/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | blkcipher.c | 2 * Block chaining cipher operations. 362 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; local 375 ret = cipher->setkey(tfm, alignbuffer, keylen); 383 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; local 386 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { 394 return cipher->setkey(tfm, key, keylen); 433 struct blkcipher_alg *cipher = &alg->cra_blkcipher; local 437 cipher->ivsize) { 439 len += cipher 680 struct crypto_ablkcipher *cipher; local [all...] |
H A D | authenc.c | 43 struct scatterlist cipher[2]; member in struct:authenc_request_ctx 333 struct scatterlist *cipher = areq_ctx->cipher; local 346 sg_init_table(cipher, 2); 347 sg_set_buf(cipher, iv, ivsize); 348 authenc_chain(cipher, dst, vdst == iv + ivsize); 349 dst = cipher; 489 struct scatterlist *cipher = areq_ctx->cipher; local 500 sg_init_table(cipher, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | cms.c | 125 const EVP_CIPHER *cipher = NULL, *wrap_cipher = NULL; local 213 cipher = EVP_des_ede3_cbc(); 215 cipher = EVP_des_cbc(); 221 cipher = EVP_seed_cbc(); 225 cipher = EVP_rc2_40_cbc(); 227 cipher = EVP_rc2_cbc(); 229 cipher = EVP_rc2_64_cbc(); 233 cipher = EVP_aes_128_cbc(); 235 cipher = EVP_aes_192_cbc(); 237 cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | cms.c | 125 const EVP_CIPHER *cipher = NULL, *wrap_cipher = NULL; local 213 cipher = EVP_des_ede3_cbc(); 215 cipher = EVP_des_cbc(); 221 cipher = EVP_seed_cbc(); 225 cipher = EVP_rc2_40_cbc(); 227 cipher = EVP_rc2_cbc(); 229 cipher = EVP_rc2_64_cbc(); 233 cipher = EVP_aes_128_cbc(); 235 cipher = EVP_aes_192_cbc(); 237 cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | evp.h | 336 /* Values for cipher flags */ 351 /* Set if variable length cipher */ 353 /* Set if the iv handling should be done by the cipher itself */ 355 /* Set if the cipher's init() function should be called if key is NULL */ 357 /* Call ctrl() to init cipher parameters */ 363 /* cipher handles random key generation */ 365 /* cipher has its own additional copying logic */ 373 /* Allow non FIPS cipher in FIPS mode */ 411 * AEAD cipher deduces payload length and returns number of bytes required to 445 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 450 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | evp.h | 336 /* Values for cipher flags */ 351 /* Set if variable length cipher */ 353 /* Set if the iv handling should be done by the cipher itself */ 355 /* Set if the cipher's init() function should be called if key is NULL */ 357 /* Call ctrl() to init cipher parameters */ 363 /* cipher handles random key generation */ 365 /* cipher has its own additional copying logic */ 373 /* Allow non FIPS cipher in FIPS mode */ 411 * AEAD cipher deduces payload length and returns number of bytes required to 445 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 450 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | modes.h | 22 The "external cipher" mode objects hold a reference to the underlying block cipher, 24 For the "cipher holder" classes, the CIPHER template parameter should be a class 45 void SetCipher(BlockCipher &cipher) argument 48 this->m_cipher = &cipher; 52 void SetCipherWithIV(BlockCipher &cipher, const byte *iv, int feedbackSize = 0) argument 55 this->m_cipher = &cipher; 68 throw InvalidArgument("CipherModeBase: feedback size cannot be specified for this cipher mode"); 282 CipherModeFinalTemplate_ExternalCipher(BlockCipher &cipher) argument 283 {this->SetCipher(cipher);} 284 CipherModeFinalTemplate_ExternalCipher(BlockCipher &cipher, const byte *iv, int feedbackSize = 0) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/block/ |
H A D | cryptoloop.c | 45 char cms[LO_NAME_SIZE]; /* cipher-mode string */ 46 char *cipher; local 59 cipher = cmsp;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | Makefile.am | 1 # Makefile for cipher modules 38 cipher.c pubkey.c ac.c md.c kdf.c \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | Makefile.am | 1 # Makefile for cipher modules 38 cipher.c pubkey.c ac.c md.c kdf.c \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pem/ |
H A D | pem_info.c | 236 EVP_CIPHER_INFO cipher; local 238 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) 240 if (!PEM_do_header(&cipher, data, &len, cb, u)) 348 objstr = OBJ_nid2sn(EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | arc4.c | 79 .cra_u = { .cipher = {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/ |
H A D | krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem_info.c | 247 EVP_CIPHER_INFO cipher; local 249 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 251 if (!PEM_do_header(&cipher,data,&len,cb,u)) 351 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 80 * cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pem/ |
H A D | pem_info.c | 236 EVP_CIPHER_INFO cipher; local 238 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) 240 if (!PEM_do_header(&cipher, data, &len, cb, u)) 348 objstr = OBJ_nid2sn(EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/krb5/ |
H A D | krb5_asn.h | 80 * cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost2001_keyx.c | 190 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 191 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 264 param = get_encryption_params(gkt->key_agreement_info->cipher);
|
H A D | gost94_keyx.c | 110 /* Do not use vizir cipher parameters with cryptopro */ 176 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 177 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 254 param = get_encryption_params(gkt->key_agreement_info->cipher);
|
H A D | gost89.c | 349 void gost_enc(gost_ctx * c, const byte * clear, byte * cipher, int blocks) argument 353 gostcrypt(c, clear, cipher); 355 cipher += 8; 360 void gost_dec(gost_ctx * c, const byte * cipher, byte * clear, int blocks) argument 364 gostdecrypt(c, cipher, clear); 366 cipher += 8; 372 byte * cipher, int blocks) 380 for (i = 0, in = clear, out = cipher; i < blocks; i++, in += 8, out += 8) { 389 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher, argument 398 for (i = 0, in = cipher, ou 371 gost_enc_cfb(gost_ctx * ctx, const byte * iv, const byte * clear, byte * cipher, int blocks) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/ |
H A D | rt2x00crypto.c | 32 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) 61 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); 173 switch (rxdesc->cipher) {
|
H A D | rt2x00queue.h | 193 * @cipher: Cipher type used during decryption. 206 u8 cipher; member in struct:rxdone_entry_desc 315 * @cipher: Cipher type used for encryption. 346 enum cipher cipher; member in struct:txentry_desc
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost2001_keyx.c | 190 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 191 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 264 param = get_encryption_params(gkt->key_agreement_info->cipher);
|
H A D | gost94_keyx.c | 110 /* Do not use vizir cipher parameters with cryptopro */ 176 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 177 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 254 param = get_encryption_params(gkt->key_agreement_info->cipher);
|