Searched refs:keyLength (Results 1 - 16 of 16) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dbench.cpp159 void BenchMarkKeying(SimpleKeyingInterface &c, size_t keyLength, const NameValuePairs &params) argument
167 c.SetKey(key, keyLength, params);
179 void BenchMarkByName2(const char *factoryName, size_t keyLength = 0, const char *displayName=NULL, const NameValuePairs &params = g_nullNameValuePairs, T_FactoryOutput *x=NULL, T_Interface *y=NULL)
184 else if (keyLength)
185 name += " (" + IntToString(keyLength * 8) + "-bit key)";
188 if (!keyLength)
189 keyLength = obj->DefaultKeyLength();
190 obj->SetKey(key, keyLength, CombinedNameValuePairs(params, MakeParameters(Name::IV(), ConstByteArrayParameter(key, obj->IVSize()), false)));
192 BenchMarkKeying(*obj, keyLength, CombinedNameValuePairs(params, MakeParameters(Name::IV(), ConstByteArrayParameter(key, obj->IVSize()), false)));
197 void BenchMarkByName(const char *factoryName, size_t keyLength
[all...]
H A Dtrunhash.h24 TruncatedHashTemplate(const byte *key, size_t keyLength, unsigned int digestSize) argument
25 : m_hm(key, keyLength), m_digestSize(digestSize) {}
H A Dtest.cpp57 void GenerateRSAKey(unsigned int keyLength, const char *privFilename, const char *pubFilename, const char *seed);
135 unsigned int keyLength; local
138 cin >> keyLength; local
150 GenerateRSAKey(keyLength, privFilename, pubFilename, seed);
388 void GenerateRSAKey(unsigned int keyLength, const char *privFilename, const char *pubFilename, const char *seed)
393 RSAES_OAEP_SHA_Decryptor priv(randPool, keyLength);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/engines/ibmca/
H A Dica_openssl_api.h72 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_MODEXPO
96 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_CRT
H A Dhw_ibmca.c514 publKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_MODEXPO));
678 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/ibmca/
H A Dica_openssl_api.h73 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_MODEXPO
97 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_CRT
H A Dhw_ibmca.c524 publKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_MODEXPO));
701 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/engines/ibmca/
H A Dica_openssl_api.h72 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_MODEXPO
96 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_CRT
H A Dhw_ibmca.c514 publKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_MODEXPO));
678 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/
H A De_4758cca.c624 long keyLength; local
661 keyLength = RSA_size(rsa);
663 if (length - RSA_PKCS1_PADDING > keyLength) {
683 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1);
695 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1);
713 OPENSSL_cleanse(hashBuffer, keyLength + 1);
738 long keyLength; local
774 keyLength = RSA_size(rsa);
776 if (length - RSA_PKCS1_PADDING > keyLength) {
795 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/
H A De_4758cca.c641 long keyLength ; local
681 keyLength = RSA_size(rsa);
683 if (length - RSA_PKCS1_PADDING > keyLength)
707 (unsigned int)keyLength+1);
722 (unsigned int)keyLength+1);
742 OPENSSL_cleanse(hashBuffer, keyLength+1);
766 long keyLength ; local
805 keyLength = RSA_size(rsa);
807 if (length - RSA_PKCS1_PADDING > keyLength)
830 (unsigned int)keyLength
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/
H A De_4758cca.c624 long keyLength; local
661 keyLength = RSA_size(rsa);
663 if (length - RSA_PKCS1_PADDING > keyLength) {
683 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1);
695 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1);
713 OPENSSL_cleanse(hashBuffer, keyLength + 1);
738 long keyLength; local
774 keyLength = RSA_size(rsa);
776 if (length - RSA_PKCS1_PADDING > keyLength) {
795 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/80211core/
H A Dcoid.c564 if (keyInfo.keyLength == 32)
614 else if (keyInfo.keyLength == 16)
618 else if (keyInfo.keyLength == 0)
644 if (keyInfo.keyLength == 32)
682 else if (keyInfo.keyLength == 16)
688 else if (keyInfo.keyLength == 0)
700 if (keyInfo.keyLength == 5)
704 else if (keyInfo.keyLength == 13)
708 else if (keyInfo.keyLength == 29)
769 if ( keyInfo.keyLength
[all...]
H A Dpub_zfi.h289 u8_t keyLength; member in struct:zsKeyInfo
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/
H A Dioctl.c1188 keyInfo.keyLength = erq->length;
1417 keyInfo.keyLength = zdreq->addr;
1482 keyInfo.keyLength = zdparm->u.crypt.key_len;
1503 keyInfo.keyLength = 0;
1563 if (keyInfo.keyLength == 5) {
1568 } else if (keyInfo.keyLength == 13) {
1598 if (keyInfo.keyLength > 0) {
1601 for (ii = 0; ii < keyInfo.keyLength; ) {
1787 keyInfo.keyLength = ZM_CENC_KEY_SIZE;
H A Dusbdrv.c404 keyInfo.keyLength = 5;

Completed in 109 milliseconds