/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | login_cache.c | 69 TDB_DATA keybuf, databuf; local 79 keybuf.dptr = SMB_STRDUP(pdb_get_nt_username(sampass)); 80 if (!keybuf.dptr || !strlen(keybuf.dptr)) { 81 SAFE_FREE(keybuf.dptr); 84 keybuf.dsize = strlen(keybuf.dptr) + 1; 87 keybuf.dptr)); 88 databuf = tdb_fetch(cache, keybuf); 89 SAFE_FREE(keybuf 118 TDB_DATA keybuf, databuf; local 169 TDB_DATA keybuf; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | idmap_cache.c | 107 TDB_DATA keybuf, databuf; local 144 keybuf.dptr = sidkey; 145 keybuf.dsize = strlen(sidkey)+1; 149 " %s (%d seconds %s)\n", keybuf.dptr, valstr , ctime(&timeout), 153 if (tdb_store(cache->tdb, keybuf, databuf, TDB_REPLACE) != 0) { 169 keybuf.dptr = idkey; 170 keybuf.dsize = strlen(idkey)+1; 174 " %s (%d seconds %s)\n", keybuf.dptr, valstr, ctime(&timeout), 178 if (tdb_store(cache->tdb, keybuf, databuf, TDB_REPLACE) != 0) { 194 TDB_DATA keybuf; local 236 TDB_DATA keybuf, databuf; local 275 TDB_DATA keybuf, databuf; local 384 TDB_DATA keybuf, databuf; local 481 TDB_DATA keybuf, databuf; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/befs/ |
H A D | btree.h | 11 loff_t key_no, size_t bufsize, char *keybuf,
|
H A D | btree.c | 401 * @keybuf: Pointer to a buffer to put the key in 406 * return in keybuf/value. 407 * Bufsize is the size of keybuf (BEFS_NAME_LEN+1 is a good size). Keysize is 417 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, 499 befs_error(sb, "befs_btree_read() keybuf too small (%u) " 505 strncpy(keybuf, keystart, keylen); 508 keybuf[keylen] = '\0'; 511 cur_key, keylen, keybuf, *value); 416 befs_btree_read(struct super_block *sb, befs_data_stream * ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | gencache.c | 117 TDB_DATA keybuf, databuf; local 133 keybuf.dptr = CONST_DISCARD(char *, keystr); 134 keybuf.dsize = strlen(keystr)+1; 138 " %s (%d seconds %s)\n", keybuf.dptr, value,ctime(&timeout), 142 ret = tdb_store(cache, keybuf, databuf, 0); 160 TDB_DATA keybuf; local 171 keybuf.dptr = CONST_DISCARD(char *, keystr); 172 keybuf.dsize = strlen(keystr)+1; 174 ret = tdb_delete(cache, keybuf); 195 TDB_DATA keybuf, databu local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/lirc/ |
H A D | lirc_i2c.c | 96 unsigned char keybuf[4]; local 98 keybuf[0] = 0x00; 99 i2c_master_send(&ir->c, keybuf, 1); 101 if (i2c_master_recv(&ir->c, keybuf, sizeof(keybuf)) != sizeof(keybuf)) { 107 keybuf[0], keybuf[1], keybuf[2], keybuf[ 165 add_to_buf_haup_common(void *data, struct lirc_buffer *buf, unsigned char *keybuf, int size, int offset) argument 205 unsigned char keybuf[6]; local 213 unsigned char keybuf[3]; local [all...] |
H A D | lirc_zilog.c | 147 unsigned char keybuf[6]; local 196 ret = i2c_master_recv(&ir->c_rx, keybuf, sizeof(keybuf)); 198 if (ret != sizeof(keybuf)) { 202 ir->b[0] = keybuf[3]; 203 ir->b[1] = keybuf[4]; 204 ir->b[2] = keybuf[5]; 211 if (got_data && (keybuf[0] == 0x80)) 213 else if (got_data && (keybuf[0] == 0x00))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/build_vxworks/test_micro/ |
H A D | b_inmem.c | 37 char *keybuf, *databuf; local 40 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 45 key.data = keybuf; 47 memset(keybuf, 'a', keysize); 66 keybuf[(ops % keysize)] = letters[(ops % 26)]; 95 char *keybuf, *databuf; local 99 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 104 key.data = keybuf; 121 (void)snprintf(keybuf, keysize, "%7d", i); 176 char *keybuf, *databu local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/test_micro/source/ |
H A D | b_inmem.c | 37 char *keybuf, *databuf; local 40 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 45 key.data = keybuf; 47 memset(keybuf, 'a', keysize); 66 keybuf[(ops % keysize)] = letters[(ops % 26)]; 95 char *keybuf, *databuf; local 99 DB_BENCH_ASSERT((keybuf = malloc(keysize)) != NULL); 104 key.data = keybuf; 121 (void)snprintf(keybuf, keysize, "%7d", i); 176 char *keybuf, *databu local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/dvb/dvb-usb/ |
H A D | dvb-usb-remote.c | 309 u8 keybuf[5], u32 *event, int *state) 315 switch (keybuf[0]) { 319 if ((u8) ~keybuf[1] != keybuf[2] || 320 (u8) ~keybuf[3] != keybuf[4]) { 326 if (rc5_custom(&keymap[i]) == keybuf[1] && 327 rc5_data(&keymap[i]) == keybuf[3]) { 338 deb_err("unknown type of remote status: %d\n",keybuf[0]); 308 dvb_usb_nec_rc_key_to_event(struct dvb_usb_device *d, u8 keybuf[5], u32 *event, int *state) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/examples_c/ex_rep/common/ |
H A D | rep_common.c | 37 char keybuf[MAXKEYSIZE + 1], databuf[MAXDATASIZE + 1]; local 56 memcpy(keybuf, key.data, keysize); 57 keybuf[keysize] = '\0'; 63 printf("\t%s\t%s\n", keybuf, databuf);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | asfcrypt.c | 49 * @brief read keys from keybuf into keys 50 * @param keybuf buffer containing the keys 54 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) argument 58 keys[i] = AV_RL32(keybuf + (i << 2)) | 1;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/ |
H A D | asfcrypt.c | 48 * @brief read keys from keybuf into keys 49 * @param keybuf buffer containing the keys 53 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) { argument 56 keys[i] = AV_RL32(keybuf + (i << 2)) | 1;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pem/ |
H A D | pvkfmt.c | 692 unsigned char keybuf[20]; local 707 if (!derive_pvk_key(keybuf, p, saltlen, 720 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL)) 729 memset(keybuf + 5, 0, 11); 730 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL)) 732 OPENSSL_cleanse(keybuf, 20); 743 OPENSSL_cleanse(keybuf, 20); 837 unsigned char keybuf[20]; local 847 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, 851 memset(keybuf [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pem/ |
H A D | pvkfmt.c | 692 unsigned char keybuf[20]; local 707 if (!derive_pvk_key(keybuf, p, saltlen, 720 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL)) 729 memset(keybuf + 5, 0, 11); 730 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL)) 732 OPENSSL_cleanse(keybuf, 20); 743 OPENSSL_cleanse(keybuf, 20); 837 unsigned char keybuf[20]; local 847 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, 851 memset(keybuf [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost_pmeth.c | 512 unsigned char *keybuf = string_to_hex(value, &keylen); local 513 if (!keybuf || keylen != 32) { 516 OPENSSL_free(keybuf); 519 ret = pkey_gost_mac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, 32, keybuf); 520 OPENSSL_free(keybuf);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost_pmeth.c | 512 unsigned char *keybuf = string_to_hex(value, &keylen); local 513 if (!keybuf || keylen != 32) { 516 OPENSSL_free(keybuf); 519 ret = pkey_gost_mac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, 32, keybuf); 520 OPENSSL_free(keybuf);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/examples_cxx/excxx_repquote/ |
H A D | RepQuoteExample.cpp | 400 char keybuf[MAXKEYSIZE + 1], databuf[MAXDATASIZE + 1]; local 405 kbuf = keybuf; 418 cout << "\t" << keybuf << "\t" << databuf << endl;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/samples/rss/ |
H A D | rss.c | 99 char *keybuf; local 104 keybuf = (char*)soap_malloc(soap, len + 1); 107 { char *key = query_key(keybuf, len, &query); /* decode next query string key */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/rss/ |
H A D | rss.c | 99 char *keybuf; local 104 keybuf = (char*)soap_malloc(soap, len + 1); 107 { char *key = query_key(keybuf, len, &query); /* decode next query string key */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cachefiles/ |
H A D | namei.c | 33 u8 *keybuf) 60 if (keybuf) 61 keylen = cookie->def->get_key(cookie->netfs_data, keybuf, 74 printk("%02x", keybuf[loop]); 85 u8 *keybuf; local 87 keybuf = kmalloc(CACHEFILES_KEYBUF_SIZE, GFP_NOIO); 89 __cachefiles_printk_object(object, "", keybuf); 91 __cachefiles_printk_object(xobject, "x", keybuf); 92 kfree(keybuf); 31 __cachefiles_printk_object(struct cachefiles_object *object, const char *prefix, u8 *keybuf) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/hostap/ |
H A D | hostap_main.c | 342 char keybuf[WEP_KEY_LEN + 1]; local 397 len = local->crypt_info.crypt[idx]->ops->get_key(keybuf, sizeof(keybuf), NULL, 403 memset(keybuf, 0, sizeof(keybuf)); 406 keybuf, sizeof(keybuf), 411 keybuf, keylen)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/m68k/include/asm/ |
H A D | openprom.h | 114 struct keybuf *pv_keybuf;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/ipw2x00/ |
H A D | libipw_wx.c | 314 union iwreq_data *wrqu, char *keybuf) 415 memcpy(sec.keys[key], keybuf, erq->length); 492 union iwreq_data *wrqu, char *keybuf) 519 memcpy(keybuf, sec->keys[key], len); 312 libipw_wx_set_encode(struct libipw_device *ieee, struct iw_request_info *info, union iwreq_data *wrqu, char *keybuf) argument 490 libipw_wx_get_encode(struct libipw_device *ieee, struct iw_request_info *info, union iwreq_data *wrqu, char *keybuf) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8187se/ieee80211/ |
H A D | ieee80211_wx.c | 256 union iwreq_data *wrqu, char *keybuf) 354 memcpy(sec.keys[key], keybuf, erq->length); 425 union iwreq_data *wrqu, char *keybuf) 461 len = crypt->ops->get_key(keybuf, WEP_KEY_LEN, NULL, crypt->priv); 254 ieee80211_wx_set_encode(struct ieee80211_device *ieee, struct iw_request_info *info, union iwreq_data *wrqu, char *keybuf) argument 423 ieee80211_wx_get_encode(struct ieee80211_device *ieee, struct iw_request_info *info, union iwreq_data *wrqu, char *keybuf) argument
|