/netbsd/external/mpl/bind/dist/lib/isc/ |
H A D | ht.c | 35 size_t keysize; member 104 node->keysize); in isc_ht_destroy() 122 REQUIRE(key != NULL && keysize > 0); in isc_ht_add() 127 if (keysize == node->keysize && in isc_ht_add() 137 memmove(node->key, key, keysize); in isc_ht_add() 138 node->keysize = keysize; in isc_ht_add() 160 if (keysize == node->keysize && in isc_ht_find() 186 if (keysize == node->keysize && in isc_ht_delete() 196 node->keysize); in isc_ht_delete() 330 size_t *keysize) { in isc_ht_iter_currentkey() argument [all …]
|
/netbsd/sys/opencrypto/ |
H A D | xform.c | 205 .keysize = 0, 214 .keysize = 16, 223 .keysize = 20, 232 .keysize = 20, 241 .keysize = 16, 250 .keysize = 20, 259 .keysize = 20, 268 .keysize = 0, 277 .keysize = 0, 286 .keysize = 0, [all …]
|
/netbsd/external/mpl/bind/dist/bin/confgen/ |
H A D | keygen.c | 122 generate_key(isc_mem_t *mctx, dns_secalg_t alg, int keysize, in generate_key() argument 135 if (keysize < 1 || keysize > 512) { in generate_key() 137 keysize); in generate_key() 142 if (keysize < 1 || keysize > 1024) { in generate_key() 144 keysize); in generate_key() 154 dst_key_generate(dns_rootname, alg, keysize, 0, 0, DNS_KEYPROTO_ANY, in generate_key()
|
H A D | rndc-confgen.c | 104 int keysize = -1; in main() local 142 keysize = strtol(isc_commandline_argument, &p, 10); in main() 143 if (*p != '\0' || keysize < 0) { in main() 220 if (keysize < 0) { in main() 221 keysize = alg_bits(alg); in main() 228 generate_key(mctx, alg, keysize, &key_txtbuffer); in main()
|
H A D | ddns-confgen.c | 104 int keysize = 256; in main() local 151 keysize = alg_bits(alg); in main() 248 generate_key(mctx, alg, keysize, &key_txtbuffer); in main()
|
/netbsd/external/mpl/bind/dist/lib/isc/include/isc/ |
H A D | ht.h | 64 isc_ht_add(isc_ht_t *ht, const unsigned char *key, uint32_t keysize, 81 isc_ht_find(const isc_ht_t *ht, const unsigned char *key, uint32_t keysize, 95 isc_ht_delete(isc_ht_t *ht, const unsigned char *key, uint32_t keysize); 175 isc_ht_iter_currentkey(isc_ht_iter_t *it, unsigned char **key, size_t *keysize);
|
/netbsd/crypto/external/bsd/openssh/dist/ |
H A D | xmss_fast.c | 153 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots() 632 sig_msg += params->wots_par.keysize; in xmss_sign() 633 *sig_msg_len += params->wots_par.keysize; in xmss_sign() 667 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open() 711 sig_msg += params->wots_par.keysize; in xmss_sign_open() 712 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open() 884 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign() 894 …y(sig_msg, wots_sigs + (i-1)*params->xmss_par.wots_par.keysize, params->xmss_par.wots_par.keysize); in xmssmt_sign() 896 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign() 1038 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign_open() [all …]
|
/netbsd/crypto/external/bsd/openssl/dist/apps/ |
H A D | rsautl.c | 84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local 217 keysize = EVP_PKEY_get_size(pkey); in rsautl_main() 219 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 220 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main() 221 rsa_outlen = keysize; in rsautl_main() 224 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
/netbsd/external/apache2/mDNSResponder/dist/mDNSShared/ |
H A D | dnssd_clientlib.c | 211 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local 214 keysize = (unsigned long)(k - key); in TXTRecordSetValue() 215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue() 216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue() 233 memcpy(p, key, keysize); in TXTRecordSetValue() 234 p += keysize; in TXTRecordSetValue()
|
/netbsd/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | rsautl.c | 76 int rsa_inlen, keyformat = FORMAT_PEM, keysize, ret = 1; in rsautl_main() local 212 keysize = RSA_size(rsa); in rsautl_main() 214 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 215 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main() 218 rsa_inlen = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
H A D | pkeyutl.c | 88 int keysize = -1, pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY; in pkeyutl_main() local 216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main() 272 siglen = bio_to_mem(&sig, keysize * 10, sigbio); in pkeyutl_main() 282 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in); in pkeyutl_main()
|
/netbsd/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | signature.c | 164 unsigned keysize; in rsa_sign() local 183 keysize = (BN_num_bits(pubrsa->n) + 7) / 8; in rsa_sign() 184 if (keysize > sizeof(hashbuf)) { in rsa_sign() 188 if (10 + hashsize > keysize) { in rsa_sign() 198 for (n = 2; n < keysize - hashsize - 1; ++n) { in rsa_sign() 213 if (n != keysize) { in rsa_sign() 327 unsigned keysize; in rsa_verify() local 335 keysize = BN_num_bytes(pubrsa->n); in rsa_verify() 337 if (keysize > sizeof(hashbuf_from_sig)) { in rsa_verify() 351 if (n != keysize) { in rsa_verify() [all …]
|
H A D | symmetric.c | 103 (void) memcpy(crypt->key, key, crypt->keysize); in std_set_key() 143 CAST_set_key(crypt->encrypt_key, (int)crypt->keysize, crypt->key); in cast5_init() 148 CAST_set_key(crypt->decrypt_key, (int)crypt->keysize, crypt->key); in cast5_init() 210 if (crypt->keysize != BLOWFISH_KEY_LENGTH) { in blowfish_init() 218 BF_set_key(crypt->encrypt_key, (int)crypt->keysize, crypt->key); in blowfish_init() 223 BF_set_key(crypt->decrypt_key, (int)crypt->keysize, crypt->key); in blowfish_init() 278 if (crypt->keysize != IDEA_KEY_LENGTH) { in idea_init() 754 return (p == NULL) ? 0 : (unsigned)p->keysize; in pgp_key_size()
|
H A D | create.c | 863 for (i = 0; i < cipherinfo->keysize ; i++) { in create_unencoded_m_buf() 869 m_buf + 1 + cipherinfo->keysize); in create_unencoded_m_buf() 969 unencoded_m_buf = calloc(1, cipherinfo.keysize + 1 + 2); in pgp_create_pk_sesskey() 1030 pgp_random(sesskey->key, cipherinfo.keysize); in pgp_create_pk_sesskey() 1034 cipherinfo.keysize + 1 + 2); in pgp_create_pk_sesskey() 1043 hexdump(stderr, "uuencoded m buf", unencoded_m_buf, cipherinfo.keysize + 1 + 2); in pgp_create_pk_sesskey() 1045 encode_m_buf(unencoded_m_buf, cipherinfo.keysize + 1 + 2, pubkey, encoded_m_buf); in pgp_create_pk_sesskey()
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | ks_keychain.c | 83 size_t keysize; member 148 sig.Length = kc->keysize; in kc_rsa_private_encrypt() 207 out.Length = kc->keysize; in kc_rsa_private_decrypt() 297 kc->keysize = (size + 7) / 8; in set_private_key() 299 data = malloc(kc->keysize); in set_private_key() 300 memset(data, 0xe0, kc->keysize); in set_private_key() 301 BN_bin2bn(data, kc->keysize, rsa->n); in set_private_key()
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | validate.c | 47 size_t keysize; member 233 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize); in test_cipher() 234 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize); in test_cipher()
|
H A D | test_cipher.c | 57 size_t keysize; member 272 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize); in test_cipher() 273 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize); in test_cipher()
|
/netbsd/external/mpl/bind/dist/bin/pkcs11/ |
H A D | pkcs11-keygen.rst | 22 :program:`pkcs11-keygen` [**-a** algorithm] [**-b** keysize] [**-e**] [**-i** id] [**-m** module] [… 28 with the given ``label`` (which must be unique) and with ``keysize`` 41 ``-b keysize`` 42 This option creates the key pair with ``keysize`` bits of prime. For ECC keys, the
|
/netbsd/external/bsd/libbind/dist/dst/ |
H A D | support.c | 100 dst_s_id_calc(const u_char *key, const int keysize) in dst_s_id_calc() argument 104 int size = keysize; in dst_s_id_calc() 106 if (!key || (keysize <= 0)) in dst_s_id_calc()
|
/netbsd/lib/libresolv/ |
H A D | support.c | 103 dst_s_id_calc(const u_char *key, const int keysize) in dst_s_id_calc() argument 107 int size = keysize; in dst_s_id_calc() 109 if (!key || (keysize <= 0)) in dst_s_id_calc()
|
/netbsd/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | check.c | 87 size_t keysize; in do_check_entry() local 90 &keysize); in do_check_entry() 91 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { in do_check_entry()
|
/netbsd/crypto/external/bsd/openssl.old/dist/test/ |
H A D | igetest.c | 81 const size_t keysize; member 197 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 198 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 200 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 201 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
|
/netbsd/crypto/external/bsd/openssl/dist/test/ |
H A D | igetest.c | 86 const size_t keysize; member 202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
|
/netbsd/crypto/external/bsd/openssl.old/dist/include/crypto/ |
H A D | evp.h | 368 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,fl) \ argument 369 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 370 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 371 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
|
/netbsd/external/bsd/unbound/dist/sldns/ |
H A D | keyraw.c | 110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument 112 if(keysize < 4) { in sldns_calc_keytag_raw() 118 if (keysize > 4) { in sldns_calc_keytag_raw() 119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw() 126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
|