Searched refs:keysize (Results 1 - 25 of 102) sorted by relevance

12345

/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/
H A DSecSMIME.h49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
H A DSecCmsEncryptedData.h50 @param keysize is the key size.
55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
H A DSecCmsEnvelopedData.h51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/
H A DSecSMIME.h49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
H A DSecCmsEncryptedData.h50 @param keysize is the key size.
55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
H A DSecCmsEnvelopedData.h51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/Security/
H A DSecSMIME.h49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
H A DSecCmsEncryptedData.h50 @param keysize is the key size.
55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
H A DSecCmsEnvelopedData.h51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/lib/
H A DSecSMIME.h49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
H A DSecCmsEncryptedData.h50 @param keysize is the key size.
55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
H A DSecCmsEnvelopedData.h51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/security_smime/
H A DSecSMIME.h49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
H A DSecCmsEncryptedData.h50 @param keysize is the key size.
55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
H A DSecCmsEnvelopedData.h51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
/macosx-10.10.1/OpenSSH-189/osslshim/ossl/
H A Dossl-aes-cc.c47 size_t keysize = (size_t)(bits / 8); local
53 if ((keysize < kCCKeySizeAES128) || (keysize > kCCKeySizeAES256)) {
66 kCCOptionECBMode, (const void *)userKey, keysize, NULL,
/macosx-10.10.1/bind9-45.101/bind9/bin/confgen/
H A Dkeygen.c88 * Return default keysize for a given algorithm type.
111 * Generate a key of size 'keysize' using entropy source 'randomfile',
116 int keysize, isc_buffer_t *key_txtbuffer) {
129 if (keysize < 1 || keysize > 512)
130 fatal("keysize %d out of range (must be 1-512)\n",
131 keysize);
134 if (keysize < 1 || keysize > 256)
135 fatal("keysize
115 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, int keysize, isc_buffer_t *key_txtbuffer) argument
[all...]
H A Dkeygen.h29 int keysize, isc_buffer_t *key_txtbuffer);
H A Drndc-confgen.c111 int keysize; local
127 keysize = DEFAULT_KEYLENGTH;
140 keysize = strtol(isc_commandline_argument, &p, 10);
141 if (*p != '\0' || keysize < 0)
143 if (keysize < 1 || keysize > 512)
211 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
/macosx-10.10.1/BerkeleyDB-21/db/build_vxworks/test_micro/
H A Db_inmem.c17 u_int32_t keysize = 8; variable
40 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL);
46 key.size = keysize;
47 memset(keybuf, 'a', keysize);
66 keybuf[(ops % keysize)] = letters[(ops % 26)];
99 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL);
105 key.size = keysize;
121 (void)snprintf(keybuf, keysize, "%7d", i);
178 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL);
184 key.size = keysize;
[all...]
/macosx-10.10.1/BerkeleyDB-21/db/test_micro/source/
H A Db_inmem.c17 u_int32_t keysize = 8; variable
40 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL);
46 key.size = keysize;
47 memset(keybuf, 'a', keysize);
66 keybuf[(ops % keysize)] = letters[(ops % 26)];
99 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL);
105 key.size = keysize;
121 (void)snprintf(keybuf, keysize, "%7d", i);
178 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL);
184 key.size = keysize;
[all...]
/macosx-10.10.1/CPANInternal-159.1/Crypt-Rijndael-1.10/
H A DRijndael.xs53 newCONSTSUB (stash, "keysize", newSViv (32) );
67 keysize(...)
132 STRLEN keysize;
137 keysize = SvCUR(key);
139 if (keysize != 16 && keysize != 24 && keysize != 32)
148 rijndael_setup(&RETVAL->ctx, keysize, (UINT8 *) SvPV_nolen(key));
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/
H A DSOSUserKeygen.c197 size_t keysize = 256; local
205 CFDataSetLength(result, der_sizeof_pbkdf2_params(saltlen, salt, iterations, keysize));
207 uint8_t * encode = der_encode_pbkdf2_params(saltlen, salt, iterations, keysize,
215 secnotice("keygen", "Created new parameters: iterations %zd, keysize %zd: %@", iterations, keysize, result);
227 size_t keysize = 0; local
232 der = der_decode_pbkdf2_params(&saltlen, &salt, &iterations, &keysize, der, der_end);
239 if (keysize != 256) {
241 CFSTR("Key size not supported, requested %zd."), keysize);
260 ccec_const_cp_t cp = ccec_get_cp(keysize);
290 size_t keysize = 0; local
[all...]
/macosx-10.10.1/cups-408/cups/cups/
H A Dpwg-private.h52 extern void _pwgGenerateSize(char *keyword, size_t keysize,
/macosx-10.10.1/xnu-2782.1.97/osfmk/corecrypto/ccdbrg/src/
H A Dccdrbg_nisthmac.c116 size_t keysize; member in struct:ccdrbg_nisthmac_state
124 cc_print(label, state->keysize, state->key);
170 cchmac_init(di, ctx, state->keysize, state->key);
180 cchmac(di, state->keysize, state->key, state->vsize, state->v, state->v);
188 cchmac_init(di, ctx, state->keysize, state->key);
197 cchmac(di, state->keysize, state->key, state->vsize, state->v, state->v);
232 cc_zero(state->keysize, state->key);
264 state->keysize = di->output_size; // TODO: state size?
367 cchmac(di, state->keysize, state->key, state->vsize, state->v, state->v);

Completed in 136 milliseconds

12345