/freebsd/stand/libsa/geli/ |
H A D | geliboot_crypto.c | 37 const u_char *key, size_t keysize, u_char *iv) in geliboot_crypt() argument 47 err = rijndael_makeKey(&aeskey, !enc, keysize, in geliboot_crypt() 78 xts_len = keysize << 1; in geliboot_crypt() 105 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument 110 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); in g_eli_crypto_cipher() 115 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument 123 keysize)); in g_eli_crypto_encrypt() 128 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument 136 keysize)); in g_eli_crypto_decrypt()
|
H A D | geliboot_internal.h | 67 const u_char *key, size_t keysize, u_char *iv);
|
/freebsd/sys/geom/eli/ |
H A D | g_eli_crypto.c | 59 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument 74 csp.csp_cipher_klen = keysize / 8; in g_eli_crypto_cipher() 108 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument 122 switch (keysize) { in g_eli_crypto_cipher() 138 switch (keysize) { in g_eli_crypto_cipher() 162 EVP_CIPHER_CTX_set_key_length(ctx, keysize / 8); in g_eli_crypto_cipher() 186 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument 193 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); in g_eli_crypto_encrypt() 198 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument 205 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysize)); in g_eli_crypto_decrypt()
|
H A D | g_eli_ctl.c | 58 int keysize, error, nkey, dryrun, dummy; in g_eli_ctl_attach() local 132 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_attach() 133 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_attach() 143 explicit_bzero(key, keysize); in g_eli_ctl_attach() 648 int keysize, nkey, error; in g_eli_ctl_setkey() local 657 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_setkey() 658 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_setkey() 724 explicit_bzero(key, keysize); in g_eli_ctl_setkey() 756 size_t keysize; in g_eli_ctl_delkey() local 796 keysize = sizeof(md.md_mkeys); in g_eli_ctl_delkey() [all …]
|
/freebsd/sys/opencrypto/ |
H A D | xform_sha2.c | 77 .keysize = SHA2_256_BLOCK_LEN, 89 .keysize = SHA2_384_BLOCK_LEN, 101 .keysize = SHA2_512_BLOCK_LEN, 114 .keysize = SHA2_224_BLOCK_LEN, 126 .keysize = SHA2_256_BLOCK_LEN, 138 .keysize = SHA2_384_BLOCK_LEN, 150 .keysize = SHA2_512_BLOCK_LEN,
|
H A D | xform_cbc_mac.c | 9 .keysize = AES_128_CBC_MAC_KEY_LEN, 22 .keysize = AES_192_CBC_MAC_KEY_LEN, 35 .keysize = AES_256_CBC_MAC_KEY_LEN,
|
H A D | xform_gmac.c | 69 .keysize = AES_128_GMAC_KEY_LEN, 83 .keysize = AES_192_GMAC_KEY_LEN, 97 .keysize = AES_256_GMAC_KEY_LEN,
|
H A D | xform_rmd160.c | 74 .keysize = RIPEMD160_BLOCK_LEN,
|
H A D | xform_sha1.c | 74 .keysize = SHA1_BLOCK_LEN,
|
H A D | xform_auth.h | 53 uint16_t keysize; member
|
/freebsd/crypto/openssh/ |
H A D | xmss_fast.c | 155 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots() 634 sig_msg += params->wots_par.keysize; in xmss_sign() 635 *sig_msg_len += params->wots_par.keysize; in xmss_sign() 669 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open() 700 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n; in xmss_sign_open() 713 sig_msg += params->wots_par.keysize; in xmss_sign_open() 714 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open() 773 …wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_p… in xmssmt_keypair() 886 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign() 887 *sig_msg_len += params->xmss_par.wots_par.keysize; in xmssmt_sign() [all …]
|
H A D | xmss_wots.h | 29 uint32_t keysize; member
|
/freebsd/crypto/openssl/apps/ |
H A D | rsautl.c | 84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local 217 keysize = EVP_PKEY_get_size(pkey); in rsautl_main() 219 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 220 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main() 221 rsa_outlen = keysize; in rsautl_main() 224 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 78 size_t keysize; member 143 sig.Length = kc->keysize; in kc_rsa_private_encrypt() 202 out.Length = kc->keysize; in kc_rsa_private_decrypt() 291 kc->keysize = (size + 7) / 8; in set_private_key() 293 data = malloc(kc->keysize); in set_private_key() 294 memset(data, 0xe0, kc->keysize); in set_private_key() 295 BN_bin2bn(data, kc->keysize, rsa->n); in set_private_key()
|
/freebsd/sys/contrib/openzfs/module/icp/algs/aes/ |
H A D | aes_impl.c | 46 uint_t keysize, i, j; in aes_init_keysched() local 69 keysize = CRYPTO_BITS2BYTES(keyBits); in aes_init_keysched() 79 for (i = 0, j = 0; j < keysize; i++, j += 8) { in aes_init_keysched() 84 memcpy(keyarr.ka32, cipherKey, keysize); in aes_init_keysched() 88 for (i = 0, j = 0; j < keysize; i++, j += 4) { in aes_init_keysched()
|
/freebsd/sys/netinet/netdump/ |
H A D | netdump_client.c | 98 uint32_t keysize); 286 netdump_start(struct dumperinfo *di, void *key, uint32_t keysize) in netdump_start() argument 339 if (keysize > 0) { in netdump_start() 340 if (keysize > sizeof(nd_buf)) { in netdump_start() 341 printf("crypto key is too large (%u)\n", keysize); in netdump_start() 345 memcpy(nd_buf, key, keysize); in netdump_start() 346 error = debugnet_send(pcb, NETDUMP_EKCD_KEY, nd_buf, keysize, in netdump_start()
|
/freebsd/crypto/heimdal/kadmin/ |
H A D | check.c | 85 size_t keysize; in do_check_entry() local 88 &keysize); in do_check_entry() 89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { in do_check_entry()
|
/freebsd/sys/kern/ |
H A D | kern_shutdown.c | 1576 uint32_t keysize; in dump_write_headers() 1585 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_write_headers() 1587 keysize = 0; in dump_write_headers() 1610 keysize, keysize); in dump_write_headers() 1618 keysize, di->blocksize); in dump_write_headers() 1659 uint32_t keysize; in dump_start() 1668 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_start() 1669 key = keysize > 0 ? kdc->kdc_dumpkey : NULL; in dump_start() 1672 keysize in dump_start() 1573 uint32_t keysize; dump_write_headers() local 1656 uint32_t keysize; dump_start() local [all...] |
H A D | kern_vnodedumper.c | 154 vnode_dumper_start(struct dumperinfo *di, void *key, uint32_t keysize) in vnode_dumper_start() argument 160 KASSERT(keysize == 0, ("encryption not supported for livedumps")); in vnode_dumper_start()
|
/freebsd/crypto/openssl/test/ |
H A D | igetest.c | 86 const size_t keysize; member 202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
|
/freebsd/contrib/unbound/sldns/ |
H A D | keyraw.c | 110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument 112 if(keysize < 4) { in sldns_calc_keytag_raw() 118 if (keysize > 4) { in sldns_calc_keytag_raw() 119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw() 126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
|
H A D | keyraw.h | 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
|
/freebsd/sys/crypto/blake2/ |
H A D | blake2-sw.c | 81 .keysize = BLAKE2B_KEYBYTES, 144 .keysize = BLAKE2S_KEYBYTES,
|
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 412 size_t keysize; in hdb_unseal_key_mkey() local 439 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize); in hdb_unseal_key_mkey() 444 if (keysize > res.length) { in hdb_unseal_key_mkey() 452 k->key.keyvalue.length = keysize; in hdb_unseal_key_mkey()
|
/freebsd/contrib/ldns/ |
H A D | dnssec.c | 281 size_t keysize; in ldns_calc_keytag() local 300 keysize= ldns_buffer_position(keybuf); in ldns_calc_keytag() 302 ac16 = ldns_calc_keytag_raw(ldns_buffer_begin(keybuf), keysize); in ldns_calc_keytag() 307 uint16_t ldns_calc_keytag_raw(const uint8_t* key, size_t keysize) in ldns_calc_keytag_raw() argument 313 if(keysize < 4) { in ldns_calc_keytag_raw() 319 if (keysize > 4) { in ldns_calc_keytag_raw() 320 memmove(&ac16, key + keysize - 3, 2); in ldns_calc_keytag_raw() 326 for (i = 0; (size_t)i < keysize; ++i) { in ldns_calc_keytag_raw()
|