/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | keystore.c | 244 "include a cipher code and checksum\n"); 249 /* The decrypted key includes 1 byte cipher code and 2 byte checksum */ 317 /* The encrypted key includes 1 byte cipher code and 2 byte checksum */ 448 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); 708 * 5 fix bytes for: version string, cipher, S2K ID, hash algo, 734 /* cipher - one byte */ 735 ecryptfs_cipher_code_to_string(crypt_stat->cipher, 949 if (!strcmp(crypt_stat->cipher, 958 crypt_stat->cipher, 1231 "context for cipher [ [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | Makefile | 2 # cipher/Makefile. Generated from Makefile.in by configure. 18 # Makefile for cipher modules 58 subdir = cipher 76 am_libcipher_la_OBJECTS = cipher.lo pubkey.lo ac.lo md.lo kdf.lo \ 193 abs_builddir = ${TIMEMACHINE_PATH}/libgcrypt-1.5.0/cipher 194 abs_srcdir = ${TIMEMACHINE_PATH}/libgcrypt-1.5.0/cipher 259 cipher.c pubkey.c ac.c md.c kdf.c \ 306 echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu cipher/Makefile'; \ 308 $(AUTOMAKE) --gnu cipher/Makefile 351 include ./$(DEPDIR)/cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | t1_enc.c | 495 if (s->session->cipher != NULL) 497 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 501 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 557 bs=EVP_CIPHER_block_size(ds->cipher); 584 ds->buf_len, ds->cipher->key_len, 586 ds->cipher->iv_len); 588 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
H A D | s2_enc.c | 136 /* check for NULL cipher */ 140 bs=ds->cipher->block_size;
|
H A D | s3_enc.c | 389 if (s->session->cipher != NULL) 391 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 395 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 456 bs=EVP_CIPHER_block_size(ds->cipher);
|
H A D | ssl_sess.c | 354 if (ret->cipher == NULL) 363 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 365 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 366 if (ret->cipher == NULL)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | t1_enc.c | 506 if (s->session->cipher != NULL) 508 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 512 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 568 bs=EVP_CIPHER_block_size(ds->cipher); 595 ds->buf_len, ds->cipher->key_len, 597 ds->cipher->iv_len); 599 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
H A D | s2_enc.c | 139 /* check for NULL cipher */ 143 bs=ds->cipher->block_size;
|
H A D | s3_enc.c | 405 if (s->session->cipher != NULL) 407 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 411 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 472 bs=EVP_CIPHER_block_size(ds->cipher);
|
H A D | ssl_sess.c | 366 if (ret->cipher == NULL) 375 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 377 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 378 if (ret->cipher == NULL)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | nss.c | 87 PRInt32 version; /* protocol version valid for this cipher */ 103 /* SSL2 cipher suites */ 111 /* SSL3/TLS cipher suites */ 184 char *cipher; local 200 cipher = cipher_list; 203 while((*cipher) && (ISSPACE(*cipher))) 204 ++cipher; 206 if((cipher_list = strchr(cipher, ','))) { 213 if(Curl_raw_equal(cipher, cipherlis [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 334 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 354 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
H A D | pk7_smime.c | 369 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 382 if(!PKCS7_set_cipher(p7, cipher)) {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 334 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 354 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 341 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 361 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 341 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 361 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/demos/ |
H A D | b64.c | 90 EVP_CIPHER *cipher=NULL,*c; local
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | s_client.c | 217 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 218 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 247 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 407 else if (strcmp(*argv,"-cipher") == 0) 410 cipher= *(++argv); 497 if (cipher != NULL) 498 if(!SSL_CTX_set_cipher_list(ctx,cipher)) { 499 BIO_printf(bio_err,"error setting cipher list\n");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/demos/ |
H A D | b64.c | 90 EVP_CIPHER *cipher=NULL,*c; local
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/crypto/ |
H A D | twofish.c | 192 .cra_u = { .cipher = {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/asm-cris/arch-v32/ |
H A D | cryptocop.h | 28 cryptocop_cipher_m2m = 3, /* mem2mem is essentially a NULL cipher with blocklength=1 */ 65 cryptocop_cipher_type cipher; /* AES, DES, 3DES, m2m, none */ member in struct:strcop_session_op 96 /* cipher_iv is used if do_cipher and cipher_explicit and the cipher 97 mode is CBC. The length is controlled by the type of cipher,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ms/ |
H A D | testenc.bat | 7 set tmp1=..\ms\cipher.out
|
H A D | testencce.bat | 8 set tmp1=cipher.out
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/ |
H A D | testfipsssl | 16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers" 96 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | pkcs12.h | 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|