Searched refs:alg (Results 76 - 100 of 306) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dwsseapi.h86 const void *(*security_token_handler)(struct soap *soap, int alg, int *keylen);
153 int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg);
155 int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen);
156 int soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen);
158 int soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]);
182 int soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen);
183 int soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen);
185 int soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen);
H A Dwsseapi.c459 const void *security_token_handler(struct soap *soap, int alg, int *keylen)
462 switch (alg)
1527 @fn int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg)
1530 @param[out] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_VRFY_DSA_SHA1, or SOAP_SMD_VRFY_RSA_SHA1
1534 soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) argument
1537 *alg = SOAP_SMD_NONE;
1544 *alg = SOAP_SMD_HMAC_SHA1;
1546 *alg = SOAP_SMD_VRFY_DSA_SHA1;
1548 *alg = SOAP_SMD_VRFY_RSA_SHA1;
1563 @fn int soap_wsse_add_SignatureValue(struct soap *soap, int alg, cons
1579 soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument
1637 soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument
1799 { int alg, canonical; local
1840 soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]) argument
2433 soap_wsse_init(struct soap *soap, struct soap_wsse_data *data, const void *(*arg)(struct soap*, int alg, int *keylen)) argument
2508 soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen) argument
2559 soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen) argument
2603 soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen) argument
2970 { int alg, keylen = 0; local
[all...]
H A Dwsse2api.c1462 @fn int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg)
1465 @param[out] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_VRFY_DSA_SHA1, or SOAP_SMD_VRFY_RSA_SHA1
1469 soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) argument
1472 *alg = SOAP_SMD_NONE;
1479 *alg = SOAP_SMD_HMAC_SHA1;
1481 *alg = SOAP_SMD_VRFY_DSA_SHA1;
1483 *alg = SOAP_SMD_VRFY_RSA_SHA1;
1498 @fn int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen)
1501 @param[in] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_SIGN_DSA_SHA1, or SOAP_SMD_SIGN_RSA_SHA1
1514 soap_wsse_add_SignatureValue(struct soap *soap, int alg, cons argument
1577 soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument
1705 { int alg; local
1741 soap_wsse_verify_digest(struct soap *soap, int alg, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]) argument
2356 soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen) argument
2403 soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen) argument
2447 soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen) argument
2679 { int alg, keylen = 0; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dwsseapi.h86 const void *(*security_token_handler)(struct soap *soap, int alg, int *keylen);
153 int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg);
155 int soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen);
156 int soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen);
158 int soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]);
182 int soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen);
183 int soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen);
185 int soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen);
H A Dwsseapi.c459 const void *security_token_handler(struct soap *soap, int alg, int *keylen)
462 switch (alg)
1527 @fn int soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg)
1530 @param[out] alg is SOAP_SMD_HMAC_SHA1, SOAP_SMD_VRFY_DSA_SHA1, or SOAP_SMD_VRFY_RSA_SHA1
1534 soap_wsse_get_SignedInfo_SignatureMethod(struct soap *soap, int *alg) argument
1537 *alg = SOAP_SMD_NONE;
1544 *alg = SOAP_SMD_HMAC_SHA1;
1546 *alg = SOAP_SMD_VRFY_DSA_SHA1;
1548 *alg = SOAP_SMD_VRFY_RSA_SHA1;
1563 @fn int soap_wsse_add_SignatureValue(struct soap *soap, int alg, cons
1579 soap_wsse_add_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument
1637 soap_wsse_verify_SignatureValue(struct soap *soap, int alg, const void *key, int keylen) argument
1799 { int alg, canonical; local
1840 soap_wsse_verify_digest(struct soap *soap, int alg, int canonical, const char *id, unsigned char hash[SOAP_SMD_MAX_SIZE]) argument
2433 soap_wsse_init(struct soap *soap, struct soap_wsse_data *data, const void *(*arg)(struct soap*, int alg, int *keylen)) argument
2508 soap_wsse_sign(struct soap *soap, int alg, const void *key, int keylen) argument
2559 soap_wsse_sign_body(struct soap *soap, int alg, const void *key, int keylen) argument
2603 soap_wsse_verify_auto(struct soap *soap, int alg, const void *key, size_t keylen) argument
2970 { int alg, keylen = 0; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/
H A Dp12_npas.c73 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
221 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument
226 p = alg->parameter->value.sequence->data;
227 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
230 *pnid = OBJ_obj2nid(alg->algorithm);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_npas.c72 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
204 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument
209 p = alg->parameter->value.sequence->data;
210 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
211 *pnid = OBJ_obj2nid(alg->algorithm);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_npas.c73 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
221 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument
226 p = alg->parameter->value.sequence->data;
227 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
230 *pnid = OBJ_obj2nid(alg->algorithm);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/
H A Dcrypto.h602 # define fips_md_init(alg) fips_md_init_ctx(alg, alg)
605 # define fips_md_init_ctx(alg, cx) \
606 int alg##_Init(cx##_CTX *c) \
609 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \
610 return private_##alg##_Init(c); \
612 int private_##alg##_Init(cx##_CTX *c)
614 # define fips_cipher_abort(alg) \
616 "Low level API call to cipher " #alg " forbidde
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/
H A Dcrypto.h602 # define fips_md_init(alg) fips_md_init_ctx(alg, alg)
605 # define fips_md_init_ctx(alg, cx) \
606 int alg##_Init(cx##_CTX *c) \
609 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \
610 return private_##alg##_Init(c); \
612 int private_##alg##_Init(cx##_CTX *c)
614 # define fips_cipher_abort(alg) \
616 "Low level API call to cipher " #alg " forbidde
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lzo-2.06/util/
H A Dtable.pl35 $alg = '';
72 if ($1 ne $alg) {
140 $alg = $t;
149 print "\n$alg\n\n";
166 return unless $alg;
174 push(@algs,$alg);
176 $average{$alg} =
182 $total{$alg} =
191 print $average{$alg};
192 print $total{$alg};
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/ath/ath9k/
H A Dcommon.c49 if (tx_info->control.hw_key->alg == ALG_WEP)
51 else if (tx_info->control.hw_key->alg == ALG_TKIP)
53 else if (tx_info->control.hw_key->alg == ALG_CCMP)
214 enum ieee80211_key_alg alg)
218 if (alg == ALG_TKIP)
295 switch (key->alg) {
318 idx = ath_reserve_key_cache_slot(common, key->alg);
328 idx = ath_reserve_key_cache_slot(common, key->alg);
350 idx = ath_reserve_key_cache_slot(common, key->alg);
356 if (key->alg
213 ath_reserve_key_cache_slot(struct ath_common *common, enum ieee80211_key_alg alg) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dsha1_generic.c120 static struct shash_alg alg = { variable in typeref:struct:shash_alg
140 return crypto_register_shash(&alg);
145 crypto_unregister_shash(&alg);
H A Dtwofish_generic.c182 static struct crypto_alg alg = { variable in typeref:struct:crypto_alg
191 .cra_list = LIST_HEAD_INIT(alg.cra_list),
202 return crypto_register_alg(&alg);
207 crypto_unregister_alg(&alg);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/
H A Ddebugfs_key.c67 char *alg; local
70 switch (key->conf.alg) {
72 alg = "WEP\n";
75 alg = "TKIP\n";
78 alg = "CCMP\n";
81 alg = "AES-128-CMAC\n";
86 return simple_read_from_buffer(userbuf, count, ppos, alg, strlen(alg));
98 switch (key->conf.alg) {
133 switch (key->conf.alg) {
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/dbinc/
H A Dcrypto.h20 * structure so we can tell if users specified both passwd and alg
25 * DB_CIPHER structure until we open and can set the alg.
49 u_int8_t alg; /* Algorithm used - See above */ member in struct:__db_cipher
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dp5_pbe.c76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt,
117 al = OBJ_nid2obj(alg); /* never need to free al */
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/vdso64/
H A Dclock_gettime.S41 alg %r1,__VDSO_XTIME_NSEC(%r5) /* + xtime */
43 alg %r1,__VDSO_WTOM_NSEC(%r5) /* + wall_to_monotonic */
44 alg %r0,__VDSO_WTOM_SEC(%r5)
69 alg %r1,__VDSO_XTIME_NSEC(%r5) /* + xtime */
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/
H A Dsainfo.h56 int alg; member in struct:sainfoalg
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts_lib.c124 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg) argument
126 int i = OBJ_obj2nid(alg->algorithm);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/crush/
H A Dcrush.h100 extern const char *crush_bucket_alg_name(int alg);
105 __u8 alg; /* one of CRUSH_BUCKET_* */ member in struct:crush_bucket
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/internal/
H A Dskcipher.h45 return spawn->base.alg;
58 const char *crypto_default_geniv(const struct crypto_alg *alg);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/
H A Dts_lib.c124 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg) argument
126 int i = OBJ_obj2nid(alg->algorithm);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/
H A Dieee80211_wx.c534 const char *alg; local
541 //printk("======>encoding flag:%x,ext flag:%x, ext alg:%d\n", encoding->flags,ext->ext_flags, ext->alg);
557 //printk("not group key, flags:%x, ext->alg:%d\n", ext->ext_flags, ext->alg);
558 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP)
570 ext->alg == IW_ENCODE_ALG_NONE) {
592 switch (ext->alg) {
594 alg = "WEP";
597 alg
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_wx.c535 const char *alg, *module; local
542 //printk("======>encoding flag:%x,ext flag:%x, ext alg:%d\n", encoding->flags,ext->ext_flags, ext->alg);
558 //printk("not group key, flags:%x, ext->alg:%d\n", ext->ext_flags, ext->alg);
559 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP)
571 ext->alg == IW_ENCODE_ALG_NONE) {
593 switch (ext->alg) {
595 alg = "WEP";
599 alg
[all...]

Completed in 305 milliseconds

1234567891011>>