Searched refs:cipher (Results 126 - 150 of 456) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dpkcs8.c79 const EVP_CIPHER *cipher = NULL; local
110 cipher = EVP_get_cipherbyname(*args);
111 if (!cipher) {
112 BIO_printf(bio_err, "Unknown cipher %s\n", *args);
217 "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
219 "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
235 if ((pbe_nid == -1) && !cipher)
288 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dssl_task.c66 * SSL_CIPHER Defines a list of cipher specifications the server
140 static char *cipher = NULL; variable
235 * get the preferred cipher list and other initialization
237 if (cipher == NULL)
238 cipher = getenv("SSL_CIPHER");
239 printf("cipher list: %s\n", cipher ? cipher : "{undefined}");
H A Dssl_txt.c136 if (x->cipher == NULL) {
149 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0)
H A Dssl_ciph.c113 * ECC cipher suite support in OpenSSL originally developed by
222 const SSL_CIPHER *cipher; member in struct:cipher_order_st
518 c = s->cipher;
855 co_list[co_list_num].cipher = c;
918 *ca_curr = ciph_curr->cipher;
927 * or represent a cipher strength value (will be added in any case because algorithms=0).
1011 cp = curr->cipher;
1057 /* add the cipher if it has not been added yet. */
1065 /* Move the added cipher to this location */
1118 if (curr->active && (curr->cipher
1670 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dssl_task.c66 * SSL_CIPHER Defines a list of cipher specifications the server
140 static char *cipher=NULL; variable
223 * get the preferred cipher list and other initialization
225 if (cipher == NULL) cipher=getenv("SSL_CIPHER");
226 printf("cipher list: %s\n", cipher ? cipher : "{undefined}" );
H A Dssl_txt.c98 if (x->cipher == NULL)
113 if (BIO_printf(bp," Cipher : %s\n",((x->cipher == NULL)?"unknown":x->cipher->name)) <= 0)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dssl_task.c66 * SSL_CIPHER Defines a list of cipher specifications the server
140 static char *cipher = NULL; variable
235 * get the preferred cipher list and other initialization
237 if (cipher == NULL)
238 cipher = getenv("SSL_CIPHER");
239 printf("cipher list: %s\n", cipher ? cipher : "{undefined}");
H A Dssl_txt.c136 if (x->cipher == NULL) {
149 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0)
H A Dssl_ciph.c113 * ECC cipher suite support in OpenSSL originally developed by
222 const SSL_CIPHER *cipher; member in struct:cipher_order_st
518 c = s->cipher;
855 co_list[co_list_num].cipher = c;
918 *ca_curr = ciph_curr->cipher;
927 * or represent a cipher strength value (will be added in any case because algorithms=0).
1011 cp = curr->cipher;
1057 /* add the cipher if it has not been added yet. */
1065 /* Move the added cipher to this location */
1118 if (curr->active && (curr->cipher
1670 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dpkcs8.c79 const EVP_CIPHER *cipher = NULL; local
110 cipher = EVP_get_cipherbyname(*args);
111 if (!cipher) {
112 BIO_printf(bio_err, "Unknown cipher %s\n", *args);
217 "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
219 "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
235 if ((pbe_nid == -1) && !cipher)
288 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dpkcs8.c78 const EVP_CIPHER *cipher = NULL; local
110 cipher=EVP_get_cipherbyname(*args);
111 if (!cipher)
114 "Unknown cipher %s\n", *args);
223 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
224 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
241 if ((pbe_nid == -1) && !cipher)
324 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Decb.c102 struct crypto_cipher *cipher; local
104 cipher = crypto_spawn_cipher(spawn);
105 if (IS_ERR(cipher))
106 return PTR_ERR(cipher);
108 ctx->child = cipher;
187 MODULE_DESCRIPTION("ECB block cipher algorithm");
H A Dxcbc.c178 struct crypto_cipher *cipher; local
183 cipher = crypto_spawn_cipher(spawn);
184 if (IS_ERR(cipher))
185 return PTR_ERR(cipher);
187 ctx->child = cipher;
H A Dtestmgr.c112 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon10711
722 printk(KERN_ERR "alg: cipher: setkey failed "
741 printk(KERN_ERR "alg: cipher: Test %d failed "
1335 printk(KERN_ERR "alg: cipher: Failed to load transform for "
1340 if (desc->suite.cipher.enc.vecs) {
1341 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
1342 desc->suite.cipher.enc.count);
1347 if (desc->suite.cipher.dec.vecs)
1348 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
1349 desc->suite.cipher
[all...]
H A Dlrw.c211 struct crypto_cipher *cipher; local
217 cipher = crypto_spawn_cipher(spawn);
218 if (IS_ERR(cipher))
219 return PTR_ERR(cipher);
221 if (crypto_cipher_blocksize(cipher) != 16) {
226 ctx->child = cipher;
314 MODULE_DESCRIPTION("LRW block cipher mode");
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/
H A Drt2x00debug.c113 * All statistics are stored separately per cipher type.
138 enum cipher cipher = rxdesc->cipher; local
141 if (cipher == CIPHER_TKIP_NO_MIC)
142 cipher = CIPHER_TKIP;
143 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX)
147 cipher--;
149 intf->crypto_stats[cipher]
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/amcc/
H A Dcrypto4xx_core.h146 struct crypto_alg cipher; member in union:crypto4xx_alg_common::__anon11149
166 return container_of(x, struct crypto4xx_alg, alg.u.cipher);
187 extern int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/
H A Dgss_krb5_wrap.c217 struct crypto_blkcipher *cipher; local
219 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0,
221 if (IS_ERR(cipher))
224 krb5_rc4_setup_enc_key(kctx, cipher, seq_send);
226 err = gss_encrypt_xdr_buf(cipher, buf,
228 crypto_free_blkcipher(cipher);
304 struct crypto_blkcipher *cipher; local
307 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0,
309 if (IS_ERR(cipher))
312 krb5_rc4_setup_enc_key(kctx, cipher, seqnu
[all...]
H A Dgss_krb5_crypto.c597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, argument
602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv };
603 u8 data[crypto_blkcipher_blocksize(cipher) * 2];
607 BUG_ON(len > crypto_blkcipher_blocksize(cipher) * 2);
647 struct crypto_blkcipher *cipher, *aux_cipher; local
656 cipher = kctx->initiator_enc;
661 cipher = kctx->acceptor_enc;
666 blocksize = crypto_blkcipher_blocksize(cipher);
743 err = gss_krb5_cts_crypt(cipher, buf,
768 struct crypto_blkcipher *cipher, *aux_ciphe local
855 krb5_rc4_setup_seq_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, unsigned char *cksum) argument
921 krb5_rc4_setup_enc_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, s32 seqnum) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pem/
H A Dpem_lib.c278 EVP_CIPHER_INFO cipher; local
296 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher))
298 if (!PEM_do_header(&cipher, data, &len, cb, u))
363 /* actually it needs the cipher block size extra... */
439 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument
450 if (cipher->cipher == NULL)
465 if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher
489 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/
H A Dgost_asn1.c29 ASN1_SIMPLE(GOST_KEY_AGREEMENT_INFO, cipher, ASN1_OBJECT),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Devp.h326 /* Values for cipher flags */
336 /* Set if variable length cipher */
338 /* Set if the iv handling should be done by the cipher itself */
340 /* Set if the cipher's init() function should be called if key is NULL */
342 /* Call ctrl() to init cipher parameters */
348 /* cipher handles random key generation */
363 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
369 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
370 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided */
380 int key_len; /* May change for variable length cipher */
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/
H A Dgost_asn1.c29 ASN1_SIMPLE(GOST_KEY_AGREEMENT_INFO, cipher, ASN1_OBJECT),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Devp.h326 /* Values for cipher flags */
336 /* Set if variable length cipher */
338 /* Set if the iv handling should be done by the cipher itself */
340 /* Set if the cipher's init() function should be called if key is NULL */
342 /* Call ctrl() to init cipher parameters */
348 /* cipher handles random key generation */
363 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
369 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
370 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided */
380 int key_len; /* May change for variable length cipher */
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pem/
H A Dpem_lib.c278 EVP_CIPHER_INFO cipher; local
296 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher))
298 if (!PEM_do_header(&cipher, data, &len, cb, u))
363 /* actually it needs the cipher block size extra... */
439 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument
450 if (cipher->cipher == NULL)
465 if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher
489 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument
[all...]

Completed in 142 milliseconds

1234567891011>>