/external/openssl/apps/ |
s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 267 static char *cipher=NULL; variable 429 cipher=NULL; 501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); [all...] |
req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 747 cipher=NULL; 748 if (nodes) cipher=NULL; 752 if (!PEM_write_bio_PrivateKey(out,pkey,cipher, [all...] |
s_client.c | 341 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 342 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 579 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 898 else if (strcmp(*argv,"-cipher") == 0) 901 cipher= *(++argv); 1000 if (cipher) 1002 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1005 cipher = "PSK"; [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 666 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.", 671 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.", 2947 int cipher = WPA_CIPHER_NONE; local 2957 int cipher = WPA_CIPHER_WEP40; local [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 235 mode = ctx->cipher->flags & EVP_CIPH_MODE; 276 size_t bl = ctx->cipher->block_size; 502 mode = ctx->cipher->flags & EVP_CIPH_MODE; 592 size_t bl = ctx->cipher->block_size; 708 gctx->ivlen = c->cipher->iv_len; [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_madwifi.c | 254 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 258 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 260 printf("Unable to set group key cipher to %u\n", v); 427 u_int8_t cipher; local 437 cipher = IEEE80211_CIPHER_WEP; 439 cipher = IEEE80211_CIPHER_TKIP; 441 cipher = IEEE80211_CIPHER_AES_CCM; 455 wk.ik_type = cipher; [all...] |
driver_nl80211.c | 7234 int cipher; local 7261 int cipher; local 7457 int cipher; local 7482 int cipher; local [all...] |
driver_atheros.c | 276 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 280 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 282 printf("Unable to set group key cipher to %u\n", v); 458 u_int8_t cipher; local 469 cipher = IEEE80211_CIPHER_WEP; 472 cipher = IEEE80211_CIPHER_TKIP; 475 cipher = IEEE80211_CIPHER_AES_CCM; 479 cipher = IEEE80211_CIPHER_AES_CMAC; 495 wk.ik_type = cipher; [all...] |
/external/openssh/ |
ssh-keygen.c | 388 char *type, *cipher; local 405 cipher = buffer_get_string(&b, NULL); 410 if (strcmp(cipher, "none") != 0) { 411 error("unsupported cipher %s", cipher); 412 xfree(cipher); 417 xfree(cipher); [all...] |
readconf.c | 37 #include "cipher.h" 74 Cipher 3des 89 Cipher none 186 { "cipher", oCipher }, 683 intptr = &options->cipher; 689 fatal("%.200s line %d: Bad cipher '%s'.", 700 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", [all...] |
/external/openssl/ssl/ |
kssl.c | [all...] |
ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 381 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 557 cipher = 0; 713 else if (strcmp(*argv,"-cipher") == 0) 716 cipher= *(++argv); 792 /* ensure that the cipher list are correctly sorted and exit * [all...] |
s2_srvr.c | 401 s->session->cipher= cp; 453 is_export=SSL_C_IS_EXPORT(s->session->cipher); 462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 493 /* incorrect number of key bytes for non export cipher */ 589 /* get session-id before cipher stuff so we can get out session 678 /* done cipher selection */ 783 s2n(n,p); /* add cipher length */
|
s3_pkt.c | 673 clear=s->enc_write_ctx?0:1; /* must be AEAD cipher */ 717 /* extra fragment would be couple of cipher blocks, 930 * Change cipher spec protocol 1129 (s->session != NULL) && (s->session->cipher != NULL)) [all...] |
s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 469 * message only if the cipher suite is either 760 s->session->cipher=s->s3->tmp.new_cipher; 1105 /* we need a cipher if we are not resuming a session */ 1124 /* If it is a hit, check that the cipher is in the list */ 1128 id=s->session->cipher->id; 1152 /* Special case as client bug workaround: the previously used cipher may 1154 * continue using a cipher that before wasn't chosen due to server 1155 * preferences. We'll have to reject the connection if the cipher is not 1160 s->session->cipher = c [all...] |
ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 207 * the old cipher. It is sort of a SSL_clear_lite :-) */ [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
KexManager.java | 15 import ch.ethz.ssh2.crypto.cipher.BlockCipher; 16 import ch.ethz.ssh2.crypto.cipher.BlockCipherFactory;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_hash.h | 195 int chc_register(int cipher);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 439 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 546 char cipher[64]; local 550 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 552 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 557 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL; [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 55 data = tls_get_cipher_data(suite->cipher); 68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher 70 * Returns: 0 on success (cipher changed), -1 on failure 72 * This function changes TLS record layer to use the new cipher suite 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 92 "cipher"); [all...] |
/build/tools/signapk/ |
SignApk.java | 75 import javax.crypto.Cipher; 151 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local 152 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); 155 return epkInfo.getKeySpec(cipher);
|
/external/openssl/crypto/threads/ |
mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 199 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 202 wpa_s->pairwise_cipher = cipher; 204 wpa_s->group_cipher = cipher;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 1556 char cipher[80]; local [all...] |
/external/ppp/pppd/ |
eap.c | 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local 780 if (!DesEncrypt(clear, cipher)) { 786 outp += b64enc(&b64, cipher, 8, outp); 788 (void) DesEncrypt(cp, cipher); 789 outp += b64enc(&b64, cipher, 8, outp); 800 (void) DesEncrypt(clear, cipher); 801 outp += b64enc(&b64, cipher, 8, outp); [all...] |