Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 20 of 20) sorted by relevance

/systemd-251/src/basic/
Dhmac.c14 size_t key_size, in hmac_sha256() argument
25 assert(key_size > 0); in hmac_sha256()
31 if (key_size > HMAC_BLOCK_SIZE) { in hmac_sha256()
33 sha256_process_bytes(key, key_size, &hash); in hmac_sha256()
36 key_size = SHA256_DIGEST_SIZE; in hmac_sha256()
41 memcpy(inner_padding, key, key_size); in hmac_sha256()
42 memcpy(outer_padding, key, key_size); in hmac_sha256()
Dhmac.h12 void hmac_sha256(const void *key, size_t key_size, const void *input, size_t input_size, uint8_t re…
/systemd-251/src/resolve/
Dresolved-dns-dnssec.c62 for (size_t i = 0; i < dnskey->dnskey.key_size; i++) in dnssec_keytag()
264 if (3 + exponent_size >= dnskey->dnskey.key_size) in dnssec_rsa_verify()
268 modulus_size = dnskey->dnskey.key_size - 3 - exponent_size; in dnssec_rsa_verify()
279 if (1 + exponent_size >= dnskey->dnskey.key_size) in dnssec_rsa_verify()
283 modulus_size = dnskey->dnskey.key_size - 1 - exponent_size; in dnssec_rsa_verify()
300 const void *key, size_t key_size) { in dnssec_ecdsa_verify_raw() argument
327 if (EC_POINT_oct2point(ec_group, p, key, key_size, bctx) <= 0) in dnssec_ecdsa_verify_raw()
386 ge = gcry_mpi_scan(&q, GCRYMPI_FMT_USG, key, key_size, NULL); in dnssec_ecdsa_verify_raw()
457 size_t key_size; in dnssec_ecdsa_verify() local
467 key_size = 32; in dnssec_ecdsa_verify()
[all …]
Dtest-dnssec.c80 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
122 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
214 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
307 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
402 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
516 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
607 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
730 dnskey->dnskey.key_size = sizeof(dnskey_blob); in TEST()
Dresolved-dns-trust-anchor.c345 rr->dnskey.key_size = l; in dns_trust_anchor_load_positive()
668 if (anchor->dnskey.key_size != revoked_dnskey->dnskey.key_size) in dns_trust_anchor_check_revoked_one()
677 … if (memcmp(anchor->dnskey.key, revoked_dnskey->dnskey.key, anchor->dnskey.key_size) != 0) in dns_trust_anchor_check_revoked_one()
Dresolved-dns-rr.c977 rr->dnskey.key, rr->dnskey.key_size, in dns_resource_record_to_string()
1410 siphash24_compress_safe(rr->dnskey.key, rr->dnskey.key_size, state); in dns_resource_record_hash_func()
1584 copy->dnskey.key = memdup(rr->dnskey.key, rr->dnskey.key_size); in dns_resource_record_copy()
1587 copy->dnskey.key_size = rr->dnskey.key_size; in dns_resource_record_copy()
Dresolved-dns-rr.h185 size_t key_size; member
Dresolved-dns-packet.c1067 r = dns_packet_append_blob(p, rr->dnskey.key, rr->dnskey.key_size, NULL); in dns_packet_append_rr()
1949 &rr->dnskey.key, &rr->dnskey.key_size, in dns_packet_read_rr()
1952 if (rr->dnskey.key_size <= 0) in dns_packet_read_rr()
/systemd-251/src/cryptsetup/
Dcryptsetup-pkcs11.c101 size_t key_size = 0; in find_pkcs11_auto_data() local
156 assert(key_size == 0); in find_pkcs11_auto_data()
157 r = unbase64mem(json_variant_string(w), SIZE_MAX, &key, &key_size); in find_pkcs11_auto_data()
170 *ret_encrypted_key_size = key_size; in find_pkcs11_auto_data()
/systemd-251/src/cryptsetup/cryptsetup-tokens/
Dluks2-pkcs11.c235 size_t key_size; in parse_luks2_pkcs11_data() local
262 r = unbase64mem(json_variant_string(w), SIZE_MAX, &key, &key_size); in parse_luks2_pkcs11_data()
268 *ret_encrypted_key_size = key_size; in parse_luks2_pkcs11_data()
/systemd-251/src/home/
Duser-record-sign.c37 size_t signature_size = 0, key_size = 0; in user_record_sign() local
68 mf = open_memstream_unlocked(&key, &key_size); in user_record_sign()
Dhomework-fscrypt.c75 size_t key_size, in calculate_key_descriptor() argument
82 assert_se(SHA512(key, key_size, hashed) == hashed); in calculate_key_descriptor()
Dhomework-luks.c754 size_t key_size, key_bits; in crypt_device_to_evp_cipher() local
779 key_size = r; in crypt_device_to_evp_cipher()
780 key_bits = key_size * 8; in crypt_device_to_evp_cipher()
793 if (r < 0 || (uint64_t) r != key_size) in crypt_device_to_evp_cipher()
927 int r, encrypted_size_out1 = 0, encrypted_size_out2 = 0, iv_size, key_size; in format_luks_token_text() local
944 key_size = EVP_CIPHER_key_length(cc); in format_luks_token_text()
969 encrypted_size = text_length + 2*key_size - 1; in format_luks_token_text()
/systemd-251/src/shared/
Dbpf-program.c303 int bpf_map_new(enum bpf_map_type type, size_t key_size, size_t value_size, size_t max_entries, uin… in bpf_map_new() argument
308 attr.key_size = key_size; in bpf_map_new()
Dbpf-dlopen.h16 extern int (*sym_bpf_create_map)(enum bpf_map_type, int key_size, int value_size, int max_entries, …
Dbpf-dlopen.c17 int (*sym_bpf_create_map)(enum bpf_map_type, int key_size, int value_size, int max_entries, __u32 …
Dbpf-program.h57 int bpf_map_new(enum bpf_map_type type, size_t key_size, size_t value_size, size_t max_entries, uin…
Dcreds-util.c413 le32_t key_size; member
676 h->key_size = htole32(ksz); in encrypt_credential_and_warn()
826 if (le32toh(h->key_size) != sizeof(md)) in decrypt_credential_and_warn()
909 if (EVP_CIPHER_key_length(cc) != (int) le32toh(h->key_size)) in decrypt_credential_and_warn()
/systemd-251/src/shared/linux/
Dbpf.h1259 __u32 key_size; /* size of key in bytes */ member
5653 __u32 key_size; member
Dethtool.h1203 __u32 key_size; member