/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/ |
H A D | krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
H A D | krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem_info.c | 247 EVP_CIPHER_INFO cipher; local 249 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 251 if (!PEM_do_header(&cipher,data,&len,cb,u)) 351 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/crypto/ |
H A D | cbc.c | 246 struct crypto_cipher *cipher; local 264 cipher = crypto_spawn_cipher(spawn); 265 if (IS_ERR(cipher)) 266 return PTR_ERR(cipher); 268 ctx->child = cipher; 350 MODULE_DESCRIPTION("CBC block cipher algorithm");
|
H A D | pcbc.c | 250 struct crypto_cipher *cipher; local 268 cipher = crypto_spawn_cipher(spawn); 269 if (IS_ERR(cipher)) 270 return PTR_ERR(cipher); 272 ctx->child = cipher; 354 MODULE_DESCRIPTION("PCBC block cipher algorithm");
|
H A D | xcbc.c | 259 struct crypto_cipher *cipher; local 265 cipher = crypto_spawn_cipher(spawn); 266 if (IS_ERR(cipher)) 267 return PTR_ERR(cipher); 277 ctx->child = cipher;
|
H A D | blkcipher.c | 2 * Block chaining cipher operations. 342 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; local 344 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { 349 return cipher->setkey(tfm, key, keylen); 388 struct blkcipher_alg *cipher = &alg->cra_blkcipher; local 393 if ((type & mask) && cipher->ivsize) { 395 len += cipher->ivsize; 469 MODULE_DESCRIPTION("Generic block chaining cipher type");
|
H A D | tea.c | 231 .cra_u = { .cipher = { 247 .cra_u = { .cipher = { 263 .cra_u = { .cipher = {
|
H A D | Makefile | 5 obj-$(CONFIG_CRYPTO) += api.o scatterwalk.o cipher.o digest.o compress.o
|
H A D | arc4.c | 80 .cra_u = { .cipher = {
|
H A D | crypto_null.c | 9 * The null cipher is compliant with RFC2410. 92 .cra_u = { .cipher = {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/md/ |
H A D | dm-crypt.c | 95 char cipher[CRYPTO_MAX_ALG_NAME]; member in struct:crypt_config 118 * encrypted with the bulk cipher using a salt as key. The salt 119 * should be derived from the bulk cipher's key via hashing. 155 /* Hash the cipher key with the given hash algorithm */ 182 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC); 190 ti->error = "Block size of ESSIV cipher does " 191 "not match IV size of block cipher"; 198 ti->error = "Failed to set key for ESSIV cipher"; 230 * to get the cipher block count, we use this shift in _gen */ 738 * <cipher> <ke 745 char *cipher; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/ |
H A D | rxkad.c | 50 * this holds a pinned cipher so that keventd doesn't get called by the cipher 73 _debug("no cipher"); 100 conn->cipher = ci; 129 desc.tfm = conn->cipher; 179 desc.tfm = call->conn->cipher; 226 desc.tfm = call->conn->cipher; 274 if (!call->conn->cipher) 283 desc.tfm = call->conn->cipher; 352 desc.tfm = call->conn->cipher; [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/demos/engines/zencod/ |
H A D | hw_zencod.c | 172 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) ; 1517 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) argument 1520 if ( !cipher ) { 1525 /* We are being asked for a specific cipher */ 1527 *cipher = &engine_rc4 ; 1530 *cipher = &engine_rc4_40 ; 1533 *cipher = &engine_des_cbc ; 1536 *cipher = &engine_des_ede3_cbc ; 1539 *cipher = NULL ; 1727 if ( ctx->cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/zencod/ |
H A D | hw_zencod.c | 172 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) ; 1517 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) argument 1520 if ( !cipher ) { 1525 /* We are being asked for a specific cipher */ 1527 *cipher = &engine_rc4 ; 1530 *cipher = &engine_rc4_40 ; 1533 *cipher = &engine_des_cbc ; 1536 *cipher = &engine_des_ede3_cbc ; 1539 *cipher = NULL ; 1727 if ( ctx->cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 470 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 490 /* Check cipher OID exists and has data in it*/ 491 i = EVP_CIPHER_type(cipher); 498 ec->cipher = cipher;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_lib.c | 558 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 578 /* Check cipher OID exists and has data in it*/ 579 i = EVP_CIPHER_type(cipher); 586 ec->cipher = cipher;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | gcrypt-module.h | 96 /* Register a new cipher module whose specification can be found in 99 gcry_error_t gcry_cipher_register (gcry_cipher_spec_t *cipher, 105 /* Unregister the cipher identified by MODULE, which must have been
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | crypto.c | 793 * TODO: Performance: Keep a cache of initialized cipher contexts; 801 if (!crypt_stat->cipher) { 802 ecryptfs_printk(KERN_ERR, "No cipher specified\n"); 806 "Initializing cipher [%s]; strlen = [%d]; " 808 crypt_stat->cipher, (int)strlen(crypt_stat->cipher), 816 crypt_stat->cipher, "cbc"); 825 "Error initializing cipher [%s]\n", 826 crypt_stat->cipher); 947 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHE [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | pkcs12.h | 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/krb5/ |
H A D | krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/Netware/ |
H A D | do_tests.pl | 98 my $cipher = "$output_path\\cipher.out"; 112 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher > $outFile" ); 113 log_output("Encrypting: $input --> $cipher", $outFile); 117 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear > $outFile"); 118 log_output("Decrypting: $cipher --> $clear", $outFile); 139 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher > $outFile"); 140 log_output("Encrypting(B64): $cipher --> $clear", $outFile); 144 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear > $outFile"); 145 log_output("Decrypting(B64): $cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | pubkey.c | 137 gcry_sexp_t plain1, cipher, l; local 147 rc = gcry_pk_encrypt (&cipher, plain0, pkey); 151 l = gcry_sexp_find_token (cipher, "flags", 0); 156 rc = gcry_pk_decrypt (&plain1, cipher, skey); 157 gcry_sexp_release (cipher); 748 cipher/primegen.c for another bug. Not only that I had to
|