/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/engine/ |
H A D | eng_cryptodev.c | 431 cryp.op = ctx->encrypt ? COP_ENCRYPT : COP_DECRYPT; 435 if (!ctx->encrypt) { 451 if (ctx->encrypt)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 311 * so that hashed data is still in the cache by the time we encrypt it 475 if (ctx->encrypt) { 520 /* encrypt HMAC|padding at once */ 858 if (ctx->encrypt) { 894 if (ctx->encrypt) {
|
H A D | e_aes_cbc_hmac_sha256.c | 311 * so that hashed data is still in the cache by the time we encrypt it 491 if (ctx->encrypt) { 548 /* encrypt HMAC|padding at once */ 833 if (ctx->encrypt) { 869 if (ctx->encrypt) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/ |
H A D | cifsproto.h | 370 bool encrypt, char *lnm_session_key);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/test/ |
H A D | reputils.tcl | 514 global encrypt 520 set encrypt 1 1909 global encrypt 1967 if { $encrypt == 1 } {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bluetooth/ |
H A D | hci_event.c | 1058 cp.encrypt = 0x01; 1078 cp.encrypt = 0x01; 1110 if (ev->encrypt) { 1127 hci_encrypt_cfm(conn, ev->status, ev->encrypt);
|
H A D | hci_core.c | 268 __u8 encrypt = opt; local 270 BT_DBG("%s %x", hdev->name, encrypt); 273 hci_send_cmd(hdev, HCI_OP_WRITE_ENCRYPT_MODE, 1, &encrypt);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ |
H A D | e_padlock.c | 804 cdata->cword.b.encdec = (ctx->encrypt == 0); 939 if (ctx->encrypt) 998 * loop instead of copy the whole input and then encrypt in one stroke.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | evp.h | 211 int (*encrypt)(); 317 const unsigned char *in, unsigned int inl);/* encrypt/decrypt data */ 371 int encrypt; /* encrypt or decrypt */ member in struct:evp_cipher_ctx_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ |
H A D | e_padlock.c | 804 cdata->cword.b.encdec = (ctx->encrypt == 0); 939 if (ctx->encrypt) 998 * loop instead of copy the whole input and then encrypt in one stroke.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/engine/ |
H A D | eng_padlock.c | 792 cdata->cword.b.encdec = (ctx->encrypt == 0); 918 if (ctx->encrypt) 972 * input and then encrypt in one stroke. This is done
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp.h | 211 int (*encrypt)(); 317 const unsigned char *in, unsigned int inl);/* encrypt/decrypt data */ 371 int encrypt; /* encrypt or decrypt */ member in struct:evp_cipher_ctx_st
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/ |
H A D | mv_cesa.c | 920 .encrypt = mv_enc_aes_ecb, 943 .encrypt = mv_enc_aes_cbc,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | ccm.c | 185 /* now encrypt rest of data */ 262 /* encrypt first block to use as start in computing mac */ 325 * zero to encrypt auth tag. 556 inst->alg.cra_aead.encrypt = crypto_ccm_encrypt; 823 inst->alg.cra_aead.encrypt = crypto_rfc4309_encrypt;
|
H A D | cryptd.c | 197 crypto_blkcipher_crt(child)->encrypt); 333 inst->alg.cra_ablkcipher.encrypt = cryptd_blkcipher_encrypt_enqueue;
|
H A D | pcrypt.c | 375 inst->alg.cra_aead.encrypt = pcrypt_aead_encrypt;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/bluetooth/ |
H A D | hci.h | 315 __u8 encrypt; member in struct:hci_cp_set_conn_encrypt 649 __u8 encrypt; member in struct:hci_ev_encrypt_change
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192e/ieee80211/ |
H A D | ieee80211_softmac.c | 736 int encrypt; 771 encrypt = ieee->host_encrypt && crypt && crypt->ops && 778 HTConstructCapabilityElement(ieee, tmp_ht_cap_buf, &tmp_ht_cap_len,encrypt); 779 HTConstructInfoElement(ieee,tmp_ht_info_buf,&tmp_ht_info_len, encrypt); 823 if (encrypt) 2733 //sec.encrypt = 0; 2741 // sec.encrypt = 1;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_softmac.c | 725 int encrypt; 760 encrypt = ieee->host_encrypt && crypt && crypt->ops && 767 HTConstructCapabilityElement(ieee, tmp_ht_cap_buf, &tmp_ht_cap_len,encrypt); 768 HTConstructInfoElement(ieee,tmp_ht_info_buf,&tmp_ht_info_len, encrypt); 812 if (encrypt) 2607 //sec.encrypt = 0; 2615 // sec.encrypt = 1;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/ |
H A D | raop.c | 111 unsigned encrypt:1; member in struct:raop_session 655 DPRINTF(E_LOG, L_RAOP, "Could not encrypt data: %s\n", ebuf); 1252 if (rs->encrypt) 1610 if (rs->encrypt) 1859 rs->encrypt = 1; 1865 rs->encrypt = 1; 1871 rs->encrypt = 0; 3184 DPRINTF(E_LOG, L_RAOP, "Could not encrypt payload: %s\n", ebuf); 3214 data = (rs->encrypt) ? pkt->encrypted : pkt->clear; 4061 DPRINTF(E_LOG, L_RAOP, "Couldn't encrypt an [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/80211core/ |
H A D | cmm.c | 856 u8_t encrypt = 0; local 1010 encrypt = 1; 1280 zfTxGenMmHeader(dev, frameType, dst, header, offset-hlen, buf, vap, encrypt);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/lib/ |
H A D | vty.c | 310 if (host.encrypt) 320 if (host.encrypt) 330 if (host.encrypt)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/db/ |
H A D | db_conv.c | 321 * Utility function to encrypt and checksum a db page. 367 if ((ret = db_cipher->encrypt(env, db_cipher->data,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/zlib-1.2.8/contrib/minizip/ |
H A D | zip.c | 153 int encrypt; member in struct:__anon4134 1127 zi->ci.encrypt = 0; 1248 zi->ci.encrypt = 1; 1367 if (zi->ci.encrypt != 0)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | ssl.c | 1027 /* set up list of keys to be scanned by data channel encrypt and decrypt routines */ 1132 * of the buffer so it can be processed by encrypt/decrypt. 1148 ctx = (incoming ? &co->key_ctx_bi->decrypt : &co->key_ctx_bi->encrypt); 1212 if (session->tls_auth.key_ctx_bi->encrypt.hmac) 1542 init_key_ctx (&key->encrypt, 1753 init_key_ctx (&ks->key.encrypt, &key, &session->opt->key_type, 3291 /* Choose the key with which to encrypt a data packet */
|