/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | httpda.c | 135 static void http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]); 185 ((struct http_da_data*)dst->data)->alg = NULL; 228 http_da_calc_HA1(soap, &data->context, data->alg, soap->userid, soap->authrealm, soap->passwd, data->nonce, cnonce, HA1); 293 data->alg = NULL; 321 data->alg = soap_strdup(soap, soap_get_header_attribute(soap, val + 7, "algorithm")); 433 info->alg = soap_strdup(NULL, data->alg); 447 data->alg = info->alg; 462 data->alg 690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | httpda.c | 135 static void http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]); 185 ((struct http_da_data*)dst->data)->alg = NULL; 228 http_da_calc_HA1(soap, &data->context, data->alg, soap->userid, soap->authrealm, soap->passwd, data->nonce, cnonce, HA1); 293 data->alg = NULL; 321 data->alg = soap_strdup(soap, soap_get_header_attribute(soap, val + 7, "algorithm")); 433 info->alg = soap_strdup(NULL, data->alg); 447 data->alg = info->alg; 462 data->alg 690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/missing/crypto/rijndael/ |
H A D | rijndael-api-fst.h | 14 #include <crypto/rijndael/rijndael-alg-fst.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs7/ |
H A D | pk7_lib.c | 240 X509_ALGOR *alg; local 264 alg = sk_X509_ALGOR_value(md_sk, i); 265 if (OBJ_obj2nid(alg->algorithm) == nid) { 271 if (!(alg = X509_ALGOR_new()) 272 || !(alg->parameter = ASN1_TYPE_new())) { 273 X509_ALGOR_free(alg); 277 alg->algorithm = OBJ_nid2obj(nid); 278 alg->parameter->type = V_ASN1_NULL; 279 if (!sk_X509_ALGOR_push(md_sk, alg)) { 280 X509_ALGOR_free(alg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 240 X509_ALGOR *alg; local 264 alg = sk_X509_ALGOR_value(md_sk, i); 265 if (OBJ_obj2nid(alg->algorithm) == nid) { 271 if (!(alg = X509_ALGOR_new()) 272 || !(alg->parameter = ASN1_TYPE_new())) { 273 X509_ALGOR_free(alg); 277 alg->algorithm = OBJ_nid2obj(nid); 278 alg->parameter->type = V_ASN1_NULL; 279 if (!sk_X509_ALGOR_push(md_sk, alg)) { 280 X509_ALGOR_free(alg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/ |
H A D | xfrm_state.c | 111 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type, argument 122 strncpy(alg->alg_name, name, sizeof(alg->alg_name)); 152 alg->alg_key[j] = val; 160 strncpy(alg->alg_key, key, len); 164 alg->alg_key_len = len * 8; 298 struct xfrm_algo alg; member in struct:__anon1172 300 } alg; local 336 memset(&alg, 0, sizeof(alg)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ |
H A D | r8192E_wx.c | 885 u8 idx = 0, alg = 0, group = 0; local 887 ext->alg == IW_ENCODE_ALG_NONE) //none is not allowed to use hwsec WB 2008.07.01 893 alg = (ext->alg == IW_ENCODE_ALG_CCMP)?KEY_TYPE_CCMP:ext->alg; // as IW_ENCODE_ALG_CCMP is defined to be 3 and KEY_TYPE_CCMP is defined to 4; 899 if ((!group) || (IW_MODE_ADHOC == ieee->iw_mode) || (alg == KEY_TYPE_WEP40)) 901 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40) ) 902 alg = KEY_TYPE_WEP104; 903 ieee->pairwise_key_type = alg; 908 if ((alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/ |
H A D | n2_core.c | 240 struct ahash_alg alg; member in struct:n2_ahash_alg 245 struct crypto_alg *alg = tfm->__crt_alg; local 248 ahash_alg = container_of(alg, struct ahash_alg, halg.base); 250 return container_of(ahash_alg, struct n2_ahash_alg, alg); 260 struct crypto_alg *alg = tfm->__crt_alg; local 263 ahash_alg = container_of(alg, struct ahash_alg, halg.base); 265 return container_of(ahash_alg, struct n2_hmac_alg, derived.alg); 690 struct crypto_alg alg; member in struct:n2_cipher_alg 695 struct crypto_alg *alg = tfm->__crt_alg; local 697 return container_of(alg, struc 1352 struct n2_ahash_alg *alg, *alg_tmp; local 1381 struct crypto_alg *alg; local [all...] |
H A D | hifn_795x.c | 633 struct crypto_alg alg; member in struct:hifn_crypto_alg 663 #define crypto_alg_to_hifn(a) container_of(a, struct hifn_crypto_alg, alg) 2451 struct crypto_alg *alg = tfm->__crt_alg; local 2452 struct hifn_crypto_alg *ha = crypto_alg_to_hifn(alg); 2462 struct hifn_crypto_alg *alg; local 2465 alg = kzalloc(sizeof(struct hifn_crypto_alg), GFP_KERNEL); 2466 if (!alg) 2469 snprintf(alg->alg.cra_name, CRYPTO_MAX_ALG_NAME, "%s", t->name); 2470 snprintf(alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ |
H A D | r8192U_wx.c | 908 u8 idx = 0, alg = 0, group = 0; local 910 ext->alg == IW_ENCODE_ALG_NONE) //none is not allowed to use hwsec WB 2008.07.01 913 alg = (ext->alg == IW_ENCODE_ALG_CCMP)?KEY_TYPE_CCMP:ext->alg; // as IW_ENCODE_ALG_CCMP is defined to be 3 and KEY_TYPE_CCMP is defined to 4; 919 if ((!group) || (IW_MODE_ADHOC == ieee->iw_mode) || (alg == KEY_TYPE_WEP40)) 921 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40) ) 922 alg = KEY_TYPE_WEP104; 923 ieee->pairwise_key_type = alg; 928 if ((alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_sd.c | 272 X509_ALGOR *alg; local 329 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); 330 X509_ALGOR_get0(&aoid, NULL, NULL, alg); 336 alg = X509_ALGOR_new(); 337 if (!alg) 339 cms_DigestAlgorithm_set(alg, md); 340 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) { 341 X509_ALGOR_free(alg); 902 X509_ALGOR *alg; local 909 alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_sd.c | 272 X509_ALGOR *alg; local 329 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); 330 X509_ALGOR_get0(&aoid, NULL, NULL, alg); 336 alg = X509_ALGOR_new(); 337 if (!alg) 339 cms_DigestAlgorithm_set(alg, md); 340 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) { 341 X509_ALGOR_free(alg); 902 X509_ALGOR *alg; local 909 alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | iterhash.h | 15 explicit HashInputTooLong(const std::string &alg) argument 16 : InvalidDataFormat("IteratedHashBase: input data exceeds maximum allowed by hash function " + alg) {}
|
H A D | rabin.cpp | 75 void InvertibleRabinFunction::GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg) argument 78 alg.GetIntValue("ModulusSize", modulusSize) || alg.GetIntValue("KeySize", modulusSize);
|
H A D | rw.cpp | 88 void InvertibleRWFunction::GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg) argument 91 alg.GetIntValue("ModulusSize", modulusSize) || alg.GetIntValue("KeySize", modulusSize);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/libipsec/ |
H A D | key_debug.c | 273 struct sadb_alg *alg; local 281 / sizeof(*alg); 282 alg = (struct sadb_alg *)(sup + 1); 286 alg->sadb_alg_id, alg->sadb_alg_ivlen, 287 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 288 alg++;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_sasl.h | 84 char *alg, size_t alen);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/ |
H A D | hash.h | 130 struct crypto_alg *alg) 132 return container_of(alg, struct hash_alg_common, base); 282 static inline struct shash_alg *__crypto_shash_alg(struct crypto_alg *alg) argument 284 return container_of(alg, struct shash_alg, base); 129 __crypto_hash_alg_common( struct crypto_alg *alg) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/ |
H A D | athr_common.h | 79 u8 alg[ZD_CRYPT_ALG_NAME_LEN]; member in struct:athr_wlan_param::__anon15620::__anon15621
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/ |
H A D | key.h | 126 struct ieee80211_key *ieee80211_key_alloc(enum ieee80211_key_alg alg,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | crc32c.c | 224 static struct shash_alg alg = { variable in typeref:struct:shash_alg 247 return crypto_register_shash(&alg); 252 crypto_unregister_shash(&alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bn/asm/ |
H A D | s390x-mont.pl | 179 alg $alo,$stdframe($sp) # +=tp[0] 204 alg $alo,$stdframe($j,$sp)# +=tp[j] 223 alg $NHI,$stdframe($j,$sp)# accumulate previous upmost overflow bit
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/dh/ |
H A D | dh_ameth.c | 654 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) 666 X509_ALGOR_get0(&aoid, &atype, &aval, alg); 718 X509_ALGOR *alg, *kekalg = NULL; local 727 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) 734 if (OBJ_obj2nid(alg->algorithm) != NID_id_smime_alg_ESDH) { 745 if (alg->parameter->type != V_ASN1_SEQUENCE) 748 p = alg->parameter->value.sequence->data; 749 plen = alg->parameter->value.sequence->length; 801 X509_ALGOR *alg; local 803 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, 653 dh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ec/ |
H A D | ec_ameth.c | 647 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) 657 X509_ALGOR_get0(&aoid, &atype, &aval, alg); 737 X509_ALGOR *alg, *kekalg = NULL; local 745 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) 748 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { 753 if (alg->parameter->type != V_ASN1_SEQUENCE) 756 p = alg->parameter->value.sequence->data; 757 plen = alg->parameter->value.sequence->length; 802 X509_ALGOR *alg; local 804 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, 646 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bn/asm/ |
H A D | s390x-mont.pl | 179 alg $alo,$stdframe($sp) # +=tp[0] 204 alg $alo,$stdframe($j,$sp)# +=tp[j] 223 alg $NHI,$stdframe($j,$sp)# accumulate previous upmost overflow bit
|