/freebsd-11.0-release/sys/boot/geli/ |
H A D | geliboot_crypto.c | 38 const u_char *key, size_t keysize, u_char *iv) 48 err = rijndael_makeKey(&aeskey, !enc, keysize, 78 xts_len = keysize << 1; 109 const u_char *key, size_t keysize) 111 u_char iv[keysize]; 114 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); 119 const u_char *key, size_t keysize) 126 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); 131 const u_char *key, size_t keysize) 138 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysize)); 37 geliboot_crypt(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize, u_char *iv) argument 108 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 118 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 130 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | geliboot.h | 86 const u_char *key, size_t keysize, const uint8_t* iv); 90 const u_char *key, size_t keysize, u_char *iv);
|
/freebsd-11.0-release/sys/geom/eli/ |
H A D | g_eli_crypto.c | 60 const u_char *key, size_t keysize) 75 cri.cri_klen = keysize; 94 crd->crd_klen = keysize; 121 const u_char *key, size_t keysize) 125 u_char iv[keysize]; 135 switch (keysize) { 154 switch (keysize) { 179 EVP_CIPHER_CTX_set_key_length(&ctx, keysize / 8); 203 const u_char *key, size_t keysize) 210 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); 59 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 120 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 202 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 214 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | g_eli_ctl.c | 61 int keysize, error; local 112 key = gctl_get_param(req, "key", &keysize); 113 if (key == NULL || keysize != G_ELI_USERKEYLEN) { 120 bzero(key, keysize); 568 int keysize, nkey, error; local 630 key = gctl_get_param(req, "key", &keysize); 631 if (key == NULL || keysize != G_ELI_USERKEYLEN) { 644 bzero(key, keysize); 677 size_t keysize; local 717 keysize 898 int *nargs, keysize, error; local [all...] |
H A D | g_eli.h | 684 const u_char *key, size_t keysize); 686 const u_char *key, size_t keysize);
|
/freebsd-11.0-release/contrib/unbound/sldns/ |
H A D | keyraw.h | 36 * \return the keysize in bits, or 0 on error 44 * \param[in] keysize length of key data. 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
|
H A D | keyraw.c | 89 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument 91 if(keysize < 4) { 97 if (keysize > 4) { 98 memmove(&ac16, key + keysize - 3, 2); 105 for (i = 0; i < keysize; ++i) {
|
/freebsd-11.0-release/crypto/openssl/apps/ |
H A D | rsautl.c | 103 int keysize; local 263 keysize = RSA_size(rsa); 265 rsa_in = OPENSSL_malloc(keysize * 2); 266 rsa_out = OPENSSL_malloc(keysize); 274 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
H A D | pkeyutl.c | 100 int keysize = -1; local 220 ctx = init_ctx(&keysize, inkey, keyform, key_type, 293 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 303 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
/freebsd-11.0-release/crypto/heimdal/kadmin/ |
H A D | check.c | 85 size_t keysize; local 88 &keysize); 89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
|
/freebsd-11.0-release/sys/opencrypto/ |
H A D | xform_auth.h | 55 u_int16_t keysize; member in struct:auth_hash
|
H A D | cryptodev.c | 523 if (sop->mackeylen != thash->keysize) {
|
/freebsd-11.0-release/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 78 size_t keysize; member in struct:kc_rsa 143 sig.Length = kc->keysize; 202 out.Length = kc->keysize; 291 kc->keysize = (size + 7) / 8; 293 data = malloc(kc->keysize); 294 memset(data, 0xe0, kc->keysize); 295 BN_bin2bn(data, kc->keysize, rsa->n);
|
/freebsd-11.0-release/sys/mips/nlm/dev/net/ucore/ |
H A D | ucore.h | 288 * keysize - defines the number of bytes in the pre-pad that contains the key 292 int keysize, int valid, int startcrc, int endcrc) 305 val |= ((keysize & 0x3f) << 25); 291 nlm_ucore_crc_setup(int crcpos, int cps, int cfi, int cbm, int fcoe, int keysize, int valid, int startcrc, int endcrc) argument
|
/freebsd-11.0-release/crypto/openssl/crypto/evp/ |
H A D | evp_locl.h | 257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \ 258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
|
/freebsd-11.0-release/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 412 size_t keysize; local 439 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize); 444 if (keysize > res.length) { 452 k->key.keyvalue.length = keysize;
|
/freebsd-11.0-release/contrib/ldns/ |
H A D | dnssec.c | 275 size_t keysize; local 293 /* the current pos in the buffer is the keysize */ 294 keysize= ldns_buffer_position(keybuf); 296 ac16 = ldns_calc_keytag_raw(ldns_buffer_begin(keybuf), keysize); 301 uint16_t ldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument 307 if(keysize < 4) { 313 if (keysize > 4) { 314 memmove(&ac16, key + keysize - 3, 2); 320 for (i = 0; (size_t)i < keysize; ++i) {
|
/freebsd-11.0-release/contrib/sendmail/src/ |
H A D | udb.c | 855 int keysize = strlen(name); local 857 if (keysize > sizeof(keybuf) - 1) 858 keysize = sizeof(keybuf) - 1; 859 memmove(keybuf, name, keysize); 860 keybuf[keysize] = '\0';
|
/freebsd-11.0-release/contrib/ldns/ldns/ |
H A D | dnssec.h | 125 * \param[in] keysize length of key data. 128 uint16_t ldns_calc_keytag_raw(uint8_t* key, size_t keysize);
|
/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 85 size_t *keysize) 91 *keysize = et->keytype->size; 2549 size_t i, keysize; local 2553 ret = krb5_enctype_keysize(context, enctype, &keysize); 2557 ret = krb5_data_alloc(&res->keyvalue, keysize); 2560 ret = krb5_crypto_prfplus(context, crypto1, pepper1, keysize, &os1); 2563 ret = krb5_crypto_prfplus(context, crypto2, pepper2, keysize, &os2); 2570 for (i = 0; i < keysize; i++) 83 krb5_enctype_keysize(krb5_context context, krb5_enctype type, size_t *keysize) argument
|
/freebsd-11.0-release/sys/netipsec/ |
H A D | xform_ah.c | 233 if (keylen != thash->keysize && thash->keysize != 0) { 235 "keysize %d\n", __func__, 236 keylen, thash->name, thash->keysize));
|
/freebsd-11.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 900 int algnid, int keysize) 904 if (keysize > 0) { 906 if (!key || !ASN1_INTEGER_set(key, keysize))
|
H A D | cms.h | 287 int algnid, int keysize); variable
|
/freebsd-11.0-release/crypto/openssl/ssl/ |
H A D | ssl_locl.h | 623 RSA *(*rsa_tmp_cb) (SSL *ssl, int is_export, int keysize); 627 DH *(*dh_tmp_cb) (SSL *ssl, int is_export, int keysize); 632 EC_KEY *(*ecdh_tmp_cb) (SSL *ssl, int is_export, int keysize);
|
/freebsd-11.0-release/lib/libc/nameser/ |
H A D | ns_print.c | 629 int mode, err, keysize; local 649 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 650 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|