/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/api/ |
H A D | n8_sks.c | 349 keyHandle_p->key_length, 400 keyHandle_p->key_type, keyHandle_p->key_length, 506 sks_key_p->key_length = 510 DBG(("Key length in digits: %d\n", sks_key_p->key_length)); 546 SKS_RSA_P_LENGTH(sks_key_p->key_length), 548 SKS_RSA_P_OFFSET(sks_key_p->key_length), 561 SKS_RSA_Q_LENGTH(sks_key_p->key_length), 563 SKS_RSA_Q_OFFSET(sks_key_p->key_length), 576 SKS_RSA_DP_LENGTH(sks_key_p->key_length), 578 SKS_RSA_DP_OFFSET(sks_key_p->key_length), [all...] |
H A D | n8_daemon_sks.c | 134 keyHandle_p->key_length, 189 keyHandle_p->key_length, 273 (int) sks_key_p->key_type, sks_key_p->key_length, 327 (int*) &keyHandle_p->key_type, &keyHandle_p->key_length,
|
H A D | n8_rsa.c | 247 if (material_p->SKSKeyHandle.key_length < N8_RSA_SKS_KEY_LENGTH_DIGITS_MIN || 248 material_p->SKSKeyHandle.key_length > N8_RSA_SKS_KEY_LENGTH_DIGITS_MAX) 284 uint32_t key_length; local 294 key_length = BYTES_TO_PKDIGITS(key_length_bytes); 296 N8_PRINT("key length=%d (0x%08x)\n", key_length, key_length); 1766 key_p->publicKeyLength = PKDIGITS_TO_BYTES(material_p->SKSKeyHandle.key_length); 1767 key_p->privateKeyLength = PKDIGITS_TO_BYTES(material_p->SKSKeyHandle.key_length);
|
H A D | n8_dsa.c | 1463 validateSKSkeyLength = PKDIGITS_TO_BYTES(material_p->SKSKeyHandle.key_length) % 16; 1474 key_p->modulusLength = PKDIGITS_TO_BYTES(material_p->SKSKeyHandle.key_length);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | hmac.c | 52 memset(ctx->buf, 0, ctx->key_length); 91 memset(ctx->buf, 0, ctx->key_length); 94 ctx->key_length = EVP_MD_size(ctx->md); 95 ctx->buf = malloc(ctx->key_length); 108 memset(ctx->opad, 0, ctx->key_length); 112 memset(ctx->ipad, 0, ctx->key_length); 146 EVP_DigestUpdate(ctx->ctx, ctx->buf, ctx->key_length);
|
H A D | hmac.h | 64 size_t key_length; member in struct:hc_HMAC_CTX
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/hmac/ |
H A D | hmac.c | 112 &ctx->key_length)) 119 ctx->key_length=len; 121 if(ctx->key_length != HMAC_MAX_MD_CBLOCK) 122 memset(&ctx->key[ctx->key_length], 0, 123 HMAC_MAX_MD_CBLOCK - ctx->key_length); 203 dctx->key_length = sctx->key_length;
|
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/api/commands/ |
H A D | n8_cb_rsa.c | 261 uint32_t key_length = BYTES_TO_PKDIGITS(key_length_bytes); local 281 offset[i] = i * key_length; 326 (key_length << PK_Cmd_Length_Shift) | offset[4]; 512 uint32_t key_length = BYTES_TO_PKDIGITS(key_length_bytes); local 514 uint32_t offset1 = key_length; 532 (key_length << PK_Cmd_Length_Shift) | offset1; 938 uint32_t key_length; local 977 key_length = BYTES_TO_PKDIGITS(key_length_bytes); 982 offset[i] = i * key_length; 1028 rsa_wr_ptr->sks = ((key_length) << PK_Cmd_Key_Length_Shif [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | ieee802_1x.h | 32 u16 key_length; member in struct:ieee802_1x_eapol_key 45 * key field (of key_length bytes) contains the key in encrypted form; 46 * if packet body length = 44, key field is absent and key_length
|
H A D | wpa_auth.c | 1101 WPA_PUT_BE16(key->key_length, 16); 1104 WPA_PUT_BE16(key->key_length, 32); 1107 WPA_PUT_BE16(key->key_length, 5); 1110 WPA_PUT_BE16(key->key_length, 13); 1114 WPA_PUT_BE16(key->key_length, 0);
|
H A D | ieee802_1x.c | 140 key->key_length = htons(key_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/libraries/libldap/ |
H A D | tls_o.c | 66 static RSA * tlso_tmp_rsa_cb( SSL *ssl, int is_export, int key_length ); 68 static DH * tlso_tmp_dh_cb( SSL *ssl, int is_export, int key_length ); 1079 tlso_tmp_rsa_cb( SSL *ssl, int is_export, int key_length ) 1090 if ( tmp_rsa && !RSA_generate_key_ex( tmp_rsa, key_length, bn, NULL )) { 1098 tmp_rsa = RSA_generate_key( key_length, RSA_F4, NULL, NULL ); 1104 key_length, is_export ? "export" : "domestic", 0 ); 1211 tlso_tmp_dh_cb( SSL *ssl, int is_export, int key_length ) 1223 if ( p->keylength == key_length ) { 1234 if ( tlso_dhpem[i].keylength == key_length ) { 1247 dh = DH_generate_parameters( key_length, DH_GENERATOR_ [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | x_pkey.c | 117 ret->key_length=0;
|
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/include_public/ |
H A D | n8_pub_common.h | 359 uint32_t key_length; /* BNC digits */ member in struct:__anon8077
|
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/ |
H A D | n8_SKSManager.c | 379 uint32_t keyLength = keyHandle_p->key_length; 553 keyHandle_p->key_length,
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/rsn_supp/ |
H A D | wpa.c | 120 WPA_PUT_BE16(reply->key_length, 0); 319 WPA_PUT_BE16(reply->key_length, 0); 321 os_memcpy(reply->key_length, key->key_length, 2); 1027 WPA_PUT_BE16(reply->key_length, 0); 1029 os_memcpy(reply->key_length, key->key_length, 2); 1091 keylen = WPA_GET_BE16(key->key_length); 1207 gd->gtk_len = WPA_GET_BE16(key->key_length); 1295 WPA_PUT_BE16(reply->key_length, [all...] |
H A D | peerkey.c | 93 WPA_PUT_BE16(err->key_length, 0); 153 WPA_PUT_BE16(reply->key_length, 0); 361 WPA_PUT_BE16(msg->key_length, 16); 363 WPA_PUT_BE16(msg->key_length, 32); 421 WPA_PUT_BE16(msg->key_length, 16); 423 WPA_PUT_BE16(msg->key_length, 32); 1095 WPA_PUT_BE16(req->key_length, 0);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/common/ |
H A D | wpa_common.h | 150 /* Note: key_info, key_length, and key_data_length are unaligned */ 152 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
|
/netbsd-6-1-5-RELEASE/sys/fs/hfs/ |
H A D | libhfs.h | 354 uint16_t key_length; member in struct:__anon8824
|
H A D | libhfs.c | 1896 out_key->key_length = be16tohp(&ptr); 1898 out_key->key_length = *(((uint8_t*)ptr)); 2389 out_key->key_length = HFS_MAX_EXT_KEY_LEN; 2395 return out_key->key_length;
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 161 /* Note: key_length is unaligned */ 162 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 176 * key field (of key_length bytes) contains the key in encrypted form; 177 * if packet body length = 44, key field is absent and key_length 680 rx_key_length = WPA_GET_BE16(key->key_length); 682 "EAPOL-Key: type=%d key_length=%d key_index=0x%x", 774 "(key_length=%d)", key_len, rx_key_length);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509/ |
H A D | x509.h | 500 int key_length; member in struct:private_key_st
|