Searched defs:cipher (Results 76 - 100 of 193) sorted by relevance

12345678

/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar ... .String) String keyringPassword } org/eclipse/core/internal/runtime/auth/Cipher.class Cipher.java package org.eclipse. ...
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
H A DGCMBlockCipher.java27 private BlockCipher cipher; field in class:GCMBlockCipher
61 "cipher required with a block size of " + BLOCK_SIZE + ".");
70 this.cipher = c;
76 return cipher;
81 return cipher.getAlgorithmName() + "/GCM";
138 cipher.init(true, keyParam);
141 cipher.processBlock(H, 0, H, 0);
335 * Some AAD was sent after the cipher started. We determine the difference b/w the hash value
336 * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at).
338 * partial) cipher
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
H A DBaseBlockCipher.java102 private GenericBlockCipher cipher; field in class:BaseBlockCipher
134 cipher = new BufferedGenericBlockCipher(engine);
143 cipher = new BufferedGenericBlockCipher(provider.get());
151 cipher = new AEADGenericBlockCipher(engine);
160 this.cipher = new BufferedGenericBlockCipher(engine);
170 this.cipher = new BufferedGenericBlockCipher(engine);
198 return cipher.getOutputSize(inputLen);
219 String name = cipher.getUnderlyingCipher().getAlgorithmName();
262 cipher = new BufferedGenericBlockCipher(baseEngine);
267 cipher
944 private BufferedBlockCipher cipher; field in class:BaseBlockCipher.BufferedGenericBlockCipher
946 BufferedGenericBlockCipher(BufferedBlockCipher cipher) argument
951 BufferedGenericBlockCipher(org.bouncycastle.crypto.BlockCipher cipher) argument
956 BufferedGenericBlockCipher(org.bouncycastle.crypto.BlockCipher cipher, BlockCipherPadding padding) argument
1016 private AEADBlockCipher cipher; field in class:BaseBlockCipher.AEADGenericBlockCipher
1018 AEADGenericBlockCipher(AEADBlockCipher cipher) argument
[all...]
/external/chromium_org/net/test/spawned_test_server/
H A Dbase_test_server.cc64 void GetCiphersList(int cipher, base::ListValue* values) { argument
65 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_RC4)
67 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES128)
69 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES256)
71 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_3DES)
457 // Check bulk cipher argument.
461 arguments->Set("ssl-bulk-cipher", bulk_cipher_values.release());
/external/chromium_org/third_party/boringssl/src/crypto/pem/
H A Dpem_lib.c230 EVP_CIPHER_INFO cipher; local
249 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
250 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
316 /* actually it needs the cipher block size extra... */
390 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument
401 if (cipher->cipher == NULL) return(1);
412 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher
448 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Ddtlstransportchannel.cc312 LOG(LS_ERROR) << "Failed to get the current SRTP cipher for DTLS channel";
326 << "current cipher = " << current_srtp_cipher << " and "
343 bool DtlsTransportChannelWrapper::GetSrtpCipher(std::string* cipher) { argument
348 return dtls_->GetDtlsSrtpCipher(cipher);
H A Ddtlstransportchannel_unittest.cc221 std::string cipher; local
223 bool rv = (*it)->GetSrtpCipher(&cipher);
227 ASSERT_EQ(cipher, expected_cipher);
H A Dp2ptransportchannel.h128 // Find out which DTLS-SRTP cipher was negotiated
129 virtual bool GetSrtpCipher(std::string* cipher) { argument
/external/chromium_org/third_party/libxslt/libexslt/
H A Dcrypto.c378 gcry_cipher_hd_t cipher; local
383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen,
409 gcry_cipher_close (cipher);
417 gcry_cipher_hd_t cipher; local
422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen,
448 gcry_cipher_close (cipher);
[all...]
/external/openssl/crypto/cms/
H A Dcms_env.c120 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher) argument
131 cipher, NULL, 0))
821 /* If error or no cipher end of processing */
823 if (!ret || !ec->cipher)
865 ec->cipher = NULL;
H A Dcms_smime.c252 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, argument
257 if (!cipher)
265 if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen))
574 const EVP_CIPHER *cipher, unsigned int flags)
579 cms = CMS_EnvelopedData_create(cipher);
/external/openssl/crypto/pem/
H A Dpem_lib.c276 EVP_CIPHER_INFO cipher; local
295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
362 /* actually it needs the cipher block size extra... */
440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument
451 if (cipher->cipher == NULL) return(1);
466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher
490 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.c888 int cipher = WPA_CIPHER_NONE; local
892 cipher = bss->default_wep_key_len >= 13 ?
894 bss->wpa_group = cipher;
895 bss->wpa_pairwise = cipher;
896 bss->rsn_pairwise = cipher;
898 int cipher = WPA_CIPHER_WEP40; local
900 cipher = WPA_CIPHER_WEP104;
902 bss->wpa_group = cipher;
903 bss->wpa_pairwise = cipher;
904 bss->rsn_pairwise = cipher;
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c547 * tlsv1_client_get_cipher - Get current cipher name
549 * @buf: Buffer for the cipher name
553 * Get the name of the currently used cipher.
558 char *cipher; local
562 cipher = "RC4-MD5";
565 cipher = "RC4-SHA";
568 cipher = "DES-CBC-SHA";
571 cipher = "DES-CBC3-SHA";
574 cipher = "ADH-AES-128-SHA256";
577 cipher
[all...]
H A Dtlsv1_server.c493 * tlsv1_server_get_cipher - Get current cipher name
495 * @buf: Buffer for the cipher name
499 * Get the name of the currently used cipher.
504 char *cipher; local
508 cipher = "RC4-MD5";
511 cipher = "RC4-SHA";
514 cipher = "DES-CBC-SHA";
517 cipher = "DES-CBC3-SHA";
520 cipher = "ADH-AES-128-SHA";
523 cipher
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dap_config.c888 int cipher = WPA_CIPHER_NONE; local
892 cipher = bss->default_wep_key_len >= 13 ?
894 bss->wpa_group = cipher;
895 bss->wpa_pairwise = cipher;
896 bss->rsn_pairwise = cipher;
898 int cipher = WPA_CIPHER_WEP40; local
900 cipher = WPA_CIPHER_WEP104;
902 bss->wpa_group = cipher;
903 bss->wpa_pairwise = cipher;
904 bss->rsn_pairwise = cipher;
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c547 * tlsv1_client_get_cipher - Get current cipher name
549 * @buf: Buffer for the cipher name
553 * Get the name of the currently used cipher.
558 char *cipher; local
562 cipher = "RC4-MD5";
565 cipher = "RC4-SHA";
568 cipher = "DES-CBC-SHA";
571 cipher = "DES-CBC3-SHA";
574 cipher = "ADH-AES-128-SHA256";
577 cipher
[all...]
H A Dtlsv1_server.c493 * tlsv1_server_get_cipher - Get current cipher name
495 * @buf: Buffer for the cipher name
499 * Get the name of the currently used cipher.
504 char *cipher; local
508 cipher = "RC4-MD5";
511 cipher = "RC4-SHA";
514 cipher = "DES-CBC-SHA";
517 cipher = "DES-CBC3-SHA";
520 cipher = "ADH-AES-128-SHA";
523 cipher
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_config.c888 int cipher = WPA_CIPHER_NONE; local
892 cipher = bss->default_wep_key_len >= 13 ?
894 bss->wpa_group = cipher;
895 bss->wpa_pairwise = cipher;
896 bss->rsn_pairwise = cipher;
898 int cipher = WPA_CIPHER_WEP40; local
900 cipher = WPA_CIPHER_WEP104;
902 bss->wpa_group = cipher;
903 bss->wpa_pairwise = cipher;
904 bss->rsn_pairwise = cipher;
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c547 * tlsv1_client_get_cipher - Get current cipher name
549 * @buf: Buffer for the cipher name
553 * Get the name of the currently used cipher.
558 char *cipher; local
562 cipher = "RC4-MD5";
565 cipher = "RC4-SHA";
568 cipher = "DES-CBC-SHA";
571 cipher = "DES-CBC3-SHA";
574 cipher = "ADH-AES-128-SHA256";
577 cipher
[all...]
H A Dtlsv1_server.c493 * tlsv1_server_get_cipher - Get current cipher name
495 * @buf: Buffer for the cipher name
499 * Get the name of the currently used cipher.
504 char *cipher; local
508 cipher = "RC4-MD5";
511 cipher = "RC4-SHA";
514 cipher = "DES-CBC-SHA";
517 cipher = "DES-CBC3-SHA";
520 cipher = "ADH-AES-128-SHA";
523 cipher
[all...]
/external/chromium_org/chrome/browser/ui/website_settings/
H A Dwebsite_settings.cc564 const char *key_exchange, *cipher, *mac; local
567 &key_exchange, &cipher, &mac, &is_aead, cipher_suite);
573 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange));
577 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));

Completed in 489 milliseconds

12345678