Searched refs:keysize (Results 1 - 25 of 26) sorted by relevance

12

/freebsd-9.3-release/contrib/bind9/bin/confgen/
H A Dkeygen.c88 * Return default keysize for a given algorithm type.
111 * Generate a key of size 'keysize' using entropy source 'randomfile',
116 int keysize, isc_buffer_t *key_txtbuffer) {
132 if (keysize < 1 || keysize > 512)
133 fatal("keysize %d out of range (must be 1-512)\n",
134 keysize);
138 if (keysize < 1 || keysize > 1024)
139 fatal("keysize
115 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, int keysize, isc_buffer_t *key_txtbuffer) argument
[all...]
H A Dkeygen.h29 int keysize, isc_buffer_t *key_txtbuffer);
H A Drndc-confgen.c111 int keysize; local
127 keysize = DEFAULT_KEYLENGTH;
140 keysize = strtol(isc_commandline_argument, &p, 10);
141 if (*p != '\0' || keysize < 0)
209 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
H A Dddns-confgen.c98 int keysize = 256; local
117 keysize = alg_bits(alg);
193 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
/freebsd-9.3-release/sys/geom/eli/
H A Dg_eli_crypto.c61 const u_char *key, size_t keysize)
78 cri.cri_klen = keysize;
108 crd->crd_klen = keysize;
135 const u_char *key, size_t keysize)
139 u_char iv[keysize];
149 switch (keysize) {
168 switch (keysize) {
193 EVP_CIPHER_CTX_set_key_length(&ctx, keysize / 8);
217 const u_char *key, size_t keysize)
224 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize));
60 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
134 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
216 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
228 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dg_eli_ctl.c61 int keysize, error; local
112 key = gctl_get_param(req, "key", &keysize);
113 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
120 bzero(key, keysize);
489 int keysize, nkey, error; local
551 key = gctl_get_param(req, "key", &keysize);
552 if (key == NULL || keysize != G_ELI_USERKEYLEN) {
565 bzero(key, keysize);
598 size_t keysize; local
638 keysize
819 int *nargs, keysize, error; local
[all...]
H A Dg_eli.h545 const u_char *key, size_t keysize);
547 const u_char *key, size_t keysize);
/freebsd-9.3-release/crypto/openssl/crypto/evp/
H A Devp_locl.h229 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,fl) \
230 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
231 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
232 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
/freebsd-9.3-release/crypto/openssl/apps/
H A Drsautl.c105 int keysize; local
267 keysize = RSA_size(rsa);
269 rsa_in = OPENSSL_malloc(keysize * 2);
270 rsa_out = OPENSSL_malloc(keysize);
273 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
/freebsd-9.3-release/crypto/heimdal/kadmin/
H A Dcheck.c87 size_t keysize; local
90 &keysize);
91 if (ret == 0 && keysize != princ.key_data[i].key_data_length[0]) {
/freebsd-9.3-release/contrib/libarchive/libarchive/
H A Darchive_private.h112 int keysize, char *key, int valsize, char *val);
H A Darchive_util.c230 __archive_parse_options(const char *p, const char *fn, int keysize, char *key, argument
268 if (kidx >= keysize -1)
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dks_keychain.c78 size_t keysize; member in struct:kc_rsa
141 sig.Length = kc->keysize;
234 kc->keysize = (size + 7) / 8;
236 data = malloc(kc->keysize);
237 memset(data, 0xe0, kc->keysize);
238 BN_bin2bn(data, kc->keysize, rsa->n);
/freebsd-9.3-release/sys/opencrypto/
H A Dxform.h37 u_int16_t keysize; member in struct:auth_hash
H A Dcryptodev.c500 if (sop->mackeylen != thash->keysize) {
/freebsd-9.3-release/crypto/heimdal/lib/hdb/
H A Dmkey.c409 size_t keysize; local
436 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize);
441 if (keysize > res.length) {
449 k->key.keyvalue.length = keysize;
/freebsd-9.3-release/contrib/sendmail/src/
H A Dudb.c855 int keysize = strlen(name); local
857 if (keysize > sizeof(keybuf) - 1)
858 keysize = sizeof(keybuf) - 1;
859 memmove(keybuf, name, keysize);
860 keybuf[keysize] = '\0';
/freebsd-9.3-release/crypto/openssl/test/
H A Digetest.c125 const size_t keysize; member in struct:bi_ige_test
248 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1);
249 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2);
251 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1);
252 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2);
/freebsd-9.3-release/lib/libc/nameser/
H A Dns_print.c622 int mode, err, keysize; local
642 keysize = ns_get16(rdata); rdata += NS_INT16SZ;
643 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
/freebsd-9.3-release/sys/netipsec/
H A Dxform_ah.c213 if (keylen != thash->keysize && thash->keysize != 0) {
215 "keysize %d\n", __func__,
216 keylen, thash->name, thash->keysize));
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_sd.c878 int algnid, int keysize)
882 if (keysize > 0) {
884 if (!key || !ASN1_INTEGER_set(key, keysize))
H A Dcms.h257 int algnid, int keysize); variable
/freebsd-9.3-release/crypto/openssl/ssl/
H A Dssl_locl.h450 RSA *(*rsa_tmp_cb) (SSL *ssl, int is_export, int keysize);
454 DH *(*dh_tmp_cb) (SSL *ssl, int is_export, int keysize);
459 EC_KEY *(*ecdh_tmp_cb) (SSL *ssl, int is_export, int keysize);
H A Dssl_lib.c1927 int keysize = 0; local
1935 keysize = EVP_PKEY_bits(pkey);
1937 if (keysize > 163)
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dcrypto.c1075 size_t *keysize)
1083 *keysize = et->keytype->size;
1073 krb5_enctype_keysize(krb5_context context, krb5_enctype type, size_t *keysize) argument

Completed in 312 milliseconds

12