Home
last modified time | relevance | path

Searched refs:keybytes (Results 1 – 19 of 19) sorted by relevance

/freebsd/crypto/krb5/src/lib/crypto/builtin/
H A Dkdf.c79 size_t blocksize, keybytes, n; in k5_sp800_108_feedback_cmac() local
87 keybytes = enc->keybytes; in k5_sp800_108_feedback_cmac()
89 if (key->keyblock.length != enc->keylength || rnd_out->length != keybytes) in k5_sp800_108_feedback_cmac()
117 for (i = 1, n = 0; n < keybytes; i++) { in k5_sp800_108_feedback_cmac()
127 if (keybytes - n <= blocksize) { in k5_sp800_108_feedback_cmac()
128 memcpy(rnd_out->data + n, prf.data, keybytes - n); in k5_sp800_108_feedback_cmac()
144 size_t blocksize, keybytes, n; in k5_derive_random_rfc3961() local
149 keybytes = enc->keybytes; in k5_derive_random_rfc3961()
153 if (key->keyblock.length != enc->keylength || rnd_out->length != keybytes) in k5_derive_random_rfc3961()
171 while (n < keybytes) { in k5_derive_random_rfc3961()
[all …]
/freebsd/crypto/krb5/src/lib/crypto/krb/
H A Dmake_random_key.c37 size_t keybytes, keylength; in krb5_c_make_random_key() local
46 keybytes = enc->keybytes; in krb5_c_make_random_key()
49 bytes = k5alloc(keybytes, &ret); in krb5_c_make_random_key()
57 random_data.length = keybytes; in krb5_c_make_random_key()
74 zapfree(bytes, keybytes); in krb5_c_make_random_key()
H A Dkeylengths.c40 size_t *keybytes, size_t *keylength) in krb5_c_keylengths() argument
44 if (keybytes == NULL && keylength == NULL) in krb5_c_keylengths()
51 if (keybytes) in krb5_c_keylengths()
52 *keybytes = ktp->enc->keybytes; in krb5_c_keylengths()
H A Ds2k_pbkdf2.c39 size_t keybytes, keylength, concatlen; in krb5int_dk_string_to_key() local
47 keybytes = ktp->enc->keybytes; in krb5int_dk_string_to_key()
55 foldstring = k5alloc(keybytes, &ret); in krb5int_dk_string_to_key()
69 krb5int_nfold(concatlen*8, concat, keybytes*8, foldstring); in krb5int_dk_string_to_key()
71 indata.length = keybytes; in krb5int_dk_string_to_key()
97 zapfree(foldstring, keybytes); in krb5int_dk_string_to_key()
H A Denc_rc4.c168 ret = krb5int_c_init_keyblock(NULL, key->keyblock.enctype, enc->keybytes, in krb5int_arcfour_encrypt()
172 ret = krb5int_c_init_keyblock(NULL, key->keyblock.enctype, enc->keybytes, in krb5int_arcfour_encrypt()
242 ret = krb5int_c_init_keyblock(NULL, key->keyblock.enctype, enc->keybytes, in krb5int_arcfour_decrypt()
246 ret = krb5int_c_init_keyblock(NULL, key->keyblock.enctype, enc->keybytes, in krb5int_arcfour_decrypt()
321 ret = krb5int_c_init_keyblock(NULL, keyblock->enctype, enc->keybytes, in krb5int_arcfour_gsscrypt()
325 ret = krb5int_c_init_keyblock(NULL, keyblock->enctype, enc->keybytes, in krb5int_arcfour_gsscrypt()
H A Dcf2.c98 ret = alloc_data(&rnd, ktp->enc->keybytes); in krb5_c_derive_prfplus()
144 ret = alloc_data(&prf1, ktp->enc->keybytes); in krb5_c_fx_cf2_simple()
150 ret = alloc_data(&prf2, ktp->enc->keybytes); in krb5_c_fx_cf2_simple()
H A Dderive.c117 ret = alloc_data(&rawkey, enc->keybytes); in krb5int_derive_keyblock()
130 zapfree(rawkey.data, enc->keybytes); in krb5int_derive_keyblock()
H A Dcrypto_int.h97 size_t block_size, keybytes, keylength; member
/freebsd/secure/lib/libcrypt/
H A Dblowfish.c392 Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes) in Blowfish_expand0state() argument
404 temp = Blowfish_stream2word(key, keybytes, &j); in Blowfish_expand0state()
430 const u_int8_t *key, u_int16_t keybytes) in Blowfish_expandstate() argument
442 temp = Blowfish_stream2word(key, keybytes, &j); in Blowfish_expandstate()
/freebsd/crypto/krb5/src/lib/crypto/crypto_tests/
H A Dt_cmac.c44 static unsigned char keybytes[] = { variable
115 keyblock.contents = keybytes; in main()
/freebsd/crypto/openssl/test/
H A Docspapitest.c71 unsigned char keybytes[128] = { 7 }; in make_dummy_resp() local
87 || !TEST_true(ASN1_BIT_STRING_set(key, keybytes, sizeof(keybytes))) in make_dummy_resp()
/freebsd/crypto/krb5/src/plugins/gssapi/negoextest/
H A Dmain.c309 uint8_t keybytes[32] = { 0 }; in gss_inquire_sec_context_by_oid() local
341 keybytes[0] = ask_verify ^ ctx->initiator; in gss_inquire_sec_context_by_oid()
347 key.value = keybytes; in gss_inquire_sec_context_by_oid()
348 key.length = sizeof(keybytes); in gss_inquire_sec_context_by_oid()
/freebsd/crypto/krb5/src/plugins/kdb/test/
H A Dkdb_test.c195 size_t keybytes, keylength, pos, n; in make_keyblock() local
200 check(krb5_c_keylengths(NULL, etype, &keybytes, &keylength)); in make_keyblock()
201 alloc_data(&rndin, keybytes); in make_keyblock()
211 for (pos = 0; pos < keybytes; pos += n) { in make_keyblock()
212 n = (cksum.length < keybytes - pos) ? cksum.length : keybytes - pos; in make_keyblock()
/freebsd/crypto/openssh/openbsd-compat/
H A Dblowfish.c421 Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes) in Blowfish_expand0state() argument
433 temp = Blowfish_stream2word(key, keybytes, &j); in Blowfish_expand0state()
460 const u_int8_t *key, u_int16_t keybytes) in Blowfish_expandstate() argument
472 temp = Blowfish_stream2word(key, keybytes, &j); in Blowfish_expandstate()
/freebsd/crypto/krb5/src/kadmin/ktutil/
H A Dktutil_funcs.c155 uint8_t *keybytes; in ktutil_add() local
222 retval = k5_hex_decode(buf, &keybytes, &keylen); in ktutil_add()
232 entry->key.contents = keybytes; in ktutil_add()
/freebsd/crypto/krb5/src/lib/crypto/openssl/
H A Dkdf.c193 rnd_out->length != enc->keybytes) { in k5_derive_random_rfc3961()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_clnt.c3191 unsigned char *keybytes = NULL; in tls_construct_cke_dhe() local
3232 if (!WPACKET_sub_allocate_bytes_u16(pkt, pad_len, &keybytes)) { in tls_construct_cke_dhe()
3236 memset(keybytes, 0, pad_len); in tls_construct_cke_dhe()
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c2582 size_t keybytes, keylength, offset; in octetstring2key() local
2619 retval = krb5_c_keylengths(context, etype, &keybytes, &keylength); in octetstring2key()
2628 random_data.length = keybytes; in octetstring2key()
/freebsd/crypto/krb5/src/include/krb5/
H A Dkrb5.hin595 * @param [out] keybytes Number of bytes required to make a key
602 size_t *keybytes, size_t *keylength);