| /src/sys/netipsec/ |
| xform_tcp.c | 87 int keylen; local 102 keylen = _KEYLEN(sav->key_auth); 103 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) { 104 DPRINTF("invalid key length %u\n", keylen);
|
| xform_tcp.c | 87 int keylen; local 102 keylen = _KEYLEN(sav->key_auth); 103 if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) { 104 DPRINTF("invalid key length %u\n", keylen);
|
| xform_esp.c | 184 int keylen; local 202 keylen = _KEYLEN(sav->key_enc); 203 if (txform->minkey > keylen || keylen > txform->maxkey) { 206 keylen, txform->minkey, txform->maxkey, txform->name); 228 switch (keylen) { 243 "20, 28 or 36\n", keylen);
|
| /src/lib/libc/citrus/ |
| citrus_memstream.c | 79 size_t len, keylen; local 81 keylen = strlen(key); 101 if ((size_t)(q-p) == keylen) { 103 if (memcmp(key, p, keylen) == 0) 106 if (_bcs_strncasecmp(key, p, keylen) == 0)
|
| citrus_memstream.c | 79 size_t len, keylen; local 81 keylen = strlen(key); 101 if ((size_t)(q-p) == keylen) { 103 if (memcmp(key, p, keylen) == 0) 106 if (_bcs_strncasecmp(key, p, keylen) == 0)
|
| /src/usr.sbin/services_mkdb/ |
| output_cdb.c | 69 size_t len, protolen, datalen, keylen; local 109 keylen = 4 + protolen; 110 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 114 keylen = 4; 115 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 125 keylen = 2 + len + protolen; 126 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 130 keylen = 2 + len; 131 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
|
| output_cdb.c | 69 size_t len, protolen, datalen, keylen; local 109 keylen = 4 + protolen; 110 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 114 keylen = 4; 115 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 125 keylen = 2 + len + protolen; 126 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup) 130 keylen = 2 + len; 131 if (cdbw_put_key(cdbw, key, keylen, idx) && warndup)
|
| /src/lib/libc/yp/ |
| yp_match.c | 59 int keylen, vallen; member in struct:ypmatch_ent 68 ypmatch_add(const char *map, const char *key, int keylen, char *val, int vallen) 100 if ((ep->key = malloc((size_t)keylen)) == NULL) 109 ep->keylen = keylen; 112 (void)memcpy(ep->key, key, (size_t)ep->keylen); 131 ypmatch_find(const char *map, const char *key, int keylen, const char **val, 147 if (ep->keylen != keylen) 151 if (memcmp(ep->key, key, (size_t)keylen)) [all...] |
| yp_match.c | 59 int keylen, vallen; member in struct:ypmatch_ent 68 ypmatch_add(const char *map, const char *key, int keylen, char *val, int vallen) 100 if ((ep->key = malloc((size_t)keylen)) == NULL) 109 ep->keylen = keylen; 112 (void)memcpy(ep->key, key, (size_t)ep->keylen); 131 ypmatch_find(const char *map, const char *key, int keylen, const char **val, 147 if (ep->keylen != keylen) 151 if (memcmp(ep->key, key, (size_t)keylen)) [all...] |
| /src/sbin/rcorder/ |
| hash.c | 270 int keylen; local 279 keylen = p - key; 296 e = (Hash_Entry *) emalloc(sizeof(*e) + keylen);
|
| hash.c | 270 int keylen; local 279 keylen = p - key; 296 e = (Hash_Entry *) emalloc(sizeof(*e) + keylen);
|
| /src/sys/dev/virtio/arch/x86/ |
| virtio_mmio_cmdline.c | 195 int keylen = strlen(VMMIOSTR); local 210 parg += keylen;
|
| virtio_mmio_cmdline.c | 195 int keylen = strlen(VMMIOSTR); local 210 parg += keylen;
|
| /src/sys/net80211/ |
| ieee80211_crypto_wep.c | 314 u_int off, keylen; local 329 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN; 331 j = (j + S[i] + rc4key[i % keylen]) & 0xff; 399 u_int off, keylen; local 411 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN; 413 j = (j + S[i] + rc4key[i % keylen]) & 0xff;
|
| ieee80211_crypto_wep.c | 314 u_int off, keylen; local 329 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN; 331 j = (j + S[i] + rc4key[i % keylen]) & 0xff; 399 u_int off, keylen; local 411 keylen = key->wk_keylen + IEEE80211_WEP_IVLEN; 413 j = (j + S[i] + rc4key[i % keylen]) & 0xff;
|
| /src/sys/opencrypto/ |
| ocryptodev.h | 93 u_int32_t keylen; /* cipher key */ member in struct:osession_op 105 u_int32_t keylen; /* cipher key */ member in struct:osession_n_op 148 u_int32_t keylen; /* cipher key - optional */ member in struct:ocrypt_n_op
|
| ocryptodev.h | 93 u_int32_t keylen; /* cipher key */ member in struct:osession_op 105 u_int32_t keylen; /* cipher key */ member in struct:osession_n_op 148 u_int32_t keylen; /* cipher key - optional */ member in struct:ocrypt_n_op
|
| /src/lib/libc/gen/ |
| getusershell.c | 402 int keylen, datalen, rv, nisr; local 424 &key, &keylen, &data, &datalen); 430 _nis_state.currentlen = keylen;
|
| getusershell.c | 402 int keylen, datalen, rv, nisr; local 424 &key, &keylen, &data, &datalen); 430 _nis_state.currentlen = keylen;
|
| /src/sbin/cgdconfig/ |
| params.h | 57 size_t keylen; member in struct:params
|
| params.h | 57 size_t keylen; member in struct:params
|
| /src/sys/dev/pci/qat/ |
| qat_hw17.c | 345 int keylen = crie->cri_klen / 8; local 349 memcpy(cipher->max.key, crie->cri_key, keylen); 352 cipher_cd_ctrl->cipher_key_sz = keylen >> 3; 357 return roundup(sizeof(struct hw_cipher_config) + keylen, 8);
|
| qat_hw17.c | 345 int keylen = crie->cri_klen / 8; local 349 memcpy(cipher->max.key, crie->cri_key, keylen); 352 cipher_cd_ctrl->cipher_key_sz = keylen >> 3; 357 return roundup(sizeof(struct hw_cipher_config) + keylen, 8);
|
| /src/sys/net/npf/ |
| npf_conndb.c | 167 const unsigned keylen = NPF_CONNKEY_LEN(ck); local 175 val = thmap_get(cd->cd_map, ck->ck_key, keylen); 206 const unsigned keylen = NPF_CONNKEY_LEN(ck); local 218 ok = thmap_put(cd->cd_map, ck->ck_key, keylen, val) == val; 231 const unsigned keylen = NPF_CONNKEY_LEN(ck); local 235 val = thmap_del(cd->cd_map, ck->ck_key, keylen);
|
| /src/usr.bin/sort/ |
| sort.h | 120 int keylen; /* length of key */ member in struct:recheader
|