/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gdbm-1.8.3/ |
H A D | findkey.c | 45 int key_size; local 55 key_size = dbf->bucket->h_table[elem_loc].key_size; 61 data_ca->key_size = key_size; 65 if (key_size+data_size == 0) 68 data_ca->dptr = (char *) malloc (key_size+data_size); 77 num_bytes = read (dbf->desc, data_ca->dptr, key_size+data_size); 78 if (num_bytes != key_size+data_size) _gdbm_fatal (dbf, "read error"); 101 int key_size; /* Siz local [all...] |
H A D | gdbmdefs.h | 91 int key_size; /* Size of key data in the file. */ member in struct:__anon2161 130 int key_size; member in struct:__anon2163
|
H A D | gdbmdelete.c | 100 free_size = elem.key_size + elem.data_size; 113 dbf->cache_entry->ca_data.key_size = 0;
|
H A D | gdbmstore.c | 100 free_size = dbf->bucket->h_table[elem_loc].key_size 151 dbf->bucket->h_table[elem_loc].key_size = key.dsize;
|
H A D | gdbmseq.c | 82 return_val->dsize = dbf->bucket->h_table[elem_loc].key_size;
|
H A D | testgdbm.c | 60 bucket->h_table[index].key_size,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | pkbench.c | 310 unsigned int key_size = 0; local 314 key_size = gcry_pk_get_nbits (key_secret); 315 assert (key_size); 317 data = gcry_mpi_new (key_size); 320 gcry_mpi_randomize (data, key_size, GCRY_STRONG_RANDOM); 321 gcry_mpi_clear_bit (data, key_size - 1); 382 generate_key (const char *algorithm, const char *key_size) argument 390 if (isdigit ((unsigned int)*key_size)) 393 algorithm, key_size); 397 algorithm, key_size); [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/md/ |
H A D | dm-crypt.c | 99 unsigned int key_size; member in struct:crypt_config 170 sg_set_buf(&sg, cc->key, cc->key_size); 173 err = crypto_hash_digest(&desc, &sg, cc->key_size, salt); 713 unsigned key_size = strlen(key) >> 1; local 715 if (cc->key_size && cc->key_size != key_size) 718 cc->key_size = key_size; /* initial settings */ 720 if ((!key_size 749 unsigned int key_size; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | crypto.c | 311 crypt_stat->key_size); 313 crypt_stat->key_size); 318 crypt_stat->key_size); 720 crypt_stat->key_size); 809 crypt_stat->key_size << 3); 891 crypt_stat->key_size); 908 get_random_bytes(crypt_stat->key, crypt_stat->key_size); 914 crypt_stat->key_size); 948 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; 1002 crypt_stat->key_size 1789 ecryptfs_process_cipher(struct crypto_blkcipher **key_tfm, char *cipher_name, size_t *key_size) argument [all...] |
H A D | keystore.c | 252 ecryptfs_printk(KERN_ERR, "key_size [%d] larger than " 298 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); 318 rc = write_packet_length(&message[i], crypt_stat->key_size + 3, 327 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); 328 i += crypt_stat->key_size; 329 for (j = 0; j < crypt_stat->key_size; j++) 387 ecryptfs_printk(KERN_ERR, "Encrypted key_size [%d] larger than " 447 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; 458 crypt_stat->key_size); 741 crypt_stat->key_size [all...] |
H A D | ecryptfs_kernel.h | 136 u32 key_size; member in struct:ecryptfs_private_key 238 size_t key_size; member in struct:ecryptfs_crypt_stat 543 size_t *key_size);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfs/ |
H A D | brec.c | 429 int key_size, rec; local 474 key_size = hfs_bnode_read_u8(node, 14) + 1; 476 key_size = tree->max_key_len + 1; 477 hfs_bnode_copy(new_node, 14, node, 14, key_size); 480 key_size = tree->max_key_len + 1; 483 key_size = (key_size + 1) & -2; 485 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); 488 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4);
|
H A D | bnode.c | 319 int entry_size, key_size; local 381 key_size = hfs_bnode_read_u8(node, off) + 1; 382 if (key_size >= entry_size /*|| key_size & 1*/)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus/ |
H A D | brec.c | 425 int key_size, rec; local 470 key_size = hfs_bnode_read_u16(node, 14) + 2; 472 key_size = tree->max_key_len + 2; 473 hfs_bnode_copy(new_node, 14, node, 14, key_size); 476 key_size = tree->max_key_len + 2; 480 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); 483 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4);
|
H A D | bnode.c | 479 int entry_size, key_size; local 541 key_size = hfs_bnode_read_u16(node, off) + 2; 542 if (key_size >= entry_size || key_size & 1)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/ |
H A D | brec.c | 428 int key_size, rec; local 473 key_size = hfs_bnode_read_u16(node, 14) + 2; 475 key_size = tree->max_key_len + 2; 476 hfs_bnode_copy(hfsplus_handle, new_node, 14, node, 14, key_size); 479 key_size = tree->max_key_len + 2; 483 hfs_bnode_write(hfsplus_handle, new_node, &cnid, 14 + key_size, 4); 486 hfs_bnode_write_u16(hfsplus_handle, new_node, rec, 14 + key_size + 4);
|
H A D | bnode.c | 479 int entry_size, key_size; local 541 key_size = hfs_bnode_read_u16(node, off) + 2; 542 if (key_size >= entry_size || key_size & 1)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/hash/ |
H A D | hash.c | 594 u_int32_t key_off, key_size, pagesize, size, space; local 622 key_size = 0; 635 memcpy(&key_size, 639 size = key_size; 640 if (key_size > space) 643 dbc, key_size, pgno, np)) != 0) 645 space -= key_size; 647 np += key_size; 669 key_size = LEN_HKEY(dbp, pg, pagesize, indx); 837 *offp-- = (int32_t)key_size; [all...] |
H A D | hash_page.c | 2006 u_int32_t data_size, key_size; local 2021 key_size = HKEYDATA_PSIZE(key->size); 2026 key_size = HOFFPAGE_PSIZE; 2030 pairsize = key_size + data_size;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/btree/ |
H A D | bt_cursor.c | 1054 u_int32_t key_size, pagesize, size, space; local 1080 key_size = 0; 1155 size = key_size = bo->tlen; 1156 if (key_size > space) 1161 space -= key_size; 1163 np += key_size; 1206 key_size = bk->len; 1236 *offp-- = (int32_t)key_size; 1271 *offp-- = (int32_t)key_size; 1326 *offp-- = (int32_t)key_size; [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | ac.c | 2248 k = options->key_size / 8; 2322 k = options->key_size / 8; 2749 options_em->key_size = nbits;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/ia64/kernel/ |
H A D | palinfo.c | 323 vm_info_1.pal_vm_info_1_s.key_size,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/wireless/ |
H A D | ipw2100.h | 279 u8 key_size; // 0 no imm key, 0x5 64bit encr, 0xd 128bit encr, 0x10 128bit encr and 128bit IV member in struct:ipw2100_data_header
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/asm-ia64/ |
H A D | pal.h | 1596 key_size : 8, member in struct:pal_vm_info_1_u::__anon8845
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | gcrypt.h | 1393 size_t key_size; 1384 size_t key_size; member in struct:gcry_ac_eme_pkcs_v1_5
|