Searched refs:cipher (Results 101 - 125 of 237) sorted by relevance

12345678910

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/
H A Dkrb5_asn.h79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
H A Dkrb5_asn.c66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/
H A Dpem_info.c247 EVP_CIPHER_INFO cipher; local
249 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher))
251 if (!PEM_do_header(&cipher,data,&len,cb,u))
351 EVP_CIPHER_nid(xi->enc_cipher.cipher));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dkrb5_asn.h79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/crypto/
H A Dcbc.c246 struct crypto_cipher *cipher; local
264 cipher = crypto_spawn_cipher(spawn);
265 if (IS_ERR(cipher))
266 return PTR_ERR(cipher);
268 ctx->child = cipher;
350 MODULE_DESCRIPTION("CBC block cipher algorithm");
H A Dpcbc.c250 struct crypto_cipher *cipher; local
268 cipher = crypto_spawn_cipher(spawn);
269 if (IS_ERR(cipher))
270 return PTR_ERR(cipher);
272 ctx->child = cipher;
354 MODULE_DESCRIPTION("PCBC block cipher algorithm");
H A Dxcbc.c259 struct crypto_cipher *cipher; local
265 cipher = crypto_spawn_cipher(spawn);
266 if (IS_ERR(cipher))
267 return PTR_ERR(cipher);
277 ctx->child = cipher;
H A Dblkcipher.c2 * Block chaining cipher operations.
342 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; local
344 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) {
349 return cipher->setkey(tfm, key, keylen);
388 struct blkcipher_alg *cipher = &alg->cra_blkcipher; local
393 if ((type & mask) && cipher->ivsize) {
395 len += cipher->ivsize;
469 MODULE_DESCRIPTION("Generic block chaining cipher type");
H A Dtea.c231 .cra_u = { .cipher = {
247 .cra_u = { .cipher = {
263 .cra_u = { .cipher = {
H A DMakefile5 obj-$(CONFIG_CRYPTO) += api.o scatterwalk.o cipher.o digest.o compress.o
H A Darc4.c80 .cra_u = { .cipher = {
H A Dcrypto_null.c9 * The null cipher is compliant with RFC2410.
92 .cra_u = { .cipher = {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/md/
H A Ddm-crypt.c95 char cipher[CRYPTO_MAX_ALG_NAME]; member in struct:crypt_config
118 * encrypted with the bulk cipher using a salt as key. The salt
119 * should be derived from the bulk cipher's key via hashing.
155 /* Hash the cipher key with the given hash algorithm */
182 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC);
190 ti->error = "Block size of ESSIV cipher does "
191 "not match IV size of block cipher";
198 ti->error = "Failed to set key for ESSIV cipher";
230 * to get the cipher block count, we use this shift in _gen */
738 * <cipher> <ke
745 char *cipher; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/
H A Drxkad.c50 * this holds a pinned cipher so that keventd doesn't get called by the cipher
73 _debug("no cipher");
100 conn->cipher = ci;
129 desc.tfm = conn->cipher;
179 desc.tfm = call->conn->cipher;
226 desc.tfm = call->conn->cipher;
274 if (!call->conn->cipher)
283 desc.tfm = call->conn->cipher;
352 desc.tfm = call->conn->cipher;
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/demos/engines/zencod/
H A Dhw_zencod.c172 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) ;
1517 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) argument
1520 if ( !cipher ) {
1525 /* We are being asked for a specific cipher */
1527 *cipher = &engine_rc4 ;
1530 *cipher = &engine_rc4_40 ;
1533 *cipher = &engine_des_cbc ;
1536 *cipher = &engine_des_ede3_cbc ;
1539 *cipher = NULL ;
1727 if ( ctx->cipher
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/zencod/
H A Dhw_zencod.c172 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) ;
1517 static int engine_ciphers ( ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid ) argument
1520 if ( !cipher ) {
1525 /* We are being asked for a specific cipher */
1527 *cipher = &engine_rc4 ;
1530 *cipher = &engine_rc4_40 ;
1533 *cipher = &engine_des_cbc ;
1536 *cipher = &engine_des_ede3_cbc ;
1539 *cipher = NULL ;
1727 if ( ctx->cipher
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs7/
H A Dpk7_lib.c470 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument
490 /* Check cipher OID exists and has data in it*/
491 i = EVP_CIPHER_type(cipher);
498 ec->cipher = cipher;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/
H A Dpk7_lib.c558 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument
578 /* Check cipher OID exists and has data in it*/
579 i = EVP_CIPHER_type(cipher);
586 ec->cipher = cipher;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/
H A Dgcrypt-module.h96 /* Register a new cipher module whose specification can be found in
99 gcry_error_t gcry_cipher_register (gcry_cipher_spec_t *cipher,
105 /* Unregister the cipher identified by MODULE, which must have been
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/
H A Dcrypto.c793 * TODO: Performance: Keep a cache of initialized cipher contexts;
801 if (!crypt_stat->cipher) {
802 ecryptfs_printk(KERN_ERR, "No cipher specified\n");
806 "Initializing cipher [%s]; strlen = [%d]; "
808 crypt_stat->cipher, (int)strlen(crypt_stat->cipher),
816 crypt_stat->cipher, "cbc");
825 "Error initializing cipher [%s]\n",
826 crypt_stat->cipher);
947 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHE
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/
H A Dpkcs12.h183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dpkcs12.h183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/krb5/
H A Dkrb5_asn.c66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/Netware/
H A Ddo_tests.pl98 my $cipher = "$output_path\\cipher.out";
112 system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher > $outFile" );
113 log_output("Encrypting: $input --> $cipher", $outFile);
117 system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear > $outFile");
118 log_output("Decrypting: $cipher --> $clear", $outFile);
139 system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher > $outFile");
140 log_output("Encrypting(B64): $cipher --> $clear", $outFile);
144 system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear > $outFile");
145 log_output("Decrypting(B64): $cipher
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dpubkey.c137 gcry_sexp_t plain1, cipher, l; local
147 rc = gcry_pk_encrypt (&cipher, plain0, pkey);
151 l = gcry_sexp_find_token (cipher, "flags", 0);
156 rc = gcry_pk_decrypt (&plain1, cipher, skey);
157 gcry_sexp_release (cipher);
748 cipher/primegen.c for another bug. Not only that I had to

Completed in 328 milliseconds

12345678910