HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 226 - 250 of 297) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/openssl/apps/
s_server.c 113 * ECC cipher suite support in OpenSSL originally developed by
267 static char *cipher=NULL; variable
429 cipher=NULL;
501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
    [all...]
req.c 181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
747 cipher=NULL;
748 if (nodes) cipher=NULL;
752 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
    [all...]
s_client.c 341 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
342 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
579 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
898 else if (strcmp(*argv,"-cipher") == 0)
901 cipher= *(++argv);
1000 if (cipher)
1002 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1005 cipher = "PSK";
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 666 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.",
671 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.",
2947 int cipher = WPA_CIPHER_NONE; local
2957 int cipher = WPA_CIPHER_WEP40; local
    [all...]
  /external/openssl/crypto/evp/
e_aes.c 235 mode = ctx->cipher->flags & EVP_CIPH_MODE;
276 size_t bl = ctx->cipher->block_size;
502 mode = ctx->cipher->flags & EVP_CIPH_MODE;
592 size_t bl = ctx->cipher->block_size;
708 gctx->ivlen = c->cipher->iv_len;
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_madwifi.c 254 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
258 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
260 printf("Unable to set group key cipher to %u\n", v);
427 u_int8_t cipher; local
437 cipher = IEEE80211_CIPHER_WEP;
439 cipher = IEEE80211_CIPHER_TKIP;
441 cipher = IEEE80211_CIPHER_AES_CCM;
455 wk.ik_type = cipher;
    [all...]
driver_nl80211.c 7234 int cipher; local
7261 int cipher; local
7457 int cipher; local
7482 int cipher; local
    [all...]
driver_atheros.c 276 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
280 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
282 printf("Unable to set group key cipher to %u\n", v);
458 u_int8_t cipher; local
469 cipher = IEEE80211_CIPHER_WEP;
472 cipher = IEEE80211_CIPHER_TKIP;
475 cipher = IEEE80211_CIPHER_AES_CCM;
479 cipher = IEEE80211_CIPHER_AES_CMAC;
495 wk.ik_type = cipher;
    [all...]
  /external/openssh/
ssh-keygen.c 388 char *type, *cipher; local
405 cipher = buffer_get_string(&b, NULL);
410 if (strcmp(cipher, "none") != 0) {
411 error("unsupported cipher %s", cipher);
412 xfree(cipher);
417 xfree(cipher);
    [all...]
readconf.c 37 #include "cipher.h"
74 Cipher 3des
89 Cipher none
186 { "cipher", oCipher },
683 intptr = &options->cipher;
689 fatal("%.200s line %d: Bad cipher '%s'.",
700 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.",
    [all...]
  /external/openssl/ssl/
kssl.c     [all...]
ssltest.c 113 * ECC cipher suite support in OpenSSL originally developed by
298 static char *cipher=NULL; variable
360 fprintf(stderr," -cipher arg - The cipher list\n");
371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
381 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
557 cipher = 0;
713 else if (strcmp(*argv,"-cipher") == 0)
716 cipher= *(++argv);
792 /* ensure that the cipher list are correctly sorted and exit *
    [all...]
s2_srvr.c 401 s->session->cipher= cp;
453 is_export=SSL_C_IS_EXPORT(s->session->cipher);
462 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
493 /* incorrect number of key bytes for non export cipher */
589 /* get session-id before cipher stuff so we can get out session
678 /* done cipher selection */
783 s2n(n,p); /* add cipher length */
s3_pkt.c 673 clear=s->enc_write_ctx?0:1; /* must be AEAD cipher */
717 /* extra fragment would be couple of cipher blocks,
930 * Change cipher spec protocol
1129 (s->session != NULL) && (s->session->cipher != NULL))
    [all...]
s3_srvr.c 120 * ECC cipher suite support in OpenSSL originally written by
469 * message only if the cipher suite is either
760 s->session->cipher=s->s3->tmp.new_cipher;
1105 /* we need a cipher if we are not resuming a session */
1124 /* If it is a hit, check that the cipher is in the list */
1128 id=s->session->cipher->id;
1152 /* Special case as client bug workaround: the previously used cipher may
1154 * continue using a cipher that before wasn't chosen due to server
1155 * preferences. We'll have to reject the connection if the cipher is not
1160 s->session->cipher = c
    [all...]
ssl_lib.c 115 * ECC cipher suite support in OpenSSL originally developed by
207 * the old cipher. It is sort of a SSL_clear_lite :-) */
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
KexManager.java 15 import ch.ethz.ssh2.crypto.cipher.BlockCipher;
16 import ch.ethz.ssh2.crypto.cipher.BlockCipherFactory;
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_hash.h 195 int chc_register(int cipher);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 439 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
546 char cipher[64]; local
550 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
552 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
557 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
55 data = tls_get_cipher_data(suite->cipher);
68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
70 * Returns: 0 on success (cipher changed), -1 on failure
72 * This function changes TLS record layer to use the new cipher suite
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
92 "cipher");
    [all...]
  /build/tools/signapk/
SignApk.java 75 import javax.crypto.Cipher;
151 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local
152 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters());
155 return epkInfo.getKeySpec(cipher);
  /external/openssl/crypto/threads/
mttest.c 137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 199 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
202 wpa_s->pairwise_cipher = cipher;
204 wpa_s->group_cipher = cipher;
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 1556 char cipher[80]; local
    [all...]
  /external/ppp/pppd/
eap.c 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local
780 if (!DesEncrypt(clear, cipher)) {
786 outp += b64enc(&b64, cipher, 8, outp);
788 (void) DesEncrypt(cp, cipher);
789 outp += b64enc(&b64, cipher, 8, outp);
800 (void) DesEncrypt(clear, cipher);
801 outp += b64enc(&b64, cipher, 8, outp);
    [all...]

Completed in 2057 milliseconds

1 2 3 4 5 6 7 8 91011>>