Searched refs:cipher (Results 101 - 125 of 324) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
H A DBcKeyStoreSpi.java151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount);
152 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher);
229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
231 CipherInputStream cIn = new CipherInputStream(dIn, cipher);
248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
250 cIn = new CipherInputStream(dIn, cipher);
269 cipher = makePBECipher("Old" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
271 cIn = new CipherInputStream(dIn, cipher);
277 // reencrypt key with correct cipher.
468 Cipher cipher
[all...]
/external/chromium_org/net/ssl/
H A Dssl_cipher_suite_names.cc15 // redundancy and break each cipher suite into a key exchange method, cipher
22 // <5 bits> cipher
255 // 7 is reserved to indicate an AEAD cipher suite.
296 const int cipher = (cs->encoded >> 3) & 0x1f; local
300 *cipher_str = kCipherNames[cipher].name;
364 const int cipher = (cs->encoded >> 3) & 0x1f; local
377 switch (cipher) {
/external/chromium_org/third_party/boringssl/src/crypto/cipher/
H A Dinternal.h70 /* type contains a NID identifing the cipher. (For example, NID_rc4.) */
73 /* block_size contains the block size, in bytes, of the cipher, or 1 for a
74 * stream cipher. */
77 /* key_len contains the key size, in bytes, for the cipher. If the cipher
85 * cipher. */
97 int (*cipher)(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, member in struct:evp_cipher_st
/external/chromium_org/third_party/boringssl/src/crypto/x509/
H A Dx509_txt.c59 #include <openssl/cipher.h>
H A Dx_info.c75 ret->enc_cipher.cipher=NULL;
/external/chromium_org/third_party/webrtc/base/
H A Dsslstreamadapter.h149 virtual bool GetDtlsSrtpCipher(std::string* cipher) { argument
/external/openssl/apps/
H A Dgenpkey.c82 const EVP_CIPHER *cipher = NULL; local
180 cipher = EVP_get_cipherbyname(*args + 1);
181 if (!cipher)
183 BIO_printf(bio_err, "Unknown cipher %s\n",
204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
/external/openssl/crypto/asn1/
H A Dx_info.c76 ret->enc_cipher.cipher=NULL;
/external/openssl/crypto/evp/
H A Dp5_crpt2.c201 const EVP_CIPHER *cipher; local
229 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
231 if(!cipher) {
237 /* Fixup cipher based on AlgorithmIdentifier */
238 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
H A Devp.h322 /* Values for cipher flags */
336 /* Set if variable length cipher */
338 /* Set if the iv handling should be done by the cipher itself */
340 /* Set if the cipher's init() function should be called if key is NULL */
342 /* Call ctrl() to init cipher parameters */
348 /* cipher handles random key generation */
350 /* cipher has its own additional copying logic */
358 /* Allow non FIPS cipher in FIPS mode */
387 /* AEAD cipher deduces payload length and returns number of bytes
407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
[all...]
H A Devp_locl.h59 /* Macros to code block cipher wrappers */
61 /* Wrapper functions for each cipher mode */
65 bl = ctx->cipher->block_size;\
257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \
258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
261 0, cipher##_init_key, NULL, \
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_wext.h78 int wpa_driver_wext_cipher2wext(int cipher);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_wext.h78 int wpa_driver_wext_cipher2wext(int cipher);
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_wext.h78 int wpa_driver_wext_cipher2wext(int cipher);
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.h378 const char * wpa_cipher_txt(int cipher);
409 int wpa_cipher_key_len(int cipher);
410 int wpa_cipher_rsc_len(int cipher);
411 int wpa_cipher_to_alg(int cipher);
412 int wpa_cipher_valid_pairwise(int cipher);
413 int wpa_cipher_valid_mgmt_group(int cipher);
414 u32 wpa_cipher_to_suite(int proto, int cipher);
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.h378 const char * wpa_cipher_txt(int cipher);
409 int wpa_cipher_key_len(int cipher);
410 int wpa_cipher_rsc_len(int cipher);
411 int wpa_cipher_to_alg(int cipher);
412 int wpa_cipher_valid_pairwise(int cipher);
413 int wpa_cipher_valid_mgmt_group(int cipher);
414 u32 wpa_cipher_to_suite(int proto, int cipher);
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.h378 const char * wpa_cipher_txt(int cipher);
409 int wpa_cipher_key_len(int cipher);
410 int wpa_cipher_rsc_len(int cipher);
411 int wpa_cipher_to_alg(int cipher);
412 int wpa_cipher_valid_pairwise(int cipher);
413 int wpa_cipher_valid_mgmt_group(int cipher);
414 u32 wpa_cipher_to_suite(int proto, int cipher);
/external/chromium_org/third_party/libxslt/libexslt/
H A Dcrypto.c378 gcry_cipher_hd_t cipher; local
383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen,
409 gcry_cipher_close (cipher);
417 gcry_cipher_hd_t cipher; local
422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen,
448 gcry_cipher_close (cipher);
[all...]
/external/openssl/include/openssl/
H A Devp.h322 /* Values for cipher flags */
336 /* Set if variable length cipher */
338 /* Set if the iv handling should be done by the cipher itself */
340 /* Set if the cipher's init() function should be called if key is NULL */
342 /* Call ctrl() to init cipher parameters */
348 /* cipher handles random key generation */
350 /* cipher has its own additional copying logic */
358 /* Allow non FIPS cipher in FIPS mode */
387 /* AEAD cipher deduces payload length and returns number of bytes
407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
[all...]
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dt1_enc.c344 /* mac_key_and_key is used to merge the MAC and cipher keys for an AEAD
345 * which simulates pre-AEAD cipher suites. It needs to be large enough
352 * cipher suites). */
402 /* tls1_change_cipher_state_cipher performs the work needed to switch cipher
414 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
470 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, iv, !is_read);
493 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
511 * cipher suites) the key length reported by
523 key_len = EVP_CIPHER_key_length(cipher);
524 iv_len = EVP_CIPHER_iv_length(cipher);
[all...]

Completed in 571 milliseconds

1234567891011>>