HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 201 - 225 of 297) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/openssl/crypto/pem/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon12666
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/openssl/include/openssl/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon12709
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
pkcs12.h 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 361 const EVP_CIPHER *cipher; local
370 cipher = EVP_rc4();
377 cipher = EVP_aes_128_cbc();
380 cipher = EVP_aes_192_cbc();
383 cipher = EVP_aes_256_cbc();
393 cipher = EVP_des_ede3_cbc();
396 cipher = EVP_des_cbc();
401 cipher = EVP_rc2_ecb();
411 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
421 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, NULL, NULL) |
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 98 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
173 switch (peer->cipher) {
179 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
183 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
629 peer->cipher = 0;
956 * RSN IE is filled only with CCMP CIPHER
959 * Regardless of the cipher used on the AP connection, select CCMP
1434 int cipher; local
1794 int cipher; local
    [all...]
  /external/openssl/ssl/
t1_enc.c 648 if (s->session->cipher != NULL)
650 if (s->session->cipher->algorithm_enc == SSL_eNULL)
654 if (s->session->cipher->algorithm_enc == SSL_RC4)
750 bs=EVP_CIPHER_block_size(ds->cipher);
752 if (EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
813 ds->buf_len, ds->cipher->key_len,
815 ds->cipher->iv_len);
817 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
832 if ((EVP_CIPHER_flags(ds->cipher)&EVP_CIPH_FLAG_CUSTOM_CIPHER)
    [all...]
s2_enc.c 138 /* check for NULL cipher */
142 bs=ds->cipher->block_size;
ssl_sess.c 586 if (ret->cipher == NULL)
595 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2]));
597 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1]));
598 if (ret->cipher == NULL)
915 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg)
    [all...]
s23_clnt.c 259 SSL_CIPHER *cipher; local
265 cipher = sk_SSL_CIPHER_value(ciphers, i);
266 if (cipher->algorithm_ssl == SSL_SSLV2)
s2_clnt.c 479 * (highest priority) cipher the server sends, otherwise
510 s->session->cipher=sk_SSL_CIPHER_value(prio,i);
549 /* CIPHER **cipher;*/
581 s2n(n,p); /* cipher spec num bytes */
637 i=ssl_put_cipher_by_char(s,sess->cipher,p);
671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
673 else if (SSL_C_IS_EXPORT(sess->cipher))
s3_enc.c 438 if (s->session->cipher != NULL)
440 if (s->session->cipher->algorithm_enc == SSL_eNULL)
444 if (s->session->cipher->algorithm_enc == SSL_RC4)
514 bs=EVP_CIPHER_block_size(ds->cipher);
  /external/openssl/crypto/pkcs7/
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
pk7_lib.c 591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher)
610 /* Check cipher OID exists and has data in it*/
611 i = EVP_CIPHER_type(cipher);
617 ec->cipher = cipher;
pk7_smime.c 145 /* Check to see if a cipher exists and if so add S/MIME capabilities */
492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
506 if (!PKCS7_set_cipher(p7, cipher)) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_prng.h 4 int cipher, hash; member in struct:yarrow_prng
  /libcore/support/src/test/java/libcore/java/security/
StandardNames.java 42 * client and server auth types, cipher suites.
78 * RFC 5746's Signaling Cipher Suite Value to indicate a request for secure renegotiation
84 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...)
149 provide("Cipher", "AES");
152 provide("Cipher", "AESWrap");
153 provide("Cipher", "ARCFOUR");
154 provide("Cipher", "Blowfish");
155 provide("Cipher", "DES");
156 provide("Cipher", "DESede");
157 provide("Cipher", "DESedeWrap")
    [all...]
  /external/chromium/net/base/
ssl_cipher_suite_names.cc 13 // redundancy and break each cipher suite into a key exchange method, cipher
20 // <4 bits> cipher
331 const int cipher = (cs->encoded >> 3) & 0xf; local
335 *cipher_str = kCipherNames[cipher].name;
  /external/openssl/crypto/pkcs12/
pkcs12.h 181 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
223 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type,
  /external/openssh/
packet.c 72 #include "cipher.h"
218 Cipher *none = cipher_by_name("none");
221 fatal("packet_set_connection: cannot load cipher 'none'");
278 if (enc == NULL || !cipher_is_cbc(enc->cipher))
390 return (cipher_get_number(active_state->receive_context.cipher));
550 Cipher *cipher = cipher_by_number(number); local
552 if (cipher == NULL)
553 fatal("packet_set_encryption_key: unknown cipher number %d", number);
560 cipher_init(&active_state->send_context, cipher, key, keylen, NULL
    [all...]
ssh.c 85 #include "cipher.h"
494 options.cipher = SSH_CIPHER_INVALID;
497 options.cipher = cipher_number(optarg);
498 if (options.cipher == -1) {
500 "Unknown cipher type '%s'\n",
504 if (options.cipher == SSH_CIPHER_3DES)
506 else if (options.cipher == SSH_CIPHER_BLOWFISH)
    [all...]
kex.c 43 #include "cipher.h"
290 fatal("no matching cipher found: client %s server %s",
292 if ((enc->cipher = cipher_by_name(name)) == NULL)
293 fatal("matching cipher is not supported: %s", name);
298 enc->key_len = cipher_keylen(enc->cipher);
299 enc->block_size = cipher_blocksize(enc->cipher);
monitor_wrap.c 51 #include "cipher.h"
492 buffer_get(&b, &enc->cipher, sizeof(enc->cipher));
501 if (enc->name == NULL || cipher_by_name(enc->name) != enc->cipher)
502 fatal("%s: bad cipher name %s or pointer %p", __func__,
503 enc->name, enc->cipher);
551 /* The cipher struct is constant and shared, you export pointer */
552 buffer_append(&b, &enc->cipher, sizeof(enc->cipher));
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
JDKPKCS12KeyStore.java 32 import javax.crypto.Cipher;
578 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local
580 cipher.init(Cipher.UNWRAP_MODE, k, defParams);
583 out = (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY);
611 Cipher cipher = Cipher.getInstance(algorithm, bcProvider) local
647 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local
    [all...]
  /external/libppp/src/
chap_ms.c 110 DesEncrypt(u_char *clear, u_char *key, u_char *cipher)
117 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1);

Completed in 975 milliseconds

1 2 3 4 5 6 7 891011>>