/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | SecSMIME.h | 49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
|
H A D | SecCmsEncryptedData.h | 50 @param keysize is the key size. 55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
H A D | SecCmsEnvelopedData.h | 51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | SecSMIME.h | 49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
|
H A D | SecCmsEncryptedData.h | 50 @param keysize is the key size. 55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
H A D | SecCmsEnvelopedData.h | 51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | SecSMIME.h | 49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
|
H A D | SecCmsEncryptedData.h | 50 @param keysize is the key size. 55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
H A D | SecCmsEnvelopedData.h | 51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | SecSMIME.h | 49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
|
H A D | SecCmsEncryptedData.h | 50 @param keysize is the key size. 55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
H A D | SecCmsEnvelopedData.h | 51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | SecSMIME.h | 49 SecSMIMEFindBulkAlgForRecipients(SecCertificateRef *rcerts, SECOidTag *bulkalgtag, int *keysize);
|
H A D | SecCmsEncryptedData.h | 50 @param keysize is the key size. 55 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
H A D | SecCmsEnvelopedData.h | 51 SecCmsEnvelopedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize);
|
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-aes-cc.c | 47 size_t keysize = (size_t)(bits / 8); local 53 if ((keysize < kCCKeySizeAES128) || (keysize > kCCKeySizeAES256)) { 66 kCCOptionECBMode, (const void *)userKey, keysize, NULL,
|
/macosx-10.10/bind9-45.101/bind9/bin/confgen/ |
H A D | keygen.c | 88 * Return default keysize for a given algorithm type. 111 * Generate a key of size 'keysize' using entropy source 'randomfile', 116 int keysize, isc_buffer_t *key_txtbuffer) { 129 if (keysize < 1 || keysize > 512) 130 fatal("keysize %d out of range (must be 1-512)\n", 131 keysize); 134 if (keysize < 1 || keysize > 256) 135 fatal("keysize 115 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, int keysize, isc_buffer_t *key_txtbuffer) argument [all...] |
H A D | keygen.h | 29 int keysize, isc_buffer_t *key_txtbuffer);
|
H A D | rndc-confgen.c | 111 int keysize; local 127 keysize = DEFAULT_KEYLENGTH; 140 keysize = strtol(isc_commandline_argument, &p, 10); 141 if (*p != '\0' || keysize < 0) 143 if (keysize < 1 || keysize > 512) 211 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
|
/macosx-10.10/BerkeleyDB-21/db/build_vxworks/test_micro/ |
H A D | b_inmem.c | 17 u_int32_t keysize = 8; variable 40 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 46 key.size = keysize; 47 memset(keybuf, 'a', keysize); 66 keybuf[(ops % keysize)] = letters[(ops % 26)]; 99 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 105 key.size = keysize; 121 (void)snprintf(keybuf, keysize, "%7d", i); 178 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 184 key.size = keysize; [all...] |
/macosx-10.10/BerkeleyDB-21/db/test_micro/source/ |
H A D | b_inmem.c | 17 u_int32_t keysize = 8; variable 40 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 46 key.size = keysize; 47 memset(keybuf, 'a', keysize); 66 keybuf[(ops % keysize)] = letters[(ops % 26)]; 99 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 105 key.size = keysize; 121 (void)snprintf(keybuf, keysize, "%7d", i); 178 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 184 key.size = keysize; [all...] |
/macosx-10.10/CPANInternal-159.1/Crypt-Rijndael-1.10/ |
H A D | Rijndael.xs | 53 newCONSTSUB (stash, "keysize", newSViv (32) ); 67 keysize(...) 132 STRLEN keysize; 137 keysize = SvCUR(key); 139 if (keysize != 16 && keysize != 24 && keysize != 32) 148 rijndael_setup(&RETVAL->ctx, keysize, (UINT8 *) SvPV_nolen(key));
|
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSUserKeygen.c | 197 size_t keysize = 256; local 205 CFDataSetLength(result, der_sizeof_pbkdf2_params(saltlen, salt, iterations, keysize)); 207 uint8_t * encode = der_encode_pbkdf2_params(saltlen, salt, iterations, keysize, 215 secnotice("keygen", "Created new parameters: iterations %zd, keysize %zd: %@", iterations, keysize, result); 227 size_t keysize = 0; local 232 der = der_decode_pbkdf2_params(&saltlen, &salt, &iterations, &keysize, der, der_end); 239 if (keysize != 256) { 241 CFSTR("Key size not supported, requested %zd."), keysize); 260 ccec_const_cp_t cp = ccec_get_cp(keysize); 290 size_t keysize = 0; local [all...] |
/macosx-10.10/cups-408/cups/cups/ |
H A D | pwg-private.h | 52 extern void _pwgGenerateSize(char *keyword, size_t keysize,
|
/macosx-10.10/xnu-2782.1.97/osfmk/corecrypto/ccdbrg/src/ |
H A D | ccdrbg_nisthmac.c | 116 size_t keysize; member in struct:ccdrbg_nisthmac_state 124 cc_print(label, state->keysize, state->key); 170 cchmac_init(di, ctx, state->keysize, state->key); 180 cchmac(di, state->keysize, state->key, state->vsize, state->v, state->v); 188 cchmac_init(di, ctx, state->keysize, state->key); 197 cchmac(di, state->keysize, state->key, state->vsize, state->v, state->v); 232 cc_zero(state->keysize, state->key); 264 state->keysize = di->output_size; // TODO: state size? 367 cchmac(di, state->keysize, state->key, state->vsize, state->v, state->v);
|