/freebsd-9.3-release/contrib/bind9/bin/confgen/ |
H A D | keygen.c | 88 * Return default keysize for a given algorithm type. 111 * Generate a key of size 'keysize' using entropy source 'randomfile', 116 int keysize, isc_buffer_t *key_txtbuffer) { 132 if (keysize < 1 || keysize > 512) 133 fatal("keysize %d out of range (must be 1-512)\n", 134 keysize); 138 if (keysize < 1 || keysize > 1024) 139 fatal("keysize 115 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, int keysize, isc_buffer_t *key_txtbuffer) argument [all...] |
H A D | keygen.h | 29 int keysize, isc_buffer_t *key_txtbuffer);
|
H A D | rndc-confgen.c | 111 int keysize; local 127 keysize = DEFAULT_KEYLENGTH; 140 keysize = strtol(isc_commandline_argument, &p, 10); 141 if (*p != '\0' || keysize < 0) 209 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
|
H A D | ddns-confgen.c | 98 int keysize = 256; local 117 keysize = alg_bits(alg); 193 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
|
/freebsd-9.3-release/sys/geom/eli/ |
H A D | g_eli_crypto.c | 61 const u_char *key, size_t keysize) 78 cri.cri_klen = keysize; 108 crd->crd_klen = keysize; 135 const u_char *key, size_t keysize) 139 u_char iv[keysize]; 149 switch (keysize) { 168 switch (keysize) { 193 EVP_CIPHER_CTX_set_key_length(&ctx, keysize / 8); 217 const u_char *key, size_t keysize) 224 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); 60 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 134 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 216 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument 228 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | g_eli_ctl.c | 61 int keysize, error; local 112 key = gctl_get_param(req, "key", &keysize); 113 if (key == NULL || keysize != G_ELI_USERKEYLEN) { 120 bzero(key, keysize); 489 int keysize, nkey, error; local 551 key = gctl_get_param(req, "key", &keysize); 552 if (key == NULL || keysize != G_ELI_USERKEYLEN) { 565 bzero(key, keysize); 598 size_t keysize; local 638 keysize 819 int *nargs, keysize, error; local [all...] |
H A D | g_eli.h | 545 const u_char *key, size_t keysize); 547 const u_char *key, size_t keysize);
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | evp_locl.h | 229 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,fl) \ 230 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 231 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 232 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | rsautl.c | 105 int keysize; local 267 keysize = RSA_size(rsa); 269 rsa_in = OPENSSL_malloc(keysize * 2); 270 rsa_out = OPENSSL_malloc(keysize); 273 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | check.c | 87 size_t keysize; local 90 &keysize); 91 if (ret == 0 && keysize != princ.key_data[i].key_data_length[0]) {
|
/freebsd-9.3-release/contrib/libarchive/libarchive/ |
H A D | archive_private.h | 112 int keysize, char *key, int valsize, char *val);
|
H A D | archive_util.c | 230 __archive_parse_options(const char *p, const char *fn, int keysize, char *key, argument 268 if (kidx >= keysize -1)
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 78 size_t keysize; member in struct:kc_rsa 141 sig.Length = kc->keysize; 234 kc->keysize = (size + 7) / 8; 236 data = malloc(kc->keysize); 237 memset(data, 0xe0, kc->keysize); 238 BN_bin2bn(data, kc->keysize, rsa->n);
|
/freebsd-9.3-release/sys/opencrypto/ |
H A D | xform.h | 37 u_int16_t keysize; member in struct:auth_hash
|
H A D | cryptodev.c | 500 if (sop->mackeylen != thash->keysize) {
|
/freebsd-9.3-release/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 409 size_t keysize; local 436 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize); 441 if (keysize > res.length) { 449 k->key.keyvalue.length = keysize;
|
/freebsd-9.3-release/contrib/sendmail/src/ |
H A D | udb.c | 855 int keysize = strlen(name); local 857 if (keysize > sizeof(keybuf) - 1) 858 keysize = sizeof(keybuf) - 1; 859 memmove(keybuf, name, keysize); 860 keybuf[keysize] = '\0';
|
/freebsd-9.3-release/crypto/openssl/test/ |
H A D | igetest.c | 125 const size_t keysize; member in struct:bi_ige_test 248 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); 249 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); 251 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); 252 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2);
|
/freebsd-9.3-release/lib/libc/nameser/ |
H A D | ns_print.c | 622 int mode, err, keysize; local 642 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 643 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
/freebsd-9.3-release/sys/netipsec/ |
H A D | xform_ah.c | 213 if (keylen != thash->keysize && thash->keysize != 0) { 215 "keysize %d\n", __func__, 216 keylen, thash->name, thash->keysize));
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 878 int algnid, int keysize) 882 if (keysize > 0) { 884 if (!key || !ASN1_INTEGER_set(key, keysize))
|
H A D | cms.h | 257 int algnid, int keysize); variable
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | ssl_locl.h | 450 RSA *(*rsa_tmp_cb) (SSL *ssl, int is_export, int keysize); 454 DH *(*dh_tmp_cb) (SSL *ssl, int is_export, int keysize); 459 EC_KEY *(*ecdh_tmp_cb) (SSL *ssl, int is_export, int keysize);
|
H A D | ssl_lib.c | 1927 int keysize = 0; local 1935 keysize = EVP_PKEY_bits(pkey); 1937 if (keysize > 163)
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 1075 size_t *keysize) 1083 *keysize = et->keytype->size; 1073 krb5_enctype_keysize(krb5_context context, krb5_enctype type, size_t *keysize) argument
|