/freebsd-13-stable/stand/libsa/geli/ |
H A D | geliboot_crypto.c | 39 const u_char *key, size_t keysize, u_char *iv) 49 err = rijndael_makeKey(&aeskey, !enc, keysize, 80 xts_len = keysize << 1; 111 const u_char *key, size_t keysize) 113 u_char iv[keysize]; 116 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); 121 const u_char *key, size_t keysize) 129 keysize)); 134 const u_char *key, size_t keysize) 142 keysize)); 38 geliboot_crypt(u_int algo, geli_op_t enc, u_char *data, size_t datasize, const u_char *key, size_t keysize, u_char *iv) argument 110 g_eli_crypto_cipher(u_int algo, geli_op_t enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 120 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 133 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | geliboot_internal.h | 71 const u_char *key, size_t keysize, u_char *iv);
|
/freebsd-13-stable/sys/opencrypto/ |
H A D | xform_cbc_mac.c | 11 .keysize = AES_128_CBC_MAC_KEY_LEN, 24 .keysize = AES_192_CBC_MAC_KEY_LEN, 37 .keysize = AES_256_CBC_MAC_KEY_LEN,
|
H A D | xform_sha2.c | 79 .keysize = SHA2_256_BLOCK_LEN, 91 .keysize = SHA2_384_BLOCK_LEN, 103 .keysize = SHA2_512_BLOCK_LEN, 116 .keysize = SHA2_224_BLOCK_LEN, 128 .keysize = SHA2_256_BLOCK_LEN, 140 .keysize = SHA2_384_BLOCK_LEN, 152 .keysize = SHA2_512_BLOCK_LEN,
|
H A D | xform_gmac.c | 70 .keysize = AES_128_GMAC_KEY_LEN, 84 .keysize = AES_192_GMAC_KEY_LEN, 98 .keysize = AES_256_GMAC_KEY_LEN,
|
H A D | xform_rmd160.c | 64 .keysize = RIPEMD160_BLOCK_LEN,
|
H A D | xform_sha1.c | 76 .keysize = SHA1_BLOCK_LEN,
|
H A D | xform_auth.h | 55 uint16_t keysize; member in struct:auth_hash
|
H A D | xform_null.c | 82 .keysize = 0,
|
H A D | xform_poly1305.c | 83 .keysize = POLY1305_KEY_LEN,
|
/freebsd-13-stable/sys/geom/eli/ |
H A D | g_eli_crypto.c | 62 const u_char *key, size_t keysize) 77 csp.csp_cipher_klen = keysize / 8; 111 const u_char *key, size_t keysize) 115 u_char iv[keysize]; 125 switch (keysize) { 141 switch (keysize) { 165 EVP_CIPHER_CTX_set_key_length(ctx, keysize / 8); 189 const u_char *key, size_t keysize) 196 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); 201 const u_char *key, size_t keysize) 61 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 110 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 188 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 200 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | g_eli_ctl.c | 61 int keysize, error, nkey, dryrun, dummy; local 135 key = gctl_get_param(req, "key", &keysize); 136 if (key == NULL || keysize != G_ELI_USERKEYLEN) { 146 explicit_bzero(key, keysize); 651 int keysize, nkey, error; local 660 key = gctl_get_param(req, "key", &keysize); 661 if (key == NULL || keysize != G_ELI_USERKEYLEN) { 727 explicit_bzero(key, keysize); 759 size_t keysize; local 799 keysize 979 int *nargs, keysize, error; local [all...] |
/freebsd-13-stable/crypto/openssh/ |
H A D | xmss_wots.h | 29 uint32_t keysize; member in struct:__anon6913
|
H A D | xmss_fast.c | 155 unsigned char pk[params->wots_par.keysize]; 634 sig_msg += params->wots_par.keysize; 635 *sig_msg_len += params->wots_par.keysize; 669 unsigned char wots_pk[params->wots_par.keysize]; 700 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n; 713 sig_msg += params->wots_par.keysize; 714 sig_msg_len -= params->wots_par.keysize; 773 wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_par), pk+n, addr); 886 sig_msg += params->xmss_par.wots_par.keysize; 887 *sig_msg_len += params->xmss_par.wots_par.keysize; [all...] |
/freebsd-13-stable/contrib/unbound/sldns/ |
H A D | keyraw.h | 36 * \return the keysize in bits, or 0 on error 44 * \param[in] keysize length of key data. 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
|
H A D | keyraw.c | 106 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument 108 if(keysize < 4) { 114 if (keysize > 4) { 115 memmove(&ac16, key + keysize - 3, 2); 122 for (i = 0; i < keysize; ++i) {
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | rsautl.c | 76 int rsa_inlen, keyformat = FORMAT_PEM, keysize, ret = 1; local 212 keysize = RSA_size(rsa); 214 rsa_in = app_malloc(keysize * 2, "hold rsa key"); 215 rsa_out = app_malloc(keysize, "output rsa key"); 218 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
H A D | pkeyutl.c | 88 int keysize = -1, pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY; local 216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, 272 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 282 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | check.c | 85 size_t keysize; local 88 &keysize); 89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 78 size_t keysize; member in struct:kc_rsa 143 sig.Length = kc->keysize; 202 out.Length = kc->keysize; 291 kc->keysize = (size + 7) / 8; 293 data = malloc(kc->keysize); 294 memset(data, 0xe0, kc->keysize); 295 BN_bin2bn(data, kc->keysize, rsa->n);
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/algs/aes/ |
H A D | aes_impl.c | 46 uint_t keysize, i, j; local 69 keysize = CRYPTO_BITS2BYTES(keyBits); 79 for (i = 0, j = 0; j < keysize; i++, j += 8) { 84 bcopy(cipherKey, keyarr.ka32, keysize); 88 for (i = 0, j = 0; j < keysize; i++, j += 4) {
|
/freebsd-13-stable/sys/crypto/blake2/ |
H A D | blake2-sw.c | 88 .keysize = BLAKE2B_KEYBYTES, 156 .keysize = BLAKE2S_KEYBYTES,
|
/freebsd-13-stable/sys/mips/nlm/dev/net/ucore/ |
H A D | ucore.h | 289 * keysize - defines the number of bytes in the pre-pad that contains the key 293 int keysize, int valid, int startcrc, int endcrc) 306 val |= ((keysize & 0x3f) << 25); 292 nlm_ucore_crc_setup(int crcpos, int cps, int cfi, int cbm, int fcoe, int keysize, int valid, int startcrc, int endcrc) argument
|
/freebsd-13-stable/sys/kern/ |
H A D | kern_shutdown.c | 1494 uint32_t keysize; local 1504 keysize = kerneldumpcrypto_dumpkeysize(kdc); 1507 keysize = 0; 1515 return (di->dumper_hdr(di, kdh, key, keysize)); 1530 keysize, keysize); 1538 keysize, di->blocksize); 1575 uint32_t keysize; local 1582 keysize = kerneldumpcrypto_dumpkeysize(di->kdcrypto); 1585 keysize [all...] |
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | evp.h | 368 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,fl) \ 369 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 370 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 371 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
|