Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 62) sorted by relevance

123

/freebsd/stand/libsa/geli/
H A Dgeliboot_crypto.c37 const u_char *key, size_t keysize, u_char *iv) in geliboot_crypt() argument
47 err = rijndael_makeKey(&aeskey, !enc, keysize, in geliboot_crypt()
78 xts_len = keysize << 1; in geliboot_crypt()
105 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument
110 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); in g_eli_crypto_cipher()
115 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument
123 keysize)); in g_eli_crypto_encrypt()
128 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument
136 keysize)); in g_eli_crypto_decrypt()
H A Dgeliboot_internal.h67 const u_char *key, size_t keysize, u_char *iv);
/freebsd/sys/geom/eli/
H A Dg_eli_crypto.c59 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument
74 csp.csp_cipher_klen = keysize / 8; in g_eli_crypto_cipher()
108 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument
122 switch (keysize) { in g_eli_crypto_cipher()
138 switch (keysize) { in g_eli_crypto_cipher()
162 EVP_CIPHER_CTX_set_key_length(ctx, keysize / 8); in g_eli_crypto_cipher()
186 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument
193 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); in g_eli_crypto_encrypt()
198 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument
205 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysize)); in g_eli_crypto_decrypt()
H A Dg_eli_ctl.c58 int keysize, error, nkey, dryrun, dummy; in g_eli_ctl_attach() local
132 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_attach()
133 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_attach()
143 explicit_bzero(key, keysize); in g_eli_ctl_attach()
648 int keysize, nkey, error; in g_eli_ctl_setkey() local
657 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_setkey()
658 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_setkey()
724 explicit_bzero(key, keysize); in g_eli_ctl_setkey()
756 size_t keysize; in g_eli_ctl_delkey() local
796 keysize = sizeof(md.md_mkeys); in g_eli_ctl_delkey()
[all …]
/freebsd/crypto/openssl/fuzz/
H A Dslh-dsa.c61 static EVP_PKEY *slh_dsa_gen_key(const char *name, uint32_t keysize, in slh_dsa_gen_key() argument
107 static const char *select_keytype(uint8_t selector, uint32_t *keysize) in select_keytype() argument
112 *keysize = 0; in select_keytype()
132 *keysize = 16; in select_keytype()
138 *keysize = 24; in select_keytype()
144 *keysize = 32; in select_keytype()
148 *keysize = 0; in select_keytype()
173 uint32_t keysize; in slh_dsa_gen_keys() local
176 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_keys()
177 *out1 = (void *)slh_dsa_gen_key(keytype, keysize, NULL, 0); in slh_dsa_gen_keys()
[all …]
H A Dml-kem.c65 uint16_t keysize; in select_keytype_and_size() local
72 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size()
91 switch (keysize % modulus) { in select_keytype_and_size()
112 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size()
114 *keylen = (size_t)keysize; in select_keytype_and_size()
H A Dml-dsa.c85 uint16_t keysize; in select_keytype_and_size() local
92 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size()
110 switch (keysize % modulus) { in select_keytype_and_size()
131 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size()
133 *keylen = (size_t)keysize; in select_keytype_and_size()
/freebsd/sys/opencrypto/
H A Dxform_sha2.c77 .keysize = SHA2_256_BLOCK_LEN,
89 .keysize = SHA2_384_BLOCK_LEN,
101 .keysize = SHA2_512_BLOCK_LEN,
114 .keysize = SHA2_224_BLOCK_LEN,
126 .keysize = SHA2_256_BLOCK_LEN,
138 .keysize = SHA2_384_BLOCK_LEN,
150 .keysize = SHA2_512_BLOCK_LEN,
H A Dxform_cbc_mac.c9 .keysize = AES_128_CBC_MAC_KEY_LEN,
22 .keysize = AES_192_CBC_MAC_KEY_LEN,
35 .keysize = AES_256_CBC_MAC_KEY_LEN,
H A Dxform_gmac.c69 .keysize = AES_128_GMAC_KEY_LEN,
83 .keysize = AES_192_GMAC_KEY_LEN,
97 .keysize = AES_256_GMAC_KEY_LEN,
/freebsd/crypto/openssl/apps/
H A Drsautl.c100 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local
232 keysize = EVP_PKEY_get_size(pkey); in rsautl_main()
234 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main()
235 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main()
236 rsa_outlen = keysize; in rsautl_main()
239 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
/freebsd/crypto/openssh/
H A Dxmss_fast.c155 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots()
634 sig_msg += params->wots_par.keysize; in xmss_sign()
635 *sig_msg_len += params->wots_par.keysize; in xmss_sign()
669 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open()
700 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n; in xmss_sign_open()
713 sig_msg += params->wots_par.keysize; in xmss_sign_open()
714 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open()
773 …wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_p… in xmssmt_keypair()
886 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign()
887 *sig_msg_len += params->xmss_par.wots_par.keysize; in xmssmt_sign()
[all …]
H A Dxmss_wots.h29 uint32_t keysize; member
/freebsd/crypto/heimdal/lib/hx509/
H A Dks_keychain.c78 size_t keysize; member
143 sig.Length = kc->keysize; in kc_rsa_private_encrypt()
202 out.Length = kc->keysize; in kc_rsa_private_decrypt()
291 kc->keysize = (size + 7) / 8; in set_private_key()
293 data = malloc(kc->keysize); in set_private_key()
294 memset(data, 0xe0, kc->keysize); in set_private_key()
295 BN_bin2bn(data, kc->keysize, rsa->n); in set_private_key()
/freebsd/crypto/openssl/crypto/hashtable/
H A Dhashtable.c522 if (a->keybuf != NULL && b->keybuf != NULL && a->keysize == b->keysize) in match_key()
523 return !memcmp(a->keybuf, b->keybuf, a->keysize); in match_key()
600 nvsize += key->keysize; in alloc_new_value()
613 tmp->value.key.keysize = key->keysize; in alloc_new_value()
614 memcpy(tmp->value.key.keybuf, key->keybuf, key->keysize); in alloc_new_value()
643 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_insert()
672 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_get()
721 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_delete()
/freebsd/sys/contrib/openzfs/module/icp/algs/aes/
H A Daes_impl.c47 uint_t keysize, i, j; in aes_init_keysched() local
70 keysize = CRYPTO_BITS2BYTES(keyBits); in aes_init_keysched()
80 for (i = 0, j = 0; j < keysize; i++, j += 8) { in aes_init_keysched()
85 memcpy(keyarr.ka32, cipherKey, keysize); in aes_init_keysched()
89 for (i = 0, j = 0; j < keysize; i++, j += 4) { in aes_init_keysched()
/freebsd/sys/netinet/netdump/
H A Dnetdump_client.c98 uint32_t keysize);
286 netdump_start(struct dumperinfo *di, void *key, uint32_t keysize) in netdump_start() argument
339 if (keysize > 0) { in netdump_start()
340 if (keysize > sizeof(nd_buf)) { in netdump_start()
341 printf("crypto key is too large (%u)\n", keysize); in netdump_start()
345 memcpy(nd_buf, key, keysize); in netdump_start()
346 error = debugnet_send(pcb, NETDUMP_EKCD_KEY, nd_buf, keysize, in netdump_start()
/freebsd/crypto/heimdal/kadmin/
H A Dcheck.c85 size_t keysize; in do_check_entry() local
88 &keysize); in do_check_entry()
89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { in do_check_entry()
/freebsd/sys/kern/
H A Dkern_shutdown.c1571 uint32_t keysize; in dump_write_headers() local
1580 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_write_headers()
1582 keysize = 0; in dump_write_headers()
1605 keysize, keysize); in dump_write_headers()
1613 keysize, di->blocksize); in dump_write_headers()
1654 uint32_t keysize; in dump_start() local
1663 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_start()
1664 key = keysize > 0 ? kdc->kdc_dumpkey : NULL; in dump_start()
1667 keysize = 0; in dump_start()
1672 error = di->dumper_start(di, key, keysize); in dump_start()
[all …]
H A Dkern_vnodedumper.c154 vnode_dumper_start(struct dumperinfo *di, void *key, uint32_t keysize) in vnode_dumper_start() argument
160 KASSERT(keysize == 0, ("encryption not supported for livedumps")); in vnode_dumper_start()
/freebsd/crypto/openssl/test/
H A Digetest.c86 const size_t keysize; member
202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
/freebsd/contrib/unbound/sldns/
H A Dkeyraw.c110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument
112 if(keysize < 4) { in sldns_calc_keytag_raw()
118 if (keysize > 4) { in sldns_calc_keytag_raw()
119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw()
126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
/freebsd/crypto/openssl/include/internal/
H A Dhashtable.h26 size_t keysize; member
112 (key)->key_header.keysize = (sizeof(*(key)) - sizeof(HT_KEY)); \
119 #define HT_KEY_RESET(key) memset((key)->key_header.keybuf, 0, (key)->key_header.keysize)
/freebsd/contrib/unbound/validator/
H A Dvalidator.c94 fill_nsec3_iter(size_t** keysize, size_t** maxiter, char* s, int c) in fill_nsec3_iter() argument
98 *keysize = (size_t*)calloc((size_t)c, sizeof(size_t)); in fill_nsec3_iter()
100 if(!*keysize || !*maxiter) { in fill_nsec3_iter()
101 free(*keysize); in fill_nsec3_iter()
102 *keysize = NULL; in fill_nsec3_iter()
109 (*keysize)[i] = (size_t)strtol(s, &e, 10); in fill_nsec3_iter()
112 free(*keysize); in fill_nsec3_iter()
113 *keysize = NULL; in fill_nsec3_iter()
122 free(*keysize); in fill_nsec3_iter()
123 *keysize = NULL; in fill_nsec3_iter()
[all …]
/freebsd/sys/crypto/blake2/
H A Dblake2-sw.c81 .keysize = BLAKE2B_KEYBYTES,
144 .keysize = BLAKE2S_KEYBYTES,

123