HomeSort by: relevance | last modified time | path
    Searched defs:keysize (Results 1 - 6 of 6) sorted by relevancy

  /src/sys/opencrypto/
xform.h 33 u_int16_t keysize; member in struct:auth_hash
  /src/external/apache2/mDNSResponder/dist/mDNSShared/
dnssd_clientlib.c 208 unsigned long keysize, keyvalsize; local
211 keysize = (unsigned long)(k - key);
212 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0);
213 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid);
230 memcpy(p, key, keysize);
231 p += keysize;
  /src/lib/libc/nameser/
ns_print.c 632 int mode, err, keysize; local
652 keysize = ns_get16(rdata); rdata += NS_INT16SZ;
653 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
  /src/external/bsd/libbind/dist/nameser/
ns_print.c 620 int mode, err, keysize; local
640 keysize = ns_get16(rdata); rdata += NS_INT16SZ;
641 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
  /src/external/bsd/unbound/dist/validator/
val_sigcrypt.c 401 size_t keysize; local
406 keysize = sldns_rr_dnskey_key_size_raw(rdata+2+4, len-2-4, alg);
415 if(keysize <= 1024)
validator.c 94 fill_nsec3_iter(size_t** keysize, size_t** maxiter, char* s, int c)
98 *keysize = (size_t*)calloc((size_t)c, sizeof(size_t));
100 if(!*keysize || !*maxiter) {
101 free(*keysize);
102 *keysize = NULL;
109 (*keysize)[i] = (size_t)strtol(s, &e, 10);
112 free(*keysize);
113 *keysize = NULL;
122 free(*keysize);
123 *keysize = NULL
184 size_t* keysize=NULL, *maxiter=NULL; local
    [all...]

Completed in 35 milliseconds