HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 226 - 250 of 253) sorted by null

1 2 3 4 5 6 7 8 91011

  /external/wpa_supplicant/
tlsv1_client.c 344 "cipher suite 0x%04x", cipher_suite);
352 "cipher suite for a resumed connection (0x%04x != "
756 "with the selected cipher suite");
940 wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher "
2188 char *cipher; local
    [all...]
wpa_supplicant.c 259 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
262 wpa_s->pairwise_cipher = cipher;
264 wpa_s->group_cipher = cipher;
347 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for "
    [all...]
tls_openssl.c     [all...]
eap_sake.c 30 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon6725
driver_wext.c     [all...]
  /external/openssl/ssl/
d1_pkt.c 682 * Change cipher spec protocol
919 (s->session != NULL) && (s->session->cipher != NULL))
1069 /* 'Change Cipher Spec' is just a single byte, so we know
    [all...]
d1_both.c 234 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE))
235 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
443 * know that change cipher spec and finished messages
    [all...]
s3_srvr.c 120 * ECC cipher suite support in OpenSSL originally written by
374 * message only if the cipher suite is either
571 s->session->cipher=s->s3->tmp.new_cipher;
889 /* we need a cipher if we are not resuming a session */
908 /* If it is a hit, check that the cipher is in the list */
912 id=s->session->cipher->id;
932 /* Special case as client bug workaround: the previously used cipher may
934 * continue using a cipher that before wasn't chosen due to server
935 * preferences. We'll have to reject the connection if the cipher is not
940 s->session->cipher = c
    [all...]
s3_clnt.c 120 * ECC cipher suite support in OpenSSL originally written by
383 * authentication in ECDH cipher suites with
419 s->session->cipher=s->s3->tmp.new_cipher;
841 /* unknown cipher */
852 /* we did not say we would use this cipher */
858 /* Depending on the session caching (internal/external), the cipher
861 if (s->session->cipher)
862 s->session->cipher_id = s->session->cipher->id;
1057 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name,
1237 /* this should be because we are using an export cipher */
    [all...]
ssl.h 166 * ECC cipher suite support in OpenSSL originally developed by
310 * to the default cipher setup will also be included here.
319 /* The following cipher list is used by default.
320 * It also is substituted when an application-defined cipher list string
389 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
405 * Cipher OCTET_STRING, -- the 3 byte cipher ID
464 SSL_CIPHER *cipher; member in struct:ssl_session_st
467 * the 'cipher' structure */
529 /* Set on servers to choose the cipher according to the server'
    [all...]
d1_clnt.c 414 s->session->cipher=s->s3->tmp.new_cipher;
d1_srvr.c 546 s->session->cipher=s->s3->tmp.new_cipher;
775 /* put the cipher */
    [all...]
ssl_locl.h 113 * ECC cipher suite support in OpenSSL originally developed by
247 * Use the according functions for cipher management instead.
308 * Export and cipher strength information. For each cipher we have to decide
312 * Independent of the export flag the cipher strength is sorted into classes.
314 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change
340 * Macros to check the export status and cipher strength for export ciphers.
344 * *_EXPORT40/56 macros are used to check whether a certain cipher strength
746 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 29 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon6909
  /external/openssl/crypto/pkcs7/
pk7_doit.c 167 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher;
178 evp_cipher=p7->d.enveloped->enc_data->cipher;
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_openssl.c     [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 28 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon6940
  /hardware/ti/wlan/wl1271/wpa_supplicant_lib/
driver_ti.c 69 static int wpa_driver_tista_cipher2wext(int cipher)
71 switch (cipher) {
    [all...]
  /system/wlan/ti/wilink_6_1/wpa_supplicant_lib/
driver_ti.c 69 static int wpa_driver_tista_cipher2wext(int cipher)
71 switch (cipher) {
    [all...]
  /external/openssl/crypto/x509/
x509.h 478 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
  /external/openssl/include/openssl/
ssl.h 166 * ECC cipher suite support in OpenSSL originally developed by
310 * to the default cipher setup will also be included here.
319 /* The following cipher list is used by default.
320 * It also is substituted when an application-defined cipher list string
389 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
405 * Cipher OCTET_STRING, -- the 3 byte cipher ID
464 SSL_CIPHER *cipher; member in struct:ssl_session_st
467 * the 'cipher' structure */
529 /* Set on servers to choose the cipher according to the server'
    [all...]
x509.h 478 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.c 175 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for "
635 static wpa_cipher cipher_suite2driver(int cipher)
637 switch (cipher) {
694 wpa_printf(MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set cipher "
698 "cipher 0x%x (mask 0x%x) - reject",
704 "cipher 0x%x (mask 0x%x) - reject",
790 wpa_printf(MSG_DEBUG, "WPA: Set cipher suites based "
796 wpa_printf(MSG_DEBUG, "WPA: Selected cipher suites: group %d "
801 wpa_printf(MSG_DEBUG, "WPA: Selected mgmt group cipher %d",
832 wpa_printf(MSG_WARNING, "WPA: Failed to select group cipher.")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_nl80211.c     [all...]
driver_wext.c     [all...]

Completed in 620 milliseconds

1 2 3 4 5 6 7 8 91011