/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | bench.cpp | 159 void BenchMarkKeying(SimpleKeyingInterface &c, size_t keyLength, const NameValuePairs ¶ms) argument 167 c.SetKey(key, keyLength, params); 179 void BenchMarkByName2(const char *factoryName, size_t keyLength = 0, const char *displayName=NULL, const NameValuePairs ¶ms = g_nullNameValuePairs, T_FactoryOutput *x=NULL, T_Interface *y=NULL) 184 else if (keyLength) 185 name += " (" + IntToString(keyLength * 8) + "-bit key)"; 188 if (!keyLength) 189 keyLength = obj->DefaultKeyLength(); 190 obj->SetKey(key, keyLength, CombinedNameValuePairs(params, MakeParameters(Name::IV(), ConstByteArrayParameter(key, obj->IVSize()), false))); 192 BenchMarkKeying(*obj, keyLength, CombinedNameValuePairs(params, MakeParameters(Name::IV(), ConstByteArrayParameter(key, obj->IVSize()), false))); 197 void BenchMarkByName(const char *factoryName, size_t keyLength [all...] |
H A D | trunhash.h | 24 TruncatedHashTemplate(const byte *key, size_t keyLength, unsigned int digestSize) argument 25 : m_hm(key, keyLength), m_digestSize(digestSize) {}
|
H A D | test.cpp | 57 void GenerateRSAKey(unsigned int keyLength, const char *privFilename, const char *pubFilename, const char *seed); 135 unsigned int keyLength; local 138 cin >> keyLength; local 150 GenerateRSAKey(keyLength, privFilename, pubFilename, seed); 388 void GenerateRSAKey(unsigned int keyLength, const char *privFilename, const char *pubFilename, const char *seed) 393 RSAES_OAEP_SHA_Decryptor priv(randPool, keyLength);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/engines/ibmca/ |
H A D | ica_openssl_api.h | 72 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_MODEXPO 96 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_CRT
|
H A D | hw_ibmca.c | 514 publKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_MODEXPO)); 678 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/ibmca/ |
H A D | ica_openssl_api.h | 73 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_MODEXPO 97 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_CRT
|
H A D | hw_ibmca.c | 524 publKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_MODEXPO));
701 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/engines/ibmca/ |
H A D | ica_openssl_api.h | 72 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_MODEXPO 96 unsigned int keyLength; /* Total length of the token. */ member in struct:_ICA_KEY_RSA_CRT
|
H A D | hw_ibmca.c | 514 publKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_MODEXPO)); 678 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ |
H A D | e_4758cca.c | 624 long keyLength; local 661 keyLength = RSA_size(rsa); 663 if (length - RSA_PKCS1_PADDING > keyLength) { 683 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1); 695 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1); 713 OPENSSL_cleanse(hashBuffer, keyLength + 1); 738 long keyLength; local 774 keyLength = RSA_size(rsa); 776 if (length - RSA_PKCS1_PADDING > keyLength) { 795 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/ |
H A D | e_4758cca.c | 641 long keyLength ; local 681 keyLength = RSA_size(rsa); 683 if (length - RSA_PKCS1_PADDING > keyLength) 707 (unsigned int)keyLength+1); 722 (unsigned int)keyLength+1); 742 OPENSSL_cleanse(hashBuffer, keyLength+1); 766 long keyLength ; local 805 keyLength = RSA_size(rsa); 807 if (length - RSA_PKCS1_PADDING > keyLength) 830 (unsigned int)keyLength [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ |
H A D | e_4758cca.c | 624 long keyLength; local 661 keyLength = RSA_size(rsa); 663 if (length - RSA_PKCS1_PADDING > keyLength) { 683 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1); 695 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength + 1); 713 OPENSSL_cleanse(hashBuffer, keyLength + 1); 738 long keyLength; local 774 keyLength = RSA_size(rsa); 776 if (length - RSA_PKCS1_PADDING > keyLength) { 795 ptr = hashBuffer = OPENSSL_malloc((unsigned int)keyLength [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/80211core/ |
H A D | coid.c | 564 if (keyInfo.keyLength == 32) 614 else if (keyInfo.keyLength == 16) 618 else if (keyInfo.keyLength == 0) 644 if (keyInfo.keyLength == 32) 682 else if (keyInfo.keyLength == 16) 688 else if (keyInfo.keyLength == 0) 700 if (keyInfo.keyLength == 5) 704 else if (keyInfo.keyLength == 13) 708 else if (keyInfo.keyLength == 29) 769 if ( keyInfo.keyLength [all...] |
H A D | pub_zfi.h | 289 u8_t keyLength; member in struct:zsKeyInfo
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/ |
H A D | ioctl.c | 1188 keyInfo.keyLength = erq->length; 1417 keyInfo.keyLength = zdreq->addr; 1482 keyInfo.keyLength = zdparm->u.crypt.key_len; 1503 keyInfo.keyLength = 0; 1563 if (keyInfo.keyLength == 5) { 1568 } else if (keyInfo.keyLength == 13) { 1598 if (keyInfo.keyLength > 0) { 1601 for (ii = 0; ii < keyInfo.keyLength; ) { 1787 keyInfo.keyLength = ZM_CENC_KEY_SIZE;
|
H A D | usbdrv.c | 404 keyInfo.keyLength = 5;
|