Searched refs:key_length (Results 1 - 25 of 47) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/
H A Daes.h27 u32 key_length; member in struct:crypto_aes_ctx
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/hmac/
H A Dhmac.c88 &ctx->key_length);
94 ctx->key_length=len;
96 if(ctx->key_length != HMAC_MAX_MD_CBLOCK)
97 memset(&ctx->key[ctx->key_length], 0,
98 HMAC_MAX_MD_CBLOCK - ctx->key_length);
H A Dhmac.h81 unsigned int key_length; member in struct:hmac_ctx_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/hmac/
H A Dhmac.c123 &ctx->key_length))
129 ctx->key_length = len;
131 if (ctx->key_length != HMAC_MAX_MD_CBLOCK)
132 memset(&ctx->key[ctx->key_length], 0,
133 HMAC_MAX_MD_CBLOCK - ctx->key_length);
219 dctx->key_length = sctx->key_length;
H A Dhmac.h80 unsigned int key_length; member in struct:hmac_ctx_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/hmac/
H A Dhmac.c123 &ctx->key_length))
129 ctx->key_length = len;
131 if (ctx->key_length != HMAC_MAX_MD_CBLOCK)
132 memset(&ctx->key[ctx->key_length], 0,
133 HMAC_MAX_MD_CBLOCK - ctx->key_length);
219 dctx->key_length = sctx->key_length;
H A Dhmac.h80 unsigned int key_length; member in struct:hmac_ctx_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dhmac.h81 unsigned int key_length; member in struct:hmac_ctx_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dhash.h33 size_t key_length,
93 size_t Curl_hash_str(void* key, size_t key_length, size_t slots_num);
H A Dhash.c299 size_t Curl_hash_str(void* key, size_t key_length, size_t slots_num) argument
302 const char *end = key_str + key_length;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ntfs/
H A Dindex.c199 le16_to_cpu(ie->key_length) >
206 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key,
228 key_len, &ie->key, le16_to_cpu(ie->key_length));
366 le16_to_cpu(ie->key_length) >
376 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key,
391 key_len, &ie->key, le16_to_cpu(ie->key_length));
H A Ddir.c140 (u8*)ie + le16_to_cpu(ie->key_length) >
396 (u8*)ie + le16_to_cpu(ie->key_length) >
822 (u8*)ie + le16_to_cpu(ie->key_length) >
1005 (u8*)ie + le16_to_cpu(ie->key_length) >
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libaddns/
H A Ddnsrecord.c176 uint16 key_length, const uint8 *key,
195 dns_marshall_uint16(buf, key_length);
196 dns_marshall_buffer(buf, key, key_length);
233 dns_unmarshall_uint16(&buf, &tkey->key_length);
237 if (tkey->key_length) {
238 if (!(tkey->key = TALLOC_ARRAY(tkey, uint8, tkey->key_length))) {
246 dns_unmarshall_buffer(&buf, tkey->key, tkey->key_length);
173 dns_create_tkey_record(TALLOC_CTX *mem_ctx, const char *keyname, const char *algorithm_name, time_t inception, time_t expiration, uint16 mode, uint16 error, uint16 key_length, const uint8 *key, struct dns_rrec **prec) argument
H A Ddns.h337 uint16 key_length; member in struct:dns_tkey_record
413 uint16 key_length, const uint8 *key,
H A Ddnsgss.c189 input_desc.length = tkey->key_length;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dcrypto_polarssl.c367 if (cipher->key_length/8 > MAX_CIPHER_KEY_LENGTH)
370 cipher->key_length/8,
393 return cipher_kt->key_length/8;
442 ASSERT (ctx->key_length <= key_len*8);
H A Dcrypto_backend.h457 void hmac_ctx_init (hmac_ctx_t *ctx, const uint8_t *key, int key_length,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/
H A Dx_pkey.c114 ret->key_length = 0;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dx_pkey.c117 ret->key_length=0;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dx_pkey.c114 ret->key_length = 0;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A Dserpent.c582 serpent_key_prepare (const byte *key, unsigned int key_length, argument
588 for (i = 0; i < key_length / 4; i++)
669 const byte *key, unsigned int key_length)
673 serpent_key_prepare (key, key_length, key_prepared);
681 const byte *key, unsigned int key_length)
701 serpent_setkey_internal (context, key, key_length);
876 int key_length;
914 for (i = 0; test_data[i].key_length; i++)
917 test_data[i].key_length);
923 switch (test_data[i].key_length)
668 serpent_setkey_internal(serpent_context_t *context, const byte *key, unsigned int key_length) argument
680 serpent_setkey(void *ctx, const byte *key, unsigned int key_length) argument
875 int key_length; member in struct:test
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dserpent.c582 serpent_key_prepare (const byte *key, unsigned int key_length, argument
588 for (i = 0; i < key_length / 4; i++)
669 const byte *key, unsigned int key_length)
673 serpent_key_prepare (key, key_length, key_prepared);
681 const byte *key, unsigned int key_length)
701 serpent_setkey_internal (context, key, key_length);
876 int key_length;
914 for (i = 0; test_data[i].key_length; i++)
917 test_data[i].key_length);
923 switch (test_data[i].key_length)
668 serpent_setkey_internal(serpent_context_t *context, const byte *key, unsigned int key_length) argument
680 serpent_setkey(void *ctx, const byte *key, unsigned int key_length) argument
875 int key_length; member in struct:test
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Ds2_srvr.c376 unsigned int num_encrypted_key_bytes, key_length; local
489 key_length = (unsigned int)EVP_CIPHER_key_length(c);
490 if (key_length > SSL_MAX_MASTER_KEY_LENGTH) {
502 num_encrypted_key_bytes = key_length;
505 if (s->s2->tmp.clear + num_encrypted_key_bytes != key_length) {
553 s->session->master_key_length = (int)key_length;
554 memcpy(s->session->master_key, p, key_length);
555 OPENSSL_cleanse(p, key_length);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Ds2_srvr.c376 unsigned int num_encrypted_key_bytes, key_length; local
489 key_length = (unsigned int)EVP_CIPHER_key_length(c);
490 if (key_length > SSL_MAX_MASTER_KEY_LENGTH) {
502 num_encrypted_key_bytes = key_length;
505 if (s->s2->tmp.clear + num_encrypted_key_bytes != key_length) {
553 s->session->master_key_length = (int)key_length;
554 memcpy(s->session->master_key, p, key_length);
555 OPENSSL_cleanse(p, key_length);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/
H A Daes.c98 int key_length; member in struct:aes_ctx
284 ctx->key_length = key_len;
353 if (ctx->key_length > 24) {
358 if (ctx->key_length > 16) {
399 const int key_len = ctx->key_length;

Completed in 279 milliseconds

12