/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_p8e.c | 64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 80 pbe = PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, pbe_nid);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | enc.c | 77 const EVP_CIPHER *cipher=NULL; local 91 if(!(cipher = EVP_get_cipherbyname(argv[2]))) { 92 fprintf(stderr, "Unknown cipher %s\n", argv[2]); 130 if(!cipher) { 132 cipher = EVP_des_ede3_cbc(); 134 fprintf(stderr, "No cipher selected\n"); 139 if (!PKCS7_set_cipher(p7,cipher)) goto err;
|
H A D | pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | bio_enc.c | 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct 92 BIO_TYPE_CIPHER,"cipher", 114 EVP_CIPHER_CTX_init(&ctx->cipher); 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 201 EVP_CipherUpdate(&(ctx->cipher), 260 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | bio_enc.c | 86 EVP_CIPHER_CTX cipher; member in struct:enc_struct 95 BIO_TYPE_CIPHER, "cipher", 118 EVP_CIPHER_CTX_init(&ctx->cipher); 139 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 194 i = EVP_CipherFinal_ex(&(ctx->cipher), 204 EVP_CipherUpdate(&(ctx->cipher), 263 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL, 302 ctx->cipher.encrypt); 333 ret = EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | bio_enc.c | 86 EVP_CIPHER_CTX cipher; member in struct:enc_struct 95 BIO_TYPE_CIPHER, "cipher", 118 EVP_CIPHER_CTX_init(&ctx->cipher); 139 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 194 i = EVP_CipherFinal_ex(&(ctx->cipher), 204 EVP_CipherUpdate(&(ctx->cipher), 263 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL, 302 ctx->cipher.encrypt); 333 ret = EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 101 alg_nid = EVP_CIPHER_type(cipher); 120 if (EVP_CIPHER_iv_length(cipher)) { 122 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 123 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 130 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 138 * If prf NID unspecified see if cipher has a preference. An error is OK 151 keylen = EVP_CIPHER_key_length(cipher); 198 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 201 return PKCS5_pbe2_set_iv(cipher, ite [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | testssl | 155 $ssltest -cipher $_cipher $prot 165 for cipher in `../util/shlib_wrap.sh ../apps/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do 166 test_cipher $cipher $protocol 171 for cipher in `../util/shlib_wrap.sh ../apps/openssl ciphers "EDH+aRSA+$protocol:-EXP" | tr ':' ' '`; do 172 test_cipher $cipher $protocol 176 $ssltest -cipher EDH -dhe512 -ssl3 178 $ssltest -cipher EDH -dhe512 188 for cipher in `../util/shlib_wrap.sh ../apps/openssl ciphers "EECDH+aRSA+$protocol:-EXP" | tr ':' ' '`; do 189 test_cipher $cipher $protocol 200 $ssltest -v -bio_pair -tls1 -cipher AD [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | testssl | 155 $ssltest -cipher $_cipher $prot 165 for cipher in `../util/shlib_wrap.sh ../apps/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do 166 test_cipher $cipher $protocol 171 for cipher in `../util/shlib_wrap.sh ../apps/openssl ciphers "EDH+aRSA+$protocol:-EXP" | tr ':' ' '`; do 172 test_cipher $cipher $protocol 176 $ssltest -cipher EDH -dhe512 -ssl3 178 $ssltest -cipher EDH -dhe512 188 for cipher in `../util/shlib_wrap.sh ../apps/openssl ciphers "EECDH+aRSA+$protocol:-EXP" | tr ':' ' '`; do 189 test_cipher $cipher $protocol 200 $ssltest -v -bio_pair -tls1 -cipher AD [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | p5_pbev2.c | 90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 101 alg_nid = EVP_CIPHER_type(cipher); 120 if (EVP_CIPHER_iv_length(cipher)) { 122 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 123 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 130 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 138 * If prf NID unspecified see if cipher has a preference. An error is OK 151 keylen = EVP_CIPHER_key_length(cipher); 198 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 201 return PKCS5_pbe2_set_iv(cipher, ite [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | xts.c | 48 /* we need two cipher instances: one to compute the inital 'tweak' 52 /* tweak cipher, uses Key2 i.e. the second half of *key */ 65 /* data cipher, uses Key1 i.e. the first half of *key */ 170 struct crypto_cipher *cipher; local 176 cipher = crypto_spawn_cipher(spawn); 177 if (IS_ERR(cipher)) 178 return PTR_ERR(cipher); 180 if (crypto_cipher_blocksize(cipher) != 16) { 182 crypto_free_cipher(cipher); 186 ctx->child = cipher; [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | enc.c | 122 const EVP_CIPHER *cipher = NULL, *c; local 153 cipher = EVP_get_cipherbyname(pname); 155 if (!do_zlib && !base64 && (cipher == NULL) 158 if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0)) 161 BIO_printf(bio_err, "%s is an unknown cipher\n", pname); 273 cipher = c; 275 cipher = NULL; 329 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) { 335 if (cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost_eng.c | 22 /* Symmetric cipher and digest function registrar */ 24 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 186 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 190 if (!cipher) { 196 *cipher = &cipher_gost; 198 *cipher = &cipher_gost_cpacnt; 201 *cipher = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | d1_enc.c | 148 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 150 if (!RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher))) 180 bs=EVP_CIPHER_block_size(ds->cipher); 207 ds->buf_len, ds->cipher->key_len, 209 ds->cipher->iv_len); 211 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost_eng.c | 22 /* Symmetric cipher and digest function registrar */ 24 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 186 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 190 if (!cipher) { 196 *cipher = &cipher_gost; 198 *cipher = &cipher_gost_cpacnt; 201 *cipher = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | enc.c | 122 const EVP_CIPHER *cipher = NULL, *c; local 153 cipher = EVP_get_cipherbyname(pname); 155 if (!do_zlib && !base64 && (cipher == NULL) 158 if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0)) 161 BIO_printf(bio_err, "%s is an unknown cipher\n", pname); 273 cipher = c; 275 cipher = NULL; 329 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) { 335 if (cipher [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | p5_pbev2.c | 87 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 99 alg_nid = EVP_CIPHER_type(cipher); 116 if (EVP_CIPHER_iv_length(cipher) && 117 RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 123 EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0); 154 EVP_CIPHER_key_length(cipher))) goto merr;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/src/ |
H A D | cipher-proto.h | 0 /* cipher-proto.h - Internal declarations 20 /* This file has been factored out from cipher.h so that it can be 28 "cipher", "digest", "pubkey or "random", 67 /* The type used to convey additional information to a cipher. */ 99 gcry_error_t _gcry_cipher_register (gcry_cipher_spec_t *cipher, 103 gcry_error_t _gcry_md_register (gcry_md_spec_t *cipher, 107 gcry_error_t _gcry_pk_register (gcry_pk_spec_t *cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | cipher-proto.h | 0 /* cipher-proto.h - Internal declarations 20 /* This file has been factored out from cipher.h so that it can be 28 "cipher", "digest", "pubkey or "random", 67 /* The type used to convey additional information to a cipher. */ 99 gcry_error_t _gcry_cipher_register (gcry_cipher_spec_t *cipher, 103 gcry_error_t _gcry_md_register (gcry_md_spec_t *cipher, 107 gcry_error_t _gcry_pk_register (gcry_pk_spec_t *cipher,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs7/ |
H A D | pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7, EVP_CIPHER *cipher);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | enc.c | 120 const EVP_CIPHER *cipher=NULL,*c; local 145 cipher=EVP_get_cipherbyname(pname); 146 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 148 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 267 cipher=c; 270 cipher=NULL; 395 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 402 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), 466 if (cipher != NULL) 513 EVP_BytesToKey(cipher,dgs [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/ |
H A D | Makefile.am | 25 DIST_SUBDIRS = m4 compat mpi cipher random src doc tests 26 SUBDIRS = compat mpi cipher random src doc tests
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/ |
H A D | Makefile.am | 25 DIST_SUBDIRS = m4 compat mpi cipher random src doc tests 26 SUBDIRS = compat mpi cipher random src doc tests
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cmac/ |
H A D | cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7, EVP_CIPHER *cipher);
|