| /external/openssl/include/openssl/ |
| krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
| /external/openssl/ssl/ |
| ssl_asn1.c | 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 137 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 155 a.cipher.type=V_ASN1_OCTET_STRING; 156 a.cipher.data=buf; 158 if (in->cipher == NULL) 161 l=in->cipher->id; 164 a.cipher.length=3; 171 a.cipher.length=2; 273 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 315 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING) [all...] |
| /external/wpa_supplicant/ |
| driver_madwifi.c | 206 u_int8_t cipher; local 226 cipher = IEEE80211_CIPHER_WEP; 230 cipher = IEEE80211_CIPHER_TKIP; 234 cipher = IEEE80211_CIPHER_AES_CCM; 258 wk.ik_type = cipher; 342 * NB: Don't need to set the freq or cipher-related state as
|
| eap_sake.c | 30 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon8290
|
| driver_bsd.c | 251 u_int8_t cipher; local 259 cipher = IEEE80211_CIPHER_WEP; 263 cipher = IEEE80211_CIPHER_TKIP; 267 cipher = IEEE80211_CIPHER_AES_CCM; 293 wk.ik_type = cipher;
|
| wpa_i.h | 63 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
| /external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
| crypto_openssl.c | 261 const EVP_CIPHER *cipher; local 270 cipher = EVP_rc4(); 277 cipher = EVP_aes_128_cbc(); 280 cipher = EVP_aes_192_cbc(); 283 cipher = EVP_aes_256_cbc(); 293 cipher = EVP_des_ede3_cbc(); 296 cipher = EVP_des_cbc(); 301 cipher = EVP_rc2_ecb(); 311 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 313 !EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, key, iv)) [all...] |
| /external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
| driver_madwifi.c | 216 u_int8_t cipher; local 236 cipher = IEEE80211_CIPHER_WEP; 240 cipher = IEEE80211_CIPHER_TKIP; 244 cipher = IEEE80211_CIPHER_AES_CCM; 268 wk.ik_type = cipher; 352 * NB: Don't need to set the freq or cipher-related state as
|
| driver_bsd.c | 255 u_int8_t cipher; local 263 cipher = IEEE80211_CIPHER_WEP; 267 cipher = IEEE80211_CIPHER_TKIP; 271 cipher = IEEE80211_CIPHER_AES_CCM; 297 wk.ik_type = cipher;
|
| /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
| ikev2_common.c | 197 struct crypto_cipher *cipher; local 233 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 234 if (cipher == NULL) { 235 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 239 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 241 crypto_cipher_deinit(cipher); 244 crypto_cipher_deinit(cipher); 256 struct crypto_cipher *cipher; local 296 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 297 if (cipher == NULL) [all...] |
| /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
| eap_sake.c | 29 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon8474
|
| /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
| eap_sake.c | 28 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon8505
|
| /external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
| tlsv1_client.c | 430 * tlsv1_client_get_cipher - Get current cipher name 432 * @buf: Buffer for the cipher name 436 * Get the name of the currently used cipher. 441 char *cipher; local 445 cipher = "RC4-MD5"; 448 cipher = "RC4-SHA"; 451 cipher = "DES-CBC-SHA"; 454 cipher = "DES-CBC3-SHA"; 457 cipher = "ADH-AES-128-SHA"; 460 cipher = "AES-256-SHA" [all...] |
| tlsv1_server.c | 421 * tlsv1_server_get_cipher - Get current cipher name 423 * @buf: Buffer for the cipher name 427 * Get the name of the currently used cipher. 432 char *cipher; local 436 cipher = "RC4-MD5"; 439 cipher = "RC4-SHA"; 442 cipher = "DES-CBC-SHA"; 445 cipher = "DES-CBC3-SHA"; 448 cipher = "ADH-AES-128-SHA"; 451 cipher = "AES-256-SHA" [all...] |
| /external/wpa_supplicant_6/wpa_supplicant/ |
| wpas_glue.c | 201 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 204 wpa_s->pairwise_cipher = cipher; 206 wpa_s->group_cipher = cipher;
|
| /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
| JDKKeyStore.java | 31 import javax.crypto.Cipher; 151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local 152 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher); 229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 231 CipherInputStream cIn = new CipherInputStream(dIn, cipher); 248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount) 469 Cipher cipher = Cipher.getInstance(algorithm, "BC"); local 974 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 1004 Cipher cipher; local [all...] |
| JDKPKCS12KeyStore.java | 28 import javax.crypto.Cipher; 583 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local 585 cipher.init(Cipher.UNWRAP_MODE, k, defParams); 588 out = (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY); 616 Cipher cipher = Cipher.getInstance(algorithm, bcProvider) local 652 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local [all...] |
| /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
| peerkey.c | 186 int cipher; local 225 cipher = ie.pairwise_cipher & sm->allowed_pairwise_cipher; 226 if (cipher & WPA_CIPHER_CCMP) { 228 cipher = WPA_CIPHER_CCMP; 229 } else if (cipher & WPA_CIPHER_TKIP) { 231 cipher = WPA_CIPHER_TKIP; 233 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 250 peerkey->cipher = cipher; 272 /* Include only the selected cipher in pairwise cipher suite * 475 int cipher; local [all...] |
| /external/openssl/apps/ |
| cms.c | 114 const EVP_CIPHER *cipher = NULL; local 203 cipher = EVP_des_ede3_cbc(); 205 cipher = EVP_des_cbc(); 209 cipher = EVP_seed_cbc(); 213 cipher = EVP_rc2_40_cbc(); 215 cipher = EVP_rc2_cbc(); 217 cipher = EVP_rc2_64_cbc(); 221 cipher = EVP_aes_128_cbc(); 223 cipher = EVP_aes_192_cbc(); 225 cipher = EVP_aes_256_cbc() [all...] |
| req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 738 cipher=NULL; 739 if (nodes) cipher=NULL; 743 if (!PEM_write_bio_PrivateKey(out,pkey,cipher, [all...] |
| s_client.c | 326 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 327 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 401 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 672 else if (strcmp(*argv,"-cipher") == 0) 675 cipher= *(++argv); 758 if (cipher) 760 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 763 cipher = "PSK"; 900 if (cipher != NULL [all...] |
| /external/openssl/crypto/engine/ |
| eng_cryptodev.c | 103 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 248 sess.cipher = ciphers[i].id; 289 sess.cipher = 0; 368 if ((inl % ctx->cipher->block_size) != 0) 382 if (ctx->cipher->iv_len) { 385 iiv = in + inl - ctx->cipher->iv_len; 386 memcpy(save_iv, iiv, ctx->cipher->iv_len); 398 if (ctx->cipher->iv_len) { 400 iiv = out + inl - ctx->cipher->iv_len; 403 memcpy(ctx->iv, iiv, ctx->cipher->iv_len) 414 int cipher = -1, i; local [all...] |
| /external/openssl/crypto/threads/ |
| mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
| /external/chromium/net/third_party/nss/ssl/ |
| sslsock.c | 58 int cipher; member in struct:cipherPolicyStr 991 /* function tells us if the cipher suite is one that we no longer support. */ [all...] |
| /external/dropbear/libtomcrypt/src/headers/ |
| tomcrypt_cipher.h | 191 /** A block cipher ECB structure */ 193 /** The index of the cipher chosen */ 194 int cipher, member in struct:__anon3284 195 /** The block size of the given cipher */ 203 /** A block cipher CFB structure */ 205 /** The index of the cipher chosen */ 206 int cipher, member in struct:__anon3285 207 /** The block size of the given cipher */ 221 /** A block cipher OFB structure */ 223 /** The index of the cipher chosen * 224 int cipher, member in struct:__anon3286 240 int cipher, member in struct:__anon3287 255 int cipher, member in struct:__anon3288 276 int cipher; member in struct:__anon3289 301 int cipher, member in struct:__anon3290 [all...] |