HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 176 - 200 of 253) sorted by null

1 2 3 4 5 6 78 91011

  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.h 34 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.c 197 struct crypto_cipher *cipher; local
233 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
234 if (cipher == NULL) {
235 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
239 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
241 crypto_cipher_deinit(cipher);
244 crypto_cipher_deinit(cipher);
256 struct crypto_cipher *cipher; local
296 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
297 if (cipher == NULL)
    [all...]
  /external/wpa_supplicant/
driver_madwifi.c 206 u_int8_t cipher; local
226 cipher = IEEE80211_CIPHER_WEP;
230 cipher = IEEE80211_CIPHER_TKIP;
234 cipher = IEEE80211_CIPHER_AES_CCM;
258 wk.ik_type = cipher;
342 * NB: Don't need to set the freq or cipher-related state as
tlsv1_common.c 28 * Add support for commonly used cipher suites; don't bother with exportable
90 * tls_get_cipher_suite - Get TLS cipher suite
91 * @suite: Cipher suite identifier
92 * Returns: Pointer to the cipher data or %NULL if not found
104 static const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher)
108 if (tls_ciphers[i].cipher == cipher)
169 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
171 * @cipher_suite: New cipher suite
174 * This function is used to prepare TLS record layer for cipher suite change
    [all...]
wpa.c 153 * Management Group Cipher Suite (4 octets) (default: AES-128-CMAC)
229 * wpa_cipher_txt - Convert cipher suite to a text string
230 * @cipher: Cipher suite (WPA_CIPHER_* enum)
231 * Returns: Pointer to a text string of the cipher suite name
233 static const char * wpa_cipher_txt(int cipher)
235 switch (cipher) {
524 "cipher", __func__);
554 "pairwise cipher", __func__);
612 "group cipher 0x%x", __func__
2257 int cipher; local
2552 int cipher; local
    [all...]
driver_bsd.c 251 u_int8_t cipher; local
259 cipher = IEEE80211_CIPHER_WEP;
263 cipher = IEEE80211_CIPHER_TKIP;
267 cipher = IEEE80211_CIPHER_AES_CCM;
293 wk.ik_type = cipher;
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_madwifi.c 216 u_int8_t cipher; local
236 cipher = IEEE80211_CIPHER_WEP;
240 cipher = IEEE80211_CIPHER_TKIP;
244 cipher = IEEE80211_CIPHER_AES_CCM;
268 wk.ik_type = cipher;
352 * NB: Don't need to set the freq or cipher-related state as
driver_bsd.c 255 u_int8_t cipher; local
263 cipher = IEEE80211_CIPHER_WEP;
267 cipher = IEEE80211_CIPHER_TKIP;
271 cipher = IEEE80211_CIPHER_AES_CCM;
297 wk.ik_type = cipher;
  /external/dropbear/libtomcrypt/
crypt.tex 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library
180 mode routines for every single cipher. That means every time you add or remove a cipher from the library
182 are not directly tied to the ciphers. That is a new cipher can be added to the library by simply providing
184 can make use of the cipher right away.
254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally
412 functions which are (given that XXX is the name of the cipher) the following:
413 \index{Cipher Setup}
421 The XXX\_setup() routine will setup the cipher to be used with a given number of rounds and a given key length (in bytes).
425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/
JDKPKCS12KeyStore.java 27 import javax.crypto.Cipher;
573 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local
575 cipher.init(Cipher.UNWRAP_MODE, k, defParams);
578 out = (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY);
606 Cipher cipher = Cipher.getInstance(algorithm, "BC") local
644 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local
678 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local
    [all...]
  /external/openssl/crypto/pkcs7/
pk7_lib.c 558 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher)
578 /* Check cipher OID exists and has data in it*/
579 i = EVP_CIPHER_type(cipher);
586 ec->cipher = cipher;
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
341 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
361 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/encodings/
ISO9796d1Encoding.java 30 AsymmetricBlockCipher cipher)
32 this.engine = cipher;
  /external/openssl/crypto/krb5/
krb5_asn.c 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
  /external/openssl/ssl/
t1_enc.c 515 if (s->session->cipher != NULL)
517 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL)
521 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4)
577 bs=EVP_CIPHER_block_size(ds->cipher);
604 ds->buf_len, ds->cipher->key_len,
607 ds->cipher->iv_len);
609 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
s2_enc.c 139 /* check for NULL cipher */
143 bs=ds->cipher->block_size;
s3_enc.c 406 if (s->session->cipher != NULL)
408 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL)
412 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4)
473 bs=EVP_CIPHER_block_size(ds->cipher);
ssl_sess.c 418 if (ret->cipher == NULL)
427 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2]));
429 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1]));
430 if (ret->cipher == NULL)
  /external/openssl/include/openssl/
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
341 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
361 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
pkcs12.h 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
pem.h 145 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
159 int cipher; member in struct:pem_recip_st
176 int cipher; member in struct:pem_ctx_st::__anon4013
197 EVP_CIPHER *dec; /* date encryption cipher */
571 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
572 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_prng.h 4 int cipher, hash; member in struct:yarrow_prng
  /external/openssl/crypto/pkcs12/
pkcs12.h 183 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
225 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
  /external/openssl/crypto/pem/
pem.h 145 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
159 int cipher; member in struct:pem_recip_st
176 int cipher; member in struct:pem_ctx_st::__anon3969
197 EVP_CIPHER *dec; /* date encryption cipher */
571 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
572 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /build/tools/signapk/
SignApk.java 66 import javax.crypto.Cipher;
135 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local
136 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters());
139 return epkInfo.getKeySpec(cipher);

Completed in 379 milliseconds

1 2 3 4 5 6 78 91011