/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s2_enc.c | 141 /* check for NULL cipher */ 145 bs = ds->cipher->block_size;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/ |
H A D | rt2x00reg.h | 119 enum cipher { enum 133 * Max cipher type.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/ |
H A D | b64.c | 90 EVP_CIPHER *cipher=NULL,*c; local
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s2_enc.c | 139 /* check for NULL cipher */ 143 bs=ds->cipher->block_size;
|
H A D | s3_enc.c | 405 if (s->session->cipher != NULL) 407 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 411 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 472 bs=EVP_CIPHER_block_size(ds->cipher);
|
H A D | ssl_sess.c | 366 if (ret->cipher == NULL) 375 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 377 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 378 if (ret->cipher == NULL)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/ |
H A D | b64.c | 90 EVP_CIPHER *cipher = NULL, *c; local
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost_lcl.h | 70 ASN1_OBJECT *cipher; member in struct:__anon4636 120 /*============== Message digest and cipher related structures ==========*/ 164 /* Implementation of GOST 28147-89 cipher in CFB and CNT modes */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s2_enc.c | 141 /* check for NULL cipher */ 145 bs = ds->cipher->block_size;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/ |
H A D | n2_core.c | 668 /* The SPU allows some level of flexibility for partial cipher blocks 672 * as large as the cipher block size. This means that a cipher block 704 static int n2_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, argument 707 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); 724 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); 733 static int n2_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, argument 736 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); 745 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); 760 static int n2_3des_setkey(struct crypto_ablkcipher *cipher, cons argument 778 n2_arc4_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) argument 1351 struct n2_cipher_alg *cipher, *cipher_tmp; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | Makefile | 6 crypto-objs := api.o cipher.o compress.o
|
H A D | crypto_null.c | 9 * The null cipher is compliant with RFC2410. 132 .cra_u = { .cipher = {
|
H A D | twofish_generic.c | 192 .cra_u = { .cipher = {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/cris/include/arch-v32/arch/ |
H A D | cryptocop.h | 28 cryptocop_cipher_m2m = 3, /* mem2mem is essentially a NULL cipher with blocklength=1 */ 65 cryptocop_cipher_type cipher; /* AES, DES, 3DES, m2m, none */ member in struct:strcop_session_op 96 /* cipher_iv is used if do_cipher and cipher_explicit and the cipher 97 mode is CBC. The length is controlled by the type of cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 575 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 593 /* Check cipher OID exists and has data in it */ 594 i = EVP_CIPHER_type(cipher); 601 ec->cipher = cipher;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/ |
H A D | keystore.c | 246 "include a cipher code and checksum\n"); 251 /* The decrypted key includes 1 byte cipher code and 2 byte checksum */ 319 /* The encrypted key includes 1 byte cipher code and 2 byte checksum */ 528 "tfm and mutex for cipher name [%s]; rc = [%d]\n", 546 * Octets 1-N1: Tag 70 packet size (includes cipher identifier 601 "cipher [%s] with key bytes [%zd]\n", __func__, 822 * Octets 1-N1: Tag 70 packet size (includes cipher identifier 872 "tfm and mutex for cipher name [%s]; rc = [%d]\n", 1069 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); 1334 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | pkcs12.h | 184 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 232 ASN1_TYPE *param, const EVP_CIPHER *cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ms/ |
H A D | testenc.bat | 7 set tmp1=..\ms\cipher.out
|
H A D | testencce.bat | 8 set tmp1=cipher.out
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | cipher.c | 109 tfm->crt_u.cipher.cit_xor_block(iv, src); 117 tfm->crt_u.cipher.cit_xor_block(buf, iv);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs12.h | 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ms/ |
H A D | testenc.bat | 7 set tmp1=..\ms\cipher.out
|
H A D | testencce.bat | 8 set tmp1=cipher.out
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ms/ |
H A D | testenc.bat | 7 set tmp1=..\ms\cipher.out
|
H A D | testencce.bat | 8 set tmp1=cipher.out
|