Searched refs:cipher (Results 1 - 25 of 252) sorted by relevance

1234567891011

/macosx-10.10/OpenSSL098-52/src/demos/ssltest-ecc/
H A Dssltest.sh2 # Tests ECC cipher suites using ssltest. Requires one argument which could
60 # Anonymous cipher suites do not require key or certificate files
66 for cipher in $AECDH_CIPHER_LIST
68 echo "Testing $cipher"
69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher
76 -named_curve $curve -cipher AECDH-NULL-SHA
83 -named_curve $curve -cipher AECDH-RC4-SHA
88 # Both ECDH-ECDSA and ECDHE-ECDSA cipher suites require
95 for cipher i
[all...]
/macosx-10.10/eap8021x-198/EAP8021X.fproj/
H A DDESSupport.h28 unsigned char * cipher);
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/
H A DrijndaelApi.c15 static void dumpChainBuf(cipherInstance *cipher, char *op) argument
18 int columns = cipher->blockLen / 32;
23 printf("%02x ", cipher->chainBlock[t][j]);
71 int _cipherInit( cipherInstance *cipher, argument
81 cipher->mode = mode;
85 cipher->blockLen = blockLen;
92 cipher->chainBlock[t][j] = IV[t+4*j];
96 dumpChainBuf(cipher, "init ");
101 int _blockEncrypt(cipherInstance *cipher, argument
114 if (cipher
171 _blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument
266 _rijndaelBlockEncrypt( cipherInstance *cipher, keyInstance *key, BYTE *input, BYTE *outBuffer) argument
308 _rijndaelBlockDecrypt( cipherInstance *cipher, keyInstance *key, BYTE *input, BYTE *outBuffer) argument
[all...]
H A DrijndaelApi.h52 /* The structure for cipher information */
68 cipherInstance *cipher,
74 cipherInstance *cipher,
81 cipherInstance *cipher,
92 cipherInstance *cipher,
97 cipherInstance *cipher,
/macosx-10.10/OpenSSL098-52/src/test/
H A Dtestenc10 $cmd enc < $test > $test.cipher
11 $cmd enc < $test.cipher >$test.clear
17 /bin/rm $test.cipher $test.clear
20 $cmd enc -a -e < $test > $test.cipher
21 $cmd enc -a -d < $test.cipher >$test.clear
27 /bin/rm $test.cipher $test.clear
30 for i in `$cmd list-cipher-commands`
33 $cmd $i -bufsize 113 -e -k test < $test > $test.$i.cipher
34 $cmd $i -bufsize 157 -d -k test < $test.$i.cipher >$test.$i.clear
40 /bin/rm $test.$i.cipher
[all...]
H A Dtestenc.com17 $ if f$search(test+"-cipher") .nes. "" then delete 'test'-cipher;*
21 $ 'cmd' enc -in 'test' -out 'test'-cipher
22 $ 'cmd' enc -in 'test'-cipher -out 'test'-clear
25 $ delete 'test'-cipher;*,'test'-clear;*
28 $ 'cmd' enc -a -e -in 'test' -out 'test'-cipher
29 $ 'cmd' enc -a -d -in 'test'-cipher -out 'test'-clear
32 $ delete 'test'-cipher;*,'test'-clear;*
34 $ define/user sys$output 'test'-cipher-commands
35 $ 'cmd' list-cipher
[all...]
H A Devp_test.c146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
[all...]
/macosx-10.10/CPANInternal-159.1/Crypt-Rijndael-1.10/t/lib/
H A Dmode.pl12 my $cipher = $c->encrypt( $data );
13 my $plain = $c->decrypt( $cipher );
17 cipher => $cipher,
/macosx-10.10/OpenSSL098-52/src/crypto/evp/
H A Denc_min.c75 /* ctx->cipher=NULL; */
175 /* We'll use the ENGINE's private cipher definition */
178 * 'cipher' came from an ENGINE and we need to release
191 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, argument
206 ctx->cipher = &bad_cipher;
215 if (ctx->engine && ctx->cipher && (!cipher ||
216 (cipher && (cipher->nid == ctx->cipher
388 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument
[all...]
H A Devp_lib.c68 if (c->cipher->set_asn1_parameters != NULL)
69 ret=c->cipher->set_asn1_parameters(c,type);
70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
81 if (c->cipher->get_asn1_parameters != NULL)
82 ret=c->cipher->get_asn1_parameters(c,type);
83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
122 /* Convert the various cipher NIDs and dummies to a proper OID NID */
188 return ctx->cipher->block_size;
193 return ctx->cipher;
196 unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument
211 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument
216 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument
[all...]
H A Devp_test.c146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
[all...]
/macosx-10.10/ruby-106/ruby/test/openssl/
H A Dtest_cipher.rb93 cipher = OpenSSL::Cipher.new('aes-128-ctr')
94 cipher.encrypt
95 cipher.pkcs5_keyivgen('password')
96 c = cipher.update('hello,world') + cipher.final
97 cipher.decrypt
98 cipher.pkcs5_keyivgen('password')
99 assert_equal('hello,world', cipher.update(c) + cipher.final)
139 cipher
[all...]
H A Dtest_engine.rb48 # suppress message from openssl Engine's RC4 cipher [ruby-core:41026]
51 encrypted = crypt_data(data, key, :encrypt) { engine.cipher(algo) }
68 cipher = yield
69 cipher.send mode
70 cipher.key = key
71 cipher.update(data) + cipher.final
/macosx-10.10/CPANInternal-159.1/Crypt-Rijndael-1.10/t/rt/
H A D27632.t15 my $cipher = $class->new( $key, Crypt::Rijndael::MODE_CBC );
16 isa_ok( $cipher, $class );
18 $cipher->set_iv('a' x 16);
24 my $crypt = $cipher->encrypt( $in_plain );
37 my $out_plain = $cipher->decrypt( $crypt );
/macosx-10.10/ruby-106/ruby/lib/webrick/
H A Dhttps.rb25 # HTTP request SSL cipher
27 attr_reader :cipher
48 @cipher = socket.cipher
76 meta["SSL_CIPHER"] = @cipher[0]
77 meta["SSL_PROTOCOL"] = @cipher[1]
78 meta["SSL_CIPHER_USEKEYSIZE"] = @cipher[2].to_s
79 meta["SSL_CIPHER_ALGKEYSIZE"] = @cipher[3].to_s
/macosx-10.10/ppp-786.1.1/Helpers/pppd/
H A Dpppcrypt.c155 DesEncrypt(clear, cipher)
157 u_char *cipher; /* OUT 8 octets */
166 Collapse(des_input, cipher);
171 DesDecrypt(cipher, clear)
172 u_char *cipher; /* IN 8 octets */
177 Expand(cipher, des_input);
200 DesEncrypt(clear, key, cipher)
202 u_char *cipher; /* OUT 8 octets */
204 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher,
210 DesDecrypt(cipher, clea
[all...]
/macosx-10.10/BerkeleyDB-21/db/crypto/
H A Dcrypto.c26 CIPHER *cipher; local
53 * Must create the shared information. We need: Shared cipher
57 if ((ret = __env_alloc(infop, sizeof(CIPHER), &cipher)) != 0)
59 memset(cipher, 0, sizeof(*cipher));
62 __env_alloc_free(infop, cipher);
66 cipher->passwd = R_OFFSET(infop, sh_passwd);
67 cipher->passwd_len = dbenv->passwd_len;
68 cipher->flags = db_cipher->alg;
69 memcpy(sh_passwd, dbenv->passwd, cipher
160 CIPHER *cipher; local
388 CIPHER *cipher; local
[all...]
/macosx-10.10/CPANInternal-159.1/PlRPC-0.2020/lib/RPC/PlServer/
H A DComm.pm57 if (my $cipher = $attr->{'cipher'}) {
58 $self->{'cipher'} = $cipher;
96 if (my $cipher = $self->{'cipher'}) {
97 my $size = $cipher->blocksize;
103 $msg .= $cipher->encrypt(substr($encodedMsg, $i, $size));
153 if ($self->{'cipher'}) {
154 $blockSize = $self->{'cipher'}
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher=EVP_get_cipherbyname(
84 if (ret->cipher.cipher == NULL)
99 memcpy(ret->cipher.iv,
103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
120 ret->cipher.cipher=NULL;
121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslNullCipher.c39 const SSLSymmetricCipherParams *cipher,
67 .c.cipher = {
38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslNullCipher.c39 const SSLSymmetricCipherParams *cipher,
67 .c.cipher = {
38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslNullCipher.c39 const SSLSymmetricCipherParams *cipher,
67 .c.cipher = {
38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
/macosx-10.10/BerkeleyDB-21/db/crypto/rijndael/
H A Drijndael-api-fst.c6 * Optimised ANSI C code for the Rijndael cipher (now AES)
94 __db_cipherInit(cipher, mode, IV)
95 cipherInstance *cipher;
100 cipher->mode = mode;
105 memcpy(cipher->IV, IV, MAX_IV_SIZE);
117 __db_blockEncrypt(cipher, key, input, inputLen, outBuffer)
118 cipherInstance *cipher;
128 if (cipher == NULL ||
139 switch (cipher->mode) {
149 iv = cipher
[all...]
/macosx-10.10/CPANInternal-159.1/IO-Socket-SSL/example/
H A Dssl_client.pl40 my ($subject_name, $issuer_name, $cipher);
44 $cipher = $sock->get_cipher();
46 warn "cipher: $cipher.\n", "server cert:\n",
/macosx-10.10/ruby-106/ruby/sample/openssl/
H A Dcipher.rb6 puts %(cipher alg: "#{alg}")
16 cipher = enc.update(text)
17 cipher << enc.final
18 puts %(encrypted text: #{cipher.inspect})
25 plain = dec.update(cipher)

Completed in 391 milliseconds

1234567891011