Searched refs:cipher (Results 201 - 225 of 237) sorted by relevance

12345678910

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/
H A DMakefile.in342 cipher.h cipher-proto.h \
368 ../cipher/libcipher.la \
375 ../cipher/libcipher.la \
H A Dvisibility.c25 #include "cipher-proto.h"
1450 gcry_cipher_register (gcry_cipher_spec_t *cipher, int *algorithm_id, argument
1453 return _gcry_cipher_register (cipher, NULL, algorithm_id, module);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Ddes.c120 #include "cipher.h"
897 struct { byte key[24]; byte plain[8]; byte cipher[8]; } testdata[] = { member in struct:__anon2547
971 if (memcmp (testdata[i].cipher, result, 8))
974 tripledes_ecb_decrypt (des3, testdata[i].cipher, result);
1144 report ("cipher", GCRY_CIPHER_3DES, what, errtxt);
H A Dcast5.c1 /* cast5.c - CAST5 cipher (RFC2144)
44 #include "cipher.h"
474 byte cipher[8]= { 0x23, 0x8B, 0x4F, 0xE5, 0x84, 0x7E, 0x44, 0xB2 }; local
479 if( memcmp( buffer, cipher, 8 ) )
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Ds3_clnt.c370 s->session->cipher=s->s3->tmp.new_cipher;
686 /* unknown cipher */
697 /* we did not say we would use this cipher */
703 /* Depending on the session caching (internal/external), the cipher
706 if (s->session->cipher)
707 s->session->cipher_id = s->session->cipher->id;
872 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name,
1038 /* this should be because we are using an export cipher */
H A Dssl_locl.h223 * Use the according functions for cipher management instead.
278 * Export and cipher strength information. For each cipher we have to decide
282 * Independent of the export flag the cipher strength is sorted into classes.
284 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change
310 * Macros to check the export status and cipher strength for export ciphers.
314 * *_EXPORT40/56 macros are used to check whether a certain cipher strength
509 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher);
H A Dssl.h294 * to the default cipher setup will also be included here.
303 /* The following cipher list is used by default.
304 * It also is substituted when an application-defined cipher list string
375 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
391 * Cipher OCTET_STRING, -- the 3 byte cipher ID
450 SSL_CIPHER *cipher; member in struct:ssl_session_st
453 * the 'cipher' structure */
493 /* Set on servers to choose the cipher according to the server's
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Ds3_clnt.c120 * ECC cipher suite support in OpenSSL originally written by
335 * authentication in ECDH cipher suites with
371 s->session->cipher=s->s3->tmp.new_cipher;
726 /* unknown cipher */
737 /* we did not say we would use this cipher */
743 /* Depending on the session caching (internal/external), the cipher
746 if (s->session->cipher)
747 s->session->cipher_id = s->session->cipher->id;
922 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name,
1102 /* this should be because we are using an export cipher */
[all...]
H A Dssl.h166 * ECC cipher suite support in OpenSSL originally developed by
307 * to the default cipher setup will also be included here.
316 /* The following cipher list is used by default.
317 * It also is substituted when an application-defined cipher list string
393 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
409 * Cipher OCTET_STRING, -- the 3 byte cipher ID
468 SSL_CIPHER *cipher; member in struct:ssl_session_st
471 * the 'cipher' structure */
518 /* Set on servers to choose the cipher according to the server's
H A Dd1_clnt.c373 s->session->cipher=s->s3->tmp.new_cipher;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/
H A DMakefile.in284 DIST_SUBDIRS = m4 compat mpi cipher random src doc tests
285 SUBDIRS = compat mpi cipher random src doc tests
H A DMakefile284 DIST_SUBDIRS = m4 compat mpi cipher random src doc tests
285 SUBDIRS = compat mpi cipher random src doc tests
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/crypto/
H A Dpadlock-aes.c466 .cipher = {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/crypto/
H A Daes.c430 .cipher = {
H A Dserpent.c484 .cra_u = { .cipher = {
552 .cra_u = { .cipher = {
H A Dblowfish.c461 .cra_u = { .cipher = {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/i386/crypto/
H A Daes.c488 .cipher = {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/
H A Dar-internal.h247 struct crypto_blkcipher *cipher; /* encryption handle */ member in struct:rxrpc_connection
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/x509/
H A Dx509.h444 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1157 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dssl.h294 * to the default cipher setup will also be included here.
303 /* The following cipher list is used by default.
304 * It also is substituted when an application-defined cipher list string
375 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
391 * Cipher OCTET_STRING, -- the 3 byte cipher ID
450 SSL_CIPHER *cipher; member in struct:ssl_session_st
453 * the 'cipher' structure */
493 /* Set on servers to choose the cipher according to the server's
H A Dx509.h444 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1157 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/cris/arch-v32/drivers/
H A Dcryptocop.c837 /* mem2mem is handled as a NULL cipher. */
849 /* cipher */
868 DEBUG_API(printk("cryptocop_setup_dma_list: cipher_ctx, bad cipher mode==%d\n", tctx->init.cipher_mode));
939 /* Download key if a cipher is used. */
952 /* Download explicit IV if a cipher is used and CBC mode and explicit IV selected. */
956 DEBUG(printk("cryptocop_setup_dma_list: setup cipher CBC IV descriptor.\n"));
1078 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", cipher_ctx.curr_src->unit_no));
1088 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", csum_ctx.curr_src->unit_no));
1097 block processing unit, i.e. a cipher, it will be temporarily incorrect at some times. However
1206 DEBUG_API(printk("cryptocop_setup_dma_list: alloc EOP descriptor for cipher\
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/
H A Dx509.h474 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1238 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dssl.h166 * ECC cipher suite support in OpenSSL originally developed by
307 * to the default cipher setup will also be included here.
316 /* The following cipher list is used by default.
317 * It also is substituted when an application-defined cipher list string
393 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
409 * Cipher OCTET_STRING, -- the 3 byte cipher ID
468 SSL_CIPHER *cipher; member in struct:ssl_session_st
471 * the 'cipher' structure */
518 /* Set on servers to choose the cipher according to the server's
H A Dx509.h474 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1238 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,

Completed in 474 milliseconds

12345678910