Searched refs:cipher (Results 1 - 25 of 155) sorted by relevance

1234567

/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/
H A DDESSupport.h5 unsigned char * cipher);
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/t/lib/
H A Dmode.pl12 my $cipher = $c->encrypt( $data );
13 my $plain = $c->decrypt( $cipher );
17 cipher => $cipher,
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/t/lib/
H A Dmode.pl12 my $cipher = $c->encrypt( $data );
13 my $plain = $c->decrypt( $cipher );
17 cipher => $cipher,
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_cipher.rb93 cipher = OpenSSL::Cipher.new('aes-128-ctr')
94 cipher.encrypt
95 cipher.pkcs5_keyivgen('password')
96 c = cipher.update('hello,world') + cipher.final
97 cipher.decrypt
98 cipher.pkcs5_keyivgen('password')
99 assert_equal('hello,world', cipher.update(c) + cipher.final)
139 cipher
[all...]
H A Dtest_engine.rb48 # suppress message from openssl Engine's RC4 cipher [ruby-core:41026]
51 encrypted = crypt_data(data, key, :encrypt) { engine.cipher(algo) }
68 cipher = yield
69 cipher.send mode
70 cipher.key = key
71 cipher.update(data) + cipher.final
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/t/rt/
H A D27632.t15 my $cipher = $class->new( $key, Crypt::Rijndael::MODE_CBC );
16 isa_ok( $cipher, $class );
18 $cipher->set_iv('a' x 16);
24 my $crypt = $cipher->encrypt( $in_plain );
37 my $out_plain = $cipher->decrypt( $crypt );
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/t/rt/
H A D27632.t15 my $cipher = $class->new( $key, Crypt::Rijndael::MODE_CBC );
16 isa_ok( $cipher, $class );
18 $cipher->set_iv('a' x 16);
24 my $crypt = $cipher->encrypt( $in_plain );
37 my $out_plain = $cipher->decrypt( $crypt );
/macosx-10.9.5/ruby-104/ruby/lib/webrick/
H A Dhttps.rb25 # HTTP request SSL cipher
27 attr_reader :cipher
48 @cipher = socket.cipher
76 meta["SSL_CIPHER"] = @cipher[0]
77 meta["SSL_PROTOCOL"] = @cipher[1]
78 meta["SSL_CIPHER_USEKEYSIZE"] = @cipher[2].to_s
79 meta["SSL_CIPHER_ALGKEYSIZE"] = @cipher[3].to_s
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/
H A Dpppcrypt.c155 DesEncrypt(clear, cipher)
157 u_char *cipher; /* OUT 8 octets */
166 Collapse(des_input, cipher);
171 DesDecrypt(cipher, clear)
172 u_char *cipher; /* IN 8 octets */
177 Expand(cipher, des_input);
200 DesEncrypt(clear, key, cipher)
202 u_char *cipher; /* OUT 8 octets */
204 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher,
210 DesDecrypt(cipher, clea
[all...]
/macosx-10.9.5/BerkeleyDB-21/db/crypto/
H A Dcrypto.c26 CIPHER *cipher; local
53 * Must create the shared information. We need: Shared cipher
57 if ((ret = __env_alloc(infop, sizeof(CIPHER), &cipher)) != 0)
59 memset(cipher, 0, sizeof(*cipher));
62 __env_alloc_free(infop, cipher);
66 cipher->passwd = R_OFFSET(infop, sh_passwd);
67 cipher->passwd_len = dbenv->passwd_len;
68 cipher->flags = db_cipher->alg;
69 memcpy(sh_passwd, dbenv->passwd, cipher
160 CIPHER *cipher; local
388 CIPHER *cipher; local
[all...]
/macosx-10.9.5/CPANInternal-140/PlRPC/lib/RPC/PlServer/
H A DComm.pm57 if (my $cipher = $attr->{'cipher'}) {
58 $self->{'cipher'} = $cipher;
96 if (my $cipher = $self->{'cipher'}) {
97 my $size = $cipher->blocksize;
103 $msg .= $cipher->encrypt(substr($encodedMsg, $i, $size));
153 if ($self->{'cipher'}) {
154 $blockSize = $self->{'cipher'}
[all...]
/macosx-10.9.5/CPANInternal-140/PlRPC-0.2020/lib/RPC/PlServer/
H A DComm.pm57 if (my $cipher = $attr->{'cipher'}) {
58 $self->{'cipher'} = $cipher;
96 if (my $cipher = $self->{'cipher'}) {
97 my $size = $cipher->blocksize;
103 $msg .= $cipher->encrypt(substr($encodedMsg, $i, $size));
153 if ($self->{'cipher'}) {
154 $blockSize = $self->{'cipher'}
[all...]
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/
H A Dmk_priv.c85 unsigned char *cipher; local
98 cipher = p;
116 des_pcbc_encrypt((des_cblock *)cipher, (des_cblock *)cipher,
119 return (cipher - (unsigned char*)out) + len;
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A DsslNullCipher.c39 const SSLSymmetricCipherParams *cipher,
67 .c.cipher = {
38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A DsslNullCipher.c39 const SSLSymmetricCipherParams *cipher,
67 .c.cipher = {
38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A DsslNullCipher.c39 const SSLSymmetricCipherParams *cipher,
67 .c.cipher = {
38 NullInit( const SSLSymmetricCipherParams *cipher, int encrypting, uint8_t *key, uint8_t *iv, SymCipherContext *cipherCtx) argument
/macosx-10.9.5/BerkeleyDB-21/db/crypto/rijndael/
H A Drijndael-api-fst.c6 * Optimised ANSI C code for the Rijndael cipher (now AES)
94 __db_cipherInit(cipher, mode, IV)
95 cipherInstance *cipher;
100 cipher->mode = mode;
105 memcpy(cipher->IV, IV, MAX_IV_SIZE);
117 __db_blockEncrypt(cipher, key, input, inputLen, outBuffer)
118 cipherInstance *cipher;
128 if (cipher == NULL ||
139 switch (cipher->mode) {
149 iv = cipher
[all...]
/macosx-10.9.5/CPANInternal-140/IO-Socket-SSL/example/
H A Dssl_client.pl40 my ($subject_name, $issuer_name, $cipher);
44 $cipher = $sock->get_cipher();
46 warn "cipher: $cipher.\n", "server cert:\n",
/macosx-10.9.5/ruby-104/ruby/sample/openssl/
H A Dcipher.rb6 puts %(cipher alg: "#{alg}")
16 cipher = enc.update(text)
17 cipher << enc.final
18 puts %(encrypted text: #{cipher.inspect})
25 plain = dec.update(cipher)
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dcipher.c1 /* $OpenBSD: cipher.c,v 1.87 2013/01/26 06:11:05 djm Exp $ */
53 #include "cipher.h"
188 debug("bad cipher %s [%s]", p, names);
192 debug3("cipher ok: %s [%s]", p, names);
201 * Parses the name of the cipher. Returns the number of the corresponding
202 * cipher, or -1 on error.
225 cipher_init(CipherContext *cc, Cipher *cipher, argument
238 if (cipher->number == SSH_CIPHER_DES) {
247 cc->plaintext = (cipher->number == SSH_CIPHER_NONE);
250 if (keylen < cipher
371 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int do_encrypt) argument
[all...]
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/
H A DRijndael.pm12 $cipher = Crypt::Rijndael->new( "a" x 32, Crypt::Rijndael::MODE_CBC() );
14 $cipher->set_iv($iv);
15 $crypted = $cipher->encrypt($plaintext);
17 $plaintext = $cipher->decrypt($crypted);
21 This module implements the Rijndael cipher, which has just been selected
44 Returns the keysize, which is 32 (bytes). The Rijndael cipher
55 =item $cipher = Crypt::Rijndael->new( $key [, $mode] )
57 Create a new C<Crypt::Rijndael> cipher object with the given key
60 codebook mode, the default), C<MODE_CBC> (cipher block chaining, the
61 same that C<Crypt::CBC> does), C<MODE_CFB> (128-bit cipher feedbac
[all...]
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/
H A DRijndael.pm12 $cipher = Crypt::Rijndael->new( "a" x 32, Crypt::Rijndael::MODE_CBC() );
14 $cipher->set_iv($iv);
15 $crypted = $cipher->encrypt($plaintext);
17 $plaintext = $cipher->decrypt($crypted);
21 This module implements the Rijndael cipher, which has just been selected
44 Returns the keysize, which is 32 (bytes). The Rijndael cipher
55 =item $cipher = Crypt::Rijndael->new( $key [, $mode] )
57 Create a new C<Crypt::Rijndael> cipher object with the given key
60 codebook mode, the default), C<MODE_CBC> (cipher block chaining, the
61 same that C<Crypt::CBC> does), C<MODE_CFB> (128-bit cipher feedbac
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_smime/
H A Dsmimeutil.c72 long cipher; /* optimization */ member in struct:__anon3836
131 unsigned long cipher; member in struct:__anon3840
140 /* cipher algtag parms enabled allowed */
153 * smime_mapi_by_cipher - find index into smime_cipher_map by cipher
156 smime_mapi_by_cipher(unsigned long cipher) argument
161 if (smime_cipher_map[i].cipher == cipher)
188 /* do we try to turn on a forbidden cipher? */
235 nss_smime_get_cipher_for_alg_and_key(SECAlgorithmID *algid, SecSymmetricKeyRef key, unsigned long *cipher) argument
275 *cipher
379 long cipher; local
566 unsigned long cipher; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/
H A Dsmimeutil.c72 long cipher; /* optimization */ member in struct:__anon4853
131 unsigned long cipher; member in struct:__anon4857
140 /* cipher algtag parms enabled allowed */
153 * smime_mapi_by_cipher - find index into smime_cipher_map by cipher
156 smime_mapi_by_cipher(unsigned long cipher) argument
161 if (smime_cipher_map[i].cipher == cipher)
188 /* do we try to turn on a forbidden cipher? */
235 nss_smime_get_cipher_for_alg_and_key(SECAlgorithmID *algid, SecSymmetricKeyRef key, unsigned long *cipher) argument
275 *cipher
379 long cipher; local
566 unsigned long cipher; local
[all...]
/macosx-10.9.5/CommonCrypto-60049/lib/
H A DCommonCryptor.c50 switch(ref->cipher) {
62 const corecryptoMode getCipherMode(CCAlgorithm cipher, CCMode mode, CCOperation direction) argument
66 dispatch_once(&(globals->cipherModeTab[cipher][i].init), ^{
67 globals->cipherModeTab[cipher][i].ecb = ccmodeList[cipher][i].ecb();
68 globals->cipherModeTab[cipher][i].cbc = ccmodeList[cipher][i].cbc();
69 globals->cipherModeTab[cipher][i].cfb = ccmodeList[cipher][i].cfb();
70 globals->cipherModeTab[cipher][
91 setCryptorCipherMode(CCCryptor *ref, CCAlgorithm cipher, CCMode mode, CCOperation direction) argument
116 ccSetupCryptor(CCCryptor *ref, CCAlgorithm cipher, CCMode mode, CCOperation direction, CCPadding padding) argument
[all...]

Completed in 143 milliseconds

1234567