/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/pohmelfs/ |
H A D | crypto.c | 60 struct crypto_ablkcipher *cipher; local 65 cipher = crypto_alloc_ablkcipher(psb->cipher_string, 0, 0); 66 if (IS_ERR(cipher)) { 67 err = PTR_ERR(cipher); 68 dprintk("%s: idx: %u: failed to allocate cipher '%s', err: %d.\n", 73 crypto_ablkcipher_clear_flags(cipher, ~0); 75 err = crypto_ablkcipher_setkey(cipher, psb->cipher_key, psb->cipher_keysize); 77 dprintk("%s: idx: %u: failed to set key for cipher '%s', err: %d.\n", 82 return cipher; 85 crypto_free_ablkcipher(cipher); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkey.c | 76 const EVP_CIPHER *cipher = NULL; local 154 cipher = EVP_get_cipherbyname(*args + 1); 155 if (!cipher) { 156 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1); 218 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | pkey.c | 76 const EVP_CIPHER *cipher = NULL; local 154 cipher = EVP_get_cipherbyname(*args + 1); 155 if (!cipher) { 156 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1); 218 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/loginutils/ |
H A D | passwd.c | 20 char *cipher = NULL; local 28 cipher = pw_encrypt(orig, pw->pw_passwd); /* returns ptr to static */ 29 if (strcmp(cipher, pw->pw_passwd) != 0) { 68 nuke_str(cipher);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_asn1.c | 70 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 93 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 111 a.cipher.type=V_ASN1_OCTET_STRING; 112 a.cipher.data=buf; 114 if (in->cipher == NULL) 117 l=in->cipher->id; 120 a.cipher.length=3; 127 a.cipher.length=2; 184 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 207 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN [all...] |
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 162 SSL_CIPHER *cipher; member in struct:cipher_order_st 172 /* TODO: COMPLEMENT OF ALL and COMPLEMENT OF DEFAULT do not have ECC cipher suites handled properly. */ 318 c=s->cipher; 514 co_list[co_list_num].cipher = c; 562 *ca_curr = ciph_curr->cipher; 570 * supported (not match any bit in mask) or represent a cipher 611 cp = curr->cipher; 613 /* If explicit cipher suite, match only that one for its own protocol version. 637 * cipher o 1078 SSL_CIPHER_description(SSL_CIPHER *cipher, char *buf, int len) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/tunala/ |
H A D | test.sh | 13 $VER -cipher $CIPHER 1> tc1.txt 2> tc2.txt & 17 $VER -cipher $CIPHER 1> ts1.txt 2> ts2.txt &
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | clean_test.com | 15 p.txt-zlib-cipher;*, -
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | crypto_polarssl.c | 50 #include <polarssl/cipher.h> 111 /* Search for a cipher name translation */ 150 printf ("The following ciphers and cipher modes are available\n" 151 "for use with " PACKAGE_NAME ". Each cipher shown below may be\n" 152 "used as a parameter to the --cipher option. The default\n" 350 * Generic cipher key type functions 358 const cipher_info_t *cipher = NULL; local 362 cipher = cipher_info_from_string(ciphername); 364 if (NULL == cipher) 367 if (cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/ |
H A D | test.sh | 13 $VER -cipher $CIPHER 1> tc1.txt 2> tc2.txt & 17 $VER -cipher $CIPHER 1> ts1.txt 2> ts2.txt &
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/tunala/ |
H A D | test.sh | 13 $VER -cipher $CIPHER 1> tc1.txt 2> tc2.txt & 17 $VER -cipher $CIPHER 1> ts1.txt 2> ts2.txt &
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | clean_test.com | 15 p.txt-zlib-cipher;*, -
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | bio_ber.c | 111 BIO_TYPE_CIPHER,"cipher", 302 EVP_CipherUpdate(&(ctx->cipher), 342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 343 ctx->cipher.berrypt); 379 ret=EVP_CipherFinal_ex(&(ctx->cipher), 404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); 441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); 461 EVP_CipherInit_ex(&(ctx->cipher), [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/src/ |
H A D | Makefile.am | 56 cipher.h cipher-proto.h \ 104 ../cipher/libcipher.la \ 110 ../cipher/libcipher.la \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | Makefile.am | 56 cipher.h cipher-proto.h \ 104 ../cipher/libcipher.la \ 110 ../cipher/libcipher.la \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/engine/ |
H A D | eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp_locl.h | 59 /* Macros to code block cipher wrappers */ 61 /* Wrapper functions for each cipher mode */ 65 bl = ctx->cipher->block_size;\ 229 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \ 230 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 231 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 232 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \ 233 0, cipher##_init_key, NULL, \
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 159 struct crypto_blkcipher *cipher; local 169 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, 171 if (IS_ERR(cipher)) 173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) 210 (*(gk5e->encrypt))(cipher, NULL, inblock.data, 250 crypto_free_blkcipher(cipher);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/engine/ |
H A D | eng_openssl.c | 115 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 228 * we're asked for a cipher we don't support (should not happen). 231 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 293 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 296 if (!cipher) { 301 /* We are being asked for a specific cipher */ 303 *cipher = &test_r4_cipher; 305 *cipher = &test_r4_40_cipher; 311 *cipher = NULL;
|
H A D | eng_cryptodev.c | 98 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 302 sess.cipher = ciphers[i].id; 342 sess.cipher = 0; 419 if ((inl % ctx->cipher->block_size) != 0) 433 if (ctx->cipher->iv_len) { 436 iiv = in + inl - ctx->cipher->iv_len; 437 memcpy(save_iv, iiv, ctx->cipher->iv_len); 450 if (ctx->cipher->iv_len) { 452 iiv = out + inl - ctx->cipher->iv_len; 455 memcpy(ctx->iv, iiv, ctx->cipher 466 int cipher = -1, i; local 690 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/engine/ |
H A D | eng_openssl.c | 115 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 228 * we're asked for a cipher we don't support (should not happen). 231 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 293 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 296 if (!cipher) { 301 /* We are being asked for a specific cipher */ 303 *cipher = &test_r4_cipher; 305 *cipher = &test_r4_40_cipher; 311 *cipher = NULL;
|
H A D | eng_cryptodev.c | 98 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 302 sess.cipher = ciphers[i].id; 342 sess.cipher = 0; 419 if ((inl % ctx->cipher->block_size) != 0) 433 if (ctx->cipher->iv_len) { 436 iiv = in + inl - ctx->cipher->iv_len; 437 memcpy(save_iv, iiv, ctx->cipher->iv_len); 450 if (ctx->cipher->iv_len) { 452 iiv = out + inl - ctx->cipher->iv_len; 455 memcpy(ctx->iv, iiv, ctx->cipher 466 int cipher = -1, i; local 690 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | chap_ms.c | 109 DesEncrypt(clear, key, cipher) 112 u_char *cipher; /* OUT 8 octets */ 126 Collapse(des_input, cipher); 133 DesEncrypt(clear, key, cipher) 136 u_char *cipher; /* OUT 8 octets */ 146 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | smime.c | 94 const EVP_CIPHER *cipher = NULL; local 144 cipher = EVP_des_ede3_cbc(); 146 cipher = EVP_des_cbc(); 150 cipher = EVP_rc2_40_cbc(); 152 cipher = EVP_rc2_cbc(); 154 cipher = EVP_rc2_64_cbc(); 158 cipher = EVP_aes_128_cbc(); 160 cipher = EVP_aes_192_cbc(); 162 cipher = EVP_aes_256_cbc(); 166 cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | ctr.c | 157 struct crypto_cipher *cipher; local 159 cipher = crypto_spawn_cipher(spawn); 160 if (IS_ERR(cipher)) 161 return PTR_ERR(cipher); 163 ctx->child = cipher; 307 struct crypto_blkcipher *cipher; local 309 cipher = crypto_spawn_blkcipher(spawn); 310 if (IS_ERR(cipher)) 311 return PTR_ERR(cipher); 313 ctx->child = cipher; [all...] |