Searched refs:keysize (Results 51 - 75 of 103) sorted by relevance

12345

/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/
H A Dcmsencdata.c55 * "keysize" is the key size.
61 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument
89 rv = SecCmsContentInfoSetContentEncAlg(&(encd->contentInfo), algorithm, NULL, keysize);
103 rv = SecCmsContentInfoSetContentEncAlgID(&(encd->contentInfo), pbe_algid, keysize);
H A Dsmimeutil.c534 * looking up the keysize is not going to be sufficient.
539 int keysize; local
543 keysize = 40;
546 keysize = 64;
549 keysize = 128;
552 keysize = 64;
555 keysize = 192;
562 keysize = 0;
565 keysize = -1;
569 return keysize;
579 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize) argument
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcmsencdata.c55 * "keysize" is the key size.
61 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument
89 rv = SecCmsContentInfoSetContentEncAlg(&(encd->contentInfo), algorithm, NULL, keysize);
103 rv = SecCmsContentInfoSetContentEncAlgID(&(encd->contentInfo), pbe_algid, keysize);
H A Dsmimeutil.c534 * looking up the keysize is not going to be sufficient.
539 int keysize; local
543 keysize = 40;
546 keysize = 64;
549 keysize = 128;
552 keysize = 64;
555 keysize = 192;
562 keysize = 0;
565 keysize = -1;
569 return keysize;
579 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize) argument
[all...]
/macosx-10.10/bind9-45.101/bind9/bin/confgen/
H A Dddns-confgen.c98 int keysize = 256; local
117 keysize = alg_bits(alg);
193 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
/macosx-10.10/libresolv-57/
H A Ddst_support.c109 dst_s_id_calc(const u_char *key, const int keysize) argument
113 int size = keysize;
115 if (!key || (keysize <= 0))
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/
H A Ddnssd_clientlib.c211 unsigned long keysize, keyvalsize; local
214 keysize = (unsigned long)(k - key);
215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0);
216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid);
233 memcpy(p, key, keysize);
234 p += keysize;
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/
H A Dsmimeutil.c534 * looking up the keysize is not going to be sufficient.
539 int keysize; local
543 keysize = 40;
546 keysize = 64;
549 keysize = 128;
552 keysize = 64;
555 keysize = 192;
562 keysize = 0;
565 keysize = -1;
569 return keysize;
579 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize) argument
[all...]
/macosx-10.10/BerkeleyDB-21/db/examples_c/ex_rep/common/
H A Drep_common.c39 u_int32_t keysize, datasize; local
55 keysize = key.size > MAXKEYSIZE ? MAXKEYSIZE : key.size;
56 memcpy(keybuf, key.data, keysize);
57 keybuf[keysize] = '\0';
/macosx-10.10/CPANInternal-159.1/Crypt-Rijndael-1.10/
H A Drijndael.h140 rijndael_setup(RIJNDAEL_context *ctx, size_t keysize, const UINT8 *key);
H A DRijndael.pm9 # keysize() is 32, but 24 and 16 are also possible
42 =item keysize
44 Returns the keysize, which is 32 (bytes). The Rijndael cipher
/macosx-10.10/libarchive-30/libarchive/libarchive/
H A Darchive_private.h112 int keysize, char *key, int valsize, char *val);
H A Darchive_util.c229 __archive_parse_options(const char *p, const char *fn, int keysize, char *key, argument
267 if (kidx >= keysize -1)
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/
H A Drsa-cdsa.c60 load_key(CSSM_CSP_HANDLE cspHandle, RSA *rsa, int use_public, CSSM_KEY_PTR key, size_t *keysize) argument
140 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8;
171 size_t keysize = 0; local
179 &cssmKey, &keysize);
206 out.Length = keysize;
H A Dtest_cipher.c55 size_t keysize; member in struct:tests
251 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize);
252 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize);
/macosx-10.10/OpenSSH-189/osslshim/ossl/
H A Dossl-dsa-cdsa.c47 load_key(CSSM_CSP_HANDLE cspHandle, DSA *dsa, int use_public, CSSM_KEY_PTR key, size_t *keysize)
139 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8;
172 size_t keysize;
181 &cssmKey, &keysize);
213 out.Length = keysize;
H A Dossl-rsa-cdsa.c74 load_key(CSSM_CSP_HANDLE cspHandle, RSA *rsa, int use_public, CSSM_KEY_PTR key, size_t *keysize) argument
166 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8;
199 size_t keysize; local
208 &cssmKey, &keysize);
240 out.Length = keysize;
H A Dossl-dsa-cc.c46 load_key(CSSM_CSP_HANDLE cspHandle, DSA *dsa, int use_public, CSSM_KEY_PTR key, size_t *keysize)
138 *keysize = (keySize.LogicalKeySizeInBits + 7) / 8;
171 size_t keysize;
180 &cssmKey, &keysize);
212 out.Length = keysize;
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecECKey.c78 size_t keysize = ccec_x963_import_pub_size(encoded_length); local
79 if(ccec_keysize_is_supported(keysize)) {
80 return ccec_get_cp(keysize);
88 size_t keysize = ccec_x963_import_priv_size(encoded_length); local
89 if(ccec_keysize_is_supported(keysize)) {
90 return ccec_get_cp(keysize);
692 size_t keysize = CFDataGetLength(wrappedKey); local
693 data = CFDataCreateMutableWithScratch(NULL, keysize);
697 res = ccec_rfc6637_unwrap_key(fullkey, &keysize, CFDataGetMutableBytePtr(data),
706 assert(keysize <
[all...]
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/
H A DCommonRSA.c124 printf("%d keysize\n", CCRSAGetKeySize(publicKey2));
129 printf("%d keysize\n", CCRSAGetKeySize(publicKey2));
141 RSAStdGenTest(size_t keysize, uint32_t exponent)
146 ok((retval = CCRSACryptorGeneratePair(keysize, exponent, &publicKey, &privateKey)) == kCCSuccess, "Generated Key Pairs");
281 for(size_t keysize = 1024; keysize < 4097; keysize+=keystep) {
282 if(verbose) diag("Generating %lu bit keypair\n", keysize);
283 ok(RSAStdGenTest(keysize, 65537) == 0, "Generate Standard RSA Key Pair");
/macosx-10.10/cups-408/cups/cups/
H A Dpwg-media.c265 size_t keysize, /* I - Size of keyword buffer */
282 DEBUG_printf(("pwgFormatSize(keyword=%p, keysize=" CUPS_LLFMT
284 "units=\"%s\")", keyword, CUPS_LLCAST keysize, prefix, name,
290 if (!keyword || keysize < 32 || width < 0 || length < 0 ||
376 snprintf(keyword, keysize, "%s_%s_%s", prefix, name, usize);
382 void _pwgGenerateSize(char *keyword, size_t keysize, const char *prefix, argument
384 { pwgFormatSizeName(keyword, keysize, prefix, name, width, length, NULL); }
264 pwgFormatSizeName(char *keyword, size_t keysize, const char *prefix, const char *name, int width, int length, const char *units) argument
/macosx-10.10/ksh-23/ksh/src/lib/libast/path/
H A Dpathkey.c54 pathkey_20100601(const char* lang, const char* tool, const char* apath, char* key, size_t keysize, char* attr, size_t attrsize) argument
/macosx-10.10/Heimdal-398.1.2/lib/hx509/
H A Dks_keychain.c56 size_t keysize; member in struct:kc_rsa
134 sig.Length = kc->keysize;
191 sig.Length = kc->keysize;
249 out.Length = kc->keysize;
274 size_t sigLen = kc->keysize;
308 size_t sigLen = kc->keysize;
341 kc->keysize);
345 return (int)kc->keysize;
436 kc->keysize = BN_num_bytes(rsa->n);
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/
H A Dcmsenvdata.c57 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument
76 rv = SecCmsContentInfoSetContentEncAlg((SecArenaPoolRef)poolp, &(envd->contentInfo), algorithm, NULL, keysize);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/
H A Dcmsenvdata.c57 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument
76 rv = SecCmsContentInfoSetContentEncAlg((SecArenaPoolRef)poolp, &(envd->contentInfo), algorithm, NULL, keysize);

Completed in 159 milliseconds

12345