| /external/wpa_supplicant_8/src/eap_server/ |
| eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon37391
|
| /external/wpa_supplicant_8/src/rsn_supp/ |
| peerkey.c | 181 int cipher; local 220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 222 if (cipher < 0) { 223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 230 wpa_cipher_txt(cipher)); 242 peerkey->cipher = cipher; 264 /* Include only the selected cipher in pairwise cipher suite */ 267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher)); 464 int cipher; local [all...] |
| /external/wpa_supplicant_8/src/tls/ |
| tlsv1_client.c | 118 * Cipher option 2a. 547 * tlsv1_client_get_cipher - Get current cipher name 549 * @buf: Buffer for the cipher name 553 * Get the name of the currently used cipher. 558 char *cipher; local 562 cipher = "RC4-MD5"; 565 cipher = "RC4-SHA"; 568 cipher = "DES-CBC-SHA"; 571 cipher = "DES-CBC3-SHA"; 574 cipher = "ADH-AES-128-SHA256" [all...] |
| tlsv1_server.c | 493 * tlsv1_server_get_cipher - Get current cipher name 495 * @buf: Buffer for the cipher name 499 * Get the name of the currently used cipher. 504 char *cipher; local 508 cipher = "RC4-MD5"; 511 cipher = "RC4-SHA"; 514 cipher = "DES-CBC-SHA"; 517 cipher = "DES-CBC3-SHA"; 520 cipher = "ADH-AES-128-SHA"; 523 cipher = "AES-256-SHA" [all...] |
| /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
| org.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar | |
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
| BcKeyStoreSpi.java | 31 import javax.crypto.Cipher; 151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local 152 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher); 229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 231 CipherInputStream cIn = new CipherInputStream(dIn, cipher); 248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount) 468 Cipher cipher = Cipher.getInstance(algorithm, BouncyCastleProvider.PROVIDER_NAME); local 990 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 1017 Cipher cipher; local [all...] |
| /external/chromium_org/chromeos/network/onc/ |
| onc_utils.cc | 65 std::string cipher; local 73 !root.GetString(encrypted::kCipher, &cipher) || 88 cipher != encrypted::kAES256 ||
|
| /external/chromium_org/content/child/webcrypto/ |
| platform_crypto_openssl.cc | 108 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(key->key().size()); local 109 DCHECK(cipher); 112 cipher,
|
| /external/chromium_org/net/socket/ |
| ssl_client_socket_openssl.cc | 56 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } 569 const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_); local 570 CHECK(cipher); 571 ssl_info->security_bits = SSL_CIPHER_get_bits(cipher, NULL); 575 SSL_CIPHER_get_id(cipher), 591 DVLOG(3) << "Encoded connection status: cipher suite = " 711 // directly remove a cipher by ID. 716 // and HMAC-SHA384 cipher suites, not GCM cipher suites with SHA256 or SHA38 723 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local [all...] |
| /external/wpa_supplicant_8/src/ap/ |
| ap_config.c | 888 int cipher = WPA_CIPHER_NONE; local 892 cipher = bss->default_wep_key_len >= 13 ? 894 bss->wpa_group = cipher; 895 bss->wpa_pairwise = cipher; 896 bss->rsn_pairwise = cipher; 898 int cipher = WPA_CIPHER_WEP40; local 900 cipher = WPA_CIPHER_WEP104; 902 bss->wpa_group = cipher; 903 bss->wpa_pairwise = cipher; 904 bss->rsn_pairwise = cipher; [all...] |
| /external/wpa_supplicant_8/wpa_supplicant/ |
| ap.c | 269 int cipher = WPA_CIPHER_NONE; local 273 cipher = bss->default_wep_key_len >= 13 ? 275 bss->wpa_group = cipher; 276 bss->wpa_pairwise = cipher; 277 bss->rsn_pairwise = cipher; 279 int cipher = WPA_CIPHER_WEP40; local 281 cipher = WPA_CIPHER_WEP104; 283 bss->wpa_group = cipher; 284 bss->wpa_pairwise = cipher; 285 bss->rsn_pairwise = cipher; [all...] |
| wpas_glue.c | 200 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 203 wpa_s->pairwise_cipher = cipher; 205 wpa_s->group_cipher = cipher;
|
| /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
| ssl.py | 183 def cipher(self): member in class:SSLSocket 188 return self._sslobj.cipher()
|
| /prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
| ssl.py | 183 def cipher(self): member in class:SSLSocket 188 return self._sslobj.cipher()
|
| /external/chromium_org/third_party/libsrtp/srtp/srtp/ |
| srtp.c | 118 /* allocate cipher */ 149 * the cipher 201 /* deallocate cipher, if it is not the same as that in template */ 230 * deallocate rtcp cipher, if it is not the same as that in 270 * initializes it using the cipher and auth of the stream_template 291 /* set cipher and auth pointers to those of the template */ 333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher 360 cipher_t *cipher; /* cipher used for key derivation */ member in struct:__anon16491 367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, length) [all...] |
| /external/chromium_org/third_party/openssl/openssl/apps/ |
| cms.c | 114 const EVP_CIPHER *cipher = NULL; local 204 cipher = EVP_des_ede3_cbc(); 206 cipher = EVP_des_cbc(); 210 cipher = EVP_seed_cbc(); 214 cipher = EVP_rc2_40_cbc(); 216 cipher = EVP_rc2_cbc(); 218 cipher = EVP_rc2_64_cbc(); 222 cipher = EVP_aes_128_cbc(); 224 cipher = EVP_aes_192_cbc(); 226 cipher = EVP_aes_256_cbc() [all...] |
| /external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
| eng_cryptodev.c | 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 257 sess.cipher = ciphers[i].id; 298 sess.cipher = 0; 377 if ((inl % ctx->cipher->block_size) != 0) 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher->iv_len) 423 int cipher = -1, i; local [all...] |
| /external/chromium_org/third_party/openssl/openssl/crypto/threads/ |
| mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
| /external/openssl/apps/ |
| cms.c | 114 const EVP_CIPHER *cipher = NULL; local 204 cipher = EVP_des_ede3_cbc(); 206 cipher = EVP_des_cbc(); 210 cipher = EVP_seed_cbc(); 214 cipher = EVP_rc2_40_cbc(); 216 cipher = EVP_rc2_cbc(); 218 cipher = EVP_rc2_64_cbc(); 222 cipher = EVP_aes_128_cbc(); 224 cipher = EVP_aes_192_cbc(); 226 cipher = EVP_aes_256_cbc() [all...] |
| /external/openssl/crypto/engine/ |
| eng_cryptodev.c | 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 257 sess.cipher = ciphers[i].id; 298 sess.cipher = 0; 377 if ((inl % ctx->cipher->block_size) != 0) 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher->iv_len) 423 int cipher = -1, i; local [all...] |
| /external/openssl/crypto/threads/ |
| mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
| /external/wpa_supplicant_8/src/drivers/ |
| driver_madwifi.c | 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 259 printf("Unable to set group key cipher to %u\n", v); 423 u_int8_t cipher; local 433 cipher = IEEE80211_CIPHER_WEP; 435 cipher = IEEE80211_CIPHER_TKIP; 437 cipher = IEEE80211_CIPHER_AES_CCM; 451 wk.ik_type = cipher; [all...] |
| /build/tools/signapk/ |
| SignApk.java | 77 import javax.crypto.Cipher; 209 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local 210 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); 213 return epkInfo.getKeySpec(cipher); [all...] |
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
| PKCS12KeyStoreSpi.java | 38 import javax.crypto.Cipher; 605 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local 607 cipher.init(Cipher.UNWRAP_MODE, k, defParams); 610 return (PrivateKey)cipher.unwrap(data, "", Cipher.PRIVATE_KEY); 615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId) local 647 Cipher cipher = Cipher.getInstance(algorithm, bcProvider); local 686 Cipher cipher = Cipher.getInstance(algorithm.getId(), bcProvider); local 700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algId); local 734 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId()); local [all...] |
| /libcore/luni/src/test/java/libcore/javax/crypto/ |
| CipherTest.java | 49 import javax.crypto.Cipher; 134 return Cipher.WRAP_MODE; 136 return Cipher.ENCRYPT_MODE; 141 return Cipher.UNWRAP_MODE; 143 return Cipher.DECRYPT_MODE; 365 setExpectedBlockSize("RSA", Cipher.ENCRYPT_MODE, 256); 366 setExpectedBlockSize("RSA/ECB/NoPadding", Cipher.ENCRYPT_MODE, 256); 367 setExpectedBlockSize("RSA/ECB/PKCS1Padding", Cipher.ENCRYPT_MODE, 245); 370 setExpectedBlockSize("RSA", Cipher.ENCRYPT_MODE, "BC", 255); 371 setExpectedBlockSize("RSA/ECB/NoPadding", Cipher.ENCRYPT_MODE, "BC", 255) 1396 Cipher cipher = Cipher.getInstance("RSA"); local [all...] |