| /src/sys/opencrypto/ |
| xform.h | 33 u_int16_t keysize; member in struct:auth_hash
|
| /src/external/apache2/mDNSResponder/dist/mDNSShared/ |
| dnssd_clientlib.c | 208 unsigned long keysize, keyvalsize; local 211 keysize = (unsigned long)(k - key); 212 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); 213 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); 230 memcpy(p, key, keysize); 231 p += keysize;
|
| /src/lib/libc/nameser/ |
| ns_print.c | 632 int mode, err, keysize; local 652 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 653 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
| /src/external/bsd/libbind/dist/nameser/ |
| ns_print.c | 620 int mode, err, keysize; local 640 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 641 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
| /src/external/bsd/unbound/dist/validator/ |
| val_sigcrypt.c | 401 size_t keysize; local 406 keysize = sldns_rr_dnskey_key_size_raw(rdata+2+4, len-2-4, alg); 415 if(keysize <= 1024)
|
| validator.c | 94 fill_nsec3_iter(size_t** keysize, size_t** maxiter, char* s, int c) 98 *keysize = (size_t*)calloc((size_t)c, sizeof(size_t)); 100 if(!*keysize || !*maxiter) { 101 free(*keysize); 102 *keysize = NULL; 109 (*keysize)[i] = (size_t)strtol(s, &e, 10); 112 free(*keysize); 113 *keysize = NULL; 122 free(*keysize); 123 *keysize = NULL 184 size_t* keysize=NULL, *maxiter=NULL; local [all...] |