HomeSort by: relevance | last modified time | path
    Searched defs:keylen (Results 1 - 25 of 64) sorted by relevancy

1 2 3

  /src/sys/netipsec/
xform_tcp.c 87 int keylen; local
102 keylen = _KEYLEN(sav->key_auth);
103 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) {
104 DPRINTF("invalid key length %u\n", keylen);
xform_tcp.c 87 int keylen; local
102 keylen = _KEYLEN(sav->key_auth);
103 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) {
104 DPRINTF("invalid key length %u\n", keylen);
xform_esp.c 184 int keylen; local
202 keylen = _KEYLEN(sav->key_enc);
203 if (txform->minkey > keylen || keylen > txform->maxkey) {
206 keylen, txform->minkey, txform->maxkey, txform->name);
228 switch (keylen) {
243 "20, 28 or 36\n", keylen);
  /src/lib/libc/citrus/
citrus_memstream.c 79 size_t len, keylen; local
81 keylen = strlen(key);
101 if ((size_t)(q-p) == keylen) {
103 if (memcmp(key, p, keylen) == 0)
106 if (_bcs_strncasecmp(key, p, keylen) == 0)
citrus_memstream.c 79 size_t len, keylen; local
81 keylen = strlen(key);
101 if ((size_t)(q-p) == keylen) {
103 if (memcmp(key, p, keylen) == 0)
106 if (_bcs_strncasecmp(key, p, keylen) == 0)
  /src/usr.sbin/services_mkdb/
output_cdb.c 69 size_t len, protolen, datalen, keylen; local
109 keylen = 4 + protolen;
110 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
114 keylen = 4;
115 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
125 keylen = 2 + len + protolen;
126 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
130 keylen = 2 + len;
131 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
output_cdb.c 69 size_t len, protolen, datalen, keylen; local
109 keylen = 4 + protolen;
110 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
114 keylen = 4;
115 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
125 keylen = 2 + len + protolen;
126 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
130 keylen = 2 + len;
131 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
  /src/lib/libc/yp/
yp_match.c 59 int keylen, vallen; member in struct:ypmatch_ent
68 ypmatch_add(const char *map, const char *key, int keylen, char *val, int vallen)
100 if ((ep->key = malloc((size_t)keylen)) == NULL)
109 ep->keylen = keylen;
112 (void)memcpy(ep->key, key, (size_t)ep->keylen);
131 ypmatch_find(const char *map, const char *key, int keylen, const char **val,
147 if (ep->keylen != keylen)
151 if (memcmp(ep->key, key, (size_t)keylen))
    [all...]
yp_match.c 59 int keylen, vallen; member in struct:ypmatch_ent
68 ypmatch_add(const char *map, const char *key, int keylen, char *val, int vallen)
100 if ((ep->key = malloc((size_t)keylen)) == NULL)
109 ep->keylen = keylen;
112 (void)memcpy(ep->key, key, (size_t)ep->keylen);
131 ypmatch_find(const char *map, const char *key, int keylen, const char **val,
147 if (ep->keylen != keylen)
151 if (memcmp(ep->key, key, (size_t)keylen))
    [all...]
  /src/sbin/rcorder/
hash.c 270 int keylen; local
279 keylen = p - key;
296 e = (Hash_Entry *) emalloc(sizeof(*e) + keylen);
hash.c 270 int keylen; local
279 keylen = p - key;
296 e = (Hash_Entry *) emalloc(sizeof(*e) + keylen);
  /src/sys/dev/virtio/arch/x86/
virtio_mmio_cmdline.c 195 int keylen = strlen(VMMIOSTR); local
210 parg += keylen;
virtio_mmio_cmdline.c 195 int keylen = strlen(VMMIOSTR); local
210 parg += keylen;
  /src/sys/net80211/
ieee80211_crypto_wep.c 314 u_int off, keylen; local
329 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN;
331 j = (j + S[i] + rc4key[i % keylen]) & 0xff;
399 u_int off, keylen; local
411 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN;
413 j = (j + S[i] + rc4key[i % keylen]) & 0xff;
ieee80211_crypto_wep.c 314 u_int off, keylen; local
329 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN;
331 j = (j + S[i] + rc4key[i % keylen]) & 0xff;
399 u_int off, keylen; local
411 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN;
413 j = (j + S[i] + rc4key[i % keylen]) & 0xff;
  /src/sys/opencrypto/
ocryptodev.h 93 u_int32_t keylen; /* cipher key */ member in struct:osession_op
105 u_int32_t keylen; /* cipher key */ member in struct:osession_n_op
148 u_int32_t keylen; /* cipher key - optional */ member in struct:ocrypt_n_op
ocryptodev.h 93 u_int32_t keylen; /* cipher key */ member in struct:osession_op
105 u_int32_t keylen; /* cipher key */ member in struct:osession_n_op
148 u_int32_t keylen; /* cipher key - optional */ member in struct:ocrypt_n_op
  /src/lib/libc/gen/
getusershell.c 402 int keylen, datalen, rv, nisr; local
424 &key, &keylen, &data, &datalen);
430 _nis_state.currentlen = keylen;
getusershell.c 402 int keylen, datalen, rv, nisr; local
424 &key, &keylen, &data, &datalen);
430 _nis_state.currentlen = keylen;
  /src/sbin/cgdconfig/
params.h 57 size_t keylen; member in struct:params
params.h 57 size_t keylen; member in struct:params
  /src/sys/dev/pci/qat/
qat_hw17.c 345 int keylen = crie->cri_klen / 8; local
349 memcpy(cipher->max.key, crie->cri_key, keylen);
352 cipher_cd_ctrl->cipher_key_sz = keylen >> 3;
357 return roundup(sizeof(struct hw_cipher_config) + keylen, 8);
qat_hw17.c 345 int keylen = crie->cri_klen / 8; local
349 memcpy(cipher->max.key, crie->cri_key, keylen);
352 cipher_cd_ctrl->cipher_key_sz = keylen >> 3;
357 return roundup(sizeof(struct hw_cipher_config) + keylen, 8);
  /src/sys/net/npf/
npf_conndb.c 167 const unsigned keylen = NPF_CONNKEY_LEN(ck); local
175 val = thmap_get(cd->cd_map, ck->ck_key, keylen);
206 const unsigned keylen = NPF_CONNKEY_LEN(ck); local
218 ok = thmap_put(cd->cd_map, ck->ck_key, keylen, val) == val;
231 const unsigned keylen = NPF_CONNKEY_LEN(ck); local
235 val = thmap_del(cd->cd_map, ck->ck_key, keylen);
  /src/usr.bin/sort/
sort.h 120 int keylen; /* length of key */ member in struct:recheader

Completed in 39 milliseconds

1 2 3