/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | Makefile.in | 342 cipher.h cipher-proto.h \ 368 ../cipher/libcipher.la \ 375 ../cipher/libcipher.la \
|
H A D | visibility.c | 25 #include "cipher-proto.h" 1450 gcry_cipher_register (gcry_cipher_spec_t *cipher, int *algorithm_id, argument 1453 return _gcry_cipher_register (cipher, NULL, algorithm_id, module);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | des.c | 120 #include "cipher.h" 897 struct { byte key[24]; byte plain[8]; byte cipher[8]; } testdata[] = { member in struct:__anon2547 971 if (memcmp (testdata[i].cipher, result, 8)) 974 tripledes_ecb_decrypt (des3, testdata[i].cipher, result); 1144 report ("cipher", GCRY_CIPHER_3DES, what, errtxt);
|
H A D | cast5.c | 1 /* cast5.c - CAST5 cipher (RFC2144) 44 #include "cipher.h" 474 byte cipher[8]= { 0x23, 0x8B, 0x4F, 0xE5, 0x84, 0x7E, 0x44, 0xB2 }; local 479 if( memcmp( buffer, cipher, 8 ) )
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | s3_clnt.c | 370 s->session->cipher=s->s3->tmp.new_cipher; 686 /* unknown cipher */ 697 /* we did not say we would use this cipher */ 703 /* Depending on the session caching (internal/external), the cipher 706 if (s->session->cipher) 707 s->session->cipher_id = s->session->cipher->id; 872 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name, 1038 /* this should be because we are using an export cipher */
|
H A D | ssl_locl.h | 223 * Use the according functions for cipher management instead. 278 * Export and cipher strength information. For each cipher we have to decide 282 * Independent of the export flag the cipher strength is sorted into classes. 284 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change 310 * Macros to check the export status and cipher strength for export ciphers. 314 * *_EXPORT40/56 macros are used to check whether a certain cipher strength 509 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher);
|
H A D | ssl.h | 294 * to the default cipher setup will also be included here. 303 /* The following cipher list is used by default. 304 * It also is substituted when an application-defined cipher list string 375 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 391 * Cipher OCTET_STRING, -- the 3 byte cipher ID 450 SSL_CIPHER *cipher; member in struct:ssl_session_st 453 * the 'cipher' structure */ 493 /* Set on servers to choose the cipher according to the server's
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 335 * authentication in ECDH cipher suites with 371 s->session->cipher=s->s3->tmp.new_cipher; 726 /* unknown cipher */ 737 /* we did not say we would use this cipher */ 743 /* Depending on the session caching (internal/external), the cipher 746 if (s->session->cipher) 747 s->session->cipher_id = s->session->cipher->id; 922 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name, 1102 /* this should be because we are using an export cipher */ [all...] |
H A D | ssl.h | 166 * ECC cipher suite support in OpenSSL originally developed by 307 * to the default cipher setup will also be included here. 316 /* The following cipher list is used by default. 317 * It also is substituted when an application-defined cipher list string 393 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 409 * Cipher OCTET_STRING, -- the 3 byte cipher ID 468 SSL_CIPHER *cipher; member in struct:ssl_session_st 471 * the 'cipher' structure */ 518 /* Set on servers to choose the cipher according to the server's
|
H A D | d1_clnt.c | 373 s->session->cipher=s->s3->tmp.new_cipher;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/ |
H A D | Makefile.in | 284 DIST_SUBDIRS = m4 compat mpi cipher random src doc tests 285 SUBDIRS = compat mpi cipher random src doc tests
|
H A D | Makefile | 284 DIST_SUBDIRS = m4 compat mpi cipher random src doc tests 285 SUBDIRS = compat mpi cipher random src doc tests
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/crypto/ |
H A D | padlock-aes.c | 466 .cipher = {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/crypto/ |
H A D | aes.c | 430 .cipher = {
|
H A D | serpent.c | 484 .cra_u = { .cipher = { 552 .cra_u = { .cipher = {
|
H A D | blowfish.c | 461 .cra_u = { .cipher = {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/i386/crypto/ |
H A D | aes.c | 488 .cipher = {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/ |
H A D | ar-internal.h | 247 struct crypto_blkcipher *cipher; /* encryption handle */ member in struct:rxrpc_connection
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/x509/ |
H A D | x509.h | 444 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1157 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | ssl.h | 294 * to the default cipher setup will also be included here. 303 /* The following cipher list is used by default. 304 * It also is substituted when an application-defined cipher list string 375 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 391 * Cipher OCTET_STRING, -- the 3 byte cipher ID 450 SSL_CIPHER *cipher; member in struct:ssl_session_st 453 * the 'cipher' structure */ 493 /* Set on servers to choose the cipher according to the server's
|
H A D | x509.h | 444 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1157 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/cris/arch-v32/drivers/ |
H A D | cryptocop.c | 837 /* mem2mem is handled as a NULL cipher. */ 849 /* cipher */ 868 DEBUG_API(printk("cryptocop_setup_dma_list: cipher_ctx, bad cipher mode==%d\n", tctx->init.cipher_mode)); 939 /* Download key if a cipher is used. */ 952 /* Download explicit IV if a cipher is used and CBC mode and explicit IV selected. */ 956 DEBUG(printk("cryptocop_setup_dma_list: setup cipher CBC IV descriptor.\n")); 1078 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", cipher_ctx.curr_src->unit_no)); 1088 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", csum_ctx.curr_src->unit_no)); 1097 block processing unit, i.e. a cipher, it will be temporarily incorrect at some times. However 1206 DEBUG_API(printk("cryptocop_setup_dma_list: alloc EOP descriptor for cipher\ [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/ |
H A D | x509.h | 474 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1238 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 166 * ECC cipher suite support in OpenSSL originally developed by 307 * to the default cipher setup will also be included here. 316 /* The following cipher list is used by default. 317 * It also is substituted when an application-defined cipher list string 393 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 409 * Cipher OCTET_STRING, -- the 3 byte cipher ID 468 SSL_CIPHER *cipher; member in struct:ssl_session_st 471 * the 'cipher' structure */ 518 /* Set on servers to choose the cipher according to the server's
|
H A D | x509.h | 474 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1238 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
|