HomeSort by relevance Sort by last modified time
    Searched defs:cipher (Results 76 - 100 of 105) sorted by null

1 2 34 5

  /external/openssl/ssl/
ssl_ciph.c 113 * ECC cipher suite support in OpenSSL originally developed by
214 const SSL_CIPHER *cipher; member in struct:cipher_order_st
467 c=s->cipher;
732 co_list[co_list_num].cipher = c;
796 *ca_curr = ciph_curr->cipher;
805 * or represent a cipher strength value (will be added in any case because algorithms=0).
883 cp = curr->cipher;
920 /* add the cipher if it has not been added yet. */
930 /* Move the added cipher to this location */
990 (curr->cipher->strength_bits > max_strength_bits)
    [all...]
ssltest.c 113 * ECC cipher suite support in OpenSSL originally developed by
252 static char *cipher=NULL; variable
307 fprintf(stderr," -cipher arg - The cipher list\n");
318 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
330 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
500 cipher = 0;
633 else if (strcmp(*argv,"-cipher") == 0)
636 cipher= *(++argv);
720 /* ensure that the cipher list are correctly sorted and exit *
    [all...]
ssl.h 113 * ECC cipher suite support in OpenSSL originally developed by
315 * to the default cipher setup will also be included here.
324 /* The following cipher list is used by default.
325 * It also is substituted when an application-defined cipher list string
383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
409 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
425 * Cipher OCTET STRING, -- the 3 byte cipher ID
490 const SSL_CIPHER *cipher; member in struct:ssl_session_st
493 * the 'cipher' structure *
    [all...]
  /external/ppp/pppd/
eap.c 651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local
780 if (!DesEncrypt(clear, cipher)) {
786 outp += b64enc(&b64, cipher, 8, outp);
788 (void) DesEncrypt(cp, cipher);
789 outp += b64enc(&b64, cipher, 8, outp);
800 (void) DesEncrypt(clear, cipher);
801 outp += b64enc(&b64, cipher, 8, outp);
    [all...]
  /external/wpa_supplicant/
tlsv1_common.h 175 tls_cipher cipher; member in struct:tls_cipher_suite
185 tls_cipher cipher; member in struct:tls_cipher_data
wpa_supplicant.c 259 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
262 wpa_s->pairwise_cipher = cipher;
264 wpa_s->group_cipher = cipher;
347 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for "
    [all...]
tlsv1_client.c 344 "cipher suite 0x%04x", cipher_suite);
352 "cipher suite for a resumed connection (0x%04x != "
756 "with the selected cipher suite");
940 wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher "
2188 char *cipher; local
    [all...]
wpa.c 153 * Management Group Cipher Suite (4 octets) (default: AES-128-CMAC)
229 * wpa_cipher_txt - Convert cipher suite to a text string
230 * @cipher: Cipher suite (WPA_CIPHER_* enum)
231 * Returns: Pointer to a text string of the cipher suite name
233 static const char * wpa_cipher_txt(int cipher)
235 switch (cipher) {
524 "cipher", __func__);
554 "pairwise cipher", __func__);
612 "group cipher 0x%x", __func__
2257 int cipher; local
2552 int cipher; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_fast.c 1539 char cipher[80]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_fast.c 444 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
551 char cipher[64]; local
555 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
557 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
562 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_common.h 178 tls_cipher cipher; member in struct:tls_cipher_suite
188 tls_cipher cipher; member in struct:tls_cipher_data
208 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
209 int tls_server_key_exchange_allowed(tls_cipher cipher);
  /external/chromium/net/third_party/nss/ssl/
sslcon.c 96 PRUint8 keyLen; /* cipher symkey size in bytes. */
153 * lsb corresponds to first cipher suite in allCipherSuites[].
176 /* Construct a socket's list of cipher specs from the global default values.
208 /* ask SSL3 how many cipher suites it has. */
214 /* Allocate memory to hold cipher specs */
228 /* fill in cipher specs for SSL2 cipher suites */
253 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites
256 ** if no cipher suites are found, it sets the error code and returns
682 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize
2053 int cipher; local
3239 int cipher; local
    [all...]
ssl3con.c 102 /* This list of SSL3 cipher suites is sorted in descending order of
103 * precedence (desirability). It only includes cipher suites we implement.
104 * This table is modified by SSL3_SetPolicy(). The ordering of cipher suites
251 /* cipher calg keySz secretSz type ivSz BlkSz keygen */
348 /* New TLS cipher suites */
601 /* Find the cipher configuration struct associate with suite */
651 /* We need the cipher defs to see if we have a token that can handle
652 * this cipher. It isn't part of the static definition.
676 * cipher suites. Correcting the computation for svrAuth,
678 * negotiate cipher suites they do not implement. So, unti
1217 SSL3BulkCipher cipher; local
    [all...]
sslimpl.h 297 ** SSL3 cipher suite policy and preference struct.
473 /* The SSL bulk cipher definition */
490 cipher_missing /* reserved for no such supported cipher */
601 /* Stuff used to recreate key and read/write cipher objects */
689 SSL3BulkCipher cipher; member in struct:ssl3BulkCipherDefStr
809 /* This says what cipher suites we can do, and should
    [all...]
  /external/openssl/apps/
s_server.c 113 * ECC cipher suite support in OpenSSL originally developed by
264 static char *cipher=NULL; variable
376 cipher=NULL;
448 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
449 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
1020 else if (strcmp(*argv,"-cipher") == 0)
1023 cipher= *(++argv);
    [all...]
  /external/openssl/crypto/pem/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon5426
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
  /external/openssl/crypto/pkcs7/
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
  /external/openssl/include/openssl/
pem.h 146 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
177 int cipher; member in struct:pem_ctx_st::__anon5470
195 EVP_CIPHER *dec; /* date encryption cipher */
406 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
407 int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len,
pkcs7.h 139 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
343 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
x509.h 504 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
evp.h 319 /* Values for cipher flags */
329 /* Set if variable length cipher */
331 /* Set if the iv handling should be done by the cipher itself */
333 /* Set if the cipher's init() function should be called if key is NULL */
335 /* Call ctrl() to init cipher parameters */
341 /* cipher handles random key generation */
343 /* cipher has its own additional copying logic */
364 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
370 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
371 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided *
    [all...]
ssl.h 113 * ECC cipher suite support in OpenSSL originally developed by
315 * to the default cipher setup will also be included here.
324 /* The following cipher list is used by default.
325 * It also is substituted when an application-defined cipher list string
383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
409 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
425 * Cipher OCTET STRING, -- the 3 byte cipher ID
490 const SSL_CIPHER *cipher; member in struct:ssl_session_st
493 * the 'cipher' structure *
    [all...]
  /libcore/luni/src/main/native/
NativeCrypto.cpp 2231 const SSL_CIPHER* cipher = ssl_method->get_cipher(j); local
3287 const SSL_CIPHER* cipher = ssl_session->cipher; local
    [all...]
  /external/openssl/crypto/x509/
x509.h 504 EVP_CIPHER_INFO cipher; member in struct:private_key_st
    [all...]
  /external/openssl/crypto/evp/
evp.h 319 /* Values for cipher flags */
329 /* Set if variable length cipher */
331 /* Set if the iv handling should be done by the cipher itself */
333 /* Set if the cipher's init() function should be called if key is NULL */
335 /* Call ctrl() to init cipher parameters */
341 /* cipher handles random key generation */
343 /* cipher has its own additional copying logic */
364 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
370 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
371 ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided *
    [all...]

Completed in 900 milliseconds

1 2 34 5