/macosx-10.10/OpenSSL098-52/src/demos/ssltest-ecc/ |
H A D | ssltest.sh | 2 # Tests ECC cipher suites using ssltest. Requires one argument which could 60 # Anonymous cipher suites do not require key or certificate files 66 for cipher in $AECDH_CIPHER_LIST 68 echo "Testing $cipher" 69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher 76 -named_curve $curve -cipher AECDH-NULL-SHA 83 -named_curve $curve -cipher AECDH-RC4-SHA 88 # Both ECDH-ECDSA and ECDHE-ECDSA cipher suites require 95 for cipher i [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | DESSupport.h | 28 unsigned char * cipher);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/ |
H A D | rijndaelApi.c | 15 static void dumpChainBuf(cipherInstance *cipher, char *op) argument 18 int columns = cipher->blockLen / 32; 23 printf("%02x ", cipher->chainBlock[t][j]); 71 int _cipherInit( cipherInstance *cipher, argument 81 cipher->mode = mode; 85 cipher->blockLen = blockLen; 92 cipher->chainBlock[t][j] = IV[t+4*j]; 96 dumpChainBuf(cipher, "init "); 101 int _blockEncrypt(cipherInstance *cipher, argument 114 if (cipher 171 _blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 266 _rijndaelBlockEncrypt( cipherInstance *cipher, keyInstance *key, BYTE *input, BYTE *outBuffer) argument 308 _rijndaelBlockDecrypt( cipherInstance *cipher, keyInstance *key, BYTE *input, BYTE *outBuffer) argument [all...] |
H A D | rijndaelApi.h | 52 /* The structure for cipher information */ 68 cipherInstance *cipher, 74 cipherInstance *cipher, 81 cipherInstance *cipher, 92 cipherInstance *cipher, 97 cipherInstance *cipher,
|
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | testenc | 10 $cmd enc < $test > $test.cipher 11 $cmd enc < $test.cipher >$test.clear 17 /bin/rm $test.cipher $test.clear 20 $cmd enc -a -e < $test > $test.cipher 21 $cmd enc -a -d < $test.cipher >$test.clear 27 /bin/rm $test.cipher $test.clear 30 for i in `$cmd list-cipher-commands` 33 $cmd $i -bufsize 113 -e -k test < $test > $test.$i.cipher 34 $cmd $i -bufsize 157 -d -k test < $test.$i.cipher >$test.$i.clear 40 /bin/rm $test.$i.cipher [all...] |
H A D | testenc.com | 17 $ if f$search(test+"-cipher") .nes. "" then delete 'test'-cipher;* 21 $ 'cmd' enc -in 'test' -out 'test'-cipher 22 $ 'cmd' enc -in 'test'-cipher -out 'test'-clear 25 $ delete 'test'-cipher;*,'test'-clear;* 28 $ 'cmd' enc -a -e -in 'test' -out 'test'-cipher 29 $ 'cmd' enc -a -d -in 'test'-cipher -out 'test'-clear 32 $ delete 'test'-cipher;*,'test'-clear;* 34 $ define/user sys$output 'test'-cipher-commands 35 $ 'cmd' list-cipher [all...] |
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
/macosx-10.10/CPANInternal-159.1/Crypt-Rijndael-1.10/t/lib/ |
H A D | mode.pl | 12 my $cipher = $c->encrypt( $data ); 13 my $plain = $c->decrypt( $cipher ); 17 cipher => $cipher,
|
/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | enc_min.c | 75 /* ctx->cipher=NULL; */ 175 /* We'll use the ENGINE's private cipher definition */ 178 * 'cipher' came from an ENGINE and we need to release 191 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, argument 206 ctx->cipher = &bad_cipher; 215 if (ctx->engine && ctx->cipher && (!cipher || 216 (cipher && (cipher->nid == ctx->cipher 388 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument [all...] |
H A D | evp_lib.c | 68 if (c->cipher->set_asn1_parameters != NULL) 69 ret=c->cipher->set_asn1_parameters(c,type); 70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 81 if (c->cipher->get_asn1_parameters != NULL) 82 ret=c->cipher->get_asn1_parameters(c,type); 83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 122 /* Convert the various cipher NIDs and dummies to a proper OID NID */ 188 return ctx->cipher->block_size; 193 return ctx->cipher; 196 unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument 211 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument 216 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument [all...] |
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_cipher.rb | 93 cipher = OpenSSL::Cipher.new('aes-128-ctr') 94 cipher.encrypt 95 cipher.pkcs5_keyivgen('password') 96 c = cipher.update('hello,world') + cipher.final 97 cipher.decrypt 98 cipher.pkcs5_keyivgen('password') 99 assert_equal('hello,world', cipher.update(c) + cipher.final) 139 cipher [all...] |
H A D | test_engine.rb | 48 # suppress message from openssl Engine's RC4 cipher [ruby-core:41026] 51 encrypted = crypt_data(data, key, :encrypt) { engine.cipher(algo) } 68 cipher = yield 69 cipher.send mode 70 cipher.key = key 71 cipher.update(data) + cipher.final
|
/macosx-10.10/CPANInternal-159.1/Crypt-Rijndael-1.10/t/rt/ |
H A D | 27632.t | 15 my $cipher = $class->new( $key, Crypt::Rijndael::MODE_CBC ); 16 isa_ok( $cipher, $class ); 18 $cipher->set_iv('a' x 16); 24 my $crypt = $cipher->encrypt( $in_plain ); 37 my $out_plain = $cipher->decrypt( $crypt );
|
/macosx-10.10/ruby-106/ruby/lib/webrick/ |
H A D | https.rb | 25 # HTTP request SSL cipher 27 attr_reader :cipher 48 @cipher = socket.cipher 76 meta["SSL_CIPHER"] = @cipher[0] 77 meta["SSL_PROTOCOL"] = @cipher[1] 78 meta["SSL_CIPHER_USEKEYSIZE"] = @cipher[2].to_s 79 meta["SSL_CIPHER_ALGKEYSIZE"] = @cipher[3].to_s
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | pppcrypt.c | 155 DesEncrypt(clear, cipher) 157 u_char *cipher; /* OUT 8 octets */ 166 Collapse(des_input, cipher); 171 DesDecrypt(cipher, clear) 172 u_char *cipher; /* IN 8 octets */ 177 Expand(cipher, des_input); 200 DesEncrypt(clear, key, cipher) 202 u_char *cipher; /* OUT 8 octets */ 204 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, 210 DesDecrypt(cipher, clea [all...] |
/macosx-10.10/BerkeleyDB-21/db/crypto/ |
H A D | crypto.c | 26 CIPHER *cipher; local 53 * Must create the shared information. We need: Shared cipher 57 if ((ret = __env_alloc(infop, sizeof(CIPHER), &cipher)) != 0) 59 memset(cipher, 0, sizeof(*cipher)); 62 __env_alloc_free(infop, cipher); 66 cipher->passwd = R_OFFSET(infop, sh_passwd); 67 cipher->passwd_len = dbenv->passwd_len; 68 cipher->flags = db_cipher->alg; 69 memcpy(sh_passwd, dbenv->passwd, cipher 160 CIPHER *cipher; local 388 CIPHER *cipher; local [all...] |
/macosx-10.10/CPANInternal-159.1/PlRPC-0.2020/lib/RPC/PlServer/ |
H A D | Comm.pm | 57 if (my $cipher = $attr->{'cipher'}) { 58 $self->{'cipher'} = $cipher; 96 if (my $cipher = $self->{'cipher'}) { 97 my $size = $cipher->blocksize; 103 $msg .= $cipher->encrypt(substr($encodedMsg, $i, $size)); 153 if ($self->{'cipher'}) { 154 $blockSize = $self->{'cipher'} [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher=EVP_get_cipherbyname( 84 if (ret->cipher.cipher == NULL) 99 memcpy(ret->cipher.iv, 103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH); 120 ret->cipher.cipher=NULL; 121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslNullCipher.c | 39 const SSLSymmetricCipherParams *cipher, 67 .c.cipher = { 38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslNullCipher.c | 39 const SSLSymmetricCipherParams *cipher, 67 .c.cipher = { 38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslNullCipher.c | 39 const SSLSymmetricCipherParams *cipher, 67 .c.cipher = { 38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
|
/macosx-10.10/BerkeleyDB-21/db/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 6 * Optimised ANSI C code for the Rijndael cipher (now AES) 94 __db_cipherInit(cipher, mode, IV) 95 cipherInstance *cipher; 100 cipher->mode = mode; 105 memcpy(cipher->IV, IV, MAX_IV_SIZE); 117 __db_blockEncrypt(cipher, key, input, inputLen, outBuffer) 118 cipherInstance *cipher; 128 if (cipher == NULL || 139 switch (cipher->mode) { 149 iv = cipher [all...] |
/macosx-10.10/CPANInternal-159.1/IO-Socket-SSL/example/ |
H A D | ssl_client.pl | 40 my ($subject_name, $issuer_name, $cipher); 44 $cipher = $sock->get_cipher(); 46 warn "cipher: $cipher.\n", "server cert:\n",
|
/macosx-10.10/ruby-106/ruby/sample/openssl/ |
H A D | cipher.rb | 6 puts %(cipher alg: "#{alg}") 16 cipher = enc.update(text) 17 cipher << enc.final 18 puts %(encrypted text: #{cipher.inspect}) 25 plain = dec.update(cipher)
|