Searched refs:keysize (Results 1 - 25 of 25) sorted by relevance

/freebsd-10-stable/sys/geom/eli/
H A Dg_eli_crypto.c61 const u_char *key, size_t keysize)
78 cri.cri_klen = keysize;
108 crd->crd_klen = keysize;
135 const u_char *key, size_t keysize)
139 u_char iv[keysize];
149 switch (keysize) {
168 switch (keysize) {
193 EVP_CIPHER_CTX_set_key_length(&ctx, keysize / 8);
217 const u_char *key, size_t keysize)
224 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize));
60 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
134 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
216 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
228 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dg_eli_ctl.c61 int keysize, error; local
112 key = gctl_get_param(req, "key", &keysize);
113 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
120 bzero(key, keysize);
489 int keysize, nkey, error; local
551 key = gctl_get_param(req, "key", &keysize);
552 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
565 bzero(key, keysize);
598 size_t keysize; local
638 keysize
819 int *nargs, keysize, error; local
[all...]
H A Dg_eli.h604 const u_char *key, size_t keysize);
606 const u_char *key, size_t keysize);
/freebsd-10-stable/contrib/unbound/sldns/
H A Dkeyraw.h36 * \return the keysize in bits, or 0 on error
44 * \param[in] keysize length of key data.
47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
H A Dkeyraw.c89 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument
91 if(keysize < 4) {
97 if (keysize > 4) {
98 memmove(&ac16, key + keysize - 3, 2);
105 for (i = 0; i < keysize; ++i) {
/freebsd-10-stable/crypto/openssl/apps/
H A Drsautl.c105 int keysize; local
267 keysize = RSA_size(rsa);
269 rsa_in = OPENSSL_malloc(keysize * 2);
270 rsa_out = OPENSSL_malloc(keysize);
278 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
H A Dpkeyutl.c99 int keysize = -1; local
138 ctx = init_ctx(&keysize,
270 siglen = bio_to_mem(&sig, keysize * 10, sigbio);
280 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
/freebsd-10-stable/crypto/heimdal/kadmin/
H A Dcheck.c85 size_t keysize; local
88 &keysize);
89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
/freebsd-10-stable/crypto/heimdal/lib/hx509/
H A Dks_keychain.c78 size_t keysize; member in struct:kc_rsa
143 sig.Length = kc->keysize;
202 out.Length = kc->keysize;
291 kc->keysize = (size + 7) / 8;
293 data = malloc(kc->keysize);
294 memset(data, 0xe0, kc->keysize);
295 BN_bin2bn(data, kc->keysize, rsa->n);
/freebsd-10-stable/sys/mips/nlm/dev/net/ucore/
H A Ducore.h288 * keysize - defines the number of bytes in the pre-pad that contains the key
292 int keysize, int valid, int startcrc, int endcrc)
305 val |= ((keysize & 0x3f) << 25);
291 nlm_ucore_crc_setup(int crcpos, int cps, int cfi, int cbm, int fcoe, int keysize, int valid, int startcrc, int endcrc) argument
/freebsd-10-stable/sys/opencrypto/
H A Dxform.h39 u_int16_t keysize; member in struct:auth_hash
H A Dcryptodev.c501 if (sop->mackeylen != thash->keysize) {
/freebsd-10-stable/crypto/openssl/crypto/evp/
H A Devp_locl.h257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \
258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
/freebsd-10-stable/crypto/heimdal/lib/hdb/
H A Dmkey.c412 size_t keysize; local
439 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize);
444 if (keysize > res.length) {
452 k->key.keyvalue.length = keysize;
/freebsd-10-stable/contrib/ldns/
H A Ddnssec.c275 size_t keysize; local
293 /* the current pos in the buffer is the keysize */
294 keysize= ldns_buffer_position(keybuf);
296 ac16 = ldns_calc_keytag_raw(ldns_buffer_begin(keybuf), keysize);
301 uint16_t ldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument
307 if(keysize < 4) {
313 if (keysize > 4) {
314 memmove(&ac16, key + keysize - 3, 2);
320 for (i = 0; (size_t)i < keysize; ++i) {
/freebsd-10-stable/contrib/sendmail/src/
H A Dudb.c855 int keysize = strlen(name); local
857 if (keysize > sizeof(keybuf) - 1)
858 keysize = sizeof(keybuf) - 1;
859 memmove(keybuf, name, keysize);
860 keybuf[keysize] = '\0';
/freebsd-10-stable/contrib/ldns/ldns/
H A Ddnssec.h125 * \param[in] keysize length of key data.
128 uint16_t ldns_calc_keytag_raw(uint8_t* key, size_t keysize);
/freebsd-10-stable/crypto/heimdal/lib/krb5/
H A Dcrypto.c85 size_t *keysize)
91 *keysize = et->keytype->size;
2549 size_t i, keysize; local
2553 ret = krb5_enctype_keysize(context, enctype, &keysize);
2557 ret = krb5_data_alloc(&res->keyvalue, keysize);
2560 ret = krb5_crypto_prfplus(context, crypto1, pepper1, keysize, &os1);
2563 ret = krb5_crypto_prfplus(context, crypto2, pepper2, keysize, &os2);
2570 for (i = 0; i < keysize; i++)
83 krb5_enctype_keysize(krb5_context context, krb5_enctype type, size_t *keysize) argument
/freebsd-10-stable/crypto/openssl/crypto/cms/
H A Dcms_sd.c845 int algnid, int keysize)
849 if (keysize > 0) {
851 if (!key || !ASN1_INTEGER_set(key, keysize))
H A Dcms.h277 int algnid, int keysize); variable
/freebsd-10-stable/crypto/openssl/ssl/
H A Dssl_locl.h532 RSA *(*rsa_tmp_cb) (SSL *ssl, int is_export, int keysize);
536 DH *(*dh_tmp_cb) (SSL *ssl, int is_export, int keysize);
541 EC_KEY *(*ecdh_tmp_cb) (SSL *ssl, int is_export, int keysize);
H A Dssl_lib.c2264 int keysize = 0; local
2276 keysize = EVP_PKEY_bits(pkey);
2278 if (keysize > 163)
/freebsd-10-stable/sys/netipsec/
H A Dxform_ah.c217 if (keylen != thash->keysize && thash->keysize != 0) {
219 "keysize %d\n", __func__,
220 keylen, thash->name, thash->keysize));
H A Dkey.c5962 *min = *max = ah->keysize;
5963 if (ah->keysize == 0) {
/freebsd-10-stable/lib/libc/nameser/
H A Dns_print.c629 int mode, err, keysize; local
649 keysize = ns_get16(rdata); rdata += NS_INT16SZ;
650 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));

Completed in 358 milliseconds