Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 53) sorted by relevance

123

/freebsd/stand/libsa/geli/
H A Dgeliboot_crypto.c37 const u_char *key, size_t keysize, u_char *iv) in geliboot_crypt() argument
47 err = rijndael_makeKey(&aeskey, !enc, keysize, in geliboot_crypt()
78 xts_len = keysize << 1; in geliboot_crypt()
105 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument
110 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); in g_eli_crypto_cipher()
115 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument
123 keysize)); in g_eli_crypto_encrypt()
128 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument
136 keysize)); in g_eli_crypto_decrypt()
H A Dgeliboot_internal.h67 const u_char *key, size_t keysize, u_char *iv);
/freebsd/sys/geom/eli/
H A Dg_eli_crypto.c59 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument
74 csp.csp_cipher_klen = keysize / 8; in g_eli_crypto_cipher()
108 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument
122 switch (keysize) { in g_eli_crypto_cipher()
138 switch (keysize) { in g_eli_crypto_cipher()
162 EVP_CIPHER_CTX_set_key_length(ctx, keysize / 8); in g_eli_crypto_cipher()
186 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument
193 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); in g_eli_crypto_encrypt()
198 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument
205 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysize)); in g_eli_crypto_decrypt()
H A Dg_eli_ctl.c58 int keysize, error, nkey, dryrun, dummy; in g_eli_ctl_attach() local
132 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_attach()
133 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_attach()
143 explicit_bzero(key, keysize); in g_eli_ctl_attach()
648 int keysize, nkey, error; in g_eli_ctl_setkey() local
657 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_setkey()
658 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_setkey()
724 explicit_bzero(key, keysize); in g_eli_ctl_setkey()
756 size_t keysize; in g_eli_ctl_delkey() local
796 keysize = sizeof(md.md_mkeys); in g_eli_ctl_delkey()
[all …]
/freebsd/sys/opencrypto/
H A Dxform_sha2.c77 .keysize = SHA2_256_BLOCK_LEN,
89 .keysize = SHA2_384_BLOCK_LEN,
101 .keysize = SHA2_512_BLOCK_LEN,
114 .keysize = SHA2_224_BLOCK_LEN,
126 .keysize = SHA2_256_BLOCK_LEN,
138 .keysize = SHA2_384_BLOCK_LEN,
150 .keysize = SHA2_512_BLOCK_LEN,
H A Dxform_cbc_mac.c9 .keysize = AES_128_CBC_MAC_KEY_LEN,
22 .keysize = AES_192_CBC_MAC_KEY_LEN,
35 .keysize = AES_256_CBC_MAC_KEY_LEN,
H A Dxform_gmac.c69 .keysize = AES_128_GMAC_KEY_LEN,
83 .keysize = AES_192_GMAC_KEY_LEN,
97 .keysize = AES_256_GMAC_KEY_LEN,
H A Dxform_rmd160.c74 .keysize = RIPEMD160_BLOCK_LEN,
H A Dxform_sha1.c74 .keysize = SHA1_BLOCK_LEN,
H A Dxform_auth.h53 uint16_t keysize; member
/freebsd/crypto/openssh/
H A Dxmss_fast.c155 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots()
634 sig_msg += params->wots_par.keysize; in xmss_sign()
635 *sig_msg_len += params->wots_par.keysize; in xmss_sign()
669 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open()
700 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n; in xmss_sign_open()
713 sig_msg += params->wots_par.keysize; in xmss_sign_open()
714 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open()
773 …wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_p… in xmssmt_keypair()
886 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign()
887 *sig_msg_len += params->xmss_par.wots_par.keysize; in xmssmt_sign()
[all …]
H A Dxmss_wots.h29 uint32_t keysize; member
/freebsd/crypto/openssl/apps/
H A Drsautl.c84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local
217 keysize = EVP_PKEY_get_size(pkey); in rsautl_main()
219 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main()
220 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main()
221 rsa_outlen = keysize; in rsautl_main()
224 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
/freebsd/crypto/heimdal/lib/hx509/
H A Dks_keychain.c78 size_t keysize; member
143 sig.Length = kc->keysize; in kc_rsa_private_encrypt()
202 out.Length = kc->keysize; in kc_rsa_private_decrypt()
291 kc->keysize = (size + 7) / 8; in set_private_key()
293 data = malloc(kc->keysize); in set_private_key()
294 memset(data, 0xe0, kc->keysize); in set_private_key()
295 BN_bin2bn(data, kc->keysize, rsa->n); in set_private_key()
/freebsd/sys/contrib/openzfs/module/icp/algs/aes/
H A Daes_impl.c46 uint_t keysize, i, j; in aes_init_keysched() local
69 keysize = CRYPTO_BITS2BYTES(keyBits); in aes_init_keysched()
79 for (i = 0, j = 0; j < keysize; i++, j += 8) { in aes_init_keysched()
84 memcpy(keyarr.ka32, cipherKey, keysize); in aes_init_keysched()
88 for (i = 0, j = 0; j < keysize; i++, j += 4) { in aes_init_keysched()
/freebsd/sys/netinet/netdump/
H A Dnetdump_client.c98 uint32_t keysize);
286 netdump_start(struct dumperinfo *di, void *key, uint32_t keysize) in netdump_start() argument
339 if (keysize > 0) { in netdump_start()
340 if (keysize > sizeof(nd_buf)) { in netdump_start()
341 printf("crypto key is too large (%u)\n", keysize); in netdump_start()
345 memcpy(nd_buf, key, keysize); in netdump_start()
346 error = debugnet_send(pcb, NETDUMP_EKCD_KEY, nd_buf, keysize, in netdump_start()
/freebsd/crypto/heimdal/kadmin/
H A Dcheck.c85 size_t keysize; in do_check_entry() local
88 &keysize); in do_check_entry()
89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { in do_check_entry()
/freebsd/sys/kern/
H A Dkern_shutdown.c1576 uint32_t keysize; in dump_write_headers()
1585 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_write_headers()
1587 keysize = 0; in dump_write_headers()
1610 keysize, keysize); in dump_write_headers()
1618 keysize, di->blocksize); in dump_write_headers()
1659 uint32_t keysize; in dump_start()
1668 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_start()
1669 key = keysize > 0 ? kdc->kdc_dumpkey : NULL; in dump_start()
1672 keysize in dump_start()
1573 uint32_t keysize; dump_write_headers() local
1656 uint32_t keysize; dump_start() local
[all...]
H A Dkern_vnodedumper.c154 vnode_dumper_start(struct dumperinfo *di, void *key, uint32_t keysize) in vnode_dumper_start() argument
160 KASSERT(keysize == 0, ("encryption not supported for livedumps")); in vnode_dumper_start()
/freebsd/crypto/openssl/test/
H A Digetest.c86 const size_t keysize; member
202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
/freebsd/contrib/unbound/sldns/
H A Dkeyraw.c110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument
112 if(keysize < 4) { in sldns_calc_keytag_raw()
118 if (keysize > 4) { in sldns_calc_keytag_raw()
119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw()
126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
H A Dkeyraw.h47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
/freebsd/sys/crypto/blake2/
H A Dblake2-sw.c81 .keysize = BLAKE2B_KEYBYTES,
144 .keysize = BLAKE2S_KEYBYTES,
/freebsd/crypto/heimdal/lib/hdb/
H A Dmkey.c412 size_t keysize; in hdb_unseal_key_mkey() local
439 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize); in hdb_unseal_key_mkey()
444 if (keysize > res.length) { in hdb_unseal_key_mkey()
452 k->key.keyvalue.length = keysize; in hdb_unseal_key_mkey()
/freebsd/contrib/ldns/
H A Ddnssec.c281 size_t keysize; in ldns_calc_keytag() local
300 keysize= ldns_buffer_position(keybuf); in ldns_calc_keytag()
302 ac16 = ldns_calc_keytag_raw(ldns_buffer_begin(keybuf), keysize); in ldns_calc_keytag()
307 uint16_t ldns_calc_keytag_raw(const uint8_t* key, size_t keysize) in ldns_calc_keytag_raw() argument
313 if(keysize < 4) { in ldns_calc_keytag_raw()
319 if (keysize > 4) { in ldns_calc_keytag_raw()
320 memmove(&ac16, key + keysize - 3, 2); in ldns_calc_keytag_raw()
326 for (i = 0; (size_t)i < keysize; ++i) { in ldns_calc_keytag_raw()

123