Searched refs:cipher (Results 276 - 300 of 456) sorted by relevance

<<111213141516171819

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dpkcs12.h183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/
H A Dcms_lcl.h170 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st
447 const EVP_CIPHER *cipher,
H A Dcms.h166 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
183 const EVP_CIPHER *cipher, unsigned int flags); variable
198 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/
H A Dpkcs12.h184 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
232 ASN1_TYPE *param, const EVP_CIPHER *cipher,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/
H A Dcms_lcl.h170 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st
447 const EVP_CIPHER *cipher,
H A Dcms.h166 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
183 const EVP_CIPHER *cipher, unsigned int flags); variable
198 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/wireless/
H A Dutil.c158 params->cipher != WLAN_CIPHER_SUITE_WEP40 &&
159 params->cipher != WLAN_CIPHER_SUITE_WEP104)
162 switch (params->cipher) {
188 switch (params->cipher) {
203 if (params->cipher == rdev->wiphy.cipher_suites[i])
665 if (!wdev->connect_keys->params[i].cipher)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A DMakefile.in18 # Makefile for cipher modules
58 subdir = cipher
76 am_libcipher_la_OBJECTS = cipher.lo pubkey.lo ac.lo md.lo kdf.lo \
259 cipher.c pubkey.c ac.c md.c kdf.c \
306 echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu cipher/Makefile'; \
308 $(AUTOMAKE) --gnu cipher/Makefile
351 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cipher.Plo@am__quote@
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A DMakefile.in18 # Makefile for cipher modules
58 subdir = cipher
76 am_libcipher_la_OBJECTS = cipher.lo pubkey.lo ac.lo md.lo kdf.lo \
259 cipher.c pubkey.c ac.c md.c kdf.c \
306 echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu cipher/Makefile'; \
308 $(AUTOMAKE) --gnu cipher/Makefile
351 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/cipher.Plo@am__quote@
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dvmac.cpp49 BlockCipher &cipher = AccessCipher(); local
50 cipher.SetKey(userKey, keylength, params);
51 unsigned int blockSize = cipher.BlockSize();
60 cipher.AdvancedProcessBlocks(in, NULL, (byte *)m_nhKey(), m_nhKeySize()*sizeof(word64), cipher.BT_InBlockIsCounter);
68 cipher.ProcessBlock(in, out.BytePtr());
81 cipher.ProcessBlock(in, out.BytePtr());
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Ds_server.c113 * ECC cipher suite support in OpenSSL originally developed by
246 static char *cipher=NULL; variable
282 cipher=NULL;
344 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
345 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
704 else if (strcmp(*argv,"-cipher") == 0)
707 cipher= *(++argv);
949 if (cipher == NULL) cipher=getenv("SSL_CIPHER");
1074 if (cipher !
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/
H A Dtalitos.c1032 /* cipher iv */
1036 /* cipher key */
1042 * cipher in
1043 * map and adjust cipher len to aead request cryptlen.
1078 /* cipher out */
1382 static int ablkcipher_setkey(struct crypto_ablkcipher *cipher, argument
1385 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher);
1386 struct ablkcipher_alg *alg = crypto_ablkcipher_alg(cipher);
1400 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN);
1442 struct crypto_ablkcipher *cipher local
1539 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); local
1548 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); local
1565 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/
H A Dcrypto.c769 * TODO: Performance: Keep a cache of initialized cipher contexts;
777 if (!crypt_stat->cipher) {
778 ecryptfs_printk(KERN_ERR, "No cipher specified\n");
782 "Initializing cipher [%s]; strlen = [%d]; "
784 crypt_stat->cipher, (int)strlen(crypt_stat->cipher),
792 crypt_stat->cipher, "cbc");
802 "Error initializing cipher [%s]\n",
803 crypt_stat->cipher);
964 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHE
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dssl_sess.c687 if (ret->cipher == NULL) {
695 ret->cipher = ssl_get_cipher_by_char(s, &(buf[2]));
697 ret->cipher = ssl_get_cipher_by_char(s, &(buf[1]));
698 if (ret->cipher == NULL)
1026 **cipher,
1019 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
H A Ds23_clnt.c263 SSL_CIPHER *cipher; local
268 cipher = sk_SSL_CIPHER_value(ciphers, i);
269 if (cipher->algorithm_ssl == SSL_SSLV2)
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/
H A Drndis_wlan.c453 u32 cipher; member in struct:rndis_wlan_encr_key
612 int cipher = priv->encr_keys[idx].cipher; local
614 return (cipher == WLAN_CIPHER_SUITE_CCMP ||
615 cipher == WLAN_CIPHER_SUITE_TKIP);
618 static int rndis_cipher_to_alg(u32 cipher) argument
620 switch (cipher) {
1316 u32 cipher; local
1326 cipher = WLAN_CIPHER_SUITE_WEP40;
1328 cipher
1362 add_wpa_key(struct usbnet *usbdev, const u8 *key, int key_len, int index, const u8 *addr, const u8 *rx_seq, int seq_len, u32 cipher, __le32 flags) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dpem.h143 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
157 int cipher; member in struct:pem_recip_st
174 int cipher; member in struct:pem_ctx_st::__anon7211
195 EVP_CIPHER *dec; /* date encryption cipher */
565 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
566 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dssl_sess.c687 if (ret->cipher == NULL) {
695 ret->cipher = ssl_get_cipher_by_char(s, &(buf[2]));
697 ret->cipher = ssl_get_cipher_by_char(s, &(buf[1]));
698 if (ret->cipher == NULL)
1026 **cipher,
1019 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
H A Ds23_clnt.c263 SSL_CIPHER *cipher; local
268 cipher = sk_SSL_CIPHER_value(ciphers, i);
269 if (cipher->algorithm_ssl == SSL_SSLV2)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/
H A Dpem.h143 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
157 int cipher; member in struct:pem_recip_st
174 int cipher; member in struct:pem_ctx_st::__anon7140
195 EVP_CIPHER *dec; /* date encryption cipher */
565 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
566 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dcryptd.c239 struct crypto_blkcipher *cipher; local
241 cipher = crypto_spawn_blkcipher(spawn);
242 if (IS_ERR(cipher))
243 return PTR_ERR(cipher);
245 ctx->child = cipher;
H A Dvmac.c583 struct crypto_cipher *cipher; local
588 cipher = crypto_spawn_cipher(spawn);
589 if (IS_ERR(cipher))
590 return PTR_ERR(cipher);
592 ctx->child = cipher;
H A Dgcm.c47 struct scatterlist cipher[1]; member in struct:crypto_rfc4543_req_ctx
743 /* Not a stream cipher? */
1005 /* Not a stream cipher? */
1128 struct scatterlist *cipher = rctx->cipher; local
1141 /* construct cipher/plaintext */
1149 sg_init_one(cipher, rctx->auth_tag, authsize);
1168 aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv);
1271 /* Not a stream cipher
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/rt2x00/
H A Drt2x00mac.c527 crypto.cipher = rt2x00crypto_key_to_cipher(key);
528 if (crypto.cipher == CIPHER_NONE)
540 if (crypto.cipher == CIPHER_TKIP)
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/wlan-ng/
H A Dcfg80211.c151 switch (params->cipher) {
189 pr_debug("Unsupported cipher suite\n");
215 params.cipher = WLAN_CIPHER_SUITE_WEP104;
217 params.cipher = WLAN_CIPHER_SUITE_WEP104;

Completed in 238 milliseconds

<<111213141516171819