/macosx-10.10.1/ruby-106/ruby/ext/openssl/ |
H A D | ossl_cipher.c | 668 ossl_cipher_set_key_length(VALUE self, VALUE key_length) argument 670 int len = NUM2INT(key_length); 677 return key_length; 721 CIPHER_0ARG_INT(key_length)
|
/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | hash.c | 299 size_t Curl_hash_str(void* key, size_t key_length, size_t slots_num) argument 302 const char *end = key_str + key_length;
|
H A D | multi.c | 227 static size_t hash_fd(void *key, size_t key_length, size_t slots_num) argument 230 (void) key_length;
|
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/ |
H A D | eapmschapv2_plugin.c | 1295 eapmschapv2_session_key(EAPClientPluginDataRef plugin, int * key_length) argument 1300 *key_length = 0; 1304 *key_length = sizeof(context->session_key); 1309 eapmschapv2_server_key(EAPClientPluginDataRef plugin, int * key_length) argument 1314 *key_length = 0; 1318 *key_length = sizeof(context->session_key);
|
H A D | eapttls_plugin.c | 1416 eapttls_session_key(EAPClientPluginDataRef plugin, int * key_length) argument 1420 *key_length = 0; 1426 *key_length = 32; 1431 eapttls_server_key(EAPClientPluginDataRef plugin, int * key_length) argument 1435 *key_length = 0; 1441 *key_length = 32;
|
H A D | peap_plugin.c | 1434 peap_session_key(EAPClientPluginDataRef plugin, int * key_length) argument 1438 *key_length = 0; 1444 *key_length = 32; 1449 peap_server_key(EAPClientPluginDataRef plugin, int * key_length) argument 1453 *key_length = 0; 1459 *key_length = 32;
|
H A D | mschap.c | 326 const void * key, uint32_t key_length, 334 key, key_length, NULL, 325 rc4_encrypt(const void * clear, uint32_t clear_length, const void * key, uint32_t key_length, void * cypher) argument
|
H A D | eapfast_plugin.c | 1211 T_PRF(const void * key, int key_length, argument 1266 key, key_length, data, (offset - data), t_buf); 1451 eap_client_session_key(EAPFASTPluginDataRef context, int * key_length) argument 1455 key_length)); 3445 eapfast_session_key(EAPClientPluginDataRef plugin, int * key_length) argument 3449 *key_length = 0; 3453 *key_length = MASTER_KEY_LENGTH / 2; 3458 eapfast_server_key(EAPClientPluginDataRef plugin, int * key_length) argument 3462 *key_length = 0; 3466 *key_length [all...] |
H A D | eapaka_plugin.c | 1438 eapaka_session_key(EAPClientPluginDataRef plugin, int * key_length) argument 1444 *key_length = 32; 1451 eapaka_server_key(EAPClientPluginDataRef plugin, int * key_length) argument 1457 *key_length = 32;
|
H A D | eapsim_plugin.c | 1694 eapsim_session_key(EAPClientPluginDataRef plugin, int * key_length) argument 1700 *key_length = 32; 1707 eapsim_server_key(EAPClientPluginDataRef plugin, int * key_length) argument 1713 *key_length = 32;
|
H A D | EAPTLSUtil.c | 603 void * key, int key_length) 652 key, key_length); 601 EAPTLSComputeKeyData(SSLContextRef ssl_context, const void * label, int label_length, void * key, int key_length) argument
|
/macosx-10.10.1/ntfs-84/kext/ |
H A D | ntfs_dir.c | 191 (u8*)ie + le16_to_cpu(ie->key_length) > 449 (u8*)ie + le16_to_cpu(ie->key_length) > 1447 size = le16_to_cpu(ictx->entry->key_length); 1598 (u8*)ie + le16_to_cpu(ie->key_length) > index_end) 1761 (u8*)ie + le16_to_cpu(ie->key_length) > index_end)
|
H A D | ntfs_layout.h | 2240 /* 10*/ le16 key_length; /* Byte size of the key value, which is in the member in struct:__anon11136 2273 le16 key_length; /* Byte size of the key value, which is in the member in struct:__anon11139 2306 // the key_length is zero, then the vcn immediately 2308 // key_length, the address of the 8-byte boundary
|
H A D | ntfs_index.c | 387 le16_to_cpu(ie->key_length) > 399 le16_to_cpu(ie->key_length) > 869 ie_match_key_len = le16_to_cpu(ie->key_length); 891 key_len, &ie->key, le16_to_cpu(ie->key_length)); 2472 le16_to_cpu(end_ie->key_length) > 4062 entry->key_length = cpu_to_le16(key_len);
|
/macosx-10.10.1/ruby-106/ruby/ |
H A D | random.c | 24 or init_by_array(mt, init_key, key_length). 132 /* key_length is its length */ 135 init_by_array(struct MT *mt, unsigned int init_key[], int key_length) argument 140 k = (N>key_length ? N : key_length); 147 if (j>=key_length) j=0;
|
/macosx-10.10.1/eap8021x-198/eapolclient.tproj/ |
H A D | Supplicant.c | 537 eap_client_session_key(SupplicantRef supp, int * key_length) argument 541 key_length)); 545 eap_client_server_key(SupplicantRef supp, int * key_length) argument 549 key_length)); 931 int key_length; local 974 key_length = EAPOLKeyDescriptorGetLength(descr_p); 1006 key_length); 1010 enc_key, key_length); 1020 key_length); 1023 session_key, key_length); [all...] |
H A D | EAPOLSocket.c | 498 int index, const uint8_t * key, int key_length) 506 return (wireless_set_key(sock->source->wref, type, index, key, key_length)); 497 EAPOLSocketSetKey(EAPOLSocketRef sock, wirelessKeyType type, int index, const uint8_t * key, int key_length) argument
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509/ |
H A D | x509.h | 474 int key_length; member in struct:private_key_st
|
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/ |
H A D | x509.h | 474 int key_length; member in struct:private_key_st
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/openssl/ |
H A D | x509.h | 373 int key_length; member in struct:private_key_st
|