Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - crypto t
Search - crypto t - List
Most code samples included on this CD were developed with Microsoft Visual C++ version 5.0 and the Microsoft Windows CE Toolkit for Visual C++ version 5.0. The Sspi and Crypto samples were developed with Microsoft Visual C++ version 6.0 and the Microsoft Windows CE Toolkit for Visual C++ 6.0. The code in sample applications is ported for a Handheld PC, but the programming concepts that are presented apply to all Windows CE-based platforms. -Most code samples included on this CD were d eveloped with Microsoft Visual C version 5.0 an d the Microsoft Windows CE Toolkit for Visual C v ersion 5.0. The Sspi and Crypto samples were dev eloped with Microsoft Visual C version 6.0 and t he Microsoft Windows CE Toolkit for Visual C 6.0 . The sample code in applications is ported for a Handheld PC, but the programming concepts that are presente d apply to all Windows CE-based platforms.
Update : 2008-10-13 Size : 396.66kb Publisher : 王小彬

加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Update : 2008-10-13 Size : 379.94kb Publisher : Nikii

这是在PCA下的基于IPP库示例代码例子,在网上下了IPP的库之后,设置相关参数就可以编译该代码.-This is the PCA based on the sample code IPP for example, the Internet under the IPP libraries, the provision of the relevant parameters can compile the code.
Update : 2025-02-17 Size : 21kb Publisher : OneGun

Most code samples included on this CD were developed with Microsoft Visual C++ version 5.0 and the Microsoft Windows CE Toolkit for Visual C++ version 5.0. The Sspi and Crypto samples were developed with Microsoft Visual C++ version 6.0 and the Microsoft Windows CE Toolkit for Visual C++ 6.0. The code in sample applications is ported for a Handheld PC, but the programming concepts that are presented apply to all Windows CE-based platforms. -Most code samples included on this CD were d eveloped with Microsoft Visual C version 5.0 an d the Microsoft Windows CE Toolkit for Visual C v ersion 5.0. The Sspi and Crypto samples were dev eloped with Microsoft Visual C version 6.0 and t he Microsoft Windows CE Toolkit for Visual C 6.0 . The sample code in applications is ported for a Handheld PC, but the programming concepts that are presente d apply to all Windows CE-based platforms.
Update : 2025-02-17 Size : 396kb Publisher : 王小彬

加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Update : 2025-02-17 Size : 380kb Publisher : Nikii

A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.
Update : 2025-02-17 Size : 9kb Publisher : ygt

On some platforms, we use NSS for SSL only -- we don t use NSS for crypto or certificate verification, and we don t use the NSS certificate and key databases for Linux. -On some platforms, we use NSS for SSL only -- we don t use NSS for crypto or certificate verification, and we don t use the NSS certificate and key databases for Linux.
Update : 2025-02-17 Size : 6kb Publisher : xujovou

old gpio interface to other kernel modules don t use in new code, will go away in 2.7 have a look at bttv-gpio.c instead.
Update : 2025-02-17 Size : 2kb Publisher : fongctvn

visual basic.NET During the 1990s, far more programmers chose to use Visual Basic than all other programming languages combined. Estimates range 3 million to 6 million active VB developers. In spite of its popularity — or perhaps partly because of it — some programmers lifted their noses into the air, sniffed, and claimed that VB wasn’t a “serious” language. In other words, the languages they used were more difficult (strange punctuation, bizarre vocabulary, confusing syntax, and so on) and sometimes required much more time than VB to finish a project. But in the early days, those languages did have a significant advantage: They could be used to build programs that accomplished some jobs faster and better than VB. In fact, some tasks were simply impossible in VB. Using the Windows Crypto API to encrypt files, for example, required an expert C++ guru. Now, though, you can use VB Express to quite easily tap into more security power than the Crypto API ever offered. No gurus required.-visual basic.NET During the 1990s, far more programmers chose to use Visual Basic than all other programming languages combined. Estimates range 3 million to 6 million active VB developers. In spite of its popularity — or perhaps partly because of it — some programmers lifted their noses into the air, sniffed, and claimed that VB wasn’t a “serious” language. In other words, the languages they used were more difficult (strange punctuation, bizarre vocabulary, confusing syntax, and so on) and sometimes required much more time than VB to finish a project. But in the early days, those languages did have a significant advantage: They could be used to build programs that accomplished some jobs faster and better than VB. In fact, some tasks were simply impossible in VB. Using the Windows Crypto API to encrypt files, for example, required an expert C++ guru. Now, though, you can use VB Express to quite easily tap into more security power than the Crypto API ever offered. No gurus required.
Update : 2025-02-17 Size : 3.21mb Publisher : bek
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.