/openbsd-current/regress/lib/libcrypto/rc2/ |
H A D | rc2_test.c | 28 const int key_bits; member in struct:rc2_test 46 .key_bits = 63, 62 .key_bits = 64, 78 .key_bits = 64, 94 .key_bits = 64, 110 .key_bits = 64, 127 .key_bits = 64, 144 .key_bits = 128, 164 .key_bits = 129, 183 .key_bits [all...] |
/openbsd-current/usr.bin/dig/lib/dns/ |
H A D | key.c | 72 key->key_bits = bits; 77 return (key->key_bits);
|
H A D | dst_internal.h | 78 uint16_t key_bits; /*%< hmac digest bits */ member in struct:dst_key
|
/openbsd-current/lib/libcrypto/evp/ |
H A D | e_rc2.c | 82 int key_bits; /* effective key bits */ member in struct:__anon22 303 key, data(ctx)->key_bits); 344 int key_bits; local 357 key_bits = rc2_magic_to_meth((int)num); 358 if (!key_bits) 363 key_bits, NULL) <= 0) 365 if (!EVP_CIPHER_CTX_set_key_length(c, key_bits / 8)) 392 data(c)->key_bits = EVP_CIPHER_CTX_key_length(c) * 8; 396 *(int *)ptr = data(c)->key_bits; 401 data(c)->key_bits [all...] |
H A D | e_aes.c | 2283 const size_t key_bits = key_len * 8; local 2286 if (key_bits != 128 && key_bits != 256) { 2304 aesni_set_encrypt_key(key, key_bits, &gcm_ctx->ks.ks);
|
/openbsd-current/lib/libssl/ |
H A D | tls_key_share.c | 32 size_t key_bits; member in struct:tls_key_share 115 tls_key_share_set_key_bits(struct tls_key_share *ks, size_t key_bits) argument 117 ks->key_bits = key_bits; 158 if (ks->key_bits == 0) { 170 if (!ssl_kex_generate_dhe_params_auto(ks->dhe, ks->key_bits))
|
H A D | ssl_kex.c | 59 ssl_kex_generate_dhe_params_auto(DH *dh, size_t key_bits) argument 64 if (key_bits >= 8192) 66 else if (key_bits >= 4096) 68 else if (key_bits >= 3072) 70 else if (key_bits >= 2048) 72 else if (key_bits >= 1536)
|
H A D | tls_internal.h | 85 void tls_key_share_set_key_bits(struct tls_key_share *ks, size_t key_bits);
|
H A D | ssl_lib.c | 2427 int key_bits; local 2430 key_bits = 1024; 2432 key_bits = 1024; 2434 key_bits = 3072; 2441 if ((key_bits = EVP_PKEY_bits(cpk->privatekey)) <= 0) 2445 return key_bits;
|
H A D | ssl_srvr.c | 1324 size_t key_bits; local 1326 if ((key_bits = ssl_dhe_params_auto_key_bits(s)) == 0) { 1333 key_bits);
|
/openbsd-current/regress/lib/libcrypto/aes/ |
H A D | aes_test.c | 532 aes_ecb_test(size_t test_number, const char *label, int key_bits, argument 545 AES_set_encrypt_key(at->key, key_bits, &key); 556 AES_set_decrypt_key(at->key, key_bits, &key); 570 aes_cbc_test(size_t test_number, const char *label, int key_bits, argument 585 AES_set_encrypt_key(at->key, key_bits, &key); 597 AES_set_decrypt_key(at->key, key_bits, &key); 611 int key_bits, const EVP_CIPHER *cipher) 898 int key_bits; local 904 key_bits = aes_key_bits_from_nid(at->mode); 913 if (!aes_ecb_test(i, label, key_bits, a 610 aes_evp_test(size_t test_number, const struct aes_test *at, const char *label, int key_bits, const EVP_CIPHER *cipher) argument [all...] |
/openbsd-current/usr.sbin/rpki-client/ |
H A D | validate.c | 592 int key_bits; local 594 if ((key_bits = EVP_PKEY_bits(pkey)) != 2048) { 596 fn, key_bits);
|