Searched refs:cipher (Results 201 - 225 of 1212) sorted by relevance

1234567891011>>

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/x86/crypto/
H A Dfpu.c85 struct crypto_blkcipher *cipher; local
87 cipher = crypto_spawn_blkcipher(spawn);
88 if (IS_ERR(cipher))
89 return PTR_ERR(cipher);
91 ctx->child = cipher;
167 MODULE_DESCRIPTION("FPU block cipher wrapper");
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/x86/crypto/
H A Dfpu.c85 struct crypto_blkcipher *cipher; local
87 cipher = crypto_spawn_blkcipher(spawn);
88 if (IS_ERR(cipher))
89 return PTR_ERR(cipher);
91 ctx->child = cipher;
167 MODULE_DESCRIPTION("FPU block cipher wrapper");
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/db-4.8.30/crypto/
H A Daes_method.c85 __aes_decrypt(env, aes_data, iv, cipher, cipher_len)
89 u_int8_t *cipher;
97 if (iv == NULL || cipher == NULL)
102 * Initialize the cipher
110 if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher,
111 cipher_len * 8, cipher)) < 0) {
156 * Initialize the cipher
252 errstr = "AES cipher in wrong state (not initialized)";
258 errstr = "AES cipher instance is invalid";
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openvpn/src/openvpn/
H A Dcrypto.h44 * Defines a key type and key length for both cipher and HMAC.
50 const cipher_kt_t *cipher; /**< Cipher static parameters */ member in struct:key_type
55 * Container for unidirectional cipher and HMAC %key material.
60 uint8_t cipher[MAX_CIPHER_KEY_LENGTH]; member in struct:key
61 /**< %Key material for cipher operations. */
68 * Container for one set of OpenSSL cipher and/or HMAC contexts.
73 cipher_ctx_t *cipher; /**< Generic cipher %context. */ member in struct:key_ctx
82 * Container for bidirectional cipher and HMAC %key material.
119 * Container for two sets of OpenSSL cipher an
[all...]
H A Dcrypto_openssl.c304 printf ("The following ciphers and cipher modes are available\n"
305 "for use with " PACKAGE_NAME ". Each cipher shown below may be\n"
306 "used as a parameter to the --cipher option. The default\n"
314 const EVP_CIPHER *cipher = EVP_get_cipherbynid (nid); local
315 if (cipher && cipher_ok (OBJ_nid2sn (nid)))
317 const unsigned int mode = EVP_CIPHER_mode (cipher);
325 EVP_CIPHER_key_length (cipher) * 8,
326 ((EVP_CIPHER_flags (cipher) & EVP_CIPH_VARIABLE_LENGTH) ?
480 * Generic cipher key type functions
488 const EVP_CIPHER *cipher local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/db-4.8.30/crypto/
H A Daes_method.c85 __aes_decrypt(env, aes_data, iv, cipher, cipher_len)
89 u_int8_t *cipher;
97 if (iv == NULL || cipher == NULL)
102 * Initialize the cipher
110 if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher,
111 cipher_len * 8, cipher)) < 0) {
156 * Initialize the cipher
252 errstr = "AES cipher in wrong state (not initialized)";
258 errstr = "AES cipher instance is invalid";
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/pem/
H A Dpem_seal.c100 EVP_CIPHER_CTX_init(&ctx->cipher);
101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk);
136 EVP_EncryptUpdate(&ctx->cipher, buffer, &j, in, i);
165 if (!EVP_EncryptFinal_ex(&ctx->cipher, s, (int *)&i))
180 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/pem/
H A Dpem_seal.c101 EVP_CIPHER_CTX_init(&ctx->cipher);
102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk);
136 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i);
166 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i);
179 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/pem/
H A Dpem_seal.c100 EVP_CIPHER_CTX_init(&ctx->cipher);
101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk);
136 EVP_EncryptUpdate(&ctx->cipher, buffer, &j, in, i);
165 if (!EVP_EncryptFinal_ex(&ctx->cipher, s, (int *)&i))
180 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openvpn/src/openvpn/
H A Dcrypto.h44 * Defines a key type and key length for both cipher and HMAC.
50 const cipher_kt_t *cipher; /**< Cipher static parameters */ member in struct:key_type
55 * Container for unidirectional cipher and HMAC %key material.
60 uint8_t cipher[MAX_CIPHER_KEY_LENGTH]; member in struct:key
61 /**< %Key material for cipher operations. */
68 * Container for one set of OpenSSL cipher and/or HMAC contexts.
73 cipher_ctx_t *cipher; /**< Generic cipher %context. */ member in struct:key_ctx
82 * Container for bidirectional cipher and HMAC %key material.
119 * Container for two sets of OpenSSL cipher an
[all...]
H A Dcrypto_openssl.c304 printf ("The following ciphers and cipher modes are available\n"
305 "for use with " PACKAGE_NAME ". Each cipher shown below may be\n"
306 "used as a parameter to the --cipher option. The default\n"
314 const EVP_CIPHER *cipher = EVP_get_cipherbynid (nid); local
315 if (cipher && cipher_ok (OBJ_nid2sn (nid)))
317 const unsigned int mode = EVP_CIPHER_mode (cipher);
325 EVP_CIPHER_key_length (cipher) * 8,
326 ((EVP_CIPHER_flags (cipher) & EVP_CIPH_VARIABLE_LENGTH) ?
480 * Generic cipher key type functions
488 const EVP_CIPHER *cipher local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/pem/
H A Dpem_seal.c101 EVP_CIPHER_CTX_init(&ctx->cipher);
102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk);
136 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i);
166 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i);
179 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/crypto/
H A Dccm.c26 struct crypto_spawn cipher; member in struct:ccm_instance_ctx
30 struct crypto_cipher *cipher; member in struct:crypto_ccm_ctx
81 struct crypto_cipher *tfm = ctx->cipher;
251 struct crypto_cipher *cipher = ctx->cipher; local
263 crypto_cipher_encrypt_one(cipher, odata, odata);
268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen);
274 get_data_to_compute(cipher, pctx, plain, cryptlen);
436 struct crypto_cipher *cipher; local
441 cipher
482 struct crypto_alg *cipher; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/crypto/
H A Dccm.c26 struct crypto_spawn cipher; member in struct:ccm_instance_ctx
30 struct crypto_cipher *cipher; member in struct:crypto_ccm_ctx
81 struct crypto_cipher *tfm = ctx->cipher;
251 struct crypto_cipher *cipher = ctx->cipher; local
263 crypto_cipher_encrypt_one(cipher, odata, odata);
268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen);
274 get_data_to_compute(cipher, pctx, plain, cryptlen);
436 struct crypto_cipher *cipher; local
441 cipher
482 struct crypto_alg *cipher; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/apps/
H A Denc.c124 const EVP_CIPHER *cipher=NULL,*c; local
153 cipher=EVP_get_cipherbyname(pname);
155 if (!do_zlib && !base64 && (cipher == NULL)
158 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
161 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
289 cipher=c;
292 cipher=NULL;
421 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
428 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
507 if (cipher !
[all...]
H A Dsmime.c98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/apps/
H A Denc.c124 const EVP_CIPHER *cipher=NULL,*c; local
153 cipher=EVP_get_cipherbyname(pname);
155 if (!do_zlib && !base64 && (cipher == NULL)
158 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
161 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
289 cipher=c;
292 cipher=NULL;
421 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
428 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
507 if (cipher !
[all...]
H A Dsmime.c98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/apps/
H A Denc.c124 const EVP_CIPHER *cipher=NULL,*c; local
153 cipher=EVP_get_cipherbyname(pname);
155 if (!do_zlib && !base64 && (cipher == NULL)
158 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
161 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
289 cipher=c;
292 cipher=NULL;
421 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
428 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
507 if (cipher !
[all...]
H A Dsmime.c98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openvpn/src/openvpn/
H A Dcrypto_openssl.c304 printf ("The following ciphers and cipher modes are available\n"
305 "for use with " PACKAGE_NAME ". Each cipher shown below may be\n"
306 "used as a parameter to the --cipher option. The default\n"
314 const EVP_CIPHER *cipher = EVP_get_cipherbynid (nid); local
315 if (cipher && cipher_ok (OBJ_nid2sn (nid)))
317 const unsigned int mode = EVP_CIPHER_mode (cipher);
325 EVP_CIPHER_key_length (cipher) * 8,
326 ((EVP_CIPHER_flags (cipher) & EVP_CIPH_VARIABLE_LENGTH) ?
480 * Generic cipher key type functions
488 const EVP_CIPHER *cipher local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/apps/
H A Dsmime.c99 const EVP_CIPHER *cipher = NULL; local
151 cipher = EVP_des_ede3_cbc();
153 cipher = EVP_des_cbc();
157 cipher = EVP_seed_cbc();
161 cipher = EVP_rc2_40_cbc();
163 cipher = EVP_rc2_cbc();
165 cipher = EVP_rc2_64_cbc();
169 cipher = EVP_aes_128_cbc();
171 cipher = EVP_aes_192_cbc();
173 cipher
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/apps/
H A Dsmime.c99 const EVP_CIPHER *cipher = NULL; local
151 cipher = EVP_des_ede3_cbc();
153 cipher = EVP_des_cbc();
157 cipher = EVP_seed_cbc();
161 cipher = EVP_rc2_40_cbc();
163 cipher = EVP_rc2_cbc();
165 cipher = EVP_rc2_64_cbc();
169 cipher = EVP_aes_128_cbc();
171 cipher = EVP_aes_192_cbc();
173 cipher
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/apps/
H A Dsmime.c99 const EVP_CIPHER *cipher = NULL; local
151 cipher = EVP_des_ede3_cbc();
153 cipher = EVP_des_cbc();
157 cipher = EVP_seed_cbc();
161 cipher = EVP_rc2_40_cbc();
163 cipher = EVP_rc2_cbc();
165 cipher = EVP_rc2_64_cbc();
169 cipher = EVP_aes_128_cbc();
171 cipher = EVP_aes_192_cbc();
173 cipher
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/pohmelfs/
H A Dcrypto.c60 struct crypto_ablkcipher *cipher; local
65 cipher = crypto_alloc_ablkcipher(psb->cipher_string, 0, 0);
66 if (IS_ERR(cipher)) {
67 err = PTR_ERR(cipher);
68 dprintk("%s: idx: %u: failed to allocate cipher '%s', err: %d.\n",
73 crypto_ablkcipher_clear_flags(cipher, ~0);
75 err = crypto_ablkcipher_setkey(cipher, psb->cipher_key, psb->cipher_keysize);
77 dprintk("%s: idx: %u: failed to set key for cipher '%s', err: %d.\n",
82 return cipher;
85 crypto_free_ablkcipher(cipher);
[all...]

Completed in 174 milliseconds

1234567891011>>