/external/openssl/crypto/pem/ |
pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon12666 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
/external/openssl/include/openssl/ |
pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon12709 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 361 const EVP_CIPHER *cipher; local 370 cipher = EVP_rc4(); 377 cipher = EVP_aes_128_cbc(); 380 cipher = EVP_aes_192_cbc(); 383 cipher = EVP_aes_256_cbc(); 393 cipher = EVP_des_ede3_cbc(); 396 cipher = EVP_des_cbc(); 401 cipher = EVP_rc2_ecb(); 411 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 421 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, NULL, NULL) | [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 98 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 173 switch (peer->cipher) { 179 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 183 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 629 peer->cipher = 0; 956 * RSN IE is filled only with CCMP CIPHER 959 * Regardless of the cipher used on the AP connection, select CCMP 1434 int cipher; local 1794 int cipher; local [all...] |
/external/openssl/ssl/ |
t1_enc.c | 648 if (s->session->cipher != NULL) 650 if (s->session->cipher->algorithm_enc == SSL_eNULL) 654 if (s->session->cipher->algorithm_enc == SSL_RC4) 750 bs=EVP_CIPHER_block_size(ds->cipher); 752 if (EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER) 813 ds->buf_len, ds->cipher->key_len, 815 ds->cipher->iv_len); 817 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]); 832 if ((EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_CUSTOM_CIPHER) [all...] |
s2_enc.c | 138 /* check for NULL cipher */ 142 bs=ds->cipher->block_size;
|
ssl_sess.c | 586 if (ret->cipher == NULL) 595 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 597 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 598 if (ret->cipher == NULL) 915 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) [all...] |
s23_clnt.c | 259 SSL_CIPHER *cipher; local 265 cipher = sk_SSL_CIPHER_value(ciphers, i); 266 if (cipher->algorithm_ssl == SSL_SSLV2)
|
s2_clnt.c | 479 * (highest priority) cipher the server sends, otherwise 510 s->session->cipher=sk_SSL_CIPHER_value(prio,i); 549 /* CIPHER **cipher;*/ 581 s2n(n,p); /* cipher spec num bytes */ 637 i=ssl_put_cipher_by_char(s,sess->cipher,p); 671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 673 else if (SSL_C_IS_EXPORT(sess->cipher))
|
s3_enc.c | 438 if (s->session->cipher != NULL) 440 if (s->session->cipher->algorithm_enc == SSL_eNULL) 444 if (s->session->cipher->algorithm_enc == SSL_RC4) 514 bs=EVP_CIPHER_block_size(ds->cipher);
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
pk7_lib.c | 591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) 610 /* Check cipher OID exists and has data in it*/ 611 i = EVP_CIPHER_type(cipher); 617 ec->cipher = cipher;
|
pk7_smime.c | 145 /* Check to see if a cipher exists and if so add S/MIME capabilities */ 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 506 if (!PKCS7_set_cipher(p7, cipher)) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 4 int cipher, hash; member in struct:yarrow_prng
|
/libcore/support/src/test/java/libcore/java/security/ |
StandardNames.java | 42 * client and server auth types, cipher suites. 78 * RFC 5746's Signaling Cipher Suite Value to indicate a request for secure renegotiation 84 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...) 149 provide("Cipher", "AES"); 152 provide("Cipher", "AESWrap"); 153 provide("Cipher", "ARCFOUR"); 154 provide("Cipher", "Blowfish"); 155 provide("Cipher", "DES"); 156 provide("Cipher", "DESede"); 157 provide("Cipher", "DESedeWrap") [all...] |
/external/chromium/net/base/ |
ssl_cipher_suite_names.cc | 13 // redundancy and break each cipher suite into a key exchange method, cipher 20 // <4 bits> cipher 331 const int cipher = (cs->encoded >> 3) & 0xf; local 335 *cipher_str = kCipherNames[cipher].name;
|
/external/openssl/crypto/pkcs12/ |
pkcs12.h | 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
|
/external/openssh/ |
packet.c | 72 #include "cipher.h" 218 Cipher *none = cipher_by_name("none"); 221 fatal("packet_set_connection: cannot load cipher 'none'"); 278 if (enc == NULL || !cipher_is_cbc(enc->cipher)) 390 return (cipher_get_number(active_state->receive_context.cipher)); 550 Cipher *cipher = cipher_by_number(number); local 552 if (cipher == NULL) 553 fatal("packet_set_encryption_key: unknown cipher number %d", number); 560 cipher_init(&active_state->send_context, cipher, key, keylen, NULL [all...] |
ssh.c | 85 #include "cipher.h" 494 options.cipher = SSH_CIPHER_INVALID; 497 options.cipher = cipher_number(optarg); 498 if (options.cipher == -1) { 500 "Unknown cipher type '%s'\n", 504 if (options.cipher == SSH_CIPHER_3DES) 506 else if (options.cipher == SSH_CIPHER_BLOWFISH) [all...] |
kex.c | 43 #include "cipher.h" 290 fatal("no matching cipher found: client %s server %s", 292 if ((enc->cipher = cipher_by_name(name)) == NULL) 293 fatal("matching cipher is not supported: %s", name); 298 enc->key_len = cipher_keylen(enc->cipher); 299 enc->block_size = cipher_blocksize(enc->cipher);
|
monitor_wrap.c | 51 #include "cipher.h" 492 buffer_get(&b, &enc->cipher, sizeof(enc->cipher)); 501 if (enc->name == NULL || cipher_by_name(enc->name) != enc->cipher) 502 fatal("%s: bad cipher name %s or pointer %p", __func__, 503 enc->name, enc->cipher); 551 /* The cipher struct is constant and shared, you export pointer */ 552 buffer_append(&b, &enc->cipher, sizeof(enc->cipher)); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12KeyStore.java | 32 import javax.crypto.Cipher; 578 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local 580 cipher.init(Cipher.UNWRAP_MODE, k, defParams); 583 out = (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY); 611 Cipher cipher = Cipher.getInstance(algorithm, bcProvider) local 647 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local [all...] |
/external/libppp/src/ |
chap_ms.c | 110 DesEncrypt(u_char *clear, u_char *key, u_char *cipher) 117 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1);
|