/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pem/ |
H A D | pem_seal.c | 99 EVP_CIPHER_CTX_init(&ctx->cipher); 100 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 134 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 164 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i); 177 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
H A D | pem_lib.c | 223 EVP_CIPHER_INFO cipher; local 242 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 243 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 309 /* actually it needs the cipher block size extra... */ 383 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 394 if (cipher->cipher == NULL) return(1); 409 EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher 430 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem_seal.c | 101 EVP_CIPHER_CTX_init(&ctx->cipher); 102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 136 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 166 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i); 179 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
H A D | pem_lib.c | 225 EVP_CIPHER_INFO cipher; local 244 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 245 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 311 /* actually it needs the cipher block size extra... */ 385 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 396 if (cipher->cipher == NULL) return(1); 411 EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher 432 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | ssl_txt.c | 98 if (x->cipher == NULL) 113 if (BIO_printf(bp," Cipher : %s\n",((x->cipher == NULL)?"unknown":x->cipher->name)) <= 0)
|
H A D | ssl_asn1.c | 70 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 93 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 111 a.cipher.type=V_ASN1_OCTET_STRING; 112 a.cipher.data=buf; 114 if (in->cipher == NULL) 117 l=in->cipher->id; 120 a.cipher.length=3; 127 a.cipher.length=2; 184 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 207 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN [all...] |
H A D | ssl_ciph.c | 97 SSL_CIPHER *cipher; member in struct:cipher_order_st 196 c=s->cipher; 371 co_list[co_list_num].cipher = c; 419 *ca_curr = ciph_curr->cipher; 427 * supported (not match any bit in mask) or represent a cipher 467 cp = curr->cipher; 484 * cipher or not all of the bits were met, the 499 /* add the cipher if it has not been added yet. */ 508 /* Move the added cipher to this location */ 557 (curr->cipher 923 SSL_CIPHER_description(SSL_CIPHER *cipher, char *buf, int len) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | smime.c | 91 const EVP_CIPHER *cipher = NULL; local 131 cipher = EVP_des_ede3_cbc(); 133 cipher = EVP_des_cbc(); 137 cipher = EVP_rc2_40_cbc(); 139 cipher = EVP_rc2_cbc(); 141 cipher = EVP_rc2_64_cbc(); 145 cipher = EVP_aes_128_cbc(); 147 cipher = EVP_aes_192_cbc(); 149 cipher = EVP_aes_256_cbc(); 381 if (!cipher) { [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_asn1.c | 70 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 93 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 111 a.cipher.type=V_ASN1_OCTET_STRING; 112 a.cipher.data=buf; 114 if (in->cipher == NULL) 117 l=in->cipher->id; 120 a.cipher.length=3; 127 a.cipher.length=2; 184 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 207 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN [all...] |
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 162 SSL_CIPHER *cipher; member in struct:cipher_order_st 172 /* TODO: COMPLEMENT OF ALL and COMPLEMENT OF DEFAULT do not have ECC cipher suites handled properly. */ 318 c=s->cipher; 514 co_list[co_list_num].cipher = c; 562 *ca_curr = ciph_curr->cipher; 570 * supported (not match any bit in mask) or represent a cipher 611 cp = curr->cipher; 613 /* If explicit cipher suite, match only that one for its own protocol version. 637 * cipher o 1078 SSL_CIPHER_description(SSL_CIPHER *cipher, char *buf, int len) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs7/ |
H A D | bio_ber.c | 111 BIO_TYPE_CIPHER,"cipher", 302 EVP_CipherUpdate(&(ctx->cipher), 342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 343 ctx->cipher.berrypt); 379 ret=EVP_CipherFinal_ex(&(ctx->cipher), 404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); 441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); 461 EVP_CipherInit_ex(&(ctx->cipher), [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | bio_ber.c | 111 BIO_TYPE_CIPHER,"cipher", 302 EVP_CipherUpdate(&(ctx->cipher), 342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 343 ctx->cipher.berrypt); 379 ret=EVP_CipherFinal_ex(&(ctx->cipher), 404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); 441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); 461 EVP_CipherInit_ex(&(ctx->cipher), [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/ |
H A D | test.sh | 13 $VER -cipher $CIPHER 1> tc1.txt 2> tc2.txt & 17 $VER -cipher $CIPHER 1> ts1.txt 2> ts2.txt &
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | Makefile.am | 56 cipher.h cipher-proto.h \ 104 ../cipher/libcipher.la \ 110 ../cipher/libcipher.la \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/engine/ |
H A D | eng_openssl.c | 98 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 194 * we're asked for a cipher we don't support (should not happen). 197 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 254 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 257 if(!cipher) 263 /* We are being asked for a specific cipher */ 265 *cipher = &test_r4_cipher; 267 *cipher = &test_r4_40_cipher; 274 *cipher = NULL;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/ |
H A D | evp_locl.h | 59 /* Macros to code block cipher wrappers */ 61 /* Wrapper functions for each cipher mode */ 65 bl = ctx->cipher->block_size;\ 229 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,flags) \ 230 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 231 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 232 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \ 233 flags, cipher##_init_key, NULL, \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/engine/ |
H A D | eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp_locl.h | 59 /* Macros to code block cipher wrappers */ 61 /* Wrapper functions for each cipher mode */ 65 bl = ctx->cipher->block_size;\ 229 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \ 230 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 231 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 232 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \ 233 0, cipher##_init_key, NULL, \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/loginutils/ |
H A D | passwd.c | 20 char *cipher = NULL; local 40 nuke_str(cipher); 53 char *cipher = NULL; local 61 cipher = pw_encrypt(orig, pw->pw_passwd); /* returns ptr to static */ 62 if (strcmp(cipher, pw->pw_passwd) != 0) { 101 nuke_str(cipher);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | smime.c | 94 const EVP_CIPHER *cipher = NULL; local 144 cipher = EVP_des_ede3_cbc(); 146 cipher = EVP_des_cbc(); 150 cipher = EVP_rc2_40_cbc(); 152 cipher = EVP_rc2_cbc(); 154 cipher = EVP_rc2_64_cbc(); 158 cipher = EVP_aes_128_cbc(); 160 cipher = EVP_aes_192_cbc(); 162 cipher = EVP_aes_256_cbc(); 166 cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/fips/des/ |
H A D | fips_desmovs.c | 85 const EVP_CIPHER *cipher = NULL; local 119 cipher=EVP_des_cbc(); 122 cipher=EVP_des_ede3_cbc(); 125 cipher=EVP_des_ecb(); 128 cipher=EVP_des_ede3_ecb(); 131 cipher=EVP_des_cfb64(); 134 cipher=EVP_des_ede3_cfb64(); 137 cipher=EVP_des_ofb(); 140 cipher=EVP_des_ede3_ofb(); 143 cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/ |
H A D | fips_desmovs.c | 85 const EVP_CIPHER *cipher = NULL; local 119 cipher=EVP_des_cbc(); 122 cipher=EVP_des_ede3_cbc(); 125 cipher=EVP_des_ecb(); 128 cipher=EVP_des_ede3_ecb(); 131 cipher=EVP_des_cfb64(); 134 cipher=EVP_des_ede3_cfb64(); 137 cipher=EVP_des_ofb(); 140 cipher=EVP_des_ede3_ofb(); 143 cipher [all...] |
H A D | fips_aesavs.c | 84 const EVP_CIPHER *cipher = NULL; local 121 cipher = EVP_aes_128_cbc(); 124 cipher = EVP_aes_192_cbc(); 127 cipher = EVP_aes_256_cbc(); 130 cipher = EVP_aes_128_ecb(); 133 cipher = EVP_aes_192_ecb(); 136 cipher = EVP_aes_256_ecb(); 139 cipher = EVP_aes_128_cfb(); 142 cipher = EVP_aes_192_cfb(); 145 cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/fips/aes/ |
H A D | fips_aesavs.c | 84 const EVP_CIPHER *cipher = NULL; local 121 cipher = EVP_aes_128_cbc(); 124 cipher = EVP_aes_192_cbc(); 127 cipher = EVP_aes_256_cbc(); 130 cipher = EVP_aes_128_ecb(); 133 cipher = EVP_aes_192_ecb(); 136 cipher = EVP_aes_256_ecb(); 139 cipher = EVP_aes_128_cfb(); 142 cipher = EVP_aes_192_cfb(); 145 cipher [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | evp.h | 362 /* Values for cipher flags */ 372 /* Set if variable length cipher */ 374 /* Set if the iv handling should be done by the cipher itself */ 376 /* Set if the cipher's init() function should be called if key is NULL */ 378 /* Call ctrl() to init cipher parameters */ 386 /* Allow non FIPS cipher in FIPS mode */ 400 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 406 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 407 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided */ 417 int key_len; /* May change for variable length cipher */ [all...] |