HomeSort by: relevance | last modified time | path
    Searched refs:keysize (Results 1 - 8 of 8) sorted by relevancy

  /src/sys/opencrypto/
xform.c 205 .keysize = 0,
214 .keysize = 16,
223 .keysize = 20,
232 .keysize = 20,
241 .keysize = 16,
250 .keysize = 20,
259 .keysize = 20,
268 .keysize = 0,
277 .keysize = 0,
286 .keysize = 0
    [all...]
xform.h 33 u_int16_t keysize; member in struct:auth_hash
cryptodev.c 1546 if (sop->mackeylen == auth_hash_hmac_sha2_256.keysize) {
1548 } else if (sop->mackeylen == auth_hash_hmac_sha2_384.keysize) {
1550 } else if (sop->mackeylen == auth_hash_hmac_sha2_512.keysize) {
1636 if (sop->mackeylen != thash->keysize) {
1637 DPRINTF("mackeylen %d != keysize %d\n",
1638 sop->mackeylen, thash->keysize);
  /src/lib/libresolv/
support.c 103 dst_s_id_calc(const u_char *key, const int keysize)
107 int size = keysize;
109 if (!key || (keysize <= 0))
  /src/sys/netipsec/
xform_ah.c 227 if (keylen != thash->keysize && thash->keysize != 0) {
229 "keysize %d\n",
230 keylen, thash->name, thash->keysize);
key.c 6586 *ksmin = *ksmax = ah->keysize;
6587 if (ah->keysize == 0) {
  /src/lib/libc/nameser/
ns_print.c 632 int mode, err, keysize; local in function:ns_sprintrrf
652 keysize = ns_get16(rdata); rdata += NS_INT16SZ;
653 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
  /src/sys/arch/arm/sunxi/
sun8i_crypto.c 836 uint32_t nbytes, uint32_t keysize, uint32_t dir)
852 switch (keysize) {
870 tdqs |= __SHIFTIN(keysize, SUN8I_CRYPTO_TDQS_AES_KEYSIZE);

Completed in 23 milliseconds