| /netbsd-src/external/apache2/llvm/dist/llvm/include/llvm/ADT/ |
| H A D | StringMapEntry.h | 24 size_t keyLength; variable 27 explicit StringMapEntryBase(size_t keyLength) : keyLength(keyLength) {} in StringMapEntryBase() argument 29 size_t getKeyLength() const { return keyLength; } in getKeyLength() 71 explicit StringMapEntryStorage(size_t keyLength) in StringMapEntryStorage() argument 72 : StringMapEntryBase(keyLength), second() {} in StringMapEntryStorage() 74 StringMapEntryStorage(size_t keyLength, InitTy &&... initVals) in StringMapEntryStorage() argument 75 : StringMapEntryBase(keyLength), in StringMapEntryStorage() 87 explicit StringMapEntryStorage(size_t keyLength, NoneType none = None) 88 : StringMapEntryBase(keyLength) {} in StringMapEntryBase() argument
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/tcs/ |
| H A D | tcs_key.c | 386 UINT32 keyLength; in UnloadBlob_STORE_PUBKEY() local 388 UnloadBlob_UINT32(offset, &keyLength, blob); in UnloadBlob_STORE_PUBKEY() 390 if (keyLength > 0) in UnloadBlob_STORE_PUBKEY() 391 UnloadBlob(offset, keyLength, blob, NULL); in UnloadBlob_STORE_PUBKEY() 396 UnloadBlob_UINT32(offset, &store->keyLength, blob); in UnloadBlob_STORE_PUBKEY() 398 if (store->keyLength == 0) { in UnloadBlob_STORE_PUBKEY() 402 store->key = (BYTE *)malloc(store->keyLength); in UnloadBlob_STORE_PUBKEY() 404 LogError("malloc of %u bytes failed.", store->keyLength); in UnloadBlob_STORE_PUBKEY() 405 store->keyLength = 0; in UnloadBlob_STORE_PUBKEY() 409 UnloadBlob(offset, store->keyLength, blob, store->key); in UnloadBlob_STORE_PUBKEY() [all …]
|
| H A D | tcs_key_mem_cache.c | 207 tmp->blob->pubKey.keyLength == pub->keyLength && in mc_get_uuid_by_pub() 208 !memcmp(tmp->blob->pubKey.key, pub->key, pub->keyLength)) { in mc_get_uuid_by_pub() 346 if (key_blob->pubKey.keyLength > 0) { in mc_add_entry() 347 entry->blob->pubKey.key = (BYTE *)malloc(key_blob->pubKey.keyLength); in mc_add_entry() 349 LogError("malloc of %u bytes failed.", key_blob->pubKey.keyLength); in mc_add_entry() 355 memcpy(entry->blob->pubKey.key, key_blob->pubKey.key, key_blob->pubKey.keyLength); in mc_add_entry() 357 entry->blob->pubKey.keyLength = key_blob->pubKey.keyLength; in mc_add_entry() 496 entry->blob->pubKey.key = (BYTE *)malloc(key_blob->pubKey.keyLength); in mc_add_entry_init() 498 LogError("malloc of %u bytes failed.", key_blob->pubKey.keyLength); in mc_add_entry_init() 503 memcpy(entry->blob->pubKey.key, key_blob->pubKey.key, key_blob->pubKey.keyLength); in mc_add_entry_init() [all …]
|
| H A D | tcsi_ps.c | 620 pubKey.keyLength = ulPublicInfoLength; in TCSP_GetRegisteredKeyByPublicInfo_Internal() 621 pubKey.key = malloc(pubKey.keyLength); in TCSP_GetRegisteredKeyByPublicInfo_Internal() 623 LogError("malloc of %d bytes failed.", pubKey.keyLength); in TCSP_GetRegisteredKeyByPublicInfo_Internal() 627 memcpy(pubKey.key, rgbPublicInfo, pubKey.keyLength); in TCSP_GetRegisteredKeyByPublicInfo_Internal()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
| H A D | p5_scrypt.c | 26 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER), 180 sparam->keyLength = ASN1_INTEGER_new(); in pkcs5_scrypt_set() 181 if (sparam->keyLength == NULL) in pkcs5_scrypt_set() 183 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) in pkcs5_scrypt_set() 241 if (sparam->keyLength) { in PKCS5_v2_scrypt_keyivgen() 243 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0) in PKCS5_v2_scrypt_keyivgen()
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/ |
| H A D | tsp_asym.c | 56 if (pubKey.pubKey.keyLength < inDataLen) { in __tspi_rsa_encrypt() 64 pubKey.pubKey.key, pubKey.pubKey.keyLength))) in __tspi_rsa_encrypt() 69 pubKey.pubKey.keyLength))) in __tspi_rsa_encrypt() 110 result = Trspi_Verify(type, hash, hashLen, pubKey.pubKey.key, pubKey.pubKey.keyLength, in __tspi_rsa_verify()
|
| H A D | tspi_bind.c | 68 if (keyContainer.pubKey.keyLength < ulDataLength) { in Tspi_Data_Bind() 77 keyContainer.pubKey.keyLength))) in Tspi_Data_Bind() 97 keyContainer.pubKey.keyLength))) { in Tspi_Data_Bind() 120 keyContainer.pubKey.keyLength))) { in Tspi_Data_Bind()
|
| H A D | obj_rsakey.c | 104 rsakey->key.pubKey.keyLength = 0; in obj_rsakey_add() 131 rsaKeyParms.keyLength = 512; in obj_rsakey_add() 133 rsaKeyParms.keyLength = 1024; in obj_rsakey_add() 135 rsaKeyParms.keyLength = 2048; in obj_rsakey_add() 137 rsaKeyParms.keyLength = 4096; in obj_rsakey_add() 139 rsaKeyParms.keyLength = 8192; in obj_rsakey_add() 141 rsaKeyParms.keyLength = 16384; in obj_rsakey_add() 284 rsakey->key.pubKey.keyLength = len/8; in obj_rsakey_set_size() 883 switch (rsakey->key.pubKey.keyLength) { in obj_rsakey_get_size() 894 *len = rsakey->key.pubKey.keyLength * 8; in obj_rsakey_get_size() [all …]
|
| H A D | tsp_own.c | 113 dummyKey.pubKey.keyLength))) { in secret_TakeOwnership() 121 dummyKey.pubKey.keyLength))) { in secret_TakeOwnership()
|
| H A D | tspi_selftest.c | 140 keyContainer.pubKey.key, keyContainer.pubKey.keyLength, in Tspi_TPM_CertifySelfTest()
|
| H A D | tspi_quote.c | 192 keyContainer.pubKey.keyLength, in Tspi_TPM_Quote()
|
| H A D | tsp_key.c | 33 key->pubKey.keyLength = 0; in free_key_refs()
|
| H A D | tspi_migration.c | 209 migAuth.migrationKey.pubKey.keyLength = 0; in Tspi_Key_CreateMigrationBlob()
|
| H A D | tspi_changeauth.c | 280 ephemeralKey.pubKey.keyLength); in Tspi_ChangeAuthAsym()
|
| H A D | tspi_ps.c | 358 switch (keyContainer.pubKey.keyLength) { in Tspi_Context_GetKeyByPublicInfo()
|
| H A D | tspi_ek.c | 202 result |= Trspi_HashUpdate(&hashCtx, pubKey.pubKey.keyLength, in Tspi_TPM_GetPubEndorsementKey()
|
| H A D | tspi_aik.c | 366 caKey.pubKey.key, caKey.pubKey.keyLength, in Tspi_TPM_CollateIdentityRequest()
|
| H A D | tspi_key.c | 485 pubLen = keyContainer.pubKey.keyLength; in Tspi_Context_LoadKeyByBlob()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/crypto/asn1/ |
| H A D | p5_scrypt.c | 28 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER), 179 sparam->keyLength = ASN1_INTEGER_new(); in pkcs5_scrypt_set() 180 if (sparam->keyLength == NULL) in pkcs5_scrypt_set() 182 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) in pkcs5_scrypt_set() 246 if (sparam->keyLength) { in PKCS5_v2_scrypt_keyivgen_ex() 248 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0) in PKCS5_v2_scrypt_keyivgen_ex()
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/tcs/ps/ |
| H A D | tcsps.c | 319 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) { in psfile_is_pub_registered() 378 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) { in psfile_get_uuid_by_pub() 448 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) { in psfile_get_key_by_pub() 585 pub_key_size = key.pubKey.keyLength; in psfile_write_key()
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/include/tss/ |
| H A D | tpm.h | 809 UINT32 keyLength; member 818 UINT32 keyLength; member 827 UINT32 keyLength; member 828 SIZEIS(keyLength) 840 UINT32 keyLength; member 841 SIZEIS(keyLength)
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/trspi/ |
| H A D | trousers.c | 92 pubKey->pubKey.keyLength = 0; in Trspi_UnloadBlob_PUBKEY() 206 Trspi_LoadBlob_UINT32(offset, parms->keyLength, blob); in Trspi_LoadBlob_RSA_KEY_PARMS() 465 Trspi_LoadBlob_UINT32(offset, store->keyLength, blob); in Trspi_LoadBlob_STORE_PUBKEY() 466 Trspi_LoadBlob(offset, store->keyLength, blob, store->key); in Trspi_LoadBlob_STORE_PUBKEY() 662 UINT32 keyLength; in Trspi_UnloadBlob_STORE_PUBKEY() local 664 Trspi_UnloadBlob_UINT32(offset, &keyLength, blob); in Trspi_UnloadBlob_STORE_PUBKEY() 665 Trspi_UnloadBlob(offset, keyLength, blob, NULL); in Trspi_UnloadBlob_STORE_PUBKEY() 670 Trspi_UnloadBlob_UINT32(offset, &store->keyLength, blob); in Trspi_UnloadBlob_STORE_PUBKEY() 672 if (store->keyLength > 0) { in Trspi_UnloadBlob_STORE_PUBKEY() 673 store->key = malloc(store->keyLength); in Trspi_UnloadBlob_STORE_PUBKEY() [all …]
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/ps/ |
| H A D | tspps.c | 527 pub_key_size = key.pubKey.keyLength; in psfile_write_key()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| H A D | x509.h | 312 ASN1_INTEGER *keyLength; member
|
| /netbsd-src/crypto/external/bsd/openssl/dist/include/openssl/ |
| H A D | x509.h.in | 277 ASN1_INTEGER *keyLength; member
|