HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 176 - 200 of 295) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/wpa_supplicant/
tlsv1_common.h 175 tls_cipher cipher; member in struct:tls_cipher_suite
185 tls_cipher cipher; member in struct:tls_cipher_data
driver_madwifi.c 206 u_int8_t cipher; local
226 cipher = IEEE80211_CIPHER_WEP;
230 cipher = IEEE80211_CIPHER_TKIP;
234 cipher = IEEE80211_CIPHER_AES_CCM;
258 wk.ik_type = cipher;
342 * NB: Don't need to set the freq or cipher-related state as
tlsv1_common.c 28 * Add support for commonly used cipher suites; don't bother with exportable
90 * tls_get_cipher_suite - Get TLS cipher suite
91 * @suite: Cipher suite identifier
92 * Returns: Pointer to the cipher data or %NULL if not found
104 static const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher)
108 if (tls_ciphers[i].cipher == cipher)
169 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
171 * @cipher_suite: New cipher suite
174 * This function is used to prepare TLS record layer for cipher suite change
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_add_aad.c 45 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) {
  /external/openssl/crypto/krb5/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
krb5_asn.c 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
  /external/openssl/crypto/pem/
pem_info.c 241 EVP_CIPHER_INFO cipher; local
243 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher))
245 if (!PEM_do_header(&cipher,data,&len,cb,u))
359 EVP_CIPHER_nid(xi->enc_cipher.cipher));
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon9038
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/openssl/include/openssl/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon9081
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.h 34 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
  /external/wpa_supplicant_8/src/crypto/
Makefile 46 LIB_OBJS += crypto_internal-cipher.o
  /external/wpa_supplicant_8/src/drivers/
driver_wext.h 90 int wpa_driver_wext_cipher2wext(int cipher);
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 34 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
tdls.c 102 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
164 switch (peer->cipher) {
170 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
174 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
594 peer->cipher = 0;
843 * RSN IE is filled only with CCMP CIPHER
846 * Regardless of the cipher used on the AP connection, select CCMP
1153 int cipher; local
1480 int cipher; local
    [all...]
  /external/chromium/third_party/libjingle/source/talk/
libjingle.scons 25 "third_party/srtp/crypto/cipher/aes.c",
26 "third_party/srtp/crypto/cipher/aes_cbc.c",
27 "third_party/srtp/crypto/cipher/aes_icm.c",
28 "third_party/srtp/crypto/cipher/cipher.c",
29 "third_party/srtp/crypto/cipher/null_cipher.c",
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.c 197 struct crypto_cipher *cipher; local
233 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
234 if (cipher == NULL) {
235 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
239 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
241 crypto_cipher_deinit(cipher);
244 crypto_cipher_deinit(cipher);
256 struct crypto_cipher *cipher; local
296 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
297 if (cipher == NULL)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 198 struct crypto_cipher *cipher; local
234 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
235 if (cipher == NULL) {
236 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
240 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
242 crypto_cipher_deinit(cipher);
245 crypto_cipher_deinit(cipher);
257 struct crypto_cipher *cipher; local
297 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
298 if (cipher == NULL)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_madwifi.c 216 u_int8_t cipher; local
236 cipher = IEEE80211_CIPHER_WEP;
240 cipher = IEEE80211_CIPHER_TKIP;
244 cipher = IEEE80211_CIPHER_AES_CCM;
268 wk.ik_type = cipher;
352 * NB: Don't need to set the freq or cipher-related state as
driver_wext.h 87 int wpa_driver_wext_cipher2wext(int cipher);
  /external/chromium/net/socket/
ssl_client_socket_openssl.cc 46 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; }
153 // server after receiving ClientHello if there's no common supported cipher.
484 // directly remove a cipher by ID.
491 // appended to the cipher removal |command|.
493 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local
494 const uint16 id = SSL_CIPHER_get_id(cipher);
499 bool disable = SSL_CIPHER_get_bits(cipher, NULL) < 80;
506 const char* name = SSL_CIPHER_get_name(cipher);
507 DVLOG(3) << "Found cipher to remove: '" << name << "', ID: " << i
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library
180 mode routines for every single cipher. That means every time you add or remove a cipher from the library
182 are not directly tied to the ciphers. That is a new cipher can be added to the library by simply providing
184 can make use of the cipher right away.
254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally
412 functions which are (given that XXX is the name of the cipher) the following:
413 \index{Cipher Setup}
421 The XXX\_setup() routine will setup the cipher to be used with a given number of rounds and a given key length (in bytes).
425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not
    [all...]
  /external/openssl/android.testssl/
testssl 140 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1
158 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1
161 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
  /external/chromium/chrome/browser/
page_info_model.cc 223 const char *key_exchange, *cipher, *mac; local
224 net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, cipher_suite);
229 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/
ISO9796d1Encoding.java 36 AsymmetricBlockCipher cipher)
38 this.engine = cipher;

Completed in 1309 milliseconds

1 2 3 4 5 6 78 91011>>