/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/ |
H A D | evp_test.c | 135 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument 147 hexdump(stdout,"Key",key,kn); 153 if(kn != c->key_len) 155 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn, 243 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 255 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,multiplier); 370 int kn,in,pn,cn; local 391 kn=convert(key); 403 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/ |
H A D | evp_test.c | 135 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument 147 hexdump(stdout,"Key",key,kn); 153 if(kn != c->key_len) 155 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn, 243 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 255 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,multiplier); 370 int kn,in,pn,cn; local 391 kn=convert(key); 403 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp_test.c | 136 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument 148 hexdump(stdout,"Key",key,kn); 154 if(kn != c->key_len) 156 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn, 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 371 int kn,in,pn,cn; local 391 kn=convert(key); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | evp_test.c | 136 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument 148 hexdump(stdout,"Key",key,kn); 154 if(kn != c->key_len) 156 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn, 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 371 int kn,in,pn,cn; local 391 kn=convert(key); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/projects/GNOME/ |
H A D | team-address | 64 kn) english=Kannada;;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | d1_srvr.c | 779 int nr[4],kn; local 899 kn=EVP_PKEY_size(pkey); 904 kn=0; 907 if (!BUF_MEM_grow_clean(buf,n+DTLS1_HM_HEADER_LENGTH+kn))
|
H A D | s3_srvr.c | 1158 int nr[4],kn; local 1406 kn=EVP_PKEY_size(pkey); 1411 kn=0; 1414 if (!BUF_MEM_grow_clean(buf,n+4+kn))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/modules/ |
H A D | ppp.c | 1631 kstat_named_t *kn = KSTAT_NAMED_PTR(us->kstats); local 1633 strcpy(kn[0].name, "ipackets"); 1634 kn[0].data_type = KSTAT_DATA_ULONG; 1635 strcpy(kn[1].name, "ierrors"); 1636 kn[1].data_type = KSTAT_DATA_ULONG; 1637 strcpy(kn[2].name, "opackets"); 1638 kn[2].data_type = KSTAT_DATA_ULONG; 1639 strcpy(kn[3].name, "oerrors"); 1640 kn[3].data_type = KSTAT_DATA_ULONG;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/solaris/ |
H A D | ppp.c | 1644 kstat_named_t *kn = KSTAT_NAMED_PTR(us->kstats); local 1646 strcpy(kn[0].name, "ipackets"); 1647 kn[0].data_type = KSTAT_DATA_ULONG; 1648 strcpy(kn[1].name, "ierrors"); 1649 kn[1].data_type = KSTAT_DATA_ULONG; 1650 strcpy(kn[2].name, "opackets"); 1651 kn[2].data_type = KSTAT_DATA_ULONG; 1652 strcpy(kn[3].name, "oerrors"); 1653 kn[3].data_type = KSTAT_DATA_ULONG;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/block/ |
H A D | dasd_eckd.c | 141 int dn, kn; local 153 kn = ceil_quot(kl + 6, 232) + 1; 154 return 1729 / (10 + 9 + ceil_quot(kl + 6 * kn, 34) + 161 kn = ceil_quot(kl + 6, 232) + 1; 162 return 1420 / (18 + 7 + ceil_quot(kl + 6 * kn, 34) +
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | s3_srvr.c | 1061 int nr[4],kn; local 1181 kn=EVP_PKEY_size(pkey); 1186 kn=0; 1189 if (!BUF_MEM_grow_clean(buf,n+4+kn))
|