/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 449 "cipher", __func__); 479 "pairwise cipher", __func__); 539 "group cipher 0x%x", __func__, 900 * wpa_cipher_txt - Convert cipher suite to a text string 901 * @cipher: Cipher suite (WPA_CIPHER_* enum) 902 * Returns: Pointer to a text string of the cipher suite name 904 const char * wpa_cipher_txt(int cipher) 906 switch (cipher) { 1031 /* Skip Version and Group Data Cipher Suite * [all...] |
/external/openssl/ssl/ |
ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 493 c=s->cipher; 810 co_list[co_list_num].cipher = c; 874 *ca_curr = ciph_curr->cipher; 883 * or represent a cipher strength value (will be added in any case because algorithms=0). 961 cp = curr->cipher; 998 /* add the cipher if it has not been added yet. */ 1008 /* Move the added cipher to this location */ [all...] |
ssl_txt.c | 132 if (x->cipher == NULL) 136 if (BIO_printf(bp," Cipher : %06lX\n",x->cipher_id&0xffffff) <= 0) 141 if (BIO_printf(bp," Cipher : %04lX\n",x->cipher_id&0xffff) <= 0) 147 if (BIO_printf(bp," Cipher : %s\n",((x->cipher == NULL)?"unknown":x->cipher->name)) <= 0)
|
ssl_asn1.c | 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 143 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 161 a.cipher.type=V_ASN1_OCTET_STRING; 162 a.cipher.data=buf; 164 if (in->cipher == NULL) 167 l=in->cipher->id; 170 a.cipher.length=3; 177 a.cipher.length=2; 287 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 333 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
GCMBlockCipher.java | 27 private BlockCipher cipher; field in class:GCMBlockCipher 61 "cipher required with a block size of " + BLOCK_SIZE + "."); 70 this.cipher = c; 76 return cipher; 81 return cipher.getAlgorithmName() + "/GCM"; 134 // Cipher always used in forward mode 138 cipher.init(true, keyParam); 141 cipher.processBlock(H, 0, H, 0); 335 * Some AAD was sent after the cipher started. We determine the difference b/w the hash value 336 * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.c | 453 * tlsv1_server_get_cipher - Get current cipher name 455 * @buf: Buffer for the cipher name 459 * Get the name of the currently used cipher. 464 char *cipher; local 468 cipher = "RC4-MD5"; 471 cipher = "RC4-SHA"; 474 cipher = "DES-CBC-SHA"; 477 cipher = "DES-CBC3-SHA"; 480 cipher = "ADH-AES-128-SHA"; 483 cipher = "AES-256-SHA" [all...] |
tlsv1_common.c | 21 * Add support for commonly used cipher suites; don't bother with exportable 91 * tls_get_cipher_suite - Get TLS cipher suite 92 * @suite: Cipher suite identifier 93 * Returns: Pointer to the cipher data or %NULL if not found 105 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) 109 if (tls_ciphers[i].cipher == cipher) 115 int tls_server_key_exchange_allowed(tls_cipher cipher) 120 suite = tls_get_cipher_suite(cipher);
|
tlsv1_client.c | 118 * Cipher option 2a. 542 * tlsv1_client_get_cipher - Get current cipher name 544 * @buf: Buffer for the cipher name 548 * Get the name of the currently used cipher. 553 char *cipher; local 557 cipher = "RC4-MD5"; 560 cipher = "RC4-SHA"; 563 cipher = "DES-CBC-SHA"; 566 cipher = "DES-CBC3-SHA"; 569 cipher = "ADH-AES-128-SHA256" [all...] |
/external/openssl/apps/ |
pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 111 cipher=EVP_get_cipherbyname(*args); 112 if (!cipher) 115 "Unknown cipher %s\n", *args); 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 242 if ((pbe_nid == -1) && !cipher) 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
cms.c | 114 const EVP_CIPHER *cipher = NULL; local 204 cipher = EVP_des_ede3_cbc(); 206 cipher = EVP_des_cbc(); 210 cipher = EVP_seed_cbc(); 214 cipher = EVP_rc2_40_cbc(); 216 cipher = EVP_rc2_cbc(); 218 cipher = EVP_rc2_64_cbc(); 222 cipher = EVP_aes_128_cbc(); 224 cipher = EVP_aes_192_cbc(); 226 cipher = EVP_aes_256_cbc() [all...] |
genpkey.c | 82 const EVP_CIPHER *cipher = NULL; local 180 cipher = EVP_get_cipherbyname(*args + 1); 181 if (!cipher) 183 BIO_printf(bio_err, "Unknown cipher %s\n", 204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n"); 269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
/external/openssl/crypto/cmac/ |
cmac.c | 66 /* Cipher context to use */ 153 const EVP_CIPHER *cipher, ENGINE *impl) 171 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL); 175 if (!key && !cipher && !impl && keylen == 0) 187 if (cipher && !EVP_EncryptInit_ex(&ctx->cctx, cipher, impl, NULL, NULL))
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_process.c | 86 /* send through cipher */ 88 if ((err = cipher_descriptor[lrw->cipher].ecb_encrypt(ct, ct, &lrw->key)) != CRYPT_OK) { 92 if ((err = cipher_descriptor[lrw->cipher].ecb_decrypt(ct, ct, &lrw->key)) != CRYPT_OK) {
|
/external/openssl/crypto/pem/ |
pem_lib.c | 276 EVP_CIPHER_INFO cipher; local 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 362 /* actually it needs the cipher block size extra... */ 440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, 451 if (cipher->cipher == NULL) return(1); 466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0]) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 22 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 181 int cipher; local 220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 222 if (cipher < 0) { 223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 230 wpa_cipher_txt(cipher)); 242 peerkey->cipher = cipher; 264 /* Include only the selected cipher in pairwise cipher suite */ 267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher)); 464 int cipher; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JDKKeyStore.java | 31 import javax.crypto.Cipher; 152 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local 153 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher); 230 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 232 CipherInputStream cIn = new CipherInputStream(dIn, cipher); 249 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount) 469 Cipher cipher = Cipher.getInstance(algorithm, BouncyCastleProvider.PROVIDER_NAME); local 991 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 1020 Cipher cipher; local [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_add_iv.c | 47 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
CBCMode.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
DESede.java | 1 package ch.ethz.ssh2.crypto.cipher; 52 * initialise a DES cipher. 57 * the parameters required to set up the cipher.
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
TransportConnection.java | 12 import ch.ethz.ssh2.crypto.cipher.BlockCipher; 13 import ch.ethz.ssh2.crypto.cipher.CipherInputStream; 14 import ch.ethz.ssh2.crypto.cipher.CipherOutputStream; 15 import ch.ethz.ssh2.crypto.cipher.NullCipher; 40 /* Depends on current MAC and CIPHER */ 153 * bytes, and that is bigger than any current cipher block size + 64).
|
/external/openssh/ |
cipher.h | 1 /* $OpenBSD: cipher.h,v 1.37 2009/01/26 09:58:15 markus Exp $ */ 42 * Cipher types for SSH-1. New types can be added, but old types should not 46 #define SSH_CIPHER_INVALID -2 /* No valid cipher selected. */ 61 typedef struct Cipher Cipher; 64 struct Cipher; 68 Cipher *cipher; member in struct:CipherContext 72 Cipher *cipher_by_name(const char *); 73 Cipher *cipher_by_number(int) [all...] |
/external/openssl/crypto/asn1/ |
x_info.c | 76 ret->enc_cipher.cipher=NULL;
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 179 const EVP_CIPHER *cipher; local 207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 209 if(!cipher) { 215 /* Fixup cipher based on AlgorithmIdentifier */ 216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
/external/wpa_supplicant_8/src/drivers/ |
driver_wext.h | 84 int wpa_driver_wext_cipher2wext(int cipher);
|