/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | wsseapi.h | 86 const void *(*security_token_handler)(struct soap *soap, int alg, int *keylen); 153 int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg); 155 int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 156 int soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 158 int soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]); 182 int soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen); 183 int soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen); 185 int soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen);
|
H A D | wsseapi.c | 459 const void *security_token_handler(struct soap *soap, int alg, int *keylen) 462 switch (alg) 1527 @fn int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) 1530 @param[out] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_VRFY_DSA_SHA1, or SOAP_SMD_VRFY_RSA_SHA1 1534 soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) argument 1537 *alg = SOAP_SMD_NONE; 1544 *alg = SOAP_SMD_HMAC_SHA1; 1546 *alg = SOAP_SMD_VRFY_DSA_SHA1; 1548 *alg = SOAP_SMD_VRFY_RSA_SHA1; 1563 @fn int soap_wsse_add_SignatureValue(struct soap *soap, int alg, cons 1579 soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument 1637 soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument 1799 { int alg, canonical; local 1840 soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]) argument 2433 soap_wsse_init(struct soap *soap, struct soap_wsse_data *data, const void *(*arg)(struct soap*, int alg, int *keylen)) argument 2508 soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen) argument 2559 soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen) argument 2603 soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen) argument 2970 { int alg, keylen = 0; local [all...] |
H A D | wsse2api.c | 1462 @fn int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) 1465 @param[out] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_VRFY_DSA_SHA1, or SOAP_SMD_VRFY_RSA_SHA1 1469 soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) argument 1472 *alg = SOAP_SMD_NONE; 1479 *alg = SOAP_SMD_HMAC_SHA1; 1481 *alg = SOAP_SMD_VRFY_DSA_SHA1; 1483 *alg = SOAP_SMD_VRFY_RSA_SHA1; 1498 @fn int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) 1501 @param[in] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_SIGN_DSA_SHA1, or SOAP_SMD_SIGN_RSA_SHA1 1514 soap_wsse_add_SignatureValue(struct soap *soap, int alg, cons argument 1577 soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument 1705 { int alg; local 1741 soap_wsse_verify_digest(struct soap *soap, int alg, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]) argument 2356 soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen) argument 2403 soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen) argument 2447 soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen) argument 2679 { int alg, keylen = 0; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsseapi.h | 86 const void *(*security_token_handler)(struct soap *soap, int alg, int *keylen); 153 int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg); 155 int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 156 int soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen); 158 int soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]); 182 int soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen); 183 int soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen); 185 int soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen);
|
H A D | wsseapi.c | 459 const void *security_token_handler(struct soap *soap, int alg, int *keylen) 462 switch (alg) 1527 @fn int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) 1530 @param[out] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_VRFY_DSA_SHA1, or SOAP_SMD_VRFY_RSA_SHA1 1534 soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) argument 1537 *alg = SOAP_SMD_NONE; 1544 *alg = SOAP_SMD_HMAC_SHA1; 1546 *alg = SOAP_SMD_VRFY_DSA_SHA1; 1548 *alg = SOAP_SMD_VRFY_RSA_SHA1; 1563 @fn int soap_wsse_add_SignatureValue(struct soap *soap, int alg, cons 1579 soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument 1637 soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument 1799 { int alg, canonical; local 1840 soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]) argument 2433 soap_wsse_init(struct soap *soap, struct soap_wsse_data *data, const void *(*arg)(struct soap*, int alg, int *keylen)) argument 2508 soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen) argument 2559 soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen) argument 2603 soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen) argument 2970 { int alg, keylen = 0; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_npas.c | 73 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 221 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 226 p = alg->parameter->value.sequence->data; 227 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 230 *pnid = OBJ_obj2nid(alg->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_npas.c | 72 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 204 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 209 p = alg->parameter->value.sequence->data; 210 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 211 *pnid = OBJ_obj2nid(alg->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 73 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 221 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 226 p = alg->parameter->value.sequence->data; 227 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 230 *pnid = OBJ_obj2nid(alg->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ |
H A D | crypto.h | 602 # define fips_md_init(alg) fips_md_init_ctx(alg, alg) 605 # define fips_md_init_ctx(alg, cx) \ 606 int alg##_Init(cx##_CTX *c) \ 609 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \ 610 return private_##alg##_Init(c); \ 612 int private_##alg##_Init(cx##_CTX *c) 614 # define fips_cipher_abort(alg) \ 616 "Low level API call to cipher " #alg " forbidde [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ |
H A D | crypto.h | 602 # define fips_md_init(alg) fips_md_init_ctx(alg, alg) 605 # define fips_md_init_ctx(alg, cx) \ 606 int alg##_Init(cx##_CTX *c) \ 609 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \ 610 return private_##alg##_Init(c); \ 612 int private_##alg##_Init(cx##_CTX *c) 614 # define fips_cipher_abort(alg) \ 616 "Low level API call to cipher " #alg " forbidde [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lzo-2.06/util/ |
H A D | table.pl | 35 $alg = ''; 72 if ($1 ne $alg) { 140 $alg = $t; 149 print "\n$alg\n\n"; 166 return unless $alg; 174 push(@algs,$alg); 176 $average{$alg} = 182 $total{$alg} = 191 print $average{$alg}; 192 print $total{$alg}; [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/ath/ath9k/ |
H A D | common.c | 49 if (tx_info->control.hw_key->alg == ALG_WEP) 51 else if (tx_info->control.hw_key->alg == ALG_TKIP) 53 else if (tx_info->control.hw_key->alg == ALG_CCMP) 214 enum ieee80211_key_alg alg) 218 if (alg == ALG_TKIP) 295 switch (key->alg) { 318 idx = ath_reserve_key_cache_slot(common, key->alg); 328 idx = ath_reserve_key_cache_slot(common, key->alg); 350 idx = ath_reserve_key_cache_slot(common, key->alg); 356 if (key->alg 213 ath_reserve_key_cache_slot(struct ath_common *common, enum ieee80211_key_alg alg) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | sha1_generic.c | 120 static struct shash_alg alg = { variable in typeref:struct:shash_alg 140 return crypto_register_shash(&alg); 145 crypto_unregister_shash(&alg);
|
H A D | twofish_generic.c | 182 static struct crypto_alg alg = { variable in typeref:struct:crypto_alg 191 .cra_list = LIST_HEAD_INIT(alg.cra_list), 202 return crypto_register_alg(&alg); 207 crypto_unregister_alg(&alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/ |
H A D | debugfs_key.c | 67 char *alg; local 70 switch (key->conf.alg) { 72 alg = "WEP\n"; 75 alg = "TKIP\n"; 78 alg = "CCMP\n"; 81 alg = "AES-128-CMAC\n"; 86 return simple_read_from_buffer(userbuf, count, ppos, alg, strlen(alg)); 98 switch (key->conf.alg) { 133 switch (key->conf.alg) { [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/dbinc/ |
H A D | crypto.h | 20 * structure so we can tell if users specified both passwd and alg 25 * DB_CIPHER structure until we open and can set the alg. 49 u_int8_t alg; /* Algorithm used - See above */ member in struct:__db_cipher
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | p5_pbe.c | 76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, 117 al = OBJ_nid2obj(alg); /* never need to free al */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/vdso64/ |
H A D | clock_gettime.S | 41 alg %r1,__VDSO_XTIME_NSEC(%r5) /* + xtime */ 43 alg %r1,__VDSO_WTOM_NSEC(%r5) /* + wall_to_monotonic */ 44 alg %r0,__VDSO_WTOM_SEC(%r5) 69 alg %r1,__VDSO_XTIME_NSEC(%r5) /* + xtime */
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | sainfo.h | 56 int alg; member in struct:sainfoalg
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_lib.c | 124 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg) argument 126 int i = OBJ_obj2nid(alg->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/crush/ |
H A D | crush.h | 100 extern const char *crush_bucket_alg_name(int alg); 105 __u8 alg; /* one of CRUSH_BUCKET_* */ member in struct:crush_bucket
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/internal/ |
H A D | skcipher.h | 45 return spawn->base.alg; 58 const char *crypto_default_geniv(const struct crypto_alg *alg);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts_lib.c | 124 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg) argument 126 int i = OBJ_obj2nid(alg->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/ |
H A D | ieee80211_wx.c | 534 const char *alg; local 541 //printk("======>encoding flag:%x,ext flag:%x, ext alg:%d\n", encoding->flags,ext->ext_flags, ext->alg); 557 //printk("not group key, flags:%x, ext->alg:%d\n", ext->ext_flags, ext->alg); 558 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP) 570 ext->alg == IW_ENCODE_ALG_NONE) { 592 switch (ext->alg) { 594 alg = "WEP"; 597 alg [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_wx.c | 535 const char *alg, *module; local 542 //printk("======>encoding flag:%x,ext flag:%x, ext alg:%d\n", encoding->flags,ext->ext_flags, ext->alg); 558 //printk("not group key, flags:%x, ext->alg:%d\n", ext->ext_flags, ext->alg); 559 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP) 571 ext->alg == IW_ENCODE_ALG_NONE) { 593 switch (ext->alg) { 595 alg = "WEP"; 599 alg [all...] |