/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 240 * Management Group Cipher Suite (4 octets) (default: AES-128-CMAC) 362 const char * wpa_cipher_txt(int cipher); 392 int wpa_cipher_key_len(int cipher); 393 int wpa_cipher_rsc_len(int cipher); 394 int wpa_cipher_to_alg(int cipher); 395 enum wpa_cipher wpa_cipher_to_suite_driver(int cipher); 396 int wpa_cipher_valid_pairwise(int cipher); 397 u32 wpa_cipher_to_suite(int proto, int cipher);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
PEMDecoder.java | 12 import ch.ethz.ssh2.crypto.cipher.AES; 13 import ch.ethz.ssh2.crypto.cipher.BlockCipher; 14 import ch.ethz.ssh2.crypto.cipher.CBCMode; 15 import ch.ethz.ssh2.crypto.cipher.DES; 16 import ch.ethz.ssh2.crypto.cipher.DESede; 272 throw new IOException("Cannot decrypt PEM structure, unknown cipher " + algo);
|
/external/openssl/crypto/evp/ |
evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
evp_locl.h | 59 /* Macros to code block cipher wrappers */ 61 /* Wrapper functions for each cipher mode */ 65 bl = ctx->cipher->block_size;\ 257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \ 258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \ 261 0, cipher##_init_key, NULL, \
|
/external/openssl/include/openssl/ |
evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
PKCS1Encoding.java | 40 * @param cipher 43 AsymmetricBlockCipher cipher) 45 this.engine = cipher;
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_add_aad.c | 45 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) {
|
/external/openssh/ |
readconf.h | 75 int cipher; /* Cipher to use. */ member in struct:__anon12454
|
authfile.c | 62 #include "cipher.h" 92 Cipher *cipher; local 97 * to another cipher; otherwise use SSH_AUTHFILE_CIPHER. 101 if ((cipher = cipher_by_number(cipher_num)) == NULL) 102 fatal("save_private_key_rsa: bad cipher"); 137 /* Store cipher type. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 176 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local 178 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL local 424 Cipher *cipher; local [all...] |
kex.h | 89 Cipher *cipher; member in struct:Enc
|
/external/openssl/crypto/krb5/ |
krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/external/openssl/crypto/pem/ |
pem_info.c | 241 EVP_CIPHER_INFO cipher; local 243 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 245 if (!PEM_do_header(&cipher,data,&len,cb,u)) 359 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
/external/wpa_supplicant_8/src/crypto/ |
Makefile | 51 LIB_OBJS += crypto_internal-cipher.o
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 28 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
/external/chromium/third_party/libjingle/source/talk/ |
libjingle.scons | 25 "third_party/srtp/crypto/cipher/aes.c", 26 "third_party/srtp/crypto/cipher/aes_cbc.c", 27 "third_party/srtp/crypto/cipher/aes_icm.c", 28 "third_party/srtp/crypto/cipher/cipher.c", 29 "third_party/srtp/crypto/cipher/null_cipher.c",
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 192 struct crypto_cipher *cipher; local 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 229 if (cipher == NULL) { 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 236 crypto_cipher_deinit(cipher); 239 crypto_cipher_deinit(cipher); 251 struct crypto_cipher *cipher; local 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 292 if (cipher == NULL) [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_openssl.cc | 47 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } 155 // server after receiving ClientHello if there's no common supported cipher. 496 // directly remove a cipher by ID. 503 // appended to the cipher removal |command|. 505 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local 506 const uint16 id = SSL_CIPHER_get_id(cipher); 511 bool disable = SSL_CIPHER_get_bits(cipher, NULL) < 80; 518 const char* name = SSL_CIPHER_get_name(cipher); 519 DVLOG(3) << "Found cipher to remove: '" << name << "', ID: " << i [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library 180 mode routines for every single cipher. That means every time you add or remove a cipher from the library 182 are not directly tied to the ciphers. That is a new cipher can be added to the library by simply providing 184 can make use of the cipher right away. 254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally 412 functions which are (given that XXX is the name of the cipher) the following: 413 \index{Cipher Setup} 421 The XXX\_setup() routine will setup the cipher to be used with a given number of rounds and a given key length (in bytes). 425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ap.c | 230 int cipher = WPA_CIPHER_NONE; local 234 cipher = bss->default_wep_key_len >= 13 ? 236 bss->wpa_group = cipher; 237 bss->wpa_pairwise = cipher; 238 bss->rsn_pairwise = cipher; 240 int cipher = WPA_CIPHER_WEP40; local 242 cipher = WPA_CIPHER_WEP104; 244 bss->wpa_group = cipher; 245 bss->wpa_pairwise = cipher; 246 bss->rsn_pairwise = cipher; [all...] |
/external/chromium/chrome/browser/ |
page_info_model.cc | 223 const char *key_exchange, *cipher, *mac; local 224 net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, cipher_suite); 229 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
BlockCipherFactory.java | 5 package ch.ethz.ssh2.crypto.cipher; 40 ciphers.add(new CipherEntry("aes128-ctr", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES")); 41 ciphers.add(new CipherEntry("aes192-ctr", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES")); 42 ciphers.add(new CipherEntry("aes256-ctr", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES")); 43 ciphers.add(new CipherEntry("blowfish-ctr", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish")); 45 ciphers.add(new CipherEntry("aes128-cbc", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES")); 46 ciphers.add(new CipherEntry("aes192-cbc", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES")); 47 ciphers.add(new CipherEntry("aes256-cbc", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES")); 48 ciphers.add(new CipherEntry("blowfish-cbc", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish")); 50 ciphers.add(new CipherEntry("3des-ctr", 8, 24, "ch.ethz.ssh2.crypto.cipher.DESede")) [all...] |
CipherInputStream.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
CipherOutputStream.java | 5 package ch.ethz.ssh2.crypto.cipher;
|