Lines Matching refs:bytes
150 unsigned int bytes;
155 bytes = (key->key_size + 7) / 8;
156 if (bytes > ISC_MD5_BLOCK_LENGTH) {
157 bytes = ISC_MD5_BLOCK_LENGTH;
162 ret = dst__entropy_getdata(data, bytes, ISC_TF(pseudorandom_ok != 0));
167 isc_buffer_init(&b, data, bytes);
168 isc_buffer_add(&b, bytes);
193 unsigned int bytes;
199 bytes = (key->key_size + 7) / 8;
200 if (isc_buffer_availablelength(data) < bytes)
202 isc_buffer_putmem(data, hkey->key, bytes);
247 int bytes = (key->key_size + 7) / 8;
259 priv.elements[cnt].length = bytes;
458 unsigned int bytes;
463 bytes = (key->key_size + 7) / 8;
464 if (bytes > ISC_SHA1_BLOCK_LENGTH) {
465 bytes = ISC_SHA1_BLOCK_LENGTH;
470 ret = dst__entropy_getdata(data, bytes, ISC_TF(pseudorandom_ok != 0));
475 isc_buffer_init(&b, data, bytes);
476 isc_buffer_add(&b, bytes);
501 unsigned int bytes;
507 bytes = (key->key_size + 7) / 8;
508 if (isc_buffer_availablelength(data) < bytes)
510 isc_buffer_putmem(data, hkey->key, bytes);
555 int bytes = (key->key_size + 7) / 8;
567 priv.elements[cnt].length = bytes;
751 unsigned int bytes;
756 bytes = (key->key_size + 7) / 8;
757 if (bytes > ISC_SHA224_BLOCK_LENGTH) {
758 bytes = ISC_SHA224_BLOCK_LENGTH;
763 ret = dst__entropy_getdata(data, bytes, ISC_TF(pseudorandom_ok != 0));
768 isc_buffer_init(&b, data, bytes);
769 isc_buffer_add(&b, bytes);
794 unsigned int bytes;
800 bytes = (key->key_size + 7) / 8;
801 if (isc_buffer_availablelength(data) < bytes)
803 isc_buffer_putmem(data, hkey->key, bytes);
848 int bytes = (key->key_size + 7) / 8;
860 priv.elements[cnt].length = bytes;
1038 unsigned int bytes;
1043 bytes = (key->key_size + 7) / 8;
1044 if (bytes > ISC_SHA256_BLOCK_LENGTH) {
1045 bytes = ISC_SHA256_BLOCK_LENGTH;
1050 ret = dst__entropy_getdata(data, bytes, ISC_TF(pseudorandom_ok != 0));
1055 isc_buffer_init(&b, data, bytes);
1056 isc_buffer_add(&b, bytes);
1081 unsigned int bytes;
1087 bytes = (key->key_size + 7) / 8;
1088 if (isc_buffer_availablelength(data) < bytes)
1090 isc_buffer_putmem(data, hkey->key, bytes);
1135 int bytes = (key->key_size + 7) / 8;
1147 priv.elements[cnt].length = bytes;
1325 unsigned int bytes;
1330 bytes = (key->key_size + 7) / 8;
1331 if (bytes > ISC_SHA384_BLOCK_LENGTH) {
1332 bytes = ISC_SHA384_BLOCK_LENGTH;
1337 ret = dst__entropy_getdata(data, bytes, ISC_TF(pseudorandom_ok != 0));
1342 isc_buffer_init(&b, data, bytes);
1343 isc_buffer_add(&b, bytes);
1368 unsigned int bytes;
1374 bytes = (key->key_size + 7) / 8;
1375 if (isc_buffer_availablelength(data) < bytes)
1377 isc_buffer_putmem(data, hkey->key, bytes);
1422 int bytes = (key->key_size + 7) / 8;
1434 priv.elements[cnt].length = bytes;
1612 unsigned int bytes;
1617 bytes = (key->key_size + 7) / 8;
1618 if (bytes > ISC_SHA512_BLOCK_LENGTH) {
1619 bytes = ISC_SHA512_BLOCK_LENGTH;
1624 ret = dst__entropy_getdata(data, bytes, ISC_TF(pseudorandom_ok != 0));
1629 isc_buffer_init(&b, data, bytes);
1630 isc_buffer_add(&b, bytes);
1655 unsigned int bytes;
1661 bytes = (key->key_size + 7) / 8;
1662 if (isc_buffer_availablelength(data) < bytes)
1664 isc_buffer_putmem(data, hkey->key, bytes);
1709 int bytes = (key->key_size + 7) / 8;
1721 priv.elements[cnt].length = bytes;