/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.h | 34 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 197 struct crypto_cipher *cipher; local 233 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 234 if (cipher == NULL) { 235 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 239 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 241 crypto_cipher_deinit(cipher); 244 crypto_cipher_deinit(cipher); 256 struct crypto_cipher *cipher; local 296 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 297 if (cipher == NULL) [all...] |
/external/wpa_supplicant/ |
driver_madwifi.c | 206 u_int8_t cipher; local 226 cipher = IEEE80211_CIPHER_WEP; 230 cipher = IEEE80211_CIPHER_TKIP; 234 cipher = IEEE80211_CIPHER_AES_CCM; 258 wk.ik_type = cipher; 342 * NB: Don't need to set the freq or cipher-related state as
|
tlsv1_common.c | 28 * Add support for commonly used cipher suites; don't bother with exportable 90 * tls_get_cipher_suite - Get TLS cipher suite 91 * @suite: Cipher suite identifier 92 * Returns: Pointer to the cipher data or %NULL if not found 104 static const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) 108 if (tls_ciphers[i].cipher == cipher) 169 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 171 * @cipher_suite: New cipher suite 174 * This function is used to prepare TLS record layer for cipher suite change [all...] |
wpa.c | 153 * Management Group Cipher Suite (4 octets) (default: AES-128-CMAC) 229 * wpa_cipher_txt - Convert cipher suite to a text string 230 * @cipher: Cipher suite (WPA_CIPHER_* enum) 231 * Returns: Pointer to a text string of the cipher suite name 233 static const char * wpa_cipher_txt(int cipher) 235 switch (cipher) { 524 "cipher", __func__); 554 "pairwise cipher", __func__); 612 "group cipher 0x%x", __func__ 2257 int cipher; local 2552 int cipher; local [all...] |
driver_bsd.c | 251 u_int8_t cipher; local 259 cipher = IEEE80211_CIPHER_WEP; 263 cipher = IEEE80211_CIPHER_TKIP; 267 cipher = IEEE80211_CIPHER_AES_CCM; 293 wk.ik_type = cipher;
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_madwifi.c | 216 u_int8_t cipher; local 236 cipher = IEEE80211_CIPHER_WEP; 240 cipher = IEEE80211_CIPHER_TKIP; 244 cipher = IEEE80211_CIPHER_AES_CCM; 268 wk.ik_type = cipher; 352 * NB: Don't need to set the freq or cipher-related state as
|
driver_bsd.c | 255 u_int8_t cipher; local 263 cipher = IEEE80211_CIPHER_WEP; 267 cipher = IEEE80211_CIPHER_TKIP; 271 cipher = IEEE80211_CIPHER_AES_CCM; 297 wk.ik_type = cipher;
|
/external/dropbear/libtomcrypt/ |
crypt.tex | 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library 180 mode routines for every single cipher. That means every time you add or remove a cipher from the library 182 are not directly tied to the ciphers. That is a new cipher can be added to the library by simply providing 184 can make use of the cipher right away. 254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally 412 functions which are (given that XXX is the name of the cipher) the following: 413 \index{Cipher Setup} 421 The XXX\_setup() routine will setup the cipher to be used with a given number of rounds and a given key length (in bytes). 425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12KeyStore.java | 27 import javax.crypto.Cipher; 573 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local 575 cipher.init(Cipher.UNWRAP_MODE, k, defParams); 578 out = (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY); 606 Cipher cipher = Cipher.getInstance(algorithm, "BC") local 644 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local 678 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local [all...] |
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 558 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) 578 /* Check cipher OID exists and has data in it*/ 579 i = EVP_CIPHER_type(cipher); 586 ec->cipher = cipher;
|
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 341 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 361 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/encodings/ |
ISO9796d1Encoding.java | 30 AsymmetricBlockCipher cipher) 32 this.engine = cipher;
|
/external/openssl/crypto/krb5/ |
krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/external/openssl/ssl/ |
t1_enc.c | 515 if (s->session->cipher != NULL) 517 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 521 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 577 bs=EVP_CIPHER_block_size(ds->cipher); 604 ds->buf_len, ds->cipher->key_len, 607 ds->cipher->iv_len); 609 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
s2_enc.c | 139 /* check for NULL cipher */ 143 bs=ds->cipher->block_size;
|
s3_enc.c | 406 if (s->session->cipher != NULL) 408 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 412 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 473 bs=EVP_CIPHER_block_size(ds->cipher);
|
ssl_sess.c | 418 if (ret->cipher == NULL) 427 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 429 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 430 if (ret->cipher == NULL)
|
/external/openssl/include/openssl/ |
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 341 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 361 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
pkcs12.h | 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
pem.h | 145 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 159 int cipher; member in struct:pem_recip_st 176 int cipher; member in struct:pem_ctx_st::__anon4013 197 EVP_CIPHER *dec; /* date encryption cipher */ 571 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 572 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 4 int cipher, hash; member in struct:yarrow_prng
|
/external/openssl/crypto/pkcs12/ |
pkcs12.h | 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/openssl/crypto/pem/ |
pem.h | 145 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 159 int cipher; member in struct:pem_recip_st 176 int cipher; member in struct:pem_ctx_st::__anon3969 197 EVP_CIPHER *dec; /* date encryption cipher */ 571 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 572 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
/build/tools/signapk/ |
SignApk.java | 66 import javax.crypto.Cipher; 135 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local 136 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); 139 return epkInfo.getKeySpec(cipher);
|