HomeSort by relevance Sort by last modified time
    Searched defs:cipher (Results 51 - 75 of 136) sorted by null

1 23 4 5 6

  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/
DES.java 1 package ch.ethz.ssh2.crypto.cipher;
48 * initialise a DES cipher.
53 * the parameters required to set up the cipher.
AES.java 1 package ch.ethz.ssh2.crypto.cipher;
    [all...]
BlowFish.java 1 package ch.ethz.ssh2.crypto.cipher;
190 * initialise a Blowfish cipher.
195 * the key required to set up the cipher.
  /external/openssl/apps/
genpkey.c 82 const EVP_CIPHER *cipher = NULL; local
180 cipher = EVP_get_cipherbyname(*args + 1);
181 if (!cipher)
183 BIO_printf(bio_err, "Unknown cipher %s\n",
204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
pkcs8.c 78 const EVP_CIPHER *cipher = NULL; local
111 cipher=EVP_get_cipherbyname(*args);
112 if (!cipher)
115 "Unknown cipher %s\n", *args);
224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
242 if ((pbe_nid == -1) && !cipher)
311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
enc.c 122 const EVP_CIPHER *cipher=NULL,*c; local
152 cipher=EVP_get_cipherbyname(pname);
154 if (!do_zlib && !base64 && (cipher == NULL)
157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
290 cipher=c;
293 cipher=NULL;
318 BIO_printf(bio_err,"Cipher Types\n");
422 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
429 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
    [all...]
smime.c 98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher = EVP_aes_256_cbc()
    [all...]
  /external/openssl/crypto/evp/
evp_test.c 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn,
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
    [all...]
p5_crpt2.c 179 const EVP_CIPHER *cipher; local
207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
209 if(!cipher) {
215 /* Fixup cipher based on AlgorithmIdentifier */
216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 28 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 33 import javax.crypto.Cipher;
62 * @tests javax.crypto.Cipher#getInstance(java.lang.String)
65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local
66 assertNotNull("Received a null Cipher instance", cipher);
70 * @tests javax.crypto.Cipher#getInstance(java.lang.String,
76 Provider[] providers = Security.getProviders("Cipher.DES");
78 assertNotNull("No installed providers support Cipher.DES", providers)
81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local
122 Cipher cipher = Cipher.getInstance("DES", providers[i]); local
138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local
152 Cipher cipher = Cipher.getInstance(algorithm); local
163 Cipher cipher = Cipher.getInstance(algorithm); local
173 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
189 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
200 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
211 Cipher cipher = null; local
237 Cipher cipher = null; local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 42 import javax.crypto.Cipher;
89 * javax.crypto.Cipher#getInstance(java.lang.String)
92 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local
93 assertNotNull("Received a null Cipher instance", cipher);
96 Cipher.getInstance("WrongAlgorithmName");
103 * javax.crypto.Cipher#getInstance(java.lang.String,
109 Provider[] providers = Security.getProviders("Cipher.DES")
114 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local
148 Cipher cipher = Cipher.getInstance("DES", providers[i]); local
176 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local
190 Cipher cipher = Cipher.getInstance(algorithm); local
201 Cipher cipher = Cipher.getInstance(algorithm); local
210 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local
233 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local
250 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local
268 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local
297 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local
369 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local
1119 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local
    [all...]
  /external/chromium/net/socket/
ssl_client_socket_openssl.cc 47 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; }
155 // server after receiving ClientHello if there's no common supported cipher.
496 // directly remove a cipher by ID.
503 // appended to the cipher removal |command|.
505 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local
506 const uint16 id = SSL_CIPHER_get_id(cipher);
511 bool disable = SSL_CIPHER_get_bits(cipher, NULL) < 80;
518 const char* name = SSL_CIPHER_get_name(cipher);
519 DVLOG(3) << "Found cipher to remove: '" << name << "', ID: " << i
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
41 int omac_memory(int cipher,
45 int omac_memory_multi(int cipher,
49 int omac_file(int cipher,
65 symmetric_key key; /* scheduled key for cipher */
67 int cipher_idx, /* cipher idx */
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
76 int pmac_memory(int cipher,
81 int pmac_memory_multi(int cipher,
86 int pmac_file(int cipher,
151 int cipher, \/* cipher idx *\/ member in struct:__anon7174
242 int cipher, \/* which cipher *\/ member in struct:__anon7175
320 int cipher, member in struct:__anon7176
353 int cipher, member in struct:__anon7177
    [all...]
tomcrypt_prng.h 4 int cipher, hash; member in struct:yarrow_prng
  /external/openssh/
authfile.c 62 #include "cipher.h"
92 Cipher *cipher; local
97 * to another cipher; otherwise use SSH_AUTHFILE_CIPHER.
101 if ((cipher = cipher_by_number(cipher_num)) == NULL)
102 fatal("save_private_key_rsa: bad cipher");
137 /* Store cipher type. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
176 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local
178 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL local
424 Cipher *cipher; local
    [all...]
  /external/openssl/crypto/krb5/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/openssl/crypto/pem/
pem_lib.c 276 EVP_CIPHER_INFO cipher; local
295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
362 /* actually it needs the cipher block size extra... */
440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen,
451 if (cipher->cipher == NULL) return(1);
466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0])
    [all...]
  /external/openssl/include/openssl/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/openssl/ssl/
ssl_asn1.c 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
143 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
161 a.cipher.type=V_ASN1_OCTET_STRING;
162 a.cipher.data=buf;
164 if (in->cipher == NULL)
167 l=in->cipher->id;
170 a.cipher.length=3;
177 a.cipher.length=2;
287 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
333 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 192 struct crypto_cipher *cipher; local
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
229 if (cipher == NULL) {
230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
236 crypto_cipher_deinit(cipher);
239 crypto_cipher_deinit(cipher);
251 struct crypto_cipher *cipher; local
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
292 if (cipher == NULL)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon18507
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon18539
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 118 * Cipher option 2a.
542 * tlsv1_client_get_cipher - Get current cipher name
544 * @buf: Buffer for the cipher name
548 * Get the name of the currently used cipher.
553 char *cipher; local
557 cipher = "RC4-MD5";
560 cipher = "RC4-SHA";
563 cipher = "DES-CBC-SHA";
566 cipher = "DES-CBC3-SHA";
569 cipher = "ADH-AES-128-SHA256"
    [all...]
tlsv1_server.c 453 * tlsv1_server_get_cipher - Get current cipher name
455 * @buf: Buffer for the cipher name
459 * Get the name of the currently used cipher.
464 char *cipher; local
468 cipher = "RC4-MD5";
471 cipher = "RC4-SHA";
474 cipher = "DES-CBC-SHA";
477 cipher = "DES-CBC3-SHA";
480 cipher = "ADH-AES-128-SHA";
483 cipher = "AES-256-SHA"
    [all...]

Completed in 532 milliseconds

1 23 4 5 6