Searched refs:cipher (Results 251 - 275 of 428) sorted by relevance

<<1112131415161718

/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.h28 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
/external/chromium/third_party/libjingle/source/talk/
H A Dlibjingle.scons25 "third_party/srtp/crypto/cipher/aes.c",
26 "third_party/srtp/crypto/cipher/aes_cbc.c",
27 "third_party/srtp/crypto/cipher/aes_icm.c",
28 "third_party/srtp/crypto/cipher/cipher.c",
29 "third_party/srtp/crypto/cipher/null_cipher.c",
/external/openssh/
H A Dauthfile.c62 #include "cipher.h"
92 Cipher *cipher; local
97 * to another cipher; otherwise use SSH_AUTHFILE_CIPHER.
101 if ((cipher = cipher_by_number(cipher_num)) == NULL)
102 fatal("save_private_key_rsa: bad cipher");
137 /* Store cipher type. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
176 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local
178 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL; local
194 cipher, passphras
424 Cipher *cipher; local
[all...]
H A Dkex.h89 Cipher *cipher; member in struct:Enc
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.c192 struct crypto_cipher *cipher; local
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
229 if (cipher == NULL) {
230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
236 crypto_cipher_deinit(cipher);
239 crypto_cipher_deinit(cipher);
251 struct crypto_cipher *cipher; local
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
292 if (cipher
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Dikev2_common.c192 struct crypto_cipher *cipher; local
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
229 if (cipher == NULL) {
230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
236 crypto_cipher_deinit(cipher);
239 crypto_cipher_deinit(cipher);
251 struct crypto_cipher *cipher; local
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
292 if (cipher
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dikev2_common.c192 struct crypto_cipher *cipher; local
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
229 if (cipher == NULL) {
230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
234 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
236 crypto_cipher_deinit(cipher);
239 crypto_cipher_deinit(cipher);
251 struct crypto_cipher *cipher; local
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
292 if (cipher
[all...]
/external/chromium_org/net/test/spawned_test_server/
H A Dbase_test_server.cc43 void GetCiphersList(int cipher, base::ListValue* values) { argument
44 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_RC4)
46 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES128)
48 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES256)
50 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_3DES)
386 // Check bulk cipher argument.
390 arguments->Set("ssl-bulk-cipher", bulk_cipher_values.release());
/external/chromium/net/socket/
H A Dssl_client_socket_openssl.cc47 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } argument
155 // server after receiving ClientHello if there's no common supported cipher.
496 // directly remove a cipher by ID.
503 // appended to the cipher removal |command|.
505 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local
506 const uint16 id = SSL_CIPHER_get_id(cipher);
511 bool disable = SSL_CIPHER_get_bits(cipher, NULL) < 80;
518 const char* name = SSL_CIPHER_get_name(cipher);
519 DVLOG(3) << "Found cipher t
[all...]
/external/chromium_org/third_party/libjingle/source/talk/base/
H A Dnssstreamadapter.cc72 // SRTP cipher suite table
881 for (std::vector<std::string>::const_iterator cipher = ciphers.begin();
882 cipher != ciphers.end(); ++cipher) {
886 if (*cipher == entry->external_name) {
894 LOG(LS_ERROR) << "Could not find cipher: " << *cipher;
910 bool NSSStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument
925 *cipher = entry->external_name;
H A Dopensslstreamadapter.cc65 // SRTP cipher suite table
275 for (std::vector<std::string>::const_iterator cipher = ciphers.begin();
276 cipher != ciphers.end(); ++cipher) {
280 if (*cipher == entry->external_name) {
290 LOG(LS_ERROR) << "Could not find cipher: " << *cipher;
305 bool OpenSSLStreamAdapter::GetDtlsSrtpCipher(std::string* cipher) { argument
320 *cipher = entry->external_name;
H A Dopensslstreamadapter.h111 virtual bool GetDtlsSrtpCipher(std::string* cipher);
/external/dropbear/libtomcrypt/
H A Dcrypt.tex125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library
180 mode routines for every single cipher. That means every time you add or remove a cipher from the library
182 are not directly tied to the ciphers. That is a new cipher can be added to the library by simply providing
184 can make use of the cipher right away.
254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally
412 functions which are (given that XXX is the name of the cipher) the following:
421 The XXX\_setup() routine will setup the cipher to be used with a given number of rounds and a given key length (in bytes).
425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not
432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher
[all...]
/external/chromium_org/third_party/tlslite/scripts/
H A Dtls.py349 for cipher in ["aes128", "aes256", "rc4"]:
355 settings.cipherNames = [cipher]
368 for cipher in ["aes128", "aes256", "3des", "rc4"]:
369 if cipher == "3des" and implementation not in ("openssl", "cryptlib", "pycrypto"):
376 settings.cipherNames = [cipher]
697 for cipher in ["aes128", "aes256", "rc4"]:
703 settings.cipherNames = [cipher]
716 for cipher in ["aes128", "aes256", "3des", "rc4"]:
717 if cipher == "3des" and implementation not in ("openssl", "cryptlib", "pycrypto"):
724 settings.cipherNames = [cipher]
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dap.c221 int cipher = WPA_CIPHER_NONE; local
225 cipher = bss->default_wep_key_len >= 13 ?
227 bss->wpa_group = cipher;
228 bss->wpa_pairwise = cipher;
229 bss->rsn_pairwise = cipher;
231 int cipher = WPA_CIPHER_WEP40; local
233 cipher = WPA_CIPHER_WEP104;
235 bss->wpa_group = cipher;
236 bss->wpa_pairwise = cipher;
237 bss->rsn_pairwise = cipher;
[all...]
/external/chromium/chrome/browser/
H A Dpage_info_model.cc223 const char *key_exchange, *cipher, *mac; local
224 net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, cipher_suite);
229 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/
H A DBlockCipherFactory.java5 package ch.ethz.ssh2.crypto.cipher;
40 ciphers.add(new CipherEntry("aes128-ctr", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES"));
41 ciphers.add(new CipherEntry("aes192-ctr", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES"));
42 ciphers.add(new CipherEntry("aes256-ctr", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES"));
43 ciphers.add(new CipherEntry("blowfish-ctr", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish"));
45 ciphers.add(new CipherEntry("aes128-cbc", 16, 16, "ch.ethz.ssh2.crypto.cipher.AES"));
46 ciphers.add(new CipherEntry("aes192-cbc", 16, 24, "ch.ethz.ssh2.crypto.cipher.AES"));
47 ciphers.add(new CipherEntry("aes256-cbc", 16, 32, "ch.ethz.ssh2.crypto.cipher.AES"));
48 ciphers.add(new CipherEntry("blowfish-cbc", 8, 16, "ch.ethz.ssh2.crypto.cipher.BlowFish"));
50 ciphers.add(new CipherEntry("3des-ctr", 8, 24, "ch.ethz.ssh2.crypto.cipher
[all...]
H A DCipherInputStream.java5 package ch.ethz.ssh2.crypto.cipher;
H A DCipherOutputStream.java5 package ch.ethz.ssh2.crypto.cipher;
/external/chromium_org/net/socket/
H A Dssl_client_socket_openssl.cc56 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } argument
167 // server after receiving ClientHello if there's no common supported cipher.
531 // directly remove a cipher by ID.
535 // disabled by default. Note that !SHA384 only removes HMAC-SHA384 cipher
536 // suites, not GCM cipher suites with SHA384 as the handshake hash.
539 // appended to the cipher removal |command|.
541 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local
542 const uint16 id = SSL_CIPHER_get_id(cipher);
547 bool disable = SSL_CIPHER_get_bits(cipher, NUL
[all...]
/external/chromium_org/net/ssl/
H A Dssl_cipher_suite_names.cc15 // redundancy and break each cipher suite into a key exchange method, cipher
22 // <5 bits> cipher
252 // 7 is reserved to indicate an AEAD cipher suite.
293 const int cipher = (cs->encoded >> 3) & 0x1f; local
297 *cipher_str = kCipherNames[cipher].name;
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dtransportchannelproxy.cc149 bool TransportChannelProxy::GetSrtpCipher(std::string* cipher) { argument
154 return impl_->GetSrtpCipher(cipher);
/external/chromium_org/third_party/openssl/openssl/crypto/krb5/
H A Dkrb5_asn.c66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
/external/openssl/crypto/krb5/
H A Dkrb5_asn.c66 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
/external/chromium_org/third_party/openssl/openssl/crypto/pem/
H A Dpem.h146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon13204
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,

Completed in 771 milliseconds

<<1112131415161718