Searched refs:keysize (Results 1 - 25 of 45) sorted by relevance

12

/freebsd-13-stable/stand/libsa/geli/
H A Dgeliboot_crypto.c39 const u_char *key, size_t keysize, u_char *iv)
49 err = rijndael_makeKey(&aeskey, !enc, keysize,
80 xts_len = keysize << 1;
111 const u_char *key, size_t keysize)
113 u_char iv[keysize];
116 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv));
121 const u_char *key, size_t keysize)
129 keysize));
134 const u_char *key, size_t keysize)
142 keysize));
38 geliboot_crypt(u_int algo, geli_op_t enc, u_char *data, size_t datasize, const u_char *key, size_t keysize, u_char *iv) argument
110 g_eli_crypto_cipher(u_int algo, geli_op_t enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
120 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
133 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dgeliboot_internal.h71 const u_char *key, size_t keysize, u_char *iv);
/freebsd-13-stable/sys/opencrypto/
H A Dxform_cbc_mac.c11 .keysize = AES_128_CBC_MAC_KEY_LEN,
24 .keysize = AES_192_CBC_MAC_KEY_LEN,
37 .keysize = AES_256_CBC_MAC_KEY_LEN,
H A Dxform_sha2.c79 .keysize = SHA2_256_BLOCK_LEN,
91 .keysize = SHA2_384_BLOCK_LEN,
103 .keysize = SHA2_512_BLOCK_LEN,
116 .keysize = SHA2_224_BLOCK_LEN,
128 .keysize = SHA2_256_BLOCK_LEN,
140 .keysize = SHA2_384_BLOCK_LEN,
152 .keysize = SHA2_512_BLOCK_LEN,
H A Dxform_gmac.c70 .keysize = AES_128_GMAC_KEY_LEN,
84 .keysize = AES_192_GMAC_KEY_LEN,
98 .keysize = AES_256_GMAC_KEY_LEN,
H A Dxform_rmd160.c64 .keysize = RIPEMD160_BLOCK_LEN,
H A Dxform_sha1.c76 .keysize = SHA1_BLOCK_LEN,
H A Dxform_auth.h55 uint16_t keysize; member in struct:auth_hash
H A Dxform_null.c82 .keysize = 0,
H A Dxform_poly1305.c83 .keysize = POLY1305_KEY_LEN,
/freebsd-13-stable/sys/geom/eli/
H A Dg_eli_crypto.c62 const u_char *key, size_t keysize)
77 csp.csp_cipher_klen = keysize / 8;
111 const u_char *key, size_t keysize)
115 u_char iv[keysize];
125 switch (keysize) {
141 switch (keysize) {
165 EVP_CIPHER_CTX_set_key_length(ctx, keysize / 8);
189 const u_char *key, size_t keysize)
196 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize));
201 const u_char *key, size_t keysize)
61 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
110 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
188 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
200 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dg_eli_ctl.c61 int keysize, error, nkey, dryrun, dummy; local
135 key = gctl_get_param(req, "key", &keysize);
136 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
146 explicit_bzero(key, keysize);
651 int keysize, nkey, error; local
660 key = gctl_get_param(req, "key", &keysize);
661 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
727 explicit_bzero(key, keysize);
759 size_t keysize; local
799 keysize
979 int *nargs, keysize, error; local
[all...]
/freebsd-13-stable/crypto/openssh/
H A Dxmss_wots.h29 uint32_t keysize; member in struct:__anon6913
H A Dxmss_fast.c155 unsigned char pk[params->wots_par.keysize];
634 sig_msg += params->wots_par.keysize;
635 *sig_msg_len += params->wots_par.keysize;
669 unsigned char wots_pk[params->wots_par.keysize];
700 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n;
713 sig_msg += params->wots_par.keysize;
714 sig_msg_len -= params->wots_par.keysize;
773 wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_par), pk+n, addr);
886 sig_msg += params->xmss_par.wots_par.keysize;
887 *sig_msg_len += params->xmss_par.wots_par.keysize;
[all...]
/freebsd-13-stable/contrib/unbound/sldns/
H A Dkeyraw.h36 * \return the keysize in bits, or 0 on error
44 * \param[in] keysize length of key data.
47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
H A Dkeyraw.c106 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) argument
108 if(keysize < 4) {
114 if (keysize > 4) {
115 memmove(&ac16, key + keysize - 3, 2);
122 for (i = 0; i < keysize; ++i) {
/freebsd-13-stable/crypto/openssl/apps/
H A Drsautl.c76 int rsa_inlen, keyformat = FORMAT_PEM, keysize, ret = 1; local
212 keysize = RSA_size(rsa);
214 rsa_in = app_malloc(keysize * 2, "hold rsa key");
215 rsa_out = app_malloc(keysize, "output rsa key");
218 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
H A Dpkeyutl.c88 int keysize = -1, pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY; local
216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
272 siglen = bio_to_mem(&sig, keysize * 10, sigbio);
282 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
/freebsd-13-stable/crypto/heimdal/kadmin/
H A Dcheck.c85 size_t keysize; local
88 &keysize);
89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dks_keychain.c78 size_t keysize; member in struct:kc_rsa
143 sig.Length = kc->keysize;
202 out.Length = kc->keysize;
291 kc->keysize = (size + 7) / 8;
293 data = malloc(kc->keysize);
294 memset(data, 0xe0, kc->keysize);
295 BN_bin2bn(data, kc->keysize, rsa->n);
/freebsd-13-stable/sys/contrib/openzfs/module/icp/algs/aes/
H A Daes_impl.c46 uint_t keysize, i, j; local
69 keysize = CRYPTO_BITS2BYTES(keyBits);
79 for (i = 0, j = 0; j < keysize; i++, j += 8) {
84 bcopy(cipherKey, keyarr.ka32, keysize);
88 for (i = 0, j = 0; j < keysize; i++, j += 4) {
/freebsd-13-stable/sys/crypto/blake2/
H A Dblake2-sw.c88 .keysize = BLAKE2B_KEYBYTES,
156 .keysize = BLAKE2S_KEYBYTES,
/freebsd-13-stable/sys/mips/nlm/dev/net/ucore/
H A Ducore.h289 * keysize - defines the number of bytes in the pre-pad that contains the key
293 int keysize, int valid, int startcrc, int endcrc)
306 val |= ((keysize & 0x3f) << 25);
292 nlm_ucore_crc_setup(int crcpos, int cps, int cfi, int cbm, int fcoe, int keysize, int valid, int startcrc, int endcrc) argument
/freebsd-13-stable/sys/kern/
H A Dkern_shutdown.c1494 uint32_t keysize; local
1504 keysize = kerneldumpcrypto_dumpkeysize(kdc);
1507 keysize = 0;
1515 return (di->dumper_hdr(di, kdh, key, keysize));
1530 keysize, keysize);
1538 keysize, di->blocksize);
1575 uint32_t keysize; local
1582 keysize = kerneldumpcrypto_dumpkeysize(di->kdcrypto);
1585 keysize
[all...]
/freebsd-13-stable/crypto/openssl/include/crypto/
H A Devp.h368 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,fl) \
369 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
370 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
371 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \

Completed in 303 milliseconds

12