Searched refs:keyRecord (Results 1 - 6 of 6) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/engines/ibmca/
H A Dica_openssl_api.h84 ICA_KEY_RSA_MODEXPO_REC keyRecord; member in struct:_ICA_KEY_RSA_MODEXPO
123 ICA_KEY_RSA_CRT_REC keyRecord; member in struct:_ICA_KEY_RSA_CRT
H A Dhw_ibmca.c515 publKey->expOffset = (char *)publKey->keyRecord - (char *)publKey;
535 * underflow the keyRecord buffer. Bad stuff could happen then
543 BN_bn2bin(p, &publKey->keyRecord[publKey->expLength - BN_num_bytes(p)]);
544 BN_bn2bin(m, &publKey->keyRecord[publKey->expLength]);
550 publKey->expOffset = CORRECT_ENDIANNESS((char *)publKey->keyRecord -
659 if (keyRecordSize > sizeof(privKey->keyRecord)) {
690 offset = (char *)privKey->keyRecord - (char *)privKey;
725 pkey = (char *)privKey->keyRecord;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/ibmca/
H A Dica_openssl_api.h85 ICA_KEY_RSA_MODEXPO_REC keyRecord; member in struct:_ICA_KEY_RSA_MODEXPO
124 ICA_KEY_RSA_CRT_REC keyRecord; member in struct:_ICA_KEY_RSA_CRT
H A Dhw_ibmca.c525 publKey->expOffset = (char *) publKey->keyRecord - (char *) publKey;
543 then we have a big problem and will underflow the keyRecord
553 BN_bn2bin(p, &publKey->keyRecord[publKey->expLength -
555 BN_bn2bin(m, &publKey->keyRecord[publKey->expLength]);
563 publKey->expOffset = CORRECT_ENDIANNESS((char *) publKey->keyRecord -
682 if ( keyRecordSize > sizeof(privKey->keyRecord )) {
714 offset = (char *) privKey->keyRecord
750 pkey = (char *) privKey->keyRecord;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/engines/ibmca/
H A Dica_openssl_api.h84 ICA_KEY_RSA_MODEXPO_REC keyRecord; member in struct:_ICA_KEY_RSA_MODEXPO
123 ICA_KEY_RSA_CRT_REC keyRecord; member in struct:_ICA_KEY_RSA_CRT
H A Dhw_ibmca.c515 publKey->expOffset = (char *)publKey->keyRecord - (char *)publKey;
535 * underflow the keyRecord buffer. Bad stuff could happen then
543 BN_bn2bin(p, &publKey->keyRecord[publKey->expLength - BN_num_bytes(p)]);
544 BN_bn2bin(m, &publKey->keyRecord[publKey->expLength]);
550 publKey->expOffset = CORRECT_ENDIANNESS((char *)publKey->keyRecord -
659 if (keyRecordSize > sizeof(privKey->keyRecord)) {
690 offset = (char *)privKey->keyRecord - (char *)privKey;
725 pkey = (char *)privKey->keyRecord;

Completed in 41 milliseconds