| /freebsd/stand/libsa/geli/ |
| H A D | geliboot_crypto.c | 37 const u_char *key, size_t keysize, u_char *iv) in geliboot_crypt() argument 47 err = rijndael_makeKey(&aeskey, !enc, keysize, in geliboot_crypt() 78 xts_len = keysize << 1; in geliboot_crypt() 105 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument 110 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); in g_eli_crypto_cipher() 115 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument 123 keysize)); in g_eli_crypto_encrypt() 128 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument 136 keysize)); in g_eli_crypto_decrypt()
|
| H A D | geliboot_internal.h | 67 const u_char *key, size_t keysize, u_char *iv);
|
| /freebsd/sys/geom/eli/ |
| H A D | g_eli_crypto.c | 59 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument 74 csp.csp_cipher_klen = keysize / 8; in g_eli_crypto_cipher() 108 const u_char *key, size_t keysize) in g_eli_crypto_cipher() argument 122 switch (keysize) { in g_eli_crypto_cipher() 138 switch (keysize) { in g_eli_crypto_cipher() 162 EVP_CIPHER_CTX_set_key_length(ctx, keysize / 8); in g_eli_crypto_cipher() 186 const u_char *key, size_t keysize) in g_eli_crypto_encrypt() argument 193 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); in g_eli_crypto_encrypt() 198 const u_char *key, size_t keysize) in g_eli_crypto_decrypt() argument 205 return (g_eli_crypto_cipher(algo, 0, data, datasize, key, keysize)); in g_eli_crypto_decrypt()
|
| H A D | g_eli_ctl.c | 58 int keysize, error, nkey, dryrun, dummy; in g_eli_ctl_attach() local 132 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_attach() 133 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_attach() 143 explicit_bzero(key, keysize); in g_eli_ctl_attach() 648 int keysize, nkey, error; in g_eli_ctl_setkey() local 657 key = gctl_get_param(req, "key", &keysize); in g_eli_ctl_setkey() 658 if (key == NULL || keysize != G_ELI_USERKEYLEN) { in g_eli_ctl_setkey() 724 explicit_bzero(key, keysize); in g_eli_ctl_setkey() 756 size_t keysize; in g_eli_ctl_delkey() local 796 keysize = sizeof(md.md_mkeys); in g_eli_ctl_delkey() [all …]
|
| /freebsd/crypto/openssl/fuzz/ |
| H A D | slh-dsa.c | 61 static EVP_PKEY *slh_dsa_gen_key(const char *name, uint32_t keysize, in slh_dsa_gen_key() argument 107 static const char *select_keytype(uint8_t selector, uint32_t *keysize) in select_keytype() argument 112 *keysize = 0; in select_keytype() 132 *keysize = 16; in select_keytype() 138 *keysize = 24; in select_keytype() 144 *keysize = 32; in select_keytype() 148 *keysize = 0; in select_keytype() 173 uint32_t keysize; in slh_dsa_gen_keys() local 176 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_keys() 177 *out1 = (void *)slh_dsa_gen_key(keytype, keysize, NULL, 0); in slh_dsa_gen_keys() [all …]
|
| H A D | ml-kem.c | 65 uint16_t keysize; in select_keytype_and_size() local 72 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size() 91 switch (keysize % modulus) { in select_keytype_and_size() 112 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size() 114 *keylen = (size_t)keysize; in select_keytype_and_size()
|
| H A D | ml-dsa.c | 85 uint16_t keysize; in select_keytype_and_size() local 92 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size() 110 switch (keysize % modulus) { in select_keytype_and_size() 131 *buf = (uint8_t *)OPENSSL_load_u16_le(&keysize, *buf); in select_keytype_and_size() 133 *keylen = (size_t)keysize; in select_keytype_and_size()
|
| /freebsd/sys/opencrypto/ |
| H A D | xform_sha2.c | 77 .keysize = SHA2_256_BLOCK_LEN, 89 .keysize = SHA2_384_BLOCK_LEN, 101 .keysize = SHA2_512_BLOCK_LEN, 114 .keysize = SHA2_224_BLOCK_LEN, 126 .keysize = SHA2_256_BLOCK_LEN, 138 .keysize = SHA2_384_BLOCK_LEN, 150 .keysize = SHA2_512_BLOCK_LEN,
|
| H A D | xform_cbc_mac.c | 9 .keysize = AES_128_CBC_MAC_KEY_LEN, 22 .keysize = AES_192_CBC_MAC_KEY_LEN, 35 .keysize = AES_256_CBC_MAC_KEY_LEN,
|
| H A D | xform_gmac.c | 69 .keysize = AES_128_GMAC_KEY_LEN, 83 .keysize = AES_192_GMAC_KEY_LEN, 97 .keysize = AES_256_GMAC_KEY_LEN,
|
| /freebsd/crypto/openssl/apps/ |
| H A D | rsautl.c | 100 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local 232 keysize = EVP_PKEY_get_size(pkey); in rsautl_main() 234 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 235 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main() 236 rsa_outlen = keysize; in rsautl_main() 239 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
| /freebsd/crypto/openssh/ |
| H A D | xmss_fast.c | 155 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots() 634 sig_msg += params->wots_par.keysize; in xmss_sign() 635 *sig_msg_len += params->wots_par.keysize; in xmss_sign() 669 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open() 700 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n; in xmss_sign_open() 713 sig_msg += params->wots_par.keysize; in xmss_sign_open() 714 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open() 773 …wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_p… in xmssmt_keypair() 886 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign() 887 *sig_msg_len += params->xmss_par.wots_par.keysize; in xmssmt_sign() [all …]
|
| H A D | xmss_wots.h | 29 uint32_t keysize; member
|
| /freebsd/crypto/heimdal/lib/hx509/ |
| H A D | ks_keychain.c | 78 size_t keysize; member 143 sig.Length = kc->keysize; in kc_rsa_private_encrypt() 202 out.Length = kc->keysize; in kc_rsa_private_decrypt() 291 kc->keysize = (size + 7) / 8; in set_private_key() 293 data = malloc(kc->keysize); in set_private_key() 294 memset(data, 0xe0, kc->keysize); in set_private_key() 295 BN_bin2bn(data, kc->keysize, rsa->n); in set_private_key()
|
| /freebsd/crypto/openssl/crypto/hashtable/ |
| H A D | hashtable.c | 522 if (a->keybuf != NULL && b->keybuf != NULL && a->keysize == b->keysize) in match_key() 523 return !memcmp(a->keybuf, b->keybuf, a->keysize); in match_key() 600 nvsize += key->keysize; in alloc_new_value() 613 tmp->value.key.keysize = key->keysize; in alloc_new_value() 614 memcpy(tmp->value.key.keybuf, key->keybuf, key->keysize); in alloc_new_value() 643 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_insert() 672 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_get() 721 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_delete()
|
| /freebsd/sys/contrib/openzfs/module/icp/algs/aes/ |
| H A D | aes_impl.c | 47 uint_t keysize, i, j; in aes_init_keysched() local 70 keysize = CRYPTO_BITS2BYTES(keyBits); in aes_init_keysched() 80 for (i = 0, j = 0; j < keysize; i++, j += 8) { in aes_init_keysched() 85 memcpy(keyarr.ka32, cipherKey, keysize); in aes_init_keysched() 89 for (i = 0, j = 0; j < keysize; i++, j += 4) { in aes_init_keysched()
|
| /freebsd/sys/netinet/netdump/ |
| H A D | netdump_client.c | 98 uint32_t keysize); 286 netdump_start(struct dumperinfo *di, void *key, uint32_t keysize) in netdump_start() argument 339 if (keysize > 0) { in netdump_start() 340 if (keysize > sizeof(nd_buf)) { in netdump_start() 341 printf("crypto key is too large (%u)\n", keysize); in netdump_start() 345 memcpy(nd_buf, key, keysize); in netdump_start() 346 error = debugnet_send(pcb, NETDUMP_EKCD_KEY, nd_buf, keysize, in netdump_start()
|
| /freebsd/crypto/heimdal/kadmin/ |
| H A D | check.c | 85 size_t keysize; in do_check_entry() local 88 &keysize); in do_check_entry() 89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { in do_check_entry()
|
| /freebsd/sys/kern/ |
| H A D | kern_shutdown.c | 1571 uint32_t keysize; in dump_write_headers() local 1580 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_write_headers() 1582 keysize = 0; in dump_write_headers() 1605 keysize, keysize); in dump_write_headers() 1613 keysize, di->blocksize); in dump_write_headers() 1654 uint32_t keysize; in dump_start() local 1663 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_start() 1664 key = keysize > 0 ? kdc->kdc_dumpkey : NULL; in dump_start() 1667 keysize = 0; in dump_start() 1672 error = di->dumper_start(di, key, keysize); in dump_start() [all …]
|
| H A D | kern_vnodedumper.c | 154 vnode_dumper_start(struct dumperinfo *di, void *key, uint32_t keysize) in vnode_dumper_start() argument 160 KASSERT(keysize == 0, ("encryption not supported for livedumps")); in vnode_dumper_start()
|
| /freebsd/crypto/openssl/test/ |
| H A D | igetest.c | 86 const size_t keysize; member 202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
|
| /freebsd/contrib/unbound/sldns/ |
| H A D | keyraw.c | 110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument 112 if(keysize < 4) { in sldns_calc_keytag_raw() 118 if (keysize > 4) { in sldns_calc_keytag_raw() 119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw() 126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | hashtable.h | 26 size_t keysize; member 112 (key)->key_header.keysize = (sizeof(*(key)) - sizeof(HT_KEY)); \ 119 #define HT_KEY_RESET(key) memset((key)->key_header.keybuf, 0, (key)->key_header.keysize)
|
| /freebsd/contrib/unbound/validator/ |
| H A D | validator.c | 94 fill_nsec3_iter(size_t** keysize, size_t** maxiter, char* s, int c) in fill_nsec3_iter() argument 98 *keysize = (size_t*)calloc((size_t)c, sizeof(size_t)); in fill_nsec3_iter() 100 if(!*keysize || !*maxiter) { in fill_nsec3_iter() 101 free(*keysize); in fill_nsec3_iter() 102 *keysize = NULL; in fill_nsec3_iter() 109 (*keysize)[i] = (size_t)strtol(s, &e, 10); in fill_nsec3_iter() 112 free(*keysize); in fill_nsec3_iter() 113 *keysize = NULL; in fill_nsec3_iter() 122 free(*keysize); in fill_nsec3_iter() 123 *keysize = NULL; in fill_nsec3_iter() [all …]
|
| /freebsd/sys/crypto/blake2/ |
| H A D | blake2-sw.c | 81 .keysize = BLAKE2B_KEYBYTES, 144 .keysize = BLAKE2S_KEYBYTES,
|