blocksize 69 source3/client/client.c extern int blocksize;
blocksize 112 source3/client/clitar.c static int blocksize=20;
blocksize 385 source3/client/clitar.c tbufsiz=blocksize*TBLOCK;
blocksize 1286 source3/client/clitar.c blocksize=block;
blocksize 1287 source3/client/clitar.c DEBUG(2,("blocksize is now %d\n", blocksize));
blocksize 1775 source3/client/clitar.c if (Optind>=argc || !(blocksize=atoi(argv[Optind]))) {
blocksize 50 source3/utils/smbget.c static int blocksize = SMB_DEFAULT_BLOCKSIZE;
blocksize 428 source3/utils/smbget.c readbuf = (char *)SMB_MALLOC(blocksize);
blocksize 431 source3/utils/smbget.c for(curpos = offset_download; curpos < remotestat.st_size; curpos+=blocksize) {
blocksize 432 source3/utils/smbget.c ssize_t bytesread = smbc_read(remotehandle, readbuf, blocksize);
blocksize 434 source3/utils/smbget.c fprintf(stderr, "Can't read %u bytes at offset "OFF_T_FORMAT", file %s\n", (unsigned int)blocksize, (OFF_T_FORMAT_CAST)curpos, path);
blocksize 584 source3/utils/smbget.c {"blocksize", 'b', POPT_ARG_INT, &blocksize, 'b', "Change number of bytes in a block"},
blocksize 711 source4/heimdal/lib/gssapi/krb5/arcfour.c size_t blocksize = 8;
blocksize 714 source4/heimdal/lib/gssapi/krb5/arcfour.c len = 8 + input_length + blocksize + extrasize;
blocksize 721 source4/heimdal/lib/gssapi/krb5/arcfour.c (*max_input_size) &= (~(OM_uint32)(blocksize - 1));
blocksize 119 source4/heimdal/lib/gssapi/krb5/wrap.c int blocksize,
blocksize 125 source4/heimdal/lib/gssapi/krb5/wrap.c len = 8 + req_output_size + blocksize + extrasize;
blocksize 132 source4/heimdal/lib/gssapi/krb5/wrap.c (*max_input_size) &= (~(OM_uint32)(blocksize - 1));
blocksize 834 source4/heimdal/lib/hcrypto/evp.c int ret, left, blocksize;
blocksize 855 source4/heimdal/lib/hcrypto/evp.c blocksize = EVP_CIPHER_CTX_block_size(ctx);
blocksize 856 source4/heimdal/lib/hcrypto/evp.c left = blocksize - ctx->buf_len;
blocksize 870 source4/heimdal/lib/hcrypto/evp.c ret = (*ctx->cipher->do_cipher)(ctx, out, ctx->buf, blocksize);
blocksize 871 source4/heimdal/lib/hcrypto/evp.c memset(ctx->buf, 0, blocksize);
blocksize 875 source4/heimdal/lib/hcrypto/evp.c *outlen += blocksize;
blocksize 878 source4/heimdal/lib/hcrypto/evp.c out = ((unsigned char *)out) + blocksize;
blocksize 922 source4/heimdal/lib/hcrypto/evp.c int ret, left, blocksize;
blocksize 924 source4/heimdal/lib/hcrypto/evp.c blocksize = EVP_CIPHER_CTX_block_size(ctx);
blocksize 926 source4/heimdal/lib/hcrypto/evp.c left = blocksize - ctx->buf_len;
blocksize 931 source4/heimdal/lib/hcrypto/evp.c ret = (*ctx->cipher->do_cipher)(ctx, out, ctx->buf, blocksize);
blocksize 932 source4/heimdal/lib/hcrypto/evp.c memset(ctx->buf, 0, blocksize);
blocksize 936 source4/heimdal/lib/hcrypto/evp.c *outlen += blocksize;
blocksize 107 source4/heimdal/lib/krb5/crypto.c size_t blocksize;
blocksize 125 source4/heimdal/lib/krb5/crypto.c size_t blocksize;
blocksize 1410 source4/heimdal/lib/krb5/crypto.c ipad = malloc(cm->blocksize + len);
blocksize 1413 source4/heimdal/lib/krb5/crypto.c opad = malloc(cm->blocksize + cm->checksumsize);
blocksize 1418 source4/heimdal/lib/krb5/crypto.c memset(ipad, 0x36, cm->blocksize);
blocksize 1419 source4/heimdal/lib/krb5/crypto.c memset(opad, 0x5c, cm->blocksize);
blocksize 1421 source4/heimdal/lib/krb5/crypto.c if(keyblock->key->keyvalue.length > cm->blocksize){
blocksize 1438 source4/heimdal/lib/krb5/crypto.c memcpy(ipad + cm->blocksize, data, len);
blocksize 1439 source4/heimdal/lib/krb5/crypto.c (*cm->checksum)(context, keyblock, ipad, cm->blocksize + len,
blocksize 1441 source4/heimdal/lib/krb5/crypto.c memcpy(opad + cm->blocksize, result->checksum.data,
blocksize 1444 source4/heimdal/lib/krb5/crypto.c cm->blocksize + cm->checksumsize, usage, result);
blocksize 1445 source4/heimdal/lib/krb5/crypto.c memset(ipad, 0, cm->blocksize + len);
blocksize 1447 source4/heimdal/lib/krb5/crypto.c memset(opad, 0, cm->blocksize + cm->checksumsize);
blocksize 2335 source4/heimdal/lib/krb5/crypto.c if (result.checksum.length < crypto->et->blocksize)
blocksize 2344 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(out, crypto->et->blocksize);
blocksize 3591 source4/heimdal/lib/krb5/crypto.c return crypto->et->blocksize;
blocksize 3795 source4/heimdal/lib/krb5/crypto.c if(et->blocksize * 8 < kt->bits || len != et->blocksize) {
blocksize 3796 source4/heimdal/lib/krb5/crypto.c nblocks = (kt->bits + et->blocksize * 8 - 1) / (et->blocksize * 8);
blocksize 3797 source4/heimdal/lib/krb5/crypto.c k = malloc(nblocks * et->blocksize);
blocksize 3802 source4/heimdal/lib/krb5/crypto.c ret = _krb5_n_fold(constant, len, k, et->blocksize);
blocksize 3810 source4/heimdal/lib/krb5/crypto.c memcpy(k + i * et->blocksize,
blocksize 3811 source4/heimdal/lib/krb5/crypto.c k + (i - 1) * et->blocksize,
blocksize 3812 source4/heimdal/lib/krb5/crypto.c et->blocksize);
blocksize 3813 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize,
blocksize 3845 source4/heimdal/lib/krb5/crypto.c DES3_postproc(context, k, nblocks * et->blocksize, key);
blocksize 3862 source4/heimdal/lib/krb5/crypto.c memset(k, 0, nblocks * et->blocksize);
blocksize 4022 source4/heimdal/lib/krb5/crypto.c size_t *blocksize)
blocksize 4024 source4/heimdal/lib/krb5/crypto.c *blocksize = crypto->et->blocksize;
blocksize 186 source4/heimdal/lib/krb5/mit_glue.c size_t *blocksize)
blocksize 200 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_getblocksize(context, crypto, blocksize);
blocksize 222 source4/heimdal/lib/krb5/mit_glue.c size_t blocksize;
blocksize 224 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_getblocksize(context, crypto, &blocksize);
blocksize 230 source4/heimdal/lib/krb5/mit_glue.c if (blocksize > ivec->length) {
blocksize 262 source4/heimdal/lib/krb5/mit_glue.c size_t blocksize;
blocksize 264 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_getblocksize(context, crypto, &blocksize);
blocksize 270 source4/heimdal/lib/krb5/mit_glue.c if (blocksize > ivec->length) {
blocksize 424 source4/torture/basic/misc.c unsigned int blocksize;
blocksize 441 source4/torture/basic/misc.c lpar->blocksize = torture_setting_int(tctx, "blocksize",65535);
blocksize 569 source4/torture/basic/misc.c wr.writex.in.count = state->lp_params->blocksize;
blocksize 578 source4/torture/basic/misc.c (state->readcnt*state->lp_params->blocksize));
blocksize 581 source4/torture/basic/misc.c rd.readx.in.offset = state->readcnt*state->lp_params->blocksize;
blocksize 582 source4/torture/basic/misc.c rd.readx.in.mincnt = state->lp_params->blocksize;
blocksize 625 source4/torture/basic/misc.c (state->writecnt+1)*state->lp_params->blocksize,
blocksize 626 source4/torture/basic/misc.c (state->lp_params->writeblocks*state->lp_params->blocksize));
blocksize 630 source4/torture/basic/misc.c state->lp_params->blocksize;
blocksize 633 source4/torture/basic/misc.c state->lp_params->blocksize)-
blocksize 635 source4/torture/basic/misc.c lp_params->blocksize);
blocksize 636 source4/torture/basic/misc.c wr.writex.in.count = state->lp_params->blocksize;
blocksize 680 source4/torture/basic/misc.c writedata = talloc_size(tctx,state->lp_params->blocksize);
blocksize 682 source4/torture/basic/misc.c generate_random_buffer(writedata,state->lp_params->blocksize);