/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/ |
H A D | aes.h | 27 u32 key_length; member in struct:crypto_aes_ctx
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/hmac/ |
H A D | hmac.c | 88 &ctx->key_length); 94 ctx->key_length=len; 96 if(ctx->key_length != HMAC_MAX_MD_CBLOCK) 97 memset(&ctx->key[ctx->key_length], 0, 98 HMAC_MAX_MD_CBLOCK - ctx->key_length);
|
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/hmac/ |
H A D | hmac.c | 123 &ctx->key_length)) 129 ctx->key_length = len; 131 if (ctx->key_length != HMAC_MAX_MD_CBLOCK) 132 memset(&ctx->key[ctx->key_length], 0, 133 HMAC_MAX_MD_CBLOCK - ctx->key_length); 219 dctx->key_length = sctx->key_length;
|
H A D | hmac.h | 80 unsigned int key_length; member in struct:hmac_ctx_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/hmac/ |
H A D | hmac.c | 123 &ctx->key_length)) 129 ctx->key_length = len; 131 if (ctx->key_length != HMAC_MAX_MD_CBLOCK) 132 memset(&ctx->key[ctx->key_length], 0, 133 HMAC_MAX_MD_CBLOCK - ctx->key_length); 219 dctx->key_length = sctx->key_length;
|
H A D | hmac.h | 80 unsigned int key_length; member in struct:hmac_ctx_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | hash.h | 33 size_t key_length, 93 size_t Curl_hash_str(void* key, size_t key_length, size_t slots_num);
|
H A D | hash.c | 299 size_t Curl_hash_str(void* key, size_t key_length, size_t slots_num) argument 302 const char *end = key_str + key_length;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ntfs/ |
H A D | index.c | 199 le16_to_cpu(ie->key_length) > 206 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, 228 key_len, &ie->key, le16_to_cpu(ie->key_length)); 366 le16_to_cpu(ie->key_length) > 376 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, 391 key_len, &ie->key, le16_to_cpu(ie->key_length));
|
H A D | dir.c | 140 (u8*)ie + le16_to_cpu(ie->key_length) > 396 (u8*)ie + le16_to_cpu(ie->key_length) > 822 (u8*)ie + le16_to_cpu(ie->key_length) > 1005 (u8*)ie + le16_to_cpu(ie->key_length) >
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libaddns/ |
H A D | dnsrecord.c | 176 uint16 key_length, const uint8 *key, 195 dns_marshall_uint16(buf, key_length); 196 dns_marshall_buffer(buf, key, key_length); 233 dns_unmarshall_uint16(&buf, &tkey->key_length); 237 if (tkey->key_length) { 238 if (!(tkey->key = TALLOC_ARRAY(tkey, uint8, tkey->key_length))) { 246 dns_unmarshall_buffer(&buf, tkey->key, tkey->key_length); 173 dns_create_tkey_record(TALLOC_CTX *mem_ctx, const char *keyname, const char *algorithm_name, time_t inception, time_t expiration, uint16 mode, uint16 error, uint16 key_length, const uint8 *key, struct dns_rrec **prec) argument
|
H A D | dns.h | 337 uint16 key_length; member in struct:dns_tkey_record 413 uint16 key_length, const uint8 *key,
|
H A D | dnsgss.c | 189 input_desc.length = tkey->key_length;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | crypto_polarssl.c | 367 if (cipher->key_length/8 > MAX_CIPHER_KEY_LENGTH) 370 cipher->key_length/8, 393 return cipher_kt->key_length/8; 442 ASSERT (ctx->key_length <= key_len*8);
|
H A D | crypto_backend.h | 457 void hmac_ctx_init (hmac_ctx_t *ctx, const uint8_t *key, int key_length,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | x_pkey.c | 114 ret->key_length = 0;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | x_pkey.c | 117 ret->key_length=0;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | x_pkey.c | 114 ret->key_length = 0;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | serpent.c | 582 serpent_key_prepare (const byte *key, unsigned int key_length, argument 588 for (i = 0; i < key_length / 4; i++) 669 const byte *key, unsigned int key_length) 673 serpent_key_prepare (key, key_length, key_prepared); 681 const byte *key, unsigned int key_length) 701 serpent_setkey_internal (context, key, key_length); 876 int key_length; 914 for (i = 0; test_data[i].key_length; i++) 917 test_data[i].key_length); 923 switch (test_data[i].key_length) 668 serpent_setkey_internal(serpent_context_t *context, const byte *key, unsigned int key_length) argument 680 serpent_setkey(void *ctx, const byte *key, unsigned int key_length) argument 875 int key_length; member in struct:test [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | serpent.c | 582 serpent_key_prepare (const byte *key, unsigned int key_length, argument 588 for (i = 0; i < key_length / 4; i++) 669 const byte *key, unsigned int key_length) 673 serpent_key_prepare (key, key_length, key_prepared); 681 const byte *key, unsigned int key_length) 701 serpent_setkey_internal (context, key, key_length); 876 int key_length; 914 for (i = 0; test_data[i].key_length; i++) 917 test_data[i].key_length); 923 switch (test_data[i].key_length) 668 serpent_setkey_internal(serpent_context_t *context, const byte *key, unsigned int key_length) argument 680 serpent_setkey(void *ctx, const byte *key, unsigned int key_length) argument 875 int key_length; member in struct:test [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s2_srvr.c | 376 unsigned int num_encrypted_key_bytes, key_length; local 489 key_length = (unsigned int)EVP_CIPHER_key_length(c); 490 if (key_length > SSL_MAX_MASTER_KEY_LENGTH) { 502 num_encrypted_key_bytes = key_length; 505 if (s->s2->tmp.clear + num_encrypted_key_bytes != key_length) { 553 s->session->master_key_length = (int)key_length; 554 memcpy(s->session->master_key, p, key_length); 555 OPENSSL_cleanse(p, key_length);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s2_srvr.c | 376 unsigned int num_encrypted_key_bytes, key_length; local 489 key_length = (unsigned int)EVP_CIPHER_key_length(c); 490 if (key_length > SSL_MAX_MASTER_KEY_LENGTH) { 502 num_encrypted_key_bytes = key_length; 505 if (s->s2->tmp.clear + num_encrypted_key_bytes != key_length) { 553 s->session->master_key_length = (int)key_length; 554 memcpy(s->session->master_key, p, key_length); 555 OPENSSL_cleanse(p, key_length);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | aes.c | 98 int key_length; member in struct:aes_ctx 284 ctx->key_length = key_len; 353 if (ctx->key_length > 24) { 358 if (ctx->key_length > 16) { 399 const int key_len = ctx->key_length;
|