HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 151 - 175 of 297) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/wpa_supplicant_8/src/common/
wpa_common.c 449 "cipher", __func__);
479 "pairwise cipher", __func__);
539 "group cipher 0x%x", __func__,
900 * wpa_cipher_txt - Convert cipher suite to a text string
901 * @cipher: Cipher suite (WPA_CIPHER_* enum)
902 * Returns: Pointer to a text string of the cipher suite name
904 const char * wpa_cipher_txt(int cipher)
906 switch (cipher) {
1031 /* Skip Version and Group Data Cipher Suite *
    [all...]
  /external/openssl/ssl/
ssl_ciph.c 113 * ECC cipher suite support in OpenSSL originally developed by
220 const SSL_CIPHER *cipher; member in struct:cipher_order_st
493 c=s->cipher;
810 co_list[co_list_num].cipher = c;
874 *ca_curr = ciph_curr->cipher;
883 * or represent a cipher strength value (will be added in any case because algorithms=0).
961 cp = curr->cipher;
998 /* add the cipher if it has not been added yet. */
1008 /* Move the added cipher to this location */
    [all...]
ssl_txt.c 132 if (x->cipher == NULL)
136 if (BIO_printf(bp," Cipher : %06lX\n",x->cipher_id&0xffffff) <= 0)
141 if (BIO_printf(bp," Cipher : %04lX\n",x->cipher_id&0xffff) <= 0)
147 if (BIO_printf(bp," Cipher : %s\n",((x->cipher == NULL)?"unknown":x->cipher->name)) <= 0)
ssl_asn1.c 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
143 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
161 a.cipher.type=V_ASN1_OCTET_STRING;
162 a.cipher.data=buf;
164 if (in->cipher == NULL)
167 l=in->cipher->id;
170 a.cipher.length=3;
177 a.cipher.length=2;
287 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
333 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
GCMBlockCipher.java 27 private BlockCipher cipher; field in class:GCMBlockCipher
61 "cipher required with a block size of " + BLOCK_SIZE + ".");
70 this.cipher = c;
76 return cipher;
81 return cipher.getAlgorithmName() + "/GCM";
134 // Cipher always used in forward mode
138 cipher.init(true, keyParam);
141 cipher.processBlock(H, 0, H, 0);
335 * Some AAD was sent after the cipher started. We determine the difference b/w the hash value
336 * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at)
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_server.c 453 * tlsv1_server_get_cipher - Get current cipher name
455 * @buf: Buffer for the cipher name
459 * Get the name of the currently used cipher.
464 char *cipher; local
468 cipher = "RC4-MD5";
471 cipher = "RC4-SHA";
474 cipher = "DES-CBC-SHA";
477 cipher = "DES-CBC3-SHA";
480 cipher = "ADH-AES-128-SHA";
483 cipher = "AES-256-SHA"
    [all...]
tlsv1_common.c 21 * Add support for commonly used cipher suites; don't bother with exportable
91 * tls_get_cipher_suite - Get TLS cipher suite
92 * @suite: Cipher suite identifier
93 * Returns: Pointer to the cipher data or %NULL if not found
105 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher)
109 if (tls_ciphers[i].cipher == cipher)
115 int tls_server_key_exchange_allowed(tls_cipher cipher)
120 suite = tls_get_cipher_suite(cipher);
tlsv1_client.c 118 * Cipher option 2a.
542 * tlsv1_client_get_cipher - Get current cipher name
544 * @buf: Buffer for the cipher name
548 * Get the name of the currently used cipher.
553 char *cipher; local
557 cipher = "RC4-MD5";
560 cipher = "RC4-SHA";
563 cipher = "DES-CBC-SHA";
566 cipher = "DES-CBC3-SHA";
569 cipher = "ADH-AES-128-SHA256"
    [all...]
  /external/openssl/apps/
pkcs8.c 78 const EVP_CIPHER *cipher = NULL; local
111 cipher=EVP_get_cipherbyname(*args);
112 if (!cipher)
115 "Unknown cipher %s\n", *args);
224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
242 if ((pbe_nid == -1) && !cipher)
311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
cms.c 114 const EVP_CIPHER *cipher = NULL; local
204 cipher = EVP_des_ede3_cbc();
206 cipher = EVP_des_cbc();
210 cipher = EVP_seed_cbc();
214 cipher = EVP_rc2_40_cbc();
216 cipher = EVP_rc2_cbc();
218 cipher = EVP_rc2_64_cbc();
222 cipher = EVP_aes_128_cbc();
224 cipher = EVP_aes_192_cbc();
226 cipher = EVP_aes_256_cbc()
    [all...]
genpkey.c 82 const EVP_CIPHER *cipher = NULL; local
180 cipher = EVP_get_cipherbyname(*args + 1);
181 if (!cipher)
183 BIO_printf(bio_err, "Unknown cipher %s\n",
204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
  /external/openssl/crypto/cmac/
cmac.c 66 /* Cipher context to use */
153 const EVP_CIPHER *cipher, ENGINE *impl)
171 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL);
175 if (!key && !cipher && !impl && keylen == 0)
187 if (cipher && !EVP_EncryptInit_ex(&ctx->cctx, cipher, impl, NULL, NULL))
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_process.c 86 /* send through cipher */
88 if ((err = cipher_descriptor[lrw->cipher].ecb_encrypt(ct, ct, &lrw->key)) != CRYPT_OK) {
92 if ((err = cipher_descriptor[lrw->cipher].ecb_decrypt(ct, ct, &lrw->key)) != CRYPT_OK) {
  /external/openssl/crypto/pem/
pem_lib.c 276 EVP_CIPHER_INFO cipher; local
295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
362 /* actually it needs the cipher block size extra... */
440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen,
451 if (cipher->cipher == NULL) return(1);
466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0])
    [all...]
  /external/wpa_supplicant_8/src/crypto/
aes_wrap.h 21 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
22 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
JDKKeyStore.java 31 import javax.crypto.Cipher;
152 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local
153 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher);
230 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
232 CipherInputStream cIn = new CipherInputStream(dIn, cipher);
249 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount)
469 Cipher cipher = Cipher.getInstance(algorithm, BouncyCastleProvider.PROVIDER_NAME); local
991 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
1020 Cipher cipher; local
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_add_iv.c 47 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) {
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/
CBCMode.java 5 package ch.ethz.ssh2.crypto.cipher;
DESede.java 1 package ch.ethz.ssh2.crypto.cipher;
52 * initialise a DES cipher.
57 * the parameters required to set up the cipher.
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
TransportConnection.java 12 import ch.ethz.ssh2.crypto.cipher.BlockCipher;
13 import ch.ethz.ssh2.crypto.cipher.CipherInputStream;
14 import ch.ethz.ssh2.crypto.cipher.CipherOutputStream;
15 import ch.ethz.ssh2.crypto.cipher.NullCipher;
40 /* Depends on current MAC and CIPHER */
153 * bytes, and that is bigger than any current cipher block size + 64).
  /external/openssh/
cipher.h 1 /* $OpenBSD: cipher.h,v 1.37 2009/01/26 09:58:15 markus Exp $ */
42 * Cipher types for SSH-1. New types can be added, but old types should not
46 #define SSH_CIPHER_INVALID -2 /* No valid cipher selected. */
61 typedef struct Cipher Cipher;
64 struct Cipher;
68 Cipher *cipher; member in struct:CipherContext
72 Cipher *cipher_by_name(const char *);
73 Cipher *cipher_by_number(int)
    [all...]
  /external/openssl/crypto/asn1/
x_info.c 76 ret->enc_cipher.cipher=NULL;
  /external/openssl/crypto/evp/
p5_crpt2.c 179 const EVP_CIPHER *cipher; local
207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
209 if(!cipher) {
215 /* Fixup cipher based on AlgorithmIdentifier */
216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
  /external/wpa_supplicant_8/src/drivers/
driver_wext.h 84 int wpa_driver_wext_cipher2wext(int cipher);

Completed in 796 milliseconds

1 2 3 4 5 67 8 91011>>