/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 118 i=OBJ_obj2nid(spki->sig_algor->algorithm);
|
H A D | p5_pbev2.c | 83 /* Return an algorithm identifier for a PKCS#5 v2.0 PBE algorithm: 112 scheme->algorithm = obj; 161 pbe2->keyfunc->algorithm = OBJ_nid2obj(NID_id_pbkdf2); 179 ret->algorithm = OBJ_nid2obj(NID_pbes2);
|
H A D | a_verify.c | 85 i=OBJ_obj2nid(a->algorithm); 137 i=OBJ_obj2nid(a->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_attr.c | 120 ASN1_OBJECT_free(alg->algorithm); 121 alg->algorithm = OBJ_nid2obj (nid);
|
H A D | pk7_lib.c | 258 nid=OBJ_obj2nid(psi->digest_alg->algorithm); 265 if (OBJ_obj2nid(alg->algorithm) == nid) 271 if (!j) /* we need to add another algorithm */ 280 alg->algorithm=OBJ_nid2obj(nid); 394 if (is_dsa) p7i->digest_alg->algorithm=OBJ_nid2obj(NID_sha1); 396 p7i->digest_alg->algorithm=OBJ_nid2obj(EVP_MD_type(dgst)); 409 p7i->digest_enc_alg->algorithm=OBJ_nid2obj(NID_rsaEncryption); 419 p7i->digest_enc_alg->algorithm=OBJ_nid2obj(NID_dsa); 423 p7i->digest_enc_alg->algorithm=OBJ_nid2obj(NID_dsaWithSHA1); 429 p7i->digest_enc_alg->algorithm [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_add.c | 180 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 181 p7->d.encrypted->enc_data->algorithm = pbe; 196 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | pubkey.c | 51 libgcrypt. FIPS_ALLOWED indicated whether the algorithm is used in 57 unsigned int algorithm; member in struct:pubkey_table_entry 112 dummy_generate (int algorithm, unsigned int nbits, unsigned long dummy, argument 115 (void)algorithm; 125 dummy_check_secret_key (int algorithm, gcry_mpi_t *skey) argument 127 (void)algorithm; 134 dummy_encrypt (int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, argument 137 (void)algorithm; 147 dummy_decrypt (int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, argument 150 (void)algorithm; 160 dummy_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 172 dummy_verify(int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument 187 dummy_get_nbits(int algorithm, gcry_mpi_t *pkey) argument 315 int algorithm = 0; local 339 gcry_pk_algo_name(int algorithm) argument 365 _gcry_pk_aliased_algo_name(int algorithm) argument 390 disable_pubkey_algo(int algorithm) argument 410 check_pubkey_algo(int algorithm, unsigned use) argument 445 pubkey_get_npkey(int algorithm) argument 468 pubkey_get_nskey(int algorithm) argument 491 pubkey_get_nsig(int algorithm) argument 514 pubkey_get_nenc(int algorithm) argument 543 pubkey_generate(int algorithm, unsigned int nbits, unsigned long use_e, gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 582 pubkey_check_secret_key(int algorithm, gcry_mpi_t *skey) argument 610 pubkey_encrypt(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument 660 pubkey_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 707 pubkey_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 750 pubkey_verify(int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument 3980 gcry_pk_algo_info(int algorithm, int what, void *buffer, size_t *nbytes) argument 4068 _gcry_pk_module_lookup(int algorithm, gcry_module_t *module) argument [all...] |
H A D | cipher.c | 55 unsigned int algorithm; member in struct:cipher_table_entry 171 /* The algorithm id. This is a hack required because the module 321 cipher_table[i].algorithm, 389 CIPHER. On success, a new algorithm ID is stored in ALGORITHM_ID 433 internal algorithm number is returned in ALGORITHM unless it 435 implementing this algorithm is return in OID_SPEC unless passed as 438 search_oid (const char *oid, int *algorithm, gcry_cipher_oid_spec_t *oid_spec) 456 if (algorithm) 457 *algorithm = module->mod_id; 468 /* Map STRING to the cipher algorithm identifie 436 search_oid(const char *oid, int *algorithm, gcry_cipher_oid_spec_t *oid_spec) argument 474 int ret, algorithm = 0; local 531 cipher_algo_to_string(int algorithm) argument 557 gcry_cipher_algo_name(int algorithm) argument 568 disable_cipher_algo(int algorithm) argument 590 check_cipher_algo(int algorithm) argument 618 cipher_get_keylen(int algorithm) argument 646 cipher_get_blocksize(int algorithm) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | pubkey.c | 51 libgcrypt. FIPS_ALLOWED indicated whether the algorithm is used in 57 unsigned int algorithm; member in struct:pubkey_table_entry 112 dummy_generate (int algorithm, unsigned int nbits, unsigned long dummy, argument 115 (void)algorithm; 125 dummy_check_secret_key (int algorithm, gcry_mpi_t *skey) argument 127 (void)algorithm; 134 dummy_encrypt (int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, argument 137 (void)algorithm; 147 dummy_decrypt (int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, argument 150 (void)algorithm; 160 dummy_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 172 dummy_verify(int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument 187 dummy_get_nbits(int algorithm, gcry_mpi_t *pkey) argument 315 int algorithm = 0; local 339 gcry_pk_algo_name(int algorithm) argument 365 _gcry_pk_aliased_algo_name(int algorithm) argument 390 disable_pubkey_algo(int algorithm) argument 410 check_pubkey_algo(int algorithm, unsigned use) argument 445 pubkey_get_npkey(int algorithm) argument 468 pubkey_get_nskey(int algorithm) argument 491 pubkey_get_nsig(int algorithm) argument 514 pubkey_get_nenc(int algorithm) argument 543 pubkey_generate(int algorithm, unsigned int nbits, unsigned long use_e, gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 582 pubkey_check_secret_key(int algorithm, gcry_mpi_t *skey) argument 610 pubkey_encrypt(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument 660 pubkey_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 707 pubkey_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 750 pubkey_verify(int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument 3980 gcry_pk_algo_info(int algorithm, int what, void *buffer, size_t *nbytes) argument 4068 _gcry_pk_module_lookup(int algorithm, gcry_module_t *module) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs7/ |
H A D | pk7_attr.c | 107 ASN1_OBJECT_free(alg->algorithm); 108 alg->algorithm = OBJ_nid2obj(nid);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 107 ASN1_OBJECT_free(alg->algorithm); 108 alg->algorithm = OBJ_nid2obj(nid);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavdevice/ |
H A D | caca.c | 36 char *algorithm, *antialias; member in struct:CACAContext 88 DEFINE_LIST_DITHER(algorithm, "algorithms"); 160 CHECK_DITHER_OPT(algorithm); 207 { "algorithm", "set dithering algorithm", OFFSET(algorithm), AV_OPT_TYPE_STRING, {.str = "default" }, 0, 0, ENC },
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | a_sign.c | 161 ASN1_OBJECT_free(a->algorithm); 162 a->algorithm = OBJ_nid2obj(type->pkey_type); 163 if (a->algorithm == NULL) { 167 if (a->algorithm->length == 0) { 260 * 3: ASN1 method sets algorithm identifiers: just sign.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rsa/ |
H A D | rsa_sign.c | 100 sig.algor->algorithm = OBJ_nid2obj(type); 101 if (sig.algor->algorithm == NULL) { 105 if (sig.algor->algorithm->length == 0) { 246 * Parameters to the signature algorithm can also be used to create 255 sigtype = OBJ_obj2nid(sig->algor->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/ |
H A D | x509type.c | 104 i = OBJ_obj2nid(x->sig_alg->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | simple.h | 35 explicit InvalidKeyLength(const std::string &algorithm, size_t length) : InvalidArgument(algorithm + ": " + IntToString(length) + " is not a valid key length") {} argument 42 explicit InvalidRounds(const std::string &algorithm, unsigned int rounds) : InvalidArgument(algorithm + ": " + IntToString(rounds) + " is not a valid number of rounds") {} argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/isofs/ |
H A D | rock.h | 78 char algorithm[2]; member in struct:RR_ZF_s
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/bfa/include/bfi/ |
H A D | bfi_fabric.h | 72 u8 algorithm; member in struct:bfi_fabric_setauth_req_s
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 100 sig.algor->algorithm = OBJ_nid2obj(type); 101 if (sig.algor->algorithm == NULL) { 105 if (sig.algor->algorithm->length == 0) { 246 * Parameters to the signature algorithm can also be used to create 255 sigtype = OBJ_obj2nid(sig->algor->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/ |
H A D | x509type.c | 104 i = OBJ_obj2nid(x->sig_alg->algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | a_sign.c | 161 ASN1_OBJECT_free(a->algorithm); 162 a->algorithm = OBJ_nid2obj(type->pkey_type); 163 if (a->algorithm == NULL) { 167 if (a->algorithm->length == 0) { 260 * 3: ASN1 method sets algorithm identifiers: just sign.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libaddns/ |
H A D | dnsrecord.c | 180 struct dns_domain_name *algorithm; local 187 err = dns_domain_name_from_string(buf, algorithm_name, &algorithm); 190 dns_marshall_domain_name(buf, algorithm); 228 dns_unmarshall_domain_name(tkey, &buf, &tkey->algorithm); 268 struct dns_domain_name *algorithm; local 275 err = dns_domain_name_from_string(buf, algorithm_name, &algorithm); 278 dns_marshall_domain_name(buf, algorithm);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | http_digest.c | 214 else if(Curl_raw_equal(value, "algorithm")) { 215 d->algorithm = strdup(content); 216 if(!d->algorithm) 384 if the algorithm is "MD5" or unspecified (which then defaults to MD5): 388 if the algorithm is "MD5-sess" then: 498 characters. algorithm and qop with standard values only contain web-safe 560 if(d->algorithm) { 561 /* append algorithm */ 562 tmp = aprintf("%s, algorithm=\"%s\"", *allocuserpwd, d->algorithm); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_pwri.c | 122 /* Setup algorithm identifier for cipher */ 155 encalg->algorithm = OBJ_nid2obj(EVP_CIPHER_CTX_type(&ctx)); 175 pwri->keyEncryptionAlgorithm->algorithm = OBJ_nid2obj(wrap_nid); 189 /* Setup PBE algorithm */ 343 if (!algtmp || OBJ_obj2nid(algtmp->algorithm) != NID_id_alg_PWRI_KEK) { 360 kekcipher = EVP_get_cipherbyobj(kekalg->algorithm); 381 if (EVP_PBE_CipherInit(algtmp->algorithm,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_pwri.c | 122 /* Setup algorithm identifier for cipher */ 155 encalg->algorithm = OBJ_nid2obj(EVP_CIPHER_CTX_type(&ctx)); 175 pwri->keyEncryptionAlgorithm->algorithm = OBJ_nid2obj(wrap_nid); 189 /* Setup PBE algorithm */ 343 if (!algtmp || OBJ_obj2nid(algtmp->algorithm) != NID_id_alg_PWRI_KEK) { 360 kekcipher = EVP_get_cipherbyobj(kekalg->algorithm); 381 if (EVP_PBE_CipherInit(algtmp->algorithm,
|