/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmsencdata.c | 55 * "keysize" is the key size. 61 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument 89 rv = SecCmsContentInfoSetContentEncAlg(&(encd->contentInfo), algorithm, NULL, keysize); 103 rv = SecCmsContentInfoSetContentEncAlgID(&(encd->contentInfo), pbe_algid, keysize);
|
H A D | smimeutil.c | 534 * looking up the keysize is not going to be sufficient. 539 int keysize; local 543 keysize = 40; 546 keysize = 64; 549 keysize = 128; 552 keysize = 64; 555 keysize = 192; 562 keysize = 0; 565 keysize = -1; 569 return keysize; 579 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmsencdata.c | 55 * "keysize" is the key size. 61 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument 89 rv = SecCmsContentInfoSetContentEncAlg(&(encd->contentInfo), algorithm, NULL, keysize); 103 rv = SecCmsContentInfoSetContentEncAlgID(&(encd->contentInfo), pbe_algid, keysize);
|
H A D | smimeutil.c | 534 * looking up the keysize is not going to be sufficient. 539 int keysize; local 543 keysize = 40; 546 keysize = 64; 549 keysize = 128; 552 keysize = 64; 555 keysize = 192; 562 keysize = 0; 565 keysize = -1; 569 return keysize; 579 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize) argument [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/confgen/ |
H A D | ddns-confgen.c | 98 int keysize = 256; local 117 keysize = alg_bits(alg); 193 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
|
/macosx-10.10/libresolv-57/ |
H A D | dst_support.c | 109 dst_s_id_calc(const u_char *key, const int keysize) argument 113 int size = keysize; 115 if (!key || (keysize <= 0))
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnssd_clientlib.c | 211 unsigned long keysize, keyvalsize; local 214 keysize = (unsigned long)(k - key); 215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); 216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); 233 memcpy(p, key, keysize); 234 p += keysize;
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | smimeutil.c | 534 * looking up the keysize is not going to be sufficient. 539 int keysize; local 543 keysize = 40; 546 keysize = 64; 549 keysize = 128; 552 keysize = 64; 555 keysize = 192; 562 keysize = 0; 565 keysize = -1; 569 return keysize; 579 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize) argument [all...] |
/macosx-10.10/BerkeleyDB-21/db/examples_c/ex_rep/common/ |
H A D | rep_common.c | 39 u_int32_t keysize, datasize; local 55 keysize = key.size > MAXKEYSIZE ? MAXKEYSIZE : key.size; 56 memcpy(keybuf, key.data, keysize); 57 keybuf[keysize] = '\0';
|
/macosx-10.10/CPANInternal-159.1/Crypt-Rijndael-1.10/ |
H A D | rijndael.h | 140 rijndael_setup(RIJNDAEL_context *ctx, size_t keysize, const UINT8 *key);
|
H A D | Rijndael.pm | 9 # keysize() is 32, but 24 and 16 are also possible 42 =item keysize 44 Returns the keysize, which is 32 (bytes). The Rijndael cipher
|
/macosx-10.10/libarchive-30/libarchive/libarchive/ |
H A D | archive_private.h | 112 int keysize, char *key, int valsize, char *val);
|
H A D | archive_util.c | 229 __archive_parse_options(const char *p, const char *fn, int keysize, char *key, argument 267 if (kidx >= keysize -1)
|
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | rsa-cdsa.c | 60 load_key(CSSM_CSP_HANDLE cspHandle, RSA *rsa, int use_public, CSSM_KEY_PTR key, size_t *keysize) argument 140 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8; 171 size_t keysize = 0; local 179 &cssmKey, &keysize); 206 out.Length = keysize;
|
H A D | test_cipher.c | 55 size_t keysize; member in struct:tests 251 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize); 252 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize);
|
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-dsa-cdsa.c | 47 load_key(CSSM_CSP_HANDLE cspHandle, DSA *dsa, int use_public, CSSM_KEY_PTR key, size_t *keysize) 139 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8; 172 size_t keysize; 181 &cssmKey, &keysize); 213 out.Length = keysize;
|
H A D | ossl-rsa-cdsa.c | 74 load_key(CSSM_CSP_HANDLE cspHandle, RSA *rsa, int use_public, CSSM_KEY_PTR key, size_t *keysize) argument 166 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8; 199 size_t keysize; local 208 &cssmKey, &keysize); 240 out.Length = keysize;
|
H A D | ossl-dsa-cc.c | 46 load_key(CSSM_CSP_HANDLE cspHandle, DSA *dsa, int use_public, CSSM_KEY_PTR key, size_t *keysize) 138 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8; 171 size_t keysize; 180 &cssmKey, &keysize); 212 out.Length = keysize;
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecECKey.c | 78 size_t keysize = ccec_x963_import_pub_size(encoded_length); local 79 if(ccec_keysize_is_supported(keysize)) { 80 return ccec_get_cp(keysize); 88 size_t keysize = ccec_x963_import_priv_size(encoded_length); local 89 if(ccec_keysize_is_supported(keysize)) { 90 return ccec_get_cp(keysize); 692 size_t keysize = CFDataGetLength(wrappedKey); local 693 data = CFDataCreateMutableWithScratch(NULL, keysize); 697 res = ccec_rfc6637_unwrap_key(fullkey, &keysize, CFDataGetMutableBytePtr(data), 706 assert(keysize < [all...] |
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/ |
H A D | CommonRSA.c | 124 printf("%d keysize\n", CCRSAGetKeySize(publicKey2)); 129 printf("%d keysize\n", CCRSAGetKeySize(publicKey2)); 141 RSAStdGenTest(size_t keysize, uint32_t exponent) 146 ok((retval = CCRSACryptorGeneratePair(keysize, exponent, &publicKey, &privateKey)) == kCCSuccess, "Generated Key Pairs"); 281 for(size_t keysize = 1024; keysize < 4097; keysize+=keystep) { 282 if(verbose) diag("Generating %lu bit keypair\n", keysize); 283 ok(RSAStdGenTest(keysize, 65537) == 0, "Generate Standard RSA Key Pair");
|
/macosx-10.10/cups-408/cups/cups/ |
H A D | pwg-media.c | 265 size_t keysize, /* I - Size of keyword buffer */ 282 DEBUG_printf(("pwgFormatSize(keyword=%p, keysize=" CUPS_LLFMT 284 "units=\"%s\")", keyword, CUPS_LLCAST keysize, prefix, name, 290 if (!keyword || keysize < 32 || width < 0 || length < 0 || 376 snprintf(keyword, keysize, "%s_%s_%s", prefix, name, usize); 382 void _pwgGenerateSize(char *keyword, size_t keysize, const char *prefix, argument 384 { pwgFormatSizeName(keyword, keysize, prefix, name, width, length, NULL); } 264 pwgFormatSizeName(char *keyword, size_t keysize, const char *prefix, const char *name, int width, int length, const char *units) argument
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/path/ |
H A D | pathkey.c | 54 pathkey_20100601(const char* lang, const char* tool, const char* apath, char* key, size_t keysize, char* attr, size_t attrsize) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | ks_keychain.c | 56 size_t keysize; member in struct:kc_rsa 134 sig.Length = kc->keysize; 191 sig.Length = kc->keysize; 249 out.Length = kc->keysize; 274 size_t sigLen = kc->keysize; 308 size_t sigLen = kc->keysize; 341 kc->keysize); 345 return (int)kc->keysize; 436 kc->keysize = BN_num_bytes(rsa->n);
|
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | cmsenvdata.c | 57 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument 76 rv = SecCmsContentInfoSetContentEncAlg((SecArenaPoolRef)poolp, &(envd->contentInfo), algorithm, NULL, keysize);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cmsenvdata.c | 57 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument 76 rv = SecCmsContentInfoSetContentEncAlg((SecArenaPoolRef)poolp, &(envd->contentInfo), algorithm, NULL, keysize);
|