/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 71 ASN1_TYPE *param, const EVP_CIPHER *cipher, 80 if (cipher == NULL) 103 iter, EVP_CIPHER_key_length(cipher), key, md)) { 109 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 115 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 70 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | cipher.c | 0 /* cipher.c - cipher dispatcher 28 #include "cipher.h" 36 /* Try to use 16 byte aligned cipher context for better performance. 53 gcry_cipher_spec_t *cipher; member in struct:cipher_table_entry 167 gcry_cipher_spec_t *cipher; member in struct:gcry_cipher_handle 177 API) we need to keep these function pointers here. The cipher 226 /* What follows are two contexts of the cipher in use. The first 227 one needs to be aligned well enough for the cipher operation 237 /* These dummy functions are used in case a cipher implementatio 333 gcry_cipher_spec_t *cipher = (gcry_cipher_spec_t *) spec; local 349 gcry_cipher_spec_t *cipher = (gcry_cipher_spec_t *) spec; local 366 gcry_module_t cipher; local 378 gcry_module_t cipher; local 390 _gcry_cipher_register(gcry_cipher_spec_t *cipher, cipher_extra_spec_t *extraspec, int *algorithm_id, gcry_module_t *module) argument 448 gcry_cipher_spec_t *cipher = module->spec; local 473 gcry_module_t cipher; local 533 gcry_module_t cipher; local 570 gcry_module_t cipher; local 593 gcry_module_t cipher; local 620 gcry_module_t cipher; local 648 gcry_module_t cipher; local 689 gcry_cipher_spec_t *cipher = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | cipher.c | 0 /* cipher.c - cipher dispatcher 28 #include "cipher.h" 36 /* Try to use 16 byte aligned cipher context for better performance. 53 gcry_cipher_spec_t *cipher; member in struct:cipher_table_entry 167 gcry_cipher_spec_t *cipher; member in struct:gcry_cipher_handle 177 API) we need to keep these function pointers here. The cipher 226 /* What follows are two contexts of the cipher in use. The first 227 one needs to be aligned well enough for the cipher operation 237 /* These dummy functions are used in case a cipher implementatio 333 gcry_cipher_spec_t *cipher = (gcry_cipher_spec_t *) spec; local 349 gcry_cipher_spec_t *cipher = (gcry_cipher_spec_t *) spec; local 366 gcry_module_t cipher; local 378 gcry_module_t cipher; local 390 _gcry_cipher_register(gcry_cipher_spec_t *cipher, cipher_extra_spec_t *extraspec, int *algorithm_id, gcry_module_t *module) argument 448 gcry_cipher_spec_t *cipher = module->spec; local 473 gcry_module_t cipher; local 533 gcry_module_t cipher; local 570 gcry_module_t cipher; local 593 gcry_module_t cipher; local 620 gcry_module_t cipher; local 648 gcry_module_t cipher; local 689 gcry_cipher_spec_t *cipher = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p5_crpt.c | 104 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, 149 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 150 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 151 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 152 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 153 EVP_CIPHER_iv_length(cipher)); 154 EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); 103 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | evp_pbe.c | 68 /* Setup a cipher context from a PBE algorithm */ 72 const EVP_CIPHER *cipher; member in struct:__anon7134 98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher, 116 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument 126 pbe_tmp->cipher = cipher;
|
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | p5_crpt.c | 75 ASN1_TYPE *param, const EVP_CIPHER *cipher, 135 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 136 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 137 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 138 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 139 EVP_CIPHER_iv_length(cipher)); 140 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) 74 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | evp_test.c | 143 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 377 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument 386 c = EVP_get_cipherbyname(cipher); 491 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use 500 char *cipher; local 512 cipher = sstrsep(&p, ":"); 547 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, aad, an, 549 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) { 551 if (strstr(cipher, "AES") == cipher) { [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | p5_crpt.c | 75 ASN1_TYPE *param, const EVP_CIPHER *cipher, 135 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 136 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 137 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 138 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 139 EVP_CIPHER_iv_length(cipher)); 140 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) 74 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | evp_test.c | 143 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 377 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument 386 c = EVP_get_cipherbyname(cipher); 491 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use 500 char *cipher; local 512 cipher = sstrsep(&p, ":"); 547 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, aad, an, 549 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) { 551 if (strstr(cipher, "AES") == cipher) { [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/tests/ |
H A D | cavs_driver.pl | 118 # porting to a new cipher library 126 # independent ciphers is given with the cipher specification, we hand in 131 # $3 cipher - the cipher string is defined as specified in the openssl 187 # supplying the call to the external cipher implementation 190 # $1: cipher 201 # supplying the call to the external cipher implementation 206 # $1: cipher key in hex format 274 my $cipher=shift; 283 my $program="openssl enc -$cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | cavs_driver.pl | 118 # porting to a new cipher library 126 # independent ciphers is given with the cipher specification, we hand in 131 # $3 cipher - the cipher string is defined as specified in the openssl 187 # supplying the call to the external cipher implementation 190 # $1: cipher 201 # supplying the call to the external cipher implementation 206 # $1: cipher key in hex format 274 my $cipher=shift; 283 my $program="openssl enc -$cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | ccm.cpp | 18 throw InvalidArgument(AlgorithmName() + ": block size of underlying block cipher is not 16"); 30 BlockCipher &cipher = AccessBlockCipher(); local 44 m_ctr.SetCipherWithIV(cipher, m_buffer); 60 const BlockCipher &cipher = GetBlockCipher(); local 65 cipher.ProcessBlock(cbcBuffer); 96 const BlockCipher &cipher = GetBlockCipher(); local 97 return cipher.AdvancedProcessBlocks(cbcBuffer, data, cbcBuffer, len, BlockTransformation::BT_DontIncrementInOutPointers|BlockTransformation::BT_XorInput); 103 const BlockCipher &cipher = GetBlockCipher(); local 111 cipher.ProcessBlock(cbcBuffer); 119 const BlockCipher &cipher local [all...] |
H A D | rng.cpp | 62 : cipher(c), 63 S(cipher->BlockSize()), 73 cipher->ProcessBlock(dtbuf); 76 cipher->ProcessBlock(dtbuf); 90 cipher->ProcessBlock(m_deterministicTimeVector, dtbuf); 99 cipher->ProcessBlock(dtbuf); 106 cipher->ProcessBlock(randseed); 118 cipher->ProcessBlock(randseed);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/missing/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 75 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 77 cipher->mode = mode; 82 bcopy(IV, cipher->IV, MAX_IV_SIZE); 84 bzero(cipher->IV, MAX_IV_SIZE); 89 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 94 if (cipher == NULL || 105 switch (cipher->mode) { 115 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0]; 116 ((word32*)block)[1] = ((word32*)cipher->IV)[1] ^ ((word32*)input)[1]; 117 ((word32*)block)[2] = ((word32*)cipher 181 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 246 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 331 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 423 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | cipher.c | 82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; local 85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); 89 cipher->cia_encrypt(tfm, dst, src); 96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; local 99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); 103 cipher->cia_decrypt(tfm, dst, src); 109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; local 113 cipher_encrypt_unaligned : cipher->cia_encrypt; 115 cipher_decrypt_unaligned : cipher->cia_decrypt;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-config-files/ |
H A D | server.conf | 241 # Select a cryptographic cipher. 244 ;cipher BF-CBC # Blowfish (default) 245 ;cipher AES-128-CBC # AES 246 ;cipher DES-EDE3-CBC # Triple-DES
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | crypto.c | 99 if (ctx->cipher) 102 const int iv_size = cipher_ctx_iv_length (ctx->cipher); 103 const unsigned int mode = cipher_ctx_mode (ctx->cipher); 114 /* Put packet ID in plaintext buffer or IV, depending on cipher mode */ 151 ASSERT (cipher_ctx_reset(ctx->cipher, iv_buf)); 154 if (!buf_safe (&work, buf->len + cipher_ctx_block_size(ctx->cipher))) 163 cipher_ctx_block_size (ctx->cipher)); 168 ASSERT (cipher_ctx_update (ctx->cipher, BPTR (&work), &outlen, BPTR (buf), BLEN (buf))); 172 ASSERT(cipher_ctx_final(ctx->cipher, BPTR (&work) + outlen, &outlen)); 198 /* HMAC the ciphertext (or plaintext if !cipher) */ [all...] |
H A D | crypto_polarssl.h | 33 #include <polarssl/cipher.h> 37 /** Generic cipher key type %context. */ 43 /** Generic cipher %context. */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
H A D | p12_crpt.c | 88 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) 114 iter, EVP_CIPHER_key_length(cipher), key, md)) { 120 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 126 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 87 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost89.h | 46 void gost_enc(gost_ctx * ctx, const byte * clear, byte * cipher, int blocks); 48 void gost_dec(gost_ctx * ctx, const byte * cipher, byte * clear, int blocks); 51 byte * cipher, int blocks); 53 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost89.h | 46 void gost_enc(gost_ctx * ctx, const byte * clear, byte * cipher, int blocks); 48 void gost_dec(gost_ctx * ctx, const byte * cipher, byte * clear, int blocks); 51 byte * cipher, int blocks); 53 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_p8e.c | 64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 80 pbe = PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, pbe_nid);
|