/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar | ... .String) String keyringPassword
}
org/eclipse/core/internal/runtime/auth/Cipher.class Cipher.java package org.eclipse. ... |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
H A D | GCMBlockCipher.java | 27 private BlockCipher cipher; field in class:GCMBlockCipher 61 "cipher required with a block size of " + BLOCK_SIZE + "."); 70 this.cipher = c; 76 return cipher; 81 return cipher.getAlgorithmName() + "/GCM"; 138 cipher.init(true, keyParam); 141 cipher.processBlock(H, 0, H, 0); 335 * Some AAD was sent after the cipher started. We determine the difference b/w the hash value 336 * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at). 338 * partial) cipher [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | BaseBlockCipher.java | 102 private GenericBlockCipher cipher; field in class:BaseBlockCipher 134 cipher = new BufferedGenericBlockCipher(engine); 143 cipher = new BufferedGenericBlockCipher(provider.get()); 151 cipher = new AEADGenericBlockCipher(engine); 160 this.cipher = new BufferedGenericBlockCipher(engine); 170 this.cipher = new BufferedGenericBlockCipher(engine); 198 return cipher.getOutputSize(inputLen); 219 String name = cipher.getUnderlyingCipher().getAlgorithmName(); 262 cipher = new BufferedGenericBlockCipher(baseEngine); 267 cipher 944 private BufferedBlockCipher cipher; field in class:BaseBlockCipher.BufferedGenericBlockCipher 946 BufferedGenericBlockCipher(BufferedBlockCipher cipher) argument 951 BufferedGenericBlockCipher(org.bouncycastle.crypto.BlockCipher cipher) argument 956 BufferedGenericBlockCipher(org.bouncycastle.crypto.BlockCipher cipher, BlockCipherPadding padding) argument 1016 private AEADBlockCipher cipher; field in class:BaseBlockCipher.AEADGenericBlockCipher 1018 AEADGenericBlockCipher(AEADBlockCipher cipher) argument [all...] |
/external/chromium_org/net/test/spawned_test_server/ |
H A D | base_test_server.cc | 64 void GetCiphersList(int cipher, base::ListValue* values) { argument 65 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_RC4) 67 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES128) 69 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES256) 71 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_3DES) 457 // Check bulk cipher argument. 461 arguments->Set("ssl-bulk-cipher", bulk_cipher_values.release());
|
/external/chromium_org/third_party/boringssl/src/crypto/pem/ |
H A D | pem_lib.c | 230 EVP_CIPHER_INFO cipher; local 249 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 250 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 316 /* actually it needs the cipher block size extra... */ 390 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 401 if (cipher->cipher == NULL) return(1); 412 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher 448 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | dtlstransportchannel.cc | 312 LOG(LS_ERROR) << "Failed to get the current SRTP cipher for DTLS channel"; 326 << "current cipher = " << current_srtp_cipher << " and " 343 bool DtlsTransportChannelWrapper::GetSrtpCipher(std::string* cipher) { argument 348 return dtls_->GetDtlsSrtpCipher(cipher);
|
H A D | dtlstransportchannel_unittest.cc | 221 std::string cipher; local 223 bool rv = (*it)->GetSrtpCipher(&cipher); 227 ASSERT_EQ(cipher, expected_cipher);
|
H A D | p2ptransportchannel.h | 128 // Find out which DTLS-SRTP cipher was negotiated 129 virtual bool GetSrtpCipher(std::string* cipher) { argument
|
/external/chromium_org/third_party/libxslt/libexslt/ |
H A D | crypto.c | 378 gcry_cipher_hd_t cipher; local 383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen, 409 gcry_cipher_close (cipher); 417 gcry_cipher_hd_t cipher; local 422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen, 448 gcry_cipher_close (cipher); [all...] |
/external/openssl/crypto/cms/ |
H A D | cms_env.c | 120 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher) argument 131 cipher, NULL, 0)) 821 /* If error or no cipher end of processing */ 823 if (!ret || !ec->cipher) 865 ec->cipher = NULL;
|
H A D | cms_smime.c | 252 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, argument 257 if (!cipher) 265 if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen)) 574 const EVP_CIPHER *cipher, unsigned int flags) 579 cms = CMS_EnvelopedData_create(cipher);
|
/external/openssl/crypto/pem/ |
H A D | pem_lib.c | 276 EVP_CIPHER_INFO cipher; local 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 362 /* actually it needs the cipher block size extra... */ 440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 451 if (cipher->cipher == NULL) return(1); 466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher 490 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.c | 888 int cipher = WPA_CIPHER_NONE; local 892 cipher = bss->default_wep_key_len >= 13 ? 894 bss->wpa_group = cipher; 895 bss->wpa_pairwise = cipher; 896 bss->rsn_pairwise = cipher; 898 int cipher = WPA_CIPHER_WEP40; local 900 cipher = WPA_CIPHER_WEP104; 902 bss->wpa_group = cipher; 903 bss->wpa_pairwise = cipher; 904 bss->rsn_pairwise = cipher; [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 181 int cipher; local 220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 222 if (cipher < 0) { 223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 230 wpa_cipher_txt(cipher)); 242 peerkey->cipher = cipher; 264 /* Include only the selected cipher in pairwise cipher suite */ 267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher)); 464 int cipher; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 547 * tlsv1_client_get_cipher - Get current cipher name 549 * @buf: Buffer for the cipher name 553 * Get the name of the currently used cipher. 558 char *cipher; local 562 cipher = "RC4-MD5"; 565 cipher = "RC4-SHA"; 568 cipher = "DES-CBC-SHA"; 571 cipher = "DES-CBC3-SHA"; 574 cipher = "ADH-AES-128-SHA256"; 577 cipher [all...] |
H A D | tlsv1_server.c | 493 * tlsv1_server_get_cipher - Get current cipher name 495 * @buf: Buffer for the cipher name 499 * Get the name of the currently used cipher. 504 char *cipher; local 508 cipher = "RC4-MD5"; 511 cipher = "RC4-SHA"; 514 cipher = "DES-CBC-SHA"; 517 cipher = "DES-CBC3-SHA"; 520 cipher = "ADH-AES-128-SHA"; 523 cipher [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.c | 888 int cipher = WPA_CIPHER_NONE; local 892 cipher = bss->default_wep_key_len >= 13 ? 894 bss->wpa_group = cipher; 895 bss->wpa_pairwise = cipher; 896 bss->rsn_pairwise = cipher; 898 int cipher = WPA_CIPHER_WEP40; local 900 cipher = WPA_CIPHER_WEP104; 902 bss->wpa_group = cipher; 903 bss->wpa_pairwise = cipher; 904 bss->rsn_pairwise = cipher; [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 181 int cipher; local 220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 222 if (cipher < 0) { 223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 230 wpa_cipher_txt(cipher)); 242 peerkey->cipher = cipher; 264 /* Include only the selected cipher in pairwise cipher suite */ 267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher)); 464 int cipher; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 547 * tlsv1_client_get_cipher - Get current cipher name 549 * @buf: Buffer for the cipher name 553 * Get the name of the currently used cipher. 558 char *cipher; local 562 cipher = "RC4-MD5"; 565 cipher = "RC4-SHA"; 568 cipher = "DES-CBC-SHA"; 571 cipher = "DES-CBC3-SHA"; 574 cipher = "ADH-AES-128-SHA256"; 577 cipher [all...] |
H A D | tlsv1_server.c | 493 * tlsv1_server_get_cipher - Get current cipher name 495 * @buf: Buffer for the cipher name 499 * Get the name of the currently used cipher. 504 char *cipher; local 508 cipher = "RC4-MD5"; 511 cipher = "RC4-SHA"; 514 cipher = "DES-CBC-SHA"; 517 cipher = "DES-CBC3-SHA"; 520 cipher = "ADH-AES-128-SHA"; 523 cipher [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.c | 888 int cipher = WPA_CIPHER_NONE; local 892 cipher = bss->default_wep_key_len >= 13 ? 894 bss->wpa_group = cipher; 895 bss->wpa_pairwise = cipher; 896 bss->rsn_pairwise = cipher; 898 int cipher = WPA_CIPHER_WEP40; local 900 cipher = WPA_CIPHER_WEP104; 902 bss->wpa_group = cipher; 903 bss->wpa_pairwise = cipher; 904 bss->rsn_pairwise = cipher; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 181 int cipher; local 220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 222 if (cipher < 0) { 223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 230 wpa_cipher_txt(cipher)); 242 peerkey->cipher = cipher; 264 /* Include only the selected cipher in pairwise cipher suite */ 267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher)); 464 int cipher; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 547 * tlsv1_client_get_cipher - Get current cipher name 549 * @buf: Buffer for the cipher name 553 * Get the name of the currently used cipher. 558 char *cipher; local 562 cipher = "RC4-MD5"; 565 cipher = "RC4-SHA"; 568 cipher = "DES-CBC-SHA"; 571 cipher = "DES-CBC3-SHA"; 574 cipher = "ADH-AES-128-SHA256"; 577 cipher [all...] |
H A D | tlsv1_server.c | 493 * tlsv1_server_get_cipher - Get current cipher name 495 * @buf: Buffer for the cipher name 499 * Get the name of the currently used cipher. 504 char *cipher; local 508 cipher = "RC4-MD5"; 511 cipher = "RC4-SHA"; 514 cipher = "DES-CBC-SHA"; 517 cipher = "DES-CBC3-SHA"; 520 cipher = "ADH-AES-128-SHA"; 523 cipher [all...] |
/external/chromium_org/chrome/browser/ui/website_settings/ |
H A D | website_settings.cc | 564 const char *key_exchange, *cipher, *mac; local 567 &key_exchange, &cipher, &mac, &is_aead, cipher_suite); 573 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange)); 577 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|