HomeSort by relevance Sort by last modified time
    Searched refs:ciphers (Results 1 - 25 of 45) sorted by null

1 2

  /external/openssl/crypto/engine/
tb_cipher.c 76 if(e->ciphers)
79 int num_nids = e->ciphers(e, NULL, &nids, 0);
98 if(e->ciphers)
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
eng_cryptodev.c 145 } ciphers[] = { variable in typeref:struct:__anon5394
226 * Find out what ciphers /dev/crypto will let us have a session for.
245 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
246 if (ciphers[i].nid == NID_undef)
248 sess.cipher = ciphers[i].id;
249 sess.keylen = ciphers[i].keylen;
253 nids[count++] = ciphers[i].nid;
305 * Find the useable ciphers|digests from dev/crypto - this is the first
307 * can use for ciphers from this engine. We want to return
416 for (i = 0; ciphers[i].id; i++
    [all...]
eng_int.h 167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
eng_list.c 337 dest->ciphers = src->ciphers;
eng_lib.c 93 e->ciphers = NULL;
  /external/dropbear/libtomcrypt/
Android.mk 9 src/ciphers/aes/aes.c src/ciphers/anubis.c src/ciphers/blowfish.c \
10 src/ciphers/cast5.c src/ciphers/des.c src/ciphers/kasumi.c src/ciphers/khazad.c src/ciphers/kseed.c \
11 src/ciphers/noekeon.c src/ciphers/rc2.c src/ciphers/rc5.c src/ciphers/rc6.c src/ciphers/safer/safer.c
    [all...]
  /external/openssl/apps/
ciphers.c 1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
93 char *ciphers=NULL; local
149 ciphers= *argv;
166 if (ciphers != NULL) {
167 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
Android.mk 11 ciphers.c \
progs.pl 34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
  /external/openssl/patches/
apps_Android.mk 11 ciphers.c \
  /external/wpa_supplicant/
tlsv1_client.h 46 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
tls_none.c 158 u8 *ciphers)
tls_internal.c 243 u8 *ciphers)
245 return tlsv1_client_set_cipher_list(conn->client, ciphers);
tls.h 390 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
395 u8 *ciphers);
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.h 47 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
tlsv1_server.h 43 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
tlsv1_client.c 602 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
606 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers)
613 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
tlsv1_server.c 543 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
547 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers)
554 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
  /external/openssl/ssl/
s3_srvr.c 797 STACK_OF(SSL_CIPHER) *ciphers=NULL;
971 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers))
985 printf("client sent %d ciphers\n",sk_num(ciphers));
987 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++)
989 c=sk_SSL_CIPHER_value(ciphers,i);
992 i,sk_num(ciphers),SSL_CIPHER_get_name(c));
1000 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
1007 c = sk_SSL_CIPHER_value(ciphers, 0);
1087 ciphers, &pref_cipher, s->tls_session_secret_cb_arg)
    [all...]
s23_clnt.c 256 STACK_OF(SSL_CIPHER) *ciphers;
258 ciphers = SSL_get_ciphers(s);
259 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
261 cipher = sk_SSL_CIPHER_value(ciphers, i);
367 /* Ciphers supported */
371 /* no ciphers */
433 /* Ciphers supported (using SSL 3.0/TLS 1.0 format) */
s2_srvr.c 640 &s->session->ciphers);
666 sk_SSL_CIPHER_free(s->session->ciphers);
667 s->session->ciphers = prio;
669 /* s->session->ciphers should now have a list of
670 * ciphers that are on both the client and server.
672 * the ciphers or in the order of the server's preference
766 s2n(0,p); /* ciphers len */
779 /* lets send out the ciphers we like in the
781 sk= s->session->ciphers;
782 n=ssl_cipher_list_to_bytes(s,s->session->ciphers,d,0)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_internal.c 435 u8 *ciphers)
439 return tlsv1_client_set_cipher_list(conn->client, ciphers);
443 return tlsv1_server_set_cipher_list(conn->server, ciphers);
tls_none.c 151 u8 *ciphers)
tls.h 398 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
404 u8 *ciphers);
  /external/chromium/net/third_party/nss/ssl/
ssl.h 67 /* Macro to tell which ciphers in table are SSL2 vs SSL3/TLS. */
151 ** Control ciphers that SSL uses. If on is non-zero then the named cipher
471 * This essentially enables all supported ciphers.
481 * to explicitly allow those ciphers you may legally export.
514 ** If MS can be extracted for all ciphers, (*pcanbypass) is set to TRUE and
536 PRUint16 *ciphers, int nciphers,

Completed in 1935 milliseconds

1 2