Searched refs:key_string (Results 1 - 11 of 11) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/test/scr015/ |
H A D | TestConstruct01.cpp | 136 char *key_string = (char *)readkey.get_data(); local 138 DEBUGOUT("Got: " << key_string << ": " << data_string); 139 int len = strlen(key_string); 144 else if (strcmp(data_string, key_string) != 0) { 157 if (key_string[i] != ('0' + i)) { 158 cout << " got " << key_string 159 << " (" << (int)key_string[i] << ")"
|
H A D | TestKeyRange.cpp | 157 char *key_string = (char *)key.get_data(); local 159 cout << key_string << " : " << data_string << "\n";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/test/scr016/src/com/sleepycat/db/test/ |
H A D | DatabaseTest.java | 298 String key_string = 302 TestUtils.DEBUGOUT("Got: " + key_string + ": " + data_string); 303 int len = key_string.length(); 304 if (len <= 0 || key_string.charAt(len-1) != 'x') { 310 TestUtils.ERR("reread length is bad: expect " + count + " got "+ len + " (" + key_string + ")" ); 312 else if (!data_string.equals(key_string)) { 325 if (key_string.charAt(i) != ('0' + i)) { 326 System.out.print(" got " + key_string 327 + " (" + (int)key_string.charAt(i)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | blowfish.h | 24 void UncheckedSetKey(const byte *key_string, unsigned int keylength, const NameValuePairs ¶ms);
|
H A D | blowfish.cpp | 9 void Blowfish::Base::UncheckedSetKey(const byte *key_string, unsigned int keylength, const NameValuePairs &) argument 24 data = (data << 8) | key_string[j++ % keylength];
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/examples_cxx/ |
H A D | AccessExample.cpp | 157 char *key_string = (char *)key.get_data(); local 159 cout << key_string << " : " << data_string << "\n";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | connection.c | 278 fstring key_string; local 287 snprintf( key_string, sizeof(key_string), "%s/%d/%d", 290 if ( (kbuf->dptr = talloc_strdup(prec, key_string)) == NULL ) 293 kbuf->dsize = strlen(key_string)+1;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/tests/ |
H A D | fipsdrv.c | 2059 const char *key_string = NULL; 2122 key_string = *argv; 2311 if (!key_string) 2313 key_buffer = hex2buffer (key_string, &key_buflen); 2349 if (hex2bin (key_string, key, 16) < 0 ) 2404 if (!key_string) 2406 key_buffer = hex2buffer (key_string, &key_buflen); 2436 if (!key_string) 2438 if (access (key_string, R_OK)) 2448 run_rsa_sign (data, datalen, algo, use_pkcs1, key_string); 2048 const char *key_string = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | fipsdrv.c | 2059 const char *key_string = NULL; 2122 key_string = *argv; 2311 if (!key_string) 2313 key_buffer = hex2buffer (key_string, &key_buflen); 2349 if (hex2bin (key_string, key, 16) < 0 ) 2404 if (!key_string) 2406 key_buffer = hex2buffer (key_string, &key_buflen); 2436 if (!key_string) 2438 if (access (key_string, R_OK)) 2448 run_rsa_sign (data, datalen, algo, use_pkcs1, key_string); 2048 const char *key_string = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/setkey/ |
H A D | parse.y | 121 %type <val> key_string policy_requests 321 | key_string 347 | key_string 361 key_string
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/lib/ |
H A D | keychain.c | 334 DEFUN (key_string,
|
Completed in 199 milliseconds