/systemd-251/src/basic/ |
D | hmac.c | 14 size_t key_size, in hmac_sha256() argument 25 assert(key_size > 0); in hmac_sha256() 31 if (key_size > HMAC_BLOCK_SIZE) { in hmac_sha256() 33 sha256_process_bytes(key, key_size, &hash); in hmac_sha256() 36 key_size = SHA256_DIGEST_SIZE; in hmac_sha256() 41 memcpy(inner_padding, key, key_size); in hmac_sha256() 42 memcpy(outer_padding, key, key_size); in hmac_sha256()
|
D | hmac.h | 12 void hmac_sha256(const void *key, size_t key_size, const void *input, size_t input_size, uint8_t re…
|
/systemd-251/src/resolve/ |
D | resolved-dns-dnssec.c | 62 for (size_t i = 0; i < dnskey->dnskey.key_size; i++) in dnssec_keytag() 264 if (3 + exponent_size >= dnskey->dnskey.key_size) in dnssec_rsa_verify() 268 modulus_size = dnskey->dnskey.key_size - 3 - exponent_size; in dnssec_rsa_verify() 279 if (1 + exponent_size >= dnskey->dnskey.key_size) in dnssec_rsa_verify() 283 modulus_size = dnskey->dnskey.key_size - 1 - exponent_size; in dnssec_rsa_verify() 300 const void *key, size_t key_size) { in dnssec_ecdsa_verify_raw() argument 327 if (EC_POINT_oct2point(ec_group, p, key, key_size, bctx) <= 0) in dnssec_ecdsa_verify_raw() 386 ge = gcry_mpi_scan(&q, GCRYMPI_FMT_USG, key, key_size, NULL); in dnssec_ecdsa_verify_raw() 457 size_t key_size; in dnssec_ecdsa_verify() local 467 key_size = 32; in dnssec_ecdsa_verify() [all …]
|
D | test-dnssec.c | 80 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST() 122 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST() 214 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST() 307 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST() 402 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST() 516 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST() 607 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST() 730 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
|
D | resolved-dns-trust-anchor.c | 345 rr->dnskey.key_size = l; in dns_trust_anchor_load_positive() 668 if (anchor->dnskey.key_size != revoked_dnskey->dnskey.key_size) in dns_trust_anchor_check_revoked_one() 677 … if (memcmp(anchor->dnskey.key, revoked_dnskey->dnskey.key, anchor->dnskey.key_size) != 0) in dns_trust_anchor_check_revoked_one()
|
D | resolved-dns-rr.c | 977 rr->dnskey.key, rr->dnskey.key_size, in dns_resource_record_to_string() 1410 siphash24_compress_safe(rr->dnskey.key, rr->dnskey.key_size, state); in dns_resource_record_hash_func() 1584 copy->dnskey.key = memdup(rr->dnskey.key, rr->dnskey.key_size); in dns_resource_record_copy() 1587 copy->dnskey.key_size = rr->dnskey.key_size; in dns_resource_record_copy()
|
D | resolved-dns-rr.h | 185 size_t key_size; member
|
D | resolved-dns-packet.c | 1067 r = dns_packet_append_blob(p, rr->dnskey.key, rr->dnskey.key_size, NULL); in dns_packet_append_rr() 1949 &rr->dnskey.key, &rr->dnskey.key_size, in dns_packet_read_rr() 1952 if (rr->dnskey.key_size <= 0) in dns_packet_read_rr()
|
/systemd-251/src/cryptsetup/ |
D | cryptsetup-pkcs11.c | 101 size_t key_size = 0; in find_pkcs11_auto_data() local 156 assert(key_size == 0); in find_pkcs11_auto_data() 157 r = unbase64mem(json_variant_string(w), SIZE_MAX, &key, &key_size); in find_pkcs11_auto_data() 170 *ret_encrypted_key_size = key_size; in find_pkcs11_auto_data()
|
/systemd-251/src/cryptsetup/cryptsetup-tokens/ |
D | luks2-pkcs11.c | 235 size_t key_size; in parse_luks2_pkcs11_data() local 262 r = unbase64mem(json_variant_string(w), SIZE_MAX, &key, &key_size); in parse_luks2_pkcs11_data() 268 *ret_encrypted_key_size = key_size; in parse_luks2_pkcs11_data()
|
/systemd-251/src/home/ |
D | user-record-sign.c | 37 size_t signature_size = 0, key_size = 0; in user_record_sign() local 68 mf = open_memstream_unlocked(&key, &key_size); in user_record_sign()
|
D | homework-fscrypt.c | 75 size_t key_size, in calculate_key_descriptor() argument 82 assert_se(SHA512(key, key_size, hashed) == hashed); in calculate_key_descriptor()
|
D | homework-luks.c | 754 size_t key_size, key_bits; in crypt_device_to_evp_cipher() local 779 key_size = r; in crypt_device_to_evp_cipher() 780 key_bits = key_size * 8; in crypt_device_to_evp_cipher() 793 if (r < 0 || (uint64_t) r != key_size) in crypt_device_to_evp_cipher() 927 int r, encrypted_size_out1 = 0, encrypted_size_out2 = 0, iv_size, key_size; in format_luks_token_text() local 944 key_size = EVP_CIPHER_key_length(cc); in format_luks_token_text() 969 encrypted_size = text_length + 2*key_size - 1; in format_luks_token_text()
|
/systemd-251/src/shared/ |
D | bpf-program.c | 303 int bpf_map_new(enum bpf_map_type type, size_t key_size, size_t value_size, size_t max_entries, uin… in bpf_map_new() argument 308 attr.key_size = key_size; in bpf_map_new()
|
D | bpf-dlopen.h | 16 extern int (*sym_bpf_create_map)(enum bpf_map_type, int key_size, int value_size, int max_entries, …
|
D | bpf-dlopen.c | 17 int (*sym_bpf_create_map)(enum bpf_map_type, int key_size, int value_size, int max_entries, __u32 …
|
D | bpf-program.h | 57 int bpf_map_new(enum bpf_map_type type, size_t key_size, size_t value_size, size_t max_entries, uin…
|
D | creds-util.c | 413 le32_t key_size; member 676 h->key_size = htole32(ksz); in encrypt_credential_and_warn() 826 if (le32toh(h->key_size) != sizeof(md)) in decrypt_credential_and_warn() 909 if (EVP_CIPHER_key_length(cc) != (int) le32toh(h->key_size)) in decrypt_credential_and_warn()
|
/systemd-251/src/shared/linux/ |
D | bpf.h | 1259 __u32 key_size; /* size of key in bytes */ member 5653 __u32 key_size; member
|
D | ethtool.h | 1203 __u32 key_size; member
|