/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/iwmc3200wifi/ |
H A D | cfg80211.c | 153 key->cipher = params->cipher; 196 params.cipher = key->cipher; 485 static int iwm_set_cipher(struct iwm_priv *iwm, u32 cipher, bool ucast) argument 490 if (!cipher) { 495 IWM_DBG_WEXT(iwm, DBG, "%ccast cipher is 0x%x\n", ucast ? 'u' : 'm', 496 cipher); 498 switch (cipher) { 515 IWM_ERR(iwm, "Unsupported cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost89.c | 349 void gost_enc(gost_ctx * c, const byte * clear, byte * cipher, int blocks) argument 353 gostcrypt(c, clear, cipher); 355 cipher += 8; 360 void gost_dec(gost_ctx * c, const byte * cipher, byte * clear, int blocks) argument 364 gostdecrypt(c, cipher, clear); 366 cipher += 8; 372 byte * cipher, int blocks) 380 for (i = 0, in = clear, out = cipher; i < blocks; i++, in += 8, out += 8) { 389 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher, argument 398 for (i = 0, in = cipher, ou 371 gost_enc_cfb(gost_ctx * ctx, const byte * iv, const byte * clear, byte * cipher, int blocks) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | rxkad.c | 52 * this holds a pinned cipher so that keventd doesn't get called by the cipher 75 _debug("no cipher"); 102 conn->cipher = ci; 131 desc.tfm = conn->cipher; 180 desc.tfm = call->conn->cipher; 226 desc.tfm = call->conn->cipher; 275 if (!call->conn->cipher) 284 desc.tfm = call->conn->cipher; 355 desc.tfm = call->conn->cipher; [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | ablkcipher.c | 2 * Asynchronous block chaining cipher operations. 311 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); local 324 ret = cipher->setkey(tfm, alignbuffer, keylen); 333 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); local 336 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { 344 return cipher->setkey(tfm, key, keylen);
|
H A D | pcrypt.c | 279 struct crypto_aead *cipher; local 289 cipher = crypto_spawn_aead(crypto_instance_ctx(inst)); 291 if (IS_ERR(cipher)) 292 return PTR_ERR(cipher); 294 ctx->child = cipher; 297 + crypto_aead_reqsize(cipher);
|
H A D | tea.c | 230 .cra_u = { .cipher = { 246 .cra_u = { .cipher = { 262 .cra_u = { .cipher = {
|
H A D | arc4.c | 80 .cra_u = { .cipher = {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/engines/zencod/ |
H A D | hw_zencod.c | 183 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 1574 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 1578 if (!cipher) { 1583 /* We are being asked for a specific cipher */ 1585 *cipher = &engine_rc4; 1587 *cipher = &engine_rc4_40; 1589 *cipher = &engine_des_cbc; 1591 *cipher = &engine_des_ede3_cbc; 1593 *cipher = NULL; 1800 if (ctx->cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | bench.cpp | 73 void BenchMark(const char *name, BlockTransformation &cipher, double timeTotal) 75 const int BUF_SIZE = RoundUpToMultipleOf(2048U, cipher.OptimalNumberOfParallelBlocks() * cipher.BlockSize()); 77 const int nBlocks = BUF_SIZE / cipher.BlockSize(); 86 cipher.ProcessAndXorMultipleBlocks(buf, NULL, buf, nBlocks); 95 void BenchMark(const char *name, StreamTransformation &cipher, double timeTotal) argument 97 const int BUF_SIZE=RoundUpToMultipleOf(2048U, cipher.OptimalBlockSize()); 107 cipher.ProcessString(buf, BUF_SIZE);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/zencod/ |
H A D | hw_zencod.c | 172 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) ; 1517 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) argument 1520 if ( !cipher ) { 1525 /* We are being asked for a specific cipher */ 1527 *cipher = &engine_rc4 ; 1530 *cipher = &engine_rc4_40 ; 1533 *cipher = &engine_des_cbc ; 1536 *cipher = &engine_des_ede3_cbc ; 1539 *cipher = NULL ; 1727 if ( ctx->cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/engines/zencod/ |
H A D | hw_zencod.c | 183 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 1574 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 1578 if (!cipher) { 1583 /* We are being asked for a specific cipher */ 1585 *cipher = &engine_rc4; 1587 *cipher = &engine_rc4_40; 1589 *cipher = &engine_des_cbc; 1591 *cipher = &engine_des_ede3_cbc; 1593 *cipher = NULL; 1800 if (ctx->cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/ |
H A D | rtl_crypto.h | 99 #define cra_cipher cra_u.cipher 111 struct cipher_alg cipher; member in union:crypto_alg::__anon15782 185 #define crt_cipher crt_u.cipher 194 struct cipher_tfm cipher; member in union:crypto_tfm::__anon15783
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | rtl_crypto.h | 99 #define cra_cipher cra_u.cipher 111 struct cipher_alg cipher; member in union:crypto_alg::__anon15862 185 #define crt_cipher crt_u.cipher 194 struct cipher_tfm cipher; member in union:crypto_tfm::__anon15863
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_lib.c | 558 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 578 /* Check cipher OID exists and has data in it*/ 579 i = EVP_CIPHER_type(cipher); 586 ec->cipher = cipher;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/src/ |
H A D | gcrypt-module.h | 96 /* Register a new cipher module whose specification can be found in 99 gcry_error_t gcry_cipher_register (gcry_cipher_spec_t *cipher, 105 /* Unregister the cipher identified by MODULE, which must have been
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | gcrypt-module.h | 96 /* Register a new cipher module whose specification can be found in 99 gcry_error_t gcry_cipher_register (gcry_cipher_spec_t *cipher, 105 /* Unregister the cipher identified by MODULE, which must have been
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_kari.c | 387 const EVP_CIPHER *cipher) 391 int keylen = EVP_CIPHER_key_length(cipher); 401 * Pick a cipher based on content encryption cipher. If it is DES3 use 404 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc) 434 if (!cms_wrap_init(kari, ec->cipher)) 386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_kari.c | 387 const EVP_CIPHER *cipher) 391 int keylen = EVP_CIPHER_key_length(cipher); 401 * Pick a cipher based on content encryption cipher. If it is DES3 use 404 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc) 434 if (!cms_wrap_init(kari, ec->cipher)) 386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | curl_darwinssl.c | 219 CF_INLINE const char *SSLCipherNameForNumber(SSLCipherSuite cipher) { argument 220 switch (cipher) { 364 CF_INLINE const char *TLSCipherNameForNumber(SSLCipherSuite cipher) { argument 365 switch(cipher) { 1348 /* Disable cipher suites that ST supports but are not safe. These ciphers 1362 ciphers (cipher suite 0xC001 through 0xC032) simply do not work. 1446 /* We want to enable 1/n-1 when using a CBC cipher unless the user 1512 SSLCipherSuite cipher; local 1583 failf(data, "Could not negotiate an SSL cipher suite with the server"); 1605 (void)SSLGetNegotiatedCipher(connssl->ssl_ctx, &cipher); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/md/ |
H A D | dm-crypt.c | 110 char *cipher; member in struct:crypt_config 162 * encrypted with the bulk cipher using a salt as key. The salt 163 * should be derived from the bulk cipher's key via hashing. 266 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC); 274 ti->error = "Block size of ESSIV cipher does " 275 "not match IV size of block cipher"; 310 * to get the cipher block count, we use this shift in _gen */ 1032 kzfree(cc->cipher); 1043 char *tmp, *cipher, *chainmode, *ivmode, *ivopts; local 1049 ti->error = "Bad cipher specificatio [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/Netware/ |
H A D | do_tests.pl | 104 my $cipher = "$output_path\\cipher.out"; 118 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile" ); 119 log_output("Encrypting: $input --> $cipher", $outFile); 123 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile"); 124 log_output("Decrypting: $cipher --> $clear", $outFile); 145 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile"); 146 log_output("Encrypting(B64): $cipher --> $clear", $outFile); 150 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile"); 151 log_output("Decrypting(B64): $cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/ |
H A D | rt2x00lib.h | 331 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key); 345 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/Netware/ |
H A D | do_tests.pl | 104 my $cipher = "$output_path\\cipher.out"; 118 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile" ); 119 log_output("Encrypting: $input --> $cipher", $outFile); 123 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile"); 124 log_output("Decrypting: $cipher --> $clear", $outFile); 145 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile"); 146 log_output("Encrypting(B64): $cipher --> $clear", $outFile); 150 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile"); 151 log_output("Decrypting(B64): $cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/Netware/ |
H A D | do_tests.pl | 98 my $cipher = "$output_path\\cipher.out"; 112 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher > $outFile" ); 113 log_output("Encrypting: $input --> $cipher", $outFile); 117 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear > $outFile"); 118 log_output("Decrypting: $cipher --> $clear", $outFile); 139 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher > $outFile"); 140 log_output("Encrypting(B64): $cipher --> $clear", $outFile); 144 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear > $outFile"); 145 log_output("Decrypting(B64): $cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/ |
H A D | krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|