blocksize 69 source3/client/client.c extern int blocksize; blocksize 112 source3/client/clitar.c static int blocksize=20; blocksize 385 source3/client/clitar.c tbufsiz=blocksize*TBLOCK; blocksize 1286 source3/client/clitar.c blocksize=block; blocksize 1287 source3/client/clitar.c DEBUG(2,("blocksize is now %d\n", blocksize)); blocksize 1775 source3/client/clitar.c if (Optind>=argc || !(blocksize=atoi(argv[Optind]))) { blocksize 50 source3/utils/smbget.c static int blocksize = SMB_DEFAULT_BLOCKSIZE; blocksize 428 source3/utils/smbget.c readbuf = (char *)SMB_MALLOC(blocksize); blocksize 431 source3/utils/smbget.c for(curpos = offset_download; curpos < remotestat.st_size; curpos+=blocksize) { blocksize 432 source3/utils/smbget.c ssize_t bytesread = smbc_read(remotehandle, readbuf, blocksize); blocksize 434 source3/utils/smbget.c fprintf(stderr, "Can't read %u bytes at offset "OFF_T_FORMAT", file %s\n", (unsigned int)blocksize, (OFF_T_FORMAT_CAST)curpos, path); blocksize 584 source3/utils/smbget.c {"blocksize", 'b', POPT_ARG_INT, &blocksize, 'b', "Change number of bytes in a block"}, blocksize 711 source4/heimdal/lib/gssapi/krb5/arcfour.c size_t blocksize = 8; blocksize 714 source4/heimdal/lib/gssapi/krb5/arcfour.c len = 8 + input_length + blocksize + extrasize; blocksize 721 source4/heimdal/lib/gssapi/krb5/arcfour.c (*max_input_size) &= (~(OM_uint32)(blocksize - 1)); blocksize 119 source4/heimdal/lib/gssapi/krb5/wrap.c int blocksize, blocksize 125 source4/heimdal/lib/gssapi/krb5/wrap.c len = 8 + req_output_size + blocksize + extrasize; blocksize 132 source4/heimdal/lib/gssapi/krb5/wrap.c (*max_input_size) &= (~(OM_uint32)(blocksize - 1)); blocksize 834 source4/heimdal/lib/hcrypto/evp.c int ret, left, blocksize; blocksize 855 source4/heimdal/lib/hcrypto/evp.c blocksize = EVP_CIPHER_CTX_block_size(ctx); blocksize 856 source4/heimdal/lib/hcrypto/evp.c left = blocksize - ctx->buf_len; blocksize 870 source4/heimdal/lib/hcrypto/evp.c ret = (*ctx->cipher->do_cipher)(ctx, out, ctx->buf, blocksize); blocksize 871 source4/heimdal/lib/hcrypto/evp.c memset(ctx->buf, 0, blocksize); blocksize 875 source4/heimdal/lib/hcrypto/evp.c *outlen += blocksize; blocksize 878 source4/heimdal/lib/hcrypto/evp.c out = ((unsigned char *)out) + blocksize; blocksize 922 source4/heimdal/lib/hcrypto/evp.c int ret, left, blocksize; blocksize 924 source4/heimdal/lib/hcrypto/evp.c blocksize = EVP_CIPHER_CTX_block_size(ctx); blocksize 926 source4/heimdal/lib/hcrypto/evp.c left = blocksize - ctx->buf_len; blocksize 931 source4/heimdal/lib/hcrypto/evp.c ret = (*ctx->cipher->do_cipher)(ctx, out, ctx->buf, blocksize); blocksize 932 source4/heimdal/lib/hcrypto/evp.c memset(ctx->buf, 0, blocksize); blocksize 936 source4/heimdal/lib/hcrypto/evp.c *outlen += blocksize; blocksize 107 source4/heimdal/lib/krb5/crypto.c size_t blocksize; blocksize 125 source4/heimdal/lib/krb5/crypto.c size_t blocksize; blocksize 1410 source4/heimdal/lib/krb5/crypto.c ipad = malloc(cm->blocksize + len); blocksize 1413 source4/heimdal/lib/krb5/crypto.c opad = malloc(cm->blocksize + cm->checksumsize); blocksize 1418 source4/heimdal/lib/krb5/crypto.c memset(ipad, 0x36, cm->blocksize); blocksize 1419 source4/heimdal/lib/krb5/crypto.c memset(opad, 0x5c, cm->blocksize); blocksize 1421 source4/heimdal/lib/krb5/crypto.c if(keyblock->key->keyvalue.length > cm->blocksize){ blocksize 1438 source4/heimdal/lib/krb5/crypto.c memcpy(ipad + cm->blocksize, data, len); blocksize 1439 source4/heimdal/lib/krb5/crypto.c (*cm->checksum)(context, keyblock, ipad, cm->blocksize + len, blocksize 1441 source4/heimdal/lib/krb5/crypto.c memcpy(opad + cm->blocksize, result->checksum.data, blocksize 1444 source4/heimdal/lib/krb5/crypto.c cm->blocksize + cm->checksumsize, usage, result); blocksize 1445 source4/heimdal/lib/krb5/crypto.c memset(ipad, 0, cm->blocksize + len); blocksize 1447 source4/heimdal/lib/krb5/crypto.c memset(opad, 0, cm->blocksize + cm->checksumsize); blocksize 2335 source4/heimdal/lib/krb5/crypto.c if (result.checksum.length < crypto->et->blocksize) blocksize 2344 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(out, crypto->et->blocksize); blocksize 3591 source4/heimdal/lib/krb5/crypto.c return crypto->et->blocksize; blocksize 3795 source4/heimdal/lib/krb5/crypto.c if(et->blocksize * 8 < kt->bits || len != et->blocksize) { blocksize 3796 source4/heimdal/lib/krb5/crypto.c nblocks = (kt->bits + et->blocksize * 8 - 1) / (et->blocksize * 8); blocksize 3797 source4/heimdal/lib/krb5/crypto.c k = malloc(nblocks * et->blocksize); blocksize 3802 source4/heimdal/lib/krb5/crypto.c ret = _krb5_n_fold(constant, len, k, et->blocksize); blocksize 3810 source4/heimdal/lib/krb5/crypto.c memcpy(k + i * et->blocksize, blocksize 3811 source4/heimdal/lib/krb5/crypto.c k + (i - 1) * et->blocksize, blocksize 3812 source4/heimdal/lib/krb5/crypto.c et->blocksize); blocksize 3813 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize, blocksize 3845 source4/heimdal/lib/krb5/crypto.c DES3_postproc(context, k, nblocks * et->blocksize, key); blocksize 3862 source4/heimdal/lib/krb5/crypto.c memset(k, 0, nblocks * et->blocksize); blocksize 4022 source4/heimdal/lib/krb5/crypto.c size_t *blocksize) blocksize 4024 source4/heimdal/lib/krb5/crypto.c *blocksize = crypto->et->blocksize; blocksize 186 source4/heimdal/lib/krb5/mit_glue.c size_t *blocksize) blocksize 200 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_getblocksize(context, crypto, blocksize); blocksize 222 source4/heimdal/lib/krb5/mit_glue.c size_t blocksize; blocksize 224 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_getblocksize(context, crypto, &blocksize); blocksize 230 source4/heimdal/lib/krb5/mit_glue.c if (blocksize > ivec->length) { blocksize 262 source4/heimdal/lib/krb5/mit_glue.c size_t blocksize; blocksize 264 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_getblocksize(context, crypto, &blocksize); blocksize 270 source4/heimdal/lib/krb5/mit_glue.c if (blocksize > ivec->length) { blocksize 424 source4/torture/basic/misc.c unsigned int blocksize; blocksize 441 source4/torture/basic/misc.c lpar->blocksize = torture_setting_int(tctx, "blocksize",65535); blocksize 569 source4/torture/basic/misc.c wr.writex.in.count = state->lp_params->blocksize; blocksize 578 source4/torture/basic/misc.c (state->readcnt*state->lp_params->blocksize)); blocksize 581 source4/torture/basic/misc.c rd.readx.in.offset = state->readcnt*state->lp_params->blocksize; blocksize 582 source4/torture/basic/misc.c rd.readx.in.mincnt = state->lp_params->blocksize; blocksize 625 source4/torture/basic/misc.c (state->writecnt+1)*state->lp_params->blocksize, blocksize 626 source4/torture/basic/misc.c (state->lp_params->writeblocks*state->lp_params->blocksize)); blocksize 630 source4/torture/basic/misc.c state->lp_params->blocksize; blocksize 633 source4/torture/basic/misc.c state->lp_params->blocksize)- blocksize 635 source4/torture/basic/misc.c lp_params->blocksize); blocksize 636 source4/torture/basic/misc.c wr.writex.in.count = state->lp_params->blocksize; blocksize 680 source4/torture/basic/misc.c writedata = talloc_size(tctx,state->lp_params->blocksize); blocksize 682 source4/torture/basic/misc.c generate_random_buffer(writedata,state->lp_params->blocksize);