/external/openssl/crypto/pem/ |
H A D | pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon28347 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
H A D | pem_info.c | 242 EVP_CIPHER_INFO cipher; local 244 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 246 if (!PEM_do_header(&cipher,data,&len,cb,u)) 360 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
H A D | pem_lib.c | 276 EVP_CIPHER_INFO cipher; local 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 362 /* actually it needs the cipher block size extra... */ 440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 451 if (cipher->cipher == NULL) return(1); 466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher 490 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/external/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 70 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) 96 iter, EVP_CIPHER_key_length(cipher), key, md)) { 102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 108 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 69 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 591 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 610 /* Check cipher OID exists and has data in it*/ 611 i = EVP_CIPHER_type(cipher); 617 ec->cipher = cipher;
|
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
/external/openssl/crypto/threads/ |
H A D | mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
/external/openssl/include/openssl/ |
H A D | cms.h | 161 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 178 const EVP_CIPHER *cipher, unsigned int flags); variable 193 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
H A D | evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 387 /* AEAD cipher deduces payload length and returns number of bytes 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
H A D | krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
H A D | pem.h | 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 177 int cipher; member in struct:pem_ctx_st::__anon28390 195 EVP_CIPHER *dec; /* date encryption cipher */ 406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
|
H A D | pkcs7.h | 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 339 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 449 * Cipher OCTET STRING, -- the 3 byte cipher ID 520 const SSL_CIPHER *cipher; member in struct:ssl_session_st 523 * the 'cipher' structure */ 613 /* Set on servers to choose the cipher accordin [all...] |
H A D | x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1166 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1168 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
/external/openssl/ssl/ |
H A D | s23_clnt.c | 261 SSL_CIPHER *cipher; local 267 cipher = sk_SSL_CIPHER_value(ciphers, i); 268 if (cipher->algorithm_ssl == SSL_SSLV2)
|
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 449 * Cipher OCTET STRING, -- the 3 byte cipher ID 520 const SSL_CIPHER *cipher; member in struct:ssl_session_st 523 * the 'cipher' structure */ 613 /* Set on servers to choose the cipher accordin [all...] |
H A D | ssl_asn1.c | 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 144 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 162 a.cipher.type=V_ASN1_OCTET_STRING; 163 a.cipher.data=buf; 165 if (in->cipher == NULL) 168 l=in->cipher->id; 171 a.cipher.length=3; 178 a.cipher.length=2; 295 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 343 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN [all...] |
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 494 c=s->cipher; 811 co_list[co_list_num].cipher = c; 875 *ca_curr = ciph_curr->cipher; 884 * or represent a cipher strength value (will be added in any case because algorithms=0). 966 cp = curr->cipher; 1003 /* add the cipher if it has not been added yet. */ 1013 /* Move the added cipher to this location */ 1073 (curr->cipher 1540 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument 1789 SSL_CIPHER_authentication_method(const SSL_CIPHER* cipher) argument [all...] |
H A D | ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 207 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1332 * was unable to find a cipher matching the given rule string 1333 * (for example if the rule string specifies a cipher which 1896 /* ret->cipher=NULL;*/ 2187 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument 2204 kl=SSL_C_EXPORT_PKEYLENGTH(cipher); 2314 * ECDSA cipher suites depending on the key usage extension. 2541 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument 2546 alg_a = cipher [all...] |
H A D | ssl_sess.c | 598 if (ret->cipher == NULL) 607 ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); 609 ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); 610 if (ret->cipher == NULL) 927 STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) 926 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
|
H A D | ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n"); 381 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 557 cipher = 0; 713 else if (strcmp(*argv,"-cipher") == 0) 716 cipher= *(++argv); 792 /* ensure that the cipher lis [all...] |
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 79 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 81 cipher->mode = mode; 86 bcopy(IV, cipher->IV, MAX_IV_SIZE); 88 bzero(cipher->IV, MAX_IV_SIZE); 93 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 98 if (cipher == NULL || 109 switch (cipher->mode) { 120 bcopy(cipher->IV, block, 16); 127 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0]; 128 ((word32*)block)[1] = ((word32*)cipher 207 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 270 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 368 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument [all...] |
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |