HomeSort by relevance Sort by last modified time
    Searched defs:cipher (Results 76 - 100 of 176) sorted by null

1 2 34 5 6 7 8

  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon37391
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 118 * Cipher option 2a.
547 * tlsv1_client_get_cipher - Get current cipher name
549 * @buf: Buffer for the cipher name
553 * Get the name of the currently used cipher.
558 char *cipher; local
562 cipher = "RC4-MD5";
565 cipher = "RC4-SHA";
568 cipher = "DES-CBC-SHA";
571 cipher = "DES-CBC3-SHA";
574 cipher = "ADH-AES-128-SHA256"
    [all...]
tlsv1_server.c 493 * tlsv1_server_get_cipher - Get current cipher name
495 * @buf: Buffer for the cipher name
499 * Get the name of the currently used cipher.
504 char *cipher; local
508 cipher = "RC4-MD5";
511 cipher = "RC4-SHA";
514 cipher = "DES-CBC-SHA";
517 cipher = "DES-CBC3-SHA";
520 cipher = "ADH-AES-128-SHA";
523 cipher = "AES-256-SHA"
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar 
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 31 import javax.crypto.Cipher;
151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local
152 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher);
229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
231 CipherInputStream cIn = new CipherInputStream(dIn, cipher);
248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount)
468 Cipher cipher = Cipher.getInstance(algorithm, BouncyCastleProvider.PROVIDER_NAME); local
990 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
1017 Cipher cipher; local
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_utils.cc 65 std::string cipher; local
73 !root.GetString(encrypted::kCipher, &cipher) ||
88 cipher != encrypted::kAES256 ||
  /external/chromium_org/content/child/webcrypto/
platform_crypto_openssl.cc 108 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(key->key().size()); local
109 DCHECK(cipher);
112 cipher,
  /external/chromium_org/net/socket/
ssl_client_socket_openssl.cc 56 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; }
569 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_); local
570 CHECK(cipher);
571 ssl_info->security_bits = SSL_CIPHER_get_bits(cipher, NULL);
575 SSL_CIPHER_get_id(cipher),
591 DVLOG(3) << "Encoded connection status: cipher suite = "
711 // directly remove a cipher by ID.
716 // and HMAC-SHA384 cipher suites, not GCM cipher suites with SHA256 or SHA38
723 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.c 888 int cipher = WPA_CIPHER_NONE; local
892 cipher = bss->default_wep_key_len >= 13 ?
894 bss->wpa_group = cipher;
895 bss->wpa_pairwise = cipher;
896 bss->rsn_pairwise = cipher;
898 int cipher = WPA_CIPHER_WEP40; local
900 cipher = WPA_CIPHER_WEP104;
902 bss->wpa_group = cipher;
903 bss->wpa_pairwise = cipher;
904 bss->rsn_pairwise = cipher;
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ap.c 269 int cipher = WPA_CIPHER_NONE; local
273 cipher = bss->default_wep_key_len >= 13 ?
275 bss->wpa_group = cipher;
276 bss->wpa_pairwise = cipher;
277 bss->rsn_pairwise = cipher;
279 int cipher = WPA_CIPHER_WEP40; local
281 cipher = WPA_CIPHER_WEP104;
283 bss->wpa_group = cipher;
284 bss->wpa_pairwise = cipher;
285 bss->rsn_pairwise = cipher;
    [all...]
wpas_glue.c 200 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
203 wpa_s->pairwise_cipher = cipher;
205 wpa_s->group_cipher = cipher;
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py 183 def cipher(self): member in class:SSLSocket
188 return self._sslobj.cipher()
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 183 def cipher(self): member in class:SSLSocket
188 return self._sslobj.cipher()
  /external/chromium_org/third_party/libsrtp/srtp/srtp/
srtp.c 118 /* allocate cipher */
149 * the cipher
201 /* deallocate cipher, if it is not the same as that in template */
230 * deallocate rtcp cipher, if it is not the same as that in
270 * initializes it using the cipher and auth of the stream_template
291 /* set cipher and auth pointers to those of the template */
333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher
360 cipher_t *cipher; /* cipher used for key derivation */ member in struct:__anon16491
367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, length)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
cms.c 114 const EVP_CIPHER *cipher = NULL; local
204 cipher = EVP_des_ede3_cbc();
206 cipher = EVP_des_cbc();
210 cipher = EVP_seed_cbc();
214 cipher = EVP_rc2_40_cbc();
216 cipher = EVP_rc2_cbc();
218 cipher = EVP_rc2_64_cbc();
222 cipher = EVP_aes_128_cbc();
224 cipher = EVP_aes_192_cbc();
226 cipher = EVP_aes_256_cbc()
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/engine/
eng_cryptodev.c 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
257 sess.cipher = ciphers[i].id;
298 sess.cipher = 0;
377 if ((inl % ctx->cipher->block_size) != 0)
391 if (ctx->cipher->iv_len) {
394 iiv = in + inl - ctx->cipher->iv_len;
395 memcpy(save_iv, iiv, ctx->cipher->iv_len);
407 if (ctx->cipher->iv_len) {
409 iiv = out + inl - ctx->cipher->iv_len;
412 memcpy(ctx->iv, iiv, ctx->cipher->iv_len)
423 int cipher = -1, i; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/threads/
mttest.c 137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
  /external/openssl/apps/
cms.c 114 const EVP_CIPHER *cipher = NULL; local
204 cipher = EVP_des_ede3_cbc();
206 cipher = EVP_des_cbc();
210 cipher = EVP_seed_cbc();
214 cipher = EVP_rc2_40_cbc();
216 cipher = EVP_rc2_cbc();
218 cipher = EVP_rc2_64_cbc();
222 cipher = EVP_aes_128_cbc();
224 cipher = EVP_aes_192_cbc();
226 cipher = EVP_aes_256_cbc()
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
257 sess.cipher = ciphers[i].id;
298 sess.cipher = 0;
377 if ((inl % ctx->cipher->block_size) != 0)
391 if (ctx->cipher->iv_len) {
394 iiv = in + inl - ctx->cipher->iv_len;
395 memcpy(save_iv, iiv, ctx->cipher->iv_len);
407 if (ctx->cipher->iv_len) {
409 iiv = out + inl - ctx->cipher->iv_len;
412 memcpy(ctx->iv, iiv, ctx->cipher->iv_len)
423 int cipher = -1, i; local
    [all...]
  /external/openssl/crypto/threads/
mttest.c 137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
  /external/wpa_supplicant_8/src/drivers/
driver_madwifi.c 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
259 printf("Unable to set group key cipher to %u\n", v);
423 u_int8_t cipher; local
433 cipher = IEEE80211_CIPHER_WEP;
435 cipher = IEEE80211_CIPHER_TKIP;
437 cipher = IEEE80211_CIPHER_AES_CCM;
451 wk.ik_type = cipher;
    [all...]
  /build/tools/signapk/
SignApk.java 77 import javax.crypto.Cipher;
209 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local
210 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters());
213 return epkInfo.getKeySpec(cipher);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
PKCS12KeyStoreSpi.java 38 import javax.crypto.Cipher;
605 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local
607 cipher.init(Cipher.UNWRAP_MODE, k, defParams);
610 return (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY);
615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId) local
647 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local
686 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local
700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algId); local
734 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId()); local
    [all...]
  /libcore/luni/src/test/java/libcore/javax/crypto/
CipherTest.java 49 import javax.crypto.Cipher;
134 return Cipher.WRAP_MODE;
136 return Cipher.ENCRYPT_MODE;
141 return Cipher.UNWRAP_MODE;
143 return Cipher.DECRYPT_MODE;
365 setExpectedBlockSize("RSA", Cipher.ENCRYPT_MODE, 256);
366 setExpectedBlockSize("RSA/ECB/NoPadding", Cipher.ENCRYPT_MODE, 256);
367 setExpectedBlockSize("RSA/ECB/PKCS1Padding", Cipher.ENCRYPT_MODE, 245);
370 setExpectedBlockSize("RSA", Cipher.ENCRYPT_MODE, "BC", 255);
371 setExpectedBlockSize("RSA/ECB/NoPadding", Cipher.ENCRYPT_MODE, "BC", 255)
1396 Cipher cipher = Cipher.getInstance("RSA"); local
    [all...]

Completed in 1900 milliseconds

1 2 34 5 6 7 8