| /openbsd-src/regress/sys/crypto/aes/ |
| H A D | aestest.c | 177 int blocksize, keysize, test; in run_file() local 184 blocksize = keysize = test = -1; in run_file() 201 if (keysize != -1) in run_file() 203 keysize = (int)strtonum(cp, 128, 256, &errstr); in run_file() 207 if (keysize != 128 && keysize != 256) in run_file() 210 lnum, keysize); in run_file() 243 if (keylen * 8 != (u_int)keysize) in run_file() 248 key == NULL || blocksize == -1 || keysize == -1) { in run_file()
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | xmss_fast.c | 150 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots() 629 sig_msg += params->wots_par.keysize; in xmss_sign() 630 *sig_msg_len += params->wots_par.keysize; in xmss_sign() 664 unsigned char wots_pk[params->wots_par.keysize]; in xmss_sign_open() 695 unsigned long long tmp_sig_len = params->wots_par.keysize+params->h*n; in xmss_sign_open() 708 sig_msg += params->wots_par.keysize; in xmss_sign_open() 709 sig_msg_len -= params->wots_par.keysize; in xmss_sign_open() 768 …wots_sign(wots_sigs + i*params->xmss_par.wots_par.keysize, pk, ots_seed, &(params->xmss_par.wots_p… in xmssmt_keypair() 881 sig_msg += params->xmss_par.wots_par.keysize; in xmssmt_sign() 882 *sig_msg_len += params->xmss_par.wots_par.keysize; in xmssmt_sign() [all …]
|
| H A D | xmss_wots.h | 24 uint32_t keysize; member
|
| H A D | xmss_wots.c | 41 params->keysize = params->len * params->n; in wots_set_params()
|
| H A D | sshkey-xmss.c | 236 state->params.wots_par.keysize + in sshkey_xmss_siglen()
|
| /openbsd-src/usr.bin/openssl/ |
| H A D | rsautl.c | 244 int keysize; in rsautl_main() local 327 keysize = RSA_size(rsa); in rsautl_main() 329 rsa_in = reallocarray(NULL, keysize, 2); in rsautl_main() 334 rsa_out = malloc(keysize); in rsautl_main() 341 rsa_inlen = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
| H A D | pkeyutl.c | 78 int keysize; member 276 cfg.keysize = -1; in pkeyutl_main() 326 siglen = bio_to_mem(&sig, cfg.keysize * 10, sigbio); in pkeyutl_main() 335 buf_inlen = bio_to_mem(&buf_in, cfg.keysize * 10, in); in pkeyutl_main() 443 cfg.keysize = EVP_PKEY_size(pkey); in init_ctx()
|
| /openbsd-src/lib/libc/stdlib/ |
| H A D | icdb.c | 87 uint32_t keysize[8]; /* size of each key */ member 146 info->keysize[i] = keysizes[i]; in icdb_new() 233 hash = SipHash24(&info->siphashkey, key, info->keysize[keynum]); in icdb_lookup() 240 info->keysize[keynum]) == 0) { in icdb_lookup() 335 info->keyoffset[i], info->keysize[i]); in icdb_rehash()
|
| /openbsd-src/usr.sbin/unbound/sldns/ |
| H A D | keyraw.c | 110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument 112 if(keysize < 4) { in sldns_calc_keytag_raw() 118 if (keysize > 4) { in sldns_calc_keytag_raw() 119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw() 126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
|
| H A D | keyraw.h | 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
|
| /openbsd-src/sbin/unwind/libunbound/sldns/ |
| H A D | keyraw.c | 110 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize) in sldns_calc_keytag_raw() argument 112 if(keysize < 4) { in sldns_calc_keytag_raw() 118 if (keysize > 4) { in sldns_calc_keytag_raw() 119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw() 126 for (i = 0; i < keysize; ++i) { in sldns_calc_keytag_raw()
|
| H A D | keyraw.h | 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize);
|
| /openbsd-src/sys/crypto/ |
| H A D | xform.h | 45 u_int16_t keysize; member
|
| /openbsd-src/usr.bin/file/magdir/ |
| H A D | mcrypt | 8 >>&1 leshort >0 keysize: %d bytes,
|
| /openbsd-src/lib/libcrypto/cms/ |
| H A D | cms_sd.c | 1017 CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **out_algs, int nid, int keysize) in CMS_add_simple_smimecap() argument 1030 if (keysize > 0) { in CMS_add_simple_smimecap() 1033 if (!ASN1_INTEGER_set(parameter, keysize)) in CMS_add_simple_smimecap()
|
| H A D | cms.h | 282 int keysize);
|
| /openbsd-src/sys/netinet/ |
| H A D | ip_ah.c | 140 if (ii->ii_authkeylen != thash->keysize && thash->keysize != 0) { in ah_init() 142 ii->ii_authkeylen, thash->name, thash->keysize); in ah_init()
|
| H A D | ip_esp.c | 245 if (ii->ii_authkeylen != thash->keysize) { in esp_init() 248 ii->ii_authkeylen, thash->name, thash->keysize); in esp_init()
|
| /openbsd-src/usr.sbin/unbound/validator/ |
| H A D | val_sigcrypt.c | 400 size_t keysize; in dnskey_size_is_supported() local 405 keysize = sldns_rr_dnskey_key_size_raw(rdata+2+4, len-2-4, alg); in dnskey_size_is_supported() 414 if(keysize <= 1024) in dnskey_size_is_supported()
|
| /openbsd-src/sbin/unwind/libunbound/validator/ |
| H A D | val_sigcrypt.c | 400 size_t keysize; in dnskey_size_is_supported() local 405 keysize = sldns_rr_dnskey_key_size_raw(rdata+2+4, len-2-4, alg); in dnskey_size_is_supported() 414 if(keysize <= 1024) in dnskey_size_is_supported()
|
| /openbsd-src/lib/libssl/ |
| H A D | ssl_local.h | 321 DH *(*dhe_params_cb)(SSL *ssl, int is_export, int keysize);
|
| /openbsd-src/usr.sbin/unbound/util/ |
| H A D | configlexer.lex | 421 val-nsec3-keysize-iterations{COLON} {
|
| /openbsd-src/sbin/unwind/libunbound/util/ |
| H A D | configlexer.lex | 421 val-nsec3-keysize-iterations{COLON} {
|
| /openbsd-src/usr.sbin/unbound/doc/ |
| H A D | example.conf.in | 752 # keysize. Keep this table very short, as linear search is done. 754 # List in ascending order the keysize and count values. 755 # val-nsec3-keysize-iterations: "1024 150 2048 150 4096 150"
|
| /openbsd-src/lib/libssl/doc/ |
| H A D | openssl.txt | 1080 signing only key but the keysize is unlimited (well 16K is supposed to work).
|