Searched refs:alg (Results 176 - 200 of 306) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Design.h73 void GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg);
H A Dpubkey.h1000 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local
1005 alg.Sign(params, key.GetPrivateExponent(), k, e, r, s);
1023 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local
1043 alg.Sign(params, key.GetPrivateExponent(), k, e, r, s);
1051 alg.Sign(params, key.GetPrivateExponent(), ma.m_k, e, r, s);
1054 size_t rLen = alg.RLen(params);
1056 s.Encode(signature+rLen, alg.SLen(params));
1072 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm();
1089 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local
1092 size_t rLen = alg
1104 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local
1124 const DL_ElgamalLikeSignatureAlgorithm<T> &alg = this->GetSignatureAlgorithm(); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/cris/include/arch-v32/arch/
H A Dcryptocop.h146 cryptocop_algorithm alg; member in struct:cryptocop_transform_init
152 cryptocop_csum_type csum_mode; /* cryptocop_csum_none is not allowed when alg==cryptocop_alg_csum */
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/libipsec/
H A Dpfkey.c215 struct sadb_alg *alg; local
217 alg = findsupportedalg(satype, alg_id);
218 if (!alg)
221 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) {
222 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, alg->sadb_alg_maxbits);
244 struct sadb_alg *alg; local
265 alg = findsupportedalg(satype, alg_id);
266 if (!alg)
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dcurl_sasl.c278 * alg [in/out] - The buffer where the algorithm will be stored.
286 char *alg, size_t alen)
316 if(!sasl_digest_get_key_value((char *)chlg, "algorithm=", alg, alen, ',')) {
283 Curl_sasl_decode_digest_md5_message(const char *chlg64, char *nonce, size_t nlen, char *realm, size_t rlen, char *alg, size_t alen) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/amcc/
H A Dcrypto4xx_alg.c184 struct crypto_alg *alg = tfm->__crt_alg; local
185 struct crypto4xx_alg *my_alg = crypto_alg_to_crypto4xx_alg(alg);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/
H A Dswsusp_asm64.S78 alg %r0,__LC_SYSTEM_TIMER
83 alg %r0,__LC_STEAL_TIMER
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/
H A Dgost_ameth.c248 X509_ALGOR *alg; local
253 PKCS7_RECIP_INFO_get0_alg((PKCS7_RECIP_INFO *)arg2, &alg);
254 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type),
261 X509_ALGOR *alg = NULL; local
267 NULL, &alg);
268 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type), V_ASN1_SEQUENCE,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/
H A Dgost_ameth.c248 X509_ALGOR *alg; local
253 PKCS7_RECIP_INFO_get0_alg((PKCS7_RECIP_INFO *)arg2, &alg);
254 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type),
261 X509_ALGOR *alg = NULL; local
267 NULL, &alg);
268 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type), V_ASN1_SEQUENCE,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/tests/fate/
H A Dvideo.mak13 FATE_TESTS += fate-alg-mm
14 fate-alg-mm: CMD = framecrc -i $(SAMPLES)/alg-mm/ibmlogo.mm -an -pix_fmt rgb24
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/
H A Dproposal.c517 if (a->alg == IPSECDOI_ATTR_AUTH_NONE)
529 newtr->trns_id = ipsecdoi_authalg2trnsid(a->alg);
530 newtr->authtype = a->alg;
553 newtr->trns_id = a->alg;
555 newtr->authtype = b->alg;
579 newtr->trns_id = a->alg;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8187se/ieee80211/
H A Dieee80211_softmac.c2796 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
2815 if (strcmp(param->u.crypt.alg, "none") == 0) {
2831 strcmp(param->u.crypt.alg, "TKIP"))
2834 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2835 if (ops == NULL && strcmp(param->u.crypt.alg, "WEP") == 0)
2836 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2837 else if (ops == NULL && strcmp(param->u.crypt.alg, "TKIP") == 0)
2838 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2839 else if (ops == NULL && strcmp(param->u.crypt.alg, "CCMP") == 0)
2840 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/
H A Dieee80211_softmac.c2711 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
2730 if (strcmp(param->u.crypt.alg, "none") == 0) {
2746 strcmp(param->u.crypt.alg, "TKIP"))
2749 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2750 if (ops == NULL && strcmp(param->u.crypt.alg, "WEP") == 0)
2751 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2754 else if (ops == NULL && strcmp(param->u.crypt.alg, "TKIP") == 0)
2755 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2756 else if (ops == NULL && strcmp(param->u.crypt.alg, "CCMP") == 0)
2757 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_softmac.c2585 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
2604 if (strcmp(param->u.crypt.alg, "none") == 0) {
2620 strcmp(param->u.crypt.alg, "TKIP"))
2623 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2624 if (ops == NULL && strcmp(param->u.crypt.alg, "WEP") == 0) {
2626 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2628 } else if (ops == NULL && strcmp(param->u.crypt.alg, "TKIP") == 0) {
2630 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
2631 } else if (ops == NULL && strcmp(param->u.crypt.alg, "CCMP") == 0) {
2633 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dssl_lib.c1729 unsigned long alg = cs->algorithms; local
1748 if (alg & SSL_kECDH)
1755 if (alg & SSL_aECDSA)
1757 /* signature alg must be ECDSA */
1763 if (alg & SSL_aRSA)
1765 /* signature alg must be RSA */
1774 else if (alg & SSL_aECDSA)
1789 unsigned long alg,mask,kalg; local
1795 alg=s->s3->tmp.new_cipher->algorithms;
1798 kalg=alg
1849 unsigned long alg; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/
H A Dcfg.c119 enum ieee80211_key_alg alg; local
131 alg = ALG_WEP;
134 alg = ALG_TKIP;
137 alg = ALG_CCMP;
140 alg = ALG_AES_CMAC;
147 if ((alg == ALG_WEP || alg == ALG_TKIP) &&
151 key = ieee80211_key_alloc(alg, key_idx, params->key_len, params->key,
250 switch (key->conf.alg) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dpkcs12.c94 int alg_print(BIO *x, X509_ALGOR *alg);
384 "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
386 "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
388 "-macalg alg digest algorithm used in MAC (default SHA1)\n");
932 int alg_print(BIO *x, X509_ALGOR *alg) argument
936 p = alg->parameter->value.sequence->data;
937 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
941 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/p54/
H A Dtxrx.c686 static u8 p54_convert_algo(enum ieee80211_key_alg alg) argument
688 switch (alg) {
734 if (info->control.hw_key->alg == ALG_TKIP) {
830 txhdr->key_type = p54_convert_algo(info->control.hw_key->alg);
833 if (info->control.hw_key->alg == ALG_TKIP) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dpkcs12.c94 int alg_print(BIO *x, X509_ALGOR *alg);
384 "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
386 "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
388 "-macalg alg digest algorithm used in MAC (default SHA1)\n");
932 int alg_print(BIO *x, X509_ALGOR *alg) argument
936 p = alg->parameter->value.sequence->data;
937 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
941 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dpkcs12.c89 int alg_print(BIO *x, X509_ALGOR *alg);
322 BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
323 BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
840 int alg_print (BIO *x, X509_ALGOR *alg) argument
844 p = alg->parameter->value.sequence->data;
845 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
849 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/cris/arch-v32/drivers/
H A Dcryptocop.c450 if ((tc->tctx->init.alg == cryptocop_alg_aes) && (tc->tcfg->flags & CRYPTOCOP_DECRYPT)) {
841 switch (tctx->init.alg){
884 switch (tctx->init.alg){
901 panic("cryptocop_setup_dma_list: impossible algorithm %d\n", tctx->init.alg);
916 switch (tctx->init.alg){
944 DEBUG_API(printk("cryptocop_setup_dma_list: invalid algorithm %d specified in tfrm %d.\n", tctx->init.alg, tcfg->tid));
951 if (cipher_ctx.tcfg && (cipher_ctx.tctx->init.alg != cryptocop_alg_mem2mem)){
1450 switch (tinit->alg){
1488 DEBUG_API(printk("transform_ok: no such algorithm %d\n", tinit->alg));
1492 switch (tinit->alg){
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/html/
H A Dhtmlcell.cpp1161 wxString alg = tag.GetParam(wxT("ALIGN"));
1162 alg.MakeUpper();
1163 if (alg == wxT("CENTER"))
1165 else if (alg == wxT("LEFT"))
1167 else if (alg == wxT("JUSTIFY"))
1169 else if (alg == wxT("RIGHT"))
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/
H A Dosdmap.c180 u32 alg; local
183 ceph_decode_32_safe(p, end, alg, bad);
184 if (alg == 0) {
191 switch (alg) {
216 b->alg = ceph_decode_8(p);
236 switch (b->alg) {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Dxfrm.h840 * Otherwise, both must have a context and the sids, doi, alg must match
1543 static inline int xfrm_alg_len(struct xfrm_algo *alg) argument
1545 return sizeof(*alg) + ((alg->alg_key_len + 7) / 8);
1548 static inline int xfrm_alg_auth_len(struct xfrm_algo_auth *alg) argument
1550 return sizeof(*alg) + ((alg->alg_key_len + 7) / 8);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/
H A De_capi.c804 ALG_ID alg; local
824 alg = CALG_SHA_256;
828 alg = CALG_SHA_384;
832 alg = CALG_SHA_512;
836 alg = CALG_SHA1;
840 alg = CALG_MD5;
844 alg = CALG_SSL3_SHAMD5;
857 if (!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash)) {

Completed in 163 milliseconds

1234567891011>>