Searched refs:keylength (Results 1 - 25 of 32) sorted by relevance

12

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/asn1/
H A Dp5_pbev2.c77 ASN1_OPT(PBKDF2PARAM, keylength, ASN1_INTEGER),
152 if(!(kdf->keylength = M_ASN1_INTEGER_new())) goto merr;
153 if(!ASN1_INTEGER_set (kdf->keylength,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dp5_pbev2.c77 ASN1_OPT(PBKDF2PARAM, keylength, ASN1_INTEGER),
152 if(!(kdf->keylength = M_ASN1_INTEGER_new())) goto merr;
153 if(!ASN1_INTEGER_set (kdf->keylength,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/
H A Dcb.c132 RSA *cb_generate_tmp_rsa(SSL *s, int is_export, int keylength) argument
138 rsa_tmp = RSA_generate_key(keylength, RSA_F4, NULL, NULL);
H A Dtunala.h152 RSA *cb_generate_tmp_rsa(SSL *s, int is_export, int keylength);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/
H A Dp5_crpt2.c211 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != keylen)){
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Dp5_crpt2.c223 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfs/
H A Dbfind.c75 fd->keylength = keylen;
202 fd->keylength = keylen;
H A Dbrec.c182 dprint(DBG_BNODE_MOD, "remove_rec: %d, %d\n", fd->record, fd->keylength + fd->entrylength);
200 size = fd->keylength + fd->entrylength;
353 fd->keylength = newkeylen = tree->max_key_len + 1;
354 dprint(DBG_BNODE_MOD, "update_rec: %d, %d, %d\n", rec, fd->keylength, newkeylen);
358 diff = newkeylen - fd->keylength;
H A Dbtree.h75 int keyoffset, keylength; member in struct:hfs_find_data
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus/
H A Dbfind.c75 fd->keylength = keylen;
202 fd->keylength = keylen;
H A Dbrec.c180 dprint(DBG_BNODE_MOD, "remove_rec: %d, %d\n", fd->record, fd->keylength + fd->entrylength);
198 size = fd->keylength + fd->entrylength;
351 fd->keylength = newkeylen = tree->max_key_len + 2;
352 dprint(DBG_BNODE_MOD, "update_rec: %d, %d, %d\n", rec, fd->keylength, newkeylen);
356 diff = newkeylen - fd->keylength;
H A Dhfsplus_fs.h197 int keyoffset, keylength; member in struct:hfs_find_data
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/
H A Dbfind.c98 fd->keylength = keylen;
225 fd->keylength = keylen;
H A Dbrec.c182 dprint(DBG_BNODE_MOD, "remove_rec: %d, %d\n", fd->record, fd->keylength + fd->entrylength);
200 size = fd->keylength + fd->entrylength;
354 fd->keylength = newkeylen = tree->max_key_len + 2;
355 dprint(DBG_BNODE_MOD, "update_rec: %d, %d, %d\n", rec, fd->keylength, newkeylen);
359 diff = newkeylen - fd->keylength;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dssl.h1500 /* NB: the keylength is only applicable when is_export is true */
1504 int keylength));
1508 int keylength));
1513 int keylength));
1516 int keylength));
1521 int keylength));
1524 int keylength));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dssl.h1500 /* NB: the keylength is only applicable when is_export is true */
1504 int keylength));
1508 int keylength));
1513 int keylength));
1516 int keylength));
1521 int keylength));
1524 int keylength));
H A Dssl_lib.c2511 int keylength))
2518 int keylength))
2529 * \param keylength if \c is_export is \c TRUE, then \c keylength is the size
2535 RSA *cb(SSL *ssl,int is_export,int keylength) argument
2547 int keylength))
2553 int keylength))
2561 int keylength))
2567 int keylength))
2509 SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument
2516 SSL_set_tmp_rsa_callback(SSL *ssl,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument
2546 SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument
2552 SSL_set_tmp_dh_callback(SSL *ssl,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument
2560 SSL_CTX_set_tmp_ecdh_callback(SSL_CTX *ctx,EC_KEY *(*ecdh)(SSL *ssl,int is_export, int keylength)) argument
2566 SSL_set_tmp_ecdh_callback(SSL *ssl,EC_KEY *(*ecdh)(SSL *ssl,int is_export, int keylength)) argument
H A Dssltest.c190 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength);
2103 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument
2115 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
2117 if(!RSA_generate_key_ex(rsa_tmp,keylength,bn,NULL))
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dssl.h1446 /* NB: the keylength is only applicable when is_export is true */
1450 int keylength));
1454 int keylength));
1459 int keylength));
1462 int keylength));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Dssl.h1446 /* NB: the keylength is only applicable when is_export is true */
1450 int keylength));
1454 int keylength));
1459 int keylength));
1462 int keylength));
H A Dssltest.c168 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength);
1557 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument
1561 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
1563 rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL);
H A Dssl_lib.c2265 int keylength))
2272 int keylength))
2283 * \param keylength if \c is_export is \c TRUE, then \c keylength is the size
2289 RSA *cb(SSL *ssl,int is_export,int keylength) argument
2301 int keylength))
2307 int keylength))
2263 SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument
2270 SSL_set_tmp_rsa_callback(SSL *ssl,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument
2300 SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument
2306 SSL_set_tmp_dh_callback(SSL *ssl,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/
H A Dssltest.c168 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength);
1557 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument
1561 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
1563 rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/
H A Ds_server.c157 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
1693 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument
1701 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
1704 rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Ds_server.c179 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
1963 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument
1974 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
1978 !RSA_generate_key_ex(rsa_tmp, keylength, bn, NULL))

Completed in 260 milliseconds

12