Searched refs:kn (Results 1 - 11 of 11) sorted by relevance

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/
H A Devp_test.c135 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument
147 hexdump(stdout,"Key",key,kn);
153 if(kn != c->key_len)
155 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn,
243 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
255 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,multiplier);
370 int kn,in,pn,cn; local
391 kn=convert(key);
403 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/
H A Devp_test.c135 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument
147 hexdump(stdout,"Key",key,kn);
153 if(kn != c->key_len)
155 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn,
243 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
255 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,multiplier);
370 int kn,in,pn,cn; local
391 kn=convert(key);
403 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Devp_test.c136 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument
148 hexdump(stdout,"Key",key,kn);
154 if(kn != c->key_len)
156 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn,
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec);
371 int kn,in,pn,cn; local
391 kn=convert(key);
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Devp_test.c136 static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, argument
148 hexdump(stdout,"Key",key,kn);
154 if(kn != c->key_len)
156 fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn,
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec);
371 int kn,in,pn,cn; local
391 kn=convert(key);
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/projects/GNOME/
H A Dteam-address64 kn) english=Kannada;;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dd1_srvr.c779 int nr[4],kn; local
899 kn=EVP_PKEY_size(pkey);
904 kn=0;
907 if (!BUF_MEM_grow_clean(buf,n+DTLS1_HM_HEADER_LENGTH+kn))
H A Ds3_srvr.c1158 int nr[4],kn; local
1406 kn=EVP_PKEY_size(pkey);
1411 kn=0;
1414 if (!BUF_MEM_grow_clean(buf,n+4+kn))
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/modules/
H A Dppp.c1631 kstat_named_t *kn = KSTAT_NAMED_PTR(us->kstats); local
1633 strcpy(kn[0].name, "ipackets");
1634 kn[0].data_type = KSTAT_DATA_ULONG;
1635 strcpy(kn[1].name, "ierrors");
1636 kn[1].data_type = KSTAT_DATA_ULONG;
1637 strcpy(kn[2].name, "opackets");
1638 kn[2].data_type = KSTAT_DATA_ULONG;
1639 strcpy(kn[3].name, "oerrors");
1640 kn[3].data_type = KSTAT_DATA_ULONG;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/solaris/
H A Dppp.c1644 kstat_named_t *kn = KSTAT_NAMED_PTR(us->kstats); local
1646 strcpy(kn[0].name, "ipackets");
1647 kn[0].data_type = KSTAT_DATA_ULONG;
1648 strcpy(kn[1].name, "ierrors");
1649 kn[1].data_type = KSTAT_DATA_ULONG;
1650 strcpy(kn[2].name, "opackets");
1651 kn[2].data_type = KSTAT_DATA_ULONG;
1652 strcpy(kn[3].name, "oerrors");
1653 kn[3].data_type = KSTAT_DATA_ULONG;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/block/
H A Ddasd_eckd.c141 int dn, kn; local
153 kn = ceil_quot(kl + 6, 232) + 1;
154 return 1729 / (10 + 9 + ceil_quot(kl + 6 * kn, 34) +
161 kn = ceil_quot(kl + 6, 232) + 1;
162 return 1420 / (18 + 7 + ceil_quot(kl + 6 * kn, 34) +
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Ds3_srvr.c1061 int nr[4],kn; local
1181 kn=EVP_PKEY_size(pkey);
1186 kn=0;
1189 if (!BUF_MEM_grow_clean(buf,n+4+kn))

Completed in 199 milliseconds