/external/wpa_supplicant/ |
tlsv1_client.c | 344 "cipher suite 0x%04x", cipher_suite); 352 "cipher suite for a resumed connection (0x%04x != " 756 "with the selected cipher suite"); 940 wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher " 2188 char *cipher; local [all...] |
wpa_supplicant.c | 259 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 262 wpa_s->pairwise_cipher = cipher; 264 wpa_s->group_cipher = cipher; 347 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for " [all...] |
tls_openssl.c | [all...] |
eap_sake.c | 30 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon6725
|
driver_wext.c | [all...] |
/external/openssl/ssl/ |
d1_pkt.c | 682 * Change cipher spec protocol 919 (s->session != NULL) && (s->session->cipher != NULL)) 1069 /* 'Change Cipher Spec' is just a single byte, so we know [all...] |
d1_both.c | 234 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE)) 235 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher); 443 * know that change cipher spec and finished messages [all...] |
s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 374 * message only if the cipher suite is either 571 s->session->cipher=s->s3->tmp.new_cipher; 889 /* we need a cipher if we are not resuming a session */ 908 /* If it is a hit, check that the cipher is in the list */ 912 id=s->session->cipher->id; 932 /* Special case as client bug workaround: the previously used cipher may 934 * continue using a cipher that before wasn't chosen due to server 935 * preferences. We'll have to reject the connection if the cipher is not 940 s->session->cipher = c [all...] |
s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 383 * authentication in ECDH cipher suites with 419 s->session->cipher=s->s3->tmp.new_cipher; 841 /* unknown cipher */ 852 /* we did not say we would use this cipher */ 858 /* Depending on the session caching (internal/external), the cipher 861 if (s->session->cipher) 862 s->session->cipher_id = s->session->cipher->id; 1057 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name, 1237 /* this should be because we are using an export cipher */ [all...] |
ssl.h | 166 * ECC cipher suite support in OpenSSL originally developed by 310 * to the default cipher setup will also be included here. 319 /* The following cipher list is used by default. 320 * It also is substituted when an application-defined cipher list string 389 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 405 * Cipher OCTET_STRING, -- the 3 byte cipher ID 464 SSL_CIPHER *cipher; member in struct:ssl_session_st 467 * the 'cipher' structure */ 529 /* Set on servers to choose the cipher according to the server' [all...] |
d1_clnt.c | 414 s->session->cipher=s->s3->tmp.new_cipher;
|
d1_srvr.c | 546 s->session->cipher=s->s3->tmp.new_cipher; 775 /* put the cipher */ [all...] |
ssl_locl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 247 * Use the according functions for cipher management instead. 308 * Export and cipher strength information. For each cipher we have to decide 312 * Independent of the export flag the cipher strength is sorted into classes. 314 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change 340 * Macros to check the export status and cipher strength for export ciphers. 344 * *_EXPORT40/56 macros are used to check whether a certain cipher strength 746 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 29 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon6909
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 167 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher; 178 evp_cipher=p7->d.enveloped->enc_data->cipher;
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_openssl.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 28 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon6940
|
/hardware/ti/wlan/wl1271/wpa_supplicant_lib/ |
driver_ti.c | 69 static int wpa_driver_tista_cipher2wext(int cipher) 71 switch (cipher) { [all...] |
/system/wlan/ti/wilink_6_1/wpa_supplicant_lib/ |
driver_ti.c | 69 static int wpa_driver_tista_cipher2wext(int cipher) 71 switch (cipher) { [all...] |
/external/openssl/crypto/x509/ |
x509.h | 478 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
/external/openssl/include/openssl/ |
ssl.h | 166 * ECC cipher suite support in OpenSSL originally developed by 310 * to the default cipher setup will also be included here. 319 /* The following cipher list is used by default. 320 * It also is substituted when an application-defined cipher list string 389 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 405 * Cipher OCTET_STRING, -- the 3 byte cipher ID 464 SSL_CIPHER *cipher; member in struct:ssl_session_st 467 * the 'cipher' structure */ 529 /* Set on servers to choose the cipher according to the server' [all...] |
x509.h | 478 EVP_CIPHER_INFO cipher; member in struct:private_key_st [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.c | 175 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for " 635 static wpa_cipher cipher_suite2driver(int cipher) 637 switch (cipher) { 694 wpa_printf(MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set cipher " 698 "cipher 0x%x (mask 0x%x) - reject", 704 "cipher 0x%x (mask 0x%x) - reject", 790 wpa_printf(MSG_DEBUG, "WPA: Set cipher suites based " 796 wpa_printf(MSG_DEBUG, "WPA: Selected cipher suites: group %d " 801 wpa_printf(MSG_DEBUG, "WPA: Selected mgmt group cipher %d", 832 wpa_printf(MSG_WARNING, "WPA: Failed to select group cipher.") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_nl80211.c | [all...] |
driver_wext.c | [all...] |