/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/x86/crypto/ |
H A D | fpu.c | 85 struct crypto_blkcipher *cipher; local 87 cipher = crypto_spawn_blkcipher(spawn); 88 if (IS_ERR(cipher)) 89 return PTR_ERR(cipher); 91 ctx->child = cipher; 167 MODULE_DESCRIPTION("FPU block cipher wrapper");
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/x86/crypto/ |
H A D | fpu.c | 85 struct crypto_blkcipher *cipher; local 87 cipher = crypto_spawn_blkcipher(spawn); 88 if (IS_ERR(cipher)) 89 return PTR_ERR(cipher); 91 ctx->child = cipher; 167 MODULE_DESCRIPTION("FPU block cipher wrapper");
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/db-4.8.30/crypto/ |
H A D | aes_method.c | 85 __aes_decrypt(env, aes_data, iv, cipher, cipher_len) 89 u_int8_t *cipher; 97 if (iv == NULL || cipher == NULL) 102 * Initialize the cipher 110 if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher, 111 cipher_len * 8, cipher)) < 0) { 156 * Initialize the cipher 252 errstr = "AES cipher in wrong state (not initialized)"; 258 errstr = "AES cipher instance is invalid";
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openvpn/src/openvpn/ |
H A D | crypto.h | 44 * Defines a key type and key length for both cipher and HMAC. 50 const cipher_kt_t *cipher; /**< Cipher static parameters */ member in struct:key_type 55 * Container for unidirectional cipher and HMAC %key material. 60 uint8_t cipher[MAX_CIPHER_KEY_LENGTH]; member in struct:key 61 /**< %Key material for cipher operations. */ 68 * Container for one set of OpenSSL cipher and/or HMAC contexts. 73 cipher_ctx_t *cipher; /**< Generic cipher %context. */ member in struct:key_ctx 82 * Container for bidirectional cipher and HMAC %key material. 119 * Container for two sets of OpenSSL cipher an [all...] |
H A D | crypto_openssl.c | 304 printf ("The following ciphers and cipher modes are available\n" 305 "for use with " PACKAGE_NAME ". Each cipher shown below may be\n" 306 "used as a parameter to the --cipher option. The default\n" 314 const EVP_CIPHER *cipher = EVP_get_cipherbynid (nid); local 315 if (cipher && cipher_ok (OBJ_nid2sn (nid))) 317 const unsigned int mode = EVP_CIPHER_mode (cipher); 325 EVP_CIPHER_key_length (cipher) * 8, 326 ((EVP_CIPHER_flags (cipher) & EVP_CIPH_VARIABLE_LENGTH) ? 480 * Generic cipher key type functions 488 const EVP_CIPHER *cipher local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/db-4.8.30/crypto/ |
H A D | aes_method.c | 85 __aes_decrypt(env, aes_data, iv, cipher, cipher_len) 89 u_int8_t *cipher; 97 if (iv == NULL || cipher == NULL) 102 * Initialize the cipher 110 if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher, 111 cipher_len * 8, cipher)) < 0) { 156 * Initialize the cipher 252 errstr = "AES cipher in wrong state (not initialized)"; 258 errstr = "AES cipher instance is invalid";
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/pem/ |
H A D | pem_seal.c | 100 EVP_CIPHER_CTX_init(&ctx->cipher); 101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk); 136 EVP_EncryptUpdate(&ctx->cipher, buffer, &j, in, i); 165 if (!EVP_EncryptFinal_ex(&ctx->cipher, s, (int *)&i)) 180 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/pem/ |
H A D | pem_seal.c | 101 EVP_CIPHER_CTX_init(&ctx->cipher); 102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 136 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 166 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i); 179 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/pem/ |
H A D | pem_seal.c | 100 EVP_CIPHER_CTX_init(&ctx->cipher); 101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk); 136 EVP_EncryptUpdate(&ctx->cipher, buffer, &j, in, i); 165 if (!EVP_EncryptFinal_ex(&ctx->cipher, s, (int *)&i)) 180 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openvpn/src/openvpn/ |
H A D | crypto.h | 44 * Defines a key type and key length for both cipher and HMAC. 50 const cipher_kt_t *cipher; /**< Cipher static parameters */ member in struct:key_type 55 * Container for unidirectional cipher and HMAC %key material. 60 uint8_t cipher[MAX_CIPHER_KEY_LENGTH]; member in struct:key 61 /**< %Key material for cipher operations. */ 68 * Container for one set of OpenSSL cipher and/or HMAC contexts. 73 cipher_ctx_t *cipher; /**< Generic cipher %context. */ member in struct:key_ctx 82 * Container for bidirectional cipher and HMAC %key material. 119 * Container for two sets of OpenSSL cipher an [all...] |
H A D | crypto_openssl.c | 304 printf ("The following ciphers and cipher modes are available\n" 305 "for use with " PACKAGE_NAME ". Each cipher shown below may be\n" 306 "used as a parameter to the --cipher option. The default\n" 314 const EVP_CIPHER *cipher = EVP_get_cipherbynid (nid); local 315 if (cipher && cipher_ok (OBJ_nid2sn (nid))) 317 const unsigned int mode = EVP_CIPHER_mode (cipher); 325 EVP_CIPHER_key_length (cipher) * 8, 326 ((EVP_CIPHER_flags (cipher) & EVP_CIPH_VARIABLE_LENGTH) ? 480 * Generic cipher key type functions 488 const EVP_CIPHER *cipher local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/pem/ |
H A D | pem_seal.c | 101 EVP_CIPHER_CTX_init(&ctx->cipher); 102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 136 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 166 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i); 179 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/crypto/ |
H A D | ccm.c | 26 struct crypto_spawn cipher; member in struct:ccm_instance_ctx 30 struct crypto_cipher *cipher; member in struct:crypto_ccm_ctx 81 struct crypto_cipher *tfm = ctx->cipher; 251 struct crypto_cipher *cipher = ctx->cipher; local 263 crypto_cipher_encrypt_one(cipher, odata, odata); 268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); 274 get_data_to_compute(cipher, pctx, plain, cryptlen); 436 struct crypto_cipher *cipher; local 441 cipher 482 struct crypto_alg *cipher; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/crypto/ |
H A D | ccm.c | 26 struct crypto_spawn cipher; member in struct:ccm_instance_ctx 30 struct crypto_cipher *cipher; member in struct:crypto_ccm_ctx 81 struct crypto_cipher *tfm = ctx->cipher; 251 struct crypto_cipher *cipher = ctx->cipher; local 263 crypto_cipher_encrypt_one(cipher, odata, odata); 268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); 274 get_data_to_compute(cipher, pctx, plain, cryptlen); 436 struct crypto_cipher *cipher; local 441 cipher 482 struct crypto_alg *cipher; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/apps/ |
H A D | enc.c | 124 const EVP_CIPHER *cipher=NULL,*c; local 153 cipher=EVP_get_cipherbyname(pname); 155 if (!do_zlib && !base64 && (cipher == NULL) 158 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 161 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 289 cipher=c; 292 cipher=NULL; 421 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 428 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), 507 if (cipher ! [all...] |
H A D | smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/apps/ |
H A D | enc.c | 124 const EVP_CIPHER *cipher=NULL,*c; local 153 cipher=EVP_get_cipherbyname(pname); 155 if (!do_zlib && !base64 && (cipher == NULL) 158 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 161 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 289 cipher=c; 292 cipher=NULL; 421 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 428 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), 507 if (cipher ! [all...] |
H A D | smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/apps/ |
H A D | enc.c | 124 const EVP_CIPHER *cipher=NULL,*c; local 153 cipher=EVP_get_cipherbyname(pname); 155 if (!do_zlib && !base64 && (cipher == NULL) 158 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 161 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 289 cipher=c; 292 cipher=NULL; 421 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 428 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), 507 if (cipher ! [all...] |
H A D | smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openvpn/src/openvpn/ |
H A D | crypto_openssl.c | 304 printf ("The following ciphers and cipher modes are available\n" 305 "for use with " PACKAGE_NAME ". Each cipher shown below may be\n" 306 "used as a parameter to the --cipher option. The default\n" 314 const EVP_CIPHER *cipher = EVP_get_cipherbynid (nid); local 315 if (cipher && cipher_ok (OBJ_nid2sn (nid))) 317 const unsigned int mode = EVP_CIPHER_mode (cipher); 325 EVP_CIPHER_key_length (cipher) * 8, 326 ((EVP_CIPHER_flags (cipher) & EVP_CIPH_VARIABLE_LENGTH) ? 480 * Generic cipher key type functions 488 const EVP_CIPHER *cipher local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/apps/ |
H A D | smime.c | 99 const EVP_CIPHER *cipher = NULL; local 151 cipher = EVP_des_ede3_cbc(); 153 cipher = EVP_des_cbc(); 157 cipher = EVP_seed_cbc(); 161 cipher = EVP_rc2_40_cbc(); 163 cipher = EVP_rc2_cbc(); 165 cipher = EVP_rc2_64_cbc(); 169 cipher = EVP_aes_128_cbc(); 171 cipher = EVP_aes_192_cbc(); 173 cipher [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/apps/ |
H A D | smime.c | 99 const EVP_CIPHER *cipher = NULL; local 151 cipher = EVP_des_ede3_cbc(); 153 cipher = EVP_des_cbc(); 157 cipher = EVP_seed_cbc(); 161 cipher = EVP_rc2_40_cbc(); 163 cipher = EVP_rc2_cbc(); 165 cipher = EVP_rc2_64_cbc(); 169 cipher = EVP_aes_128_cbc(); 171 cipher = EVP_aes_192_cbc(); 173 cipher [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/apps/ |
H A D | smime.c | 99 const EVP_CIPHER *cipher = NULL; local 151 cipher = EVP_des_ede3_cbc(); 153 cipher = EVP_des_cbc(); 157 cipher = EVP_seed_cbc(); 161 cipher = EVP_rc2_40_cbc(); 163 cipher = EVP_rc2_cbc(); 165 cipher = EVP_rc2_64_cbc(); 169 cipher = EVP_aes_128_cbc(); 171 cipher = EVP_aes_192_cbc(); 173 cipher [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/pohmelfs/ |
H A D | crypto.c | 60 struct crypto_ablkcipher *cipher; local 65 cipher = crypto_alloc_ablkcipher(psb->cipher_string, 0, 0); 66 if (IS_ERR(cipher)) { 67 err = PTR_ERR(cipher); 68 dprintk("%s: idx: %u: failed to allocate cipher '%s', err: %d.\n", 73 crypto_ablkcipher_clear_flags(cipher, ~0); 75 err = crypto_ablkcipher_setkey(cipher, psb->cipher_key, psb->cipher_keysize); 77 dprintk("%s: idx: %u: failed to set key for cipher '%s', err: %d.\n", 82 return cipher; 85 crypto_free_ablkcipher(cipher); [all...] |