/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/dh/ |
H A D | dh_ameth.c | 654 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) 666 X509_ALGOR_get0(&aoid, &atype, &aval, alg); 718 X509_ALGOR *alg, *kekalg = NULL; local 727 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) 734 if (OBJ_obj2nid(alg->algorithm) != NID_id_smime_alg_ESDH) { 745 if (alg->parameter->type != V_ASN1_SEQUENCE) 748 p = alg->parameter->value.sequence->data; 749 plen = alg->parameter->value.sequence->length; 801 X509_ALGOR *alg; local 803 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, 653 dh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ec/ |
H A D | ec_ameth.c | 647 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) 657 X509_ALGOR_get0(&aoid, &atype, &aval, alg); 737 X509_ALGOR *alg, *kekalg = NULL; local 745 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) 748 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { 753 if (alg->parameter->type != V_ASN1_SEQUENCE) 756 p = alg->parameter->value.sequence->data; 757 plen = alg->parameter->value.sequence->length; 802 X509_ALGOR *alg; local 804 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, 646 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/ |
H A D | rtl_crypto.h | 122 int crypto_register_alg(struct crypto_alg *alg); 123 int crypto_unregister_alg(struct crypto_alg *alg); 228 struct crypto_alg *alg = tfm->__crt_alg; local 230 if (alg->cra_module) 231 return alg->cra_module->name;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | rtl_crypto.h | 122 int crypto_register_alg(struct crypto_alg *alg); 123 int crypto_unregister_alg(struct crypto_alg *alg); 228 struct crypto_alg *alg = tfm->__crt_alg; local 230 if (alg->cra_module) 231 return alg->cra_module->name;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 222 int alg; local 224 p = simple_get_bytes(p, end, &alg, sizeof(alg)); 228 switch (alg) { 233 alg = ENCTYPE_DES_CBC_RAW; 237 if (!supported_gss_krb5_enctype(alg)) { 239 "encryption key algorithm %d\n", alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192su/ |
H A D | r8192U_wx.c | 918 u8 idx = 0, alg = 0, group = 0; local 920 ext->alg == IW_ENCODE_ALG_NONE) //none is not allowed to use hwsec WB 2008.07.01 926 alg = (ext->alg == IW_ENCODE_ALG_CCMP)?KEY_TYPE_CCMP:ext->alg; // as IW_ENCODE_ALG_CCMP is defined to be 3 and KEY_TYPE_CCMP is defined to 4; 932 if ((!group) || (IW_MODE_ADHOC == ieee->iw_mode) || (alg == KEY_TYPE_WEP40)) 934 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40) ) 935 alg = KEY_TYPE_WEP104; 936 ieee->pairwise_key_type = alg; 941 if ((alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_lib.c | 2096 unsigned long alg,mask,emask; local 2146 printf("ssl3_choose_cipher %d alg= %lx\n", i,c->algorithms); 2149 alg=c->algorithms&(SSL_MKEY_MASK|SSL_AUTH_MASK); 2151 if (alg & SSL_KRB5) 2159 ok=((alg & emask) == alg)?1:0; 2161 printf("%d:[%08lX:%08lX]%p:%s (export)\n",ok,alg,emask, 2167 ok=((alg & mask) == alg)?1:0; 2169 printf("%d:[%08lX:%08lX]%p:%s\n",ok,alg,mas 2188 unsigned long alg; local [all...] |
H A D | ssl_ciph.c | 1083 unsigned long alg,alg2,alg_s; local 1090 alg=cipher->algorithms; 1099 if (alg & SSL_SSLV2) 1101 else if (alg & SSL_SSLV3) 1106 switch (alg&SSL_MKEY_MASK) 1135 switch (alg&SSL_AUTH_MASK) 1162 switch (alg&SSL_ENC_MASK) 1209 switch (alg&SSL_MAC_MASK) 1232 BIO_snprintf(buf,len,format,cipher->name,ver,kx,au,enc,mac,exp_str,alg);
|
H A D | s3_clnt.c | 922 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name, 995 long n,alg; local 1060 alg=s->s3->tmp.new_cipher->algorithms; 1064 if (alg & SSL_kRSA) 1103 if (alg & SSL_aRSA) 1118 else if (alg & SSL_kEDH) 1172 if (alg & SSL_aRSA) 1179 else if (alg & SSL_aDSS) 1187 else if ((alg & SSL_kDHr) || (alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6655/ |
H A D | hostap.c | 494 if (param->u.crypt.alg > WPA_ALG_CCMP) 519 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " hostap_set_encryption: alg %d \n", param->u.crypt.alg); 521 if (param->u.crypt.alg == WPA_ALG_NONE) { 563 if (param->u.crypt.alg == WPA_ALG_WEP) { 614 if (param->u.crypt.alg == WPA_ALG_TKIP) { 623 if (param->u.crypt.alg == WPA_ALG_CCMP) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6656/ |
H A D | hostap.c | 489 if (param->u.crypt.alg > WPA_ALG_CCMP) 514 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " hostap_set_encryption: alg %d \n", param->u.crypt.alg); 516 if (param->u.crypt.alg == WPA_ALG_NONE) { 559 if (param->u.crypt.alg == WPA_ALG_WEP) { 611 if (param->u.crypt.alg == WPA_ALG_TKIP) { 620 if (param->u.crypt.alg == WPA_ALG_CCMP) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | md4.c | 227 static struct shash_alg alg = { variable in typeref:struct:shash_alg 243 return crypto_register_shash(&alg); 248 crypto_unregister_shash(&alg);
|
H A D | tcrypt.c | 48 static char *alg = NULL; variable 719 printk("alg %s ", *name); 726 static inline int tcrypt_test(const char *alg) argument 730 ret = alg_test(alg, alg, 0, 0); 1226 static int do_alg_test(const char *alg, u32 type, u32 mask) argument 1228 return crypto_has_alg(alg, type, mask ?: CRYPTO_ALG_TYPE_MASK) ? 1243 if (alg) 1244 err = do_alg_test(alg, type, mask); 1279 module_param(alg, char [all...] |
H A D | md5.c | 228 static struct shash_alg alg = { variable in typeref:struct:shash_alg 247 return crypto_register_shash(&alg); 252 crypto_unregister_shash(&alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bn/asm/ |
H A D | s390x.S | 46 alg %r7,0(%r3,%r1) // +=rp[i] 53 alg %r9,8(%r3,%r1) 60 alg %r11,16(%r3,%r1) 67 alg %r13,24(%r3,%r1) 78 alg %r7,0(%r3,%r1) // +=rp[i] 85 alg %r9,8(%r3,%r1) 91 alg %r11,16(%r3,%r1) 96 alg %r13,24(%r3,%r1) 115 alg %r7,0(%r3,%r1) // +=rp[i]
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bn/asm/ |
H A D | s390x.S | 46 alg %r7,0(%r3,%r1) // +=rp[i] 53 alg %r9,8(%r3,%r1) 60 alg %r11,16(%r3,%r1) 67 alg %r13,24(%r3,%r1) 78 alg %r7,0(%r3,%r1) // +=rp[i] 85 alg %r9,8(%r3,%r1) 91 alg %r11,16(%r3,%r1) 96 alg %r13,24(%r3,%r1) 115 alg %r7,0(%r3,%r1) // +=rp[i]
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | rabin.h | 66 void GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg);
|
H A D | rsa.cpp | 104 void InvertibleRSAFunction::GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg) 107 alg.GetIntValue(Name::ModulusSize(), modulusSize) || alg.GetIntValue(Name::KeySize(), modulusSize); 112 m_e = alg.GetValueWithDefault(Name::PublicExponent(), Integer(17));
|
H A D | rw.h | 62 void GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/libbcmcrypto/ |
H A D | Makefile | 30 OBJS := aes.o aeskeywrap.o rijndael-alg-fst.o dh.o bn.o sha1.o passhash.o prf.o md5.o hmac.o rc4.o random.o
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/orinoco/ |
H A D | wext.c | 29 enum orinoco_alg alg, const u8 *key, int key_len, 57 switch (alg) { 714 int idx, alg = ext->alg, set_key = 1; local 731 alg = IW_ENCODE_ALG_NONE; 733 if (priv->has_wpa && (alg != IW_ENCODE_ALG_TKIP)) { 740 set_key = ((alg == IW_ENCODE_ALG_TKIP) || 746 switch (alg) { 833 ext->alg = IW_ENCODE_ALG_NONE; 838 ext->alg 28 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/video/davinci/ |
H A D | isif.c | 79 .alg = ISIF_ALAW, 603 if (module_params->compress.alg == ISIF_ALAW) 610 if (module_params->compress.alg == ISIF_DPCM) { 749 if ((isif_cfg.bayer.config_params.compress.alg != 751 (isif_cfg.bayer.config_params.compress.alg != 759 isif_cfg.bayer.config_params.compress.alg = 782 if (isif_cfg.bayer.config_params.compress.alg == ISIF_ALAW || 783 isif_cfg.bayer.config_params.compress.alg == ISIF_DPCM)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/ |
H A D | rt2x00crypto.c | 34 switch (key->alg) { 98 if (key->alg == ALG_TKIP)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/iwlwifi/ |
H A D | iwl-sta.c | 813 priv->stations[IWL_AP_ID].keyinfo.alg = ALG_WEP; 851 priv->stations[sta_id].keyinfo.alg = keyconf->alg; 901 priv->stations[sta_id].keyinfo.alg = keyconf->alg; 950 priv->stations[sta_id].keyinfo.alg = keyconf->alg; 1085 switch (keyconf->alg) { 1097 "Unknown alg: %s alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/hostap/ |
H A D | hostap_ioctl.c | 3185 const char *alg, *module; local 3221 ext->alg == IW_ENCODE_ALG_NONE) { 3227 switch (ext->alg) { 3229 alg = "WEP"; 3233 alg = "TKIP"; 3237 alg = "CCMP"; 3242 local->dev->name, ext->alg); 3247 ops = lib80211_get_crypto_ops(alg); 3250 ops = lib80211_get_crypto_ops(alg); 3253 printk(KERN_DEBUG "%s: unknown crypto alg ' [all...] |