/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsse2api.c | 1462 @fn int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) 1465 @param[out] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_VRFY_DSA_SHA1, or SOAP_SMD_VRFY_RSA_SHA1 1469 soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) argument 1472 *alg = SOAP_SMD_NONE; 1479 *alg = SOAP_SMD_HMAC_SHA1; 1481 *alg = SOAP_SMD_VRFY_DSA_SHA1; 1483 *alg = SOAP_SMD_VRFY_RSA_SHA1; 1498 @fn int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) 1501 @param[in] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_SIGN_DSA_SHA1, or SOAP_SMD_SIGN_RSA_SHA1 1514 soap_wsse_add_SignatureValue(struct soap *soap, int alg, cons argument 1577 soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument 1705 { int alg; local 1741 soap_wsse_verify_digest(struct soap *soap, int alg, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]) argument 2356 soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen) argument 2403 soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen) argument 2447 soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen) argument 2679 { int alg, keylen = 0; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_lib.c | 238 X509_ALGOR *alg; local 264 alg=sk_X509_ALGOR_value(md_sk,i); 265 if (OBJ_obj2nid(alg->algorithm) == nid) 273 if(!(alg=X509_ALGOR_new()) 274 || !(alg->parameter = ASN1_TYPE_new())) 276 X509_ALGOR_free(alg); 280 alg->algorithm=OBJ_nid2obj(nid); 281 alg->parameter->type = V_ASN1_NULL; 282 if (!sk_X509_ALGOR_push(md_sk,alg)) 284 X509_ALGOR_free(alg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/ipw2x00/ |
H A D | libipw_wx.c | 541 const char *alg, *module; local 562 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP) 572 ext->alg == IW_ENCODE_ALG_NONE) { 597 switch (ext->alg) { 599 alg = "WEP"; 603 alg = "TKIP"; 607 alg = "CCMP"; 611 LIBIPW_DEBUG_WX("%s: unknown crypto alg %d\n", 612 dev->name, ext->alg); 617 ops = lib80211_get_crypto_ops(alg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/amcc/ |
H A D | crypto4xx_core.c | 989 struct crypto_alg *alg = tfm->__crt_alg; local 990 struct crypto4xx_alg *amcc_alg = crypto_alg_to_crypto4xx_alg(alg); 1000 switch (alg->cra_flags & CRYPTO_ALG_TYPE_MASK) { 1025 struct crypto4xx_alg *alg; local 1030 alg = kzalloc(sizeof(struct crypto4xx_alg), GFP_KERNEL); 1031 if (!alg) 1034 alg->alg = crypto_alg[i]; 1035 alg->dev = sec_dev; 1037 switch (alg 1060 struct crypto4xx_alg *alg, *tmp; local [all...] |
H A D | crypto4xx_core.h | 153 struct crypto4xx_alg_common alg; member in struct:crypto4xx_alg 163 struct crypto4xx_alg, alg.u.hash); 166 return container_of(x, struct crypto4xx_alg, alg.u.cipher);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | vmac.c | 605 struct crypto_alg *alg; local 612 alg = crypto_get_attr_alg(tb, CRYPTO_ALG_TYPE_CIPHER, 614 if (IS_ERR(alg)) 615 return PTR_ERR(alg); 617 inst = shash_alloc_instance("vmac", alg); 622 err = crypto_init_spawn(shash_instance_ctx(inst), alg, 628 inst->alg.base.cra_priority = alg->cra_priority; 629 inst->alg.base.cra_blocksize = alg [all...] |
H A D | michael_mic.c | 153 static struct shash_alg alg = { variable in typeref:struct:shash_alg 171 return crypto_register_shash(&alg); 177 crypto_unregister_shash(&alg);
|
H A D | authenc.c | 649 if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME, 654 if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, 659 inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD; 660 inst->alg.cra_flags |= enc->cra_flags & CRYPTO_ALG_ASYNC; 661 inst->alg.cra_priority = enc->cra_priority * 663 inst->alg.cra_blocksize = enc->cra_blocksize; 664 inst->alg.cra_alignmask = auth_base->cra_alignmask | enc->cra_alignmask; 665 inst->alg.cra_type = &crypto_aead_type; 667 inst->alg.cra_aead.ivsize = enc->cra_ablkcipher.ivsize; 668 inst->alg [all...] |
H A D | deflate.c | 168 static struct crypto_alg alg = { variable in typeref:struct:crypto_alg 173 .cra_list = LIST_HEAD_INIT(alg.cra_list), 183 return crypto_register_alg(&alg); 188 crypto_unregister_alg(&alg);
|
H A D | salsa20_generic.c | 214 static struct crypto_alg alg = { variable in typeref:struct:crypto_alg 224 .cra_list = LIST_HEAD_INIT(alg.cra_list), 239 return crypto_register_alg(&alg); 244 crypto_unregister_alg(&alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_req_utils.c | 97 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg) argument 101 if (a->hash_algo == alg) 103 new_alg = X509_ALGOR_dup(alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts_req_utils.c | 97 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg) argument 101 if (a->hash_algo == alg) 103 new_alg = X509_ALGOR_dup(alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/crypto/ |
H A D | crc32c-intel.c | 156 static struct shash_alg alg = { variable in typeref:struct:shash_alg 180 return crypto_register_shash(&alg); 187 crypto_unregister_shash(&alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | sainfo.c | 177 delsainfoalg(alg) 178 struct sainfoalg *alg; 182 for (a = alg; a; a = next) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 31 my ($alg,$bits) = @_; 34 .globl ${alg}${bits}_t4_cbc_encrypt 36 ${alg}${bits}_t4_cbc_encrypt: 63 call _${alg}${bits}_load_enckey 103 call _${alg}${bits}_encrypt_1x 212 call _${alg}${bits}_encrypt_1x 242 .type ${alg}${bits}_t4_cbc_encrypt,#function 243 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 248 my ($alg, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 31 my ($alg,$bits) = @_; 34 .globl ${alg}${bits}_t4_cbc_encrypt 36 ${alg}${bits}_t4_cbc_encrypt: 63 call _${alg}${bits}_load_enckey 103 call _${alg}${bits}_encrypt_1x 212 call _${alg}${bits}_encrypt_1x 242 .type ${alg}${bits}_t4_cbc_encrypt,#function 243 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 248 my ($alg, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/ |
H A D | compress.h | 89 static inline struct pcomp_alg *__crypto_pcomp_alg(struct crypto_alg *alg) argument 91 return container_of(alg, struct pcomp_alg, base);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/ |
H A D | key.c | 230 struct ieee80211_key *ieee80211_key_alloc(enum ieee80211_key_alg alg, argument 252 key->conf.alg = alg; 255 switch (alg) { 293 if (alg == ALG_CCMP) { 305 if (alg == ALG_AES_CMAC) { 335 if (key->conf.alg == ALG_CCMP) 337 if (key->conf.alg == ALG_AES_CMAC)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/ |
H A D | talitos.c | 700 * crypto alg 1386 struct ablkcipher_alg *alg = crypto_ablkcipher_alg(cipher); local 1391 if (keylen < alg->min_keysize || keylen > alg->max_keysize) 1897 } alg; member in struct:talitos_alg_template 1904 .alg.crypto = { 1930 .alg.crypto = { 1957 .alg.crypto = { 1983 .alg.crypto = { 2010 .alg 2245 struct crypto_alg *alg = tfm->__crt_alg; local 2363 struct crypto_alg *alg; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192su/ieee80211/ |
H A D | ieee80211_wx.c | 504 const char *alg; local 526 //printk("not group key, flags:%x, ext->alg:%d\n", ext->ext_flags, ext->alg); 527 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP) 540 ext->alg == IW_ENCODE_ALG_NONE) { 562 switch (ext->alg) { 564 alg = "WEP"; 567 alg = "TKIP"; 570 alg = "CCMP"; 573 IEEE80211_DEBUG_WX("%s: unknown crypto alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | luc.cpp | 107 void InvertibleLUCFunction::GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg) 110 alg.GetIntValue("ModulusSize", modulusSize) || alg.GetIntValue("KeySize", modulusSize); 115 m_e = alg.GetValueWithDefault("PublicExponent", Integer(17));
|
H A D | seckey.h | 48 inline void ThrowIfInvalidRounds(int rounds, const Algorithm *alg) argument 51 throw InvalidRounds(alg->AlgorithmName(), rounds); 54 inline unsigned int GetRoundsAndThrowIfInvalid(const NameValuePairs ¶m, const Algorithm *alg) argument 57 ThrowIfInvalidRounds(rounds, alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8187se/ieee80211/ |
H A D | ieee80211_wx.c | 483 const char *alg; local 490 //printk("======>encoding flag:%x,ext flag:%x, ext alg:%d\n", encoding->flags,ext->ext_flags, ext->alg); 504 //printk("not group key, flags:%x, ext->alg:%d\n", ext->ext_flags, ext->alg); 505 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP) 515 ext->alg == IW_ENCODE_ALG_NONE) { 536 switch (ext->alg) { 538 alg = "WEP"; 541 alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/internal/ |
H A D | aead.h | 45 return spawn->base.alg;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/vdso64/ |
H A D | gettimeofday.S | 36 alg %r1,__VDSO_XTIME_NSEC(%r5) /* + xtime.tv_nsec */
|