/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | DESSupport.h | 5 unsigned char * cipher);
|
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/t/lib/ |
H A D | mode.pl | 12 my $cipher = $c->encrypt( $data ); 13 my $plain = $c->decrypt( $cipher ); 17 cipher => $cipher,
|
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/t/lib/ |
H A D | mode.pl | 12 my $cipher = $c->encrypt( $data ); 13 my $plain = $c->decrypt( $cipher ); 17 cipher => $cipher,
|
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_cipher.rb | 93 cipher = OpenSSL::Cipher.new('aes-128-ctr') 94 cipher.encrypt 95 cipher.pkcs5_keyivgen('password') 96 c = cipher.update('hello,world') + cipher.final 97 cipher.decrypt 98 cipher.pkcs5_keyivgen('password') 99 assert_equal('hello,world', cipher.update(c) + cipher.final) 139 cipher [all...] |
H A D | test_engine.rb | 48 # suppress message from openssl Engine's RC4 cipher [ruby-core:41026] 51 encrypted = crypt_data(data, key, :encrypt) { engine.cipher(algo) } 68 cipher = yield 69 cipher.send mode 70 cipher.key = key 71 cipher.update(data) + cipher.final
|
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/t/rt/ |
H A D | 27632.t | 15 my $cipher = $class->new( $key, Crypt::Rijndael::MODE_CBC ); 16 isa_ok( $cipher, $class ); 18 $cipher->set_iv('a' x 16); 24 my $crypt = $cipher->encrypt( $in_plain ); 37 my $out_plain = $cipher->decrypt( $crypt );
|
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/t/rt/ |
H A D | 27632.t | 15 my $cipher = $class->new( $key, Crypt::Rijndael::MODE_CBC ); 16 isa_ok( $cipher, $class ); 18 $cipher->set_iv('a' x 16); 24 my $crypt = $cipher->encrypt( $in_plain ); 37 my $out_plain = $cipher->decrypt( $crypt );
|
/macosx-10.9.5/ruby-104/ruby/lib/webrick/ |
H A D | https.rb | 25 # HTTP request SSL cipher 27 attr_reader :cipher 48 @cipher = socket.cipher 76 meta["SSL_CIPHER"] = @cipher[0] 77 meta["SSL_PROTOCOL"] = @cipher[1] 78 meta["SSL_CIPHER_USEKEYSIZE"] = @cipher[2].to_s 79 meta["SSL_CIPHER_ALGKEYSIZE"] = @cipher[3].to_s
|
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/ |
H A D | pppcrypt.c | 155 DesEncrypt(clear, cipher) 157 u_char *cipher; /* OUT 8 octets */ 166 Collapse(des_input, cipher); 171 DesDecrypt(cipher, clear) 172 u_char *cipher; /* IN 8 octets */ 177 Expand(cipher, des_input); 200 DesEncrypt(clear, key, cipher) 202 u_char *cipher; /* OUT 8 octets */ 204 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, 210 DesDecrypt(cipher, clea [all...] |
/macosx-10.9.5/BerkeleyDB-21/db/crypto/ |
H A D | crypto.c | 26 CIPHER *cipher; local 53 * Must create the shared information. We need: Shared cipher 57 if ((ret = __env_alloc(infop, sizeof(CIPHER), &cipher)) != 0) 59 memset(cipher, 0, sizeof(*cipher)); 62 __env_alloc_free(infop, cipher); 66 cipher->passwd = R_OFFSET(infop, sh_passwd); 67 cipher->passwd_len = dbenv->passwd_len; 68 cipher->flags = db_cipher->alg; 69 memcpy(sh_passwd, dbenv->passwd, cipher 160 CIPHER *cipher; local 388 CIPHER *cipher; local [all...] |
/macosx-10.9.5/CPANInternal-140/PlRPC/lib/RPC/PlServer/ |
H A D | Comm.pm | 57 if (my $cipher = $attr->{'cipher'}) { 58 $self->{'cipher'} = $cipher; 96 if (my $cipher = $self->{'cipher'}) { 97 my $size = $cipher->blocksize; 103 $msg .= $cipher->encrypt(substr($encodedMsg, $i, $size)); 153 if ($self->{'cipher'}) { 154 $blockSize = $self->{'cipher'} [all...] |
/macosx-10.9.5/CPANInternal-140/PlRPC-0.2020/lib/RPC/PlServer/ |
H A D | Comm.pm | 57 if (my $cipher = $attr->{'cipher'}) { 58 $self->{'cipher'} = $cipher; 96 if (my $cipher = $self->{'cipher'}) { 97 my $size = $cipher->blocksize; 103 $msg .= $cipher->encrypt(substr($encodedMsg, $i, $size)); 153 if ($self->{'cipher'}) { 154 $blockSize = $self->{'cipher'} [all...] |
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/ |
H A D | mk_priv.c | 85 unsigned char *cipher; local 98 cipher = p; 116 des_pcbc_encrypt((des_cblock *)cipher, (des_cblock *)cipher, 119 return (cipher - (unsigned char*)out) + len;
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslNullCipher.c | 39 const SSLSymmetricCipherParams *cipher, 67 .c.cipher = { 38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslNullCipher.c | 39 const SSLSymmetricCipherParams *cipher, 67 .c.cipher = { 38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslNullCipher.c | 39 const SSLSymmetricCipherParams *cipher, 67 .c.cipher = { 38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
|
/macosx-10.9.5/BerkeleyDB-21/db/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 6 * Optimised ANSI C code for the Rijndael cipher (now AES) 94 __db_cipherInit(cipher, mode, IV) 95 cipherInstance *cipher; 100 cipher->mode = mode; 105 memcpy(cipher->IV, IV, MAX_IV_SIZE); 117 __db_blockEncrypt(cipher, key, input, inputLen, outBuffer) 118 cipherInstance *cipher; 128 if (cipher == NULL || 139 switch (cipher->mode) { 149 iv = cipher [all...] |
/macosx-10.9.5/CPANInternal-140/IO-Socket-SSL/example/ |
H A D | ssl_client.pl | 40 my ($subject_name, $issuer_name, $cipher); 44 $cipher = $sock->get_cipher(); 46 warn "cipher: $cipher.\n", "server cert:\n",
|
/macosx-10.9.5/ruby-104/ruby/sample/openssl/ |
H A D | cipher.rb | 6 puts %(cipher alg: "#{alg}") 16 cipher = enc.update(text) 17 cipher << enc.final 18 puts %(encrypted text: #{cipher.inspect}) 25 plain = dec.update(cipher)
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.87 2013/01/26 06:11:05 djm Exp $ */ 53 #include "cipher.h" 188 debug("bad cipher %s [%s]", p, names); 192 debug3("cipher ok: %s [%s]", p, names); 201 * Parses the name of the cipher. Returns the number of the corresponding 202 * cipher, or -1 on error. 225 cipher_init(CipherContext *cc, Cipher *cipher, argument 238 if (cipher->number == SSH_CIPHER_DES) { 247 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); 250 if (keylen < cipher 371 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/ |
H A D | Rijndael.pm | 12 $cipher = Crypt::Rijndael->new( "a" x 32, Crypt::Rijndael::MODE_CBC() ); 14 $cipher->set_iv($iv); 15 $crypted = $cipher->encrypt($plaintext); 17 $plaintext = $cipher->decrypt($crypted); 21 This module implements the Rijndael cipher, which has just been selected 44 Returns the keysize, which is 32 (bytes). The Rijndael cipher 55 =item $cipher = Crypt::Rijndael->new( $key [, $mode] ) 57 Create a new C<Crypt::Rijndael> cipher object with the given key 60 codebook mode, the default), C<MODE_CBC> (cipher block chaining, the 61 same that C<Crypt::CBC> does), C<MODE_CFB> (128-bit cipher feedbac [all...] |
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/ |
H A D | Rijndael.pm | 12 $cipher = Crypt::Rijndael->new( "a" x 32, Crypt::Rijndael::MODE_CBC() ); 14 $cipher->set_iv($iv); 15 $crypted = $cipher->encrypt($plaintext); 17 $plaintext = $cipher->decrypt($crypted); 21 This module implements the Rijndael cipher, which has just been selected 44 Returns the keysize, which is 32 (bytes). The Rijndael cipher 55 =item $cipher = Crypt::Rijndael->new( $key [, $mode] ) 57 Create a new C<Crypt::Rijndael> cipher object with the given key 60 codebook mode, the default), C<MODE_CBC> (cipher block chaining, the 61 same that C<Crypt::CBC> does), C<MODE_CFB> (128-bit cipher feedbac [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | smimeutil.c | 72 long cipher; /* optimization */ member in struct:__anon3836 131 unsigned long cipher; member in struct:__anon3840 140 /* cipher algtag parms enabled allowed */ 153 * smime_mapi_by_cipher - find index into smime_cipher_map by cipher 156 smime_mapi_by_cipher(unsigned long cipher) argument 161 if (smime_cipher_map[i].cipher == cipher) 188 /* do we try to turn on a forbidden cipher? */ 235 nss_smime_get_cipher_for_alg_and_key(SECAlgorithmID *algid, SecSymmetricKeyRef key, unsigned long *cipher) argument 275 *cipher 379 long cipher; local 566 unsigned long cipher; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | smimeutil.c | 72 long cipher; /* optimization */ member in struct:__anon4853 131 unsigned long cipher; member in struct:__anon4857 140 /* cipher algtag parms enabled allowed */ 153 * smime_mapi_by_cipher - find index into smime_cipher_map by cipher 156 smime_mapi_by_cipher(unsigned long cipher) argument 161 if (smime_cipher_map[i].cipher == cipher) 188 /* do we try to turn on a forbidden cipher? */ 235 nss_smime_get_cipher_for_alg_and_key(SECAlgorithmID *algid, SecSymmetricKeyRef key, unsigned long *cipher) argument 275 *cipher 379 long cipher; local 566 unsigned long cipher; local [all...] |
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | CommonCryptor.c | 50 switch(ref->cipher) { 62 const corecryptoMode getCipherMode(CCAlgorithm cipher, CCMode mode, CCOperation direction) argument 66 dispatch_once(&(globals->cipherModeTab[cipher][i].init), ^{ 67 globals->cipherModeTab[cipher][i].ecb = ccmodeList[cipher][i].ecb(); 68 globals->cipherModeTab[cipher][i].cbc = ccmodeList[cipher][i].cbc(); 69 globals->cipherModeTab[cipher][i].cfb = ccmodeList[cipher][i].cfb(); 70 globals->cipherModeTab[cipher][ 91 setCryptorCipherMode(CCCryptor *ref, CCAlgorithm cipher, CCMode mode, CCOperation direction) argument 116 ccSetupCryptor(CCCryptor *ref, CCAlgorithm cipher, CCMode mode, CCOperation direction, CCPadding padding) argument [all...] |