Searched refs:key_size (Results 1 - 25 of 27) sorted by relevance

12

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gdbm-1.8.3/
H A Dfindkey.c45 int key_size; local
55 key_size = dbf->bucket->h_table[elem_loc].key_size;
61 data_ca->key_size = key_size;
65 if (key_size+data_size == 0)
68 data_ca->dptr = (char *) malloc (key_size+data_size);
77 num_bytes = read (dbf->desc, data_ca->dptr, key_size+data_size);
78 if (num_bytes != key_size+data_size) _gdbm_fatal (dbf, "read error");
101 int key_size; /* Siz local
[all...]
H A Dgdbmdefs.h91 int key_size; /* Size of key data in the file. */ member in struct:__anon2161
130 int key_size; member in struct:__anon2163
H A Dgdbmdelete.c100 free_size = elem.key_size + elem.data_size;
113 dbf->cache_entry->ca_data.key_size = 0;
H A Dgdbmstore.c100 free_size = dbf->bucket->h_table[elem_loc].key_size
151 dbf->bucket->h_table[elem_loc].key_size = key.dsize;
H A Dgdbmseq.c82 return_val->dsize = dbf->bucket->h_table[elem_loc].key_size;
H A Dtestgdbm.c60 bucket->h_table[index].key_size,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dpkbench.c310 unsigned int key_size = 0; local
314 key_size = gcry_pk_get_nbits (key_secret);
315 assert (key_size);
317 data = gcry_mpi_new (key_size);
320 gcry_mpi_randomize (data, key_size, GCRY_STRONG_RANDOM);
321 gcry_mpi_clear_bit (data, key_size - 1);
382 generate_key (const char *algorithm, const char *key_size) argument
390 if (isdigit ((unsigned int)*key_size))
393 algorithm, key_size);
397 algorithm, key_size);
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/md/
H A Ddm-crypt.c99 unsigned int key_size; member in struct:crypt_config
170 sg_set_buf(&sg, cc->key, cc->key_size);
173 err = crypto_hash_digest(&desc, &sg, cc->key_size, salt);
713 unsigned key_size = strlen(key) >> 1; local
715 if (cc->key_size && cc->key_size != key_size)
718 cc->key_size = key_size; /* initial settings */
720 if ((!key_size
749 unsigned int key_size; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/
H A Dcrypto.c311 crypt_stat->key_size);
313 crypt_stat->key_size);
318 crypt_stat->key_size);
720 crypt_stat->key_size);
809 crypt_stat->key_size << 3);
891 crypt_stat->key_size);
908 get_random_bytes(crypt_stat->key, crypt_stat->key_size);
914 crypt_stat->key_size);
948 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES;
1002 crypt_stat->key_size
1789 ecryptfs_process_cipher(struct crypto_blkcipher **key_tfm, char *cipher_name, size_t *key_size) argument
[all...]
H A Dkeystore.c252 ecryptfs_printk(KERN_ERR, "key_size [%d] larger than "
298 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size);
318 rc = write_packet_length(&message[i], crypt_stat->key_size + 3,
327 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
328 i += crypt_stat->key_size;
329 for (j = 0; j < crypt_stat->key_size; j++)
387 ecryptfs_printk(KERN_ERR, "Encrypted key_size [%d] larger than "
447 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
458 crypt_stat->key_size);
741 crypt_stat->key_size
[all...]
H A Decryptfs_kernel.h136 u32 key_size; member in struct:ecryptfs_private_key
238 size_t key_size; member in struct:ecryptfs_crypt_stat
543 size_t *key_size);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfs/
H A Dbrec.c429 int key_size, rec; local
474 key_size = hfs_bnode_read_u8(node, 14) + 1;
476 key_size = tree->max_key_len + 1;
477 hfs_bnode_copy(new_node, 14, node, 14, key_size);
480 key_size = tree->max_key_len + 1;
483 key_size = (key_size + 1) & -2;
485 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4);
488 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4);
H A Dbnode.c319 int entry_size, key_size; local
381 key_size = hfs_bnode_read_u8(node, off) + 1;
382 if (key_size >= entry_size /*|| key_size & 1*/)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus/
H A Dbrec.c425 int key_size, rec; local
470 key_size = hfs_bnode_read_u16(node, 14) + 2;
472 key_size = tree->max_key_len + 2;
473 hfs_bnode_copy(new_node, 14, node, 14, key_size);
476 key_size = tree->max_key_len + 2;
480 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4);
483 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4);
H A Dbnode.c479 int entry_size, key_size; local
541 key_size = hfs_bnode_read_u16(node, off) + 2;
542 if (key_size >= entry_size || key_size & 1)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/
H A Dbrec.c428 int key_size, rec; local
473 key_size = hfs_bnode_read_u16(node, 14) + 2;
475 key_size = tree->max_key_len + 2;
476 hfs_bnode_copy(hfsplus_handle, new_node, 14, node, 14, key_size);
479 key_size = tree->max_key_len + 2;
483 hfs_bnode_write(hfsplus_handle, new_node, &cnid, 14 + key_size, 4);
486 hfs_bnode_write_u16(hfsplus_handle, new_node, rec, 14 + key_size + 4);
H A Dbnode.c479 int entry_size, key_size; local
541 key_size = hfs_bnode_read_u16(node, off) + 2;
542 if (key_size >= entry_size || key_size & 1)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/hash/
H A Dhash.c594 u_int32_t key_off, key_size, pagesize, size, space; local
622 key_size = 0;
635 memcpy(&key_size,
639 size = key_size;
640 if (key_size > space)
643 dbc, key_size, pgno, np)) != 0)
645 space -= key_size;
647 np += key_size;
669 key_size = LEN_HKEY(dbp, pg, pagesize, indx);
837 *offp-- = (int32_t)key_size;
[all...]
H A Dhash_page.c2006 u_int32_t data_size, key_size; local
2021 key_size = HKEYDATA_PSIZE(key->size);
2026 key_size = HOFFPAGE_PSIZE;
2030 pairsize = key_size + data_size;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/btree/
H A Dbt_cursor.c1054 u_int32_t key_size, pagesize, size, space; local
1080 key_size = 0;
1155 size = key_size = bo->tlen;
1156 if (key_size > space)
1161 space -= key_size;
1163 np += key_size;
1206 key_size = bk->len;
1236 *offp-- = (int32_t)key_size;
1271 *offp-- = (int32_t)key_size;
1326 *offp-- = (int32_t)key_size;
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dac.c2248 k = options->key_size / 8;
2322 k = options->key_size / 8;
2749 options_em->key_size = nbits;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/ia64/kernel/
H A Dpalinfo.c323 vm_info_1.pal_vm_info_1_s.key_size,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/wireless/
H A Dipw2100.h279 u8 key_size; // 0 no imm key, 0x5 64bit encr, 0xd 128bit encr, 0x10 128bit encr and 128bit IV member in struct:ipw2100_data_header
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/asm-ia64/
H A Dpal.h1596 key_size : 8, member in struct:pal_vm_info_1_u::__anon8845
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/
H A Dgcrypt.h1393 size_t key_size;
1384 size_t key_size; member in struct:gcry_ac_eme_pkcs_v1_5

Completed in 219 milliseconds

12