Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 26) sorted by relevance

12

/openbsd-src/regress/sys/crypto/aes/
H A Daestest.c177 int blocksize, keysize, test; in run_file() local
184 blocksize = keysize = test = -1; in run_file()
201 if (keysize != -1) in run_file()
203 keysize = (int)strtonum(cp, 128, 256, &errstr); in run_file()
207 if (keysize != 128 && keysize != 256) in run_file()
210 lnum, keysize); in run_file()
243 if (keylen * 8 != (u_int)keysize) in run_file()
248 key == NULL || blocksize == -1 || keysize == -1) { in run_file()
/openbsd-src/usr.bin/ssh/
H A Dxmss_fast.c150 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots()
629 sig_msg += params->wots_par.keysize; in xmss_sign()
630 *sig_msg_len += params->wots_par.keysize; in xmss_sign()
664 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open()
695 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n; in xmss_sign_open()
708 sig_msg += params->wots_par.keysize; in xmss_sign_open()
709 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open()
768 …wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_p… in xmssmt_keypair()
881 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign()
882 *sig_msg_len += params->xmss_par.wots_par.keysize; in xmssmt_sign()
[all …]
H A Dxmss_wots.h24 uint32_t keysize; member
H A Dxmss_wots.c41 params->keysize = params->len * params->n; in wots_set_params()
H A Dsshkey-xmss.c236 state->params.wots_par.keysize + in sshkey_xmss_siglen()
/openbsd-src/usr.bin/openssl/
H A Drsautl.c244 int keysize; in rsautl_main() local
327 keysize = RSA_size(rsa); in rsautl_main()
329 rsa_in = reallocarray(NULL, keysize, 2); in rsautl_main()
334 rsa_out = malloc(keysize); in rsautl_main()
341 rsa_inlen = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
H A Dpkeyutl.c78 int keysize; member
276 cfg.keysize = -1; in pkeyutl_main()
326 siglen = bio_to_mem(&sig, cfg.keysize * 10, sigbio); in pkeyutl_main()
335 buf_inlen = bio_to_mem(&buf_in, cfg.keysize * 10, in); in pkeyutl_main()
443 cfg.keysize = EVP_PKEY_size(pkey); in init_ctx()
/openbsd-src/lib/libc/stdlib/
H A Dicdb.c87 uint32_t keysize[8]; /* size of each key */ member
146 info->keysize[i] = keysizes[i]; in icdb_new()
233 hash = SipHash24(&info->siphashkey, key, info->keysize[keynum]); in icdb_lookup()
240 info->keysize[keynum]) == 0) { in icdb_lookup()
335 info->keyoffset[i], info->keysize[i]); in icdb_rehash()
/openbsd-src/usr.sbin/unbound/sldns/
H A Dkeyraw.c110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument
112 if(keysize < 4) { in sldns_calc_keytag_raw()
118 if (keysize > 4) { in sldns_calc_keytag_raw()
119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw()
126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
H A Dkeyraw.h47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
/openbsd-src/sbin/unwind/libunbound/sldns/
H A Dkeyraw.c110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument
112 if(keysize < 4) { in sldns_calc_keytag_raw()
118 if (keysize > 4) { in sldns_calc_keytag_raw()
119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw()
126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
H A Dkeyraw.h47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
/openbsd-src/sys/crypto/
H A Dxform.h45 u_int16_t keysize; member
/openbsd-src/usr.bin/file/magdir/
H A Dmcrypt8 >>&1 leshort >0 keysize: %d bytes,
/openbsd-src/lib/libcrypto/cms/
H A Dcms_sd.c1017 CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **out_algs, int nid, int keysize) in CMS_add_simple_smimecap() argument
1030 if (keysize > 0) { in CMS_add_simple_smimecap()
1033 if (!ASN1_INTEGER_set(parameter, keysize)) in CMS_add_simple_smimecap()
H A Dcms.h282 int keysize);
/openbsd-src/sys/netinet/
H A Dip_ah.c140 if (ii->ii_authkeylen != thash->keysize && thash->keysize != 0) { in ah_init()
142 ii->ii_authkeylen, thash->name, thash->keysize); in ah_init()
H A Dip_esp.c245 if (ii->ii_authkeylen != thash->keysize) { in esp_init()
248 ii->ii_authkeylen, thash->name, thash->keysize); in esp_init()
/openbsd-src/usr.sbin/unbound/validator/
H A Dval_sigcrypt.c400 size_t keysize; in dnskey_size_is_supported() local
405 keysize = sldns_rr_dnskey_key_size_raw(rdata+2+4, len-2-4, alg); in dnskey_size_is_supported()
414 if(keysize <= 1024) in dnskey_size_is_supported()
/openbsd-src/sbin/unwind/libunbound/validator/
H A Dval_sigcrypt.c400 size_t keysize; in dnskey_size_is_supported() local
405 keysize = sldns_rr_dnskey_key_size_raw(rdata+2+4, len-2-4, alg); in dnskey_size_is_supported()
414 if(keysize <= 1024) in dnskey_size_is_supported()
/openbsd-src/lib/libssl/
H A Dssl_local.h321 DH *(*dhe_params_cb)(SSL *ssl, int is_export, int keysize);
/openbsd-src/usr.sbin/unbound/util/
H A Dconfiglexer.lex421 val-nsec3-keysize-iterations{COLON} {
/openbsd-src/sbin/unwind/libunbound/util/
H A Dconfiglexer.lex421 val-nsec3-keysize-iterations{COLON} {
/openbsd-src/usr.sbin/unbound/doc/
H A Dexample.conf.in752 # keysize. Keep this table very short, as linear search is done.
754 # List in ascending order the keysize and count values.
755 # val-nsec3-keysize-iterations: "1024 150 2048 150 4096 150"
/openbsd-src/lib/libssl/doc/
H A Dopenssl.txt1080 signing only key but the keysize is unlimited (well 16K is supposed to work).

12