/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | esign.h | 73 void GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg);
|
H A D | pubkey.h | 1000 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local 1005 alg.Sign(params, key.GetPrivateExponent(), k, e, r, s); 1023 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local 1043 alg.Sign(params, key.GetPrivateExponent(), k, e, r, s); 1051 alg.Sign(params, key.GetPrivateExponent(), ma.m_k, e, r, s); 1054 size_t rLen = alg.RLen(params); 1056 s.Encode(signature+rLen, alg.SLen(params)); 1072 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); 1089 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local 1092 size_t rLen = alg 1104 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local 1124 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/cris/include/arch-v32/arch/ |
H A D | cryptocop.h | 146 cryptocop_algorithm alg; member in struct:cryptocop_transform_init 152 cryptocop_csum_type csum_mode; /* cryptocop_csum_none is not allowed when alg==cryptocop_alg_csum */
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/libipsec/ |
H A D | pfkey.c | 215 struct sadb_alg *alg; local 217 alg = findsupportedalg(satype, alg_id); 218 if (!alg) 221 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 222 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 244 struct sadb_alg *alg; local 265 alg = findsupportedalg(satype, alg_id); 266 if (!alg) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_sasl.c | 278 * alg [in/out] - The buffer where the algorithm will be stored. 286 char *alg, size_t alen) 316 if(!sasl_digest_get_key_value((char *)chlg, "algorithm=", alg, alen, ',')) { 283 Curl_sasl_decode_digest_md5_message(const char *chlg64, char *nonce, size_t nlen, char *realm, size_t rlen, char *alg, size_t alen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/amcc/ |
H A D | crypto4xx_alg.c | 184 struct crypto_alg *alg = tfm->__crt_alg; local 185 struct crypto4xx_alg *my_alg = crypto_alg_to_crypto4xx_alg(alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/ |
H A D | swsusp_asm64.S | 78 alg %r0,__LC_SYSTEM_TIMER 83 alg %r0,__LC_STEAL_TIMER
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost_ameth.c | 248 X509_ALGOR *alg; local 253 PKCS7_RECIP_INFO_get0_alg((PKCS7_RECIP_INFO *)arg2, &alg); 254 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type), 261 X509_ALGOR *alg = NULL; local 267 NULL, &alg); 268 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type), V_ASN1_SEQUENCE,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost_ameth.c | 248 X509_ALGOR *alg; local 253 PKCS7_RECIP_INFO_get0_alg((PKCS7_RECIP_INFO *)arg2, &alg); 254 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type), 261 X509_ALGOR *alg = NULL; local 267 NULL, &alg); 268 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type), V_ASN1_SEQUENCE,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/tests/fate/ |
H A D | video.mak | 13 FATE_TESTS += fate-alg-mm 14 fate-alg-mm: CMD = framecrc -i $(SAMPLES)/alg-mm/ibmlogo.mm -an -pix_fmt rgb24
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | proposal.c | 517 if (a->alg == IPSECDOI_ATTR_AUTH_NONE) 529 newtr->trns_id = ipsecdoi_authalg2trnsid(a->alg); 530 newtr->authtype = a->alg; 553 newtr->trns_id = a->alg; 555 newtr->authtype = b->alg; 579 newtr->trns_id = a->alg;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8187se/ieee80211/ |
H A D | ieee80211_softmac.c | 2796 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; 2815 if (strcmp(param->u.crypt.alg, "none") == 0) { 2831 strcmp(param->u.crypt.alg, "TKIP")) 2834 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2835 if (ops == NULL && strcmp(param->u.crypt.alg, "WEP") == 0) 2836 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2837 else if (ops == NULL && strcmp(param->u.crypt.alg, "TKIP") == 0) 2838 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2839 else if (ops == NULL && strcmp(param->u.crypt.alg, "CCMP") == 0) 2840 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/ |
H A D | ieee80211_softmac.c | 2711 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; 2730 if (strcmp(param->u.crypt.alg, "none") == 0) { 2746 strcmp(param->u.crypt.alg, "TKIP")) 2749 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2750 if (ops == NULL && strcmp(param->u.crypt.alg, "WEP") == 0) 2751 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2754 else if (ops == NULL && strcmp(param->u.crypt.alg, "TKIP") == 0) 2755 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2756 else if (ops == NULL && strcmp(param->u.crypt.alg, "CCMP") == 0) 2757 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_softmac.c | 2585 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; 2604 if (strcmp(param->u.crypt.alg, "none") == 0) { 2620 strcmp(param->u.crypt.alg, "TKIP")) 2623 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2624 if (ops == NULL && strcmp(param->u.crypt.alg, "WEP") == 0) { 2626 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2628 } else if (ops == NULL && strcmp(param->u.crypt.alg, "TKIP") == 0) { 2630 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); 2631 } else if (ops == NULL && strcmp(param->u.crypt.alg, "CCMP") == 0) { 2633 ops = ieee80211_get_crypto_ops(param->u.crypt.alg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_lib.c | 1729 unsigned long alg = cs->algorithms; local 1748 if (alg & SSL_kECDH) 1755 if (alg & SSL_aECDSA) 1757 /* signature alg must be ECDSA */ 1763 if (alg & SSL_aRSA) 1765 /* signature alg must be RSA */ 1774 else if (alg & SSL_aECDSA) 1789 unsigned long alg,mask,kalg; local 1795 alg=s->s3->tmp.new_cipher->algorithms; 1798 kalg=alg 1849 unsigned long alg; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/ |
H A D | cfg.c | 119 enum ieee80211_key_alg alg; local 131 alg = ALG_WEP; 134 alg = ALG_TKIP; 137 alg = ALG_CCMP; 140 alg = ALG_AES_CMAC; 147 if ((alg == ALG_WEP || alg == ALG_TKIP) && 151 key = ieee80211_key_alloc(alg, key_idx, params->key_len, params->key, 250 switch (key->conf.alg) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkcs12.c | 94 int alg_print(BIO *x, X509_ALGOR *alg); 384 "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n"); 386 "-keypbe alg specify private key PBE algorithm (default 3DES)\n"); 388 "-macalg alg digest algorithm used in MAC (default SHA1)\n"); 932 int alg_print(BIO *x, X509_ALGOR *alg) argument 936 p = alg->parameter->value.sequence->data; 937 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 941 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/p54/ |
H A D | txrx.c | 686 static u8 p54_convert_algo(enum ieee80211_key_alg alg) argument 688 switch (alg) { 734 if (info->control.hw_key->alg == ALG_TKIP) { 830 txhdr->key_type = p54_convert_algo(info->control.hw_key->alg); 833 if (info->control.hw_key->alg == ALG_TKIP) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | pkcs12.c | 94 int alg_print(BIO *x, X509_ALGOR *alg); 384 "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n"); 386 "-keypbe alg specify private key PBE algorithm (default 3DES)\n"); 388 "-macalg alg digest algorithm used in MAC (default SHA1)\n"); 932 int alg_print(BIO *x, X509_ALGOR *alg) argument 936 p = alg->parameter->value.sequence->data; 937 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 941 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | pkcs12.c | 89 int alg_print(BIO *x, X509_ALGOR *alg); 322 BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n"); 323 BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n"); 840 int alg_print (BIO *x, X509_ALGOR *alg) argument 844 p = alg->parameter->value.sequence->data; 845 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 849 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/cris/arch-v32/drivers/ |
H A D | cryptocop.c | 450 if ((tc->tctx->init.alg == cryptocop_alg_aes) && (tc->tcfg->flags & CRYPTOCOP_DECRYPT)) { 841 switch (tctx->init.alg){ 884 switch (tctx->init.alg){ 901 panic("cryptocop_setup_dma_list: impossible algorithm %d\n", tctx->init.alg); 916 switch (tctx->init.alg){ 944 DEBUG_API(printk("cryptocop_setup_dma_list: invalid algorithm %d specified in tfrm %d.\n", tctx->init.alg, tcfg->tid)); 951 if (cipher_ctx.tcfg && (cipher_ctx.tctx->init.alg != cryptocop_alg_mem2mem)){ 1450 switch (tinit->alg){ 1488 DEBUG_API(printk("transform_ok: no such algorithm %d\n", tinit->alg)); 1492 switch (tinit->alg){ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/html/ |
H A D | htmlcell.cpp | 1161 wxString alg = tag.GetParam(wxT("ALIGN")); 1162 alg.MakeUpper(); 1163 if (alg == wxT("CENTER")) 1165 else if (alg == wxT("LEFT")) 1167 else if (alg == wxT("JUSTIFY")) 1169 else if (alg == wxT("RIGHT"))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/ |
H A D | osdmap.c | 180 u32 alg; local 183 ceph_decode_32_safe(p, end, alg, bad); 184 if (alg == 0) { 191 switch (alg) { 216 b->alg = ceph_decode_8(p); 236 switch (b->alg) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | xfrm.h | 840 * Otherwise, both must have a context and the sids, doi, alg must match 1543 static inline int xfrm_alg_len(struct xfrm_algo *alg) argument 1545 return sizeof(*alg) + ((alg->alg_key_len + 7) / 8); 1548 static inline int xfrm_alg_auth_len(struct xfrm_algo_auth *alg) argument 1550 return sizeof(*alg) + ((alg->alg_key_len + 7) / 8);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ |
H A D | e_capi.c | 804 ALG_ID alg; local 824 alg = CALG_SHA_256; 828 alg = CALG_SHA_384; 832 alg = CALG_SHA_512; 836 alg = CALG_SHA1; 840 alg = CALG_MD5; 844 alg = CALG_SSL3_SHAMD5; 857 if (!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash)) {
|