Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 80) sorted by relevance

1234

/netbsd/external/mpl/bind/dist/lib/isc/
H A Dht.c35 size_t keysize; member
104 node->keysize); in isc_ht_destroy()
122 REQUIRE(key != NULL && keysize > 0); in isc_ht_add()
127 if (keysize == node->keysize && in isc_ht_add()
137 memmove(node->key, key, keysize); in isc_ht_add()
138 node->keysize = keysize; in isc_ht_add()
160 if (keysize == node->keysize && in isc_ht_find()
186 if (keysize == node->keysize && in isc_ht_delete()
196 node->keysize); in isc_ht_delete()
330 size_t *keysize) { in isc_ht_iter_currentkey() argument
[all …]
/netbsd/sys/opencrypto/
H A Dxform.c205 .keysize = 0,
214 .keysize = 16,
223 .keysize = 20,
232 .keysize = 20,
241 .keysize = 16,
250 .keysize = 20,
259 .keysize = 20,
268 .keysize = 0,
277 .keysize = 0,
286 .keysize = 0,
[all …]
/netbsd/external/mpl/bind/dist/bin/confgen/
H A Dkeygen.c122 generate_key(isc_mem_t *mctx, dns_secalg_t alg, int keysize, in generate_key() argument
135 if (keysize < 1 || keysize > 512) { in generate_key()
137 keysize); in generate_key()
142 if (keysize < 1 || keysize > 1024) { in generate_key()
144 keysize); in generate_key()
154 dst_key_generate(dns_rootname, alg, keysize, 0, 0, DNS_KEYPROTO_ANY, in generate_key()
H A Drndc-confgen.c104 int keysize = -1; in main() local
142 keysize = strtol(isc_commandline_argument, &p, 10); in main()
143 if (*p != '\0' || keysize < 0) { in main()
220 if (keysize < 0) { in main()
221 keysize = alg_bits(alg); in main()
228 generate_key(mctx, alg, keysize, &key_txtbuffer); in main()
H A Dddns-confgen.c104 int keysize = 256; in main() local
151 keysize = alg_bits(alg); in main()
248 generate_key(mctx, alg, keysize, &key_txtbuffer); in main()
/netbsd/external/mpl/bind/dist/lib/isc/include/isc/
H A Dht.h64 isc_ht_add(isc_ht_t *ht, const unsigned char *key, uint32_t keysize,
81 isc_ht_find(const isc_ht_t *ht, const unsigned char *key, uint32_t keysize,
95 isc_ht_delete(isc_ht_t *ht, const unsigned char *key, uint32_t keysize);
175 isc_ht_iter_currentkey(isc_ht_iter_t *it, unsigned char **key, size_t *keysize);
/netbsd/crypto/external/bsd/openssh/dist/
H A Dxmss_fast.c153 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots()
632 sig_msg += params->wots_par.keysize; in xmss_sign()
633 *sig_msg_len += params->wots_par.keysize; in xmss_sign()
667 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open()
711 sig_msg += params->wots_par.keysize; in xmss_sign_open()
712 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open()
884 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign()
894 …y(sig_msg, wots_sigs + (i-1)*params->xmss_par.wots_par.keysize, params->xmss_par.wots_par.keysize); in xmssmt_sign()
896 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign()
1038 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign_open()
[all …]
/netbsd/crypto/external/bsd/openssl/dist/apps/
H A Drsautl.c84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local
217 keysize = EVP_PKEY_get_size(pkey); in rsautl_main()
219 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main()
220 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main()
221 rsa_outlen = keysize; in rsautl_main()
224 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
/netbsd/external/apache2/mDNSResponder/dist/mDNSShared/
H A Ddnssd_clientlib.c211 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local
214 keysize = (unsigned long)(k - key); in TXTRecordSetValue()
215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue()
216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue()
233 memcpy(p, key, keysize); in TXTRecordSetValue()
234 p += keysize; in TXTRecordSetValue()
/netbsd/crypto/external/bsd/openssl.old/dist/apps/
H A Drsautl.c76 int rsa_inlen, keyformat = FORMAT_PEM, keysize, ret = 1; in rsautl_main() local
212 keysize = RSA_size(rsa); in rsautl_main()
214 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main()
215 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main()
218 rsa_inlen = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
H A Dpkeyutl.c88 int keysize = -1, pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY; in pkeyutl_main() local
216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main()
272 siglen = bio_to_mem(&sig, keysize * 10, sigbio); in pkeyutl_main()
282 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in); in pkeyutl_main()
/netbsd/crypto/external/bsd/netpgp/dist/src/lib/
H A Dsignature.c164 unsigned keysize; in rsa_sign() local
183 keysize = (BN_num_bits(pubrsa->n) + 7) / 8; in rsa_sign()
184 if (keysize > sizeof(hashbuf)) { in rsa_sign()
188 if (10 + hashsize > keysize) { in rsa_sign()
198 for (n = 2; n < keysize - hashsize - 1; ++n) { in rsa_sign()
213 if (n != keysize) { in rsa_sign()
327 unsigned keysize; in rsa_verify() local
335 keysize = BN_num_bytes(pubrsa->n); in rsa_verify()
337 if (keysize > sizeof(hashbuf_from_sig)) { in rsa_verify()
351 if (n != keysize) { in rsa_verify()
[all …]
H A Dsymmetric.c103 (void) memcpy(crypt->key, key, crypt->keysize); in std_set_key()
143 CAST_set_key(crypt->encrypt_key, (int)crypt->keysize, crypt->key); in cast5_init()
148 CAST_set_key(crypt->decrypt_key, (int)crypt->keysize, crypt->key); in cast5_init()
210 if (crypt->keysize != BLOWFISH_KEY_LENGTH) { in blowfish_init()
218 BF_set_key(crypt->encrypt_key, (int)crypt->keysize, crypt->key); in blowfish_init()
223 BF_set_key(crypt->decrypt_key, (int)crypt->keysize, crypt->key); in blowfish_init()
278 if (crypt->keysize != IDEA_KEY_LENGTH) { in idea_init()
754 return (p == NULL) ? 0 : (unsigned)p->keysize; in pgp_key_size()
H A Dcreate.c863 for (i = 0; i < cipherinfo->keysize ; i++) { in create_unencoded_m_buf()
869 m_buf + 1 + cipherinfo->keysize); in create_unencoded_m_buf()
969 unencoded_m_buf = calloc(1, cipherinfo.keysize + 1 + 2); in pgp_create_pk_sesskey()
1030 pgp_random(sesskey->key, cipherinfo.keysize); in pgp_create_pk_sesskey()
1034 cipherinfo.keysize + 1 + 2); in pgp_create_pk_sesskey()
1043 hexdump(stderr, "uuencoded m buf", unencoded_m_buf, cipherinfo.keysize + 1 + 2); in pgp_create_pk_sesskey()
1045 encode_m_buf(unencoded_m_buf, cipherinfo.keysize + 1 + 2, pubkey, encoded_m_buf); in pgp_create_pk_sesskey()
/netbsd/crypto/external/bsd/heimdal/dist/lib/hx509/
H A Dks_keychain.c83 size_t keysize; member
148 sig.Length = kc->keysize; in kc_rsa_private_encrypt()
207 out.Length = kc->keysize; in kc_rsa_private_decrypt()
297 kc->keysize = (size + 7) / 8; in set_private_key()
299 data = malloc(kc->keysize); in set_private_key()
300 memset(data, 0xe0, kc->keysize); in set_private_key()
301 BN_bin2bn(data, kc->keysize, rsa->n); in set_private_key()
/netbsd/crypto/external/bsd/heimdal/dist/lib/hcrypto/
H A Dvalidate.c47 size_t keysize; member
233 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize); in test_cipher()
234 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize); in test_cipher()
H A Dtest_cipher.c57 size_t keysize; member
272 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize); in test_cipher()
273 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize); in test_cipher()
/netbsd/external/mpl/bind/dist/bin/pkcs11/
H A Dpkcs11-keygen.rst22 :program:`pkcs11-keygen` [**-a** algorithm] [**-b** keysize] [**-e**] [**-i** id] [**-m** module] […
28 with the given ``label`` (which must be unique) and with ``keysize``
41 ``-b keysize``
42 This option creates the key pair with ``keysize`` bits of prime. For ECC keys, the
/netbsd/external/bsd/libbind/dist/dst/
H A Dsupport.c100 dst_s_id_calc(const u_char *key, const int keysize) in dst_s_id_calc() argument
104 int size = keysize; in dst_s_id_calc()
106 if (!key || (keysize <= 0)) in dst_s_id_calc()
/netbsd/lib/libresolv/
H A Dsupport.c103 dst_s_id_calc(const u_char *key, const int keysize) in dst_s_id_calc() argument
107 int size = keysize; in dst_s_id_calc()
109 if (!key || (keysize <= 0)) in dst_s_id_calc()
/netbsd/crypto/external/bsd/heimdal/dist/kadmin/
H A Dcheck.c87 size_t keysize; in do_check_entry() local
90 &keysize); in do_check_entry()
91 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { in do_check_entry()
/netbsd/crypto/external/bsd/openssl.old/dist/test/
H A Digetest.c81 const size_t keysize; member
197 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
198 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
200 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
201 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
/netbsd/crypto/external/bsd/openssl/dist/test/
H A Digetest.c86 const size_t keysize; member
202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors()
206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
/netbsd/crypto/external/bsd/openssl.old/dist/include/crypto/
H A Devp.h368 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,fl) \ argument
369 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
370 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
371 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
/netbsd/external/bsd/unbound/dist/sldns/
H A Dkeyraw.c110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument
112 if(keysize < 4) { in sldns_calc_keytag_raw()
118 if (keysize > 4) { in sldns_calc_keytag_raw()
119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw()
126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()

1234