/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/zlib-1.2.3/contrib/minizip/ |
H A D | crypt.h | 35 static int decrypt_byte(unsigned long* pkeys, const unsigned long* pcrc_32_tab) argument 41 temp = ((unsigned)(*(pkeys+2)) & 0xffff) | 2; 48 static int update_keys(unsigned long* pkeys,const unsigned long* pcrc_32_tab,int c) argument 50 (*(pkeys+0)) = CRC32((*(pkeys+0)), c); 51 (*(pkeys+1)) += (*(pkeys+0)) & 0xff; 52 (*(pkeys+1)) = (*(pkeys+1)) * 134775813L + 1; 54 register int keyshift = (int)((*(pkeys 65 init_keys(const char* passwd,unsigned long* pkeys,const unsigned long* pcrc_32_tab) argument 94 unsigned long* pkeys; variable [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/minidlna/zlib-1.2.3/contrib/minizip/ |
H A D | crypt.h | 35 static int decrypt_byte(unsigned long* pkeys, const unsigned long* pcrc_32_tab) argument 41 temp = ((unsigned)(*(pkeys+2)) & 0xffff) | 2; 48 static int update_keys(unsigned long* pkeys,const unsigned long* pcrc_32_tab,int c) argument 50 (*(pkeys+0)) = CRC32((*(pkeys+0)), c); 51 (*(pkeys+1)) += (*(pkeys+0)) & 0xff; 52 (*(pkeys+1)) = (*(pkeys+1)) * 134775813L + 1; 54 register int keyshift = (int)((*(pkeys 65 init_keys(const char* passwd,unsigned long* pkeys,const unsigned long* pcrc_32_tab) argument 94 unsigned long* pkeys; variable [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/ssl/ |
H A D | ssl_rsa.c | 193 if (c->pkeys[i].x509 != NULL) 196 pktmp = X509_get_pubkey(c->pkeys[i].x509); 210 if (!X509_check_private_key(c->pkeys[i].x509,pkey)) 217 if (c->pkeys[i].x509 == NULL) 222 c->pkeys[i].x509,pkey)) 239 X509_free(c->pkeys[i].x509); 240 c->pkeys[i].x509=NULL; 246 if (c->pkeys[i].privatekey != NULL) 247 EVP_PKEY_free(c->pkeys[i].privatekey); 249 c->pkeys[ [all...] |
H A D | ssl_cert.c | 168 ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]); 188 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 189 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 241 if (cert->pkeys[i].x509 != NULL) 243 ret->pkeys[i].x509 = cert->pkeys[i].x509; 244 CRYPTO_add(&ret->pkeys[i].x509->references, 1, 248 if (cert->pkeys[ [all...] |
H A D | s2_srvr.c | 460 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 792 n=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 794 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&d); 1084 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 1092 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&p2); 1135 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) 1140 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) 1145 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa;
|
H A D | ssl_lib.c | 1526 cpk= &(c->pkeys[SSL_PKEY_RSA_ENC]); 1529 cpk= &(c->pkeys[SSL_PKEY_RSA_SIGN]); 1531 cpk= &(c->pkeys[SSL_PKEY_DSA_SIGN]); 1533 cpk= &(c->pkeys[SSL_PKEY_DH_RSA]); 1536 cpk= &(c->pkeys[SSL_PKEY_DH_DSA]); 1624 if (c->pkeys[SSL_PKEY_RSA_ENC].x509 == NULL) 1639 if (c->pkeys[i].x509 == NULL) return(NULL); 1640 return(c->pkeys[i].x509); 1652 (c->pkeys[SSL_PKEY_DSA_SIGN].privatekey != NULL)) 1653 return(c->pkeys[SSL_PKEY_DSA_SIG [all...] |
H A D | s3_lib.c | 1200 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 1201 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))) 1327 ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 1328 (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))
|
H A D | s3_srvr.c | 348 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 350 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 1424 pkey=s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey;
|
H A D | ssl_locl.h | 373 CERT_PKEY *key; /* ALWAYS points to an element of the pkeys array 391 CERT_PKEY pkeys[SSL_PKEY_NUM]; member in struct:cert_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_cert.c | 175 ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]); 195 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 196 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 260 if (cert->pkeys[i].x509 != NULL) 262 ret->pkeys[i].x509 = cert->pkeys[i].x509; 263 CRYPTO_add(&ret->pkeys[i].x509->references, 1, 267 if (cert->pkeys[ [all...] |
H A D | ssl_rsa.c | 193 if (c->pkeys[i].x509 != NULL) 196 pktmp = X509_get_pubkey(c->pkeys[i].x509); 209 if (!X509_check_private_key(c->pkeys[i].x509,pkey)) 211 X509_free(c->pkeys[i].x509); 212 c->pkeys[i].x509 = NULL; 217 if (c->pkeys[i].privatekey != NULL) 218 EVP_PKEY_free(c->pkeys[i].privatekey); 220 c->pkeys[i].privatekey=pkey; 221 c->key= &(c->pkeys[i]); 414 if (c->pkeys[ [all...] |
H A D | s2_srvr.c | 442 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 774 n=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 776 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&d); 1068 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 1076 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&p2); 1119 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) 1124 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) 1129 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa;
|
H A D | ssl_lib.c | 1593 cpk= &(c->pkeys[SSL_PKEY_RSA_ENC]); 1596 cpk= &(c->pkeys[SSL_PKEY_RSA_SIGN]); 1598 cpk= &(c->pkeys[SSL_PKEY_DSA_SIGN]); 1600 cpk= &(c->pkeys[SSL_PKEY_DH_RSA]); 1603 cpk= &(c->pkeys[SSL_PKEY_DH_DSA]); 1607 cpk= &(c->pkeys[SSL_PKEY_ECC]); 1671 x = (c->pkeys[SSL_PKEY_ECC]).x509; 1827 if (c->pkeys[SSL_PKEY_RSA_ENC].x509 == NULL) 1842 if (c->pkeys[i].x509 == NULL) return(NULL); 1844 return(c->pkeys[ [all...] |
H A D | s3_lib.c | 1717 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 1718 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))) 1889 ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 1890 (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))
|
H A D | s3_srvr.c | 349 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 351 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 1702 pkey=s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey; 2066 tkey = s->cert->pkeys[SSL_PKEY_ECC].privatekey->pkey.ec;
|
H A D | d1_srvr.c | 340 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 342 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
|
H A D | ssl_locl.h | 409 CERT_PKEY *key; /* ALWAYS points to an element of the pkeys array 432 CERT_PKEY pkeys[SSL_PKEY_NUM]; member in struct:cert_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/infiniband/hw/ipath/ |
H A D | ipath_mad.c | 320 * @pkeys: the pkey table is placed here 322 static int get_pkeys(struct ipath_devdata *dd, u16 * pkeys) argument 326 memcpy(pkeys, pd->port_pkeys, sizeof(pd->port_pkeys)); 698 * @pkeys: the PKEY table 700 static int set_pkeys(struct ipath_devdata *dd, u16 *pkeys) argument 709 u16 key = pkeys[i];
|