/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
DES.java | 1 package ch.ethz.ssh2.crypto.cipher; 48 * initialise a DES cipher. 53 * the parameters required to set up the cipher.
|
AES.java | 1 package ch.ethz.ssh2.crypto.cipher; [all...] |
BlowFish.java | 1 package ch.ethz.ssh2.crypto.cipher; 190 * initialise a Blowfish cipher. 195 * the key required to set up the cipher.
|
/external/openssl/apps/ |
genpkey.c | 82 const EVP_CIPHER *cipher = NULL; local 180 cipher = EVP_get_cipherbyname(*args + 1); 181 if (!cipher) 183 BIO_printf(bio_err, "Unknown cipher %s\n", 204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n"); 269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 111 cipher=EVP_get_cipherbyname(*args); 112 if (!cipher) 115 "Unknown cipher %s\n", *args); 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 242 if ((pbe_nid == -1) && !cipher) 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
enc.c | 122 const EVP_CIPHER *cipher=NULL,*c; local 152 cipher=EVP_get_cipherbyname(pname); 154 if (!do_zlib && !base64 && (cipher == NULL) 157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 290 cipher=c; 293 cipher=NULL; 318 BIO_printf(bio_err,"Cipher Types\n"); 422 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 429 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), [all...] |
smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher = EVP_aes_256_cbc() [all...] |
/external/openssl/crypto/evp/ |
evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
p5_crpt2.c | 179 const EVP_CIPHER *cipher; local 207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 209 if(!cipher) { 215 /* Fixup cipher based on AlgorithmIdentifier */ 216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 28 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 33 import javax.crypto.Cipher; 62 * @tests javax.crypto.Cipher#getInstance(java.lang.String) 65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 66 assertNotNull("Received a null Cipher instance", cipher); 70 * @tests javax.crypto.Cipher#getInstance(java.lang.String, 76 Provider[] providers = Security.getProviders("Cipher.DES"); 78 assertNotNull("No installed providers support Cipher.DES", providers) 81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 122 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 152 Cipher cipher = Cipher.getInstance(algorithm); local 163 Cipher cipher = Cipher.getInstance(algorithm); local 173 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 189 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 200 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 211 Cipher cipher = null; local 237 Cipher cipher = null; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 42 import javax.crypto.Cipher; 89 * javax.crypto.Cipher#getInstance(java.lang.String) 92 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 93 assertNotNull("Received a null Cipher instance", cipher); 96 Cipher.getInstance("WrongAlgorithmName"); 103 * javax.crypto.Cipher#getInstance(java.lang.String, 109 Provider[] providers = Security.getProviders("Cipher.DES") 114 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 148 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 176 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 190 Cipher cipher = Cipher.getInstance(algorithm); local 201 Cipher cipher = Cipher.getInstance(algorithm); local 210 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 233 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 250 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 268 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 297 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 369 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local 1119 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_openssl.cc | 47 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } 155 // server after receiving ClientHello if there's no common supported cipher. 496 // directly remove a cipher by ID. 503 // appended to the cipher removal |command|. 505 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local 506 const uint16 id = SSL_CIPHER_get_id(cipher); 511 bool disable = SSL_CIPHER_get_bits(cipher, NULL) < 80; 518 const char* name = SSL_CIPHER_get_name(cipher); 519 DVLOG(3) << "Found cipher to remove: '" << name << "', ID: " << i [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 41 int omac_memory(int cipher, 45 int omac_memory_multi(int cipher, 49 int omac_file(int cipher, 65 symmetric_key key; /* scheduled key for cipher */ 67 int cipher_idx, /* cipher idx */ 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 76 int pmac_memory(int cipher, 81 int pmac_memory_multi(int cipher, 86 int pmac_file(int cipher, 151 int cipher, \/* cipher idx *\/ member in struct:__anon7174 242 int cipher, \/* which cipher *\/ member in struct:__anon7175 320 int cipher, member in struct:__anon7176 353 int cipher, member in struct:__anon7177 [all...] |
tomcrypt_prng.h | 4 int cipher, hash; member in struct:yarrow_prng
|
/external/openssh/ |
authfile.c | 62 #include "cipher.h" 92 Cipher *cipher; local 97 * to another cipher; otherwise use SSH_AUTHFILE_CIPHER. 101 if ((cipher = cipher_by_number(cipher_num)) == NULL) 102 fatal("save_private_key_rsa: bad cipher"); 137 /* Store cipher type. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 176 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local 178 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL local 424 Cipher *cipher; local [all...] |
/external/openssl/crypto/krb5/ |
krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/external/openssl/crypto/pem/ |
pem_lib.c | 276 EVP_CIPHER_INFO cipher; local 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 362 /* actually it needs the cipher block size extra... */ 440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, 451 if (cipher->cipher == NULL) return(1); 466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0]) [all...] |
/external/openssl/include/openssl/ |
krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/external/openssl/ssl/ |
ssl_asn1.c | 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 143 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 161 a.cipher.type=V_ASN1_OCTET_STRING; 162 a.cipher.data=buf; 164 if (in->cipher == NULL) 167 l=in->cipher->id; 170 a.cipher.length=3; 177 a.cipher.length=2; 287 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 333 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 192 struct crypto_cipher *cipher; local 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 229 if (cipher == NULL) { 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 236 crypto_cipher_deinit(cipher); 239 crypto_cipher_deinit(cipher); 251 struct crypto_cipher *cipher; local 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 292 if (cipher == NULL) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon18507
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon18539
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 118 * Cipher option 2a. 542 * tlsv1_client_get_cipher - Get current cipher name 544 * @buf: Buffer for the cipher name 548 * Get the name of the currently used cipher. 553 char *cipher; local 557 cipher = "RC4-MD5"; 560 cipher = "RC4-SHA"; 563 cipher = "DES-CBC-SHA"; 566 cipher = "DES-CBC3-SHA"; 569 cipher = "ADH-AES-128-SHA256" [all...] |
tlsv1_server.c | 453 * tlsv1_server_get_cipher - Get current cipher name 455 * @buf: Buffer for the cipher name 459 * Get the name of the currently used cipher. 464 char *cipher; local 468 cipher = "RC4-MD5"; 471 cipher = "RC4-SHA"; 474 cipher = "DES-CBC-SHA"; 477 cipher = "DES-CBC3-SHA"; 480 cipher = "ADH-AES-128-SHA"; 483 cipher = "AES-256-SHA" [all...] |