/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkcs8.c | 79 const EVP_CIPHER *cipher = NULL; local 110 cipher = EVP_get_cipherbyname(*args); 111 if (!cipher) { 112 BIO_printf(bio_err, "Unknown cipher %s\n", *args); 217 "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 219 "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 235 if ((pbe_nid == -1) && !cipher) 288 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_task.c | 66 * SSL_CIPHER Defines a list of cipher specifications the server 140 static char *cipher = NULL; variable 235 * get the preferred cipher list and other initialization 237 if (cipher == NULL) 238 cipher = getenv("SSL_CIPHER"); 239 printf("cipher list: %s\n", cipher ? cipher : "{undefined}");
|
H A D | ssl_txt.c | 136 if (x->cipher == NULL) { 149 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0)
|
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 222 const SSL_CIPHER *cipher; member in struct:cipher_order_st 518 c = s->cipher; 855 co_list[co_list_num].cipher = c; 918 *ca_curr = ciph_curr->cipher; 927 * or represent a cipher strength value (will be added in any case because algorithms=0). 1011 cp = curr->cipher; 1057 /* add the cipher if it has not been added yet. */ 1065 /* Move the added cipher to this location */ 1118 if (curr->active && (curr->cipher 1670 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_task.c | 66 * SSL_CIPHER Defines a list of cipher specifications the server 140 static char *cipher=NULL; variable 223 * get the preferred cipher list and other initialization 225 if (cipher == NULL) cipher=getenv("SSL_CIPHER"); 226 printf("cipher list: %s\n", cipher ? cipher : "{undefined}" );
|
H A D | ssl_txt.c | 98 if (x->cipher == NULL) 113 if (BIO_printf(bp," Cipher : %s\n",((x->cipher == NULL)?"unknown":x->cipher->name)) <= 0)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_task.c | 66 * SSL_CIPHER Defines a list of cipher specifications the server 140 static char *cipher = NULL; variable 235 * get the preferred cipher list and other initialization 237 if (cipher == NULL) 238 cipher = getenv("SSL_CIPHER"); 239 printf("cipher list: %s\n", cipher ? cipher : "{undefined}");
|
H A D | ssl_txt.c | 136 if (x->cipher == NULL) { 149 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0)
|
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 222 const SSL_CIPHER *cipher; member in struct:cipher_order_st 518 c = s->cipher; 855 co_list[co_list_num].cipher = c; 918 *ca_curr = ciph_curr->cipher; 927 * or represent a cipher strength value (will be added in any case because algorithms=0). 1011 cp = curr->cipher; 1057 /* add the cipher if it has not been added yet. */ 1065 /* Move the added cipher to this location */ 1118 if (curr->active && (curr->cipher 1670 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | pkcs8.c | 79 const EVP_CIPHER *cipher = NULL; local 110 cipher = EVP_get_cipherbyname(*args); 111 if (!cipher) { 112 BIO_printf(bio_err, "Unknown cipher %s\n", *args); 217 "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 219 "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 235 if ((pbe_nid == -1) && !cipher) 288 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 110 cipher=EVP_get_cipherbyname(*args); 111 if (!cipher) 114 "Unknown cipher %s\n", *args); 223 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 224 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 241 if ((pbe_nid == -1) && !cipher) 324 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | ecb.c | 102 struct crypto_cipher *cipher; local 104 cipher = crypto_spawn_cipher(spawn); 105 if (IS_ERR(cipher)) 106 return PTR_ERR(cipher); 108 ctx->child = cipher; 187 MODULE_DESCRIPTION("ECB block cipher algorithm");
|
H A D | xcbc.c | 178 struct crypto_cipher *cipher; local 183 cipher = crypto_spawn_cipher(spawn); 184 if (IS_ERR(cipher)) 185 return PTR_ERR(cipher); 187 ctx->child = cipher;
|
H A D | testmgr.c | 112 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon10711 722 printk(KERN_ERR "alg: cipher: setkey failed " 741 printk(KERN_ERR "alg: cipher: Test %d failed " 1335 printk(KERN_ERR "alg: cipher: Failed to load transform for " 1340 if (desc->suite.cipher.enc.vecs) { 1341 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, 1342 desc->suite.cipher.enc.count); 1347 if (desc->suite.cipher.dec.vecs) 1348 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, 1349 desc->suite.cipher [all...] |
H A D | lrw.c | 211 struct crypto_cipher *cipher; local 217 cipher = crypto_spawn_cipher(spawn); 218 if (IS_ERR(cipher)) 219 return PTR_ERR(cipher); 221 if (crypto_cipher_blocksize(cipher) != 16) { 226 ctx->child = cipher; 314 MODULE_DESCRIPTION("LRW block cipher mode");
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/ |
H A D | rt2x00debug.c | 113 * All statistics are stored separately per cipher type. 138 enum cipher cipher = rxdesc->cipher; local 141 if (cipher == CIPHER_TKIP_NO_MIC) 142 cipher = CIPHER_TKIP; 143 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) 147 cipher--; 149 intf->crypto_stats[cipher] [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/amcc/ |
H A D | crypto4xx_core.h | 146 struct crypto_alg cipher; member in union:crypto4xx_alg_common::__anon11149 166 return container_of(x, struct crypto4xx_alg, alg.u.cipher); 187 extern int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_krb5_wrap.c | 217 struct crypto_blkcipher *cipher; local 219 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, 221 if (IS_ERR(cipher)) 224 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); 226 err = gss_encrypt_xdr_buf(cipher, buf, 228 crypto_free_blkcipher(cipher); 304 struct crypto_blkcipher *cipher; local 307 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, 309 if (IS_ERR(cipher)) 312 krb5_rc4_setup_enc_key(kctx, cipher, seqnu [all...] |
H A D | gss_krb5_crypto.c | 597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, argument 602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; 603 u8 data[crypto_blkcipher_blocksize(cipher) * 2]; 607 BUG_ON(len > crypto_blkcipher_blocksize(cipher) * 2); 647 struct crypto_blkcipher *cipher, *aux_cipher; local 656 cipher = kctx->initiator_enc; 661 cipher = kctx->acceptor_enc; 666 blocksize = crypto_blkcipher_blocksize(cipher); 743 err = gss_krb5_cts_crypt(cipher, buf, 768 struct crypto_blkcipher *cipher, *aux_ciphe local 855 krb5_rc4_setup_seq_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, unsigned char *cksum) argument 921 krb5_rc4_setup_enc_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, s32 seqnum) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pem/ |
H A D | pem_lib.c | 278 EVP_CIPHER_INFO cipher; local 296 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) 298 if (!PEM_do_header(&cipher, data, &len, cb, u)) 363 /* actually it needs the cipher block size extra... */ 439 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 450 if (cipher->cipher == NULL) 465 if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher 489 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost_asn1.c | 29 ASN1_SIMPLE(GOST_KEY_AGREEMENT_INFO, cipher, ASN1_OBJECT),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | evp.h | 326 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 363 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 369 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 370 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided */ 380 int key_len; /* May change for variable length cipher */ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost_asn1.c | 29 ASN1_SIMPLE(GOST_KEY_AGREEMENT_INFO, cipher, ASN1_OBJECT),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp.h | 326 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 363 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 369 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 370 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided */ 380 int key_len; /* May change for variable length cipher */ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pem/ |
H A D | pem_lib.c | 278 EVP_CIPHER_INFO cipher; local 296 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) 298 if (!PEM_do_header(&cipher, data, &len, cb, u)) 363 /* actually it needs the cipher block size extra... */ 439 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 450 if (cipher->cipher == NULL) 465 if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher 489 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |