/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | kssl.c | 1256 asn1ticket->encdata->cipher->length; 1258 calloc(1, asn1ticket->encdata->cipher->length)) == NULL) 1262 "Error allocating cipher in krb5ticket.\n"); 1269 asn1ticket->encdata->cipher->data, 1270 asn1ticket->encdata->cipher->length); 2058 outl = dec_authent->cipher->length; 2059 if (!EVP_Cipher(&ciph_ctx,unenc_authent,dec_authent->cipher->data,outl))
|
H A D | ssl_lib.c | 160 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1336 /* ret->cipher=NULL;*/ 1499 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher) argument 1509 kl=SSL_C_EXPORT_PKEYLENGTH(cipher); 1643 EVP_PKEY *ssl_get_sign_pkey(SSL *s,SSL_CIPHER *cipher) argument 1648 alg=cipher->algorithms; 1848 /* clear the current cipher */ 1858 /* clear the current cipher */ 2062 if ((s->session != NULL) && (s->session->cipher != NULL)) 2063 return(s->session->cipher); [all...] |
H A D | s2_srvr.c | 419 s->session->cipher= cp; 470 is_export=SSL_C_IS_EXPORT(s->session->cipher); 479 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 510 /* incorrect number of key bytes for non export cipher */ 606 /* get session-id before cipher stuff so we can get out session 695 /* done cipher selection */ 802 s2n(n,p); /* add cipher length */
|
H A D | s3_srvr.c | 490 s->session->cipher=s->s3->tmp.new_cipher; 736 /* we need a cipher if we are not resuming a session */ 755 /* If it is a hit, check that the cipher is in the list */ 759 id=s->session->cipher->id; 782 s->session->cipher=sk_SSL_CIPHER_value(ciphers, 787 /* we need to have the cipher in the cipher 867 * pick a cipher */ 917 s->s3->tmp.new_cipher=s->session->cipher; 921 s->s3->tmp.new_cipher=s->session->cipher; [all...] |
H A D | s3_pkt.c | 778 * Change cipher spec protocol 962 (s->session != NULL) && (s->session->cipher != NULL)) 1088 /* Check we have a cipher to change to */ 1227 s->session->cipher=s->s3->tmp.new_cipher;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.c | 1283 asn1ticket->encdata->cipher->length; 1285 calloc(1, asn1ticket->encdata->cipher->length)) == NULL) 1289 "Error allocating cipher in krb5ticket.\n"); 1296 asn1ticket->encdata->cipher->data, 1297 asn1ticket->encdata->cipher->length); 2086 outl = dec_authent->cipher->length; 2087 if (!EVP_Cipher(&ciph_ctx,unenc_authent,dec_authent->cipher->data,outl))
|
H A D | ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 213 static char *cipher=NULL; variable 265 fprintf(stderr," -cipher arg - The cipher list\n"); 276 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 285 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 431 cipher = 0; 550 else if (strcmp(*argv,"-cipher") == 0) 553 cipher= *(++argv); 625 /* ensure that the cipher lis [all...] |
H A D | s2_srvr.c | 401 s->session->cipher= cp; 452 is_export=SSL_C_IS_EXPORT(s->session->cipher); 461 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 492 /* incorrect number of key bytes for non export cipher */ 588 /* get session-id before cipher stuff so we can get out session 677 /* done cipher selection */ 784 s2n(n,p); /* add cipher length */
|
H A D | s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 340 * message only if the cipher suite is either 505 s->session->cipher=s->s3->tmp.new_cipher; 817 /* we need a cipher if we are not resuming a session */ 836 /* If it is a hit, check that the cipher is in the list */ 840 id=s->session->cipher->id; 863 s->session->cipher=sk_SSL_CIPHER_value(ciphers, 0); 867 /* we need to have the cipher in the cipher 949 * pick a cipher */ [all...] |
H A D | ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 173 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1166 * was unable to find a cipher matching the given rule string 1167 * (for example if the rule string specifies a cipher which 1382 /* ret->cipher=NULL;*/ 1556 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher) argument 1573 kl=SSL_C_EXPORT_PKEYLENGTH(cipher); 1666 * ECDSA cipher suites depending on the key usage extension. 1847 EVP_PKEY *ssl_get_sign_pkey(SSL *s,SSL_CIPHER *cipher) argument 1852 alg=cipher [all...] |
H A D | d1_pkt.c | 644 * Change cipher spec protocol 834 (s->session != NULL) && (s->session->cipher != NULL)) 1357 (EVP_CIPHER_mode( s->enc_write_ctx->cipher ) & EVP_CIPH_CBC_MODE)) 1358 bs = EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
|
H A D | s3_pkt.c | 779 * Change cipher spec protocol 963 (s->session != NULL) && (s->session->cipher != NULL)) 1089 /* Check we have a cipher to change to */ 1228 s->session->cipher=s->s3->tmp.new_cipher;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 213 static char *cipher=NULL; variable 265 fprintf(stderr," -cipher arg - The cipher list\n"); 276 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 285 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 431 cipher = 0; 550 else if (strcmp(*argv,"-cipher") == 0) 553 cipher= *(++argv); 625 /* ensure that the cipher lis [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/x86_64/crypto/ |
H A D | aes.c | 310 .cipher = {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/threads/ |
H A D | mttest.c | 111 static char *cipher=NULL; variable 246 if (cipher == NULL && OPENSSL_issetugid() == 0) 247 cipher=getenv("SSL_CIPHER");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/threads/ |
H A D | mttest.c | 135 static char *cipher=NULL; variable 270 if (cipher == NULL && OPENSSL_issetugid() == 0) 271 cipher=getenv("SSL_CIPHER");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | eap.c | 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local 780 if (!DesEncrypt(clear, cipher)) { 786 outp += b64enc(&b64, cipher, 8, outp); 788 (void) DesEncrypt(cp, cipher); 789 outp += b64enc(&b64, cipher, 8, outp); 800 (void) DesEncrypt(clear, cipher); 801 outp += b64enc(&b64, cipher, 8, outp);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/networking/ |
H A D | httpd.c | 1483 char *cipher; local 1495 cipher = pw_encrypt(u+1, pp); 1496 if (strcmp(cipher, pp) == 0)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/crypto/ |
H A D | geode-aes.c | 208 .cipher = {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 245 unsigned char cipher[ECRYPTFS_MAX_CIPHER_NAME_SIZE]; member in struct:ecryptfs_crypt_stat
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | Makefile | 342 cipher.h cipher-proto.h \ 368 ../cipher/libcipher.la \ 375 ../cipher/libcipher.la \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 129 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher; 140 evp_cipher=p7->d.enveloped->enc_data->cipher;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/util/ |
H A D | mk1mf.pl | 59 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher 61 no-rsa no-dsa no-dh - Skip this public key cipher
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_doit.c | 167 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher; 178 evp_cipher=p7->d.enveloped->enc_data->cipher;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/util/ |
H A D | mk1mf.pl | 65 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher 67 no-rsa no-dsa no-dh - Skip this public key cipher
|