80211/w00t/ |
| H A D | README | 49 Sniff a packet on a WEP network and obtain a keystream. It binds 71 Sniff a WEP packet and do the linear keystream expansion trick to
|
| /src/crypto/openssh/ |
| H A D | PROTOCOL.chacha20poly1305 | 10 is used as a keystream, with any unused bytes simply discarded.
|