/freebsd-13-stable/sys/netinet/netdump/ |
H A D | netdump_client.c | 341 void *key, uint32_t keysize) 351 if (error == 0 && keysize > 0) { 352 if (keysize > sizeof(nd_buf)) 354 memcpy(nd_buf, key, keysize); 356 keysize, NULL); 340 netdump_write_headers(struct dumperinfo *di, struct kerneldumpheader *kdh, void *key, uint32_t keysize) argument
|
/freebsd-13-stable/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 412 size_t keysize; local 439 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize); 444 if (keysize > res.length) { 452 k->key.keyvalue.length = keysize;
|
/freebsd-13-stable/contrib/apr-util/include/ |
H A D | apr_crypto.h | 132 int keysize; member in struct:apr_crypto_block_key_type_t
|
/freebsd-13-stable/contrib/sendmail/src/ |
H A D | udb.c | 859 int keysize = strlen(name); local 861 if (keysize > sizeof(keybuf) - 1) 862 keysize = sizeof(keybuf) - 1; 863 memmove(keybuf, name, keysize); 864 keybuf[keysize] = '\0';
|
/freebsd-13-stable/contrib/ldns/ |
H A D | dnssec.c | 275 size_t keysize; local 293 /* the current pos in the buffer is the keysize */ 294 keysize= ldns_buffer_position(keybuf); 296 ac16 = ldns_calc_keytag_raw(ldns_buffer_begin(keybuf), keysize); 301 uint16_t ldns_calc_keytag_raw(const uint8_t* key, size_t keysize) argument 307 if(keysize < 4) { 313 if (keysize > 4) { 314 memmove(&ac16, key + keysize - 3, 2); 320 for (i = 0; (size_t)i < keysize; ++i) {
|
/freebsd-13-stable/sys/crypto/via/ |
H A D | padlock_hash.c | 84 .keysize = SHA1_BLOCK_LEN, 96 .keysize = SHA2_256_BLOCK_LEN,
|
/freebsd-13-stable/contrib/ldns/ldns/ |
H A D | dnssec.h | 125 * \param[in] keysize length of key data. 128 uint16_t ldns_calc_keytag_raw(const uint8_t* key, size_t keysize);
|
/freebsd-13-stable/crypto/openssh/ |
H A D | xmss_wots.c | 46 params->keysize = params->len * params->n;
|
H A D | sshkey-xmss.c | 240 state->params.wots_par.keysize +
|
/freebsd-13-stable/sys/contrib/openzfs/module/os/freebsd/zfs/ |
H A D | crypto_os.c | 452 xauth->name, xauth->keysize); 558 xauth->name, xauth->keysize);
|
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 85 size_t *keysize) 91 *keysize = et->keytype->size; 2549 size_t i, keysize; local 2553 ret = krb5_enctype_keysize(context, enctype, &keysize); 2557 ret = krb5_data_alloc(&res->keyvalue, keysize); 2560 ret = krb5_crypto_prfplus(context, crypto1, pepper1, keysize, &os1); 2563 ret = krb5_crypto_prfplus(context, crypto2, pepper2, keysize, &os2); 2570 for (i = 0; i < keysize; i++) 83 krb5_enctype_keysize(krb5_context context, krb5_enctype type, size_t *keysize) argument
|
/freebsd-13-stable/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 894 int algnid, int keysize) 898 if (keysize > 0) { 900 if (key == NULL || !ASN1_INTEGER_set(key, keysize)) {
|
/freebsd-13-stable/sys/netipsec/ |
H A D | xform_ah.c | 207 if (keylen > thash->keysize && thash->keysize != 0) { 209 "keysize less than %d\n", __func__, 210 keylen, thash->name, thash->keysize));
|
H A D | key.c | 6358 if (ah->keysize == 0) {
|
/freebsd-13-stable/lib/libc/nameser/ |
H A D | ns_print.c | 631 int mode, err, keysize; local 651 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 652 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | cms.h | 244 int algnid, int keysize); variable
|
/freebsd-13-stable/sys/geom/eli/ |
H A D | g_eli.h | 716 const u_char *key, size_t keysize); 718 const u_char *key, size_t keysize);
|
/freebsd-13-stable/contrib/bearssl/test/ |
H A D | test_speed.c | 507 #define SPEED_EAX(Algo, algo, keysize, impl) \ 509 test_speed_eax_ ## algo ## keysize ## _ ## impl(void) \ 511 test_speed_eax_inner("EAX " #Algo "-" #keysize "(" #impl ")", \ 513 , (keysize) >> 3); \
|
/freebsd-13-stable/sys/opencrypto/ |
H A D | cryptodev.c | 629 if (sop->mackeylen > thash->keysize || sop->mackeylen < 0) {
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_local.h | 1890 DH *(*dh_tmp_cb) (SSL *ssl, int is_export, int keysize);
|