Searched refs:keysize (Results 1 - 25 of 27) sorted by relevance

12

/freebsd-11.0-release/sys/boot/geli/
H A Dgeliboot_crypto.c38 const u_char *key, size_t keysize, u_char *iv)
48 err = rijndael_makeKey(&aeskey, !enc, keysize,
78 xts_len = keysize << 1;
109 const u_char *key, size_t keysize)
111 u_char iv[keysize];
114 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv));
119 const u_char *key, size_t keysize)
126 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize));
131 const u_char *key, size_t keysize)
138 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysize));
37 geliboot_crypt(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize, u_char *iv) argument
108 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
118 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
130 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dgeliboot.h86 const u_char *key, size_t keysize, const uint8_t* iv);
90 const u_char *key, size_t keysize, u_char *iv);
/freebsd-11.0-release/sys/geom/eli/
H A Dg_eli_crypto.c60 const u_char *key, size_t keysize)
75 cri.cri_klen = keysize;
94 crd->crd_klen = keysize;
121 const u_char *key, size_t keysize)
125 u_char iv[keysize];
135 switch (keysize) {
154 switch (keysize) {
179 EVP_CIPHER_CTX_set_key_length(&ctx, keysize / 8);
203 const u_char *key, size_t keysize)
210 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize));
59 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
120 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
202 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
214 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dg_eli_ctl.c61 int keysize, error; local
112 key = gctl_get_param(req, "key", &keysize);
113 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
120 bzero(key, keysize);
568 int keysize, nkey, error; local
630 key = gctl_get_param(req, "key", &keysize);
631 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
644 bzero(key, keysize);
677 size_t keysize; local
717 keysize
898 int *nargs, keysize, error; local
[all...]
H A Dg_eli.h684 const u_char *key, size_t keysize);
686 const u_char *key, size_t keysize);
/freebsd-11.0-release/contrib/unbound/sldns/
H A Dkeyraw.h36 * \return the keysize in bits, or 0 on error
44 * \param[in] keysize length of key data.
47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
H A Dkeyraw.c89 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument
91 if(keysize < 4) {
97 if (keysize > 4) {
98 memmove(&ac16, key + keysize - 3, 2);
105 for (i = 0; i < keysize; ++i) {
/freebsd-11.0-release/crypto/openssl/apps/
H A Drsautl.c103 int keysize; local
263 keysize = RSA_size(rsa);
265 rsa_in = OPENSSL_malloc(keysize * 2);
266 rsa_out = OPENSSL_malloc(keysize);
274 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
H A Dpkeyutl.c100 int keysize = -1; local
220 ctx = init_ctx(&keysize, inkey, keyform, key_type,
293 siglen = bio_to_mem(&sig, keysize * 10, sigbio);
303 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
/freebsd-11.0-release/crypto/heimdal/kadmin/
H A Dcheck.c85 size_t keysize; local
88 &keysize);
89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
/freebsd-11.0-release/sys/opencrypto/
H A Dxform_auth.h55 u_int16_t keysize; member in struct:auth_hash
H A Dcryptodev.c523 if (sop->mackeylen != thash->keysize) {
/freebsd-11.0-release/crypto/heimdal/lib/hx509/
H A Dks_keychain.c78 size_t keysize; member in struct:kc_rsa
143 sig.Length = kc->keysize;
202 out.Length = kc->keysize;
291 kc->keysize = (size + 7) / 8;
293 data = malloc(kc->keysize);
294 memset(data, 0xe0, kc->keysize);
295 BN_bin2bn(data, kc->keysize, rsa->n);
/freebsd-11.0-release/sys/mips/nlm/dev/net/ucore/
H A Ducore.h288 * keysize - defines the number of bytes in the pre-pad that contains the key
292 int keysize, int valid, int startcrc, int endcrc)
305 val |= ((keysize & 0x3f) << 25);
291 nlm_ucore_crc_setup(int crcpos, int cps, int cfi, int cbm, int fcoe, int keysize, int valid, int startcrc, int endcrc) argument
/freebsd-11.0-release/crypto/openssl/crypto/evp/
H A Devp_locl.h257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \
258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
/freebsd-11.0-release/crypto/heimdal/lib/hdb/
H A Dmkey.c412 size_t keysize; local
439 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize);
444 if (keysize > res.length) {
452 k->key.keyvalue.length = keysize;
/freebsd-11.0-release/contrib/ldns/
H A Ddnssec.c275 size_t keysize; local
293 /* the current pos in the buffer is the keysize */
294 keysize= ldns_buffer_position(keybuf);
296 ac16 = ldns_calc_keytag_raw(ldns_buffer_begin(keybuf), keysize);
301 uint16_t ldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument
307 if(keysize < 4) {
313 if (keysize > 4) {
314 memmove(&ac16, key + keysize - 3, 2);
320 for (i = 0; (size_t)i < keysize; ++i) {
/freebsd-11.0-release/contrib/sendmail/src/
H A Dudb.c855 int keysize = strlen(name); local
857 if (keysize > sizeof(keybuf) - 1)
858 keysize = sizeof(keybuf) - 1;
859 memmove(keybuf, name, keysize);
860 keybuf[keysize] = '\0';
/freebsd-11.0-release/contrib/ldns/ldns/
H A Ddnssec.h125 * \param[in] keysize length of key data.
128 uint16_t ldns_calc_keytag_raw(uint8_t* key, size_t keysize);
/freebsd-11.0-release/crypto/heimdal/lib/krb5/
H A Dcrypto.c85 size_t *keysize)
91 *keysize = et->keytype->size;
2549 size_t i, keysize; local
2553 ret = krb5_enctype_keysize(context, enctype, &keysize);
2557 ret = krb5_data_alloc(&res->keyvalue, keysize);
2560 ret = krb5_crypto_prfplus(context, crypto1, pepper1, keysize, &os1);
2563 ret = krb5_crypto_prfplus(context, crypto2, pepper2, keysize, &os2);
2570 for (i = 0; i < keysize; i++)
83 krb5_enctype_keysize(krb5_context context, krb5_enctype type, size_t *keysize) argument
/freebsd-11.0-release/sys/netipsec/
H A Dxform_ah.c233 if (keylen != thash->keysize && thash->keysize != 0) {
235 "keysize %d\n", __func__,
236 keylen, thash->name, thash->keysize));
/freebsd-11.0-release/crypto/openssl/crypto/cms/
H A Dcms_sd.c900 int algnid, int keysize)
904 if (keysize > 0) {
906 if (!key || !ASN1_INTEGER_set(key, keysize))
H A Dcms.h287 int algnid, int keysize); variable
/freebsd-11.0-release/crypto/openssl/ssl/
H A Dssl_locl.h623 RSA *(*rsa_tmp_cb) (SSL *ssl, int is_export, int keysize);
627 DH *(*dh_tmp_cb) (SSL *ssl, int is_export, int keysize);
632 EC_KEY *(*ecdh_tmp_cb) (SSL *ssl, int is_export, int keysize);
/freebsd-11.0-release/lib/libc/nameser/
H A Dns_print.c629 int mode, err, keysize; local
649 keysize = ns_get16(rdata); rdata += NS_INT16SZ;
650 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));

Completed in 282 milliseconds

12