/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 28 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
/external/chromium/third_party/libjingle/source/talk/ |
H A D | libjingle.scons | 25 "third_party/srtp/crypto/cipher/aes.c", 26 "third_party/srtp/crypto/cipher/aes_cbc.c", 27 "third_party/srtp/crypto/cipher/aes_icm.c", 28 "third_party/srtp/crypto/cipher/cipher.c", 29 "third_party/srtp/crypto/cipher/null_cipher.c",
|
/external/openssh/ |
H A D | authfile.c | 62 #include "cipher.h" 92 Cipher *cipher; local 97 * to another cipher; otherwise use SSH_AUTHFILE_CIPHER. 101 if ((cipher = cipher_by_number(cipher_num)) == NULL) 102 fatal("save_private_key_rsa: bad cipher"); 137 /* Store cipher type. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 176 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local 178 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL; local 194 cipher, passphras 424 Cipher *cipher; local [all...] |
H A D | kex.h | 89 Cipher *cipher; member in struct:Enc
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 192 struct crypto_cipher *cipher; local 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 229 if (cipher == NULL) { 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 236 crypto_cipher_deinit(cipher); 239 crypto_cipher_deinit(cipher); 251 struct crypto_cipher *cipher; local 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 292 if (cipher [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 192 struct crypto_cipher *cipher; local 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 229 if (cipher == NULL) { 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 236 crypto_cipher_deinit(cipher); 239 crypto_cipher_deinit(cipher); 251 struct crypto_cipher *cipher; local 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 292 if (cipher [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 192 struct crypto_cipher *cipher; local 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 229 if (cipher == NULL) { 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 236 crypto_cipher_deinit(cipher); 239 crypto_cipher_deinit(cipher); 251 struct crypto_cipher *cipher; local 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 292 if (cipher [all...] |
/external/chromium_org/net/test/spawned_test_server/ |
H A D | base_test_server.cc | 43 void GetCiphersList(int cipher, base::ListValue* values) { argument 44 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_RC4) 46 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES128) 48 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES256) 50 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_3DES) 386 // Check bulk cipher argument. 390 arguments->Set("ssl-bulk-cipher", bulk_cipher_values.release());
|
/external/chromium/net/socket/ |
H A D | ssl_client_socket_openssl.cc | 47 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } argument 155 // server after receiving ClientHello if there's no common supported cipher. 496 // directly remove a cipher by ID. 503 // appended to the cipher removal |command|. 505 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local 506 const uint16 id = SSL_CIPHER_get_id(cipher); 511 bool disable = SSL_CIPHER_get_bits(cipher, NULL) < 80; 518 const char* name = SSL_CIPHER_get_name(cipher); 519 DVLOG(3) << "Found cipher t [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | nssstreamadapter.cc | 72 // SRTP cipher suite table 881 for (std::vector<std::string>::const_iterator cipher = ciphers.begin(); 882 cipher != ciphers.end(); ++cipher) { 886 if (*cipher == entry->external_name) { 894 LOG(LS_ERROR) << "Could not find cipher: " << *cipher; 910 bool NSSStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument 925 *cipher = entry->external_name;
|
H A D | opensslstreamadapter.cc | 65 // SRTP cipher suite table 275 for (std::vector<std::string>::const_iterator cipher = ciphers.begin(); 276 cipher != ciphers.end(); ++cipher) { 280 if (*cipher == entry->external_name) { 290 LOG(LS_ERROR) << "Could not find cipher: " << *cipher; 305 bool OpenSSLStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument 320 *cipher = entry->external_name;
|
H A D | opensslstreamadapter.h | 111 virtual bool GetDtlsSrtpCipher(std::string* cipher);
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library 180 mode routines for every single cipher. That means every time you add or remove a cipher from the library 182 are not directly tied to the ciphers. That is a new cipher can be added to the library by simply providing 184 can make use of the cipher right away. 254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally 412 functions which are (given that XXX is the name of the cipher) the following: 421 The XXX\_setup() routine will setup the cipher to be used with a given number of rounds and a given key length (in bytes). 425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher [all...] |
/external/chromium_org/third_party/tlslite/scripts/ |
H A D | tls.py | 349 for cipher in ["aes128", "aes256", "rc4"]: 355 settings.cipherNames = [cipher] 368 for cipher in ["aes128", "aes256", "3des", "rc4"]: 369 if cipher == "3des" and implementation not in ("openssl", "cryptlib", "pycrypto"): 376 settings.cipherNames = [cipher] 697 for cipher in ["aes128", "aes256", "rc4"]: 703 settings.cipherNames = [cipher] 716 for cipher in ["aes128", "aes256", "3des", "rc4"]: 717 if cipher == "3des" and implementation not in ("openssl", "cryptlib", "pycrypto"): 724 settings.cipherNames = [cipher] [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ap.c | 221 int cipher = WPA_CIPHER_NONE; local 225 cipher = bss->default_wep_key_len >= 13 ? 227 bss->wpa_group = cipher; 228 bss->wpa_pairwise = cipher; 229 bss->rsn_pairwise = cipher; 231 int cipher = WPA_CIPHER_WEP40; local 233 cipher = WPA_CIPHER_WEP104; 235 bss->wpa_group = cipher; 236 bss->wpa_pairwise = cipher; 237 bss->rsn_pairwise = cipher; [all...] |
/external/chromium/chrome/browser/ |
H A D | page_info_model.cc | 223 const char *key_exchange, *cipher, *mac; local 224 net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, cipher_suite); 229 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
H A D | BlockCipherFactory.java | 5 package ch.ethz.ssh2.crypto.cipher; 40 ciphers.add(new CipherEntry("aes128-ctr", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES")); 41 ciphers.add(new CipherEntry("aes192-ctr", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES")); 42 ciphers.add(new CipherEntry("aes256-ctr", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES")); 43 ciphers.add(new CipherEntry("blowfish-ctr", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish")); 45 ciphers.add(new CipherEntry("aes128-cbc", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES")); 46 ciphers.add(new CipherEntry("aes192-cbc", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES")); 47 ciphers.add(new CipherEntry("aes256-cbc", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES")); 48 ciphers.add(new CipherEntry("blowfish-cbc", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish")); 50 ciphers.add(new CipherEntry("3des-ctr", 8, 24, "ch.ethz.ssh2.crypto.cipher [all...] |
H A D | CipherInputStream.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
H A D | CipherOutputStream.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
/external/chromium_org/net/socket/ |
H A D | ssl_client_socket_openssl.cc | 56 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } argument 167 // server after receiving ClientHello if there's no common supported cipher. 531 // directly remove a cipher by ID. 535 // disabled by default. Note that !SHA384 only removes HMAC-SHA384 cipher 536 // suites, not GCM cipher suites with SHA384 as the handshake hash. 539 // appended to the cipher removal |command|. 541 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local 542 const uint16 id = SSL_CIPHER_get_id(cipher); 547 bool disable = SSL_CIPHER_get_bits(cipher, NUL [all...] |
/external/chromium_org/net/ssl/ |
H A D | ssl_cipher_suite_names.cc | 15 // redundancy and break each cipher suite into a key exchange method, cipher 22 // <5 bits> cipher 252 // 7 is reserved to indicate an AEAD cipher suite. 293 const int cipher = (cs->encoded >> 3) & 0x1f; local 297 *cipher_str = kCipherNames[cipher].name;
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportchannelproxy.cc | 149 bool TransportChannelProxy::GetSrtpCipher(std::string* cipher) { argument 154 return impl_->GetSrtpCipher(cipher);
|
/external/chromium_org/third_party/openssl/openssl/crypto/krb5/ |
H A D | krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/external/openssl/crypto/krb5/ |
H A D | krb5_asn.c | 66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
H A D | pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon13204 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|