HomeSort by relevance Sort by last modified time
    Searched defs:cipher (Results 51 - 75 of 105) sorted by null

1 23 4 5

  /external/openssl/include/openssl/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/openssl/ssl/
ssl_asn1.c 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
137 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
155 a.cipher.type=V_ASN1_OCTET_STRING;
156 a.cipher.data=buf;
158 if (in->cipher == NULL)
161 l=in->cipher->id;
164 a.cipher.length=3;
171 a.cipher.length=2;
273 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
315 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING)
    [all...]
  /external/wpa_supplicant/
driver_madwifi.c 206 u_int8_t cipher; local
226 cipher = IEEE80211_CIPHER_WEP;
230 cipher = IEEE80211_CIPHER_TKIP;
234 cipher = IEEE80211_CIPHER_AES_CCM;
258 wk.ik_type = cipher;
342 * NB: Don't need to set the freq or cipher-related state as
eap_sake.c 30 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon8290
driver_bsd.c 251 u_int8_t cipher; local
259 cipher = IEEE80211_CIPHER_WEP;
263 cipher = IEEE80211_CIPHER_TKIP;
267 cipher = IEEE80211_CIPHER_AES_CCM;
293 wk.ik_type = cipher;
wpa_i.h 63 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_openssl.c 261 const EVP_CIPHER *cipher; local
270 cipher = EVP_rc4();
277 cipher = EVP_aes_128_cbc();
280 cipher = EVP_aes_192_cbc();
283 cipher = EVP_aes_256_cbc();
293 cipher = EVP_des_ede3_cbc();
296 cipher = EVP_des_cbc();
301 cipher = EVP_rc2_ecb();
311 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
313 !EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, key, iv))
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_madwifi.c 216 u_int8_t cipher; local
236 cipher = IEEE80211_CIPHER_WEP;
240 cipher = IEEE80211_CIPHER_TKIP;
244 cipher = IEEE80211_CIPHER_AES_CCM;
268 wk.ik_type = cipher;
352 * NB: Don't need to set the freq or cipher-related state as
driver_bsd.c 255 u_int8_t cipher; local
263 cipher = IEEE80211_CIPHER_WEP;
267 cipher = IEEE80211_CIPHER_TKIP;
271 cipher = IEEE80211_CIPHER_AES_CCM;
297 wk.ik_type = cipher;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.c 197 struct crypto_cipher *cipher; local
233 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
234 if (cipher == NULL) {
235 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
239 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
241 crypto_cipher_deinit(cipher);
244 crypto_cipher_deinit(cipher);
256 struct crypto_cipher *cipher; local
296 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
297 if (cipher == NULL)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 29 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon8474
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 28 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon8505
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.c 430 * tlsv1_client_get_cipher - Get current cipher name
432 * @buf: Buffer for the cipher name
436 * Get the name of the currently used cipher.
441 char *cipher; local
445 cipher = "RC4-MD5";
448 cipher = "RC4-SHA";
451 cipher = "DES-CBC-SHA";
454 cipher = "DES-CBC3-SHA";
457 cipher = "ADH-AES-128-SHA";
460 cipher = "AES-256-SHA"
    [all...]
tlsv1_server.c 421 * tlsv1_server_get_cipher - Get current cipher name
423 * @buf: Buffer for the cipher name
427 * Get the name of the currently used cipher.
432 char *cipher; local
436 cipher = "RC4-MD5";
439 cipher = "RC4-SHA";
442 cipher = "DES-CBC-SHA";
445 cipher = "DES-CBC3-SHA";
448 cipher = "ADH-AES-128-SHA";
451 cipher = "AES-256-SHA"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
wpas_glue.c 201 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
204 wpa_s->pairwise_cipher = cipher;
206 wpa_s->group_cipher = cipher;
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JDKKeyStore.java 31 import javax.crypto.Cipher;
151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local
152 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher);
229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
231 CipherInputStream cIn = new CipherInputStream(dIn, cipher);
248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount)
469 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local
974 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
1004 Cipher cipher; local
    [all...]
JDKPKCS12KeyStore.java 28 import javax.crypto.Cipher;
583 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local
585 cipher.init(Cipher.UNWRAP_MODE, k, defParams);
588 out = (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY);
616 Cipher cipher = Cipher.getInstance(algorithm, bcProvider) local
652 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 186 int cipher; local
225 cipher = ie.pairwise_cipher & sm->allowed_pairwise_cipher;
226 if (cipher & WPA_CIPHER_CCMP) {
228 cipher = WPA_CIPHER_CCMP;
229 } else if (cipher & WPA_CIPHER_TKIP) {
231 cipher = WPA_CIPHER_TKIP;
233 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
250 peerkey->cipher = cipher;
272 /* Include only the selected cipher in pairwise cipher suite *
475 int cipher; local
    [all...]
  /external/openssl/apps/
cms.c 114 const EVP_CIPHER *cipher = NULL; local
203 cipher = EVP_des_ede3_cbc();
205 cipher = EVP_des_cbc();
209 cipher = EVP_seed_cbc();
213 cipher = EVP_rc2_40_cbc();
215 cipher = EVP_rc2_cbc();
217 cipher = EVP_rc2_64_cbc();
221 cipher = EVP_aes_128_cbc();
223 cipher = EVP_aes_192_cbc();
225 cipher = EVP_aes_256_cbc()
    [all...]
req.c 181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
738 cipher=NULL;
739 if (nodes) cipher=NULL;
743 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
    [all...]
s_client.c 326 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
327 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
401 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
672 else if (strcmp(*argv,"-cipher") == 0)
675 cipher= *(++argv);
758 if (cipher)
760 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
763 cipher = "PSK";
900 if (cipher != NULL
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 103 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
248 sess.cipher = ciphers[i].id;
289 sess.cipher = 0;
368 if ((inl % ctx->cipher->block_size) != 0)
382 if (ctx->cipher->iv_len) {
385 iiv = in + inl - ctx->cipher->iv_len;
386 memcpy(save_iv, iiv, ctx->cipher->iv_len);
398 if (ctx->cipher->iv_len) {
400 iiv = out + inl - ctx->cipher->iv_len;
403 memcpy(ctx->iv, iiv, ctx->cipher->iv_len)
414 int cipher = -1, i; local
    [all...]
  /external/openssl/crypto/threads/
mttest.c 137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
  /external/chromium/net/third_party/nss/ssl/
sslsock.c 58 int cipher; member in struct:cipherPolicyStr
991 /* function tells us if the cipher suite is one that we no longer support. */
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h 191 /** A block cipher ECB structure */
193 /** The index of the cipher chosen */
194 int cipher, member in struct:__anon3284
195 /** The block size of the given cipher */
203 /** A block cipher CFB structure */
205 /** The index of the cipher chosen */
206 int cipher, member in struct:__anon3285
207 /** The block size of the given cipher */
221 /** A block cipher OFB structure */
223 /** The index of the cipher chosen *
224 int cipher, member in struct:__anon3286
240 int cipher, member in struct:__anon3287
255 int cipher, member in struct:__anon3288
276 int cipher; member in struct:__anon3289
301 int cipher, member in struct:__anon3290
    [all...]

Completed in 1387 milliseconds

1 23 4 5