/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | pcrypt.c | 309 static struct crypto_instance *pcrypt_alloc_instance(struct crypto_alg *alg) argument 322 if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, 323 "pcrypt(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME) 326 memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME); 329 err = crypto_init_spawn(&ctx->spawn, alg, inst, 334 inst->alg.cra_priority = alg->cra_priority + 100; 335 inst->alg.cra_blocksize = alg 351 struct crypto_alg *alg; local [all...] |
H A D | cryptd.c | 258 static void *cryptd_alloc_instance(struct crypto_alg *alg, unsigned int head, argument 272 if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, 273 "cryptd(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME) 276 memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME); 278 inst->alg.cra_priority = alg->cra_priority + 50; 279 inst->alg.cra_blocksize = alg->cra_blocksize; 280 inst->alg 297 struct crypto_alg *alg; local 553 struct crypto_alg *alg; local [all...] |
H A D | lzo.c | 79 static struct crypto_alg alg = { variable in typeref:struct:crypto_alg 84 .cra_list = LIST_HEAD_INIT(alg.cra_list), 94 return crypto_register_alg(&alg); 99 crypto_unregister_alg(&alg);
|
H A D | ccm.c | 535 if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, 540 memcpy(inst->alg.cra_name, full_name, CRYPTO_MAX_ALG_NAME); 542 inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD; 543 inst->alg.cra_flags |= ctr->cra_flags & CRYPTO_ALG_ASYNC; 544 inst->alg.cra_priority = cipher->cra_priority + ctr->cra_priority; 545 inst->alg.cra_blocksize = 1; 546 inst->alg.cra_alignmask = cipher->cra_alignmask | ctr->cra_alignmask | 548 inst->alg.cra_type = &crypto_aead_type; 549 inst->alg.cra_aead.ivsize = 16; 550 inst->alg 758 struct crypto_alg *alg; local [all...] |
H A D | seqiv.c | 270 inst->alg.cra_ablkcipher.givencrypt = seqiv_givencrypt_first; 272 inst->alg.cra_init = seqiv_init; 273 inst->alg.cra_exit = skcipher_geniv_exit; 275 inst->alg.cra_ctxsize += inst->alg.cra_ablkcipher.ivsize; 290 inst->alg.cra_aead.givencrypt = seqiv_aead_givencrypt_first; 292 inst->alg.cra_init = seqiv_aead_init; 293 inst->alg.cra_exit = aead_geniv_exit; 295 inst->alg.cra_ctxsize = inst->alg [all...] |
H A D | chainiv.c | 306 inst->alg.cra_ablkcipher.givencrypt = chainiv_givencrypt_first; 308 inst->alg.cra_init = chainiv_init; 309 inst->alg.cra_exit = skcipher_geniv_exit; 311 inst->alg.cra_ctxsize = sizeof(struct chainiv_ctx); 314 inst->alg.cra_flags |= CRYPTO_ALG_ASYNC; 316 inst->alg.cra_ablkcipher.givencrypt = 319 inst->alg.cra_init = async_chainiv_init; 320 inst->alg.cra_exit = async_chainiv_exit; 322 inst->alg.cra_ctxsize = sizeof(struct async_chainiv_ctx); 325 inst->alg [all...] |
H A D | testmgr.c | 29 int alg_test(const char *driver, const char *alg, u32 type, u32 mask) argument 105 const char *alg; member in struct:alg_test_desc 108 int fips_allowed; /* set if alg is allowed in fips mode */ 200 printk(KERN_ERR "alg: hash: Failed to allocate request for " 225 printk(KERN_ERR "alg: hash: setkey failed on " 237 pr_err("alg: hash: digest failed on test %d " 267 printk(KERN_ERR "alg: hash: Test %d failed for %s\n", 303 printk(KERN_ERR "alg: hash: setkey " 327 printk(KERN_ERR "alg: hash: digest failed " 335 printk(KERN_ERR "alg 2462 alg_find_test(const char *alg) argument 2487 alg_test(const char *driver, const char *alg, u32 type, u32 mask) argument [all...] |
H A D | eseqiv.c | 234 if (inst->alg.cra_ablkcipher.ivsize != inst->alg.cra_blocksize) 237 inst->alg.cra_ablkcipher.givencrypt = eseqiv_givencrypt_first; 239 inst->alg.cra_init = eseqiv_init; 240 inst->alg.cra_exit = skcipher_geniv_exit; 242 inst->alg.cra_ctxsize = sizeof(struct eseqiv_ctx); 243 inst->alg.cra_ctxsize += inst->alg.cra_ablkcipher.ivsize;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 115 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 128 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 115 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 128 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | httpda.h | 126 char *alg; /* client-side: server's algorithm value */ member in struct:http_da_data 156 char *alg; member in struct:http_da_info
|
H A D | wsse2api.h | 146 int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg); 148 int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 149 int soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 151 int soap_wsse_verify_digest(struct soap *soap, int alg, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]); 175 int soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen); 176 int soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen); 178 int soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | httpda.h | 126 char *alg; /* client-side: server's algorithm value */ member in struct:http_da_data 156 char *alg; member in struct:http_da_info
|
H A D | wsse2api.h | 146 int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg); 148 int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 149 int soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 151 int soap_wsse_verify_digest(struct soap *soap, int alg, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]); 175 int soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen); 176 int soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen); 178 int soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ocsp/ |
H A D | ocsp_lib.c | 106 X509_ALGOR *alg; local 113 alg = cid->hashAlgorithm; 114 if (alg->algorithm != NULL) 115 ASN1_OBJECT_free(alg->algorithm); 120 if (!(alg->algorithm = OBJ_nid2obj(nid))) 122 if ((alg->parameter = ASN1_TYPE_new()) == NULL) 124 alg->parameter->type = V_ASN1_NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ocsp/ |
H A D | ocsp_lib.c | 105 X509_ALGOR *alg; local 111 alg = cid->hashAlgorithm; 112 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 118 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 119 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err; 120 alg->parameter->type=V_ASN1_NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 106 X509_ALGOR *alg; local 113 alg = cid->hashAlgorithm; 114 if (alg->algorithm != NULL) 115 ASN1_OBJECT_free(alg->algorithm); 120 if (!(alg->algorithm = OBJ_nid2obj(nid))) 122 if ((alg->parameter = ASN1_TYPE_new()) == NULL) 124 alg->parameter->type = V_ASN1_NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rsa/ |
H A D | rsa_ameth.c | 267 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) argument 271 if (alg == NULL || alg->parameter == NULL) 273 if (OBJ_obj2nid(alg->algorithm) != NID_mgf1) 275 if (alg->parameter->type != V_ASN1_SEQUENCE) 278 p = alg->parameter->value.sequence->data; 279 plen = alg->parameter->value.sequence->length; 283 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, argument 292 if (!alg->parameter || alg 403 X509_ALGOR *alg = NULL; local 492 rsa_algor_to_md(X509_ALGOR *alg) argument 504 rsa_mgf1_to_md(X509_ALGOR *alg, X509_ALGOR *maskHash) argument 671 X509_ALGOR *alg; local 711 X509_ALGOR *alg; local 765 rsa_oaep_decode(const X509_ALGOR *alg, X509_ALGOR **pmaskHash) argument 866 X509_ALGOR *alg; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 267 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) argument 271 if (alg == NULL || alg->parameter == NULL) 273 if (OBJ_obj2nid(alg->algorithm) != NID_mgf1) 275 if (alg->parameter->type != V_ASN1_SEQUENCE) 278 p = alg->parameter->value.sequence->data; 279 plen = alg->parameter->value.sequence->length; 283 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, argument 292 if (!alg->parameter || alg 403 X509_ALGOR *alg = NULL; local 492 rsa_algor_to_md(X509_ALGOR *alg) argument 504 rsa_mgf1_to_md(X509_ALGOR *alg, X509_ALGOR *maskHash) argument 671 X509_ALGOR *alg; local 711 X509_ALGOR *alg; local 765 rsa_oaep_decode(const X509_ALGOR *alg, X509_ALGOR **pmaskHash) argument 866 X509_ALGOR *alg; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | gfpcrypt.cpp | 26 void DL_GroupParameters_DSA::GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg) argument 30 if (alg.GetValue("Modulus", p) && alg.GetValue("SubgroupGenerator", g)) 32 q = alg.GetValueWithDefault("SubgroupOrder", ComputeGroupOrder(p)/2); 37 alg.GetIntValue("ModulusSize", modulusSize) || alg.GetIntValue("KeySize", modulusSize); 163 void DL_GroupParameters_IntegerBased::GenerateRandom(RandomNumberGenerator &rng, const NameValuePairs &alg) argument 167 if (alg.GetValue("Modulus", p) && alg.GetValue("SubgroupGenerator", g)) 169 q = alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/crypto/ |
H A D | sha1_s390.c | 72 static struct shash_alg alg = { variable in typeref:struct:shash_alg 95 return crypto_register_shash(&alg); 100 crypto_unregister_shash(&alg);
|
H A D | sha256_s390.c | 68 static struct shash_alg alg = { variable in typeref:struct:shash_alg 92 return crypto_register_shash(&alg); 97 crypto_unregister_shash(&alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/crush/ |
H A D | crush.c | 13 const char *crush_bucket_alg_name(int alg) argument 15 switch (alg) { 34 switch (b->alg) { 105 switch (b->alg) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/crypto/ |
H A D | salsa20_glue.c | 90 static struct crypto_alg alg = { variable in typeref:struct:crypto_alg 100 .cra_list = LIST_HEAD_INIT(alg.cra_list), 115 return crypto_register_alg(&alg); 120 crypto_unregister_alg(&alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/ |
H A D | algapi.h | 24 unsigned int (*ctxsize)(struct crypto_alg *alg, u32 type, u32 mask); 25 unsigned int (*extsize)(struct crypto_alg *alg); 28 void (*show)(struct seq_file *m, struct crypto_alg *alg); 38 struct crypto_alg alg; member in struct:crypto_instance 60 struct crypto_alg *alg; member in struct:crypto_spawn 127 void crypto_mod_put(struct crypto_alg *alg); 136 int crypto_init_spawn(struct crypto_spawn *spawn, struct crypto_alg *alg, 138 int crypto_init_spawn2(struct crypto_spawn *spawn, struct crypto_alg *alg, 167 void *crypto_alloc_instance2(const char *name, struct crypto_alg *alg, 170 struct crypto_alg *alg); [all...] |