Searched refs:cipher (Results 201 - 225 of 456) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/iwmc3200wifi/
H A Dcfg80211.c153 key->cipher = params->cipher;
196 params.cipher = key->cipher;
485 static int iwm_set_cipher(struct iwm_priv *iwm, u32 cipher, bool ucast) argument
490 if (!cipher) {
495 IWM_DBG_WEXT(iwm, DBG, "%ccast cipher is 0x%x\n", ucast ? 'u' : 'm',
496 cipher);
498 switch (cipher) {
515 IWM_ERR(iwm, "Unsupported cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/
H A Dgost89.c349 void gost_enc(gost_ctx * c, const byte * clear, byte * cipher, int blocks) argument
353 gostcrypt(c, clear, cipher);
355 cipher += 8;
360 void gost_dec(gost_ctx * c, const byte * cipher, byte * clear, int blocks) argument
364 gostdecrypt(c, cipher, clear);
366 cipher += 8;
372 byte * cipher, int blocks)
380 for (i = 0, in = clear, out = cipher; i < blocks; i++, in += 8, out += 8) {
389 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher, argument
398 for (i = 0, in = cipher, ou
371 gost_enc_cfb(gost_ctx * ctx, const byte * iv, const byte * clear, byte * cipher, int blocks) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Drxkad.c52 * this holds a pinned cipher so that keventd doesn't get called by the cipher
75 _debug("no cipher");
102 conn->cipher = ci;
131 desc.tfm = conn->cipher;
180 desc.tfm = call->conn->cipher;
226 desc.tfm = call->conn->cipher;
275 if (!call->conn->cipher)
284 desc.tfm = call->conn->cipher;
355 desc.tfm = call->conn->cipher;
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dablkcipher.c2 * Asynchronous block chaining cipher operations.
311 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); local
324 ret = cipher->setkey(tfm, alignbuffer, keylen);
333 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); local
336 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) {
344 return cipher->setkey(tfm, key, keylen);
H A Dpcrypt.c279 struct crypto_aead *cipher; local
289 cipher = crypto_spawn_aead(crypto_instance_ctx(inst));
291 if (IS_ERR(cipher))
292 return PTR_ERR(cipher);
294 ctx->child = cipher;
297 + crypto_aead_reqsize(cipher);
H A Dtea.c230 .cra_u = { .cipher = {
246 .cra_u = { .cipher = {
262 .cra_u = { .cipher = {
H A Darc4.c80 .cra_u = { .cipher = {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/engines/zencod/
H A Dhw_zencod.c183 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
1574 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
1578 if (!cipher) {
1583 /* We are being asked for a specific cipher */
1585 *cipher = &engine_rc4;
1587 *cipher = &engine_rc4_40;
1589 *cipher = &engine_des_cbc;
1591 *cipher = &engine_des_ede3_cbc;
1593 *cipher = NULL;
1800 if (ctx->cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dbench.cpp73 void BenchMark(const char *name, BlockTransformation &cipher, double timeTotal)
75 const int BUF_SIZE = RoundUpToMultipleOf(2048U, cipher.OptimalNumberOfParallelBlocks() * cipher.BlockSize());
77 const int nBlocks = BUF_SIZE / cipher.BlockSize();
86 cipher.ProcessAndXorMultipleBlocks(buf, NULL, buf, nBlocks);
95 void BenchMark(const char *name, StreamTransformation &cipher, double timeTotal) argument
97 const int BUF_SIZE=RoundUpToMultipleOf(2048U, cipher.OptimalBlockSize());
107 cipher.ProcessString(buf, BUF_SIZE);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/zencod/
H A Dhw_zencod.c172 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) ;
1517 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) argument
1520 if ( !cipher ) {
1525 /* We are being asked for a specific cipher */
1527 *cipher = &engine_rc4 ;
1530 *cipher = &engine_rc4_40 ;
1533 *cipher = &engine_des_cbc ;
1536 *cipher = &engine_des_ede3_cbc ;
1539 *cipher = NULL ;
1727 if ( ctx->cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/engines/zencod/
H A Dhw_zencod.c183 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
1574 static int engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
1578 if (!cipher) {
1583 /* We are being asked for a specific cipher */
1585 *cipher = &engine_rc4;
1587 *cipher = &engine_rc4_40;
1589 *cipher = &engine_des_cbc;
1591 *cipher = &engine_des_ede3_cbc;
1593 *cipher = NULL;
1800 if (ctx->cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/
H A Drtl_crypto.h99 #define cra_cipher cra_u.cipher
111 struct cipher_alg cipher; member in union:crypto_alg::__anon15782
185 #define crt_cipher crt_u.cipher
194 struct cipher_tfm cipher; member in union:crypto_tfm::__anon15783
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/
H A Drtl_crypto.h99 #define cra_cipher cra_u.cipher
111 struct cipher_alg cipher; member in union:crypto_alg::__anon15862
185 #define crt_cipher crt_u.cipher
194 struct cipher_tfm cipher; member in union:crypto_tfm::__anon15863
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/
H A Dpk7_lib.c558 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument
578 /* Check cipher OID exists and has data in it*/
579 i = EVP_CIPHER_type(cipher);
586 ec->cipher = cipher;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/src/
H A Dgcrypt-module.h96 /* Register a new cipher module whose specification can be found in
99 gcry_error_t gcry_cipher_register (gcry_cipher_spec_t *cipher,
105 /* Unregister the cipher identified by MODULE, which must have been
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/src/
H A Dgcrypt-module.h96 /* Register a new cipher module whose specification can be found in
99 gcry_error_t gcry_cipher_register (gcry_cipher_spec_t *cipher,
105 /* Unregister the cipher identified by MODULE, which must have been
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/
H A Dcms_kari.c387 const EVP_CIPHER *cipher)
391 int keylen = EVP_CIPHER_key_length(cipher);
401 * Pick a cipher based on content encryption cipher. If it is DES3 use
404 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc)
434 if (!cms_wrap_init(kari, ec->cipher))
386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/
H A Dcms_kari.c387 const EVP_CIPHER *cipher)
391 int keylen = EVP_CIPHER_key_length(cipher);
401 * Pick a cipher based on content encryption cipher. If it is DES3 use
404 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc)
434 if (!cms_wrap_init(kari, ec->cipher))
386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Dcurl_darwinssl.c219 CF_INLINE const char *SSLCipherNameForNumber(SSLCipherSuite cipher) { argument
220 switch (cipher) {
364 CF_INLINE const char *TLSCipherNameForNumber(SSLCipherSuite cipher) { argument
365 switch(cipher) {
1348 /* Disable cipher suites that ST supports but are not safe. These ciphers
1362 ciphers (cipher suite 0xC001 through 0xC032) simply do not work.
1446 /* We want to enable 1/n-1 when using a CBC cipher unless the user
1512 SSLCipherSuite cipher; local
1583 failf(data, "Could not negotiate an SSL cipher suite with the server");
1605 (void)SSLGetNegotiatedCipher(connssl->ssl_ctx, &cipher);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/md/
H A Ddm-crypt.c110 char *cipher; member in struct:crypt_config
162 * encrypted with the bulk cipher using a salt as key. The salt
163 * should be derived from the bulk cipher's key via hashing.
266 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC);
274 ti->error = "Block size of ESSIV cipher does "
275 "not match IV size of block cipher";
310 * to get the cipher block count, we use this shift in _gen */
1032 kzfree(cc->cipher);
1043 char *tmp, *cipher, *chainmode, *ivmode, *ivopts; local
1049 ti->error = "Bad cipher specificatio
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/Netware/
H A Ddo_tests.pl104 my $cipher = "$output_path\\cipher.out";
118 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile" );
119 log_output("Encrypting: $input --> $cipher", $outFile);
123 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
124 log_output("Decrypting: $cipher --> $clear", $outFile);
145 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile");
146 log_output("Encrypting(B64): $cipher --> $clear", $outFile);
150 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
151 log_output("Decrypting(B64): $cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/
H A Drt2x00lib.h331 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key);
345 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/Netware/
H A Ddo_tests.pl104 my $cipher = "$output_path\\cipher.out";
118 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile" );
119 log_output("Encrypting: $input --> $cipher", $outFile);
123 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
124 log_output("Decrypting: $cipher --> $clear", $outFile);
145 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile");
146 log_output("Encrypting(B64): $cipher --> $clear", $outFile);
150 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
151 log_output("Decrypting(B64): $cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/Netware/
H A Ddo_tests.pl98 my $cipher = "$output_path\\cipher.out";
112 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher > $outFile" );
113 log_output("Encrypting: $input --> $cipher", $outFile);
117 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear > $outFile");
118 log_output("Decrypting: $cipher --> $clear", $outFile);
139 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher > $outFile");
140 log_output("Encrypting(B64): $cipher --> $clear", $outFile);
144 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear > $outFile");
145 log_output("Decrypting(B64): $cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/
H A Dkrb5_asn.c66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)

Completed in 170 milliseconds

1234567891011>>