/dragonfly/usr.sbin/installer/libaura/ |
H A D | dict.c | 155 for (p = k; p < k + key_size; p++) { in hashpjw() 178 memcpy(b->key, key, key_size); in aura_bucket_new() 179 b->key_size = key_size; in aura_bucket_new() 197 if (key_size == (*b)->key_size && memcmp(key, (*b)->key, key_size) == 0) in aura_dict_locate_hash() 211 if (key_size == (*b)->key_size && memcmp(key, (*b)->key, key_size) == 0) in aura_dict_locate_list() 267 if (key_size == b->key_size && memcmp(key, b->key, key_size) == 0) { in aura_dict_fetch_list() 305 b->key_size < key_size ? b->key_size : key_size)) == 0) { in keycmp() 306 if (key_size < b->key_size) in keycmp() 308 if (key_size > b->key_size) in keycmp() 336 if (keycmp(key, key_size, b) < 0) { in aura_dict_store_list_sorted() [all …]
|
H A D | dict.h | 62 size_t key_size; member
|
/dragonfly/contrib/cryptsetup/tests/ |
H A D | api-test.c | 307 EQ_(co.key_size, 16); in query_device() 334 .key_size = 256 / 8, in LuksFormat() 366 .key_size = 256 / 8, in LuksKeyGame() 459 .key_size = 128 / 8, in DeviceResizeGame() 495 EQ_(co.key_size, 128 / 8); in DeviceResizeGame() 505 co.key_size = 128 / 8; in DeviceResizeGame() 585 key_size--; in AddDevicePlain() 588 key_size++; in AddDevicePlain() 604 size_t key_size; in UseLuksDevice() local 615 key_size = 16; in UseLuksDevice() [all …]
|
/dragonfly/sys/dev/drm/amd/include/linux/ |
H A D | chash.h | 42 u8 key_size; member 64 #define __CHASH_DATA_SIZE(bits, key_size, value_size) \ argument 66 __CHASH_ARRAY_SIZE(bits, key_size) + \ 73 [__CHASH_DATA_SIZE(bits, key_size, value_size)];\ 129 prefix.key_size = (key_sz), \ 323 BUG_ON(iter.table->key_size != 4); in chash_iter_key32() 329 BUG_ON(iter.table->key_size != 8); in chash_iter_key64() 336 return (iter.table->key_size == 4) ? in chash_iter_key() 342 BUG_ON(iter.table->key_size != 4); in chash_iter_hash32() 348 BUG_ON(iter.table->key_size != 8); in chash_iter_hash64() [all …]
|
/dragonfly/usr.sbin/nscd/ |
H A D | cachelib.c | 84 if (hp1->key_size != hp2->key_size) { in ht_items_cmp_func() 85 min_size = (hp1->key_size < hp2->key_size) ? hp1->key_size : in ht_items_cmp_func() 90 return ((hp1->key_size < hp2->key_size) ? -1 : 1); in ht_items_cmp_func() 110 if (hp1->key_size != hp2->key_size) { in ht_items_fixed_size_left_cmp_func() 111 min_size = (hp1->key_size < hp2->key_size) ? hp1->key_size : in ht_items_fixed_size_left_cmp_func() 119 return ((hp1->key_size < hp2->key_size) ? -1 : 1); in ht_items_fixed_size_left_cmp_func() 391 ht_key.key_size = item->key_size; in flush_cache_policy() 713 item_data.key_size = key_size; in cache_read() 817 item_data.key_size = key_size; in cache_write() 842 policy_item->key_size = item_data.key_size; in cache_write() [all …]
|
H A D | cacheplcs.h | 47 size_t key_size; member
|
H A D | cachelib.h | 126 size_t key_size; member
|
/dragonfly/lib/libc/net/ |
H A D | nscache.c | 75 cache_data->key_size = NSS_CACHE_KEY_INITIAL_SIZE; in __nss_common_cache_read() 79 size = cache_data->key_size; in __nss_common_cache_read() 87 cache_data->key_size <<= 1; in __nss_common_cache_read() 89 cache_data->key_size); in __nss_common_cache_read() 90 memset(cache_data->key, 0, cache_data->key_size); in __nss_common_cache_read() 98 cache_data->key_size = 0; in __nss_common_cache_read() 101 cache_data->key_size = size; in __nss_common_cache_read() 114 cache_data->key, cache_data->key_size, buffer, in __nss_common_cache_read() 128 cache_data->key_size = 0; in __nss_common_cache_read() 141 cache_data->key_size = 0; in __nss_common_cache_read() [all …]
|
H A D | nscachedcli.c | 257 const char *key, size_t key_size, const char *data, size_t data_size) in __cached_write() argument 273 result = safe_write(connection, &key_size, sizeof(size_t)); in __cached_write() 285 result = safe_write(connection, key, key_size); in __cached_write() 308 const char *key, size_t key_size, char *data, size_t *data_size) in __cached_read() argument 327 result = safe_write(connection, &key_size, sizeof(size_t)); in __cached_read() 335 result = safe_write(connection, key, key_size); in __cached_read()
|
/dragonfly/contrib/cryptsetup/lib/ |
H A D | libdevmapper.c | 250 for(i = 0; i < key_size; i++) in hex_key() 264 hex_key(hexkey, key_size, key); in get_params() 425 size_t key_size, in dm_create_device() argument 585 int *key_size, in dm_query_device() argument 655 if (key_size) in dm_query_device() 656 *key_size = strlen(key_) / 2; in dm_query_device() 659 if (key_size && key) { in dm_query_device() 660 *key = safe_alloc(*key_size); in dm_query_device() 667 for(i = 0; i < *key_size; i++) { in dm_query_device() 741 size_t key_size, in dm_resume_and_reinstate_key() argument [all …]
|
H A D | internal.h | 81 int *key_size, 89 size_t key_size, const char *key, 93 size_t key_size, 104 void get_key(char *prompt, char **key, unsigned int *passLen, int key_size,
|
H A D | setup.c | 97 char *key = safe_alloc(key_size); in process_key() 98 memset(key, 0, key_size); in process_key() 102 if(passLen < key_size) { in process_key() 104 key_size, key_file); in process_key() 108 memcpy(key, pass, key_size); in process_key() 120 } else if (passLen > key_size) { in process_key() 121 memcpy(key, pass, key_size); in process_key() 344 int key_size, in create_device_helper() argument 370 if (key_size < 0 || key_size > 1024) { in create_device_helper() 635 int key_size, read_only, r; in crypt_resize_device() local [all …]
|
H A D | utils.c | 399 void get_key(char *prompt, char **key, unsigned int *passLen, int key_size, in get_key() argument 417 read_horizon = (key_file && !read_stdin) ? key_size : 0 /* until EOF */; in get_key()
|
H A D | libcryptsetup.h | 542 int key_size; member
|
/dragonfly/sys/dev/drm/amd/lib/ |
H A D | chash.c | 46 if (key_size != 4 && key_size != 8) in chash_table_alloc() 55 bits, key_size, value_size); in chash_table_alloc() 109 table->key_size, table->value_size); in __chash_table_dump_stats() 226 BUG_ON(src.table->key_size != dst.table->key_size); in chash_iter_relocate() 229 if (dst.table->key_size == 4) in chash_iter_relocate() 397 u32 hash = (table->key_size == 4) ? in __chash_table_copy_in() 418 if (table->key_size == 4) in __chash_table_copy_in() 432 u32 hash = (table->key_size == 4) ? in __chash_table_copy_out() 463 static int __init chash_self_test(u8 bits, u8 key_size, in chash_self_test() argument 472 if (key_size == 4 && iterations > 0xffffffff) in chash_self_test() [all …]
|
/dragonfly/usr.sbin/nscd/agents/ |
H A D | services.c | 121 services_lookup_func(const char *key, size_t key_size, char **buffer, in services_lookup_func() argument 137 if (key_size < sizeof(enum nss_lookup_type)) { in services_lookup_func() 145 size = key_size - sizeof(enum nss_lookup_type); in services_lookup_func() 158 if (key_size < sizeof(enum nss_lookup_type) + in services_lookup_func() 167 size = key_size - sizeof(enum nss_lookup_type) - sizeof(int); in services_lookup_func()
|
H A D | group.c | 118 group_lookup_func(const char *key, size_t key_size, char **buffer, in group_lookup_func() argument 132 if (key_size < sizeof(enum nss_lookup_type)) { in group_lookup_func() 140 size = key_size - sizeof(enum nss_lookup_type) + 1; in group_lookup_func() 146 if (key_size < sizeof(enum nss_lookup_type) + in group_lookup_func()
|
H A D | passwd.c | 126 passwd_lookup_func(const char *key, size_t key_size, char **buffer, in passwd_lookup_func() argument 140 if (key_size < sizeof(enum nss_lookup_type)) { in passwd_lookup_func() 148 size = key_size - sizeof(enum nss_lookup_type) + 1; in passwd_lookup_func() 154 if (key_size < sizeof(enum nss_lookup_type) + in passwd_lookup_func()
|
/dragonfly/lib/libc/db/hash/ |
H A D | hash_bigkey.c | 86 int key_size, n; in __big_insert() local 95 key_size = key->size; in __big_insert() 100 for (space = FREESPACE(p) - BIGOVERHEAD; key_size; in __big_insert() 102 move_bytes = MIN(space, key_size); in __big_insert() 105 key_size -= move_bytes; in __big_insert() 117 if (!key_size) { in __big_insert()
|
/dragonfly/sys/dev/crypto/padlock/ |
H A D | padlock.h | 45 u_int key_size : 2; member 57 #define cw_key_size __field.key_size
|
/dragonfly/crypto/libressl/crypto/gost/ |
H A D | gostr341001_ameth.c | 250 int key_size, ret = 0; in pub_encode_gost01() local 265 key_size = GOST_KEY_get_size(ec); in pub_encode_gost01() 279 ret = ASN1_STRING_set(octet, NULL, 2 * key_size); in pub_encode_gost01() 300 GOST_bn2le(X, sptr, key_size); in pub_encode_gost01() 301 GOST_bn2le(Y, sptr + key_size, key_size); in pub_encode_gost01()
|
/dragonfly/contrib/ldns/ |
H A D | tsig.c | 177 int key_size; in ldns_tsig_mac_new() local 244 key_size = ldns_b64_pton(key_data, key_bytes, in ldns_tsig_mac_new() 246 if (key_size < 0) { in ldns_tsig_mac_new() 262 (void) HMAC(digester, key_bytes, key_size, (void *)wireformat, in ldns_tsig_mac_new()
|
/dragonfly/contrib/cryptsetup/src/ |
H A D | cryptsetup.c | 210 .key_size = (opt_key_size ?: DEFAULT_PLAIN_KEYBITS) / 8, in action_create() 281 log_std(" keysize: %d bits\n", options.key_size * 8); in action_status() 298 .key_size = (opt_key_size ?: DEFAULT_LUKS1_KEYBITS) / 8, in _action_luksFormat_generateMK() 416 .key_size = opt_key_file ? (opt_key_size / 8) : 0, /* limit bytes read from keyfile */ in action_luksOpen()
|
/dragonfly/lib/libc/include/ |
H A D | nscache.h | 175 size_t key_size; member
|
/dragonfly/sys/dev/drm/i915/ |
H A D | intel_csr.c | 82 uint32_t key_size; member
|